• Featured

    Windows 8 Could Have Nine Different Backgrounds and Editions

  • Featured

    Don't miss these 10 Things if you are going for Picnic.

  • Articles

    iPhone 6 Will Look Like

  • Articles

    Solar Powered UAVs To Replace Satellites

  • Sunday, 11 November 2012

    This book will give you information on different concepts of hacking like cracking wireless network,hacking cell phone and many more. Below is the full list of hacking topics included in this book.

    ☺Attack Basics
    ☺Password Basics
    ☺Account 
    Basics
    ☺Denial of Service Basics (DOS)
    ☺Logging Basics
    ☺Spyware
    ☺Port Scanning
    ☺Unix remote attack
    ☺SQL injection
    ☺Spoofing and Hijacking
    ☺Social Engineering
    ☺How to become hacker in 15 minutes
    ☺Making money as Hacker

    Click Link : http://bit.ly/CoolIHA1
    password ; tricks4u

    This book will give you information on different concepts of hacking like cracking wireless network,hacking cell phone and many more. Below is the full list of hacking topics included in this book.

    Posted at  Sunday, November 11, 2012  |  in  HACKING  |  Read More»

    This book will give you information on different concepts of hacking like cracking wireless network,hacking cell phone and many more. Below is the full list of hacking topics included in this book.

    ☺Attack Basics
    ☺Password Basics
    ☺Account 
    Basics
    ☺Denial of Service Basics (DOS)
    ☺Logging Basics
    ☺Spyware
    ☺Port Scanning
    ☺Unix remote attack
    ☺SQL injection
    ☺Spoofing and Hijacking
    ☺Social Engineering
    ☺How to become hacker in 15 minutes
    ☺Making money as Hacker

    Click Link : http://bit.ly/CoolIHA1
    password ; tricks4u

    BACKTRACK TERMINAL COMMANDS

    ################################################## ##

    PROGRAMS
    Vlc = Video/Music
    Flash Plugin = BT5 Forums
    Feh = Picture Viewer
    Easytether = Android Tethering
    Bless = Hex Editor
    Gparted = HDD partition Editor
    Transmission = Torrent Client
    Crunch = Passwordlist generator
    ################################################## ##

    FIXES
    NO STARTX
    rm -rf /root/.kde/cache-bt
    rm -rf /root/.kde/cache-root
    FIREFOX FLASH PLAYER "FILES NEEDED"
    tar xvfz flashplayer10_2_p3_64bit_linux_111710.tar.gz
    chown root:root libflashplayer.so
    chmod 0644 libflashplayer.so
    cp -f libflashplayer.so /usr/lib/mozilla/plugins/
    rm -rf libflashplayer.so
    ln -s /usr/lib/mozilla/plugins/libflashplayer.so /usr/lib/firefox/plugins/

    tar xvfz install_flash_player_10_linux.tar.gz
    mkdir ~/.mozilla/plugins
    mv -f libflashplayer.so ~/.mozilla/plugins/
    VLC RUN AS ROOT FIX
    /usr/bin/vlc
    edit with hex editor
    change the line
    geteuid._libc_start_main
    to
    getppid._libc_start_main

    ################################################## ##

    Commands = Action **** = your input

    root:toor
    startx = GUI
    alsamixer = Volume Control
    cd = change working directory
    reboot = reboot
    poweroff = shutdown
    rfkill list = wifi problems
    rfkill unblock all = wifi on
    rm /***/** = delete file
    rm -rf /****/** = harsh delete
    iwconfig = wireless config/list
    ifconfig = wired config/list

    ################################################## ##

    TASKKILLER

    kill **** = PID number

    ################################################## ##

    BLUETOOTH
    hciconfig hci0 up = on
    hciconfig hci0 = info
    hcitool scan hci0 = find devices

    ################################################## ##

    ANDROID TETHERING
    easytether connect
    ***new konsole
    dhclient eaytether0

    ################################################## ##

    TAR/RAR/ZIP = cd to directory
    tar zxf file.tar.gz
    tar xvfz ******.tar.gz
    tar -zxvf ******.tgz
    tar xvf *******.tar.gz2
    tar jxf file.tar.bz2
    tar zxvf file.tgz
    unzip ******.zip
    unrar x ****.rar

    ################################################## ##

    INSTALL PROGRAMS
    aptitude install **** =install
    apt-get **** = install
    apt-get update = update repos
    apt-get remove [--purge] **** = uninstall plue dependencies
    apt-cache search = search repos

    ################################################## ##

    BLUETOOTH
    start device
    >> hciconfig hci0 up
    find device info
    >> hciconfig hci0

    ################################################## ##

    WPACRACKING
    rfkill unblock all = start wifi
    airmon-ng start wlan0 = start monitor mode
    airdump-ng mon0 = monitor all
    airdump-ng -c *channel --*****bssid -w psk mon0 = catch handshake
    aireplay-ng -0 5 -a****acsespoint -c ***conectdcomp mon0 = deauth attack
    mdk3 = stronger deauth attack

    BACKTRACK TERMINAL COMMANDS

    Posted at  Sunday, November 11, 2012  |  in  linux os  |  Read More»

    BACKTRACK TERMINAL COMMANDS

    ################################################## ##

    PROGRAMS
    Vlc = Video/Music
    Flash Plugin = BT5 Forums
    Feh = Picture Viewer
    Easytether = Android Tethering
    Bless = Hex Editor
    Gparted = HDD partition Editor
    Transmission = Torrent Client
    Crunch = Passwordlist generator
    ################################################## ##

