Rebirth of Google Hacking Database

>> Wednesday, December 29, 2010

The incredible amount of information continuously leaked onto the Internet, and therefore accessible by Google, is of great use to penetration testers around the world...

Read more...

Wireless Internet Connections Hacking

>> Friday, December 24, 2010

Have a laptop, or a wireless internet card in your PC? Have you ever been in the position that where you lost your WEP / WPA key, and you interested on retrieving it back? Well with Aircrack you can.

Read more...

Destructive Hacker Attacks In The Past 25 Years

>> Monday, December 20, 2010

From a computer virus named for a stripper to swarming botnet attacks on the Pentagon and Microsoft, The Daily Beast lists the 10 most infamous hacks, worms, and DDoS takedowns in the last 25 years....

Read more...

Hack Gears of War 3 in Bulletstorm : Epic Edition

>> Saturday, December 18, 2010

If you want your shoulderpads big and your quipping brosome, you'll surely want to pick up the Xbox 360-exclusive 'Epic Edition' of Bulletstorm, which was announced today... as it'll grant you early access to the Gears of War 3 public beta, that's 50% more bicep....

Read more...

Threads to PlayStation Network

Security issues with the online PC PlayStation Store may have allowed the unauthorized access of personal account information, Sony Computer Entertainment announced on the official UK and US PlayStation sites....

Read more...

Pentagon Whistleblower talk about Wikileaks

>> Friday, December 10, 2010

Pentagon Whistleblower Daniel Ellsberg on Wikileaks Iraq War Docs....


Read more...

Amazon servers banned WikiLeaks

WikiLeaks – the organization behind one of the largest diplomatic data dumps in history – was ejected from Amazon cloud-based servers, apparently under pressure from US politicians...

Read more...

Wikileaks Donations Blocked by Paypal

PayPal has posted a statement to its website, saying: "PayPal has permanently restricted the account used by WikiLeaks due to a violation of the PayPal Acceptable Use Policy,...

Read more...

Google on Risk by Chinese Hackers

>> Sunday, December 05, 2010

Contacts told American diplomats that hacking attacks against Google were ordered by China's top ruling body and a senior leader demanded action after finding search results that were critical of him, leaked U.S. government memos show....

Read more...

How to Enable/Disable Window Animations

Turn Off Animations for Individual Users :

  • [Start] [Run] [Regedit]
  • Registry Key: HKEY_CURRENT_USER\Control Panel\Desktop\WindowMetrics

Read more...

Hack internet Explorer 8 speed

When a user starts Internet Explorer is one of the most common performance issues seen with Internet Explorer 8. The primary cause of this problem is third-party add-ons that were either preloaded on a new computer or bundled with other software and installed over time....

Read more...

Get Hacked Iphone Apps : Install Apps with Installer.app and AppTapp

>> Thursday, November 25, 2010

I am amazed at the pace of iPhone hacking. Even a week ago, you’d see multi-step guides to installing apps on an iPhone. Now there’s a program (Installer.app) with a front-end called AppTapp that does everything in a nice graphical user interface (GUI) for you....

Read more...

Wifi networks being hacked in 5 seconds

>> Monday, October 25, 2010

A study conducted recently has found that nearly 50 per cent of Wi-Fi networks could be hacked. The study conducted in six cities and derived that out of 40,000 Wi-Fi network nearly 20,000 did not have passwords assigned to them....

Read more...

Hack a Computer in an Action Movie

>> Tuesday, October 12, 2010

Being the hero in an action movie isn't all about kicking evil in the teeth, leaping away from explosions, and making glamorous love while a hit single plays delicately in the background...

Read more...

How to Hack Apple TV

>> Tuesday, October 05, 2010

I decided to limit myself to just a couple of hours of Apple TV hacking this morning as I have books that need writing, children who need feeding, a house that needs cleaning and, lord almighty, you wouldn't believe the laundry.....

Read more...

How most wireless LANs Hacked in minutes!

>> Monday, October 04, 2010

Even after two years of WPA certification and nearly one year after802.11i ratification, you might be wondering why I’m still talking aboutWEP encryption.....


Read more...

Hack Your Android Phone

>> Saturday, October 02, 2010

Do you want to take control of your Android phone? By "rooting" your device, a process similar to jailbreaking an iPhone, you can install custom ROMs (images), which add stability and speed improvements to Google's mobile operating system.....






