Find If A Website Is safe To Open or not using Online sites and Tools

In last post, we explained how to check if the site is safe or not using the McAfee Advisor.  Now i am going to introduce some other sites and tools for testing the site is safe to open or not. Websites To check sites: Norton Safeweb:Norton Safeweb is free online application provided by Norton Security. […]

How to check if a website is safe to use or not? | McAfee SiteAdvisor

Cyber world is most risky world.  Here you may not know you are being attacked until your system completely destroyed or your data stolen. if you trust whatever you website you see in Internet, then your data and system are in risk.  Website can spread malwares , this malware can infect your system without your […]

Could Your Bad Password Habits Come Back To Haunt You?

According to Business Insider, the CEO of a major social network used its trusted database of user passwords in order to hack into one of its user’s email accounts. The hack was based on the guess that this user probably accessed all of their accounts using the same password. Although the cloud has provided us […]

How to recover a Hacked or Compromised Gmail Account?~Security Tips

Now a days, hacking gmail account is increasing.  Most of people doesn’t know how to be secure(because they doesn’t visit BreakTheSecurity).  So please refer our website to your friends as Security tips Blog. Ok let me come to the point.  In this article, i will explain how to recover your hacked or compromised gmail accounts. […]

Bikini-clad women and photo tags | Facebook scammers

I have explained about Facebook scamming in my previous posts.  Still people believe that “Facebook will provide Facebook visitors tracker”.  If you believe also, please read this article.  This is not only for Facebook users but also for twitter users. A new Facebook is spreading over the Facebook.  Attacker tag your name in some hot women photos, it will probably displayed in your notifications. You […]

How to Re-Enable Task Manager,System Restore,cmd,run,Registry? Fixed

Hi friends, today i faced a problem.  A virus attacked my XP. I was unable to use Task Manager, System Restore,cmd,run,Registry. This malware disabled important windows features(task manager, system restore,…….) Whenever i try to open the Task Manager, it pop this error message as ” Task Manager is Disabled by Administrator. Contact admin” . When […]

How does your Website becomes vulnerable to SQL Injection?

Developer is the one and only reason for the SQL Injection Vulnerability. While developing the Web Application, he fails to handle some vulnerability(because he doesn’t know about it. Don’t be one of them. If you are Web Application developer, then you must read these security techniquest in order to overcome the SQL Injection Vulnerability. Reason […]

A Guide to Online Anonymity – How can i be completely untraceable ?

Definition:The act of keeping your identity hidden online by using connection methods and encryption methods, to make yourself untraceable to a person, website, company, school or whatever else you are doing/connecting to. Uses of Anonymity: Stay hidden when attacking a website or scanning it for vulnerabilities. Keep your browsing history/activity hidden when at work, school, […]

How to Setup your own Proxy Server For Free using Hamachi and Privoxy?

Read this post to know  What is proxy server? Why should i use Proxy server? Open Wi-Fi Connections:It is possible for anyone to monitor everything you do on an Open Wi-Fi Network. Not all sites that you visit may use HTTPS Encryption. Sometimes even sites that do use HTTPS only do so for certain actions […]