Archive by Author

Tutorial – How Google works

The following video tutorials are talking about how google discovers, crawls, indexes your site’s page and how are displayed in the search results. Discoverability: Crawling and Indexing: Ranking – Relevance and importance: Google resources for webmasters: Other resources:

Secure Coding And Cocktail Parties.

I am going to be very clear about his today. In the past I posted vulnerabilities in many websites including websites from companies who say they secure web applications, or store web application vulnerabilities and even those who give out … Continue reading

The RPC Worm Victim List.

An RPC worm is currently active and running based upon NamedPipes abuse as seen in the advisory from Microsoft. It's extremely important to patch any Windows machine you have under your control, because when RPC and NamedPipes are enabled you … Continue reading

Opera Arioso Update.

I've made some updates on my Opera plugin to block and protect more attacks against Opera. Luckily there aren't that many attacks in comparison to other browsers, nonetheless I like to notice what happens on webpages I visit. The minor … Continue reading

Disable RPC.

There is some fuss about RPC on Windows platforms.[1] As usual, I recommend to disable RPC temporarily from starting up when Windows boots. RPC is nasty and yet again a severe flaw has been found that attackers can abuse to … Continue reading

New and old DDOS Tools

For sure this list is not intended to newbies that want to start a DDOS attack. This list is to inform the readers of what tools new and old the hackers use for their denial-of-service attacks. It’s interesting to see … Continue reading

Phishing With Google.

I really feel Google should know better than this. Check out this form residing on the Google domain[1]. It allows phishers to utilize the Google e-mail interface to phish Google customers in a very simple way. Let's say we set … Continue reading