How To Set Same Cookie On Different Domains

You might have seen sites like Google setting the login status cookie on the various domains of theirs (YouTube, Blogger). As you may know, cookie can’t be set in a different domain from another domain directly. If you’re having multiple sites in where you need to set a cookie from a parent site, you can use basic HTML and JS to set the cookies. Google is using this same way.…

Add Spell Check With PHP Using Google

If you google something that has spelling mistakes, Google will automatically correct it for you or if the bot isn’t sure, it will give the Did You Mean ? clause. If you’re developing a search engine for your site, this spell check will come in handy. If the user had made a mistake and he was shown a “No Results Found” page, user will be annoyed. So, it’s better to…

Check whether a site is XSS vulnerable or not.

XSS is a method to hack sites which most of the newbie programmers don’t know. Here is a quick way to identify if a site is vulnerable to it. Go to a site which offers searching or other GET parameters which are outputted in the site’s page.Instead of the value in one of the GET parameter use the following value : <h1>XSS Vulnerability checker by Subin Siby<h1><script>alert(‘Site is XSS Vulnerable’)</script> For example a site…

NimBuzz Official Website hacked by Iranian Hackers

Just now. Nimbuzz main site nimbuzz.com was hacked by someone identified as Sourena.  The hacker defaced the main site to this As a proof he saved a mirror at Zone-H. The Nimbuzz website can’t be accessed right now. Google Chrome gives an error “Oops! Google Chrome could not connect to nimbuzz.com“ Nimbuzz is one of the popular chat clients in PC and mobile phones. After this attack, it’s sure that users will move…

What is SQL Injection and how to make your PHP site free from SQL Injection hacking

SQL Injection (SQLi) is a very dangerous thing that a hacker can do to your site. This happens mostly in SQL queries. Let me make you understand this in a simple way. Suppose you’re SQL query code is this: $user=$_GET[‘user’];$sql=mysql_query(“SELECT * FROM users WHERE user='”.$user.”‘”); It’s a normal code. BUT it is a very easy method for hacker to easily destroy your database. The user ID is getting from a GET request. If the…