Internet Security and Ethical Hacking

Internet Security and Ethical Hacking

Welcome to the unique confluence of hackers , crackers and security professionals
on the world wide web.
This is your complete resource for internet security and ethical hacking.

Ethical Hacker -: The Ethical Hacker :-
Most people think that hackers are computer criminals. They fail to recognise the fact that criminals and hackers are two totally different things. Media is responsible for this. Hackers in reality are actually good and extremely intelligent people who by using their knowledge in a constructive manner help organisations, companies, goverment, etc. to secure documents and secret information on the internet.


WELCOME TO ALL VISITORS

PLEASE BOOKMARK THIS BLOG FOR DAILY UPDATES. FOR HACKING TIPS GO TO COMPUTER SECTION. FOR MORE INFORMATION CONTACT US .
Your Ad Here

SEARCH FROM HERE

Friday, August 20, 2010

OUR NEW WEBSITE

WWW.ONLY4ENGG.COM

Monday, May 10, 2010

MY NEW SITE

WWW.LUV2DOWNLOAD.BLOGSPOT.COM

FOR MORE SOFTWARES--TRICKS--MOVIES--GAMES--EBOOKS ETC MUCH MORE

GO AND BECOME MEMBERS

Sunday, February 21, 2010

WIRE LESS NETWORK HACK

text describing the image

WIRE LESS NETWORK HACK AND OTHER


Monday, January 25, 2010

SUPER BLUE TOOTH HACK LATEST AND FULL

text describing the image

SUPER BLUE TOOTH HACK LATEST AND FULL HACK ANY BLUE TOOTH NETWORK AND ALSO COPY CONTACTS MESSAGES FROM ANY BLUE TOOTH MOBILE

WIFI HACK TOOL ONLY FOR ONLINETECHNICALTUTORS READERS

text describing the image

HACK ANY WIFI NETWORK OR WIRE LESS NETWORK USING THIS SOFTWARE FULL AND WORKING TESTED

Friday, January 15, 2010

HACERS BLACK BOOK ONLY FOR HACKERS

text describing the image

HACERS BLACK BOOK ONLY FOR HACKERS DOWNLOAD LIMITED EDITION...


Monday, January 11, 2010

BSNL BROAD BAND ERRORS AND REMEDY COMPLETE COLLECTION BY DARK MASTER

ALL ERRORS AND REMEDY COLLECTION IN BSNL BROAD BANDS (INDIA).

text describing the image

BSNL BROAD BAND ERRORS AND REMEDY COMPLETE COLLECTION BY DARK MASTER. TROUBLE SHOOT YOUR BSNL BROAD BAND CONNECTION ERRORS


Saturday, January 9, 2010

-: Format A HDD With Notepad :-

text describing the image

-:Format A HDD With Notepad:-COMPLETE TUTORIAL DOWNLOAD FROM HERE....

LATEST TUTORIAL FOR AIRTEL FREE GPRS

text describing the image

LATEST AIRTEL TUTORIAL FOR FREE GPRS ON YOUR SYSTEM FULL TRICK

-: Remotely Shutdown Your Computer With Cellphone :-

text describing the image

This Tutorial show you how to shutdown your computer from anywhere using a cell phone, Microsoft Outlook and a free account from www.kwiry.com


This Tutorial show you how to shutdown your computer from anywhere using a cell phone, Microsoft Outlook and a free account from www.kwiry.com

New Window XP Tricks(Set 1) - Boost Xp to Obtain Max Performance

Many peoples having the expertize in the windows. They do their best to find out the soluations of problem against charging high cost. Here you got the opporunity of few hidden window xp tips. I wrote and gather added more tips for you.
Restarting Windows without Restarting the Computer:

When you click on the SHUTDOWN button, make sure to simultaneous press SHIFT Button. If you hold the Shift key down while clicking on SHUTDOWN button, you computer would restart without restarting the Computer. This is equivalent to term "HOT REBOOT".
To Increase the Internet Speed:

Open Notepad and paste the below code in it.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip
\Parameters]
"SackOpts"=dword:00000001
"TcpWindowSize"=dword:0005ae4c
"Tcp1323Opts"=dword:00000003
"DefaultTTL"=dword:00000040
"EnablePMTUBHDetect"=dword:00000000
"EnablePMTUDiscovery"=dword:00000001
"GlobalMaxTcpWindowSize"=dword:0005ae4c

Now save this file as speed.reg. Execute it and observe the change!
Smooth out your mouse movement:
Assuming you are using a PS/2 mouse, this tip can help give you smoother and more precise mouse control. Good for gaming and for your nerves in general. Studies have shown that smooth mousing reduces fatigue and stress and generally promotes a healthy cheerful glow (your experience may vary).

