FN SECURE

Cyber Security

Call Us For Workshops Or Seminars.. In Your University, Colleges, or Schools.
Email Us At : vicky@globallyunique.in

Save as PDF

The Co-Founder of Pirate Bay "Gottfrid Svartholm Warg" (Anakata) was found Guilty in Denmark's Largest Hacking Case

The Pirate Bay The co-founder of The Pirate Bay torrent site Gottfrid Svartholm Warg and his 21-year-old Danish co-defendant have been found guilty by a Danish court of hacking into systems operated by American IT giant CSC and illegally downloading files. It was the biggest

Read more

Google Turns 14 Today :: Happy Birthday Google

Google turned 14 Thursday and celebrated its birthday with a doodle of a rich chocolate cake. Google was inscribed across the cake and seconds after opening the site, the 14 candles atop the delicacy get extinguished. A click on the doodle displayed a list of Google product

Read more

Private Messages leaked by Facebook in France

The French government has summoned Facebook Inc managers to appear before the country’s data watchdog to explain how some of its users came to believe their privacy had been infringed on the social network, it said in a statement early on Tuesda

Read more

Bharatiya Janata Party’s website Hacked by a group of Anonymous Hackers.

Hackers from Indian Anonymous Group hacked Bharatiya Janata Party’s website, BJP.org, last night, and defaced it. They post a set of messages with pictures, reflecting the group’s condemnation of recent events including the governmen

Read more

Top 10 Free Traffic Methods to gain on your Website

Top 10 Free Traffic Methods Report | SEO | Article Marketing  | Video Marketing    Social Networking | Forum Posting | Blog Commenting | Yahoo Answers   Create Backlinks | Traffic Exchanges | Social Bookmarking SEO – It stands for Search

Read more

Execute and Access .jpg Shell on a webiste, and keep maintaining access

First of all, After hacking a admin panel of a website, find a place to upload image. And there instead of image you can upload your .jpg shell. Sometimes .php files are not allowed or there are restrictions on uploading .php files, So inorder to upload and execute for shell you have to change the

Read more

How to upload PHP SHELL (script) on Wordpress Sites

Have You ever wondered how you can access to  some of your website browsers / visitors web data. You can gain access your admin panel of wordpress website via symlink. In this tutorial I will be telling you how to upload your shell after gaining the admin access.1. Login into the

Read more

List of all Google dorks to Find Insecure Website Admin Panels

Below, is a list of all the Google dorks which can be used to make a search for all insecure website admin login panel "inurl:admin/addproduct.asp""inurl:admin/user.asp""inurl:admin/addpage.php""inurl:admin/gallery.asp" "inurl:admin/image.asp""inurl:admin/adminuser.asp""inurl:admin/p

Read more

An Anonymous Hacker takes down Go Daddy [www.godaddy.com] with IRC Bots

GoDaddy.com, which hosts millions of websites mostly for small businesses, said Monday it was investigating an outage that had knocked some of its customers offline. A hacker using the "Anonymous Own3r" Twitter account claimed credit for the outage,  "Hello http://godaddy.com/ now yes!

Read more

Modified BlackHole Exploit Kit 2.0 released with new and latest Exploits

According to release announcement on Pastebin by unknown developers in a Russian-language BlackHole Exploit Kit 2.0 released with more latest Exploits. Black Hole is one of the most dominant exploit toolkits currently available in the underground market. It enables attackers

Read more

Lectures on Micro-processors and Micro-controllers by an IIT Prof. Ajit Pal

For all this time i have been facing a lot of trouble finding valuable information on Micro-processors on the internet. Since Micro-processors is also one of the subjects we will be studying this semester, so it is important that we understand it properly, i found some thing very useful

Read more

List of all Google + (plus) keyboard shortcuts for all Browsers

Some time we do not find our self comfortable using the mouse and its click all way long, specially when we are on be with our laptops, or when we are chatting with someone, we'll rather feel comfortable for us to use the keyboard shortcuts, so here today i present you the list of keyboard

Read more

List of all Facebook keyboard shortcuts for all Browsers

Some time we do not find our self comfortable using the mouse and its click all way long, specially when we are on be with our laptops, or when we are chatting with someone, we'll rather feel comfortable for us to use the keyboard shortcuts, so here today i present you the list of keyboard

Read more

Install and Run ANDROID 4.0.4 (ICE CREAM SANDWICH) on your PC or Laptop directly or on VMWARE or VIRTUAL BOX

Good Morning Everyone, Today we will learn here how to install and run Android 4.0.4 Ice Cream Sandwich on your PC directly and in VmWare or VirtualBox. Now you can create and check and make use of android apps directly on your PC and theirs no need to be dependent on a android Phone

Read more

Ardamax Keylogger

Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. This tool is used to find out what is happening on your computer while someone else is using it, maintain a backup of your typed data

Read more

Use Any Trial Version For Lifetime

Time Stopper is a tiny utility which eliminate the time limit existing into trial software usage period.Time Stopper works with any software executable file and practically will extend the trial period of the program for an unlimited amount of time.Time Stopper is very easy to install and use: you

Read more

Directly Download Torrent Files without a Torrent Client Software Installation

Now, there is an easy way to download torrent files using Internet Download Manager or directly. You have to just follow these simple steps given below :1. Go to http://zbigz.com/.2. Sign up for an account. You can do it for free.(Required only once)3. Now copy the magnet link of the torrent file

Read more

Rinlogger : Best and Easiest Keylogger

Follow the steps in order to hack victim mentioned below using rinlogger :1. Free download RinLogger.2. Extract the rar file.3. Run the application.4. Hit on Create New.

Read more

Hack The Hackers : Workshop on Cyber Security & Ethical Hacking in Kokata by Imagine Next & FN Secure

Hack The Hackers [Workshop on Ethical Hacking and Cyber Security by FN Secure & Imagine Next in kolkata] For the 1st Time you get a chance to learn Ethical Hacking in Kolkata.   &nbs

Read more

HACK WEBSITES USING SQL INJECTION :: STEP BY STEP WEBSITE DEFACING

SQL Injection in MySQL DatabasesSQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the

Read more

Save this Page

Download as PDF