Internet Security and Ethical Hacking

Internet Security and Ethical Hacking

Welcome to the unique confluence of hackers , crackers and security professionals
on the world wide web.
This is your complete resource for internet security and ethical hacking.

Ethical Hacker -: The Ethical Hacker :-
Most people think that hackers are computer criminals. They fail to recognise the fact that criminals and hackers are two totally different things. Media is responsible for this. Hackers in reality are actually good and extremely intelligent people who by using their knowledge in a constructive manner help organisations, companies, goverment, etc. to secure documents and secret information on the internet.


WELCOME TO ALL VISITORS

PLEASE BOOKMARK THIS BLOG FOR DAILY UPDATES. FOR HACKING TIPS GO TO COMPUTER SECTION. FOR MORE INFORMATION CONTACT US .
Your Ad Here

SEARCH FROM HERE

Saturday, December 5, 2009

Hacking Class 9- Removing Traces Continues

Continuing from the Previous Lecture on Removing and Hiding Our Traces . Today we will discuss the Remaining four Points that we discussed tomorrow... So read on..


Tool to Bypass Government Censor : Psiphon Tool


~Psiphonis a censorship circumvention solution that allows users to access blocked sites in countries where the Internet is censored.
~Psiphonturns a regular home computer into a personal, encrypted server capable of retrieving and displaying web pages anywhere .
~Psiphonacts as a "web proxy" for authenticated psiphonites, retrieving requested web pages and displaying them in a user's browser.
~Psiphonuses a secure, encrypted connection to receive web requests from the psiphoniteto the psiphonode who then transports the results back to the psiphonite.

DOWNLOAD:

http://rapidshare.com/files/316738656/psiphon.zip



For More Details About Tool Visit:
http://psiphon.ca/



How To Bypass Google Tracing and What's the Need??
First I will tell you the Need . Everything that We searches over the Net i.e through google , Google makes a log of us ... Log contains 4 basic fields :

1. IP address
2. Search Query
3. ISP from which search is made
4. Time ,date,year etc..


Did you know that Google stores a unique identifier in a cookie on your PC, which allows them to track the keywords you search for? They use this information to compile reports, track user habits, and test features. In the future, it is possible they could even sell this information or share it with others. Even worse, Google's cookie isn't set to expire until the year 2038, unless you delete it first.


Now If you do anything that doesn't pass google censorship then you will surely going to suffer.




TOOL TO BYPASS GOOGLE TRACING : G-Zapper


G-Zapper helps protect your identity and search history. G-Zapper will read the Google cookie installed on your PC, display the date it was installed, determine how long your searches have been tracked, and display your Google searches. G-Zapper allows you to automatically delete or entirely block the Google search cookie from future installation.
SAMPLE LOOK UP OF YOUR SEARCHES:
DOWNLOAD:

http://rapidshare.com/files/316741667/gzappersetup.rar




Sorry Guys Currently my version of this software has expired so you have to work with trial..


We Will Continue Discussion in evening...

If you have any Queries Ask me..

No comments:

Post a Comment

ASK YOUR QUESTIONS


Your Name
Your Email Address
Subject
Message
SEND YOUR IDEAS
Image Verification
captcha
Please enter the text from the image:
[ Refresh Image ] [ What's This? ]

 
Home | About Owner | Tutorials | Freebies | About Us | Contact Us

Copyright © 2009 CYBERWORLD |Designed by 13551421 143 Templetemo |Converted to blogger by Dark Master