Sign Up To Recive Latest Blog Updates

subscribe to Hacks N Cracks

Enter your email address:

Delivered by FeedBurner

ATM A COMPLETE GUIDE


   ATM   
(Asynchronous Transfer Mode) A network technology for both local and wide area networks (LANs and WANs) that supports realtime voice and video as well as data. The topology uses switches that establish a logical circuit from end to end, which guarantees quality of service (QoS). However, unlike telephone switches that dedicate circuits end to end, unused bandwidth in ATM's logical circuits can be appropriated when needed. For example, idle bandwidth in a videoconference circuit can be used to transfer data.

Biography Bill Gates


Biography Bill Gates 2009 DVDRip XviD – RiPPERS – 350M
Language: Englis
Release Date: 1
Video: MPEG-4 XviD 512×384 25Fp
Audio: MP3 128Kbps 2Channel
Size: 350M
Runtime: 00:43:3
William (Bill) H. Gates is chairman of Microsoft Corporation, the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

What is exploit and how to use it?

What is an exploit

An exploit is a computer programm, which circumvent computer security. There are many ways to exploit security holes. If a computer programmer make a programming mistake in a computer program, it is sometimes possible to circumvent security. The coding of such programs, which attack (hack) the programming mistakes or security holes is the art of exploitation or exploit coding. Some common exploiting technics are stack exploits, heap exploits, format string exploits, ...

Cracking Password-Protected ZIP Files


This tutorial for Ubuntu or Backtrack users to crack password-protected zip files with wordlists. 

Introduction to Penetration Testing

This article is just to give you the Basic knowledge and making you understand the Fundamentals of Penetration Testing

Shodan -Search Engine For Hackers


We all were using Google dorks for long time for finding vulnerabilities but google and other search engines are designed for normal people.Here we have a advanced search engine for hackers SHODAN SUTRI 


How to hack facebook, twitter, Gmail password using Winspy Keylogger


Keylogger is also onr of the best ways to hack password of facebook, gmail or any other website account. In this post i am going to show how to hack passwords using winspy keylogger.
Read the steps givn below:

A-ddos - Kernel solution to prevent ddos attack


A-ddos - Kernel solution to prevent ddos attack


a-ddos is a kernel patch in order to prevent DDos attack at the low-hardware-level. It works well on a netbridge.


DDos is short for distributed denial-of-service,it becomes a serious threat nowadays. There hasn't been a perfect solution yet. a-ddos uses 512M(128M in current version) memory to keep tracks of every ipv4 address and a kernel-level timmer to record connections pre-second. While under attack, only the available IPs are allowed to be connected to the server.

useful programs


I know everyone has their own programs they find useful for various things, wanting to compile a list of programs everyone suggests as useful. For any replies, please post the name of the program, link, and a quick description.

BackTrack 5 Free Download

Before Giving the Free Download Link, I Would First like to tell tell you What is BackTrack. I know many of you might be already aware of it, but still there are many more who don’t. 

Up until a few years ago, phishing wasn't a very common term in our vocabulary. But the damage it has done over the years has forced many people to pay much more attention to this security threat.
Today, when you say the word "phishing" in front of a network administrator or a security expert, chances are he or she won't be thinking about sushi (or the sport). Those who are responsible for network and computer security are all too familiar with the dangers of phishing.

How to Remotely Restart a Windows Computer


The Shutdown command can be used to remotely restart or shutdown a Windows 2000 or later computer.
For example, you can remotely reboot a Windows 7 computer from a Windows XP computer as long as you have administrative privileges. On the destination computer, you may need to ensure that your account has the user right “Force shutdown from a remote system.” You can run gpedit.msc at the Start, Run and then add your account to that user right, as shown in the screenshot below.

A Quick Way to Encrypt a File in Windows XP


To encrypt a file in Windows XP, most people right-click the file, go to the Properties, click on Advanced, then click Encrypt contents to secure data. However, there’s an easier method. You can add the Encrypt or Decrypt option to the shortcut menu so all you have to do is right-click on a file or folder and select Encrypt. If the file is already encrypted, the available option will change to Decrypt. You must be logged on with an account with administrator privileges and the volume must be formatted with NTFS in order for you to configure your computer for this feature.

BlackBuntu V0.3 Released


BlackBuntu V0.3 Released

Blackbuntu is an environment for penetration testing. This operating system was specially designed for security training students who practice for information security. It is Ubuntu based distribution with GNOME Desktop Environment. It's currently being built using the Ubuntu 10.10 and work on reference Back|Track. 

Microsoft BlueHat security contest - win $268,000


Microsoft has announced a big contest for security researchers who develop exploits and work for defensive security technologies. The total cost of award is big enough to attract good security researchers to the program.

Twitter Delicious Facebook Digg Stumbleupon Favorites More