Feeds:
Posts
Comments

Archive for the ‘hacking’ Category

Crazy Hack 1: Edit any webpage..

Go to any web page, clear the address bar, and paste this…

javascript:document.body.contentEditable='true'; document.designMode='on'; void 0

and hit enter…

Yaahhooo…!!! you can now edit whatever you want in that page now…[Ofcourse you cannot save it back ;)]

Crazy Hack 2: Dancing Images

Go to any web page, clear the address bar, and paste this…

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);

and hit enter…

And….Enjoy the Image Dance…

Source: Digg.com.

If you like this stuff…Then Digg it… :))

Read Full Post »

Researcher demonstates Adobe Reader attack

Malicious code can be installed through legit features.

A security researcher claims it is possible to install malicious code on a user’s computer through standard Adobe Reader features.

David Kierznowski has published proof of concept documents for exploiting the ubiquitous software that are not traditional software code flaws, but instead demonstrate a new trend affecting desktop applications – the use of legitimate features for dangerous ends.

“Recently, there has been alot of hype involving backdooring various Web technologies,” said Kierznowski in his study. He said PDF documents seem like an obvious target because they support JavaScript, but found that exploitation wasn’t straightforward, partly because Adobe supports its own JavaScript model.
read more | digg story

Read Full Post »