Free Hacking News Letter

Posted: Friday, March 18, 2011 by Ashim Adhikari in
0

Free Hacking News Letter

Link to Learn Ethical Hacking Download Free Hacking Tools Learn Hacking and Join Indian Cyber Army

Cookies are bad for privacy - Is that true?

Posted: 18 Mar 2011 12:33 AM PDT

This is a myth - cookies are a friendly internet tool primarily used by the advertising and e-commerce industry to make surfing easier and quicker. They have several roles, none of which can compromise your privacy:Protection - to ensure you are a genuine visitor and not someone else using your password.Authenticate and speed up your identification and e-commerce transactions.Recognise preferences e.g. remember user names and passwords for websites.Cap the frequency of ad serving and to make...

Do you want to read more..Visit my site @ http://www.amarjit.info

What are Web Beacons OR Web Bugs?

Posted: 18 Mar 2011 12:33 AM PDT

Web beacons, also called web bugs and clear GIFs are used in combination with cookies to help people running websites to understand the behaviour of their customers. A web beacon is typically a transparent graphic image (usually 1 pixel x 1 pixel) that is placed on a site or in an email. The use of a web beacon allows the site to record the simple actions of the user opening the page that contains the beacon. The beacon is one of the ingredients of the page, just like other images and text...

Do you want to read more..Visit my site @ http://www.amarjit.info

Learn How to collecting and analyzing cookies Using COOKIEDIGGER

Posted: 18 Mar 2011 02:35 AM PDT

CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications. The tool works by collecting and analyzing cookies issued by a web application for multiple users. The tool reports on the predictability and entropy of the cookie and whether critical information, such as user name and password, are included in the cookie values. DOWNLOAD HERE SOURCE: http://www.foundstone.com---Regards, Amarjit Singh

Do you want to read more..Visit my site @ http://www.amarjit.info

Download Free Internet Explorer Cookie Forensic Analysis Tool: GALLETA

Posted: 18 Mar 2011 12:32 AM PDT

Many important files within Microsoft Windows have structures that are undocumented. One of the principals of computer forensics is that all analysis methodologies must be well documented and repeatable, and they must have an acceptable margin of error. Currently, there are a lack of open source methods and tools that forensic analysts can rely upon to examine the data found in proprietary Microsoft files. Many computer crime investigations require the reconstruction of a subject's Internet...

Do you want to read more..Visit my site @ http://www.amarjit.info

What is Cookie ?

Posted: 18 Mar 2011 12:32 AM PDT

Persistent vs. Non-Persistent Persistent cookies are stored in a text file (cookies.txt under Netscape and multiple *.txt files for Internet Explorer) on the client and are valid for as long as the expiry date is set for (see below). Non-Persistent cookies are stored in RAM on the client and are destroyed when the browser is closed or the cookie is explicitly killed by a log-off script. Secure vs. Non-Secure Secure cookies can only be sent over HTTPS (SSL). Non-Secure cookies can be sent...

Do you want to read more..Visit my site @ http://www.amarjit.info

0 comments: