Quick Access

User login

Who's online

There are currently 0 users and 1 guest online.

Visitors Map

Site Counter

  • Site Counter: 509346
  • Registered Users: 57251
  • Published Nodes: 330
  • Your IP:
  • Since: 2008-09-09

Link Exchange

BlogCatalog Blog Directory
Technology Business Directory - BTS LocalTop stories
Click here

Live Traffic Info

A unique Site with Unique Contents!

When analyzing the code of a Trojan horse it often contains  methods  and functions that can be assigned to typical function groups and modules.  Even if the code and inner organisation seems to be chaotic and hard to understand because of  its structureless appearance you can assign a function to at least one of these groups. I want to give you the big picture, an overview about the inner structure of a Trojan horse and taking the confusion a little.


The Trojan horse is wrapped by its dropper which is not a core component in the proper sense. But because it plays an important role in propagation and the installation of  the Trojans it is worth mentioning it.Read more..

Your rating: None Average: 3.5 (2 votes)


Writing a buffer overflow attack against a Windows program present several challenges that make it a bit more difficult than writing exploits on a Linux platform. In addition to not having popular tools such as gdb (the GNU Debugger) an attacker is faced with a closed box. Not only are most Windows applications closed source, but the operating system itself doesn't provide much transparency. When taken together this makes an attackers job fairly daunting.

Windows buffer overflow attacks are quite possible, however, and I'm writing this tutorial to walk you through developing one such attack. This article assumes some prior knowledge of assembly, x86 architecture, C and Perl programming. I hate to raise the bar like that, but if you're not familiar with these concepts then writing buffer overflows will be next to impossible as their inner workings hinge on all of these topics. While there are many tools you can use to assist in the process of finding and exploiting buffer overflow vulnerabilities, without a thorough understanding of how they work you're going to have a very hard time actually creating new exploits. Read more..

Your rating: None Average: 3.3 (9 votes)

Download the service manual for Nokia N95 (RM-159) which is a smartphone produced by Nokia and it was released at the end of March 2007. The phone uses a two-way slider to access either media playback buttons or a numeric keypad. Packed with built in 5 megapixel camera and accelerometer, N95 is able to record video MPEG-4 VGA (640×480) with image stabilization. The quality of video capture is up to 30 fps.

The N95 runs on Symbian OS v9.2, with an S60 3rd Edition platform with Feature Pack 1. Two newer versions have also been released: the upgraded N95 8GB (N95-2), and the N95-3, which adds 3G support for North America. Read more..

Your rating: None Average: 3.9 (9 votes)

Exclusive Neuview Technologies

Neuview is different to any other media player, in that it has possibly the most leading edge technologies available in a software media player to date. Read about them here ..

>> Pixelfusion - This is our unique image resampling algorithm, which is based around resolution enhancement to actually improve the perceived quality of video. This idea has been overlooked by media player developers in the past, but due to the consistent increase in computer processing power, it has become a reality at last.. Read more..

Your rating: None Average: 1.5 (2 votes)

The objective here is to have two fully functioning mobile phones while only paying one bill. You’ll need two cell phones, one with service and another without.

Now the first step is to find the secret menu on your cell. www.cellphonehacks.com is one of the best places to find that out, just search for your model number and check out some of the hacks.

After you enter in the secret number and enter the secret menu on the serviced phone, look for your phones ESN. ESN (Electronic Serial Number) – Each cellular phone is assigned a unique ESN, which is automatically transmitted to the cellular tower station every time a cellular call is placed. The Mobile Telephone Switching Office validates the ESN with each call. Usually it says serial number right on it so its simple to find.Read more..

Your rating: None Average: 3 (2 votes)

At command prompt type debug
you will get a - prompt where you can type the fallowing (<enter> means hit enter, not type enter*)
Read more..

Your rating: None Average: 3 (2 votes)



Sponsered links

Bookmark Us!


Page Rank


The power of imagination makes us infinite.

Explore Tags

Follow Us