    FIXES
    NO STARTX
    rm -rf /root/.kde/cache-bt
    rm -rf /root/.kde/cache-root
    FIREFOX FLASH PLAYER "FILES NEEDED"
    tar xvfz flashplayer10_2_p3_64bit_linux_111710.tar.gz
    chown root:root libflashplayer.so
    chmod 0644 libflashplayer.so
    cp -f libflashplayer.so /usr/lib/mozilla/plugins/
    rm -rf libflashplayer.so
    ln -s /usr/lib/mozilla/plugins/libflashplayer.so /usr/lib/firefox/plugins/

    tar xvfz install_flash_player_10_linux.tar.gz
    mkdir ~/.mozilla/plugins
    mv -f libflashplayer.so ~/.mozilla/plugins/
    VLC RUN AS ROOT FIX
    /usr/bin/vlc
    edit with hex editor
    change the line
    geteuid._libc_start_main
    to
    getppid._libc_start_main

    ################################################## ##

    Commands = Action **** = your input

    root:toor
    startx = GUI
    alsamixer = Volume Control
    cd = change working directory
    reboot = reboot
    poweroff = shutdown
    rfkill list = wifi problems
    rfkill unblock all = wifi on
    rm /***/** = delete file
    rm -rf /****/** = harsh delete
    iwconfig = wireless config/list
    ifconfig = wired config/list

    ################################################## ##

    TASKKILLER

    kill **** = PID number

    ################################################## ##

    BLUETOOTH
    hciconfig hci0 up = on
    hciconfig hci0 = info
    hcitool scan hci0 = find devices

    ################################################## ##

    ANDROID TETHERING
    easytether connect
    ***new konsole
    dhclient eaytether0

    ################################################## ##

    TAR/RAR/ZIP = cd to directory
    tar zxf file.tar.gz
    tar xvfz ******.tar.gz
    tar -zxvf ******.tgz
    tar xvf *******.tar.gz2
    tar jxf file.tar.bz2
    tar zxvf file.tgz
    unzip ******.zip
    unrar x ****.rar

    ################################################## ##

    INSTALL PROGRAMS
    aptitude install **** =install
    apt-get **** = install
    apt-get update = update repos
    apt-get remove [--purge] **** = uninstall plue dependencies
    apt-cache search = search repos

    ################################################## ##

    BLUETOOTH
    start device
    >> hciconfig hci0 up
    find device info
    >> hciconfig hci0

    ################################################## ##

    WPACRACKING
    rfkill unblock all = start wifi
    airmon-ng start wlan0 = start monitor mode
    airdump-ng mon0 = monitor all
    airdump-ng -c *channel --*****bssid -w psk mon0 = catch handshake
    aireplay-ng -0 5 -a****acsespoint -c ***conectdcomp mon0 = deauth attack
    mdk3 = stronger deauth attack

    The best top 15 hacking tools .

    1. Nmap
    2. Nessus Remote Security Scanner
    3. John the Ripper
    4. Nikto
    5. SuperScan
    6. p0f
    7. Wireshark (Formely Ethereal)
    8. Yersinia
    9. Eraser
    10. PuTTY
    11. LCP
    12. Cain and Abel
    13. Kismet
    14. Netstumbler
    15. hping

    click link to read more about them and download :http://mcaf.ee/gcy92

    The best top 15 hacking tools .

    Posted at  Sunday, November 11, 2012  |  in  HACKING  |  Read More»

    The best top 15 hacking tools .

    1. Nmap
    2. Nessus Remote Security Scanner
    3. John the Ripper
    4. Nikto
    5. SuperScan
    6. p0f
    7. Wireshark (Formely Ethereal)
    8. Yersinia
    9. Eraser
    10. PuTTY
    11. LCP
    12. Cain and Abel
    13. Kismet
    14. Netstumbler
    15. hping

