Thursday, 2024-03-28, 5:06 PM
Welcome Guest | RSS
Site menu
Login form
Buy Wifi Hacking Adapter
 

Best Laptop for Hacking
 










Main » 2011 » December » 21

Puppy Linux is an evolutionary operating system, based on GNU Linux. What's different here is that Puppy is extraordinarily small, yet quite full featured. Puppy Linux can boot into a 64MB ramdisk, and that's it, the whole caboodle runs in RAM.


Unlike live CD distributions that have to keep pulling stuff off the CD, Puppy in its entirety loads into RAM. This means that all applications start in the blink of an eye and respond to user input instantly.

Puppy Linux has the ability to boot off a flash card or any USB memory device (flash-Puppy), CDROM (live-Puppy), Zip disk or LS/120/240 Superdisk (zippy-Puppy), floppy disks (floppy-Puppy), internal hard drive (hard-Puppy).

Puppy occupies about 50-60M on my USB Flash ... Read more »

Views: 1746 | Added by: defaultNick | Date: 2011-12-21 | Comments (1)

Chinese hackers broke into computers at the U.S. Chamber of Commerce and had access to everything on its systems including information on about 3 million of its members, according to a report in today's Wall Street Journal.

The
report quotes unnamed sources as saying that the intrusion was discovered and shut down in May 2010, possibly a year after the hackers may have first gained access to the chamber's networks.

According to the Journal, investigators have been unable to determine specifically what information may have been compromised. However, it appears that the hackers targeted four Chamber employees who worked on Asia policy, the Journal said. About six weeks' worth of email belonging to these four employees is believed ... Read more »
Views: 857 | Added by: defaultNick | Date: 2011-12-21 | Comments (0)

I knw you all are very good in computers but why i am writing this post is because, what i found is when every i got any pc of a B.Tech student(BookWorm Especially) or a Business Man. The worst thing i found is that their systems are full of unwanted software and adding charm on that they have not formatted computer from last 3 or 4 years. That means from the day of purchasing a new laptop they are using the same windows from last 3 years.

And at last they will say in Hindi ( Yaar dekhna iski speed badi slow ho gyi hai, In my heart i reply :- Abey speed to kam hogi hi bachee ki jaan lega 3 saal se to). Anyways so if you are from one of these which i think no one will be accepting ha ha then please read the below tips and make your PC run like a Firebullet :).


1.Let your PC boot up completely before opening any applications.

2.Refres ... Read more »
Views: 1236 | Added by: defaultNick | Date: 2011-12-21 | Comments (0)

Linux is from past considered as one of the best secure operating system. Almost virus free Ubuntu help you to stay safe from various cyber attacks. But here in this tute we will talk about hacking Ubuntu . We will try to hack Ubuntu's Root which is mostly not accessible by the user even if he is teh administrator so what to do so that we can access the Root of Ubuntu . I tried it on Ubuntu 11.10 it works . Here are some Steps you have to follow :-

Step 1:- Start Ubuntu and  Login to your user

Step 2:-  Open the terminal window

Step 3:- Now here type "sudo passwd root"

Step 4:-  Now type your password and press enter

Step 5:- Now type new ... Read more »
Views: 1994 | Added by: defaultNick | Date: 2011-12-21 | Comments (0)

Almost everyone of us using the Intel Processors may be i3 , i5 or even i7 too. But what exactly running in these processors do you know?. Here in this tute today i will tell you what it is inside of Intel's  processors. Starting from Intel Core i3 to Intel Core i7 you will be know each and every inside pack of these processors.


Internal Pack of Core i3:

* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading (efficient use of processor resources)
* 3-4 MB Catche
* 32 nm Silicon (less heat and energy)

Internal Pack of Core i5:

* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor resources)
* 3-8 ... Read more »
Views: 1609 | Added by: defaultNick | Date: 2011-12-21 | Comments (0)

This is really irritating for me when in company students came for me to get study material everyone having a common virus that bring up some shortcuts of My Document. Here is the tutorial in which i will tell you how you can ruin these shortcut files.

Step 1:- Click on "Start" -->Run --> type cmd and click on OK.
Here I assume your pen drive letter as G:

Step 2:- Enter this command.

attrib -h -r -s /s /d g:\*.*

You can copy the above command --> Right-click in the Command Prompt and paste it.

Note : Don't forget to replace the letter g with your pen drive letter.

Now press "Enter".

Now check for your files and folder in Pen Drive.
Views: 1077 | Added by: defaultNick | Date: 2011-12-21 | Comments (0)

FTP (File Transfer Protocol) is an older protocol for moving files back and forth over the Internet and other networks. All modern web browsers still speak FTP, which was sometimes used as a substitute for HTTP in the early days of the web. FTP is still used often as a means of downloading large files.

Many web hosts still offer FTP as the preferred way of uploading new web pages to a website. However, because there is no encryption of your password, FTP is not the best choice for this purpose. And since there is no encryption of the files being moved, FTP is a poor choice indeed for more sensitive information.

SFTP (Secure FTP) is a popular replacement. Built on SSL, SFTP is just as secure as HTTPS. And most modern FTP clients, such as the free, high-quality FileZilla program for W ... Read more »
Views: 2985 | Added by: defaultNick | Date: 2011-12-21 | Comments (0)

Let's say that it takes you exactly one minute to read through this post. In that time, over 6,600 photos will be uploaded to Flickr, about 70 new domains will be registered, over 1,200 new ads will be created on Craigslist, and more. Here's what happens on the Internet every 60 seconds.

That disclaimer aside and without further ado, here's what's happening each minute:

* Search engine Google serves more that 694,445 queries

* 6,600+ pictures are uploaded to Flickr

* 600 videos are uploaded to YouTube, amounting to 25+ hours of    content

* 695,000 status updates, 79,364 wall posts and 510,040 comments  are published on social networking site Facebook

* 70 new domain ... Read more »
Views: 1768 | Added by: defaultNick | Date: 2011-12-21 | Comments (0)