On to the tip: Right click on 'my computer' and select properties. Choose the 'hardware' tab, then the 'device manager' button. From the device manager window, find your PS/2 mouse and select 'properties.' In the 'advanced settings' tab, set the 'sample rate' to 200.

SQL INJECTION HACK ANY WEBSITE DATA BASE ONLY FOR EDUCATIONAL PURPOSE

text describing the image

SQL INJECTION ONLY FOR EDUCATIONAL PURPOSE PLEASE DON'T MISS USE IT WE ARE NOT RESPONSIBLE FOR ANY TYPE OF MISS USE OF THIS SOFT WARE

HOW TO HACK CYBER OAM TO ACCESS ALL BLOCKED SITES IN YOUR COLLEGE

A Trojan horse is an unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user.
  • It is a legitimate program that has been altered by theplacement of unauthorized
  • code within it; this code performs functionsunknown (and probably unwanted) by the user.
  • Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user.

Working of Trojans

  • Attacker gets access to the trojaned system as the system goes online
  • By way of the access provided by the trojan attacker can stage attacks of different types.
Various Trojan Types
  • Remote Access Trojans
  • Password Sending Trojans
  • Keyloggers
  • Destructive
  • Denial Of Service (DoS) Attack Trojans
  • Proxy/Wingate Trojans
  • FTP Trojans
  • Software Detection Killers
Modes of Transmission
  • Attachments
  • Physical Access
  • Browser And E-mail Software Bugs
  • NetBIOS (File Sharing)
  • Fake Programs
  • Un-trusted Sites And Freeware Software
Backdoor Countermeasures
  • Most commercial ant-virus products can automatically scan and detect backdoor programs before they can cause damage (Eg. before accessing a floppy, running exe or downloading mail)
  • An inexpensive tool called Cleaner TROJAN REMOVER can identify and eradicate all types of backdoor programs and trojans.
  • Educate your users not to install applications downloaded from the internet and e-mail attachments.

HOW TO HACK CYBER OAM TO ACCESS ALL BLOCKED SITES IN YOUR COLLEGE

Hello Frens I am back with another hacking tutorial . This time I will explain you all " How to Hack or Unblock cyberoam to access all blocked sites in college or company" . Tutorial will be noob friendly as everything is explained with the help of snapshots...So to know How to hack cyberoam Read On....

First of all Guys You Must Know What is Cyberoam and What Idea it uses to block the user.

Image and video hosting by TinyPic



What is Cyberoam :

Cyberoam is Identity-based unified threat management appliances, offer comprehensive threat protection with firewall-VPN, anti-virus, anti-spam, intrusion prevention system, content filtering in addition to bandwidth management and multiple link load balancing and gateway failover.
Identity-based controls and visibility are critical components of network security. With identity and network data combined, enterprises are able to identify patterns of behavior by specific users or groups that can signify misuse, unauthorized intrusions, or malicious attacks from inside or outside the enterprise. Activities and security policy rules can be enforced on network segments based on identity.

THINGS THAT WE NEED TO HACK CYBEROAM??
1.FootPrint IP . (Our Ip that is being footprinted or traced by any website that we visit. In short NAT outside local IP).

2. An Open PORT generally its 3128. (3128 port is active port which is always open If your computer has Network assessiblity.)

3. Proxifer and Its Settings. (any Version after 2.17).

Now that's the only things that we need If we want to hack or bypass the cyberoam Client. Now Detailed Hack Is below...



HACKING CYBEROAM (DETAILED HACK)
Stepwise Description:
1. First of all We need to get the FootPrint IP . Simple Method to Get FootPrint IP.
2. Open Your Mozilla Firefox Web Browser And type the Following Site.
https://your-freedom.de
3. When you Open the Site you will see something like this:

Image and video hosting by TinyPic

Click On I understand the risk (THIS IS TO ACCEPT SSL CERTIFICATE)

Image and video hosting by TinyPic


Click on Add Exception



Image and video hosting by TinyPic

CLICK ON CONFIRM SECURITY CERTIFICATE.
Image and video hosting by TinyPic



4. Now Guys We have Got the Footprint IP. Next thing is that We Neeed PORT for Accessing It.
USE PORT 3128 as Its open by default on system which have aceess to Internet.

