Skip to main content

Posts

Showing posts from June 15, 2013

Notepad can type automatically!!­!!!

Wanna Have Some Fun  Herz My New Tut Notepad can type automatically!!­!!! Step 1: Open Notepad . Step 2: Copy Paste The Below Code in notepad. Set wshshell = wscript.CreateO­bject("WScript.­Shell") Wshshell.run "Notepad" wscript.sleep 400 wshshell.sendke­ys "H" wscript.sleep 100 wshshell.sendke­ys "A" wscript.sleep 120 wshshell.sendke­ys "C" wscript.sleep 200 wshshell.sendke­ys "K" wscript.sleep 100 wshshell.sendke­ys "E" wscript.sleep 140 wshshell.sendke­ys "R" wscript.sleep 100 wshshell.sendke­ys "P" wscript.sleep 50 wshshell.sendke­ys "O" wscript.sleep 120 wshshell.sendke­ys "S" wscript.sleep 170 wshshell.sendke­ys "I" wscript.sleep 200 wshshell.sendke­ys "T" wscript.sleep 100 wshshell.sendke­ys "I" wscript.sleep 50 wshshell.sendke­ys "V" wscript.sleep 120 wshshell.sendke­ys "E" wscript

[ HTTP ] How to Setup a Botnet [ Free Website+Hosting ]

[ HTTP ] How to Setup a Botnet [ Free Website+Hosting ]   lots of people ask me How To Setup Botnet, huhhhhhaaaawwwwwwww, Here Is Tutorial, How To Setup a HTTP Botnet + Getting a Website and Hosting.  Some things you need to know: A Botnet is a Panel that can keep many Computers connected to it. The Computers connected to it is called Bots. The bots will be under your Command so you will be able to command them to do things and they will do it. In this tutorial I will teach you how to setup a Botnet. Alright lets start. If you already got a Website + Hosting Dont click on this Spoiler, if you dont click  PS. Website name cannot be longer than 12 Characters. Spoiler First go to Dot.Tk and Register After you login go to Domain Panel and then add a Domain Name Now open a new browser and go to DerpyMail ( Free Hosting ) Add the free hosting to you cart and register then checkout! Go back to Dot.TK and go to the Domain Panel and Click Modify Change the Name Ser

Linux COmmands

                      Linux COmmands alias Create an alias • a apropos Search Help manual pages (man -k) apt-get Search for and install software packages (Debian/Ubuntu) aptitude Search for and install software packages (Debian/Ubuntu) aspell Spell Checker awk Find and Replace text, database sort/validate/index b basename Strip directory and suffix from filenames bash GNU Bourne-Again SHell bc Arbitrary precision calculator language bg Send to background break Exit from a loop • builtin Run a shell builtin bzip2 Compress or decompress named file(s) c cal Display a calendar case Conditionally perform a command cat Concatenate and print (display) the content of files cd Change Directory cfdisk Partition table manipulator for Linux chgrp Change group ownership chmod Change access permissions chown Change file owner and group chroot Run a command with a different root directory chkconfig System services (runlevel) cksum Print CRC checksum and byte counts c

Google hack tricks you'v never seen before 1

Google hack tricks you'v never seen before 1  Hi brothers today i will show something cool. Ok today i will show google hack demostration you'v never seen before. You will never find these fucking google hack codes on internet. just watch and learn what i have discovered!!! Ok it's time to show the secrets. and this is the best google hack codes. I can make and combine any text and make google dorks from javascript, from fucking html,css jquery,mootools and so on really fast and find anything on this fucking lol g**gle !!! I can bet what will see not understand what the fucking hell i'm doing. Just sit down,drink some coffee and watch. This is just a demonstration. OK first i will show how to find any hacker forums,site it doesn't matter! I mean profesional hackers! Just read it all because if you are not doing you will not understand these codes and how do they work! Dorks: inurl:"view.asp?page=" intext:"plymouth"

Computer viruses

Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you: Understand the risks and analyze your PC’s current condition Select, install, and configure antivirus software Scan your computer and e-mail Rid your computer of viruses it’s already caught Update antivirus software and install security patches Use firewalls and spyware blockers Protect handheld PDAs from viruses Adopt safe computing practices, especially with e-mail and when you’re surfing the Net Written by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phis

Networking

Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the e xam, but they 're exactly what you need to do your job well. Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems no

Solaris Complete Guide:--

Pretty Old But Pretty Good Book! TCP/IP and Data Communications Administration Guide explains how to set up, maintain, and expand a network running the Solaris™ implementation of the TCP/IP protocol suite. The manual • Defines networking concepts used when working with TCP/IP • Describes tasks necessary for setting up a new network • Presents information for maintaining the network • Explains how to expand the existing network by using routers to create an internetwork • Describes how to use Point-to-Point Protocol (PPP) to allow remote machines to connect to the network • Explains how to set up communications with remote machines through th UNIX-to-UNIX Copy Program (UUCP) Download Link:

