Welcome back ! Feel free to look around. If you like what you read, mention us in your post or link to this site. Hope to see you again

Thursday 23 February 2012

What is SQL ,SQL Injection and what an attacker can do , Data Base and types of Data Base?

Follow Hackers Spot

What is SQL?

SQL (pronounced "ess-que-el") stands for Structured Query Language. SQL is a tool for organizing, managing, and retrieving data stored by a computer
database. The name "SQL" is an abbreviation for Structured Query Language. For
historical reasons, SQL is usually pronounced "sequel," but the alternate pronunciation
"S.Q.L." is also used. As the name implies, SQL is a computer language that you use to
interact with a database. In fact, SQL works with one specific type of database, called a
relational database.

Simple Basic Queries for SQL:

Select * from table_name :
this statement is used for showing the content of tables including column name.
For eg:
select * from users;

Insert into table_name(column_names,...) values(corresponding values for columns):
For inserting data to table.
For eg:
insert into users(username,userid) values("BreakTheSec","break");

I will give more detail and query in my next thread about the SQL QUERY.

What is SQL Injection?
SQL injection is Common and famous method of hacking at present . Using this method an unauthorized person can access the database of the website. Attacker can get all details from the Database.

What an attacker can do?

* ByPassing Logins
* Accessing secret data
* Modifying contents of website
* Shutting down the My SQL server.

What is Database

A database can be thought of as a set of logically related files organized to facilitate access by one or more applications programs and to minimize data redundancy. This concept does not imply that all data relating to a company’s business should be contained on a single database, but simply that all records in a database should be related and that redundant data should be minimized.


Some List of Database are:




* DB servers,
* MySQL(Open source),
* MSSQL,
* MS-ACCESS,
* Oracle,
* Postgre SQL(open source),
* SQLite.

Monday 20 February 2012

Spoof Call-ID and list VOIP SItes

Follow Hackers Spot


Now As I said heres the second post on the main Part of VOIP.

Topics:-
1. Advantages of Using VoIP

2. Caller-ID Spoofing Attack


Advantages of Using VoIP

1. 90% Cost Saving (cheap call rates).
2. Great voice quality.
3. way Call forwarding.
4.Caller ID spoofing.
5. Unlimited calling.
6. Web calling.
7. Free phone call services.
8. Free Call Forwarding.


And NOw Gonna Give You List Of The Most and Famous Sites
To Call Free, Unlimited,Spoofing & Top Voip Companies.
..........................................................................................................................................................................
Top Voip Companies:

1. www.skype.com

2. www.callcentric.com

3. www.jajah.com/

4. www.phonepower.com

5. http://grandcentral.com/
........................................................................................................................................................................
Free Calling sites :
1. http://evaphone.com

2. www.talkster.com

3. www.tabrio.com

4. http://freecallplanet.com
..........................................................................................................................................................................
Unlimited Calling Sites :
1. www.joiphone.com

2. www.100call.com

3. www.telifu.com

4. www.visonade.com
..........................................................................................................................................................................
What Is Call-ID Spoofing Attack ..???

Caller ID spoofing is the practice of causing the telephone network to display a number
on the recipient's caller ID display which is not that of the actual originating station; the
term is commonly used to describe situations in which the motivation is considered
nefarious by the speaker. Just as e-mail spoofing can make it appear that a message came
from any e-mail address the sender chooses, caller ID spoofing can make a call appear to
have come from any phone number the caller wishes.

ADVANTAGES :-
1. Show any number on victim mobile number

2. Record Outgoing Calls

3. Listen to your calls online

4. Include recordings in email

5. Download your recordings.

Caller ID Spoofing sites :
1. www.123spoof.com

2. www.spooftel.com

3. www.spoofcard.com

4. www.spoofapp.com

5. www.stealthrecordercard.com


Note:- This article is only for Educational purpose, Hackersspot is not responisble for any circumstances...!!!

"DONT MISSUSE"

What Is VOIP and How it works(Basic)??

Follow Hackers Spot

Hello Readers , here i am back with one more intresting post for you, It will be an intresting Post for you to read and perform but missuing this trick may get you to danger...!!X

Now, I the Topics i will be covering are:

What is VOIP?
How VOIP works?
And

" Advantages of Using VoIP"
" Caller-ID Spoofing Attack"
IN next post link:- Here

........................................................................................................................................

What is VOIP?
Voice-over-Internet protocol (VoIP, ) is a protocol optimized for the transmission of
voice through the Internet or other packet-switched networks .
VoIP systems employ session control protocols to control the set-up and tear-down of
calls as well as audio codecs which encode speech allowing transmission over an IP
network as digital audio via an audio stream. Codec use is varied between different
implementations of VoIP (and often a range of codecs are used); some implementations
rely on narrowband and compressed speech, while others support high fidelity stereo
codecs.

........................................................................................................................................


How VOIP works?


VoIP converts the voice signal from your telephone into a digital signal that can travel
over the Internet. If you are calling a regular telephone number, the signal is then
converted back at the other end. Depending on the type of VoIP service, you can make a
VoIP call from a computer, a special VoIP phone, or a traditional phone. Wireless "hot
spots" in public locations such as airports, parks, and cafes allow you to connect to the
Internet, and may enable you to use VoIP service wirelessly. If your VoIP service
provider assigns you a regular telephone number, then you can receive calls from regular
telephones that don't need special equipment.

Next Post :- Here .

Monday 6 February 2012

Follow Hackers Spot



Make an Error Message to get your friend with a heart attack ...!!! Hahhahaa Looks funny and entertaining ;)
Get the Below code to Notepad and Save it as hackersspot.vbs and then run it :

x=msgbox("your computer is infected", 4+16 , "virus detector") do x=msgbox("Visit hackersspot3.tk or www.acena20.blogspot.com for help", 1+4 ,"shutting down") loop


H0w to Make Y0ur C0mputer Speak..????

Follow Hackers Spot

How To Make your Computer Speak ???? ;) . You can make your comp speak with different Softwares but have you ever thought to make your computer speak with your own script??? Now here an tutorial on how to make your computer speak by our own script..!!!!!

1. Open Notepad and paste the following code in :

Dim Message, Speak
Message=InputBox("Enter text","Hackersspot3.tk")
Set Speak=CreateObject("sapi.spvoice")
Speak.Speak Message

2. Now Save the file as " Hackersspot.vbs "

And you Are done open the file a box appears as in the above image write what you want your computer to speak..!! :) Keep Visiting ;)