Friday, 2024-04-26, 1:42 AM
Welcome Guest | RSS
Site menu
Login form
Buy Wifi Hacking Adapter
 

Best Laptop for Hacking
 










Main » 2011 » December » 19
1. Computer:- Yes! Of course we need the computer. Recommended computer specifications is a processor with a speed of 1.7GHz, 120GB hard disk capacity above 2GB of RAM to speed up. If you only have 1GB of RAM, Mr.Hac advise you to collect money (for students) and purchase additional RAM. It is important to guarantee the performance of your computer at its maximum.

2. Virtual Machine is required if you do not have some of the other PC to complete the laboratory work for you. For ordinary consumers, Mr.Hac recommend that you use the Oracle VM Virtualbox because it is an open-source virtualization software, free, and easy to use and tutorialnya in many blogs and Youtube. If you want the professional version, you can try the machine virtualization VMware .

3. Cloud Storage / Online Synchronization Service ... Read more »
Views: 1899 | Added by: defaultNick | Date: 2011-12-19 | Comments (0)

Predicting what will happen in 2012, therefore, is a shot in the dark: A year is virtually a lifetime in the digital era. And yet we can at least make a guess at what will happen in the early part of next year simply by looking at the trends that are shaping the latter half of this year.

Here's my best estimate of some of the innovation we'll see in 2012:

1. Touch computing

New input methods will be the dominant trend of 2012. Tablet computers such as the iPad might seem like a nice alternative to desktop and laptop computers, but I believe they're more than that: They're replacements. Just as the command line (remember that?) gave way to graphical user interfaces, so the mouse wi ... Read more »

Views: 1828 | Added by: defaultNick | Date: 2011-12-19 | Comments (1)

Your resolution may be to limit your budget or bench-press Rs 10,000 a day, but those won't necessarily put a smile on your girlfriend's face. Here are the 10 best promises you can make to keep her as happy as ever.


10. Take her out with your friends
You know that she would love to hang out with you when you go out with your friends. Unless you intend on meeting other ladies or pulling some stunts that she might not condone, take your girl out with you. She will have so much fun and love you for it.

9. Don't drink, don't smoke
Chris Rock pointed out that men never go home straight from work, they got to go "drink something, meet someone, ... Read more »
Views: 1671 | Added by: defaultNick | Date: 2011-12-19 | Comments (0)



Here are with the Issue-23, December 2011 of ClubHack Magazine. The poster of the magazine was released at recently held ClubHack 2011 Hacking conference.

This issue covers following articles:-


0x00 Tech Gyan - GSM

0x01 Tool Gyan - Echo Mirage
0x02 Mom's Guide - OWASP Mobile Security Project
0x03 Legal Gyan - Reasonable Security Practices under Information Technology (Amendment) Act, 2008
0x04 Matriux Vibhag - Forensics ? Part III
0x05 Poster - Mobile Warfare

Check http://chmag.in/ for articles.


PDF version can be download from:- http://chmag.in/issue/dec2011.pdf

Coming to ClubHack 2011 Conference, the presentations are available at: 
... Read more »
Views: 1254 | Added by: defaultNick | Date: 2011-12-19 | Comments (0)

The Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique.

Features

  • Support for injections using Mysql, SQL Server, Postgres and Oracle databases.
  • Command line interface. Different commands trigger different actions.
  • Auto-completion for commands, command arguments and database, table and columns names.
  • Support for query filters, in order to bypass certain IPS/IDS rules using gen ... Read more »
Views: 1277 | Added by: defaultNick | Date: 2011-12-19 | Comments (0)

The EC-Council or ‘The International Council of E-Commerce Consultants’ as they like to call themselves offer a range of different services, mostly in the field of Information Security training and certifications. One of their certifications, the Certified Ethical Hacker (CEH) claims to aspire to training ‘ethical’ hackers.

"CEHv7 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals.”

What I have found is the way the EC-Council promote their CEH is less than ethical and damn right unethical.

A comment left on my blog quite a while ago (2010/04/20 at 6:18 am), looked fairly authentic, however, when investigating a little further it was clear to me that ... Read more »

Views: 2063 | Added by: defaultNick | Date: 2011-12-19 | Comments (0)

How to Remove Autorun VirusHello FOX i am back with post after a 7 months gap i changed my blog design and its now very simple and easy to use. In this post i will talk about a bitchy virus file called Auto-run Virus, this  Virus easily spreading using removable media such as CD, USB, Floppy, etc.

Some people maybe still didn't know how to turn off autorun or autoplay in Windows.

Step-by-Step Procedure

1. Open Run Tasks (Click here to view the shortcut to launch Run)

2. Type : gpedit.msc (case insensitive)

3. Drill down to Computer Configuration –> Administrative Templates –> Windows Components –> Autoplay Policies –> Double click the Turn off Autoplay at the right side window.

4. There are 3 configurations available : Not Configured, Enabled, Disabled.

5. Choose Enabled then click ... Read more »
Views: 1193 | Added by: defaultNick | Date: 2011-12-19 | Comments (0)

Be Anonymous…a lot of underground computer hacker says it, do not make mistakes and create your footprint anywhere. Actually what they say is true and also very useful when hacker perform an attack too keep they identity anonymous. In this tips and trick I will write down about proxy and their type on the net.

Proxy definitions according to wikipedia : a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server.

There are 3 types of proxy service in the internet :

Transparent Proxy The transparent proxy servers change your real IP address into proxy ... Read more »
Views: 5370 | Added by: defaultNick | Date: 2011-12-19 | Comments (0)

Best Usb Hack in WorldNew Version of USB Hidden Copier has been released. Please see below for the latest features. This software will copy all the contents of all the USB drives that have been inserted in your computer and will save it to your hard drive.

Features:

1. It is totally invisible and masked enough in order not to be detected easily.

2. It will copy only a maximum of 8GB that is enough space and information will not fill out all hard drive space if you can not monitor it for a long time.

3. Content is saved in a folder named as the USB Drive name so you can find easily who is the owner of USB copied.

4. It starts at computer startup.

5. First copy is made 3 minutes after computer starts and then every 10 minutes the content will be overwritten, so you will have always lastet content of that USB. ... Read more »
Views: 4492 | Added by: defaultNick | Date: 2011-12-19 | Comments (0)

Best VPN For FreeFor Indian people thanks to Kapil Sibal ( The Master Mind :P ) soon internet filtering will be in action in India too like China . So what If you were in country that blocked your internet access, maybe this tools can help you out solve your problem. , I have tried it in Bangkok last year when i was in Thailand and it was works great, because the most famous HotSpot Shield free VPN service was already blocked from here. The latest version (for now 7 Dec 2011) is version 2.4, I will try to always update the free VPN client that works in mainland China, especially for foreigner that work or study here and can't access some of website that blocked.

One thing I like from this VPN client software because it's free and portable :-) ... Read more »
Views: 21669 | Added by: defaultNick | Date: 2011-12-19 | Comments (1)