How To Crack A WPA Key With Aircrack-ng

How To Crack A WPA Key With Aircrack-ng

With the increase in popularity of wireless networks and mobile computing, an overall understanding of common security issues has become not only relevant, but very necessary for both home users and IT professionals alike.
Java Hits Another Roadblock - Found To Be A Threat For Browsers

Java Hits Another Roadblock - Found To Be A Threat For Browsers

Java has been the most talked about application in the past couple of months. Not because of its functionality but due to its inability to refrain from being attacked and exploited. Oracle has released
The LightBox Image Display Option Stopped Working, Recently

The LightBox Image Display Option Stopped Working, Recently

Last week, the popular display option, Lightbox, used for showing full size images in Blogger blogs, stopped working. Anxious blog owners reported that full size images are now being displayed in a normal browser
When You Setup A Custom Domain, Please Know And Observe Your Limits Of Expertise

When You Setup A Custom Domain, Please Know And Observe Your Limits Of Expertise

Too many blog owners, when they setup a custom domain for their blog, do not consider the details. We see signs of the problem, too often, in Blogger Help Forum: Something Is Broken.Can someone
If You Comment On Blogs Extensively, You Should Consider Using Google 2-Step Verification

If You Comment On Blogs Extensively, You Should Consider Using Google 2-Step Verification

One recently identified cause of deleted Blogger blogs appears to involve brute force hacking against our Blogger / Google accounts. We've known, for some time, about blog owners receiving alerts about "suspicious" / "unusual"
Stats Displays Pageviews - Not Unique Visitors

Stats Displays Pageviews - Not Unique Visitors

Too many blog owners do not understand the unique capability of Stats - nor do they understand its limitations. We see the periodic question in Blogger Help Forum: How Do I?.How do I find
If You Use CAPTCHA Screening On Your Blog, Try Publishing A Comment, As A Guest

If You Use CAPTCHA Screening On Your Blog, Try Publishing A Comment, As A Guest

Not all Blogger blog owners, using CAPTCHA screening to reduce abusive comments on their blogs, know first hand what the typical CAPTCHA puzzle can be like. We're seeing a few concerned blog owners, in
Renaming Your Blog Requires Choosing An Available Blog Name

Renaming Your Blog Requires Choosing An Available Blog Name

Like creating a blog, the task of renaming your blog involves one very important step - choosing an available blog name. When you rename your blog - as in change the blog address -
Is MPLS Network Really Secure? MPLS truth revealed against security.

Is MPLS Network Really Secure? MPLS truth revealed against security.

Is MPLS Network Really Secure? MPLS truth revealed against security. There is a common misconception that MPLS provides some level of security. The truth is that MPLS offers- • No protection against misconfiguration -
Why You Need to Measure Delay, Jitter and Packet Loss on Data Networks

Why You Need to Measure Delay, Jitter and Packet Loss on Data Networks

Why You Need to Measure Delay, Jitter and Packet Loss on Data Networks With the emergence of new applications such as voice and video on data networks, it is becoming increasingly important for network
DOM Based XSS In Microsoft

DOM Based XSS In Microsoft

           Lately, i have been researching on DOM based XSS a bit, In my previous post i talked about the DOM based XSS i found inside AVG, DOM based XSS
How Attackers Spread Malware With Java Drive by?

How Attackers Spread Malware With Java Drive by?

Hello RHA fans,We are back with a new tutorial. Well making a malicious virus is one thing but how to spread it? Or how hackers hunt for victims? Well you will definitely be disappointed
Interview questions for fresher network engineer: Tips and Tricks for CCNA, CCNP, OSPF, BGP, MPLS-VPN | Ask all your queries online absolutely free

Interview questions for fresher network engineer: Tips and Tricks for CCNA, CCNP, OSPF, BGP, MPLS-VPN | Ask all your queries online absolutely free

This is guest post from Mr.Shivlu Jain. He is running a blog related to MPLS VPN If you have any concerns or any question related with any protocol or networking technology, you can visit
Blogger Blogs Displaying Mysterious "SECURITY WARNING" Popup Boxes

Blogger Blogs Displaying Mysterious "SECURITY WARNING" Popup Boxes

This week, we're seeing a few concerned blog owners, in Blogger Help Forum: Something Is Broken, asking about a mysterious SECURITY WARNING popup box, on their blogs. Like the earlier concern about the transparent
Recovering A Deleted Page Or Post, Chapter 2

Recovering A Deleted Page Or Post, Chapter 2

Blog owners have been deleting their pages and posts, then changing their minds later, since Blogger started providing the ability to delete pages and posts. We've been advising anxious blog owners, for some time,
Confusion About Advice "If you bought your domain name from Blogger, you won't need to create a CNAME record."

Confusion About Advice "If you bought your domain name from Blogger, you won't need to create a CNAME record."

To Blogger blog owners who want their new non BlogSpot URLs to display their blogs, this conflicting bit of advice provides only confusion and doubt.If you bought your domain name from Blogger, you won't
Cisco ZeroClipboard Swf File XSS

Cisco ZeroClipboard Swf File XSS

The security of  the target website depends upon the number of vectors an attacker knows, The more vectors an attacker knows the more chances he would have for compromising your website. One of the
Vulnerability Discovered In iPhone - Poses Serious Threat To Users

Vulnerability Discovered In iPhone - Poses Serious Threat To Users

Another vulnerability has been discovered on iPhone that could allow hackers to remotely control it. Skycure, an Israeli company, states it to be a major flaw in iOS configuration which could post a malware
Accounts Locked For Unusual Account Activity

Accounts Locked For Unusual Account Activity

One of the more intriguing tales of Blogger blogs, currently being explored, involves blogs mysteriously deleted by Blogger.My blog just disappeared from my dashboard - and no, it's not listed under "Deleted blogs"!In some
600% Increase In Cyber Attacks: WebSense Releases Threat Report 2013

600% Increase In Cyber Attacks: WebSense Releases Threat Report 2013

One thing I love more than writing is online threat reports - all the blood, sweat and tears combined with the satisfaction of discovery and elimination of the threat. Ahh! The moment you come

Contact Us

24x7 online , we happy to answer you
tamilcypc@gmail.com

Disclaimer

This Blog and its TUT's are intended for educational purposes only, no-one involved in the creation of this TuT may be held responsible for any illegal acts brought about by this Blog or TuT.



Featured Post

Custom Domains And HTTPS Redirection Code