Monday, 19 August 2013
Protect Folder with Password without any Software
In this tutorial i will show you interesting and usefull trick to password protect folder without using any software using batch file programming. This trick will work on all windows platform (Win XP, Win 7). Follow below tutorial to learn this trick.
How To Lock Folder ?
20 interesting and extremely helpful Linux command line tricks
As you start spending more and more time working on Linux command line, you tend to learn some cool tricks that make your life easy and save you lot of time. I have been working on Linux command line for many years now and I have learned a lot of Linux command line tricks. Here in this article, I will discuss some Linux command line tricks that I find worth using in my day to day command line activities.
NOTE – All the examples in this article are tested on bash shell.
NOTE – All the examples in this article are tested on bash shell.
Saturday, 10 August 2013
Sunday, 21 July 2013
Sunday, 14 July 2013
The Handy Linux Commands You Should Be Aware Of
linux
I remember myself when first starting to learn about linux and unix that i was pretty intimidated about the several unix commands and how i would go about using them. It was a pretty long going process before getting used to them and so i thought that it would be nice if i wrote a post describing what are the various linux commands or tools that i tend to use almost everyday.
I remember myself when first starting to learn about linux and unix that i was pretty intimidated about the several unix commands and how i would go about using them. It was a pretty long going process before getting used to them and so i thought that it would be nice if i wrote a post describing what are the various linux commands or tools that i tend to use almost everyday.
10 Useful Linux Commands For Programmers and Advanced Users
Linux is getting more and more users daily. Throughout the years it has steadily become one of the best choices in OS, whether it’s about casual users or hardcore programmers. On the surface, Linux, especially with the Ubuntu distribution, has made a great effort in standardizing Linux as a close rival of Windows and Mac OS. However, Linux is not just about a nice GUI, stability and security. It allows for more advanced usage, that can deeply help you with everyday tasks and projects, especially if you are a computer programmer. In this tutorial, we are going to be discussing a list of 10 very important linux tips that can greatly help the life of programmers and advanced Linux users.
Introduction to Reverse Engineering and Software Cracking
Reverse Engineering has actually been the main reason why i first began learning more about computers. The days when i would go about opening up hiew editor in order to change that little 74 opcode to 90 seem hilarious at the time of writing this text, but i can understand all those people who just begin learning more about software cracking.
In this little post, i will be explaining some of the important aspects of the trade. In the next posts to come at this blog, i will also be taking some hands on approach, showing you how to crack real protections. For starters, though, i want to make a short introduction to the history of this fascinating scene and then i will describe the tools needed in order to crack efficiently and also what knowledge you would need to obtain to do so.
In this little post, i will be explaining some of the important aspects of the trade. In the next posts to come at this blog, i will also be taking some hands on approach, showing you how to crack real protections. For starters, though, i want to make a short introduction to the history of this fascinating scene and then i will describe the tools needed in order to crack efficiently and also what knowledge you would need to obtain to do so.
Friday, 12 July 2013
Angry bird space 2012 with crack
Description:
NEW GAMEPLAY MECHANICS: Use lightsabers, Blasters and Jedi powers to wreak havoc on the Imperial Pigs
LEVEL UP YOUR BIRDS: Keep playing and level up your birds to improve their skills
SECRETS AND HIDDEN GOODIES: Can you unlock all the R2-D2 and C-3PO bonus levels? May the birds be with you!
A long time ago in a galaxy far, far away… a group of desperate rebel birds faced off against a galactic menace: the Empires evil Pig troopers Rebel birds, striking from a hidden base, have won their first victory against the evil Imperial Pigs. During the battle, Rebel spies managed to steal secret plans to the Empires ultimate weapon, the PIG STAR, and are racing to deliver the plans to the Rebel Birds. Now they need your help Join an epic adventure with the Angry Birds in the legendary Star Wars universe Use the Force, wield your light saber, and blast away Pig troopers on an intergalactic journey from the deserts of Tatooine to the depths of the Pig Star — where you'll face off against the terrifying Darth Vader, Dark Lord of the Pigs Can you become a Jedi Master and restore freedom to the galaxy? Time to grab your light saber and join the adventure May the birds be with you.
