<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3075898224687893328</id><updated>2024-11-05T18:44:08.907-08:00</updated><category term="How-to Guides"/><category term="Web Security"/><category term="Hacking Articles"/><category term="Website Attacking"/><category term="Website Hacking"/><category term="Articles"/><category term="Database Hacking"/><category term="Ddos Attack"/><category term="Domain Hacking"/><category term="Dos Attack"/><category term="How Stuff Works"/><category term="IDM Hack"/><category term="IP Address"/><category term="PC Security"/><category term="SQL Injection"/><category term="Software Hacking"/><category term="Tips and Tricks"/><category term="Windows Hacks"/><category term="Xpath Injection"/><title type='text'>Live Hack Tools</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://livehacktools.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://livehacktools.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>9</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3075898224687893328.post-4510105812938359690</id><published>2012-02-24T06:31:00.000-08:00</published><updated>2012-02-24T06:31:37.410-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="How-to Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL Injection"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Security"/><title type='text'>How to Protect Your Site Against SQLi</title><summary type="text">
Hi all users, This is simple tutorial for beginners on how to protect your site against &amp;nbsp;SQL Injection and this tutorial will also help you check if your site is vulnerable to SQLi and how to make it resistant to SQLi.







What is SQL Injection?
SQL stands for Structured Query Language, and it is the language used by most website databases. SQL Injection is a technique used by hackers to</summary><link rel='replies' type='application/atom+xml' href='http://livehacktools.blogspot.com/feeds/4510105812938359690/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://livehacktools.blogspot.com/2012/02/how-to-protect-your-site-against-sqli.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/4510105812938359690'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/4510105812938359690'/><link rel='alternate' type='text/html' href='http://livehacktools.blogspot.com/2012/02/how-to-protect-your-site-against-sqli.html' title='How to Protect Your Site Against SQLi'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihItP4aiNdmaq-K0NiSqTfi6rpCXzZQjYjFkr2Bk97Jyza_fxQF0uyvp1Bk6jggazpAqp-tvGL7H-0kFm2rRwBhkKsH0XjptDZFYLpQpJ37-Hem4AHIieo_hu3ajlpUkfZqku_ZZbSBsM/s72-c/sql_injection.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3075898224687893328.post-7661552335227682295</id><published>2012-02-24T02:50:00.000-08:00</published><updated>2012-02-24T03:03:56.302-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="How-to Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="IP Address"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Security"/><title type='text'>How to Detect Anonymous IP Addresses</title><summary type="text">
As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user </summary><link rel='replies' type='application/atom+xml' href='http://livehacktools.blogspot.com/feeds/7661552335227682295/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://livehacktools.blogspot.com/2012/02/how-to-detect-anonymous-ip-addresses.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/7661552335227682295'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/7661552335227682295'/><link rel='alternate' type='text/html' href='http://livehacktools.blogspot.com/2012/02/how-to-detect-anonymous-ip-addresses.html' title='How to Detect Anonymous IP Addresses'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8qAE1wneg-uRLZeiLaqF54bartx4N2cwysTdOr0hWIkOXyUY8vMVJTPwuotdzOrMlCFd6OTMfqVBkdDV0nXCXjL0ck5JXrGuv0ud8YPfA09aQU0XERnKp3Gy778w3q7Z43mET7UVd2jc/s72-c/detect_proxy.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3075898224687893328.post-7584593775247058534</id><published>2012-02-24T01:43:00.000-08:00</published><updated>2012-02-24T02:51:19.895-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="How-to Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows Hacks"/><title type='text'>How to Create Your Own Customized Run Commands</title><summary type="text">
The Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run </summary><link rel='replies' type='application/atom+xml' href='http://livehacktools.blogspot.com/feeds/7584593775247058534/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://livehacktools.blogspot.com/2012/02/how-to-create-your-own-customized-run.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/7584593775247058534'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/7584593775247058534'/><link rel='alternate' type='text/html' href='http://livehacktools.blogspot.com/2012/02/how-to-create-your-own-customized-run.html' title='How to Create Your Own Customized Run Commands'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQDoTze3H7EABKNakdR9FnT973sEd6I6Y5rf7JXw55YpoqXtLkvsQz9Of5ecgF-iCm8__u1ptVNtDi0f_IsEssnXgt-_aiQF8-hJRsKzclpCMcO0ILLt597IDHGcY7gSakBDeO2LvGh58/s72-c/run_command.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3075898224687893328.post-3578833630204815156</id><published>2012-02-24T01:14:00.000-08:00</published><updated>2012-02-24T01:14:50.378-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Articles"/><category scheme="http://www.blogger.com/atom/ns#" term="How Stuff Works"/><category scheme="http://www.blogger.com/atom/ns#" term="PC Security"/><title type='text'>How Antivirus Software Works</title><summary type="text">
Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. Even though every one of us have an antivirus software installed on our computers, only a few really bother to understand how it actually works! Well </summary><link rel='replies' type='application/atom+xml' href='http://livehacktools.blogspot.com/feeds/3578833630204815156/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://livehacktools.blogspot.com/2012/02/how-antivirus-software-works.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/3578833630204815156'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/3578833630204815156'/><link rel='alternate' type='text/html' href='http://livehacktools.blogspot.com/2012/02/how-antivirus-software-works.html' title='How Antivirus Software Works'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEYySGJZ5kpFNlbKVghQa_xjVVt-0WbVClnG-VlS19m82TjJfWrctV5TWvdH4K-NFKklf5FsyA65V2jeTcyxL-qbCUBlAhs4IE3i0S45yq2BRmBsFD2aipNQZU0HzVgGJXgFocmfqwS7w/s72-c/anti_virus.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3075898224687893328.post-915379863481515172</id><published>2012-02-21T16:42:00.000-08:00</published><updated>2012-02-21T16:42:43.741-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Database Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Website Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Xpath Injection"/><title type='text'>Hack Websites Database Using XPath Injection</title><summary type="text">
Everyday many website gets hacked by hackers but most of the hackers are hacking those website just for popularity nothing else. Today i am writing this tutorial on XPath Injection, in which i will explain you, How Hackers Hack Website Using XPath Injection.

