Hacking Tutorial
Featured Posts
-
Username and – Password
Make it strong for Security
-
Report: Thousands of embedded systems on the net without protection
At the RSA Conference, which is ongoing, Zscaler's Michael Sutton has provided further evidence that many embedded web servers (EWS) can be easily accessed by outsiders via the internet.
-
Fake Netflix Android App Steals Passwords
Watching a movie or TV show on your mobile phone may be convenient, but it is not necessarily safe.
-
Fake antivirus will not disinfect your computer!
.
-
Google kicks fraudulent apps out of Android Markets
Mobile security firm Lookout is warning Android users in Europe about a slew of apps that showed up on the Android Market in the last week that are not what they appear to be.
WikiLeaks.org under Cyber Attack after releasing U.S. diplomatic cables
Qubes OS : An Operating System Designed For Security
Key architecture features:
- Based on a secure bare-metal hypervisor (Xen)
- Networking code sand-boxed in an unprivileged VM (using IOMMU/VT-d)
- No networking code in the privileged domain (dom0)
- All user applications run in “AppVMs”, lightweight VMs based on Linux
- Centralized updates of all AppVMs based on the same template
- Qubes GUI virtualization presents applications like if they were running locally
- Qubes GUI provides isolation between apps sharing the same desktop
- Storage drivers and backends sand-boxed in an unprivileged virtual machine(*)
- Secure system boot based on Intel TXT(*)
Send unlimited fake Email by 100+ subdomain email address
How to use Telnet With Windows XP (For Newbie)
The queen of hacker commands is telnet.Telnet is a remote logging command which inbuild with command prompt in Windows Operating System.
For use Telnet,first open the command prompt.For this press Windows Key+R Key you see RUN platform open,here write ‘cmd’ and press OK.Command prompt will be open.Here type
C:\hrde>telnet/?
Here’s what you will get:
telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]
-a Attempt automatic logon. Same as -l option except uses
the currently logged on user's name.
-e Escape character to enter telnet client prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system.
Requires that the remote system support the TELNET ENVIRON
option.
-t Specifies terminal type.
Supported term types are vt100, vt52, ansi and vtnt only.
host Specifies the hostname or IP address of the remote computer
to connect to.
port Specifies a port number or service name.
For Newbie: what is a port on a computer? A computer port is sort of like a seaport. It's where things can go in and/or out of a computer.
Telnet is a remote logging command so it is use for log into a remote computer.
Every day people complaining they can't telnet. That is usually because they try to telnet into a computer, or a port on a computer that is set up to refuse telnet connections. Here's what it might look like when a computer refuses a telnet connection:
C:\hrde >telnet 10.0.0.3
Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.
Or you also see:
C:\hrde >telnet techbroker.com
Connecting To techbroker.com...Could not open connection to the host, on port 23.
No connection could be made because the target machine actively
refused it.
If you just give the telnet command without giving a port number, it
will automatically try to connect on port 23, which sometimes runs a
telnet server.
So firstly found the IP address of the Victim and use ‘Port Tracer’ tool for trace the open Port on victim System.Many tool are available on internet you got it by search on Google Uncle.
After that run according to shown below…
C:\hrde>telnet ip-address port-number
And press ENTER key.
If telnet failed to connect, possibly the computer you were trying to
telnet into was down or just plain no longer in existence. Maybe the
people who run that computer don't want you to telnet into it.
8 More Important Security Enhancements
Hack by SniperSpy
Do you suspect that your child or employee is inappropriately using your unreachable computer? If yes, then this software is ideal for you. No physical access to the remote PC is needed to install the spy software. Once installed it records chat conversations, web sites and more.
This software remotely installs to your computer through email. Unlike the other remote spyware titles on the market, Sniper Spy fully and completely bypasses the Windows XP Firewall.
The program then records user activities and sends the data to your online control panel. You login to your control panel to view spy results using your own password-protected account.
For get trial click here
For get free click here
JonDoxFox
Download Mozilla Firefox v6.0
Send SMS to victim by any Cell number also send by victim Cell number
Online satellite Cell phone tracing
I am a KILLER
The Complete Windows 7 Shortcuts eBook
The eBook is pretty exhaustive and the topics covered include:
- What is Keyboard & how to use it?
- How keys are organized on a standard Keyboard
- Typing & editing the text using Keyboard
- Using Keyboard Shortcuts
- Find program shortcuts
- Choose menus, commands, and options
- Some useful shortcuts
- Using the keyboard extras
- Using navigation keys
- Using the numeric keypad
- Three odd keys
- Use your keyboard safely
- Create keyboard shortcuts to open programs
- Make the keyboard easier to use
- Type without using the keyboard (On-Screen Keyboard)
- Set On-Screen Keyboard to use for various handy tasks
- The Shortcuts Collection
- General Windows functions keyboard shortcuts
- Dialog box keyboard shortcuts
- Windows logo key keyboard shortcuts
- Windows Explorer keyboard shortcuts
- Ease of Access keyboard shortcuts
- Magnifier keyboard shortcuts
- Remote Desktop Connection keyboard shortcuts
- Keyboard shortcuts for MS Paint
- Keyboard shortcuts for WordPad
- Keyboard shortcuts for Calculator
- Windows Journal keyboard shortcuts
- Windows Help viewer keyboard shortcuts
- Windows Media Player keyboard shortcuts
- Internet Explorer keyboard shortcuts
- Windows Media Center keyboard shortcuts.
Hide Windows Partition Without Software
Hack Victim Facebook Account By His Friend List
Enter the victim account id address and click in search option.You see a new window like given below...
AOL Postmaster Website hacked by HODLUM
AOL finally discovered the hack, and fixed the page between two and four hours after evidence of the breach was posted to Reddit.com. The various forums where this hack was posted all included various jokes along the lines of, “AOL still exists?!” Ouch…
The AOL Postermaster blog has so far not responded to the hack. The hack of AOL Postmaster comes at the end of a difficult week for AOL. While the hack of a minor AOL web property has nothing to do with the poor performance of its stock, the incident can only serve to worsen the mood at a company that’s struggling to stay upright.
Surf internet anonymously
Genuine your Windows for latest update
Don't display the last user who logged in the windows
Hack and find the IP address of the chat buddy
Copy the source code and paste in the chat box and say to the victim for click on the link ,when victim click on the link then he see a picture which chose by you and tracking start after 20 second go to chatrack and open the Track Result option shown in above pic,you got all information of the victim.
Security Software That Can Detect And Kill Hidden Trojan Virus And Keylogger
Process Revealer
Make avg_antivirus_2011 License
Hackarde's Search Engine- Search Hacking Tutorial,Tool and eBook
Popular Posts
Labels
- Android (1)
- AntiVirus (6)
- BackTrack Series (19)
- Batch Programming (2)
- Book (8)
- Command Prompt (6)
- Contest (4)
- Cracking (4)
- Gmail (4)
- Hacking (89)
- Hacking Lab (3)
- Hardware (2)
- Internet (40)
- IP Address (13)
- Javascript (2)
- Keylogger (4)
- Linux (1)
- Malware (2)
- Media Player (1)
- Metasploit (2)
- Mobile (11)
- Network Security (2)
- News (25)
- openssl (1)
- Phishing (2)
- Proxy (11)
- Security (61)
- Social Networking (21)
- System (29)
- Tool (50)
- Video Tutorial (2)
- virus (7)
- VPN (1)
- vulnerability (1)
- Web Browser (30)
- Web Hacking (28)
- WebTrick (47)
- windows feature (25)
- Wireless Hacking (3)
- YouTube (4)