Monday, December 19, 2011

Use any sim in modem whithout unlocking

You Can't use any other SIM in any modem without unlocking the modem. Now you can do that It's very simple. Step by step instruction: 1. Insert SIM in Modem(for wireless modems that connect internet using sim)(eg idea net setter,vodafone usb stick,etc) 2. Modem software will show invalid SIM, just ignore it and close modem software. 3. Start NOKIA PC suite. 4. Goto nokia pc suite connect to internet option. 5. Goto Configure. Select your data card modem,and make all operator apn settingas like when we use nokia mobile connection. 6. Finish set up. 7. Now connect to internet through PC suite 8. Now see your net is connected without unlocking the modem enjoy for Any problems ask in comme...

Saturday, December 17, 2011

Best hacking books and other materials

Today i am gonna give you my another collection of hacking Ebooks so that you can learn it 1)Its pretty popular book may be you have read it, it was released it 2008 yes its pretty old but best for newbies  still its nice book i think ankit fadia learnd form it lolx . good thing is it has COUNTERMEASURES that will help you to increase security BOOK info The Hackers Underground Handbook | 2.5 MB 116 pages | PDF The Hackers Underground Handbook will guide you through password hacking, windows hacking, malware, phising, web hacking, network hacking and Linux (intro, installation, etc). All this material fully packed with images, thus being a top step-by-step guide, on the course of which you cannot fail. The HackerΓΓé¼Γäós Underground...

Create your own facebook App for pages

hi guys today there are lots of good things going on we have 10,000 pageviews and we have a new friend blackbox. and today is my birthday. :)) So how to get that coool apps that we see on big companies pages for FREE here is the solution 1st Goto iwipa app page =>>from here  2nd select click here to install it at the bottom of page then when page reloads click on same type of button I.E. click here to install it for free. 3rd then it will take to a page where you can select your page after selection of page let it reload and then click. Add Iwipa Website:HTML+Iframe+FBML  4th then follow screen shots and now get your own app for your own page play around with it, its a good utility for those who dont know coding...

NSS Labs claims Chrome-Firefox security report to be bogus

A report by Accuvant, according to which Chrome was the most secure browser ,ahead of Internet Explorer and Firefox. NSS Labs , another securityresearching and testing firm has put out a report that states that the Accuvant report was paid for by Google and the tests were completed back in July 2011.The report comes out soon after Google’scontract with Mozilla for the search bar in Firefox expired in November. NSS says that the report was biased because there is a possibility that Google influenced the kind of tests that were used to test the three products - Chrome, Internet Explorer and Firefox. Tests for features in Firefox were not highlighted - frame poisoning is one suchexample stated. NSS Labs monitored an 11-day period, starting from the 22nd of November and went on till the 2nd of...

Friday, December 16, 2011

Windows Firewall!

******************** How To Use Windows Firewall? ************************1. Make sure Windows Firewall is [Enable] on your Computer2. Install Windows Firewall Control (Outbound)3. Drag and Drop Sound files into path: C:\Program Files\WindowsFirewallControl4. Network.wfw file is a Router Network firewall Policy for Windows Firewall, you need to Import Policy Control Panel\Windows Firewall\Advanced Settings5. Find Inbound Rules and edit the Network blocking rule6. Change Scope 192.168.1.4 - 192.168.1.24Note: This will block all Computers on Router from range!!!!!! Done!------------------ If you use the Public WIFI's including Coffee Shops? ------------------------1. Windows Firewall2. Click reset defaults3. Click Allow a program or feature through Windows Firewall4. Disable File Sharing and...

Remote Firewall Scanner

Uploaded by blackbox246 on Dec 2, 2011Remote Firewall Scanner is a Program that can test firewalls for leaks remotely on any Network, It also has a built in Telnet Scanner for Monitoring and controlling PC's. Compatible with Windows 7 and any older versions of Windows.Program Features:1. Telnet Scanner *2. IP Scanner *3. Remote Firewall Leak Tester *4. Remote Telnet Monitoring *5. Easy To Use *6. Very Fast7. Test Any Firewall (Scan rubbish Firewalls) *8. Helps Seal All Network Computers Behind Router *9. Better Screen Designs *10. 100% FREWARE11. Very Small Security Audit Program *12. Remote Admin Tool Client *13. Network Logs (Network Auditing) *14. Beep Sound (Firewall Leak Warning) *Windows 7 VersionDownload Source: http://www.mediafire.com/?ece1qipmi9b4mnxWindows XP Version...

Wednesday, December 14, 2011

Hacking wave in wrong direction

Bros today every body is proving themselves in some or the other way. on one side pakistani hackers hack indian and other US sites and on other side indian hackers like lucky and indishell hack pakistani sites. people love to see hacked site they just love it like anything. thats why thehackernews type of websites are getting more attention and they are doing good by providing information and alerting peoples. but that also creates some negative thinking in peoples mind due to different nationalities.and there is a wild uproar of script kiddys today they think that they can hack sites by just SCANNING AND LEARNING from other websites/blogs its not that fucking easy (sorry for language). so a good request to them that they should study now and then make use of their study to learn...

