SpectorSoft designs products that allow you to record and view what employees and children do on the computer, and specifically what they do on the Internet. Our products are especially popular with people who want to record and monitor the online activity of their loved ones and for employers who want to reduce inappropriate and […]
This is one way you could exploit a server. This will work on any unsecure php upload forms. I used a new tool included in backtrack 5 to evade any antivirus software by encrypting the php backdoor. If you are sucessful, you can then run any command on the targeted server.
One of my biggest pet peeves in life is having some non-techie ask me a question about how to do something the right way, then spend the next three hours justifying to me why they did it the wrong way and will continue doing it wrong. I’m not saying that I’m the best at what […]
About Nested Set Trees When I learned programming, I was intensively taught how to deal with data structures in programming languages like C, C++, Ada, Modula, … When I tried to represent hierachical structures (tree structures) with databases, I realized that different representations and algorithms are more appropriate.