Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Security Articles


Frequency Jamming Fundamentals

frequency jamming, wooptie-doo!

17 years ago 7228 Reads
0     0
Banner Grabbing: Enumeration & Exploitation

Enumeration & Exploitation

17 years ago 49097 Reads
0     0
XPath Injection Attacks

XPath Injection Attacks Methodology and Examples. *I am n

17 years ago 7503 Reads
0     0
Root in Under Five

For Schools and Such

17 years ago 177008 Reads
0     0
Injections

Many people dosn't use these functions in PHP, which make th

17 years ago 5812 Reads
0     0
Delete index.dat files

Index.dat files explained. There is also information how to

18 years ago 4938 Reads
0     0
Md5 and dictionary words

How to prevent dictionary words in md5

18 years ago 3959 Reads
0     0
Erasing files the safe way

This article shows how to delete files and make them impossi

18 years ago 9977 Reads
0     0
How to prevent Cookie Stealers

This mini tutorial will teach you a few ways of protecting y

18 years ago 5085 Reads
0     0
Trick to secure web page

Basic thing that can help your site to be more secure.

18 years ago 5130 Reads
0     0
The CIA Triad

The CIA Triad, also know as \\\\\\&#

18 years ago 8266 Reads
0     0
Cookie Poisoning

A basic introduction to cookie poisoning

18 years ago 13121 Reads
0     0
Ports to watch on networks

Here is a listing of common ports that will be open and the

18 years ago 8844 Reads
0     0
Running Virtual Machines

How to surf "dangerous sites"and how to run "dangerous jobs"

18 years ago 5546 Reads
0     0
Js Injections and some sql

a little tut about javascript injection and a little sql

18 years ago 5955 Reads
0     0
Hosts File Editing

Everything to know about hosts files.

18 years ago 5255 Reads
0     0