Read more...

How to Hack Window 7

>> Monday, September 06, 2010

Windows 7 pre beta build which was distributed has some amazing features like Aero Shake, new cool looking taskbar and interactive thumbnails and cool new look and feel....

Read more...

Internet threat: Hackers swarm bank accounts

>> Friday, August 27, 2010

The new trojan programs — which wait on your hard drive for an opportunity to crack your online banking account — are different from traditional "phishing" e-mail scams that try to trick you into typing your login information at fake bank websites...

Read more...

Hack Paypal account To Get Money $$$

This is how to hack the paypal accounts hurry before it's to late and paypal chanes the bots again.
This is the new bot and everything you need to know to get into paypal. My buddy who works for paypal told me about the new bots and all so yah

Read more...

Hacking Godfather ‘Maksik’ Sentenced to 30 Years by Turkish Court

A Ukrainian cybercrime lord linked to nearly every major breach of U.S. retail networks in the past four years was sentenced this week to 30 years in prison by a Turkish court. His sentence was on unrelated charges of hacking banks in that country, according to reports...

Read more...

How PIN Crackers Nab Holy Grail of Bank Card Security

Hackers have crossed into new frontiers by devising sophisticated ways to steal large amounts of personal identification numbers, or PINs, protecting credit and debit cards, says an investigator. The attacks involve both unencrypted PINs and encrypted PINs that attackers have found a way to crack, according to an investigator behind a new report looking at the data breaches...

Read more...

4 Hackers Indicted in $9.5 Million Bank Card Attack

Four men have been indicted in Georgia on charges that they hacked into the Atlanta-based bank card processing company RBS WorldPay. They allegedly used an army of flunkies to steal $9.5 million in cash from ATM machines around the world in a span of hours...



Read more...

How to Hack Computer inside LAN Network

>> Thursday, August 05, 2010

This technique will be taking advantage of Port 139. Most of the time,Port 139 will be opened in the computer. First of all, we will do a port scanning at the target computer which is having IP....



Read more...

Indian Hacker Hacked 2 Pakistani Websites

>> Tuesday, August 03, 2010

Indian Hacker Crazy009,a Member of Freehacking Team hacked 2 more pakistani wensites.

Darson Securities (Pvt) Ltd. is the major Pakistan based capital market brokerage....

Read more...

Six of Best White and Black Hat Hackers of All the Time

>> Sunday, August 01, 2010

While the real experience of hacking might not be accurately represented in movies, hackers certainly do become famous for white and black hat —good and bad— deeds.....



Read more...

Download Free AIO Latest Themes for Windows 7

>> Sunday, July 18, 2010

Requirements:
Operating system: Windows ® Se7en
Processor: Pentium III 1 GHz
Memory: 512 MB
Video card: 16 bit, 1280x800.....



Read more...

Obama's Twitter Hacker

>> Thursday, July 15, 2010

A 23-year-old Frenchman has been given a suspended jail sentence for hacking into US President Obama's account on micro-blogging site Twitter......





Read more...

Sex Tape Hacker Blackmail Woman

A man allegedly steals explicit home videos from girls' and women's computers and blackmails them to film more.....

Read more...

Malware on Jerusalem Post website

>> Sunday, July 11, 2010

Hackers compromised the website of the Jerusalem Post on Monday so that it served up malware.The attack relied on planting scripts on the site itself, rather than the more common tactic of compromising its ad-serving system to serve tainted ads....

Read more...

Hack Probed, Strathclyde Police website pulled offline

Strathclyde Police's website has been out of action for nearly 24 hours while its IT team investigate whether the force's online portal has been compromised by Chinese hackers....

Read more...

Free Download WinUtilities Pro 9.72

>> Friday, July 09, 2010

WinUtilities is a system tweaking suite that includes more than 20 tools to improve and tweak your PC's performance. It offers an attractive and easy to use interface that organizes all tasks into categories and provides graphical statistics whenever possible....

Read more...

Free Download Kaspersky Rescue Disk

Kaspersky Rescue Disk 10 - Special program for testing and treatment of infected x86 and x64-compatible computers. The program is used when the extent of infection, when it is not possible to cure your computer with antivirus programs or tools of treatment, run on operating systems........