5. NOW DOWNLOAD THE FOLLOWING SOFTWARE (PROXIFIER)

PROXIFIER ONLY FOR EDUCATIONAL PURPOSE PLEASE DON'T MISS USE IT WE ARE NOT RESPONSIBLE FOR ANY TYPE OF MISS USE OF THIS SOFT WARE





6. Its a Portable version of Proxifier . So need Not To Install. Just Click on It And Extract Anywhere you want. I prefer In Pen Drive.

Image and video hosting by TinyPic

7. After that You will Get Some Files LIKE THIS and CLICK ON PROXIFER TO RUN IT.
Image and video hosting by TinyPic

8. Now see the Task Bar. You will See something Like This. Clcik on that.

Image and video hosting by TinyPic

9. CLICK ON OPTIONS AND THEN ON ROXY SETTINGS.
Image and video hosting by TinyPic

10. NOW TO THE FOLLOWING SETTINGS AS SHOWN:

Image and video hosting by TinyPic

11. Now do the Settings as Shown Below. and Click Ok.

Image and video hosting by TinyPic



12. Now CLICK OK . AND OPEN THE WEBSITE YOU WANT:
Image and video hosting by TinyPic


NOW THATS ALL OVER THE FULL TUTORIAL. HOPE YOU WILL ENJOY IT ..

ALL QUESTIONS ARE WELCOMED.. IF YOU HAVE ANY QUERY ASK ME I WILL HELP YOU

Dark Master

MAKE YOUR OWN 1 YEAR RAPID SHARE PREMIUM ACCOUNT

FREE RAPID SHARE ACCOUNT.....
MAKE YOUR OWN PERSONAL 1YEAR PREMIUM ACCOUNT IN RAPID-SHARE ONLY FOR ONLINETECHNICALTUTORS.BLOGSPOT.COM VISITORS

SPECIAL IN DECEMBER.


GO TO THE LINK OR CLICK ON THE BANNER




CLICK ON CREATE A FREE ACCOUNT
AND THEN MAKE A ID FOR
AND THEN SELECT A PASSWORD
AND ENTER YOUR NAME
AND AGE
AND EMAIL- PLEASE ENTER A VALID EMAIL ID.
THEN ENTER SECURITY CODE AND CLICK ON CREATE ACCOUNT.


AFTER THAT

CLICK ON HOME-- IN THE END
YOU SEE FOLLOWING SURVEYS ARE AVAILABLE
THEN CLICK ONE BY ONE AT ALL AND SERVAY ALL SERVAY SITES.

AFTER THAT YOU WILL EARN 27$ USD.

AND THEN MAKE A ACCOUNT ON ALER-PAY CLICK ON LINK OR BANNER FOR MAKING ALERT-PAY ACCOUNT IN FREE....



AFTER THAT ASK FOR REDEEM MONEY

AND CLICK ON ALERT-PAY FOR RECEIVING MONEY.


GO TO RAPID SHARE

AND CLICK ON PREMIUM ACC.

AND THEN SELECT THE PAYMENT METHOD

ALERT PAY FOR PAYMENT SELECTING OTHER METHOD OF PAYMENT



I HAVE 200 RAPID PREMIUM ACCOUNTS.

Removing the Shortcut Icon Arrows


1.Open RegEdit
2.Open the Key HKEY_CLASSES_ROOT
3.Open the Key LNKFILE
4.Delete the value IsShortcut
5.Open the next Key PIFFILE
6.Delete the value IsShortcut
7.Restart the Windows

JUST COPY AND PASTE THIS SCRIPT INTO YOUR WEB BROWSERS ADDRESS BAR

javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)

Monday, January 4, 2010

How to Make Invisible Password Protected Folder?

Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.


How to create a Password Protected Folder
Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.
Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.
Step-3: Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.
Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.
Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.
Step-6: Now goto the File menu and select the option Add a password.
ie: File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the passwordprotected folder.

How to make it Invisible
Step-1: Now Right-click on this password protected folder and select Properties.
Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).
Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options
  • Do not show hidden files and folders
  • Show hidden files and folders
Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.
I hope you like this post. Pass your comments!! Cheers

How To Make Notepad Write On Its Own

Hello Guys today another Awesome Trick I will share with you all.. Today I will show you " How to Write the Text automatically in Notepad" . This is a really an Awesome Prank ..You can show Your Friends and say that My Notepad Writes Automatically..So Read On....

