• Featured

    Windows 8 Could Have Nine Different Backgrounds and Editions

  • Featured

    Don't miss these 10 Things if you are going for Picnic.

  • Articles

    iPhone 6 Will Look Like

  • Articles

    Solar Powered UAVs To Replace Satellites

  • Saturday 20 April 2013

    How to Watch Security Camera Streams on the 

                                  InternetOpen your browser and search it
    inurl:/view.shtml
    intitle:”Live View / – AXIS” | inurl:view/view.shtml^
    inurl:ViewerFrame?Mode=
    inurl:ViewerFrame?Mode=Refresh
    inurl:axis-cgi/jpg
    inurl:view/indexFrame.shtml
    inurl:view/index.shtml
    inurl:view/view.shtml
    liveapplet
    intitle:”live view” intitle:axis
    intitle:liveapplet
    allintitle:”Network Camera NetworkCamera”
    intitle:axis intitle:”video server”
    intitle:liveapplet inurl:LvAppl
    intitle:”EvoCam” inurl:”webcam.html”
    intitle:”Live NetSnap Cam-Server feed”
    intitle:”Live View / - AXIS 206M”
    intitle:”Live View / - AXIS 206W”
    intitle:”Live View / - AXIS 210″
    inurl:indexFrame.shtml Axis
    intitle:start inurl:cgistart
    intitle:”WJ-NT104 Main Page”
    intitle:snc-z20 inurl:home/
    intitle:snc-cs3 inurl:home/
    intitle:snc-rz30 inurl:home/
    intitle:”sony network camera snc-p1″
    intitle:”sony network camera snc-m1″
    intitle:”Toshiba Network Camera” user login
    intitle:”i-Catcher Console - Web Monitor”

    How to Watch Security Camera Streams on the Internet

    Posted at  Saturday, April 20, 2013  |  in  HACKING  |  Read More»

    How to Watch Security Camera Streams on the 

                                  InternetOpen your browser and search it
    inurl:/view.shtml
    intitle:”Live View / – AXIS” | inurl:view/view.shtml^
    inurl:ViewerFrame?Mode=
    inurl:ViewerFrame?Mode=Refresh
    inurl:axis-cgi/jpg
    inurl:view/indexFrame.shtml
    inurl:view/index.shtml
    inurl:view/view.shtml
    liveapplet
    intitle:”live view” intitle:axis
    intitle:liveapplet
    allintitle:”Network Camera NetworkCamera”
    intitle:axis intitle:”video server”
    intitle:liveapplet inurl:LvAppl
    intitle:”EvoCam” inurl:”webcam.html”
    intitle:”Live NetSnap Cam-Server feed”
    intitle:”Live View / - AXIS 206M”
    intitle:”Live View / - AXIS 206W”
    intitle:”Live View / - AXIS 210″
    inurl:indexFrame.shtml Axis
    intitle:start inurl:cgistart
    intitle:”WJ-NT104 Main Page”
    intitle:snc-z20 inurl:home/
    intitle:snc-cs3 inurl:home/
    intitle:snc-rz30 inurl:home/
    intitle:”sony network camera snc-p1″
    intitle:”sony network camera snc-m1″
    intitle:”Toshiba Network Camera” user login
    intitle:”i-Catcher Console - Web Monitor”

    1047 comments:

    «Oldest   ‹Older     Newer›   Newest»
    «Oldest ‹Older     Newer› Newest»

             Bitdefender total security 2013 for 65 years             
                                                 Crack


                                      http://www.mediafire.com/download.php?d3av1abozl738jh

    bitdefender total security 2013 for 65 years Crack

    Posted at  Saturday, April 20, 2013  |  in  HACKING  |  Read More»

             Bitdefender total security 2013 for 65 years             
                                                 Crack


                                      http://www.mediafire.com/download.php?d3av1abozl738jh

    103 comments:

    Internet Download Manager 6.12
    S/N: 7G7QY-NZWKQ-23KRA-RAMQ4
    S/N: SPOZ9-2E9IO-AKDRY-LIKEU

    Internet Download Manager 6.14
    S/N: ZFX1T-5VOMY-ZIT4Y-FHFPD

    Internet Download Manager 6.14.1.0
    S/N: Y30OZ-DNQH7-FRWPW-YYZMA

    Internet Download Manager 6.15.6
    S/N: Y5LUM-NFE0Q-GJR2L-5B86I
    S/N: 4BTJF-DYNIL-LD8CN-MM8X5
    S/N: XAGZU-SJ0FO-BDLTK-B3C3V

