Slorunner.eu

Just another coding blog

Password secrets: Your Passwords Arenโ€™t As Secure As You Think

There is one thing that make us so vulnerable is ignorance. Today, everything is going to be depended on the internet. Yes, and you know it better! and a concept that we use to secure our internet accounts and all is our passwords. but is it enough to set password and feel that we are secure? Are you really aware about of how to use passwords?

(more…)

 
3 Kudos
You are
awsome ๐Ÿ™‚

Monitoring Linux Systems For Rootkits

Rootkits are considered to be one of the most tricky pieces of malware. Usually they are loaded onto the system by exploiting weaknesses in software. Next phase is being installed and hide as good as possible, to prevent detection. We have a look at a few security measures you can take to prevent this kind of threat.

System Protection

Kernel

The kernel is the brain of the software system and decides what should be executed by the central processing unit. Any โ€œdamageโ€ to this system decreases the integrity of the system and your data. So protecting the kernel against unauthorized modifications is an important step in keeping system secure.

(more…)

 
3 Kudos
You are
awsome ๐Ÿ™‚

11 Software And Utilities For Securing Your Network

11 Software And Utilities For Securing Your Network

Security tools are useful for both newbies and professionals. At a time when even your government is spying on your data, what tools are you using?

Security is one of the buzzwords on the internet nowadays. When we talk about security, two things come to mind โ€” hackers and security software. Utilities and software related to security is especially useful as they make it easy for even less savvy users to improve their security arrangements. Here are 11 of these security software and utilities that you can use in order to improve your system’s protection against attackers.

 

Tools, Hacking, Security, Protection, Email, Privacy, Object, Detecting, Web, Damage, network security, security software, security utilities, hackers, folder locker, ippl, ZoneAlarm Pro

(more…)

 
3 Kudos
You are
awsome ๐Ÿ™‚

XSSYA – Cross Site Scripting Scanner & Vulnerability Confirmation

Cross-Site-Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.
 
3 Kudos
You are
awsome ๐Ÿ™‚

Most Famous Hackers of all Time

The hacking now a days became a very cool career in the eyes of the young generation. With the biggest companies like Sony, JP Morgan, Yahoo, CNN. NewYork Times, Ebay all hacked in the past even with their millions of dollars investment on securing their Websites. The Hackers in the peoples eyes are the most coolest persons on the planet.

(more…)

 
3 Kudos
You are
awsome ๐Ÿ™‚

How to Evade getting Hacked during Online Shopping

Avoiding long lines and cranky crowds are just two of the benefits of online shopping. But getting hacked while buying a toy playset from the hit movie “Frozen” through an online seller is a real shopping risk, too.

(more…)

 
2 Kudos
You are
awsome ๐Ÿ™‚

Hire best Hackers for your Hacking Work

Hire Hackers for your Hacking Work, New Website Lets You Hire a Hacker in Minutes, how to hack, hire a hackers, hire best hackers, hackers from all over the world, best hackers, hacking group

If you are looking to hack someone’s computers or online accounts but you don’t have the hacking skills then don’t worry. Here Hacker’s List is for you to solve ย your problem. Hackers List provides a space to hire a hackers with your need, who is ready to undertake your computer crimes for you.
(more…)

 
4 Kudos
You are
awsome ๐Ÿ™‚