infolinks

Popular posts

Technology World. Powered by Blogger.

Pages

Archive for December 2013

Recovery Softwares

  1. |Recuva|

About Recuva
:-

Accidentally deleted an important file? Lost something important when your computer crashed? No problem! Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3 player.
  • Download  Recuva          
       
    2.|Pandora Recovery| 
                                     
About Pandora:-Use this version if your deleted files are on a memory card, secondary hard drive, or other external drive.

PhysX System Software 9.13.0927


  • New 9.13.0927 PhysX System Software release is now available alongside with 334.35 GPU Drivers.


  • Official Release Notes are unknown.


  • You can download PSS 9.13.0927 from our server (35 mb)

How To Identify Fake Websites and Scams

How to identify fake websites and scams.

  • Follow these steps:
  1. http://www.scamadviser.com/



 2. Enter site name and press check now.


What Is RAT (Remote Access Trojan)




Defination
:-
RAT stands for Remote Access Trojan or Remote Administration Tool. It is one of the most dangerous virus out their over the internet. Hacker can use RAT to get complete control to your computer. He can do basicly anything with your computer. Using RAT hacker can install keyloggers and other malicious viruses remotely to your computer, infect files on your system and more. In this post i will tell you about what hacker can do with your computer using RAT and tell you about some commonly use RAT by hackers.

What Is RAT ?
A backdoor is an application allowing remote access to a computer. The difference between this type of malware and a legitimate application with similar functionality is that the installation is done without the user’s knowledge.Typical backdoor functionality includes the capability to send files to the host computer and execute files and commands on it, and to exfiltrate (send) files and documents back to the attacker. Often this is coupled with key-logging and screen-grabbing functionality for purposes of Spying and data theft.The term “RAT” (Remote Access Tool) can be considered a synonym to “backdoor”, but it usually signifies a full bundle including a client application meant for installation on the target system, and a server component that allows administration and control of the individual ‘bots’ or compromised systems.
What You Can Do With RAT ?

Once a RAT is installed on any computer hacker can do almost anything with that computer. Some malicious task that you can do with RAT are listed below:-
  • Infecting Files
  • Installing Keyloggers
  • Remotely start webcam, sounds, movies etc
  • Using your PC to attack Website (DDOS)
  • View Screen

Harmless RAT or Good RAT

As you have seen how harmfull RAT are for your computer, but their are some good RAT which some of you might be using daily. You might have heard of TeamViewer, it is a software which you use to control some one's computer with his permission for file transfer, sharing your screen and more.

Some Common Rats :-
  • ProRAT
  • CyberGate RAT
  • DarkComet RAT

Penetration Testing Lab With DVWA


1.What is Penetration Testing ?


Penetration testing is a practice of learning hacking skills against Web Applications,   Mostly White hat hackers or IT Security Team create a Penetration lab to practice their hacking tools, tricks and even to prevent hacking. Even beginner hacker also want to learn hacking skills like SQL Injection, XSS, CSRF attack etc, this all hacking tricks require a vulnerable website to Explode the Vulnerability and to learn hacking skills.

2.What is DVWA ? (Damn Vulnerable Web App)                        

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.


3.How to Install DVWA on Windows Platform ?


Installing DVWA on Windows platform is very easy just follow the steps given below.




  • Install Xampp server on Windows


  • Extract all files from DVWA to desktop


  • Copy entire folder "DVWA" to "C:\xampp\htdocs"



  • Now Start XAMPP Control Panel - Start [Apache] and [MySQL]



  • Now Just Open your Browser & type 127.0.0.1 or http://localhost Hit Enter


  • Choose DVWA folder & You'll get started with Login page.


  • Username : admin Password : password


  • Finally you're done. Now practice, learn, create & research.

Collection Of Important Programming Languages E-books

Posted by Unknown


Here today is something special for learner, Geeks and Programming Beginners. We have upload 40+ E-books of Important Programming languages, choose your favorite programming language, Download it and Learn, and all E-books are Verified, 100 % Virus Free. All E-books are in PDF Format with Images and Examples to understand Every Coding Method.


Note : Use Winrar or any other ZIP file Extracter to Extract ZIP files & you'll get PDF's



  • | Programming Languages E-books |



1. C Programming

Defination:
C Programming is one of the Popular and most Wanted Programming language ever, C is very useful to create Softwares and Programming Software, mostly C Programming is widely used in Programming Linux, Windows and OS.