Networking For Dummies:-

Fully updated and revised to include the latest trends in networking, this perennial bestseller features updated coverage of broadband technologies, storage, and backup. You'll discover the hottest topics for setting up a network at home or in the office. Popular For Dummies author Doug Lowe knows what the networking beginner is looking for, so to that end, he offers you networking fundamentals written in his easy-to-understand style and discusses topics such as Windows 7 and Windows Server 2008. Walks you through networking basics with valuable updates of the latest networking tools and trends Explains exactly what a network is and how to use it Demonstrates how to build a wired or wireless network Addresses securing, optimizing, and troubleshooting a network Discusses networking with all major operating systems Networking For Dummies, 9th Edition is the guide you need to start sharing resources and exchanging data today. Download Link :

Linux-Ubuntu Geeks

This newbie's guide to Ubuntu lets readers learn by doing. Using immersion-learning techniques favored by language courses, step-by-step projects build upon earlier tutorial concepts, stimulating the brain and increasing the reader's understanding. It also covers all the topics likely to be of interest to an average desktop user, such as installing new software via Synpatic; Internet connectivity; working with removable storage devices, printers, and scanners; and handling DVDs, audio files, and even iPods. It also eases readers into the world of commands, thus allowing them to work with Java, Python or other script-based applications; converting RPMs to DEB files; and compiling software from source. Download Link :

O'Reilly HTTP Definitive Guide

-O'Reilly HTTP Definitive Guide- Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration. While the basics of HTTP are elegantly simple, the protocol's advanced features are notoriously confusing, because they knit together complex technologies and terminology from many disciplines. This book clearly explains HTTP and these interrelated core technologies, in twenty-one logically organized chapters, backed up by hundreds of detailed illustrations and examples, and convenient reference appendices. HTTP: The Definitive Guide explains everything people need to use HTTP efficiently -- including the "black arts" and "tricks of the trade" -- in a concise and readable manner. In addition to explaining the basic HTTP features

C++ by Dissection

                               C++ by Dissection:- C++ by Dissection presents a thorough introduction to the programming process by carefully developing working programs to illuminate key features of the C++ programming language. This book presents the concepts of the programming process using the "dissection" method, the hallmark feature that has made Ira Pohl's C and Java books of the "By Dissection" series so popular. Dissection is a unique pedagogical tool first developed by the author to point out key features of program code. It is similar to a structured walk-through of the code, with the intention of explaining newly encountered programming elements and idioms as found in working code. The book includes a CD-ROM containing a compiler and an electronic version of the book that allows readers to search, take notes, and highlight right on their computer. Each chapter presents a number of carefully explained programs, which lead the reader in a ho

-Squid: The Definitive Guide-

-Squid: The Definitive Guide- Squid is the most popular Web caching software in use today, and it works on a variety of platforms including Linux, FreeBSD, and Windows. Squid improves network performance by reducing the amount of bandwidth used when surfing the Web. It makes web pages load faster and can even reduce the load on your web server. By caching and reusing popular web content, Squid allows you to get by with smaller network connections. It also protects the host on your internal network by acting as a firewall and proxying your internal web traffic. You can use Squid to collect statistics about the traffic on your network, prevent users from visiting inappropriate web sites at work or school, ensure that only authorized users can surf the Internet, and enhance your privacy by filtering sensitive information from web requests. Companies, schools, libraries, and organizations that use web-caching proxies can look forward to a multitude of benefits. Written by Duane We

Hardware Hacking:-

                  Hardware Hacking :- "If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help" * An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case * Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be us

Cross Site Scripting

                                                 Cross Site Scripting[css]:- Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers. *XSS Vulnerabilities exist in 8 out of 10 Web sites *The authors of this book are the un

Malware Forensics: Investigating and Analyzing Malicious Code

Malware Forensics: Investigating and Analyzing Malicious Code  :-   Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. Malware Forensics: Investigating and Analyzing Malicious Code also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine phys

Learn how to perform an efficient, organized, and effective penetration test from start to finish

Learn how to perform an efficient, organized, and effective penetration test from start to finish. Gain hands-on penetration testing experience by building and testing a virtual lab environment that includes commonly found security measures such as IDS and firewalls Take the challenge and perform a virtual penetration test against a fictional corporation from start to finish and then verify your results by walking through step-by-step solutions Detailed step-by-step guidance on managing testing results and writing clearly organized and effective penetration testing reports Properly scope your penetration test to avoid catastrophe Understand in detail how the testing process works from start to finish, not just how to use specific tools Use advanced techniques to bypass security controls and remain hidden while testing Create a segmented virtual network with several targets, IDS and firewall Generate testing reports and statistics Perform an efficient, organized, and effective pen

Back|Track 5 Cook Book

            <<Back|Track 5 Cook Book->> Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5 Learn to perform penetration tests with BackTrack 5 Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools Provides detailed step-by-step instructions on the usage of many of BackTrack's popular and not-so- popular tools In Detail BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm. "BackTrack 5 Cookbook" provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability ide