STEPS:

1. Open the Notepad and Type the Code Given Below.

set wshshell = wscript.CreateObject("wscript.shell")
wshshell.run "Notepad"
wscript.sleep 2000
wshshell.AppActivate "Notepad"
WshShell.SendKeys "H"
WScript.Sleep 500
WshShell.SendKeys "ell"
WScript.Sleep 500
WshShell.SendKeys "o "
WScript.Sleep 500
WshShell.SendKeys " "
WScript.Sleep 500
WshShell.SendKeys " Friends"


2. Save it as anyname.vbs (Note the vbs extension)

3. Now Open the anyname.vbs file by doublecliking on it and see the Magic..



Note: Wscript.Sleep 500 is for delay (delay that you want to introduce between writing words) and
WshShell.SendKeys " Any Text that you Want to Display"

Enjoy Guys and Have Fun!


M Backkkk Again Rock D worlddddd

Hacking Class 10 -How To Prevent Urself from Scanning??

Till Now We have Discussed that How to extract the Information about the Site and Individual/site/organisation and scanning them for getting live ports or vulnerabilities to attack them.


Today I will explain you How to Prevent Yourself from Scanning.. and Tomorrow I will give you the Live demonstration of hacking and attacking a website with complete snapshots.
First of all you should know How to protect yourself from these attacks... Its really important that you should know the Counter measures of what you are doing... In case you will face the same problem yourself...:P




THESE ARE THE CERTAIN STEPS AND THINGS YOU SHOULD REMEMBER:


1. Use a Good Firewall to block all the illegal port activity. The Firewall blocks almost all unauthorized attempts by attackers except the following Ports i.e Firewall doesn't monitor port 80,8080,8181,3128,53.

Now You should Know Which Port Stands for What...


Port 80 is for servers(webservers).
Port 8080 is for HTTP clients.
Port 8181 is for HTTPS clients.
Port 3128 is a active port Needed for all Network processes.
Port 53 is for DNS.


Now If you Have a Good Firewall all illegal activity other than these ports can be blocked. Now the Only chance to being attacked is through 80,8080 and 8181. i.e through websites...When you open some malicious website containing malware scripts there are most chances of being attacked.
So from this you can guess What will be the Second point...Right..


2. Use a Good Web Shield Preferable AVG or any other Good Web shield. This will prevent you from attack through websites...


3. Third way to get attacked is through softwares.
As we all know most of us use Pirated Softwares and Download it from anywhere i.e where we find it and also we doesn't know the Uploaders...
This is the currently going practice Nowadays. Hackers upload softwares and attach a malicious softwares and hack tools with them like keyloggers, trojans, spywares etc.. with them. Now Here user Himself downloads the attacker files. SO there must be something to prevent from this attack. You canguess for what I am talking...
Ya Surely I am talking about Good Antivirus... I will recommend all to use AVIRA Antivirus and KASPERSKY. Its because of their interativeness.


4. Fourth Point And most Important One...Please Note Most Important One...


Note: It took only 50 sec to 1 minute to scan the system and 3 minutes to attack any system and damage it.
Why I am saying this Important its because no tool is made to detect these type of attacks...If you open this nothing can prevent you from attacked...
So prevention is better than Cure. Don't open them. For which I am talking.



I am talking about anonymous mails and spams in your Email ID's. Point to remember 3 out of 1 mail is a spam and 5 out of 1 contains a virus or attack script. Nowadays you will get emails like you have won 100000$ or something like these... these all mails are BOTNETS., these are viruses. they all are asking you about your personal Information and ask you to follow the Link..
You all have noticed that when you click the link it shows Redirecting ...around 30 sec ..and then just show you are not eligible for this or this offer is not available in you country... Between the time when they say redirectingggg... they are scanning your system.....and if they find something on you system they attack your system and get access to it...
Sooooooo, DON'T open the mails that come from some anonymous source...




This is all about Scanning Part .. I think you all will like this..
If you have any queries ask me.. I will reply soon.


I WAS BUSY FROM LAST SOME DAY... I M BACKKK ROCK D WORLD AGAIN.....

ASK YOUR QUESTIONS


Your Name
Your Email Address
Subject
Message
SEND YOUR IDEAS
Image Verification
captcha
Please enter the text from the image:
[ Refresh Image ] [ What's This? ]

 
Home | About Owner | Tutorials | Freebies | About Us | Contact Us

Copyright © 2009 CYBERWORLD |Designed by 13551421 143 Templetemo |Converted to blogger by Dark Master