    click link to read more about them and download :http://mcaf.ee/gcy92

    Hacking And Security Video Tutorials Collection

    1.http://videos.securitytube.net/Public-Key-Cryptography.flv
    2.http://videos.securitytube.net/Symmetric-Key-Cryptography.flv
    3.http://videos.securitytube.net/CryptoAnalysis-(Types-of-attacks-on-Cryptography).flv
    http://videos.securitytube.net/IEEE-802.11W-and-Cisco-MFP-II.flv
    http://videos.securitytube.net/IEEE-802.11W-and-Cisco-MFP-I.flv
    http://videos.securitytube.net/War-Driving-is-so-2000,-Here-comes-war-shipping.flv
    http://videos.securitytube.net/RSA-2006-Keynote-Bill-Gates.flv
    http://videos.securitytube.net/Cryptography-(Introduction).flv
    http://videos.securitytube.net/Cold-Boot-Encryption-Attack.flv
    http://videos.securitytube.net/Fatal-DNS-Attack-Discovered.flv
    http://videos.securitytube.net/Cool-Computer-Program.flv
    http://videos.securitytube.net/WEP-Tutorial-3.flv
    http://videos.securitytube.net/WEP-Tutorial-2.flv
    14.http://videos.securitytube.net/WEP-Tutorial-1.flv
    http://videos.securitytube.net/CSMA-CA.flv
    http://videos.securitytube.net/Access-Control-(CSMA-CD).flv
    http://videos.securitytube.net/Analyzing-Robots.txt-for-Fun-and-Profit.flv
    http://videos.securitytube.net/Automated-Mining-of-FTP-Sites-for-Fun-and-Profit.flv
    http://videos.securitytube.net/SSL-MITM-Attack-Over-Wireless-Demo.flv
    http://videos.securitytube.net/SSL-MITM-Attack-Over-Wireless.flv
    http://videos.securitytube.net/Install-Vista-in-2-mins-(funny).flv
    http://videos.securitytube.net/How-Spammers-Abuse-Whois-and-SMTP-Part-3.flv
    http://videos.securitytube.net/How-Spammers-Abuse-Whois-and-SMTP-Part-2.flv
    http://videos.securitytube.net/How-Spammers-Abuse-Whois-and-SMTP-Part-1.flv
    http://videos.securitytube.net/USB-Beer-(-Funny-Video-).flv
    http://videos.securitytube.net/User-Information-Leakage-on-P2P-Networks.flv
    http://videos.securitytube.net/Changing-your-Firefox-User-Agent-to-Emulate-Googlebot.flv
    http://videos.securitytube.net/Virtual-carrier-sensing-(NAV)-mechanism.flv
    http://videos.securitytube.net/WiFi-State-Machine-(Part-3).flv
    http://videos.securitytube.net/WiFi-State-Machine-(Part-2).flv
    http://videos.securitytube.net/WiFi-State-Machine-(Part-1).flv
    http://videos.securitytube.net/WiFi-MAC-header-(Part-2).flv
    http://videos.securitytube.net/WiFi-MAC-header-(Part-1).flv
    http://videos.securitytube.net/Wireless-Frames--Format-and-Types.flv
    http://videos.securitytube.net/Connecting-wireless-station-to-AP.flv
    http://videos.securitytube.net/fping-(Part-4).flv
    http://videos.securitytube.net/fping-(Part-3).flv
    http://videos.securitytube.net/fping-(Part-2).flv
    http://videos.securitytube.net/fping-(Part-1).flv
    http://videos.securitytube.net/RC4-Basics-Presentation-(2).flv
    http://videos.securitytube.net/Macchanger.flv
    http://videos.securitytube.net/Pcap2air.flv
    http://videos.securitytube.net/Netstumbler-(Part-2).flv
    http://videos.securitytube.net/Netstumbler-(Part-1).flv
    http://videos.securitytube.net/AireplayNG-(Part-5).flv
    http://videos.securitytube.net/AireplayNG-(Part-4).flv
    http://videos.securitytube.net/AireplayNG-(Part-3).flv
    http://videos.securitytube.net/AireplayNG-(Part-2).flv
    http://videos.securitytube.net/AireplayNG-(Part-1).flv
    http://videos.securitytube.net/ARP-Packet-Injection-Programming.flv
    http://videos.securitytube.net/TCP-Packet-Injection-(2).flv
    http://videos.securitytube.net/TCP-Packet-Injection.flv
    http://videos.securitytube.net/IP-Packet-Injection-(2).flv
    http://videos.securitytube.net/IP-Packet-Injection.flv
    http://videos.securitytube.net/Ethernet-Packet-Injection.flv
    http://videos.securitytube.net/Generic-Packet-Injection-Program-(2).flv
    http://videos.securitytube.net/Packet-Injection-Basics-Presentation.flv
    http://videos.securitytube.net/Packet-Sniffing-using-Wireshark.flv
    http://videos.securitytube.net/Packet-Sniffing-using-Tcpdump.flv
    http://videos.securitytube.net/Data-Packet-Sniffer-Programming-.flv
    http://videos.securitytube.net/TCP-Packet-Sniffer-Programming-.flv
    http://videos.securitytube.net/IP-Packet-Sniffer-Programming-.flv
    http://videos.securitytube.net/Ethernet-Packet-Sniffer-Programming-.flv
    http://videos.securitytube.net/Generic-Packet-Sniffer-Programming-(2).flv
    http://videos.securitytube.net/Generic-Packet-Sniffer-Programming.flv
    http://videos.securitytube.net/Raw-Sockets-Basics-Presentation-(2).flv
    http://videos.securitytube.net/Raw-Sockets-Basics-Presentation.flv
    http://videos.securitytube.net/Internet-Worm-IP-Scanning-Programming-(2).flv
    http://videos.securitytube.net/Internet-Worm-IP-Scanning-Programming.flv
    http://videos.securitytube.net/Internet-Worm-Basics-Presentation-(2).flv
    http://videos.securitytube.net/Internet-Worm-Basics-Presentation.flv
    http://videos.securitytube.net/Programming-an-ARP-DoS-Tool-(2).flv
    http://videos.securitytube.net/Programming-an-ARP-DoS-Tool.flv
    http://videos.securitytube.net/Sending-Messages-using-IPC-Framework.flv
    http://videos.securitytube.net/Programming-the-Framework.flv
    http://videos.securitytube.net/Architecture-of-Security-Tools-Presentation-(2).flv
    http://videos.securitytube.net/Architecture-of-Security-Tools-Presentation.flv
    http://videos.securitytube.net/RC4-File-Encrypt-Decrypt-Program.flv
    http://videos.securitytube.net/RC4-Simulation-using-C.flv
    http://videos.securitytube.net/RC4-Basics-Presentation.flv
    http://videos.securitytube.net/VMWare-Hacking-at-Defcon-15.flv
    http://videos.securitytube.net/Bruice-Schneier-at-Defcon-15.flv
    http://videos.securitytube.net/Home-using-WEP-gets-Hacked.flv
    http://videos.securitytube.net/History-of-Hacking-Part-5.flv
    http://videos.securitytube.net/History-of-Hacking-Part-4.flv
    http://videos.securitytube.net/History-of-Hacking-Part-3.flv
    http://videos.securitytube.net/History-of-Hacking-Part-2.flv
    http://videos.securitytube.net/History-of-Hacking-Part-1.flv
    http://videos.securitytube.net/Prism-Strip.flv
    http://videos.securitytube.net/Simple-Replay.flv
    http://videos.securitytube.net/AirodumpNG-Basics-(Part-II).flv
    http://videos.securitytube.net/AirodumpNG-Basics-(Part-I).flv
    http://videos.securitytube.net/AirdecapNG.flv
    http://videos.securitytube.net/AirmonNG.flv
    http://videos.securitytube.net/TCP-Echo-Client-using-Sockets.flv
    http://videos.securitytube.net/TCP-Echo-Server-using-Sockets.flv
    http://videos.securitytube.net/Hello-World-TCP-Server-using-Sockets-(2).flv
    http://videos.securitytube.net/Socket-Programming-Basics-Presentation-(3).flv
    http://videos.securitytube.net/Socket-Programming-Basics-Presentation-(2).flv
    http://videos.securitytube.net/Hello-World-TCP-Server-using-Sockets.flv
    http://videos.securitytube.net/Socket-Programming-Basics-Presentation.flv
    http://videos.securitytube.net/Vehicular-Communication-Basics-(3).flv
    http://videos.securitytube.net/Vehicular-Communication-Basics-(2).flv
    http://videos.securitytube.net/Vehicular-Communication-Basics.flv
    http://videos.securitytube.net/Wireshark-Basics-(3).flv
    http://videos.securitytube.net/Wireshark-Basics-(2).flv
    http://videos.securitytube.net/Wireshark-Basics-(1).flv
    http://videos.securitytube.net/Nmap-(-OS-and-Service-Fingerprinting).flv
    http://videos.securitytube.net/Nmap-Usage-Basics.flv
    http://videos.securitytube.net/Network-Grep-(Ngrep)-Basics.flv
    http://videos.securitytube.net/Netcat-Basics-(Bind-Remote-Shell).flv
    http://videos.securitytube.net/Netcat-Basics-(Server-Mode).flv
    http://videos.securitytube.net/Netcat-Basics-(Client-Mode).flv
    http://videos.securitytube.net/Netbios-Basics-using-SMBClient-Part-2.flv
    http://videos.securitytube.net/Netbios-Basics-using-SMBClient-Part-1-.flv
    http://videos.securitytube.net/DNS-Zone-Transfer-using-DIG.flv
    http://videos.securitytube.net/Domain-Information-Groper-(-DIG-)-Basics.flv

