What is Superfish? Superfish is a piece of software that Lenovo has admitted to pre-installing on many of its laptops to "enhance the shopping experience" of its users. However, the U.S. Computer Eme…
Heartbleed bug: What you need to know
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS e…
3 way to crack facebook password

Method 1: Reset the Password The easiest way to “hack” into someone’s Facebook is through resetting the password. This could be easier done by people who are friends with the person they’re trying …
How to detect operating system using user agent

In computing, a user agent is software (a software agent) that is acting on behalf of a user. For example, an email reader is a mail user agent, and in the Session Initiation Protocol (SIP), the term …
How your Browser Speeds up Cross Domain Loading using DNS Prefetching

How it Works What DNS prefetching does is attempt to resolve domain names before we, the users, try to follow a link. This is accomplished using the computer's built-in DNS resolution mechanism. O…
Wireless Threats: Is Your Broadband Secure Enough?

Internet use in Malaysia is at an all-time high and is still growing, and broadband adoption is rapidly spreading along with mobile connectivity. In this environment of increasing digital interconnec…
Simple step to use php.ini using htaccess

If you use linux hosting such as cpanel, you really are not able to update your php.ini settings. This is the best way to use your own php.ini in your hosting. But make sure it not read by public and …
SQL Injection-how about your site ?

Many web developers are unaware of how SQL queries can be tampered with, and assume that an SQL query is a trusted command. It means that SQL queries are able to circumvent access controls, thereby b…
New Standard Pushes for a More Secure Web

There is no silver bullet when it comes to encryption. Even the most complex, invulnerable encryption today could be child’s play in the future. The NIST (National Institute of Standards and Technolog…
Defcon Wi-Fi Hack Called No Threat to Enterprise WLANs

Enterprise Wi-Fi networks can keep using WPA2 security safely, despite a recent Defcon exploit that has been widely, but wrongly, interpreted as rendering it useless. The exploit successfully compromi…
Is your website safe enough ?

When i wake up this morning and see statistic of my site and my blog i get many bad bot and spam that want try to access to my domain. it is nothing strange for me. as I tried to fight bad bots, suspi…
Hotlink Protection
Hotlink protection prevents other websites from directly linking to files on your website. Other sites will still be able to link to any file type that you don't specify (i.e., HTML files). An example…
Remove bad word from your site

Sometime when we need to block bad word or filthy words we need to install plugin, module and etc. Or sometime we spent money to block all bad word. from what I know most of the bad word comes from ba…
Login facebook on share computer

First thing need to know, DONT TRUST ANYONE. Even your girlfriend. heheh..When we submit or sign any forms such as login form in the browser we will leave autocomplete on each form. This means that em…
XSS Protection

What is XSS protection ? XSS mean Cross-site scripting is a type of computer security vulnerability typically found in Web applications. Due to breaches of browser security, XSS enables attackers to i…
Recent Comments
-
fyna
subhanallah...
Subhanallah! Gambar Cicit Rasulullah Yang Comel | Ezad Blog · 11 years ago
-
Princess Nabella
ye la 2..
-
Mohd Nor Rizad
blog reader la...
-
Princess Nabella
DONT TRUST ANYONE. Even your girlfriend..hurmm..