In a typical Web Application architecture, all data is stored on a Database server. This Database server store data in various formats </summary><link rel='replies' type='application/atom+xml' href='http://livehacktools.blogspot.com/feeds/915379863481515172/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://livehacktools.blogspot.com/2012/02/hack-websites-database-using-xpath.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/915379863481515172'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/915379863481515172'/><link rel='alternate' type='text/html' href='http://livehacktools.blogspot.com/2012/02/hack-websites-database-using-xpath.html' title='Hack Websites Database Using XPath Injection'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh74sK10SmfsdFhJarQFdKbOawz0WewBUQMEiWQoC1bAGNBN4_5oFJXx3f3ytEsRtHKcWWbXK0sYd4yd14SuwYvUxSNXtV1N_-4w0qpygUxJYIvt9Xxr0fyesX3TTZ3xvWaOd80j6FDq-Q/s72-c/web_security.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3075898224687893328.post-1262088994924302979</id><published>2012-02-21T16:11:00.000-08:00</published><updated>2012-02-21T16:11:25.167-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Dos Attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Articles"/><category scheme="http://www.blogger.com/atom/ns#" term="Website Attacking"/><title type='text'>What is Denial of Service Attack | Dos Attack?</title><summary type="text">
Hello everyone, by reading our previous post you might know that what is Ddos attack and how does it work? so today I want to share you a detailed tutoriallon denial of service attack and it&#39;s technique so lets get started Denial of Service or (DoS) or sometime referred as Distributed Denial of Service (DDos) attacks have matured from mere annoyances to severe high-profile attacks to e-commerce </summary><link rel='replies' type='application/atom+xml' href='http://livehacktools.blogspot.com/feeds/1262088994924302979/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://livehacktools.blogspot.com/2012/02/what-is-denial-of-service-attack-dos.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/1262088994924302979'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/1262088994924302979'/><link rel='alternate' type='text/html' href='http://livehacktools.blogspot.com/2012/02/what-is-denial-of-service-attack-dos.html' title='What is Denial of Service Attack | Dos Attack?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2gaJLp2WytVIsBM2HAKeIXIqL23lao4ymy_MCSBPEokDUEc9Z-v9z7nEVdqxYSDPf-1Li_WL3j6pF2TTgHGbFrb6H_CeeIeGmAn3EekxZqD0fpRXaq5g4wqf1YA6HxqS3mUOra4bQdC0/s72-c/dos.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3075898224687893328.post-816699152518022641</id><published>2012-02-21T15:19:00.000-08:00</published><updated>2012-02-21T15:23:20.826-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ddos Attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Articles"/><category scheme="http://www.blogger.com/atom/ns#" term="Website Attacking"/><title type='text'>What is Ddos Attack and How Does It Work?</title><summary type="text">
Many of &amp;nbsp;people in illusions that Website hacking and Attacking is very Difficult and only some hackers and professionals can Do It... Now that&#39;s absolutely wrong thinking... Its as Easy as alphabetic.