    Internet Download Manager 6.17.3
    S/N: RLDGN-OV9WU-5W589-6VZH1
    S/N: HUDWE-UO689-6D27B-YM28M
    S/N: UK3DV-E0MNW-MLQYX-GENA1
    S/N: 398ND-QNAGY-CMMZU-ZPI39
    S/N: GZLJY-X50S3-0S20D-NFRF9
    S/N: W3J5U-8U66N-D0B9M-54SLM
    S/N: EC0Q6-QN7UH-5S3JB-YZMEK
    S/N: UVQW0-X54FE-QW35Q-SNZF5
    S/N: FJJTJ-J0FLF-QCVBK-A287M

    Internet Download Manager keys

    Posted at  Saturday, April 20, 2013  |  in  HACKING  |  Read More»

    Internet Download Manager 6.12
    S/N: 7G7QY-NZWKQ-23KRA-RAMQ4
    S/N: SPOZ9-2E9IO-AKDRY-LIKEU

    Internet Download Manager 6.14
    S/N: ZFX1T-5VOMY-ZIT4Y-FHFPD

    Internet Download Manager 6.14.1.0
    S/N: Y30OZ-DNQH7-FRWPW-YYZMA

    Internet Download Manager 6.15.6
    S/N: Y5LUM-NFE0Q-GJR2L-5B86I
    S/N: 4BTJF-DYNIL-LD8CN-MM8X5
    S/N: XAGZU-SJ0FO-BDLTK-B3C3V

    Internet Download Manager 6.17.3
    S/N: RLDGN-OV9WU-5W589-6VZH1
    S/N: HUDWE-UO689-6D27B-YM28M
    S/N: UK3DV-E0MNW-MLQYX-GENA1
    S/N: 398ND-QNAGY-CMMZU-ZPI39
    S/N: GZLJY-X50S3-0S20D-NFRF9
    S/N: W3J5U-8U66N-D0B9M-54SLM
    S/N: EC0Q6-QN7UH-5S3JB-YZMEK
    S/N: UVQW0-X54FE-QW35Q-SNZF5
    S/N: FJJTJ-J0FLF-QCVBK-A287M

    8 comments:


    cracking WEP key in 1 min


    http://www.youtube.com/watch?v=7LVy-TxKMrU

    cracking WEP key with fern-wifi-cracker

    Posted at  Saturday, April 20, 2013  |  in  HACKING  |  Read More»


    cracking WEP key in 1 min


    http://www.youtube.com/watch?v=7LVy-TxKMrU

    3 comments:

                                                  Proxy Chaining/Bouncing :
     Proxy chaining is basically the idea of using more than one Proxy to connect to the Internet, The main use of proxy Chaining is to hide your identity .You can connect to as many proxies you want. The more you connect, the more anonymous you will be, Proxy Chains makes it very difficult to trace you back for Eg:- lets take proxy chain which passes through various countries
    <-----------Proxy-------------> Your PC ----------> India --> Pakistan --> USA --->China --------->Web site
    Its very difficult to-trace back such proxies since it passes through various countries, Thus Proxy chaining is generally a technique used by hackers to hide their identity online, How ever that being said its not impossible to trace proxy chains

    Proxy Chaining/Bouncing

    Posted at  Saturday, April 20, 2013  |  in  HACKING  |  Read More»

                                                  Proxy Chaining/Bouncing :
     Proxy chaining is basically the idea of using more than one Proxy to connect to the Internet, The main use of proxy Chaining is to hide your identity .You can connect to as many proxies you want. The more you connect, the more anonymous you will be, Proxy Chains makes it very difficult to trace you back for Eg:- lets take proxy chain which passes through various countries
    <-----------Proxy-------------> Your PC ----------> India --> Pakistan --> USA --->China --------->Web site
    Its very difficult to-trace back such proxies since it passes through various countries, Thus Proxy chaining is generally a technique used by hackers to hide their identity online, How ever that being said its not impossible to trace proxy chains

    11 comments:

    Ping Sweep? 
    First of all you should know what is ping, Ping is basically a system's network based utility which is used to identify that host is alive or dead or technically you can call it as echo reply. By alive i mean that host( computer, system, network, website etc..) is active and by dead means host is in shutdown mode.
    Note: Anything can be a host like website, computer system, printer, network or any device.

    Now what is Ping Sweep, basically ping sweep is basically a information gathering technique which is used to identify live hosts by pinging them. Let's understand it more technically, Ping Sweep is also called Ping scan or ICMP sweep (Internet Control message protocol) or 2 way handshake protocol. It is two way handshake protocol because one host sends data(packets) and other host validates the data and return the acknowledgement (basically packets) that ping is successful or not.

    Ping Sweep?

    Posted at  Saturday, April 20, 2013  |  in  HACKING  |  Read More»

    Ping Sweep? 
    First of all you should know what is ping, Ping is basically a system's network based utility which is used to identify that host is alive or dead or technically you can call it as echo reply. By alive i mean that host( computer, system, network, website etc..) is active and by dead means host is in shutdown mode.
    Note: Anything can be a host like website, computer system, printer, network or any device.

