An Introduction to Ethical hacking through the eyes of a pen tester and hopefully helps anyone reading this blog on how to protect and secure a network by understanding how a Hacker operates and understanding their tools and methodologies. Why would I want to publish such a series of articles; because, I did not want […]
Continue ReadingGoogle Gmail Keyboard Shortcuts
A Keyboard Shortcut according to Wikipedia states that a keyboard shortcut (or accelerator key, shortcut key, hot key, key binding, keybinding, key combo, etc.) is a key or set of keys that performs a predefined function. These functions can often be done via some other, more indirect mechanism, such as using a menu, typing a longer […]
Continue ReadingGoogle Accounts has retard as a CAPTCHA
A CAPTCHA (an initialism for “Completely Automated Public Turing test to tell Computers and Humans Apart”, is a type of challenge-response test used in computing to determine whether or not the user is human. A common type of CAPTCHA requires that the user type the letters of a distorted image, sometimes with the addition of an […]
Continue ReadingHow to edit any Webpage on the fly using JavaScript
OurPicks have an interesting piece of code snippet on their forums. A simple JavaScript code that lets you edit any webpage, static or dynamic on the fly Let us try this: Step # 1: Go to any website. Let us go to Slashdot.org Step # 2: Delete everything in the address bar Step # 3: […]
Continue ReadingSlot Machine suffers from the Blue Screen of Death
The supposedly indestructuctible slot machines, turns out are prone to failure like any other machine. The inquirer reports this Blue Screen of Death on a slot machine at the International Casino Exhibition in Earl’s court, London. The machine was built by Italian Motherboard maker Zest, demonstrating its latest “high-reliability” computer designs. The machine was built […]
Continue Reading