Breaking News
Loading...
  • New Movies
  • Recent Games
  • Tech Review

Tab 1 Top Area

Tech News

Game Reviews

Recent Post

Thursday, November 3, 2011
TRICK TO BYPASS GMAIL MOBILE VERIFICATION WHILE CREATING NEW ACCOUNT

TRICK TO BYPASS GMAIL MOBILE VERIFICATION WHILE CREATING NEW ACCOUNT




These days when anyone try to create new account on gmail, it says you to enter your mobile no. and then it verify your no. by sending a code on ur mobile.
This thing creates difficulties for those who does not have any mobile or want to create more then one account on gmail.

Well, today i am gonna tell you all a trick by that you can create new account on gmail without giving your personal no. to gmail :)

Follow these steps :
1. First of all go to http://k7.net/. and sign up there.
This is a site where you can receive fax or voice calls without having a phone no. When you create an account on this site, it will provide you an unique phone no. of US.
2. Now go for creating account on gmail, enter all the information as you want, but in Location fill 'United States'.
3. Now click on 'I accept, create an account'.

4. Now it will take you to mobile verification page. Here select the option of Voice call and fill the no. that you got from k7.net.
5. Now you will get a mail having verification code as voice mail on that account from which you have registered on K7.net. Open it, download the attachment file and listen the code.

6. Now enter the code of your voice mail in verification code. and click OK. 

7. Yuppiiee, your account is ready now :)
TRICK TO BYPASS GMAIL MOBILE VERIFICATION WHILE CREATING NEW ACCOUNT

TRICK TO BYPASS GMAIL MOBILE VERIFICATION WHILE CREATING NEW ACCOUNT




These days when anyone try to create new account on gmail, it says you to enter your mobile no. and then it verify your no. by sending a code on ur mobile.
This thing creates difficulties for those who does not have any mobile or want to create more then one account on gmail.

Well, today i am gonna tell you all a trick by that you can create new account on gmail without giving your personal no. to gmail :)

Follow these steps :
1. First of all go to http://k7.net/. and sign up there.
This is a site where you can receive fax or voice calls without having a phone no. When you create an account on this site, it will provide you an unique phone no. of US.
2. Now go for creating account on gmail, enter all the information as you want, but in Location fill 'United States'.
3. Now click on 'I accept, create an account'.

4. Now it will take you to mobile verification page. Here select the option of Voice call and fill the no. that you got from k7.net.
5. Now you will get a mail having verification code as voice mail on that account from which you have registered on K7.net. Open it, download the attachment file and listen the code.

6. Now enter the code of your voice mail in verification code. and click OK. 

7. Yuppiiee, your account is ready now :)
FACEBOOK:NEW VULNERABILITY FOUND

FACEBOOK:NEW VULNERABILITY FOUND




Hello Friends,
Facebook EXE attachment Vulnerability can Compromise with Users Security



Nathan Power from SecurityPentest has discovered new Facebook Vulnerability, that can easily attach EXE files in messages,cause possible User Credentials to be Compromised .


When using the Facebook 'Messages' tab, there is a feature to attach a file. Using this feature normally, the site won't allow a user to attach an executable file. A bug was discovered to subvert this security mechanisms. Note, you do NOT have to be friends with the user to send them a message with an attachment.


But Nathan Power Find the way to upload EXE . When uploading a file attachment to Facebook we captured the web browsers POST request being sent to the web server. Inside this POST request reads the line:
Content-Disposition: form-data; name="attachment"; filename="cmd.exe"
It was discovered the variable 'filename' was being parsed to determine if the file type is allowed or not. To subvert the security mechanisms to allow an .exe file type, we modified the POST request by appending a space to our filename variable like so:
filename="cmd.exe "

FACEBOOK:NEW VULNERABILITY FOUND

FACEBOOK:NEW VULNERABILITY FOUND




Hello Friends,
Facebook EXE attachment Vulnerability can Compromise with Users Security



Nathan Power from SecurityPentest has discovered new Facebook Vulnerability, that can easily attach EXE files in messages,cause possible User Credentials to be Compromised .


When using the Facebook 'Messages' tab, there is a feature to attach a file. Using this feature normally, the site won't allow a user to attach an executable file. A bug was discovered to subvert this security mechanisms. Note, you do NOT have to be friends with the user to send them a message with an attachment.


But Nathan Power Find the way to upload EXE . When uploading a file attachment to Facebook we captured the web browsers POST request being sent to the web server. Inside this POST request reads the line:
Content-Disposition: form-data; name="attachment"; filename="cmd.exe"
It was discovered the variable 'filename' was being parsed to determine if the file type is allowed or not. To subvert the security mechanisms to allow an .exe file type, we modified the POST request by appending a space to our filename variable like so:
filename="cmd.exe "

FREE EBOOK DOWNLOAD:COMPUTER VIRUSES FOR DUMMIES

FREE EBOOK DOWNLOAD:COMPUTER VIRUSES FOR DUMMIES






Computer Viruses for Dummies.A must read book for all computer operators.
It would be difficult to describe the impact of viruses — and their cousins Trojan horses and worms — without resorting
to clichés or sensationalism. But after all the hoopla, the
bottom line is pretty simple: Malicious people write viruses,
and viruses do bad things to our computers. Over the past
two decades, viruses have caused billions of dollars in damage.



FREE EBOOK DOWNLOAD:COMPUTER VIRUSES FOR DUMMIES

FREE EBOOK DOWNLOAD:COMPUTER VIRUSES FOR DUMMIES






Computer Viruses for Dummies.A must read book for all computer operators.
It would be difficult to describe the impact of viruses — and their cousins Trojan horses and worms — without resorting
to clichés or sensationalism. But after all the hoopla, the
bottom line is pretty simple: Malicious people write viruses,
and viruses do bad things to our computers. Over the past
two decades, viruses have caused billions of dollars in damage.



Saturday, October 29, 2011
Tor 0.2.2.34 Released with fixes of anonymity vulnerability

Tor 0.2.2.34 Released with fixes of anonymity vulnerability



Tor 0.2.2.34 fixes a critical anonymity vulnerability where an attacker can de-anonymize Tor users. Everybody should upgrade. Clients should upgrade so they are no longer recognizable by the TLS certs they present. Relays should upgrade so they no longer allow a remote attacker to probe them to test whether unpatched clients are currently connected to them.This release also fixes several vulnerabilities that allow an attacker to enumerate bridge relays. Some bridge enumeration attacks still remain.
Download Here



More Downloads


                                                      Plz, Post a Thanks To Keep This Post Alive!

Save this Page

Copyright © 2012 Checkzx All Right Reserved
Designed by CBTblogger