Tech Grill - Where Ideas Sizzle

 
About Me

Enter your email address:

Free updates in your email
Google
Web techgrill
Top Articles

Celebrate your freedom to read

Cache it out - Keep your PC Sparkling clean

Get Classic ebooks for Free

Gmail - email ID naming tips

Google to find Passwords

Use Notepad as a Diary

Five Orkut Tips and Tricks for Beginners (Part1)

Orkut Tips & Tricks (Part 2)

Boost up your Firefox Browser

Book Reviews
Links
Powered by

Free Blogger Templates

BLOGGER

Technorati
Get Google Search result on your Mobile via SMS
Wednesday, September 27, 2006
You can use SMS to search the web for stores and businesses in a specific neighborhood, and find the names, addresses, and phone numbers of businesses near you or in any zip code across the US (Currently it is made available for US only and is in its Beta stage).

SMS Quick Start

1. Start a new text message and type in your search query

2. Send the message to the number "46645" (GOOGL)

3. You'll receive text message(s) with results

Tip: For help send the word 'help' as a text message to 46645.

You may even have a look at its demo by clicking here.

View a complete guide of how to use Google SMS or learn more by reading the FAQ.
posted by Administrator @ 3:26 PM   0 comments
The Database Hacker’s Handbook: Defending Database Servers

Databases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children’s grades and what groceries you buy. Database attacks are potentially crippling—and relentless.

In this essential follow-up to The Shellcoder’s Handbook, four of the world’s top security experts teach you to break into and defend the seven most popular database servers. You’ll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.

- Identify and plug the new holes in Oracle and Microsoft SQL Server
- Learn the best defenses for IBM’s DB2, PostgreSQL, Sybase ASE, and MySQL servers
- Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
- Recognize vulnerabilities peculiar to each database
- Find out what the attackers already know

Source Code files from the book are included in the download

Download Here (eBook & Source Code) 1.14 MB
posted by Administrator @ 2:53 PM   0 comments
Sponsored Ads
Previous Post
Archives
© 2005 Tech Grill - Where Ideas Sizzle Template by Isnaini Dot Com