    Hacking And Security Video Tutorials Collection

    Posted at  Sunday, November 11, 2012  |  in  HACKING  |  Read More»

    Hacking And Security Video Tutorials Collection

    1.http://videos.securitytube.net/Public-Key-Cryptography.flv
    2.http://videos.securitytube.net/Symmetric-Key-Cryptography.flv
    3.http://videos.securitytube.net/CryptoAnalysis-(Types-of-attacks-on-Cryptography).flv
    http://videos.securitytube.net/IEEE-802.11W-and-Cisco-MFP-II.flv
    http://videos.securitytube.net/IEEE-802.11W-and-Cisco-MFP-I.flv
    http://videos.securitytube.net/War-Driving-is-so-2000,-Here-comes-war-shipping.flv
    http://videos.securitytube.net/RSA-2006-Keynote-Bill-Gates.flv
    http://videos.securitytube.net/Cryptography-(Introduction).flv
    http://videos.securitytube.net/Cold-Boot-Encryption-Attack.flv
    http://videos.securitytube.net/Fatal-DNS-Attack-Discovered.flv
    http://videos.securitytube.net/Cool-Computer-Program.flv
    http://videos.securitytube.net/WEP-Tutorial-3.flv
    http://videos.securitytube.net/WEP-Tutorial-2.flv
    14.http://videos.securitytube.net/WEP-Tutorial-1.flv
    http://videos.securitytube.net/CSMA-CA.flv
    http://videos.securitytube.net/Access-Control-(CSMA-CD).flv
    http://videos.securitytube.net/Analyzing-Robots.txt-for-Fun-and-Profit.flv
    http://videos.securitytube.net/Automated-Mining-of-FTP-Sites-for-Fun-and-Profit.flv
    http://videos.securitytube.net/SSL-MITM-Attack-Over-Wireless-Demo.flv
    http://videos.securitytube.net/SSL-MITM-Attack-Over-Wireless.flv
    http://videos.securitytube.net/Install-Vista-in-2-mins-(funny).flv
    http://videos.securitytube.net/How-Spammers-Abuse-Whois-and-SMTP-Part-3.flv
    http://videos.securitytube.net/How-Spammers-Abuse-Whois-and-SMTP-Part-2.flv
    http://videos.securitytube.net/How-Spammers-Abuse-Whois-and-SMTP-Part-1.flv
    http://videos.securitytube.net/USB-Beer-(-Funny-Video-).flv
    http://videos.securitytube.net/User-Information-Leakage-on-P2P-Networks.flv
    http://videos.securitytube.net/Changing-your-Firefox-User-Agent-to-Emulate-Googlebot.flv
    http://videos.securitytube.net/Virtual-carrier-sensing-(NAV)-mechanism.flv
    http://videos.securitytube.net/WiFi-State-Machine-(Part-3).flv
    http://videos.securitytube.net/WiFi-State-Machine-(Part-2).flv
    http://videos.securitytube.net/WiFi-State-Machine-(Part-1).flv
    http://videos.securitytube.net/WiFi-MAC-header-(Part-2).flv
    http://videos.securitytube.net/WiFi-MAC-header-(Part-1).flv
    http://videos.securitytube.net/Wireless-Frames--Format-and-Types.flv
    http://videos.securitytube.net/Connecting-wireless-station-to-AP.flv
    http://videos.securitytube.net/fping-(Part-4).flv
    http://videos.securitytube.net/fping-(Part-3).flv
    http://videos.securitytube.net/fping-(Part-2).flv
    http://videos.securitytube.net/fping-(Part-1).flv
    http://videos.securitytube.net/RC4-Basics-Presentation-(2).flv
    http://videos.securitytube.net/Macchanger.flv
    http://videos.securitytube.net/Pcap2air.flv
    http://videos.securitytube.net/Netstumbler-(Part-2).flv
    http://videos.securitytube.net/Netstumbler-(Part-1).flv
    http://videos.securitytube.net/AireplayNG-(Part-5).flv
    http://videos.securitytube.net/AireplayNG-(Part-4).flv
    http://videos.securitytube.net/AireplayNG-(Part-3).flv
    http://videos.securitytube.net/AireplayNG-(Part-2).flv
    http://videos.securitytube.net/AireplayNG-(Part-1).flv
    http://videos.securitytube.net/ARP-Packet-Injection-Programming.flv
    http://videos.securitytube.net/TCP-Packet-Injection-(2).flv
    http://videos.securitytube.net/TCP-Packet-Injection.flv
    http://videos.securitytube.net/IP-Packet-Injection-(2).flv
    http://videos.securitytube.net/IP-Packet-Injection.flv
    http://videos.securitytube.net/Ethernet-Packet-Injection.flv
    http://videos.securitytube.net/Generic-Packet-Injection-Program-(2).flv
    http://videos.securitytube.net/Packet-Injection-Basics-Presentation.flv
    http://videos.securitytube.net/Packet-Sniffing-using-Wireshark.flv
    http://videos.securitytube.net/Packet-Sniffing-using-Tcpdump.flv
    http://videos.securitytube.net/Data-Packet-Sniffer-Programming-.flv
    http://videos.securitytube.net/TCP-Packet-Sniffer-Programming-.flv