  • C Programming Coding and Methods

http://www.mediafire.com/download/cvibt2232rwy2fu/C+Programming+Coding+and+Methods.zip

  • C Programming for Beginners

http://www.mediafire.com/download/l2ub9ibiyb5923d/C+Programming+for+Beginners.zip

2. C++ Programming 

Defination:
C++ is the Next Generation of C. C and C++ not having much difference but C++ is popular nowadays coz, easy to understand and easy to learn C++ instead of C. C++ is from same category of Software Programming, Mostly whatever program we use in Computer are designed and Created into C++, I would prefer you to learn C++ Instead of C.


  • C++ beginners

http://www.mediafire.com/download/taqi7scta1l88f4/C%2B%2B+beginners+%2814+Days+Learning+Course+Book%29.zip


  • C++ Middle Engineering Tutorial

http://www.mediafire.com/download/4my3emyz0qzy34a/C%2B_Middle_Enginnering_Tutorial.zip

3.HTML Web Programming and Designing


Defination:
HTML (Hyper Text Markup Language) is the web Programming language the most most most useful and useable Web Programming language, Programmer, hacker, developer everyone need to learn HTML. HTML is the Source and Base of all Web Programming languages, If you don't know HTML then you can't learn any Web Programming lang. I would prefer you to learn HTML and HTML 5 before starting to Javascript or PHP.


  • HTML Advance Codes

http://www.mediafire.com/download/4y2t55pbkvz11ub/HTML_Advance_Codes_.zip


  • HTML Basic for Beginners

http://www.mediafire.com/download/n0yi3fivnlt8shy/HTML_Basic_for_Beginners.zip


  • HTML Important Codes and tutorial

http://www.mediafire.com/download/tmr0z39ga1vtzfd/HTML_Important_Codes.zip

4. Javascript Web Programming + Designing 

Defination:
Now, Javascript - one of my fav Programming language. I would prefer you to learn Javascript after HTML so you can be the Best Web Programmer. I hope you can see a twitter bird flying on your Screen, just look on page - that bird is designed and moving coz, of javascript whatever web animations, widgets advance Web Application is running due to Javascript. Facebook, G-mail, Yahoo every Site uses Javascript to make their webpage more attractive, Understandable and Secure.


  • Beginning Javascript

http://www.mediafire.com/download/kty7swugdnksoes/Beginning_Javascript.zip


  • Javascript Tutorials

http://www.mediafire.com/download/yldy6a4etzhnh64/Javascript_Tutorials.zip

5. PHP + SQL + SQLi Programming

Defination:
As you know that SQL is a Programming lang. of Database (Structured Query Language) without SQL, we can't login to any website and access our files. SQL is the most useable Pogramming lang. SQL is only use for Database Structuring storing info data. Now PHP (Hypertext Pre-processor or Personal Home Page) PHP is widely used in web applications to connect with Server, Web Applications and SQL DB. PHP is really very useful in Web Programming world, without PHP there could be nothing. Every Hackers need to learn PHP,SQL and SQLI (SQL Injection).


  • Learn SQL

http://www.mediafire.com/download/ydk8vce9m6ci4pl/Learn_SQL_in_24_Hours.zip


  • PHP + SQL tutorials

http://www.mediafire.com/download/fuoo08i1rqnyseo/PHP_%2B_SQL_tutorials.zip


  • SQL Injection Attacks and Programming

http://www.mediafire.com/download/ym48zw27kbblk2h/SQL_Injection_Attacks_and_Programming.zip

What Is Keylogger And How To Be Safe From Keyloggers

Posted by Unknown

Defination
:

A keylogger is a software or hardware device which monitors each and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe from keyloggers. So lets learn somthing about keyloggers.

 1. What is keylogger ?

You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.

2. How it can harm you ?

In this section i will talk about how keylogger can harm you in different ways for example It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details, or any other activities you do on your computer.
Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.

3. How to Protect yourself from keyloggers ?

Keylogger  can be used by your enemy  to get sensitive information such as your Bank credit card details, or password of any social networking sites etc. In order to be safe keep following points in your mind.Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
You can even use above method to protect your facebook profile, yahoo or gmail id.When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.

Ardamax 4.0.3 With Serial Key

Posted by Unknown


1) Download Ardamax Keylogger 
4.0.3 form their official website:
http://www.ardamax.com/keylogger/

2) After Installation Reg with this user & Serial key

Code :
 User : Marvada Pinga
Serial : 00-67NK4K-BRUCE-07E

Password Hacking

-: Password Hacking :-


Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.

A password containing both uppercase &  lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength



3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.

Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.

Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.

Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.


Keylogger

Posted by Unknown
Download ActualSpy Keylogger ! 

https://app.box.com/s/eh68xbnvstnxafqlpweh