Good afternoon comrades all, meet again with me, tine AKA anggamovic who will discuss how to create a wordpress theme for all BinusHacker friend
PART 1 As I promised in yesterday's article http://www.binushacker.net/membuat-toggle-sederhana-css-dan-jquery.html , well now we continue the discussion about web design, the discussion which now will I lift the Making wordpress theme step by step ... This is PART 1
Because the components of the bejibun ...
Friday, August 12, 2011
Process Hacker Tools
Process Hacker is software that is packed with features to manipulate the process and service on a computer. Process Hacker is a free opensource and is used to display dikomputer existing processes and memory editor with unique features such as the following explanation:
Processes View processes in a tree view with highlighting
View detailed process performance statistics and graphs
Process tooltips are detailed and show the context-specific ...
Hacker Tools: Zed Attack Proxy
Attack Zed Proxy (ZAP) is a tool integrated penetration testing to find vulnerabilities in web applications.
It is designed for use by people with a variety of security experience and thus is ideal for developers and new pentester to conduct pentest .
ZAP provides automated scanners and a set of tools that allow to discover security vulnerabilities website manually.
Features that exist in ZAP:
Intercepting Proxy
Automated scanners
Passive ...
Sunday, August 7, 2011
SQL Ninja Hacker Tools
SQL Ninja is a tool that is used for SQL Injection and the tools to megambil over the database. In essence SQL Ninja is a tool targeted to exploit the weaknesses of SQL Injection in a web application that uses Microsoft SQL Server as its back end as well as some others.
SQL Ninja main goal is to provide remote access to the database server that has a vulnerability, even in an environment that is very secure though. It could also be used by penetration testers to help and automate the process of taking over the DB Server when a SQL Injection vulnerability has been discovered .
Features ...
Types of Hash & Encryption

Lunch buddy here is my first post so please be advised if BinusHacker his writings ugly and hard to understand.
Maybe friends - friends who had the good sql injection must have difficulty in recognizing the type of hash-been discovered when doing sql injection. Hash closely related to encryption. So what does the hash itself? Hash is the result of a password or encryption of information deemed important. While Encryption is the process of ...
Subscribe to:
Posts (Atom)