    http://videos.securitytube.net/IP-Packet-Sniffer-Programming-.flv
    http://videos.securitytube.net/Ethernet-Packet-Sniffer-Programming-.flv
    http://videos.securitytube.net/Generic-Packet-Sniffer-Programming-(2).flv
    http://videos.securitytube.net/Generic-Packet-Sniffer-Programming.flv
    http://videos.securitytube.net/Raw-Sockets-Basics-Presentation-(2).flv
    http://videos.securitytube.net/Raw-Sockets-Basics-Presentation.flv
    http://videos.securitytube.net/Internet-Worm-IP-Scanning-Programming-(2).flv
    http://videos.securitytube.net/Internet-Worm-IP-Scanning-Programming.flv
    http://videos.securitytube.net/Internet-Worm-Basics-Presentation-(2).flv
    http://videos.securitytube.net/Internet-Worm-Basics-Presentation.flv
    http://videos.securitytube.net/Programming-an-ARP-DoS-Tool-(2).flv
    http://videos.securitytube.net/Programming-an-ARP-DoS-Tool.flv
    http://videos.securitytube.net/Sending-Messages-using-IPC-Framework.flv
    http://videos.securitytube.net/Programming-the-Framework.flv
    http://videos.securitytube.net/Architecture-of-Security-Tools-Presentation-(2).flv
    http://videos.securitytube.net/Architecture-of-Security-Tools-Presentation.flv
    http://videos.securitytube.net/RC4-File-Encrypt-Decrypt-Program.flv
    http://videos.securitytube.net/RC4-Simulation-using-C.flv
    http://videos.securitytube.net/RC4-Basics-Presentation.flv
    http://videos.securitytube.net/VMWare-Hacking-at-Defcon-15.flv
    http://videos.securitytube.net/Bruice-Schneier-at-Defcon-15.flv
    http://videos.securitytube.net/Home-using-WEP-gets-Hacked.flv
    http://videos.securitytube.net/History-of-Hacking-Part-5.flv
    http://videos.securitytube.net/History-of-Hacking-Part-4.flv
    http://videos.securitytube.net/History-of-Hacking-Part-3.flv
    http://videos.securitytube.net/History-of-Hacking-Part-2.flv
    http://videos.securitytube.net/History-of-Hacking-Part-1.flv
    http://videos.securitytube.net/Prism-Strip.flv
    http://videos.securitytube.net/Simple-Replay.flv
    http://videos.securitytube.net/AirodumpNG-Basics-(Part-II).flv
    http://videos.securitytube.net/AirodumpNG-Basics-(Part-I).flv
    http://videos.securitytube.net/AirdecapNG.flv
    http://videos.securitytube.net/AirmonNG.flv
    http://videos.securitytube.net/TCP-Echo-Client-using-Sockets.flv
    http://videos.securitytube.net/TCP-Echo-Server-using-Sockets.flv
    http://videos.securitytube.net/Hello-World-TCP-Server-using-Sockets-(2).flv
    http://videos.securitytube.net/Socket-Programming-Basics-Presentation-(3).flv
    http://videos.securitytube.net/Socket-Programming-Basics-Presentation-(2).flv
    http://videos.securitytube.net/Hello-World-TCP-Server-using-Sockets.flv
    http://videos.securitytube.net/Socket-Programming-Basics-Presentation.flv
    http://videos.securitytube.net/Vehicular-Communication-Basics-(3).flv
    http://videos.securitytube.net/Vehicular-Communication-Basics-(2).flv
    http://videos.securitytube.net/Vehicular-Communication-Basics.flv
    http://videos.securitytube.net/Wireshark-Basics-(3).flv
    http://videos.securitytube.net/Wireshark-Basics-(2).flv
    http://videos.securitytube.net/Wireshark-Basics-(1).flv
    http://videos.securitytube.net/Nmap-(-OS-and-Service-Fingerprinting).flv
    http://videos.securitytube.net/Nmap-Usage-Basics.flv
    http://videos.securitytube.net/Network-Grep-(Ngrep)-Basics.flv
    http://videos.securitytube.net/Netcat-Basics-(Bind-Remote-Shell).flv
    http://videos.securitytube.net/Netcat-Basics-(Server-Mode).flv
    http://videos.securitytube.net/Netcat-Basics-(Client-Mode).flv
    http://videos.securitytube.net/Netbios-Basics-using-SMBClient-Part-2.flv
    http://videos.securitytube.net/Netbios-Basics-using-SMBClient-Part-1-.flv
    http://videos.securitytube.net/DNS-Zone-Transfer-using-DIG.flv
    http://videos.securitytube.net/Domain-Information-Groper-(-DIG-)-Basics.flv

    Wednesday, 7 November 2012

    Facebook emoticons  

    [[471830866191622]] [[471830859524956]] [[471830869524955]] [[471830872858288]]
    [[471830862858289]] [[471830939524948]] [[471830936191615]] [[471830942858281]]
    [[471830932858282]] [[471830946191614]] [[471831016191607]] [[471831006191608]]
    [[471831019524940]] [[471831012858274]] [[471831009524941]] [[471831079524934]]