Read more...

Install Tor in backtrack4 !!!

>> Tuesday, July 06, 2010

So you’ve been checking out BackTrack 4, and you want to get your anonymity on? This is assuming you have either installed BT4 to your hard drive or you’re using the VMWare version.........

Read more...

Download Free 4Media HD Video Converter v6.0.3 build 0419

>> Sunday, June 27, 2010

This professional HD converter software supports decoding and encoding of all High-Definition video formats including HD AVI, H.264/AVC, HD MPEG4 TS, HD MPEG2 TS, HD WMV, HD, and QuickTime, also converts AVCHD(.mts, .m2ts) to AVI/MPEG/MKV, etc. Plus, you can convert any general video and audio formats for playback on various digital devices.........

Read more...

Download Free Smart FTP 4.0.1122 (x32/x64) !!!

SmartFTP - This FTP client utility lets you share files in local area networks and between servers on the Internet. The program delivers secure, reliable and efficient file transfer.........


Read more...

PPPoE and bridge mode of ADSL Modem

>> Saturday, June 26, 2010

There are two ways to configure an ADSL modem for broadband connection. One in PPPoE (Point to Point Protocol over Ethernet) and the another is Bridge mode.
PPPoE Mode........

Read more...

Hacker Documentary Leaked!

>> Monday, June 14, 2010

After collecting cobwebs in a studio vault for the better part of a decade, an unreleased documentary on the 2003 hacking scene leaked onto the Pirate Bay Thursday........

Read more...

How Hacker Develops Multi-platform Rootkit for ATMs

>> Wednesday, May 26, 2010

One year after his Black Hat talk on Automated Teller Machine security vulnerabilities was yanked by his employer, security researcher Barnaby Jack plans to deliver the talk and disclose a new ATM rootkit at the computer security conference.........

Read more...

How USB Steals Pc Passwords

>> Friday, April 30, 2010

USB Steals Pc Passwords

Tweaked USB that steals every passwords including licences........



Read more...

Download vampire3.5+serial freeee

>> Thursday, April 29, 2010


get update vampire 3.5 + serial here........



Read more...

Download Free Flash Virus Killer 2010 Version

>> Saturday, April 24, 2010

This is a set of portable software to download to a removable disk (flash) is designed to destroy viruses, have necessarily causing harm to the system.........


Read more...

Download Avira AntiVir Personal 10.0.0.565 + ( Avira AntiVir Premium 10.0.0.601 ) Latest Updates

Avira AntiVir - Avira Company has updated its line of products for the security of the system, produced specifically for personal use.........

Read more...

How Hacker Restores Linux Support to PS3

>> Friday, April 23, 2010

Sony removed Linux support on the PlayStation 3 through the OtherOS feature with a firmware update. Before the firmware was live, hacker George Hotz ("GeoHot") vowed to restore support for Linux.........

Read more...

How Chinese Hackers Stole Dalai Lama’s Email, Government Secrets ?

Chengdu, China (AHN) - Security analysts have discovered an intricate community of cyber hackers they say breached computer networks in India, according to officials from the Dalai Lama, United Nations and numerous other countries.........

Read more...

Download Free Easy CD-DA Extractor 2010 Ultimate

>> Tuesday, April 20, 2010


Easy CD-DA Extractor aka “Swiss Army Knife Of Digital Audio” is ALL-IN-ONE software that copies Audio CDs, converts audio files from one format to another, edits metadata of audio files........

Read more...

How Pentagon trains workers to hack Defense computers

>> Saturday, April 17, 2010

The Pentagon is training people to hack into its own computer networks.
"To beat a hacker, you need to think like one," said Jay Bavisi, co-founder and president of the International Council of Electronic Commerce Consultants, or EC-Council.........

Read more...

Why WhitePages.com halts ad networks ?


WhitePages.com has stopped ad networks from delivering ads to its site after they were found to contain fake antivirus malware.........

Read more...

Start of Cyber World War 3

>> Friday, April 16, 2010


Einstein said: “I do not know with what weapons World War 3 will be fought, but World War 4 will be fought with sticks and stones.”
The State Department says that their network is attacked 50,000 times a day; which is probably 40,000 times less than the rest of our networks.........

Read more...

