DDoS (Distributed Denial of Service) is a type of attacks to interrupt the continuous healthy response of a server, it's considered one of...
Security Articles
You got “email hacked” message? Here is what you need to do
Almost Daily, we get mails from our readers reporting that their mails got hacked. After getting a copy of these mails, we found out that...
Important commands to rescue hacked servers.
This post will you a boost in tracing the trails of your server intruder. You can use this post as a reference for your periodic server...
White Hat Hacking : Apple open redirect vulnerability
What is Open Redirect vulnerability? Open redirect vulnerabilities allow the attacker to use a well known website name to redirect the...
White Hat Hacking – RedHat Cross Site Scripting ( XSS )
White Hat Hacking - Redhat cross site scripting ( XSS ) Using an ordinary Cross site scripting payload, The vulnerability could NOT be...
Everything is vulnerable II : Internet wars
Q1. Why was this post written ? This post is highly recommended for all web surfers regardless of their interests; from online shoppers to...
Everything is vulnerable I : What are Malwares, viruses, exploits, trojans, hacks and cracks ?
Q1. Why was this post written? To define Malwares and demonstrate the differences between Viruses, Trojans and Spams. Also, We will talk a...
Everything is vulnerable : Introduction
“Everything is vulnerable” is a series of posts about computer vulnerabilities, malwares, hacking and security. There is one fact to...
White Hat Hacking : Microsoft XSS & malicious payloads
This vulnerability allows sending malicious files to a 3rd party using Microsoft AFKAR ( Arabic word for ideas ) service.. Proof of...