Saturday, 2024-05-04, 9:59 PM
Welcome Guest | RSS
Site menu
Login form
Buy Wifi Hacking Adapter
 

Best Laptop for Hacking
 










Main » Entries archive
« 1 2 ... 10 11 12 13 14 ... 24 25 »

The Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique.

Features

  • Support for injections using Mysql, SQL Server, Postgres and Oracle databases.
  • Command line interface. Different commands trigger different actions.
  • Auto-completion for commands, command arguments and database, table and columns names.
  • Support for query filters, in order to bypass certain IPS/IDS rules using gen ... Read more »
Views: 1277 | Added by: defaultNick | Date: 2011-12-19 | Comments (0)

The EC-Council or ‘The International Council of E-Commerce Consultants’ as they like to call themselves offer a range of different services, mostly in the field of Information Security training and certifications. One of their certifications, the Certified Ethical Hacker (CEH) claims to aspire to training ‘ethical’ hackers.

"CEHv7 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals.”

What I have found is the way the EC-Council promote their CEH is less than ethical and damn right unethical.

A comment left on my blog quite a while ago (2010/04/20 at 6:18 am), looked fairly authentic, however, when investigating a little further it was clear to me that ... Read more »

Views: 2065 | Added by: defaultNick | Date: 2011-12-19 | Comments (0)

How to Remove Autorun VirusHello FOX i am back with post after a 7 months gap i changed my blog design and its now very simple and easy to use. In this post i will talk about a bitchy virus file called Auto-run Virus, this  Virus easily spreading using removable media such as CD, USB, Floppy, etc.

Some people maybe still didn't know how to turn off autorun or autoplay in Windows.

Step-by-Step Procedure

1. Open Run Tasks (Click here to view the shortcut to launch Run)

2. Type : gpedit.msc (case insensitive)

3. Drill down to Computer Configuration –> Administrative Templates –> Windows Components –> Autoplay Policies –> Double click the Turn off Autoplay at the right side window.

4. There are 3 configurations available : Not Configured, Enabled, Disabled.

5. Choose Enabled then click ... Read more »
Views: 1194 | Added by: defaultNick | Date: 2011-12-19 | Comments (0)

Be Anonymous…a lot of underground computer hacker says it, do not make mistakes and create your footprint anywhere. Actually what they say is true and also very useful when hacker perform an attack too keep they identity anonymous. In this tips and trick I will write down about proxy and their type on the net.

Proxy definitions according to wikipedia : a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server.

There are 3 types of proxy service in the internet :

Transparent Proxy The transparent proxy servers change your real IP address into proxy ... Read more »
Views: 5372 | Added by: defaultNick | Date: 2011-12-19 | Comments (0)

Best Usb Hack in WorldNew Version of USB Hidden Copier has been released. Please see below for the latest features. This software will copy all the contents of all the USB drives that have been inserted in your computer and will save it to your hard drive.

Features:

1. It is totally invisible and masked enough in order not to be detected easily.

2. It will copy only a maximum of 8GB that is enough space and information will not fill out all hard drive space if you can not monitor it for a long time.

3. Content is saved in a folder named as the USB Drive name so you can find easily who is the owner of USB copied.

4. It starts at computer startup.

5. First copy is made 3 minutes after computer starts and then every 10 minutes the content will be overwritten, so you will have always lastet content of that USB. ... Read more »
Views: 4494 | Added by: defaultNick | Date: 2011-12-19 | Comments (0)

Best VPN For FreeFor Indian people thanks to Kapil Sibal ( The Master Mind :P ) soon internet filtering will be in action in India too like China . So what If you were in country that blocked your internet access, maybe this tools can help you out solve your problem. , I have tried it in Bangkok last year when i was in Thailand and it was works great, because the most famous HotSpot Shield free VPN service was already blocked from here. The latest version (for now 7 Dec 2011) is version 2.4, I will try to always update the free VPN client that works in mainland China, especially for foreigner that work or study here and can't access some of website that blocked.

One thing I like from this VPN client software because it's free and portable :-) ... Read more »
Views: 21671 | Added by: defaultNick | Date: 2011-12-19 | Comments (1)

If your computer is infected with a virus, you'll want to remove it as quickly as possible. A fast way to check for viruses is to use an online scanner, such as the Microsoft Safety Scanner. The scanner is a free online service that helps you identify and remove viruses, clean up your hard disk, and generally improve your computer's performance.

If you're not sure whether your computer has a virus, see How can I tell if my computer has a virus? to check for some telltale signs. To try a different online scanner, follow the links to other companies that provide them on the Windows Security software providers webpage.

If you can connect to the Internet

If you can reach a website using your web browser, run an online scan.

To run the Microsoft Safety Scanner

Go to the Microsoft Safety Scanner we ... Read more »
Views: 2642 | Added by: defaultNick | Date: 2011-12-18 | Comments (0)

What is eWhoring?


A whore is a whore and e whoring means an online whore. This might sound a bit uncomfortable to some people but making money through ewhoring is the latest buzz. eWhoring actually means posing yourself as a girl on the Internet.


Why would I pose as a girl?

Alright, I know this is a genuine question. Posing as a girl on Internet, especially chat means involving some perverts on chat and sending them to a site which makes you money.

How do I make money here?

Lot of dating (adult or non-adult) networks pay you once a person fills in his details and submits a form. This income can range from $1.45 to unlimited. ... Read more »

Views: 4250 | Added by: defaultNick | Date: 2011-12-18 | Comments (0)

Akash Table Price in India

 DataWind, the Canadian company that is manufacturing Aakash, the world’s cheapest tablet, finally has started the online booking and pre-booking of the much anticipated low cost Android tablet.

Online booking is for students’ version of the tablet and pre-booking is for UbiSlate 7, the upgraded version of Aakash.

Aakash tablet is now available on http://www.aakashtablet.com/. Datawind puts up nearly about 30,000 t ... Read more »

Views: 4380 | Added by: defaultNick | Date: 2011-12-18 | Comments (2)