Alvaro J. Gene
Computer Security & Software Developer



  •   1. Vulnerability Research
  •   2. Software Development
  •   3. Electronic Books
  •   4. Other Languages

Konica Minolta FTP Utility and Filetto FTP Server

Remote Buffer Overflow Vulnerabilities (Internet of Things)

more


Cory Support v1.0

Time-Based SQL Injection in "signin.php"

more


Tekno.Portal v0.1b

Blind SQL Injection in "link.php"

more


Tekno.Portal v0.1b

SQL Injection Vulnerability in "anket.php"

more


PeepSo v1.11.2

Time-Based SQL Injection

more


Hasan MWB v1.0

Multiple Time-Based SQL Injections

more


PeepSo v1.11.2

XSS Vulnerability in "Members"

more


Tekno.Portal v0.1b

Cross-Site Scripting Vulnerability in "link.php"

more


Pie Register v3.0.15

Cross-Site Scripting Vulnerability in "Login"

more


Pie Register v3.0.17

XSS Vulnerability in "Forgot-Password"

more


Question Answer v1.2.30

Multiple XSS Vulnerabilities

more


Custom Registration Form v1.01

Multiple XSS Vulnerabilities

more


TFTPDWIN v0.4.2

Remote Buffer Overflow Exploit

more


TeraTracker: TeraTracker is an iOS application that an individual can use to track the location of many devices; more specifically, TeraTracker is an iOS application that a user can use to track in real time the coordinates (latitude and longitude) of a group of iPhones. Thanks to this program, an individual is going to be able to see the location of some devices on his/her own iPhone; furthermore, in addition to the iOS app, an administrator may use this program to see the coordinates of some devices through a web page. more


TeraBrowser: TeraBrowser is an iOS application that a user can use to store different kinds of web pages; then, after storing a group of websites, a user can use this application to load his/her webs while he/she is not connected to a computer network. more


Ultra-Secure Radar: The Ultra-Secure Radar (USR) is a security tool that a webmaster can use to monitor his/her website. Thanks to this application, an individual can see a lot of information about his/her visitors, such as a visitor’s operating system, browser, IP Address, and many other details. Furthermore, if a webmaster installs this computer application, he/she will be able to see what kind of files a visitor is downloading to his/her computer; for instance, if a visitor is downloading an image/file, an administrator is going to notice that a visitor is downloading X or Y image/file thanks to the Ultra-Secure Radar (USR). more


Ultra-Secure Login Panel: The Ultra-Secure Login Panel (USLP) is a sophisticated and complex security tool that a user can use to protect sensitive information/files/applications because this computer software is composed of several functions that automatically deals with many computer attacks. Therefore, if an individual has sensitive information inside of an administrative panel, he/she can use this security tool to avoid a lot of criminals and intruders. more

The Easiest Way to Learn about iOS Development: This tutorial was written for those beginners or newbies who want to start learning how to develop iOS applications from zero, so basic knowledge about software development is not a requirement to understand the content of those papers. Thanks to this PDF, an individual who do not know anything about computer programming can start expanding his/her knowledge in the world of Apple to be able to build his/her first iOS applications; for example, in this tutorial, a beginner can expand his/her knowledge and enhance his/her programming skills to be able to build a web browser, which is an internet application that a user can use to open different kinds of web pages and other resources. more


The Easiest Way to Learn C/C++/C#: In this ebook, you are going to find some chapters or sections related to those topics: First, you will see some sections related to basic operators, conditional/loop statements, and similar topics. Second, you will learn how to build networking applications, such as a client and a server. Finally, you will see some chapters related to hacking or computer security; in other words, you will see some sections that will teach you how to build some security tools, including a port scanner and an HTTP checker. more


The Easiest Way to Learn Java: This tutorial was written for those kinds of individuals or newbies who want to start learning Java from zero without any previous experience/knowledge on the Java programming language; therefore, if an individual or newbie wants to start building his/her first Java application, he/she can do it thanks to the Easiest Way to Learn Java. more


An Introduction to PHP and MySQL: Why should you learn about PHP and MySQL? Learning about PHP and MySQL is very important to start developing a great variety of web-applications, such as blogs, forums, chats, security tools, port scanners, and more. Furthermore, if you are interested in the field of computer security, you should learn about PHP and MySQL because there are a great variety of web-applications with vulnerabilities or security flaws, including stores. more

El Libro de Teraexe: El Libro de Teraexe es un tutorial para todos aquellos que se están iniciando en el mundo del hacking y la seguridad informática. En este tutorial, no solamente aprenderán las técnicas de ataque (explotación de vulnerabilidades e infiltraciones en sistemas), sino también las técnicas de defensa (técnicas de contra-ataque y herramientas de seguridad). En las primeras páginas del PDF, se muestra como armar muestro propio laboratorio para examinar 17 tipos de vulnerabilidades. Luego, una vez que el informático adquiere los conocimientos relacionados con los ataques y la explotación de vulnerabilidades, él/ella aprenderá a utilizar los agujeros de seguridad para desarrollar sus propios sistemas de defensa que automáticamente puedan contra-atacar a un intruso o hacker que busca infiltrarse en nuestras computadoras. Además de las técnicas de contra-ataque que pueden darle "un golpe" a un intruso que busca infiltrarse en nuestros servidores, El Libro de Teraexe también brinda información y herramientas que son efectivas para asegurar nuestros equipos sin tener que contra-atacar a los intrusos; por ejemplo, al final del tutorial, se muestra como instalar aplicaciones de escritorio y website para monitorear lo que sucede dentro de nuestra propia computadora/website. more


计算机安全隐患:
你們好,我的名字是Alvaro。
我想讨论关于一個电脑错误。
黑客可以使用此計算機安全漏洞竊取密碼。
more


Внедрение SQL - кода:
Здравствуйте всем.
меня зовут Alvaro.
Я покажу вам видео о Внедрение SQL-кода.
more