Quick Access

User login

Who's online

There are currently 0 users and 2 guests online.

Visitors Map

Site Counter

  • Site Counter: 466944
  • Registered Users: 57060
  • Published Nodes: 331
  • Your IP: 46.229.164.115
  • Since: 2008-09-09

Link Exchange

BlogCatalog Blog Directory
Technology Business Directory - BTS LocalTop stories
Click here
         SecGeeks
       Megapanzer

Live Traffic Info

A unique Site with Unique Contents!

In today's busy world, mobile phones are our best companion, the only way to connect with friends and family. We cannot imagine our lives without mobile phones. However, the irony of modern life is that we are so busy that we hardly get time to recharge our mobile phones. Thanks to online mobile recharge websites that make this task easy and convenient. I have been using Mobikwik.com for online mobile recharge for last 8 or 9 months and am completely happy with their service. An easy platform to recharge your mobile phones through multiple modes of payment, anytime and from anywhere.

My First ExperienceRead more..

Your rating: None Average: 3.7 (35 votes)

Introduction

One thing I have always maintained is that aspiring or practicing penetration testers who use an exploitation product (such as CANVAS, Core Impact, Metasploit) should know how buffer overflows actually work. Having this knowledge will help you understand the circumstances under which these products can work, will help you troubleshoot when things don't work and will correct unrealistic expectations about what the products are capable of.

In addition, being able to reproduce buffer overflow exploits will also give you the tools to more accurately assess the risk of discovered vulnerabilities as well as to develop effective countermeasures for exploits out in the wild. These are important skills for incident responders and for those attempting to protect their networks.
Read more..
Your rating: None Average: 3.7 (111 votes)

Title: Ethical Hacking & Penetration Testing 
Author: Brad Causey & Bobby Rogers 

Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your network through Ethical Hacking and Penetration Testing. To begin learning today, simply click the links. 

Title Description Read more..
Your rating: None Average: 3.7 (50 votes)

F.B.I RAT (Full Backdoor Intergration) V0.1

Supports xp/Vista/Windows 7, all features have been tested on these OS's including injection, but there have been some limitations on the sniffer.

Features:Read more..

Your rating: None Average: 3.7 (45 votes)



CONTENT:

Module 01 - Getting Started with Nmap
Module 02 - Nmap Basics
Module 03 - Scans for Every Occasion
Module 04 - Back Pocket Scans
Module 05 - Useful Scanning Options
Module 06 - Nmap Pings - The Search for Hosts
Module 07 - Recon Scanning
Module 08 - Ninja Scanning
Module 09 - Output Options
Module 10 - Windows and Nmap
Module 11 - Real-World Nmap Scanning
Bonus Content

Download:

http://rapidshare.com/files/245053442/GSM-pmnstc.part01.rar
http://rapidshare.com/files/245058537/GSM-pmnstc.part02.rar
http://rapidshare.com/files/244999106/GSM-pmnstc.part03.rar
http://rapidshare.com/files/245003889/GSM-pmnstc.part04.rar
http://rapidshare.com/files/245008510/GSM-pmnstc.part05.rar
http://rapidshare.com/files/245013020/GSM-pmnstc.part06.rar
http://rapidshare.com/files/245017998/GSM-pmnstc.part07.rar
http://rapidshare.com/files/245023011/GSM-pmnstc.part08.rar
http://rapidshare.com/files/245027104/GSM-pmnstc.part09.rar
http://rapidshare.com/files/245031301/GSM-pmnstc.part10.rar Read more..
Your rating: None Average: 2.7 (11 votes)

Password less SSH login to another server can be very useful when you want to configure a remote backup server or when migrating servers. For enabling this you need to have openSSH installed on the server. Here is a tutorial on how to configure password less SSH login to server ‘mars’ from server ‘earth’

1. Login to earth as root.

2. Run the command ssh-keygen -t rsa
If the key already exists you can either go to step 3 or you can generate a new key by overwriting existing key (see image). It would be better to overwrite the existing key if you did not generate it.




3. Change directory to /root/.ssh/

root@earth:~# cd /root/.ssh/
root@earth:~/.ssh#

4. Copy the contents of the file id_rsa.pub to the directory /root/.ssh/authorized_keys
scp -P id_rsa.pub root@mars_server_IP:/root/.ssh/authorized_keys

5. You will be able to login to the remote server ‘mars’ by typing ssh root@mars_server_IP -p without password nowRead more..

Your rating: None Average: 3.8 (13 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

If you born as a poor, its not your mistake.But if you dead as a poor, its your own mistake
— Bill Gates

Explore Tags

Follow Us

buy tablet pc