    [[492107567489997]] [[492107560823331]] [[492107564156664]] [[492107557489998]]
    [[492107554156665]] [[492107640823323]] [[492107644156656]] [[492107630823324]]
    [[492107637489990]] [[492107634156657]] [[492107734156647]] [[492107724156648]]
    [[492107727489981]] [[492107737489980]] [[492107730823314]] [[492107804156640]]


    [[487653724598553]] [[487653721265220]] [[487653717931887]] [[487653731265219]]
    [[487653727931886]] [[487653791265213]] [[487653797931879]] [[487653801265212]]
    [[487653804598545]] [[487653794598546]] [[487653867931872]] [[487653874598538]]
    [[487653864598539]] [[487653861265206]] [[487653871265205]] [[487653931265199]]


    [[455109547867974]] [[455109554534640]] [[455109557867973]] [[455109551201307]]
    [[455109561201306]] [[455109631201299]] [[455109637867965]] [[455109641201298]]
    [[455109634534632]] [[455109644534631]] [[455109714534624]] [[455109727867956]]
    [[455109721201290]] [[455109724534623]] [[455109717867957]] [[455109791201283]]


    [[455050754540520]] [[455050761207186]] [[455050764540519]] [[455050757873853]]
    [[455050751207187]] [[455050831207179]] [[455050834540512]] [[455050824540513]]
    [[455050827873846]] [[455050837873845]] [[455050901207172]] [[455050904540505]]
    [[455050907873838]] [[455050911207171]] [[455050924540503]] [[455050981207164]]


    [[475038895872615]] [[475038899205948]] [[475038909205947]] [[475038902539281]]
    [[475038905872614]] [[475038979205940]] [[475038982539273]] [[475038975872607]]
    [[475038985872606]] [[475038989205939]] [[475039075872597]] [[475039065872598]]
    [[475039069205931]] [[475039072539264]] [[475039095872595]] [[475039162539255]]


    [[304918909614463]] [[304918916281129]] [[304918902947797]] [[304918896281131]]
    [[304918926281128]] [[304919052947782]] [[304919046281116]] [[304919069614447]]
    [[304919072947780]] [[304919059614448]] [[304919229614431]] [[304919239614430]]
    [[304919236281097]] [[304919242947763]] [[304919246281096]] [[304919382947749]]


    [[475082985868206]] [[475082992534872]] [[475082979201540]] [[475082982534873]]
    [[475082989201539]] [[475083052534866]] [[475083049201533]] [[475083059201532]]
    [[475083055868199]] [[475083062534865]] [[475083129201525]] [[475083142534857]]
    [[475083132534858]] [[475083135868191]] [[475083139201524]] [[475083202534851]]


    [[182743351862835]] [[182743338529503]] [[182743348529502]] [[182743345196169]] [[182743341862836]]
    [[182743431862827]] [[182743428529494]] [[182743425196161]] [[182743465196157]] [[182743458529491]]
    [[182743515196152]] [[182743511862819]] [[182743521862818]] [[182743518529485]] [[182743525196151]]
    [[182743585196145]] [[182743591862811]] [[182743595196144]] [[182743588529478]] [[182743598529477]]
    [[182743725196131]] [[182743715196132]] [[182743721862798]] [[182743711862799]] [[182743718529465]]


    [[492167650817322]] [[492167654150655]] [[492167657483988]] [[492167660817321]]
    [[492167647483989]] [[492167730817314]] [[492167734150647]] [[492167727483981]]
    [[492167724150648]] [[492167737483980]] [[492167814150639]] [[492167824150638]]
    [[492167817483972]] [[492167827483971]] [[492167830817304]] [[492167907483963]]


    [[487656364598289]] [[487656361264956]] [[487656357931623]] [[487656367931622]]
    [[487656371264955]] [[487656434598282]] [[487656427931616]] [[487656431264949]]
    [[487656441264948]] [[487656437931615]] [[487656521264940]] [[487656514598274]]
    [[487656511264941]] [[487656517931607]] [[487656524598273]] [[487656587931600]]




    enjoy facebook  @niranjan


    Facebook emoticons

    Posted at  Wednesday, November 07, 2012  |  in    |  Read More»

    Facebook emoticons  

    [[471830866191622]] [[471830859524956]] [[471830869524955]] [[471830872858288]]
    [[471830862858289]] [[471830939524948]] [[471830936191615]] [[471830942858281]]
    [[471830932858282]] [[471830946191614]] [[471831016191607]] [[471831006191608]]
    [[471831019524940]] [[471831012858274]] [[471831009524941]] [[471831079524934]]




    [[492107567489997]] [[492107560823331]] [[492107564156664]] [[492107557489998]]
    [[492107554156665]] [[492107640823323]] [[492107644156656]] [[492107630823324]]
    [[492107637489990]] [[492107634156657]] [[492107734156647]] [[492107724156648]]
    [[492107727489981]] [[492107737489980]] [[492107730823314]] [[492107804156640]]


    [[487653724598553]] [[487653721265220]] [[487653717931887]] [[487653731265219]]
    [[487653727931886]] [[487653791265213]] [[487653797931879]] [[487653801265212]]
    [[487653804598545]] [[487653794598546]] [[487653867931872]] [[487653874598538]]
    [[487653864598539]] [[487653861265206]] [[487653871265205]] [[487653931265199]]


    [[455109547867974]] [[455109554534640]] [[455109557867973]] [[455109551201307]]
    [[455109561201306]] [[455109631201299]] [[455109637867965]] [[455109641201298]]
    [[455109634534632]] [[455109644534631]] [[455109714534624]] [[455109727867956]]
    [[455109721201290]] [[455109724534623]] [[455109717867957]] [[455109791201283]]


    [[455050754540520]] [[455050761207186]] [[455050764540519]] [[455050757873853]]
    [[455050751207187]] [[455050831207179]] [[455050834540512]] [[455050824540513]]
    [[455050827873846]] [[455050837873845]] [[455050901207172]] [[455050904540505]]
    [[455050907873838]] [[455050911207171]] [[455050924540503]] [[455050981207164]]