Ddos Attack


First of all We all should know What are the Different Methods Of attacking Websites...

There are Generally Three Methods of Attacking an Website...


Ddos Attack
</summary><link rel='replies' type='application/atom+xml' href='http://livehacktools.blogspot.com/feeds/816699152518022641/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://livehacktools.blogspot.com/2012/02/what-is-ddos-attack-and-how-does-it.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/816699152518022641'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/816699152518022641'/><link rel='alternate' type='text/html' href='http://livehacktools.blogspot.com/2012/02/what-is-ddos-attack-and-how-does-it.html' title='What is Ddos Attack and How Does It Work?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV1xCCr-0xT8MHVpM7uHAkJb12KpsCEmrDwOuAhUPEIZa3B45en6SxD7uKh-_kqVxDOstcAjGENd78INIgvUeuIgjUlE0zizwJ_cDlP_0ACtPRakyaNOHv0XecROyN_40tdZss_b0WlII/s72-c/ddos.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3075898224687893328.post-4322248118385587779</id><published>2012-02-18T07:28:00.000-08:00</published><updated>2012-02-24T05:46:23.987-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="How-to Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="IDM Hack"/><category scheme="http://www.blogger.com/atom/ns#" term="Software Hacking"/><title type='text'>How to Crack IDM Manually for Lifetime</title><summary type="text">
Hello Friends, in my previous article we discussed on Sharecash Downloader today i am going to explain how to hack or crack Internet Download Manager (IDM) manually. IDM is the best Internet download manager available on internet but its not free and its cracked or patched versions contains viruses.&amp;nbsp;Using this hack you can register the Internet Download Manager (IDM) for free using you own </summary><link rel='replies' type='application/atom+xml' href='http://livehacktools.blogspot.com/feeds/4322248118385587779/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://livehacktools.blogspot.com/2012/02/how-to-crack-idm-manually-for-lifetime.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/4322248118385587779'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/4322248118385587779'/><link rel='alternate' type='text/html' href='http://livehacktools.blogspot.com/2012/02/how-to-crack-idm-manually-for-lifetime.html' title='How to Crack IDM Manually for Lifetime'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgd2KlswG9F3zbcR-XxPD1eS_z-wVnTMomw7XlivOUmTo5A1tfbFckyeXBD5vJmA28qF8rh-4u3jVv4o1OP0DjzWC-ZAs-iy150GlR0zoCAx96VBuiVJ6AlAtgTRcAavrpoJZhWu_P4AF0/s72-c/idm.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3075898224687893328.post-1703702717828297954</id><published>2012-02-18T01:39:00.001-08:00</published><updated>2012-02-21T12:41:39.543-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Domain Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Website Hacking"/><title type='text'>How to Hijack a Domain | Domain Hijacking</title><summary type="text">
In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.
Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate </summary><link rel='replies' type='application/atom+xml' href='http://livehacktools.blogspot.com/feeds/1703702717828297954/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://livehacktools.blogspot.com/2012/02/how-to-hijack-domain-domain-hijacking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/1703702717828297954'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3075898224687893328/posts/default/1703702717828297954'/><link rel='alternate' type='text/html' href='http://livehacktools.blogspot.com/2012/02/how-to-hijack-domain-domain-hijacking.html' title='How to Hijack a Domain | Domain Hijacking'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgE_8WFteAxftQ0R7K71i_VIlRR0iNXIxxOiSKEMTmkAC9TMbQY0mnHKTKCLC6xVMdqEcContvwJLQyRt8xDmaVxspdYeitkw9ygsmVoE9UsgMnPcmQI1d_0u7hrlWD664Fi_oFkvv-TnY/s72-c/domain_hijacking.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>