Free download MP3 Convert Master 1.1.1.395

>> Wednesday, April 14, 2010


MP3 Convert Master is an All-in-One MP3 converting tool that can convert WMA to MP3, Wav to Wma, Mp3 to Ogg, Mp3 to Wma, MP3 to WMA and other audio files between different formats. With MP3 Convert Master,........

Read more...

Free Download Hide Your IP Address V1.1

>> Tuesday, April 13, 2010

Everyone who is connected to the Internet – is unique, your own address IP.K Unfortunately, about 99% of hacker attacks using IP-address of the victim, to monitor or steal personal informatsiyu.Hide Your IP Address – protects personal information against spyware........





Read more...

Free Download Cool Screen Capture 7.0.1.377

>> Sunday, April 11, 2010

Cool Screen Capture is a great application which allows users to record their desktop activity. Professional technique and intuitive interface make it suitable for every customer.
Customers can capture video or image from DV, TV Tuner and other devices.........



Read more...

I Signed Up for SocialSpark!

>> Saturday, April 10, 2010

This is a Sponsored Post written by me on behalf of IZEA. All opinions are 100% mine.

SocialSpark is a Excellent social site,which help advestisers to advertise thier contents and products on blogs through bloggers with paying some revenue to bloggers.........

Read more...

How to Convert MTS/M2TS to MOV with Moyea MTS Converter for Mac ?

>> Monday, March 29, 2010

When buying a Sony HD Cam (HD-UX3), a HD HF200 camcorder, a JVC HD cam or any other ones, you will need an AVC high-definition (MTS/M2TS) player to view or playback the HD content via your pc or Mac computer..........



Read more...

How to Sneak the Internet at Work?

>> Tuesday, March 23, 2010

It simply amazes me what people at work will do to get their computer on the Internet; they risk loosing their jobs to surf Facebook, MySpace, porn, and outside e-mail accounts, and those ridiculous jokes they pass between each other. I've seen romances flame up and burn out on the same day, there are those that search for love and sex, online banking, bill paying, help with divorces, restraining orders, and marriages........

Read more...

Downlaod Free REFOG Employee Monitor !!!

>> Monday, March 22, 2010

Do all your employees use their computer resources and Internet connection solely for your business? Do they work as hard when you are away as they do when you are watching over their shoulders? In other words, do you suspect your employee's productivity is lacking? You should consider installing a surveillance system to address the problem.........



Read more...

How to Track the Hacker? Eposide 1 Part 2

>> Saturday, March 20, 2010

stealing your information from your computer and sendind to hacker is trackable path where you informations are to be sent..........

Read more...

How to Track the Hacker? Eposide 1

>> Friday, March 19, 2010

if someone steal your information from your computer and send to hacker,then what you do to track the hacker's path where you informations are to be sent..........

Read more...

Download Free Hijack Hunter v1.3.0

>> Wednesday, March 17, 2010


Hijack Hunter is an application that thoroughly scans your computer and displays all the gathered data in a comprehensive way.........

Read more...

Pak India Cyber Wars !!!

>> Tuesday, March 16, 2010

We all are aware of the wars India and Pakistan have fought and the resulted destruction especially precious human lives. In the current information age, some battles are not only fought with guns and tanks but also through media, internet and pen.........

Read more...

How to hack yahoo hotmail..etc (program)

>> Sunday, March 14, 2010


HAck yahoo hotmail..etc Accounts new 0day exploit
in this thread i will ut the program that exploit the vulnbility.......

Read more...

How to Hack Bandwih through Mozzila Firefox

>> Saturday, March 13, 2010

There are many ways to outsmart a slow Internet connection, especially since you use the internet access in the cafe-cafe that most of them have limited the bandwidth of every computer.........

Read more...

Download Creating Web Sites Bible

Updated for the most recent tools, techniques, and standards for creating cutting-edge Web sites for businesses or personal use, this book is one-stop shopping for HTML, javascript, CSS, tables, forms, Flash, and more........



Read more...

Get Best Hacking Ebooks Collection 34 in 1 AIO

>> Friday, March 12, 2010

Hacking e-Book -34in1- (AIO) | 137.37 MB 
This AIO have:BlueTooth HackingEthical HackingGoogle HacksHack and Crack
Hack Attacks Revealed........




Read more...