    [[475038895872615]] [[475038899205948]] [[475038909205947]] [[475038902539281]]
    [[475038905872614]] [[475038979205940]] [[475038982539273]] [[475038975872607]]
    [[475038985872606]] [[475038989205939]] [[475039075872597]] [[475039065872598]]
    [[475039069205931]] [[475039072539264]] [[475039095872595]] [[475039162539255]]


    [[304918909614463]] [[304918916281129]] [[304918902947797]] [[304918896281131]]
    [[304918926281128]] [[304919052947782]] [[304919046281116]] [[304919069614447]]
    [[304919072947780]] [[304919059614448]] [[304919229614431]] [[304919239614430]]
    [[304919236281097]] [[304919242947763]] [[304919246281096]] [[304919382947749]]


    [[475082985868206]] [[475082992534872]] [[475082979201540]] [[475082982534873]]
    [[475082989201539]] [[475083052534866]] [[475083049201533]] [[475083059201532]]
    [[475083055868199]] [[475083062534865]] [[475083129201525]] [[475083142534857]]
    [[475083132534858]] [[475083135868191]] [[475083139201524]] [[475083202534851]]


    [[182743351862835]] [[182743338529503]] [[182743348529502]] [[182743345196169]] [[182743341862836]]
    [[182743431862827]] [[182743428529494]] [[182743425196161]] [[182743465196157]] [[182743458529491]]
    [[182743515196152]] [[182743511862819]] [[182743521862818]] [[182743518529485]] [[182743525196151]]
    [[182743585196145]] [[182743591862811]] [[182743595196144]] [[182743588529478]] [[182743598529477]]
    [[182743725196131]] [[182743715196132]] [[182743721862798]] [[182743711862799]] [[182743718529465]]


    [[492167650817322]] [[492167654150655]] [[492167657483988]] [[492167660817321]]
    [[492167647483989]] [[492167730817314]] [[492167734150647]] [[492167727483981]]
    [[492167724150648]] [[492167737483980]] [[492167814150639]] [[492167824150638]]
    [[492167817483972]] [[492167827483971]] [[492167830817304]] [[492167907483963]]


    [[487656364598289]] [[487656361264956]] [[487656357931623]] [[487656367931622]]
    [[487656371264955]] [[487656434598282]] [[487656427931616]] [[487656431264949]]
    [[487656441264948]] [[487656437931615]] [[487656521264940]] [[487656514598274]]
    [[487656511264941]] [[487656517931607]] [[487656524598273]] [[487656587931600]]




    enjoy facebook  @niranjan



    WINDOWS 8 RTM VERSIONS TORRENT DOWNLOAD LINKS AND ACTIVATION METHODS

    WINDOWS 8 ENTERPRISE 64 BIT:
    http://www.torrents.net/torrent/2502683/WINDOWS-8-ENTERPRISE-N-RTM-X64-VOLUME-ENGLISH-BOOT-DVD-[ThumperDC]/
    http://thepiratebay.se/torrent/7503952/MICROSOFT.WINDOWS.8.ENTERPRISE.RTM.X64.VOLUME.ENGLISH.DVD-WZT

    WINDOWS 8 ENTERPRISE 32 BIT:
    http://www.torrents.net/torrent/2510049/MICROSOFT.WINDOWS.8.ENTERPRISE.RTM.X86.VOLUME.ENGLISH.DVD-WZT/
    http://thepiratebay.se/torrent/7505762/MICROSOFT.WINDOWS.8.ENTERPRISE.RTM.X86.VOLUME.ENGLISH.DVD-WZT

    WINDOWS 8 PROFESSIONAL 32 BIT:
    http://thepiratebay.se/torrent/7506223/MICROSOFT.WINDOWS.8.PROFESSIONAL.RTM.X86.ENGLISH.DVD-WZT
    http://bitsnoop.com/microsoft-windows-8-professional-rt-q39417187.html

    WINDOWS 8 PROFESSIONAL 64 BIT:
    http://thepiratebay.se/torrent/7506213/MICROSOFT.WINDOWS.8.PROFESSIONAL.RTM.X64.ENGLISH.DVD-WZT
    http://bitsnoop.com/microsoft-windows-8-professional-rt-q39417238.html

    My personal sugestion GO FOR WINDOWS PROFESSIONAL 32 OR 64 BIT.(Enterprise only for buisness use)

    Retail keys:-

    Pro:
    NG4HW-VH26C-733KW-K6F98-J8CK4
    XKY4K-2NRWR-8F6P2-448RF-CRYQH

    Enterprise: 32JNW-9KQ84-P47T8-D8GGY-CWCK7

    Enterprise: JMNMF-RHW7P-DMY6X-RF3DR-X2BQT

    Note: The keys above are for installation only, you can't activate with them.

    ACTIVATIONS:

    If you want simple method to activate go direct to METHOD:3.

    METHOD:1 (USED BY ME)
    Activation for Windows 8 RTM PRO x64/x86 only (thro skype)

    1.Open CMD as Administrator and insert one of the following keys with command "slmgr -ipk <key>" (PRESS ENTER)
    Example: slmgr -ipk QGR4N-78PMD-KCRQ7-83BXT-YG667

    Key list:
    Give 1st priority:
    7JVN8-WVR92-87PVM-QM7P9-YDR92
    QGR4N-78PMD-KCRQ7-83BXT-YG667

    Give 2nd priority:
    J87JG-PXNR9-68BRP-DGJ9P-TMQHC
    7NKFG-64QDF-4PGMR-KP74B-VQR92
    CNVTB-YK4RV-M8C92-H633M-R6V3P
    NGTBT-FWPVK-WDFP9-G3GV8-W4YQP

    2.Then type command "slui 4" and choose United Kingdom as home country.