Features:
HOURS AND HOURS OF ENGAGING GAMEPLAY: Explore more than 80 levels in iconic locations like Tatooine and the Pig Star. Can you dodge Imperial pigs, laser turrets, Tusken Raider pigs, and the dark side of the Force to get all three stars?NEW GAMEPLAY MECHANICS: Use lightsabers, Blasters and Jedi powers to wreak havoc on the Imperial Pigs
LEVEL UP YOUR BIRDS: Keep playing and level up your birds to improve their skills
SECRETS AND HIDDEN GOODIES: Can you unlock all the R2-D2 and C-3PO bonus levels? May the birds be with you!
How to see Hidden Files?
How to see Hidden Files?
In windows XP it is possible to hide file by changing their attributes.In this tutorial I will show how to see them.
It is very to easy to see hidden files....
STEPS:
- click on start menu,then open control panel.
Thursday, 6 June 2013
LAN hacking
USING LANSPY:
LanSpy is a set of network utilities brought together in a single program with simple and easy-to-use interface.
LanSpy help network administrators maintain and manage their networks.
LanSpy includes fast port scanner for gathering information about open ports on remote computer, LanSpy displays services using these ports.
Look at your computer with bad guys eyes!
LanSpy is made for gathering the following information about a remote computer:
Ping
Domain name
NetBios names
MAC address
Server information
Domain (workgroup) information
Domain controllers
Remote control
Time
Disks
Transports
Users
Logged users
Global groups
Local groups
Security options
Shared resources
Sessions
Open files
Services
Processes
Registry
Event log
TCP port scanner
UDP port scanner
What for?
Audit your network for security reason issues
View processes on remote computers
Show list of installed application on workstations
Detect shares, open ports and user accounts
LanSpy complies only with Windows 2000/XP/2003.
LanSpy will help you to learn about a remote computer everything or almost everything
click here to download:
DOWNLOAD
LanSpy help network administrators maintain and manage their networks.
LanSpy includes fast port scanner for gathering information about open ports on remote computer, LanSpy displays services using these ports.
Look at your computer with bad guys eyes!
LanSpy is made for gathering the following information about a remote computer:
Ping
Domain name
NetBios names
MAC address
Server information
Domain (workgroup) information
Domain controllers
Remote control
Time
Disks
Transports
Users
Logged users
Global groups
Local groups
Security options
Shared resources
Sessions
Open files
Services
Processes
Registry
Event log
TCP port scanner
UDP port scanner
What for?
Audit your network for security reason issues
View processes on remote computers
Show list of installed application on workstations
Detect shares, open ports and user accounts
LanSpy complies only with Windows 2000/XP/2003.
LanSpy will help you to learn about a remote computer everything or almost everything
click here to download:
DOWNLOAD
Sunday, 27 January 2013
DOS COMMANDS
Actually Anyone can find out commands in DOS as they are not hidden & accessible to everyone.(NOT REQUIRED ADMIN PERMISSIONS) Then also I'm telling Some helpful command Which might help you:
LIST OF COMMANDS:
- EDIT - windows have there old plain text editor comes in blue screen from which we can create,read modify existing TXT documents.
- BOOTCFG - This is comes in somewhat for advanced users as editing it in wrong way may cause os to be corrupt.....this bootcfg command is used to build, modify, or view the contents of the boot.ini file, a hidden file that is used to identify in what folder, on which partition, and on which hard drive Windows is located.
- DATE- The date command is used to show or change the current date.
- ECHO- The echo command is used to show messages, most commonly from within script or batch files. The echo command can also be used to turn the echoing feature on or off.
- shutdown - It have different options like shutdown, log off, restart , shutdown with forced closing of processes , & much more
- EXIT - exit is used to exit or close the command prompt
- HELP - It is very important command as it contains the list of all the commands with discription.
- if you have any issues of caommand then just put help after that command
- CLS - clears the screen
- COPY - it copies one file at a time
- CALL - another batch program can be accessed from different location
Those are only related to desktop
there are many commands which useful in networking to know IP adress & much more
I'll be posting it on my next post...
still good bye...& stay connected......
Sunday, 20 January 2013
Password Recovery Tool
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptoanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.
Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Please carefully read the License Agreement included in the program before using it.
The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LAN and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptoanalysis attacks, password decoders and some not so common utilities related to network and system security.
Here Is Download Link of the Software from there official site:
Subscribe to:
Comments (Atom)


