Lumaktaw sa pangunahing content

Mga Post

Ipinapakita ang mga post mula sa Hunyo, 2017

Ano ang Google Dorks?

Ang Google(Gogol) Google.com  ay isang Napakalaking pinag kukunan ng impormasyon na nakikita sa 'Surface Web.' Isa na rin dito ay ang Google Dorking's. Ano nga ba ang Google Dorking? -Laman nito ay ang mga "features" para sa mas malalim,mabilis at masusing pag-hahanap. -Ang kailangan mo lang dito ay ang "KEYWORD" o ang "MAIN IDEA" hindi mo kailangan kompleto ang i Type mo. -isa siyang malalamin na pag sasaliksik madalas na ang mga gumagamit nito ay ang mga Hackers,Pentesters,Security Researchers, atbp. SQLI DORK EXAMPLE •index.php?url= MP3 Download or Play Example •intitle:index of alone by Alan Walker You can Use the following words instead of INURL: •intitle: •inurl: •intext: •site: ANY SUGGESTION AND QUESTION ABOUT GOOGLE DORKINGS? COMMENT DOWN AND KINDLY SHARE.

Top 5 IT Security Certifications

Top 5 IT Security Certifications To Enhance Your Career While not having an IT security certification doesn’t disqualify you from getting a job offer or promotion, but prospective employers looking for industry-leading credentials look at it as one measure of qualifications and commitment to quality. As the market for information security talent heats up and the skills shortage continues, infosec experts who have the right combination of credentials and experience are in remarkably high demand. “A certification today is like a college degree,” says Grady Summers, America’s leader for information security program management services at Ernst & Young. “You may not hire a candidate just because they have one, but it is something that you come to expect in this field.” “There is no replacement for real-world experience,” Summers says. “However, certifications are important and have become de facto minimum criteria when screening resumes.” Here is a list of top five secur

TIPS para maiwasan mahack ang Facebook o Ang Email (FACEBOOK HACKING)

TIPS para maiwasan mahack ang facebook/email.. By The Way, It's Tagalog Time Because Some of my Reader's requests is Tagalog daw kung Maari dahil Mas Mauunawaan at Maiintindihan Nila ng husto. Anyway may mga ibat ibang klase ng fb hacking like hack via 3 friends, phishing, hijacking/sniffing, bruteforce, social engineering, cookie stealing etc... ◇◇TIPS◇◇ •Iwasan ang mag login sa pekeng facebook page or "phishing" kung tawagin. pano malalaman kung phishing? tignan ang address bar. ang fb ay may address na "www.facebook.com" o kaya'y "free.facebook.com" at samantalang ang phishing ay iba iba ang address. at pag may nakita kang facebook login at hindi facebook.com ang nakalagay! wag mo na ituloy, Dahil pag naglogin ka sa pekeng facebook na yun, maaaring makuwa ang data na nilagay mo ang user at password Makukuwa nila un sa server or email ng phisherman. •×Wag ibibigay Ang Email mo Katulad ng HAHAHAHAHA@gmail.com, kasi yan po ang p

Does Facebook delete fake Facebook accounts after reporting?

As soon as the reported account reaches the report limit, e.g. if you report the fake account, then that is 1 report made, and you don't count for a second report, its a bit similar to Youtube's voting system... Normally on social media sites, an account will need to be reported 10-20 times before a moderator will review the reported account... However, if the account exceeds 20 reports, then the account may be removed automatically. So going back to the question... The account will be removed once it exceeds tne report limit Feel free to Comment Your Suggestion About this Question :)

What does Refresh actually do?

You’ve probably seen that when you right-click on your Windows desktop or inside windows folder, you notice an option dubbed Refresh in the menu settings. Many users have a habit of constantly refreshing Windows for no reason. Everything on your desktop is a static frame. Let’s take an example of a video— Each video have many images coordinated in an order and they are projected on the screen at a specific rate i.e. 48 images/frames per second. All of that called FPS (frames per second) is a measure of how motion video is displayed. The term applies equally to film video and digital video. The refresh option marks all the components of the screen as sloppy, so, the entire screen is recreated in the next frame and represented on your monitor. That’s the original function of the Refresh option in Windows. Generally, F5 option is a method of describing the process of reloading or updating what is being displayed. Refresh simply redraws the Desktop. So if you had new files tha

Student hacks university computer server to change failing grade from “F” to “B”

Student faces felony charges for hacking system to change failing grade A 22-year-old engineering student from the  University Central of Florida    in Orlando who allegedly hacked into its grading systems, changing one of his grades in a class from an “ F ” to a “ B ”, is in legal trouble. He faces a felony charge of accessing a computer electronic device with knowledge that such action is unauthorized. The culprit in question,  Sami Adel Ammar , is said to have hacked into his professor’s computer to change a failing grade into a passing one. According to a surveillance video, two students are seen walking down the hallway in the Math and Science building on campus just after midnight on May 5th, say UCF police. That’s around the same time when an auto email was sent to the professor of the class, thanking him for approving his grade roster. However, Ammar’s professor, Chung Young Chan, had finished his grading earlier in the day and had already received a thank you email.

Google to offer $200,000 for reporting bugs in Android

Google will pay hackers $200000 for finding bug in Android The company has since a long time, had a bounty program wherein every individual that reports a zero day bug ( bug not previously known ) would get a monetary reward for their efforts. After the recent Judy & Fireball malware however, Google has upped the reward many times over. Better safe than sorry The upgrade in the bounty program should not come as a surprise to those aware of the recent malware attacks. Its been days since news of the  Judy malware attack  broke. For those unfamiliar with it, the attack consisted of a number of apps that existed on the Play Store which would install adware onto their user’s devices. There were reports that over 40 apps were infected with this malware – one that managed to get past Google’s malware filters and although Google did remove these apps from their Play Store, it is being reported that those 40 apps were cumulatively downloaded over 40 million times. With this in mi

Common I.T Terms have Meanings

•VIRUS - Vital InformationReso urce UnderSeized. •3G -3rd Generation. •GSM - Global System forMobile Communication. •CDMA - Code DivisonMultiple  Access. • UMTS - UniversalMobile Telec­ommunicat ionSystem. • SIM - Subscriber IdentityModule .  •AVI = Audio Video Interleave •RTS = Real Time Streaming • SIS = Symbian OS InstallerFile • AMR = Adaptive Multi-RateCodec • JAD = Java ApplicationDesc ripto­r •JAR = Java Archive • 3GPP = 3rd GenerationPartn ershi­p Project • 3GP = 3rd Generation Project • MP3 = MPEG player lll • MP4 = MPEG-4 video file • AAC = Advanced Audio Coding • GIF= Graphic Interchangeable Forma­t • JPEG = Joint PhotographicExp ert Group • BMP = Bitmap • SWF = Shock Wave Flash • WMV = Windows MediaVideo • WMA = Windows MediaAudio • WAV = Waveform Audio • PNG = Portable NetworkGraphics • DOC = Document(Micros oftCo­rporation ) • PDF = Portable DocumentFormat • M3G = Mobile 3D Graphics • M4A = MPEG-4 Audio File • NTH = Nokia Theme (series40) • THM = Themes (SonyEricsson