How to remove Superfish and its certificate from your Lenovo® PC

What is Superfish? Superfish is a piece of software that Lenovo has admitted to pre-installing on many of its laptops to "enhance the shopping experience" of its users. However, the U.S. Computer Eme…

Read more »
28 Mar 2015

Heartbleed bug: What you need to know

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS e…

Read more »
14 Apr 2014

3 way to crack facebook password3 way to crack facebook password

Method 1: Reset the Password The easiest way to “hack” into someone’s Facebook is through resetting the password. This could be easier done by people who are friends with the person they’re trying …

Read more »
17 Feb 2014

How to detect operating system using user agentHow to detect operating system using user agent

In computing, a user agent is software (a software agent) that is acting on behalf of a user. For example, an email reader is a mail user agent, and in the Session Initiation Protocol (SIP), the term …

Read more »
11 Dec 2013

How your Browser Speeds up Cross Domain Loading using DNS PrefetchingHow your Browser Speeds up Cross Domain Loading using DNS Prefetching

How it Works What DNS prefetching does is attempt to resolve domain names before we, the users, try to follow a link. This is accomplished using the computer's built-in DNS resolution mechanism. O…

Read more »
26 Nov 2013

Wireless Threats: Is Your Broadband Secure Enough?Wireless Threats: Is Your Broadband Secure Enough?

Internet use in Malaysia is at an all-time high and is still growing, and broadband adoption is rapidly spreading along with mobile connectivity. In this environment of increasing digital interconnec…

Read more »
17 Nov 2013

Simple step to use php.ini using htaccessSimple step to use php.ini using htaccess

If you use linux hosting such as cpanel, you really are not able to update your php.ini settings. This is the best way to use your own php.ini in your hosting. But make sure it not read by public and …

Read more »
16 Nov 2013

SQL Injection-how about your site ?SQL Injection-how about your site ?

Many web developers are unaware of how SQL queries can be tampered with, and assume that an SQL query is a trusted command. It means that SQL queries are able to circumvent access controls, thereby b…

Read more »
23 Jun 2013

New Standard Pushes for a More Secure WebNew Standard Pushes for a More Secure Web

There is no silver bullet when it comes to encryption. Even the most complex, invulnerable encryption today could be child’s play in the future. The NIST (National Institute of Standards and Technolog…

Read more »
20 Jun 2013

Defcon Wi-Fi Hack Called No Threat to Enterprise WLANsDefcon Wi-Fi Hack Called No Threat to Enterprise WLANs

Enterprise Wi-Fi networks can keep using WPA2 security safely, despite a recent Defcon exploit that has been widely, but wrongly, interpreted as rendering it useless. The exploit successfully compromi…

Read more »
15 Jun 2013

Is your website safe enough ?Is your website safe enough ?

When i wake up this morning and see statistic of my site and my blog i get many bad bot and spam that want try to access to my domain. it is nothing strange for me. as I tried to fight bad bots, suspi…

Read more »
04 May 2013

Hotlink ProtectionHotlink Protection

Hotlink protection prevents other websites from directly linking to files on your website. Other sites will still be able to link to any file type that you don't specify (i.e., HTML files). An example…

Read more »
28 Apr 2013

Remove bad word from your siteRemove bad word from your site

Sometime when we need to block bad word or filthy words we need to install plugin, module and etc. Or sometime we spent money to block all bad word. from what I know most of the bad word comes from ba…

Read more »
29 Mar 2013

Login facebook on share computerLogin facebook on share computer

First thing need to know, DONT TRUST ANYONE. Even your girlfriend. heheh..When we submit or sign any forms such as login form in the browser we will leave autocomplete on each form. This means that em…

Read more »
03 Mar 2013

XSS ProtectionXSS Protection

What is XSS protection ? XSS mean Cross-site scripting is a type of computer security vulnerability typically found in Web applications. Due to breaches of browser security, XSS enables attackers to i…

Read more »
01 Mar 2013

Recent Comments

 
Top