A unique Site with Unique Contents!


SHODAN lets you find servers/ routers/ etc. by using the simple search bar.You can search by keyword, and/or using any of the advanced search options.

Check SHODAN:

  • country:2-letter country code
  • hostname:full or partial host name
  • net:IP range using CIDR notation (ex: 18.7.7.0/24 )
  • port:21, 22, 23 or 80

Lets say you want to find servers running the 'Apache' web daemon. A simple attempt would be to use:

apache

How about finding only apache servers running version 2.2.3?

apache 2.2.3Read more..

Your rating: None Average: 3.3 (4 votes)

Your rating: None Average: 3.2 (9 votes)


Linux files systems work great. Especially ext3 is a mature file system and very robust. With journaling turned the filesystems stays consistent also on an unexpected power loss or system crash (wich normally never happens on linux  ) and you don’t need long disk checks to repair the file system in such a case. There is almost no disk fragmentation and a lot of more cool features … But the best linux feature is: if you remove a file or directory it’s gone. It’s not moved to trash, its not marked as deleted, there are no annoying messageboxes, it just does what you say. I love that!
But from time to time also experienced users make mistakes and you delete something wrong. As Murphy’s law says: “if anything can go wrong it will” and so you will not have a copy of the deleted files and the backup will be outdated. So what to do now?
I want to explain the procedure by using the problem I had as example.

How the trouble came up for me

As usual I was working on my Gentoo Linux laptop. I just wanted to add a new folder with sources to my subversion repository. I wanted to add first the folder, then some files within the folder…Read more..

Your rating: None Average: 3.3 (6 votes)

This is a simple tutorial on, How to hack the WEP key of a wireless network. We have the tools available in ubuntu to get the WEP Key.  Before proceeding this I am mentioning the complete steps below along with the pre-requisites. This article seems to be very lengthy but please be patience while reading Read more..

Your rating: None Average: 3.3 (4 votes)

Theres plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I'm not going to go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first ping the IP Address to make sure that its alive. In otherwords online. Now at the bottom of this document ill include some links where you can obtain some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to "hack" the box. Port Scanners are used to identify the open ports on a machine thats running on a network, whether its a router, or a desktop computer, they will all have ports. Protocols use these ports to communicate with other services and resources on the network.

1) Blues Port Scanner - This program will scan the IP address that you chose and identify open ports that are on the target box.

Example 1:
Idlescan using Zombie 
(192.150.13.111:80); Class: IncrementalRead more..
Your rating: None Average: 4 (10 votes)

Classified sites are really great money saver and you can contact directly your audience. You can save lots of money by using free classifieds and now you can buy and sell almost anything on classified sites, searching a job, a life partner for long or short term relation everything is on your finger tip.

In India classified site are more popular than social networking sites. Every day more and more people are now using free classified to reach their audience or buy/sell anything.Read more..

Your rating: None Average: 3.4 (28 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

Make a wrong doer feel shy, by doing him a favour.

Explore Tags

Follow Us