Hakerzy znaleźli luki, PornHub wypłacił nagrodę Dwa miesiące temu znany serwis pornograficzny uruchomił swój program BugBounty, aby zachęcić hakerów i łowców nagród oraz specjalistów od rozwiązywania zagadek CTF. Ich celem na być znajdowanie podatności na popularnej platformie, a następnie go zgłosić osobom odpowiedzialnym za... glabek z silenceonthewire.pl dodany: 25.07.2016, 10:38:48 Dodaj Komentarz # hackingnews# zainteresowania# ciekawostki# technologia# informatyka# php
Cross-site Scripting Tutorial Especially for our readers we prepared XSS exploit. glabek z silenceonthewire.com dodany: 29.02.2016, 10:13:26 Dodaj Komentarz # php# webdev# programowanie# javascript# html# js
Remote command injection exploitation with Commix Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. glabek z silenceonthewire.com dodany: 28.02.2016, 12:30:00 Dodaj Komentarz # hacking# security# php# bezpieczenstwo# programowanie# webdev
US citizens want to be safe, but don’t do much about it As the research conducted by Morar Consulting and VPN provider Hide My Ass! showed, Americans are educated about the cybersecurity threats, but don’t do much to protect themselves. glabek z goo.gl dodany: 27.02.2016, 10:44:46 Dodaj Komentarz # informatyka# komputery# ekonomia# internet# it# technologia
US citizens want to be safe, but don’t do much about it As the research conducted by Morar Consulting and VPN provider Hide My Ass! showed, Americans are educated about the cybersecurity threats, but don’t do much to protect themselves. glabek z silenceonthewire.com dodany: 27.02.2016, 10:37:21 Dodaj Komentarz # swiat# usa# informatyka# internet# komputery# ciekawostki
Nissan Leaf cars hacked Troy Hunt, security researcher, reported that Nissan Leaf cars can be easily hacked to take control over air conditioning, heating and spying last journeys. glabek z silenceonthewire.com dodany: 27.02.2016, 10:29:03 Dodaj Komentarz # zainteresowania# motoryzacja# samochody# informatyka# hacking# bezpieczenstwo
Operation Dust Storm infiltrates Japan The hackers standing behind so called Operation Dust Storm managed to espionage on Japanese critical industries like power, construction, finance and transportation. glabek z tinyurl.com dodany: 25.02.2016, 10:03:49 1 # swiat# japonia# bezpieczenstwo# security# niebezpiecznik# hacking
Data of 10 000 Twitter users exposed Last week Twitter reveal that because of the bug in password recovery system data of 10 000 users might have been compromised. glabek z goo.gl dodany: 25.02.2016, 09:41:59 Dodaj Komentarz # zainteresowania# twitter# hacking# security# socialmedia# bezpieczenstwo
App downtime in Brazil is worth 18 million USD a year According to the survey by Veeam, Brazilian companies are losing 18 million USD a year because of the application downtime. glabek z silenceonthewire.com dodany: 25.02.2016, 09:34:11 Dodaj Komentarz # ekonomia# swiat# gospodarka# pieniadze# finanse# ciekawostki
WordPress security holes – online training Everyone who ever wanted to run his own website, blog, discussion forum or any other serious project on the internet, needed to ask themselves a fundamental question – which one of the popular content management systems I should use? glabek z tiny.pl dodany: 24.02.2016, 16:36:10 1 # wordpress# cms# php# webdev# programowanie# naukaprogramowania
Banking Botnets We are living in the intriguing times. All main banking Trojans are developing their capabilities and appearing in the other industries, quite different from banking, like financial statements, new research programs and others. glabek z silenceonthewire.com dodany: 24.02.2016, 10:30:02 Dodaj Komentarz # hacking# bezpieczenstwo# security# informatyka# banki# internet
CareerCon Katowice Silence does not like to sit and wait so that here's another event we will attend. glabek z goo.gl dodany: 24.02.2016, 08:36:38 Dodaj Komentarz # praca# programowanie# informatyka# it# internet# komputery
Linux Mint ISO image Replaced by Hackers Most of the CMS systems based on the open source license is full of vulnerabilities. For this reason we should create our own solutions, if we only have sufficient financial sources. glabek z silenceonthewire.com dodany: 24.02.2016, 08:29:30 Dodaj Komentarz # hacking# bezpieczenstwo# security# informatyka# internet# it
Attacks AdMedia infect pages based on Joomla Organization of using CMS Joomla, must be aware of the situation in which there is a significant increase in the infected page ransomware and threatened attacks AdMedia. glabek z silenceonthewire.com dodany: 23.02.2016, 10:20:14 Dodaj Komentarz # joomla# wordpress# hacking# php# webdev# webdesign
Silence Lesson 10: Lifehacking New presentation enriching our base. glabek z tinyurl.com dodany: 23.02.2016, 09:32:07 Dodaj Komentarz # zainteresowania# swiat# ciekawostki# rozrywka# technologia# heheszki
New Layout As you might noticed already yesterday, the website got new look! glabek z goo.gl dodany: 23.02.2016, 08:47:15 Dodaj Komentarz # webdev# java# programowanie# informatyka# internet# technologia
SilneceOntheWire.com SaasCRM Last months the whole world is using Saas solutions, which are continuously evolving an... glabek z livecoding.tv dodany: 22.02.2016, 21:11:32 Dodaj Komentarz # webdev# java# programowanie# intellij# webdesign# frontend
Silence Video: Test Driven Development New video tutorial from Silence. glabek z silenceonthewire.com dodany: 22.02.2016, 16:04:47 Dodaj Komentarz # programowanie# java# webdev# webdesign# informatyka# naukaprogramowania
Silence Lesson 9: 7 ways to be invisible on the web New presentation from Silence: 7 ways to stay invisible on the web. glabek z silenceonthewire.com dodany: 22.02.2016, 09:37:34 Dodaj Komentarz # informatyka# hacking# internet# bezpieczenstwo# security# ciekawostki
Welcome to HackSilesia This weekend you can find us at HackSilesia in Katowice. glabek z silenceonthewire.com dodany: 18.02.2016, 08:44:45 Dodaj Komentarz # polska# informatyka# komputery# programowanie# naukaprogramowania# internet