|
Main » 2011 » December » 19
1. Computer:- Yes! Of course we need the computer. Recommended computer specifications is a processor with a speed of 1.7GHz, 120GB hard disk capacity above 2GB of RAM to speed up. If you only have 1GB of RAM, Mr.Hac advise you to collect money (for students) and purchase additional RAM. It is important to guarantee the performance of your computer at its maximum.
2. Virtual Machine is required if you do not have some of the other PC to complete the laboratory work for you. For ordinary consumers, Mr.Hac recommend that you use the Oracle VM Virtualbox because it is an open-source virtualization software, free, and easy to use and tutorialnya in many blogs and Youtube. If you want the professional version, you can try the machine virtualization VMware .
3. Cloud Storage / Online Synchronization Service
...
Read more »
|
Predicting what will happen in 2012, therefore, is a shot in the
dark: A year is virtually a lifetime in the digital era. And yet we can
at least make a guess at what will happen in the early part of next year
simply by looking at the trends that are shaping the latter half of
this year.
Here's my best estimate of some of the innovation we'll see in 2012:
1. Touch computing
New input methods will be the dominant trend of 2012. Tablet
computers such as the iPad might seem like a nice alternative to desktop
and laptop computers, but I believe they're more than that: They're
replacements. Just as the command line (remember that?) gave way to
graphical user interfaces, so the mouse wi
...
Read more »
|
Your resolution may be to limit your budget or bench-press Rs 10,000 a
day, but those won't necessarily put a smile on your girlfriend's face.
Here are the 10 best promises you can make to keep her as happy as ever.
10. Take her out with your friends
You know that she would love to hang out with you when you go out with
your friends. Unless you intend on meeting other ladies or pulling some
stunts that she might not condone, take your girl out with you. She will
have so much fun and love you for it.
9. Don't drink, don't smoke
Chris Rock pointed out that men never go home straight from work, they
got to go "drink something, meet someone,
...
Read more »
|
Here are with the Issue-23, December 2011 of ClubHack Magazine. The
poster of the magazine was released at recently held ClubHack 2011
Hacking conference.
This issue covers following articles:-
0x00 Tech Gyan - GSM
0x01 Tool Gyan - Echo Mirage
0x02 Mom's Guide - OWASP Mobile Security Project
0x03 Legal Gyan - Reasonable Security Practices under Information Technology (Amendment) Act, 2008
0x04 Matriux Vibhag - Forensics ? Part III
0x05 Poster - Mobile Warfare
Check http://chmag.in/ for articles.
PDF version can be download from:- http://chmag.in/issue/dec2011.pdf
Coming to ClubHack 2011 Conference, the presentations are available at:
...
Read more »
|
The Mole is an automatic SQL Injection exploitation tool. Only by
providing a vulnerable URL and a valid string on the site it can detect
the injection and exploit it, either by using the union technique or a
boolean query based technique.
Features
- Support for injections using Mysql, SQL Server, Postgres and Oracle databases.
- Command line interface. Different commands trigger different actions.
- Auto-completion for commands, command arguments and database, table and columns names.
- Support for query filters, in order to bypass certain IPS/IDS rules
using gen
...
Read more »
|
The EC-Council or ‘The International Council of E-Commerce
Consultants’ as they like to call themselves offer a range of different
services, mostly in the field of Information Security training and
certifications. One of their certifications, the Certified Ethical
Hacker (CEH) claims to aspire to training ‘ethical’ hackers.
"CEHv7 provides a comprehensive ethical hacking and
network security-training program to meet the standards of highly
skilled security professionals.”
What I have found is the way the EC-Council promote their CEH is less than ethical and damn right unethical.
A comment left on my blog quite a while ago (2010/04/20 at 6:18 am),
looked fairly authentic, however, when investigating a little further it
was clear to me that
...
Read more »
|
Hello FOX i am back with post after a 7 months gap i changed my blog design and its now very simple and easy to use. In this post i will talk about a bitchy virus file called Auto-run Virus, this
Virus easily spreading using removable media such as CD, USB, Floppy,
etc.
Some people maybe still didn't know how to turn off autorun or
autoplay in Windows.
Step-by-Step Procedure
1. Open Run Tasks (Click here to view the shortcut to launch Run)
2. Type : gpedit.msc (case insensitive)
3. Drill down to Computer Configuration –> Administrative Templates
–> Windows Components –> Autoplay Policies –> Double click the
Turn off Autoplay at the right side window.
4. There are 3 configurations available : Not Configured, Enabled,
Disabled.
5. Choose Enabled then click
...
Read more »
|
Be Anonymous…a lot of
underground computer hacker says it, do not make mistakes and create
your footprint anywhere. Actually what they say is true and also very
useful when hacker perform an attack too keep they identity anonymous.
In this tips and trick I will write down about proxy and their type on
the net.
Proxy definitions according to wikipedia :
a proxy server is a server (a computer system or an application) that
acts as an intermediary for requests from clients seeking resources from
other servers. A client connects to the proxy server, requesting some
service, such as a file, connection, web page, or other resource,
available from a different server.
There are 3 types of proxy service in the internet :
Transparent Proxy
The transparent proxy servers change your real IP address into proxy
...
Read more »
|
New Version of USB Hidden Copier has been released. Please see below for
the latest features.
This software will copy all the contents of all the USB drives that have
been inserted in your computer and will save it to your hard drive.
Features:
1. It is totally invisible and masked enough in order not to be detected
easily.
2. It will copy only a maximum of 8GB that is enough space and
information will not fill out all hard drive space if you can not
monitor it for a long time.
3. Content is saved in a folder named as the USB Drive name so you can
find easily who is the owner of USB copied.
4. It starts at computer startup.
5. First copy is made 3 minutes after computer starts and then every 10
minutes the content will be overwritten, so you will have always lastet
content of that USB.
...
Read more »
|
For Indian people thanks to Kapil Sibal ( The Master Mind
:P ) soon internet filtering will be in action in India too like China . So what If you were in country that blocked your internet access, maybe this tools can help you out solve your problem. , I have tried it in Bangkok last year when i was in Thailand and it was works great, because the most famous HotSpot Shield free VPN service was already blocked from here. The latest version (for now 7 Dec 2011) is version 2.4, I will try to always update the free VPN client that works in mainland China, especially for foreigner that work or study here and can't access some of website that blocked.
One thing I like from this VPN client software because it's free and portable :-)
...
Read more »
|
|
|