    Now what is Ping Sweep, basically ping sweep is basically a information gathering technique which is used to identify live hosts by pinging them. Let's understand it more technically, Ping Sweep is also called Ping scan or ICMP sweep (Internet Control message protocol) or 2 way handshake protocol. It is two way handshake protocol because one host sends data(packets) and other host validates the data and return the acknowledgement (basically packets) that ping is successful or not.

    11 comments:

    IP spoofing
    IP spoofing is the process of creating IP packets with a spoofed source with the purpose of hiding the identity of sender. IP spoofing is a common method that is used by spammers and scammers to mislead others on the origin of the information they send. Hackers use IP spoofing so they do not get caught spamming and to perpetrate denial of service attacks.

    Tools - For Windows
    Engage Packet Builder v2.20 - Scriptable packet builder for Windows
    HPing v2.0.0 - Command-line oriented TCP/IP packet assembler/analyzer
    Nemesis v1.4 beta3 - Command-line portable IP stack
    Colasoft Packet Builder v1.0 - Tool for creating custom network packets
    Colasoft Packet Player v1.1 - Packet replay tool
    PacketExcalibur v1.0.2 - Graphical and scriptable network packet engine
    Scapy v2.0.0.10 - Interactive packet manipulation tool
    Spoofer v0.5 - IP Spoofing Tester
    NMap v4.68 - Utility for network exploration and security auditing

    Tools - For Linux

    LSRscan v1.0 - Loose Source Route Scanning Tool
    Scapy v2.0.0.10 - Interactive packet manipulation tool
    Sendip v2.5-1 - Send completely arbitrary packets out over the network
    Spoofer v0.5 - IP Spoofing Tester
    Yersina v0.7.1 - Tool to exploit weakenesses in different network protocols
    HPing v2.0.0 - Command-line TCP/IP packet assembler/analyzer
    IRPAS v0.8 - Internetwork Routing Portocol Attack Suite (File2Cable etc.)
    LSRtunnel v0.2.1 - Loose Source Route Tunneling Tool
    Nemesis v1.4 beta3 - Command-line portable IP stack
    NMap v4.76 - Utility for network exploration and security auditing
    PacketExcalibur v1.0.2 - Graphical and scriptable network packet engine
    http://torrents.thepiratebay.org/4428715/Network_hacking_tools_-_IP_Spoofing.4428715.TPB.torrent

    IP spoofing

    Posted at  Saturday, April 20, 2013  |  in  HACKING  |  Read More»

    IP spoofing
    IP spoofing is the process of creating IP packets with a spoofed source with the purpose of hiding the identity of sender. IP spoofing is a common method that is used by spammers and scammers to mislead others on the origin of the information they send. Hackers use IP spoofing so they do not get caught spamming and to perpetrate denial of service attacks.

    Tools - For Windows
    Engage Packet Builder v2.20 - Scriptable packet builder for Windows
    HPing v2.0.0 - Command-line oriented TCP/IP packet assembler/analyzer
    Nemesis v1.4 beta3 - Command-line portable IP stack
    Colasoft Packet Builder v1.0 - Tool for creating custom network packets
    Colasoft Packet Player v1.1 - Packet replay tool
    PacketExcalibur v1.0.2 - Graphical and scriptable network packet engine
    Scapy v2.0.0.10 - Interactive packet manipulation tool
    Spoofer v0.5 - IP Spoofing Tester
    NMap v4.68 - Utility for network exploration and security auditing

    Tools - For Linux

    LSRscan v1.0 - Loose Source Route Scanning Tool
    Scapy v2.0.0.10 - Interactive packet manipulation tool
    Sendip v2.5-1 - Send completely arbitrary packets out over the network
    Spoofer v0.5 - IP Spoofing Tester
    Yersina v0.7.1 - Tool to exploit weakenesses in different network protocols
    HPing v2.0.0 - Command-line TCP/IP packet assembler/analyzer
    IRPAS v0.8 - Internetwork Routing Portocol Attack Suite (File2Cable etc.)
    LSRtunnel v0.2.1 - Loose Source Route Tunneling Tool
    Nemesis v1.4 beta3 - Command-line portable IP stack
    NMap v4.76 - Utility for network exploration and security auditing
    PacketExcalibur v1.0.2 - Graphical and scriptable network packet engine
    http://torrents.thepiratebay.org/4428715/Network_hacking_tools_-_IP_Spoofing.4428715.TPB.torrent

    26 comments:


    What is Windows Temporary Files

    A Windows temporary file is created under the following three circumstances: 

    1. Windows Desktop applications, such as Write, and multiple document interface (MDI) applications, such as Excel, create temporary files to handle necessary user editing.