Top 5 hot SeCuRiTy JObs in 2012

Top 5 Hot Security Jobs in 2012 for Hackers Information security is one of those rare fields - it has more job openings than people to fill them. Dice.com, the largest IT job site, confirms this job growth and indicates a 79 percent increase in the total number of information security jobs posted on the site from September 2009 to September 2011. Based on a review of job postings, here are the five hottest jobs for information security pros in 2012: Security Analyst Employers have posted 42 percent more security analyst jobs on Dice in September 2011 than in 2010. This is no surprise, especially when employment among information security analysts soared by 16 percent this year during the second quarter, with the Bureau of Labor reporting no unemployment during the first two quarters of...

Saturday, December 10, 2011

Best Hacking and penetration testing E-books

HI guys wassup guess what i have a super awesome book on web applications hacking and attacking here is the info of the book its the second editon and released just now before 1 months i found it from torrent and reading just now its no doubt the  best of all. BOOK INFOThe Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Publisher: Wiley; 2 Edition Dafydd Stuttard in 2011ENGLISHISBN: 1118026470 PDF 912 pages 13.5 MB >>Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques...

Tuesday, December 6, 2011

Best security extensions for chrome

hi guys today i will give you some security extensions which will help you a lot 1)Hide My ass its the best elite proxy and with its extension you can just proxy your site in a second and be anoynymous download from here 2)Disconnect If you are tired of facebook tracking and other websites tracking you then this is for you. here is discription Stop third parties and search engines from tracking the webpages you go to and searches you do.If you’re a typical web user, you’re unintentionally sending your browsing and search history with your name and other personal information to third parties and search engines whenever you’re online. Take control of the data you share with Disconnect! From the developer of the top-10-rated Facebook Disconnect extension, Disconnect lets you: • Disable tracking...

Saturday, December 3, 2011

Rooting your Android phone-2(almost all phones included)

today i found in xda-developers that they have new version of Superoneclick short fuse SuperOneClick updated to v2.2 The program requires Microsoft .NET Framework 2.0+ or Mono v1.2.6+ Operations systems with native support: Windows Vista Windows 7 Ubuntu Hardy (8.04 LTS) Ubuntu Jaunty (9.04) Ubuntu Karmic (9.10) Ubuntu Lucid (10.04 LTS) Ubuntu Maverick (10.10) Debian Lenny (5.0) Debian Squeeze (testing) Debian Sid (unstable) Debian Experimental If you run Microsoft Windows XP, install .NET Framework v2.0 or above If you run Mac or another Linux flavor, make sure you install Mono: http://www.go-mono.com/mono-downloads/download.html You NEED to put your phone on USB Debugging modeYou NEED to install make sure the Android drivers for...

Saturday, November 19, 2011

Acunetix WVS Enterprise Version 7 CRACKED

New Security Check >Added a security check for the latest OpenX OFC file upload vulnerability>Added a ASP.NET security check for the ASP.NET padding Oracle vulnerabilityImprovements:>Reduced the number of false positives for Blind SQL injections security checks>Improved Blind SQL injection tests by adding a number of new tests to detect blind SQL injections in UPDATE/INSERT/… Which Vulnerabilities does Acunetix WVS Check for? Acunetix WVS automatically checks for the following vulnerabilities among others:Version CheckVulnerable Web ServersVulnerable Web Server Technologies – such as “PHP 4.3.0 file disclosure and possible code execution.Web Server Configuration ChecksChecks for Web Servers Problems – Determines if dangerous HTTP...

Tuesday, November 15, 2011

Uniscan vulnerablity scanner download and installing

Installing uniscan web scanner and vulnerability system Installing uniscan web scanner and vulnerability system BACKGROUND The uniscan tool is a web server vulnerability scanner tool that was developed using the Perl language. More information about the uniscan tool can be found at http://www.uniscan.com.br/index.html/ . The Administrator or pen tester can use this tool the test the following vulnerabilities: - Remote File Include (RF) - Local File Include (LFI) - Remote Command Execution (RCE) - Cross-Site Scripting (XSS) - SQL Injections - Blind SQL Injections The tool require the installation of some Perl modules. The tool was created by: Name: Douglas Poerschke Rocha Uniscan Dev. E-mail: team@uniscan.com.br Name: Roberlei Martins Vieira Webmaster E-mail: roberlei@uniscan.com.br OPERATING...

Monday, November 14, 2011

Post animated pictures on facebook

today many people are asking how to make this animated pic ans is simple lol goto notes www.facebook.com/notes  then write a new note with some head and body then we will insert an imge tag to it which has our image link. we cant upload gif images(this is not true you can if you are facebook app developer like facebook art) yes one can do it but its hard.so we will find a ready made facebook uploaded image go here  right click image and seclect view source or inspect element for chrome then post that image link like this here are some links use them to post and impress your friends actually thing is facebook art is an app that has ability to upload .jpg animations  here are some more examples <img src="http://photos-e.ak.fbcdn.net/photos-ak-snc1/v33382/1394/113/01AweCZo9oxVwA79IOAAD3T3Uf4UY:.mp3"> killer...

Saturday, November 12, 2011

Cookie-based SQL Injection

Did you say a “Cookie” ? A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state information to a user’s browser and for the browser to return the state information to the origin site. The state information can be used for authentication, identification of a user session, user’s preferences, shopping cart contents, or anything else that can be accomplished through storing text data.Cookies are not software. They cannot be programmed, cannot carry viruses, and cannot install malware on the host computer. However, they can be used by spyware to track user’s browsing activities – a major privacy concern that prompted European and US law makers to take action. Cookies...

Twitter Delicious Facebook Digg Stumbleupon Favorites More