Hackers Worry about illegal actions

>> Thursday, March 11, 2010


Hacker training generated an estimated income of 238 million yuan last year.
First the bad news: Hackers last year caused an estimated economic loss of 7.6 billion yuan ($1 billion) in China.........



Read more...

How to get views, ratings, subscribers - youtube hackers

>> Wednesday, March 10, 2010

The program version is now 2.0 !

Here is a screen-shot for VERSION 2.0........

Read more...

How California hackers grabbed Ticketmaster's best online tickets

>> Thursday, March 04, 2010


The California hackers charged with snapping up Ticketmaster's best online tickets pleaded not guilty Tuesday, insisting they are just extra-efficient scalpers........

Read more...

How sms bomber Work in pakistan

>> Tuesday, March 02, 2010

This amazing tool will f4ck ur victims cell phone .. 
just put the number and start teasing them ........

Read more...

How iStealer 6.0 Legends FUD Stealer Works: Download

What is new in this version?• Added new programs like Google Chrome, Opera, the last version of Firefox (3.5),IDM, SmartFtp and CuteFtp.
• The server has been improved for stability, totally tested in XP, Vista and W7........


Read more...

Remove Cyber Snoop Manually

>> Sunday, February 28, 2010


Before we get started, you should backup your system and your registry, so it’ll be easy to restore your computer if anything goes wrong........

Read more...

Defeat Keyloggers !


Keyloggers, an abbreviation for Keystroke Loggers, are a rather nasty tool used by hackers to invade your privacy. This tool can secretly capture all the keystrokes you make, every single mouse click, and virtually everything you do on the computer, which, when you think about it, is very scary.........

Read more...

How to detect keyloggers


Keyloggers are software or spyware that record every keystroke you make typing on your PC. Some keyloggers are installed in order to capture your usernames and passwords, bank account numbers, credit card numbers, etc........

Read more...

How to use refog keylogger

>> Saturday, February 27, 2010

Video tutorial on how to use, download refog keylogger Employee Monitor.......

Read more...

How to find, use and fix Xss

Xss is a type of computer security vulnerability typically found in web applications which enable malicious attackers to inject client-side script into web pages viewed by other users........

Read more...

How Pakbugs fucked Indian Prime Minister Manmohan Singh

Few days ago, we have noted that ICW have defaced few small Pakistani sites, so Pakbugs have responded with little hard.

Their Prime Minister's Private (Not official) site has been owned by Pakbugs. Here is the mirror........

Read more...

Hacking Mode

>> Thursday, February 25, 2010


All you hackers out there that can actually hack, I got a question for ya! When you sit down, and are about to start hacking away at whatever, what gets you in and keeps you in the “hacking mode”? You know that place you get into where you have full concentration on the task before you and nothing can get in the way of you and the final outcome.........

Read more...

Hackers steel Card Data


A growing emphasis by computer hackers on stealing payment card data from hotels and resorts and their increasingly sophisticated malicious software and attack methods are two highlights in a new report from security consulting and technology firm Trustwave Holdings Inc........



Read more...

Hackers Steal Millions In Emissions Certificates

Credit card numbers? Please. Medical records? Booooring. The modern hacker knows that the real money’s in carbon emission trade credits. No, seriously: A recent phishing expedition of carbon-emitting companies in Europe, New Zealand and Asia reaped over $US4 million.........

Read more...

How to Hide my IP 2010

>> Tuesday, February 23, 2010

Hide my ip + serial key, u can change your IP adress easy



Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you........



Read more...

How to perform Server Attack: Best ddos attacker!!!



Download here THE BEST ddos attacker! Server Attack .......


Read more...

Pakistani Hackers Hacked www.google.co.ma !!!

>> Monday, February 22, 2010



Biggest Defacement Ever from pakistani Hackerz. Pakistan Zindabad !! ........




Read more...

How to Hack with hub and switch – sniffing

>> Saturday, February 20, 2010



Let’s look at the difference between a hub and a switch and how one could attack them. Watch the video to see hubs and switches from a hacker’s point of view. Read the post for a more formal description. (sorry about the quality, still working on perfecting this video stuff)........




Read more...

How Yahoo Messenger Monitor SNIFFER

>> Friday, February 19, 2010




Yahoo Messenger Monitor Sniffer is handy network utility software designed to capture and observe Yahoo Messenger conversations on all computers in a network. It is able to record conversations automatically in real time.........