      Because a Desktop application cannot have multiple documents open at once, it must immediately create a temporary file that allows you to undo any editing. MDI applications create temporary files only when necessary (for related editing), rather than for every worksheet that is open.
    2. When you run an MS-DOS-based standard application with Windows/286, Windows/286 creates a temporary file (for example, ~PIFCHFA.TMP) so that it can swap to disk to make room for other applications to use memory.
    3. When you print from Windows or any Windows-based application with the spooler enabled, Windows creates temporary files on the hard disk. Windows spools the print job to the temporary file and then sends it to the appropriate printer as a background operation.
    Note: Microsoft recommends that you have approximately 2 megabytes (MB) of free disk space available for the creation of temporary files.

    What to Do with Temporary Files

    A number of files may appear on the hard drive in various directories beginning with a tilde character (~) and ending with a .TMP extension. These may be temporary files created by Windows that remain on the hard drive due to an irregular exit from a Windows session. 

    Under normal conditions, these files are closed and deleted by Windows when you quit a Windows session. However, if you quit Windows in an irregular way (for example, restarting the computer or turning it off during an active Windows session) the files are not closed or deleted. 

    The temporary files should be located in a designated subdirectory of their own. If temporary files appear in the root directory, you may have an invalid SET TEMP statement. Check for the following conditions: 

    1. Using a text editor, such as Microsoft Windows Notepad, open the AUTOEXEC.BAT file and make sure it includes a valid SET TEMP statement. This statement should be similar to the following:
      SET TEMP=C:\WINDOWS\TEMP
            
    2. Note the path that the SET TEMP statement points to and check to ensure that such a subdirectory does exist. If not, create a subdirectory to match the SET TEMP statement.
    3. If the SET TEMP statement is pointing to a RAM drive, make sure the RAM drive is large enough to hold the temporary files being created.
    By ensuring that there is a valid SET TEMP statement and a separate subdirectory for temporary files, these files can easily be deleted on a regular basis. 

    To delete a temporary file, use the following steps:
    1. Close Windows.
    2. From the MS-DOS command prompt, change to the TEMP directory.
    3. Delete any existing .TMP files. Make sure Windows is not running at the time these files are deleted. Some of these .TMP files may be files that Windows is using.

    What is Windows Temporary Files

    Posted at  Saturday, April 20, 2013  |  in  windows  |  Read More»


    What is Windows Temporary Files

    A Windows temporary file is created under the following three circumstances: 

    1. Windows Desktop applications, such as Write, and multiple document interface (MDI) applications, such as Excel, create temporary files to handle necessary user editing.

      Because a Desktop application cannot have multiple documents open at once, it must immediately create a temporary file that allows you to undo any editing. MDI applications create temporary files only when necessary (for related editing), rather than for every worksheet that is open.
    2. When you run an MS-DOS-based standard application with Windows/286, Windows/286 creates a temporary file (for example, ~PIFCHFA.TMP) so that it can swap to disk to make room for other applications to use memory.
    3. When you print from Windows or any Windows-based application with the spooler enabled, Windows creates temporary files on the hard disk. Windows spools the print job to the temporary file and then sends it to the appropriate printer as a background operation.
    Note: Microsoft recommends that you have approximately 2 megabytes (MB) of free disk space available for the creation of temporary files.

    What to Do with Temporary Files

    A number of files may appear on the hard drive in various directories beginning with a tilde character (~) and ending with a .TMP extension. These may be temporary files created by Windows that remain on the hard drive due to an irregular exit from a Windows session. 

    Under normal conditions, these files are closed and deleted by Windows when you quit a Windows session. However, if you quit Windows in an irregular way (for example, restarting the computer or turning it off during an active Windows session) the files are not closed or deleted. 

    The temporary files should be located in a designated subdirectory of their own. If temporary files appear in the root directory, you may have an invalid SET TEMP statement. Check for the following conditions: 

    1. Using a text editor, such as Microsoft Windows Notepad, open the AUTOEXEC.BAT file and make sure it includes a valid SET TEMP statement. This statement should be similar to the following:
      SET TEMP=C:\WINDOWS\TEMP
            
    2. Note the path that the SET TEMP statement points to and check to ensure that such a subdirectory does exist. If not, create a subdirectory to match the SET TEMP statement.
    3. If the SET TEMP statement is pointing to a RAM drive, make sure the RAM drive is large enough to hold the temporary files being created.
    By ensuring that there is a valid SET TEMP statement and a separate subdirectory for temporary files, these files can easily be deleted on a regular basis. 

    To delete a temporary file, use the following steps:
    1. Close Windows.
    2. From the MS-DOS command prompt, change to the TEMP directory.
    3. Delete any existing .TMP files. Make sure Windows is not running at the time these files are deleted. Some of these .TMP files may be files that Windows is using.

    56 comments:

    About-Privacy Policy-Contact us
    Copyright © 2013 infinityCEH. Blogger Template by Bloggertheme9
    Proudly Powered by Blogger.
    back to top