Sign Up To Recive Latest Blog Updates

subscribe to Hacks N Cracks

Enter your email address:

Delivered by FeedBurner

ATM A COMPLETE GUIDE

   ATM    (Asynchronous Transfer Mode) A network technology for both local and wide area networks (LANs and WANs) that supports realtime voice and video as well as data. The topology uses switches that establish a logical circuit from end to end, which guarantees quality of service (QoS). However, unlike telephone switches...

Biography Bill Gates

Biography Bill Gates 2009 DVDRip XviD – RiPPERS – 350M Language: Englis Release Date: 1 Video: MPEG-4 XviD 512×384 25Fp Audio: MP3 128Kbps 2Channel Size: 350M Runtime: 00:43:3 William (Bill) H. Gates is chairman of Microsoft Corporation, the worldwide leader in software, services and solutions that help people and businesses realize their full po...

What is exploit and how to use it?

What is an exploit An exploit is a computer programm, which circumvent computer security. There are many ways to exploit security holes. If a computer programmer make a programming mistake in a computer program, it is sometimes possible to circumvent security. The coding of such programs, which attack (hack) the programming mistakes or security holes...

Cracking Password-Protected ZIP Files

This tutorial for Ubuntu or Backtrack users to crack password-protected zip files with wordlists.&nbs...

Introduction to Penetration Testing

This article is just to give you the Basic knowledge and making you understand the Fundamentals of Penetration Testi...

Shodan -Search Engine For Hackers

We all were using Google dorks for long time for finding vulnerabilities but google and other search engines are designed for normal people.Here we have a advanced search engine for hackers SHODAN SUTRI&nbs...

How to hack facebook, twitter, Gmail password using Winspy Keylogger Keylogger is also onr of the best ways to hack password of facebook, gmail or any other website account. In this post i am going to show how to hack passwords using winspy keylogger. Read the steps givn belo...

A-ddos - Kernel solution to prevent ddos attack

A-ddos - Kernel solution to prevent ddos attack a-ddos is a kernel patch in order to prevent DDos attack at the low-hardware-level. It works well on a netbridge. DDos is short for distributed denial-of-service,it becomes a serious threat nowadays. There hasn't been a perfect solution yet. a-ddos uses 512M(128M in current version) memory to keep...

useful programs

I know everyone has their own programs they find useful for various things, wanting to compile a list of programs everyone suggests as useful. For any replies, please post the name of the program, link, and a quick descripti...

BackTrack 5 Free Download

Before Giving the Free Download Link, I Would First like to tell tell you What is BackTrack. I know many of you might be already aware of it, but still there are many more who don’t.&nbs...

Up until a few years ago, phishing wasn't a very common term in our vocabulary. But the damage it has done over the years has forced many people to pay much more attention to this security threat. Today, when you say the word "phishing" in front of a network administrator or a security expert, chances are he or she won't be thinking about sushi (or...

How to Remotely Restart a Windows Computer

The Shutdown command can be used to remotely restart or shutdown a Windows 2000 or later computer.For example, you can remotely reboot a Windows 7 computer from a Windows XP computer as long as you have administrative privileges. On the destination computer, you may need to ensure that your account has the user right “Force shutdown from a remote...

A Quick Way to Encrypt a File in Windows XP

To encrypt a file in Windows XP, most people right-click the file, go to the Properties, click on Advanced, then click Encrypt contents to secure data. However, there’s an easier method. You can add the Encrypt or Decrypt option to the shortcut menu so all you have to do is right-click on a file or folder and select Encrypt. If the file is already...

BlackBuntu V0.3 Released

BlackBuntu V0.3 Released Blackbuntu is an environment for penetration testing. This operating system was specially designed for security training students who practice for information security. It is Ubuntu based distribution with GNOME Desktop Environment. It's currently being built using the Ubuntu 10.10 and work on reference Back|Track.&nb...

Microsoft BlueHat security contest - win $268,000

Microsoft has announced a big contest for security researchers who develop exploits and work for defensive security technologies. The total cost of award is big enough to attract good security researchers to the progr...

Page 1 of 5412345Next
Twitter Delicious Facebook Digg Stumbleupon Favorites More