Quick Access

User login

Who's online

There are currently 0 users and 11 guests online.

Visitors Map

Site Counter

  • Site Counter: 443279
  • Registered Users: 56960
  • Published Nodes: 330
  • Your IP: 192.99.42.26
  • Since: 2008-09-09

Link Exchange

BlogCatalog Blog Directory
Technology Business Directory - BTS LocalTop stories
Click here
         SecGeeks
       Megapanzer

Live Traffic Info

A unique Site with Unique Contents!
Going through the searches and links on the email, I came across this fantastic way of viewing content that requires registration, without actually registering for these sites.

Trick I use is to visit BugMeNot and in the search box, enter the webite you want to view content from, for exampleNyTimes. This will then give you a list of usernames and passwords that you can use to login to the website and view the content. Along with the username and passwords, it provides their accuracy percentage. This way, you dont have to go through the annoyance of registering yourself.
Read more..
Your rating: None Average: 3.6 (5 votes)

Intercepting keystrokes

Hooking Key Events

There are different ways to catch the keys as they are being typed, but one of the most efficient is to monitor system events for key events. This is done with a hook, which forces Windows to call your own functions when a certain type of event happens.

First, let's see how you can set a hook to catch keyboard events, with SetWindowsHookEx(): Read more..

Your rating: None Average: 4.6 (7 votes)


[Laurent Gaffi?] has discovered an exploit that effects Windows Vista, Windows 7, and possibly Windows Server 2008 (unconfirmed). This method attacks via the NEGOTIATE PROTOCOL REQUEST which is the first SMB query sent. The vulnerability is present only on Windows versions that include Server Message Block 2.0 and have the protocol enabled. A successful attack requires no local access to the machine and results in a Blue Screen of Death.

POC
==========================================================
Smb-Bsod.py:

#!/usr/bin/pythonRead more..
Your rating: None Average: 3 (2 votes)

                
                       Techmantras is one year old now and the way Techmantras has progressed over the past one year is nothing short of outstanding. On this memorable day I would like to tell about our past one year journey. We registered Techmantras in January 08 and came online in September 08.We had out fair share of difficulties in between. We being students found it difficult to come online regularly but we still continued with the same zeal and passion. We created the site framework quickly and started posting. But technical work was and is never finished. We make modifications every day. We also see to it that we maintain the quality of our content.
Read more..
Your rating: None Average: 3.5 (2 votes)


PERHAPS YOU HAVE BOUGHT A PHONE AND WANT TO CLONE IT WITH ANOTHER PHONE THAT YOU HAVE IN USE THAT IS OLDER OR SOMETHING. WE WILL GO OVER THE BASICS OF WHAT YOU NEED TO CLONE A CELL PHONE:

1) SYSTEM ID
2) AREA CODE
3) CELL PHONE NUMBER



1) SYSTEM IDRead more..
Your rating: None Average: 4 (3 votes)


In HITBSecConf2009 Vipin Kumar (Founder nvLabs.in) demonstrated how easily Windows 7 can be attacked via boot sectors using Vbootkit 2.0. 

He demonstrated
Read more..
Your rating: None Average: 3.7 (7 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

Not all problems have a technological answer, but when they do, that is the more lasting solution.

Explore Tags

Follow Us

buy tablet pc