Posted by Hacker Pilu Wednesday, July 13, 2011
CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart.
A CAPTCHA is a type of challenge-response test used in computing as an attempt to ensure that the response is generated by a person. The process usually involves one computer (a server) asking a user to complete a simple test which the computer is able to generate and grade. Because other computers are supposedly unable to solve the CAPTCHA, any user entering a correct solution is presumed to be human.
Applications Of Captcha
Preventing automated software from performing action
CAPTCHAs are used in attempts to prevent automated software from performing actions which degrade the quality of service of a given system, whether due to abuse or resource expenditure. CAPTCHAs can be deployed to protect systems vulnerable to e-mail spam, such as the webmail services of Gmail, Hotmail, and Yahoo! Mail.
Preventing automated posting
CAPTCHAs are also used to minimize automated posting to blogs, forums and wikis, whether as a result of commercial promotion, orharassment and vandalism. CAPTCHAs also serve an important function in rate limiting. Automated usage of a service might be desirable until such usage is done to excess and to the detriment of human users. In such cases, administrators can use CAPTCHA to enforce automated usage policies based on given thresholds. The article rating systems used by many news web sites are another example of an online facility vulnerable to manipulation by automated software.
Preventing Dictionary Attacks.
CAPTCHAs can also be used to prevent dictionary attacks in password systems. The idea is simple: prevent a computer from being able to iterate through the entire space of passwords by requiring it to solve a CAPTCHA after a certain number of unsuccessful logins.
Hacker PiluThis is a short description in the author block about the author. You edit it by entering text in the "Biographical Info" field in the user admin panel.
Hack / Bypass .asp sites using SQL InjectionHack any .asp sites with SQL Injection attack. 1st, Open Google and search for adminlogin.asp or admin\login.asp 2nd, Open any searc...
Reset Samsung Mobile Tracker CodeThese Code Reset All Code In Your Samsung Mobile(Any Model) Samsung Tracker Code Also Reset By These Codes If You Forget Your Code...
Top 103 Shells For HackingMost popular 103 Shells For Hacking Shell List: C99Shell v. 1.0 beta (5.02.2005) PHP b374k PHP b374k-mini-shell PHP Cyber...
Harry Potter 7 Part 2 Full Movie Download [Available in English, Russian, Hindi Lang.]Released On : July 15, 2011 Genre : Action | Adventure | Fantasy Starcast : Bill Nighy | Emma Watson | Richard Griffiths | Harry...
Get upto 2gb Graphics Memory without any SoftwareGet upto 2gb Graphics memory Just do this steps and you will get upto 2 gb graphics memory. Run >> regedit.exe >> find H...
WEAKERTHAN - Another OS For HackersWeakerthan 3.6 OS for Hackers Most of the hackers would have heard about Backtrack. Weakerthan is another Linux based pentesting...
Docomo free Hello-Tune HackGet Free Hello-Tune for 7days abselutly free...!!! just Dial *678*777# after the above no. Dialled you will get message that "...
Get upto 100 MBPS Internet speed [Funny Trick]Today I will show you how to Fool your friends. They should think that you have internet connection up to 100 MBPS speed. 1 st ,...
How to Unlock your CellphoneWhat are Unlocked Cellphones? and Why anybody would want to Unlock it? An Unlocked Cellphone is one that can be used on all networks ...
Extract the contents of a .msi executable setup fileSetup executable files are o f many types among which there are two famous types, . msi and . exe files. Both the setup files are self ...
- email hacking
- Facebook App
- game maker
- Help Desk Answer
- Legit or Scam
- Official Notices
- speed up
- SQL Attack
- Tips and Tricks
- win rar
- windows 7
- Windows XP