:::: MENU ::::
Browsing posts in: Blog

This is what happens to your body within one hour of drinking a can of soda.

Reshared post from +John Cassone, Ph.D.

This is what happens to your body within one hour of drinking a can of soda.

10 minutes: 10 teaspoons of sugar hit your system, which is 100 percent of your recommended daily intake. You'd normally vomit from such an intake, but the phosphoric acid cuts the flavor.

20 minutes: Your blood sugar skyrockets. Your pancreas attempts to maximize insulin production in order to turn high levels of sugar into fat.

40 minutes: As your body finishes absorbing the caffeine, your pupils dilate, your blood pressure rises, and your liver pumps more sugar into the bloodstream. Adenosine receptors in your brain are blocked preventing you from feeling how tired you may actually be.

45 minutes: Your body increases dopamine production, causing you to feel pleasure and adding to the addictiveness of the beverage. This physical neuro response works the same way as it would if we were consuming heroin.

60 minutes: The phosphoric […]

SQL Fuzzing for fun and profit

Interesting article on SQL Injection Fuzzing.

This article is going to talk about Obfuscated SQL Fuzzing. Nowadays all high profile sites found in financial and telecommunication sector use filters to filter out all types of vulnerabilities such as SQL, XSS, XXE, Http Header Injection e.t.c. In this particular article we are going to talk only about Obfuscated SQL Fuzzing Injection attacks.

First of all what obfuscate means based on the Dictionary.com:

“Definition of obfuscate: verb (used with object), ob¬∑fus¬∑cat¬∑ed, ob¬∑fus¬∑cat¬∑ing.

  • To confuse, bewilder, or stupefy.
  • […]

  • Fun – Chunk Norris facts

    NewImageThis is very funny in a nerdy way…

    Chunk Norris is the cyber brother of Chuck Norris. He is a computer programmer and hacker. He was the first to allocate a chunk of memory, before memory was created.

    Link: fotis.loukos.me

    Security Risk in Firefox: How to turn off Firefox’s New Tab Page Completely | About Security


    If you’re using Firefox, you should be awareof a possibility of information leakage through the new Tab Page that may disclose confidential information through the screenshots that are presented.

    You should turn of this feature for the time being, as described in the article below.

    Link: aboutse.cc

    How to drink whisky


    Very insightful video on Whisky testing

    Ice? No Ice? Water? More whisky? Coke? Lemonade? How do you drink your whisky? It’s caused pub arguments for centuries and here’s Whyte & Mackay Master Blender Richard Paterson to show you why ice is a bad idea, water is OK – and why you should dip your finger in the water jug.

    The malware factory

    Interesting read…

    Article Published on¬†The Hacker New Magazine ‚Äì June Edition ‚ÄúMalware‚Äù With the term malware we refer a heterogeneous family of malicious software designed with the purpose to disrupt computer operation, gather sensitive information, or gain unauthorized access to victims systems. With the term we indicate in fact several types of malicious code such as computer viruses, worms, trojan, spyware, ramsonware, adware, rootkits, and other applications. In recent years we have witnessed an unprecedented growth in the development of malware linked to rapidly changing of […]


    Interesting article!

    For many new Mac owners, the move to Mountain Lion represents your first major upgrade. To help users prepare to make the jump, Erica Sadun and I wrote Getting Ready for Mountain Lion, an Amazon/iBooks eBook. It's aimed at first-time upgraders and people looking for hints and tips about smoothing the transition. We're sharing some of our tips on TUAW in a series of posts about the 10.8 upgrade.

    Although most Mac OS X upgrades go smoothly, there's always a chance that something can go wrong. Hundreds of thousands of files are changed during an upgrade, so there's a possibility that one or more of those changes can cause your Mac to decide to not boot up properly. Without a backup, your data might be gone forever.