Friday, August 12, 2011

Learning to Create a WordPress Theme

0 komentar
Good afternoon comrades all, meet again with me, tine AKA anggamovic who will discuss how to create a wordpress theme for all BinusHacker friend PART 1 As I promised in yesterday's article http://www.binushacker.net/membuat-toggle-sederhana-css-dan-jquery.html , well now we continue the discussion about web design, the discussion which now will I lift the Making wordpress theme step by step ... This is PART 1 Because the components of the bejibun ...
Continue reading →

Process Hacker Tools

0 komentar
Process Hacker is software that is packed with features to manipulate the process and service on a computer. Process Hacker is a free opensource and is used to display dikomputer existing processes and memory editor with unique features such as the following explanation: Processes View processes in a tree view with highlighting View detailed process performance statistics and graphs Process tooltips are detailed and show the context-specific ...
Continue reading →

Hacker Tools: Zed Attack Proxy

0 komentar
Attack Zed Proxy (ZAP) is a tool integrated penetration testing to find vulnerabilities in web applications. It is designed for use by people with a variety of security experience and thus is ideal for developers and new pentester to conduct pentest . ZAP provides automated scanners and a set of tools that allow to discover security vulnerabilities website manually. Features that exist in ZAP: Intercepting Proxy Automated scanners Passive ...
Continue reading →
Sunday, August 7, 2011

SQL Ninja Hacker Tools

0 komentar
SQL Ninja is a tool that is used for SQL Injection and the tools to megambil over the database. In essence SQL Ninja is a tool targeted to exploit the weaknesses of SQL Injection in a web application that uses Microsoft SQL Server as its back end as well as some others. SQL Ninja main goal is to provide remote access to the database server that has a vulnerability, even in an environment that is very secure though. It could also be used by penetration testers to help and automate the process of taking over the DB Server when a SQL Injection vulnerability has been discovered . Features ...
Continue reading →

Types of Hash & Encryption

0 komentar
Lunch buddy here is my first post so please be advised if BinusHacker his writings ugly and hard to understand. Maybe friends - friends who had the good sql injection must have difficulty in recognizing the type of hash-been discovered when doing sql injection. Hash closely related to encryption. So what does the hash itself? Hash is the result of a password or encryption of information deemed important. While Encryption is the process of ...
Continue reading →