Read more...

Cyber hacking and sexual blackmail

>> Wednesday, February 17, 2010


British business executives dealing with China were given a formal warning more than a year ago by Britain’s security service, MI5, that Chinese intelligence agencies were engaged in a wide-ranging effort to hack into British companies’ computers and to blackmail British businesspeople over sexual relationships.........

Read more...

How Conficker virus hits Manchester Police computers

>> Monday, February 15, 2010



Flash memory sticks
Greater Manchester Police (GMP) has been cut off from a national criminal database for more than three days because of a computer virus.........

Read more...

Hack a Mobile Phone Using Super Bluetooth Hack

>> Sunday, February 14, 2010


Previously i've posted How to Remotely Shutdown a Computer With Cellphone. In this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v.1.8. This is a new version of Super Bluetooth Hack for conventional and mobile-based simbian.........






Read more...

Stand-alone version of google Buzz

>> Saturday, February 13, 2010

SAN FRANCISCO (Reuters) -Google Inc said it may create a stand-alone version of its Buzz social networking product but won't separate Buzz from its Gmail service, a linkup that has spurred controversy over privacy.........

Read more...

Largest hacker training website shut down !!!

SHANGHAI (Reuters) - China has closed what it claims to be the largest hacker training website in the country and arrested three of its members, domestic media reported on Monday.........

Read more...

Pakbugs Got Hacked

A web forum called www.pakbugs.com was one of those "underground" forums where people discuss hacking techniques and sell malware code, bank logins and stolen credit card numbers........

Read more...

Hacker Training Website Shutdown

>> Tuesday, February 09, 2010












Three suspects behind the site, which provided prospective hackers with instructions on how to launch cyber-attacks and use malicious software, were arrested following the raid on the offices of "Black Hawk Safety Net" in Hubei province.
The state-run Xinhua news agency called the operation China's "biggest hacker training website" ........

Read more...

Joint Statement of Hacker-crew

>> Monday, February 08, 2010

“Joint statement of PCA (Pakistan Cyber Army) and Zombie_ksa(PAKbugs-crew)

PCA (Pakistan Cyber Army) and Zombie_ksa(PAKbugs-crew)comes into friendly terms with ICW (Indian Cyber Warriors,HMG) PCA (Pakistan Cyber Army) and Zombie_ksa (PAKbugs-crew) comes into friendly terms with ICW (Indian Cyber Warriors, HMG).   { Read Full Story }

Read more...

Download Free Focusrite Forte Suite

>> Friday, February 05, 2010


Focusrite Forte Suite

The Focusrite Forte Suite is a channel strip plug-in for
Pro Tools based on the now-legendary Focusrite Forte recording
console of the mid-’80s
(original price for Forte console: $1.5 million).
Read Full Story }

Read more...

Apple iPad will ship with camera?

>> Thursday, February 04, 2010

A few reports have surfaced today that the Apple iPad will likely launch with a camera, despite it  not being showed off during Apple's tablet unveiling last week. 

A screenshot from the event shows a dot above the screen that looks very much like a camera. A screenshot from the iPad emulator (via the SDK) shows the clear option to "take a photo." 

                                                                                                                { Read Full Story }

Read more...

What is Cracker

>> Tuesday, February 02, 2010

A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there.           { Read Full Story }

Read more...

What is Hacker ?

 Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems."
1) Eric Raymond, compiler of The New Hacker's Dictionary, defines a hacker as a clever programmer. A "good hack" is a clever solution to a programming problem and "hacking" is the act of doing it. Raymond lists five possible characteristics that qualify one as a hacker, which we paraphrase here:                        
                                                                                            { Read Full Story }





Read more...

Hacker Arrested, faces up to 40 years in prison




Cable modem hacker faces up to 40 years in prison
Matthew Delorey of Massachusetts has been arrested this week, accused of selling hacked Comcast cable modems that would allow buyers to have free Internet access.

Delorey has also been charged with one count of conspiracy and one count of wire fraud, each of which has a maximum sentence of 20 years and a fine of $250,000 USD. 

Read more...

