Pages

N-Stalker Helps you Finding Web Vulnerabilities Before HACKER Do!

3 comments

N-Stalker Web Application Security Scanner is a Web security assessment tool. Incorporates well-known N-Stealth HTTP Security Scanner and 35,000 Web attack signature database.



Its patent-pending self-owned technology allows to scan Web applications against...
1: SQL XSS injection,
2: buffer overflow,
3: parameter tampering and much more.
4: Component-oriented Web Security.
5: Free Edition includes free Cross-site script (XSS) scanning.

What's new in this version: Version 2012 includes...
1: new spider engine to fetch modern websites effectively,
2: New attack engine to enhance assessment and avoid false-positives,
3: New attack signatures and patterns. More accurate detection.

For download it Click here

If u like then Given response in foam of comment.

Bypass Compulsory registration

0 comments

Tonight when I am surf the internet then i am found a site who help you bypass the Compulsory
Registration for enter the website.


This site provide you many user id with password by which use you enter in the website and enjoy free surfing without registration.

For website click here

WikiLeaks.org under Cyber Attack after releasing U.S. diplomatic cables

0 comments

The WikiLeaks website, which contains thousands of U.S. embassy cables, has crashed in an apparent cyberattack. The anti-secrecy organization said in a Twitter message Tuesday that Wikileaks.org "is presently under attack."

Wikileaks.org today released 250,000 U.S. diplomatic cables that have apparently caused grave concern in Western governments. The documents have already revealed that the U.S. has been spying on the United Nations Secretary General. State Department spokeswoman Victoria Nuland would not confirm the authenticity of the latest documents, but said "the United States strongly condemns any illegal disclosure of classified information."


Source: Thehackernews

Qubes OS : An Operating System Designed For Security

0 comments


Qubes is an open source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers. In the future it might also run Windows apps.
Key architecture features:

  • Based on a secure bare-metal hypervisor (Xen)
  • Networking code sand-boxed in an unprivileged VM (using IOMMU/VT-d)
  • No networking code in the privileged domain (dom0)
  • All user applications run in “AppVMs”, lightweight VMs based on Linux
  • Centralized updates of all AppVMs based on the same template
  • Qubes GUI virtualization presents applications like if they were running locally
  • Qubes GUI provides isolation between apps sharing the same desktop
  • Storage drivers and backends sand-boxed in an unprivileged virtual machine(*)
  • Secure system boot based on Intel TXT(*)

Source: Thehackernews

Send unlimited fake Email by 100+ subdomain email address

1 comments

Today,i am going tell you how you send unlimited email by different sub domain name.



Sub domain like...

@myself.com
@engineer.com
@doctor.com
@linuxmail.org
@contractor.net
@usa.com
@asia.com
@bikerider.com
@cash4u.com
@cyberservice.com
@programmer.net
@tech-center.com
@solution4u.net
@computer4u.com
@cyberdude.net

and more than 100+

But remember when you Signup then enter fake country name and do not enter any Contact Email address.

Click Here

If u like it write your view below box.

How to use Telnet With Windows XP (For Newbie)

2 comments

The queen of hacker commands is telnet.Telnet is a remote logging command which inbuild with command prompt in Windows Operating System.

For use Telnet,first open the command prompt.For this press Windows Key+R Key you see RUN platform open,here write ‘cmd’ and press OK.Command prompt will be open.Here type

C:\hrde>telnet/?

Here’s what you will get:

telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]
-a Attempt automatic logon. Same as -l option except uses
the currently logged on user's name.
-e Escape character to enter telnet client prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system.
Requires that the remote system support the TELNET ENVIRON
option.
-t Specifies terminal type.
Supported term types are vt100, vt52, ansi and vtnt only.
host Specifies the hostname or IP address of the remote computer
to connect to.

port Specifies a port number or service name.

For Newbie: what is a port on a computer? A computer port is sort of like a seaport. It's where things can go in and/or out of a computer.

Telnet is a remote logging command so it is use for log into a remote computer.

Every day people complaining they can't telnet. That is usually because they try to telnet into a computer, or a port on a computer that is set up to refuse telnet connections. Here's what it might look like when a computer refuses a telnet connection:

C:\hrde >telnet 10.0.0.3


Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.

Or you also see:

C:\hrde >telnet techbroker.com


Connecting To techbroker.com...Could not open connection to the host, on port 23.
No connection could be made because the target machine actively
refused it.

If you just give the telnet command without giving a port number, it
will automatically try to connect on port 23, which sometimes runs a
telnet server.

So firstly found the IP address of the Victim and use ‘Port Tracer’ tool for trace the open Port on victim System.Many tool are available on internet you got it by search on Google Uncle.

After that run according to shown below…

C:\hrde>telnet ip-address port-number

And press ENTER key.

If telnet failed to connect, possibly the computer you were trying to
telnet into was down or just plain no longer in existence. Maybe the
people who run that computer don't want you to telnet into it.

8 More Important Security Enhancements

0 comments

1. Check Windows Update and Office Update regularly (http://office.microsoft.com/productupdates); Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (www.sygate.com) and ZoneAlarm (www.zonelabs.com) offer free versions.


3. Install a free spyware blocker. I am choose SpyBot Search & Destroy (http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages by disabling the Windows Messenger service.
Open Control Panel >> Administrative Tools >> Services and you'll see Messenger
Right-click and go to Properties, Set Start-up Type to Disabled and press the Stop button. Bye spam pop-ups!

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol.



6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try AVG Free Edition

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get.


Hack by SniperSpy

0 comments


SniperSpy remote spyware silently logs all web sites, chat conversations, instant messages, keystrokes, applications and more in real time. See everything your child, employee or anyone does while they use your distant computer - remotely.


Do you suspect that your child or employee is inappropriately using your unreachable computer? If yes, then this software is ideal for you. No physical access to the remote PC is needed to install the spy software. Once installed it records chat conversations, web sites and more.

This software remotely installs to your computer through email. Unlike the other remote spyware titles on the market, Sniper Spy fully and completely bypasses the Windows XP Firewall.

The program then records user activities and sends the data to your online control panel. You login to your control panel to view spy results using your own password-protected account.


For get trial click here

For get free click here

JonDoxFox

0 comments

JonDoFox is a profile for the Mozilla Firefox web browser particularly optimized for anonymous and secure web surfing. For anonymous surfing you need an IP changer proxy too. We recommended you proxy tool JonDo.


It is a great tool,it hide you with browser ,if any third party person track you then it find your IP address same to all other IP person whose use JonDoFox and it see you connected with multiple Server on net so he is not found your server on internet.

I am use this tool,and below show a picture which that shown you my Real IP address on DOS Prompt,my IP set by Jondofox and in my blog HACKARDE you see my fake IP which set by JonDoFox.


JonDoFox available for Windows,Mac OS and also for Linux OS.

For Download JonDoFox click here

Download Mozilla Firefox v6.0

0 comments

In under two month Mozilla Launch another major version update for Firefox.

It much fast and good looking with new address bar which show the domain of the site.

It is help full in finding the Phishing page of social networking site,So go to Firefox official website and download it.

For go to download link click here

Related Posts Plugin for WordPress, Blogger...

Hackarde's Search Engine- Search Hacking Tutorial,Tool and eBook

Loading
 
HACKARDE © 2011 | Designed by HrDe