I know many novice PHP programmers who are very good when it comes to writing PHP scripts and adding nice CSS elements (+ some Jquery stuffs). But som
Archive for the Hacking Countermeasures Category (Only the LAST 10 articles are listed here) Please use the search box to see the other articles in THIS category
Disclaimer: This article carries information about the security vulnerabilities in a leading website. I’m not responsible if anyone tries to exploit
The number of people who are using Bluetooth headsets have gone up recently. Thanks to the new generation bluetooth devices that offer reliable commun
Electronic Article Surveillance (EAS) systems are used to prevent shoplifting. They are widely used in the retail industry and places like libraries.
There are many systems that use MAC address for authentication. For example, most the universities use MAC addresses for identifying the systems that
I’m starting a new segment – Hacking Countermeasures. Well, at the very outset itself let me say something about the word ‘hacker’. All