How Terminal Server Has Exceeded the Maximum Number of Allowed Connections

>> Sunday, January 31, 2010



If you’ve worked on a network with Windows servers, you’ve encountered this error message at least 37,000 times:
“The terminal server has exceeded the maximum number of allowed connections. The system can not log you on. The system has reached its licensed logon limit. Please try again later.” 
                                                                                                   { Read Full Story }

Read more...

How Vista, Office 2007 cracked. kind of

>> Friday, January 29, 2010


Microsoft has had a long history of battling against piracy, ever since Bill Gates' Open Letter to Hobbyists in 1976, long before there was even a personal computer software industry to speak of. Now, Microsoft finds itself in its latest piratical engagement, with the recent cracks of Windows Vista and Office 2007, both of which just hit gold release status. Torrents of the cracks are already finding their way around pirate sites.                     { Read Full Story }

Read more...

What is Olly Debugger? Free Download!!!

OllyDbg is a 32-bit assembler level analysing debugger for Microsoft® Windows®. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. OllyDbg is a shareware, but you can download and use it for free. Special highlights are:
Intuitive user interface, no cryptical commands                            
Code analysis - traces registers, recognizes procedures, loops, API calls, switches, tables, constants and strings                                                                                    
Directly loads and debugs DLLs                                                                    { Read Full Story }



Read more...

Download Facebook Freezer

>> Thursday, January 28, 2010

With this tool you can freeze facebook accounts just like you can in msn, very quick and works well! This it a denial of service

type attack towards facebook users so that they cannot login or access there profile!
                                                                                                                  { Read Full Story }



Read more...

Download LAN Attacker 2009 v3.5 NEW program !!!

>> Tuesday, January 26, 2010

Download Free  LAN Attacker 2009 v3.5
                                                                                    { Read Full Story }




Read more...

Install back track 3 onto usb

1- First, download the BT3 USB iso


Code:
http://www.remote-exploit.org/cgi-bin/fileget?version=bt3-usb
2- Format your usb drive to fat32                                  { Read Full Story }

Read more...

Where you should start hacking ?

>> Monday, January 25, 2010

K, many people ask how to begin with hacking, so I wrote this little How-To:
Many beginners think that it´s possible to get some "hacking programs", click on some buttons on a GUI and voila: "I´m a hacker now!" Nope, you aren´t, even a chimpanzee can be teached to do this. Booting people in chat rooms? Sorry, absolutely no hacking too...
So, what is hacking?               { Read Full Story }


Read more...

How Hacker Messes With Student's Schedule

>> Sunday, January 24, 2010

A college student has been dropped from her classes twice, apparently the victim of someone who hacked into her schedule.


Michelle McCoy-Lloyd was going to take two culinary classes at San Joaquin Delta College starting next week.                          
                                                                                  { Read Full Story }

Read more...

Free Download FarStone DriveClone Pro 7.0.20090721

>> Saturday, January 23, 2010


Download FarStone DriveClone Pro 7.0.20090721
Professional software to create exact images of their hard drives or logical partitions, with subsequent preservation of information in a compressed arhiva.V new version of FarStone  

{ Read Full Story }





Read more...

How Hacker Finds SQL Injection

>> Friday, January 22, 2010






(WEB HOST INDUSTRY REVIEW) -- A Romanian hacker has disclosed an SQL injection vulnerability on a US Army website that could lead to a full database compromise.
According to a report from Softpedia, a website used to provide information about military housing facilities to soldiers, called Army Housing OneStop, was found to be storing passwords in plain text -- a major security oversight.                                { Read Full Story }

Read more...

How Weak Password Brings ‘Happiness’ to Twitter Hacker

>> Wednesday, January 20, 2010

Twitter_hack
An 18-year-old hacker with a history of celebrity pranks has admitted to Monday’s hijacking of multiple high-profile Twitter accounts, including President-Elect Barack Obama’s, and the official feed for Fox News.   
{ Read Full Story }

Read more...

The Gang That Ruled Cyberspace



I found this book very entertaining. It is a true story about a pack of teenagers that were thought to be responsible for the giant AT&T crash after being tracked by the FBI for some time. It talks about the whole hacker underground culture in the very beginning, mentioning the famous Legion of Doom (LoD) and Masters of Destruction (and later) Deception (MoD).         { Read Full Story }


Read more...
Related Posts with Thumbnails

  © Blogger template Webnolia by Ourblogtemplates.com 2009

Back to TOP