Learn Web Application Exploits and Defenses for free~Penetration Testing

Are you willing to Learn Web Application Exploitation and Defense against that? Here is the chance for you.   Google Labs provides a Lab to learn Web Application for free of cost.Penetration Testing : Learn how hackers find security vulnerabilities! Learn how hackers exploit web applications! Learn how to stop them!  This code lab shows how […]

REMnux: A Linux Distribution for Reverse-Engineering Malware

REMnux is a lightweight Linux distribution for assisting malware analysts in reverse-engineering malicious software. The distribution is based on Ubuntu and is maintained by Lenny Zeltser. About REMnuxREMnux is designed for running services that are useful to emulate within an isolated laboratory environment when performing behavioral malware analysis. As part of this process, the analyst […]

How to recover a Hacked or Compromised Gmail Account?~Security Tips

Now a days, hacking gmail account is increasing.  Most of people doesn’t know how to be secure(because they doesn’t visit BreakTheSecurity).  So please refer our website to your friends as Security tips Blog. Ok let me come to the point.  In this article, i will explain how to recover your hacked or compromised gmail accounts. […]

Bikini-clad women and photo tags | Facebook scammers

I have explained about Facebook scamming in my previous posts.  Still people believe that “Facebook will provide Facebook visitors tracker”.  If you believe also, please read this article.  This is not only for Facebook users but also for twitter users. A new Facebook is spreading over the Facebook.  Attacker tag your name in some hot women photos, it will probably displayed in your notifications. You […]

FireCAT 2.0 Released-Firefox Catalog of Auditing exTensions

What is FireCAT?FireCAT (Firefox Catalog of Auditing exTensions) is a mindmap collection of the most efficient and useful Firefox extensions oriented application security auditing and assessment. FireCAT is not a replacement of other security utilities and software as well as fuzzers, proxies and application vulnerabilities scanners. FireCAT features: Information Gathering Proxies & Web Utilities Editors […]

How to Re-Enable Task Manager,System Restore,cmd,run,Registry? Fixed

Hi friends, today i faced a problem.  A virus attacked my XP. I was unable to use Task Manager, System Restore,cmd,run,Registry. This malware disabled important windows features(task manager, system restore,…….) Whenever i try to open the Task Manager, it pop this error message as ” Task Manager is Disabled by Administrator. Contact admin” . When […]

How does your Website becomes vulnerable to SQL Injection?

Developer is the one and only reason for the SQL Injection Vulnerability. While developing the Web Application, he fails to handle some vulnerability(because he doesn’t know about it. Don’t be one of them. If you are Web Application developer, then you must read these security techniquest in order to overcome the SQL Injection Vulnerability. Reason […]