    3. In Skype call +448000188354 and lead the instructions. When you type all numers they gonna be checked and if key is not still blocked you will be asked On how many computers do you have installed windows. Type 1 as an answer. and enter the key given thro the call in the required place.

    note: above keys will work only for certain periods.

    METHOD:2(not verified personally by me).
    II.KMS METHOD:
    Open cmd as admin and type the following
    slmgr.vbs -ipk <KEY> (press enter)
    slmgr /skms 147.134.1.42:1688 (press enter)
    slmgr.vbs -ato

    THERE ARE MANY KMS ACTIVATION METHODS SPREAD OVER MANY SITES. GOOGLE FOR IT.

    METHOD:3(VERY SIMPLE ACTIVATOR FILE FOR ALL VERSIONS WORKS 100%)(but can personalise account pic, metro theme and lock screen with a seperate .exe file included in the torrent)

    http://www.torrentfunk.com/torrent/4792696/windows-8-activator-first-working-activator.html

    TORRENT CONTENTS:
    1. Microsoft Windows 8 Activator(All Edition).exe (use it to activate windows but windows doesnt allows to personalise account pic, metro theme and lock screen)
    2. OnThreeSeasPersonalization.exe (use to personalise account pic, metro theme and lock screen.)

    WINDOWS 8 FULL VERSION

    Posted at  Wednesday, November 07, 2012  |  in    |  Read More»


    WINDOWS 8 RTM VERSIONS TORRENT DOWNLOAD LINKS AND ACTIVATION METHODS

    WINDOWS 8 ENTERPRISE 64 BIT:
    http://www.torrents.net/torrent/2502683/WINDOWS-8-ENTERPRISE-N-RTM-X64-VOLUME-ENGLISH-BOOT-DVD-[ThumperDC]/
    http://thepiratebay.se/torrent/7503952/MICROSOFT.WINDOWS.8.ENTERPRISE.RTM.X64.VOLUME.ENGLISH.DVD-WZT

    WINDOWS 8 ENTERPRISE 32 BIT:
    http://www.torrents.net/torrent/2510049/MICROSOFT.WINDOWS.8.ENTERPRISE.RTM.X86.VOLUME.ENGLISH.DVD-WZT/
    http://thepiratebay.se/torrent/7505762/MICROSOFT.WINDOWS.8.ENTERPRISE.RTM.X86.VOLUME.ENGLISH.DVD-WZT

    WINDOWS 8 PROFESSIONAL 32 BIT:
    http://thepiratebay.se/torrent/7506223/MICROSOFT.WINDOWS.8.PROFESSIONAL.RTM.X86.ENGLISH.DVD-WZT
    http://bitsnoop.com/microsoft-windows-8-professional-rt-q39417187.html

    WINDOWS 8 PROFESSIONAL 64 BIT:
    http://thepiratebay.se/torrent/7506213/MICROSOFT.WINDOWS.8.PROFESSIONAL.RTM.X64.ENGLISH.DVD-WZT
    http://bitsnoop.com/microsoft-windows-8-professional-rt-q39417238.html

    My personal sugestion GO FOR WINDOWS PROFESSIONAL 32 OR 64 BIT.(Enterprise only for buisness use)

    Retail keys:-

    Pro:
    NG4HW-VH26C-733KW-K6F98-J8CK4
    XKY4K-2NRWR-8F6P2-448RF-CRYQH

    Enterprise: 32JNW-9KQ84-P47T8-D8GGY-CWCK7

    Enterprise: JMNMF-RHW7P-DMY6X-RF3DR-X2BQT

    Note: The keys above are for installation only, you can't activate with them.

    ACTIVATIONS:

    If you want simple method to activate go direct to METHOD:3.

    METHOD:1 (USED BY ME)
    Activation for Windows 8 RTM PRO x64/x86 only (thro skype)

    1.Open CMD as Administrator and insert one of the following keys with command "slmgr -ipk <key>" (PRESS ENTER)
    Example: slmgr -ipk QGR4N-78PMD-KCRQ7-83BXT-YG667

    Key list:
    Give 1st priority:
    7JVN8-WVR92-87PVM-QM7P9-YDR92
    QGR4N-78PMD-KCRQ7-83BXT-YG667

    Give 2nd priority:
    J87JG-PXNR9-68BRP-DGJ9P-TMQHC
    7NKFG-64QDF-4PGMR-KP74B-VQR92
    CNVTB-YK4RV-M8C92-H633M-R6V3P
    NGTBT-FWPVK-WDFP9-G3GV8-W4YQP

    2.Then type command "slui 4" and choose United Kingdom as home country.

    3. In Skype call +448000188354 and lead the instructions. When you type all numers they gonna be checked and if key is not still blocked you will be asked On how many computers do you have installed windows. Type 1 as an answer. and enter the key given thro the call in the required place.

    note: above keys will work only for certain periods.

    METHOD:2(not verified personally by me).
    II.KMS METHOD:
    Open cmd as admin and type the following
    slmgr.vbs -ipk <KEY> (press enter)
    slmgr /skms 147.134.1.42:1688 (press enter)
    slmgr.vbs -ato

    THERE ARE MANY KMS ACTIVATION METHODS SPREAD OVER MANY SITES. GOOGLE FOR IT.

    METHOD:3(VERY SIMPLE ACTIVATOR FILE FOR ALL VERSIONS WORKS 100%)(but can personalise account pic, metro theme and lock screen with a seperate .exe file included in the torrent)

    http://www.torrentfunk.com/torrent/4792696/windows-8-activator-first-working-activator.html

    TORRENT CONTENTS:
    1. Microsoft Windows 8 Activator(All Edition).exe (use it to activate windows but windows doesnt allows to personalise account pic, metro theme and lock screen)
    2. OnThreeSeasPersonalization.exe (use to personalise account pic, metro theme and lock screen.)

    About-Privacy Policy-Contact us
    Copyright © 2013 infinityCEH. Blogger Template by Bloggertheme9
    Proudly Powered by Blogger.
    back to top