Posts

Showing posts from 2013

True Caller

Image
If you are looking for an app for India which act an an global telephone directory than your search ends with true caller.Its a reverse phone lookup app which actually works.It is an app available for android,iphone,blackbarry,symbian which can trace name and address of unknown caller.It also have the ability to block the number, it will instantly display caller name from incomming or outgoing calls and messages. You can also link ur facebook,twitter and linkedin profile to this app so you can get their profile pic and  staus update when they call you.All u need is an internet (3G/2G/wifi) connected device. But thers a catch..... You might be wondering, how it works? Its database is made from millions of its cloud connected users.It covertly upload ur contact to its cloud server so that other users can also search for numbers you know.So its a give and take policy. You can download it from respective Market place like google play for android.Just search for True caller in the mar

Hacking Attacks

Computer connected to internet are vulnerable top variety of exploits.System can be subjected to denial of service attacks that prevent other computers from connecting to them or prevent others computer from connecting to other computers on the internet.These attacks can cause them to cease operations either temporarily or permanently. Some of these attacks use vulnerability available in the third party components used by websites, such as shopping cart software.Other attacks have used vulnerabilities which are common in any web application such as SQL injection or XSS(Cross Site Scripting). Types of Attack There are two types of attack: Non technical attack Social Engineering attack Pretexting Phishing Smishing Vishing Tabnabbing Technical Attack DOS attack  Input Validation Attack Keyloggers Attack Sniffing Attack