.

.

Friday 17 August 2012

Make Money by Reporting Bugs And Security Vulnerabilities

This is news for all researchers, hackers and developers. Now the lot of you can earn money by doing what you do best, search for vulnerabilities in sites and programs such as Facebook, Mozilla and PayPal. The first company to ever introduce this idea to the masses was Mozilla and soon after, Google followed suit. Facebook was the next in line. All these major shareholders of today's internet services began offering $500 worth of bounty ages ago. As the time passed, they too have increased their rewards paying as much as $3000 and above.

FACEBOOK

Facebook has started to follow in the footsteps of Mozilla and Google by launching a "bug bounty" program where people who find and report bugs and vulnerabilities can cash in on them. The "Responsible Disclosure Policy" program, through which researchers and developers can report flaws in the website, can reward up to $500 and above.

According to Facebook;

"If you give us a reasonable time to respond to your report before making any information public and make a good faith effort to avoid privacy violations, destruction of data and interruption or degradation of our service during your research, we will not bring any lawsuit against you or ask law enforcement to investigate you."

Bugs that you can submit to Facebook:
1. Cross-Site Scripting (XSS)
2. Cross-Site Request Forgery (CSRF/XSRF)
3. Remote Code Injection
4. Broken Authentication (including Facebook OAuth bugs)
5. Circumvention of Platform permission model
6. A bug that allows a third-party to view private user data

Basically, anyone can cash into this opportunity but to qualify you must:
1.Be the first person to privately report the bug
2. Reside in a country not under any current US sanctions
3. Must abide to the Responsible Disclosure Policy and
4. The bug found could potentially compromise the integrity or privacy of Facebook user data.

The following would lead to disqualification in the bug bounty program:
1. Denial-of-service vulnerabilities
2. Spam and social engineering techniques and
3. Bugs in third-party apps and websites and Facebook's corporate infrastructure.

To submit your report click here.

GOOGLE


Bugs and vulnerabilities that you can submit to Google:

1. .google.com
2. .youtube.com
3. .bloggers. com
4. .orkut.com

Bugs that you can submit to Google:
1. Cross-site scripting
2. Cross-site request forgery
3. Cross-site script inclusion
4. Flaws in authetication and authorization mechanisms
5. Server-side code execution or command injection bugs.

The following would lead to disqualification in the bug bounty program:
1. Attacks against Google corporate infrastructure
2. Social engineering and attacks on physical facilities
3. Brute-force denial of service bugs
4. SEO techniques
5. Vulnerabilities in non-web applications
6. Vulnerabilities in Google-branded services operated by third parties.

Reward Amounts offer by Google:

Other highly sensitive services [1]
Normal Google applications
Non-integrated acquisitions and other lower priority sites [2]
Remote code execution
$20,000
$20,000
$20,000
$5,000
SQL injection or equivalent
$10,000
$10,000
$10,000
$5,000
Significant authentication bypass or information leak
$10,000
$5,000
$1,337
$500
Typical XSS
$3,133.7
$1,337
$500
$100
XSRF, XSSI, and other common web flaws
$500 - $3,133.7
(depending on impact)
$500 - $1,337
(depending on impact)
$500
$100

You can send your report to security@google.com.



Download Internet Download Manager



As name suggests, Internet Download Manager(IDM) is used to manage or download files from Internet.Internet Download Manager (also called IDM) is a shareware download manager. It is only available for the Microsoft Windows operating system.IDM (Internet download manager) is a download manager(or accelerator) probably the best in its category.
Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it’s done.
Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others

Download IDM V 6.11 Full Version FREE

Web Hacking with DVNA - Free to Download


(DVNA) Damn Vulnerable Web Application  is a collection of website hacking tool based on PHP / mySQL. DVWA may be an option for beginners to learn web hacking web hacking techniques from scratch. Various techniques web hacking attacks can be obtained from this tool. Besides easy to use, lightweight and complete, DVWA run through a local server (localhost) using WAMP / XAMP / LAMP and others.

Key Features

DVWA include some web hacking tools such as :
  • SQL Injection
  • XSS (Cross Site Scripting)
  • LFI (Local File Inclusion)
  • RFI (Remote File Inclusion)
  • Command Execution
  • Upload Script
  • Login Brute Force

Download

Erase Traces of USB Drives and CD-ROM from Registry with USBOblivion


We tend to connect lot many USB drives and CDs into our computers and even have connected many of those till now. Whenever we connect the drive for the first time, our computer saves the information about it in the Registry so that we don’t have to wait again and again to load the drivers whenever we connect it the next.
There are quite a few tools to even check the info of the drives that has been connected in the past and believe me you will be surprised to see the list too. But either to clear this cached information to make the system lighter or to remove all the traces of the drives connected so far to make the system securer, you need a tool called USBOblivion.


