ProRat

What is ProRat ? And how we us it ? ProRat is a Remote Administration Tool made by PRO Group.ProRat was written in C programming language and its capable to work with all windows operating systems.ProRat is made for remoting your own computers from other computers.ProRat supports bir lots of Read more…

Loading

SQL Injection

What is SQL Injection? SQL injection (SQLi) is an application security weakness that allows attackers to control an application’s database – letting them access or delete data, change an application’s data-driven behavior, and do other undesirable things – by tricking the application into sending unexpected SQL commands. SQL injection weaknesses Read more…

Loading

Buffer overflow attack

What is Buffer overflow? Buffer overflow, in the presence of a buffer overflow security vulnerabilities in the computer, the attacker can exceed the normal length of the number of characters to fill a domain, usually the memory address. In some cases, these excess characters can be run as “executable” code. Read more…

Loading

Hackers Category

1. White Hat Hacker   Definition – What does White Hat Hacker mean? A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers Read more…

Loading