Showing posts with label Password Hacking. Show all posts
Showing posts with label Password Hacking. Show all posts

Cookies Checker Program V6.2.4-FileFactory added

Cookies Checker Program V6.2.4-FileFactory added (update 9/1/2012) this program will help you to check cookies of all sitesHow to use The Program Supported sites Download Link //default banner house ad url clicksor_default_url = ''; clicksor_banner_border = '#A0D000'; clicksor_banner_ad_bg = '#FFFFFF'; clicksor_banner_link_color = '#000000'; clicksor_banner_text_color = '#666666'; clicksor_banner_image_banner = true; clicksor_banner_text_banner = true; clicksor_layer_border_color = '#A0D000'; clicksor_layer_ad_bg = '#FFFFFF'; clicksor_layer_ad_link_color...

Microsoft Office Hacks

This article is just to make u aware of knowm existing threats only for educational purpose. I have stumbled onto a couple potential security issue in Microsoft Word blogs i would like to share. In both cases the adversary (mis)uses fields to perpetrate the attack. It's important to note that fields are not macros and, as far as I know, cannot be disabled by the user. I am providing a basic description along with a proof-of-concept demo. I am fairly certain that someone with free time and imagination can expand on these principles, possibly applying them to other products.Following tradition I'll use Hacker...

Password cracking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Most passwords can be cracked by using following techniques 1) Hashing :-  Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password. If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords. One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length. LM hash breaks the password into two 7-character fields which are then hashed separately,...
 

Backlinks

Followers

Visitors stats

Support : Softwares And Tips | Best PTC Sites | Free Premium Accounts
Copyright © 2013. Softwares And Tips - All Rights Reserved
Template Modify by Best PTC Sites
Proudly powered by Blogger