So its Saturday afternoon and you have nothing to do. As you glance around your room you spot a half full beer, a webcam, and that linux box that you have been wondering what you were going to do with. Seriously, why did you buy that piece of crap webcam anyway? A quick google search reveals that you might have a hard time even getting that thing working in XP, let alone your preferred OS of choice, OSX. =)

Ok, I know what to do.  First dont drink that beer.. Its old. Throw it away and clean up your room a little bit. Then go get another beer -- and lets try to finish this one Nancy. As you sit back and nurse your new beer you notice that your Asus EEE with BackTrack4 is in a somewhat different place than you left it. Instead of simply plotting your revenge on who ever you feel deserves the blame, lets try catching them next time red-handed.

Read more..

Your rating: None Average: 2 (1 vote)

Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself

to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece

of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your

network through Ethical Hacking and Penetration Testing. To begin learning today, simply click the links.

Title: Ethical Hacking & Penetration Testing
Author: Brad Causey & Bobby Rogers
SKU: 33718
ISBN: 1-933736-46-1
Release Date: 2006-10-06
Duration: 7 hrs / 82 lessons

150MB Only


Download:Read more..

Your rating: None Average: 3.5 (2 votes)

When we chat on yahoo every thing goes through the server.Only when we chat thats messages. When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.Read more..
Your rating: None Average: 2.3 (4 votes)

This hilarious comic strip by xkcd illustrates one of the most important rules of system security: never trust user input. All user input to a program or website should be sanitized by checking and processing it to make sure that it will not do damage to the system.

There are several reasons why this is necessary. First of all, programmers have to deal with user ignorance that may lead to user input breaking the system. Second, programmers have to stop deliberate attacks designed to break the system.

How Input Can Be Used to Hack a System

In the xkcd comic strip the computer savvy mother hacked the school database by naming her son a MYSQL statement that causes the database to destroy the student records.Read more..

Your rating: None Average: 2 (1 vote)

Let's talk about the fun stuff. The first trick I will discuss is an activity that is becoming quite prevalant, SIM cloning. If you have paid attention to any cell phone related tutorials in the past, then you may remember cloning being made popular by certain public figures like Kevin Mitnick in order to place calls on the bill of another subscriber. Well, even with GSM this trick still holds relevant. How could such a flaw exist in a system that is obviously concentrated on preventing such fraudulant use? The flaw is within the COMP128 authentication algorithm used as an instantiation of A3/A8 widely used by gsm providers. Unfortunately for these providers, the COMP128 algorithm is just not strong enough to prevent fraud. We attack the algorithm by using a chosen-challenge attack, which works by forming a number of specially-chosen challenges and querying the SIM card for each one. Then by analyzing the responses from these queries, we are able to determine the value of the secret key that is used for authentication.Read more..
Your rating: None Average: 4.3 (16 votes)

156n this example we will hide a text message inside a picture. We have choose for this tutorial a text file named Secret.txt and a picture firefox.jpg.

1. Move your files you want to combine in a new folder, in our case C:\Hidden.

2. Add the file you want to hide into a new RAR archive (in our example named Secret.txt.rar).

3. WinRar created the archive in the folder where our files are located.

4. Open Command Prompt (Start -> Run..., type cmd and press Enter).Read more..

Your rating: None Average: 2 (1 vote)



Sponsered links

Bookmark Us!


Page Rank


Years teach us more than books.

Explore Tags

Follow Us