This tool called USBOblivion is free to use and have a simple interface with just two buttons and two other options. When you run this tool you will see that you will see the list of all the connected USB drives and CD ROMs. You can select the option of “Do Real Clean” which will actually erase all this info (or just uncheck it if you wish to see the simulation of what will going to happen on checking this box).
USBOblivion also have a backup registry option which is checked by default so that you have an option of restoring this info back in case you wish to restore it later on. The backup of the registry being affected will be saved to your Documents folder with the .reg extension, double clicking on which will restore the registry settings.
The tool is compatible with Windows 2000/XP/2003/Vista/2008/7 on both 32 and 64 bits. Moreover this is a portable app as it requires no installation and can be taken in a USB drive. So just visit the location below and download the right USBOblivion archive as per your computer.
Download USBOblivion

Add V2 Style Popular Posts Widget With Multi Color For Blogger


This is about Popular post widget. Actually earlier i posted about How To Add Multi-Color Popular Posts Widget For Blogger. So this is also same, But, this design is different, Its  look Like round corners. You can add this effect
with easily,You can try it.

1. Log in to blogger account & Go to Design >> Edit HTML

2. Find this code  by using Ctrl+F  ]]></b:skin>

3.Paste below code Before ]]></b:skin> code
#PopularPosts1 ul li a:hover{color:#fff;text-decoration:none}

#PopularPosts1 ul li a {-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;  color: #333333; display: block; font-family: Georgia, 'Times New Roman', Times, serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 40px 0px 0px; min-height: 30px; orphans: 2; padding: 0px; text-align: -webkit-auto; text-decoration: none !important; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;}

#PopularPosts1 ul li .item-thumbnail{float:left;border:0;margin-right:10px;background:transparent;padding:0;width:51px;height:51px}

#PopularPosts1 ul li:first-child:after,

#PopularPosts1 ul li:first-child + li:after,

#PopularPosts1 ul li:first-child + li + li:after,

#PopularPosts1 ul li:first-child + li + li + li:after,

#PopularPosts1 ul li:first-child + li + li + li + li:after,

#PopularPosts1 ul li:first-child + li + li + li + li + li:after,

#PopularPosts1 ul li:first-child + li + li + li + li + li + li:after,

#PopularPosts1 ul li:first-child + li + li + li + li + li + li + li:after,

#PopularPosts1 ul li:first-child + li + li + li + li + li + li + li + li:after,

#PopularPosts1 ul li:first-child + li + li + li + li + li + li + li + li + li:after{position:absolute;top:10px;right:5px;border-radius:50%;border:2px solid #ccc;background:#353535;-webkit-box-shadow:0px 0px 5px #000;-moz-box-shadow: 0px 0px 5px #000;width:30px;height:30px;line-height:1em;text-align:center;font-size:28px;color:#fff}

#PopularPosts1 ul li:first-child + li + li + li + li + li + li + li {background:#DF01D7;width:90%}

#PopularPosts1 ul li:first-child + li + li + li + li + li + li + li:after{content:"8"}

#PopularPosts1 ul li:first-child + li + li + li + li + li + li + li +li{background:#B041FF;width:90%}

#PopularPosts1 ul li:first-child + li + li + li + li + li + li + li + li:after{content:"9"}

#PopularPosts1 ul li:first-child + li + li + li + li + li + li + li +li +li{background:#F52887;width:90%}

#PopularPosts1 ul li:first-child + li + li + li + li + li + li + li + li + li:after{content:"10"}

#PopularPosts1 ul li:first-child + li + li + li + li +li{background:#7ee3c7;width:90%}

#PopularPosts1 ul li:first-child + li + li + li + li + li:after{content:"6"}

#PopularPosts1 ul li:first-child + li + li + li + li + li +li{background:#f6993d;width:90%}

#PopularPosts1 ul li:first-child + li + li + li + li + li + li:after{content:"7"}

#PopularPosts1 ul li:first-child + li + li + li + li{background:#33c9f7;width:90%}

#PopularPosts1 ul li:first-child + li + li + li + li:after{content:"5"}

#PopularPosts1 ul li:first-child + li + li + li{background:#c7f25f;width:90%}

#PopularPosts1 ul li:first-child + li + li + li:after{content:"4"}

#PopularPosts1 ul li:first-child + li + li{background:#ffde4c;width:90%}

#PopularPosts1 ul li:first-child + li + li:after{content:"3"}

#PopularPosts1 ul li:first-child + li{background:#ff764c; width:90%}

#PopularPosts1 ul li:first-child + li:after{content:"2"}

#PopularPosts1 ul li:first-child{background:#ff4c54 ;width:90%}

#PopularPosts1 ul li:first-child:after{content:"1"}

#PopularPosts1 ul{margin:0;padding:0px 0;list-style-type:none}

#PopularPosts1 ul li{position:relative;margin:6px 0;border-radius:25px 0px 25px 0px;border:2px solid #f7f7f7;-webkit-box-shadow:3px 3px 3px #000;-moz-box-shadow: 3px 3px 3px #000;padding:10px}




4. Now Click  Save Template.
    You are done...

 

Get Latest Updates: Subscribe Now | Like Us on Facebook

X