background preloader

Security

Facebook Twitter

Incase anyone forgot this existed, a guide on how to get into an admin account on ANY computer - Album on Imgur. Google hacking master list. This master list of Google Hacking command sets has show up on a forum in Russia, as well as on Scribd.

Google hacking master list

While we often forget about Google hacking, and rarely use it against our own sites, a list like this is going to keep the kids happy as they merrily pound their way through Google to your systems. This makes the data much more accessible than at Johnny I hack stuff. Painful Computer Pranks. Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank).

Painful Computer Pranks

Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;) 1. How to Crack the Account Password on Any Operating System – Joe Tech. This guest post was written by Blair Mathis from LaptopLogic.com – your premier source for the latest laptop software news and best laptop accessories.

How to Crack the Account Password on Any Operating System – Joe Tech

Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Most computer users do not realize how simple it is to access the login password for a computer, and end up leaving vulnerable data on their computer, unencrypted and easy to access. 6 Ways to Surf the Web Anonymously with Proxies. Steps Setting Up a Proxy in Mozilla Firefox <img alt="Image titled Surf the Web Anonymously with Proxies Step 1" src=" width="728" height="546" class="whcdn" onload="WH.performance.clearMarks('image1_rendered'); WH.performance.mark('image1_rendered');">1Open Mozilla Firefox.

6 Ways to Surf the Web Anonymously with Proxies

<img alt="Image titled Surf the Web Anonymously with Proxies Step 2" src=" width="728" height="546" class="whcdn">2Click the Firefox option on the upper-left corner. Security Channel - IDG.TV. Google Hacks. Top 15 Free VPN Services. How to disappear on the internet (Infographic)

Ethical hking

Top Sites To Find All The Serials You Need. John the Ripper. Sample output[edit] Here is a sample output in a Debian environment. # cat pass.txt user:AZl.zWwxIh15Q # john -w:password.lst pass.txt Loaded 1 password hash (Traditional DES [24/32 4K]) example (user) guesses: 1 time: 0:00:00:00 100% c/s: 752 trying: 12345 - pookie Attack types[edit] One of the modes John can use is the dictionary attack.

John the Ripper

It takes text string samples (usually from a file, called a wordlist, containing words found in a dictionary or real passwords cracked before), encrypting it in the same format as the password being examined (including both the encryption algorithm and key), and comparing the output to the encrypted string. John also offers a brute force mode. See also[edit] References[edit] External links[edit] Pwning a Spammer's Keylogger. Recently, while scrounging around our spam traps, I spotted this ordinary piece of malicious spam.

Pwning a Spammer's Keylogger

It uses a very simple social engineering trick, speculating about Obama’s sexual orientation and a link to a supposed picture to prove it. There was nothing special about this spam but the link with a double extension file named “you.jpg.exe” was something worth investigating. So out of curiosity, I downloaded the file and checked out what it does. First thing I did was to find out what the file really was.

Of course, it was not an image file of Obama but rather a self-extracting RAR file. Opening the file through a RAR extracting tool revealed the files inside it. I extracted “you.jpg.exe” and inspected each of the files inside it but found they were actually encoded. Crack/Keygen Sites That Are Safe To Use. Blindly searching the web for cracks & keygens is about as smart as using Limewire to search for antivirus software - something not well-advised.

Crack/Keygen Sites That Are Safe To Use

Undoubtedly and unfortunately, the number of crack sites with overtones of a malicious agenda heavily outweigh sites that just want to serve up the honest goods. Having said that, there actually are quite a few creditable ‘crack’ sites that won’t try to bombard you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken or Srizbi Botnet army. We’ve done the hard work for you, and present a list of “clean” crack sites for all the latest warez. Be aware that the site reviews herein only include information about each site, not the contents of the ‘cracks’ themselves. Password Secrets of Popular Windows Applications. Hacking, Security Papers. Russian Password Crackers: fastest, tested password recovery software. Security Tools.

1984

Cryptome. Everything You Wanted to Know about TOR & the Deep Web. 64 Things Every Geek Should Know « Caintech.co.uk. If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills.

64 Things Every Geek Should Know « Caintech.co.uk

The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. How do I remove a computer virus? Unlocking a Word Document under Windows. How to Unlock a Word Document under Windows Seth Teller, August 2009 (send me email) Some authors (for example, of forms to be filled out) "lock" their documents under Windows.

Unlocking a Word Document under Windows

This is annoying, as it prevents you from fixing errors or adding anything to the document. 51 Free Tools to Stay Informed and Invisible on the Internet. Privitize - VPN Solutions. Vtunnel.com is here to help you beat internet filtering! Vtunnel is here to protect your anonymity online!

Vtunnel.com is here to help you beat internet filtering!

Vtunnel is here to help you get to the websites you want to go to online. Many organizations these days block access to sites like myspace, gmail, even google search! I find that claiming that filters are there to keep schoolkids learning rather than goofing off, and then going ahead and blocking a primary means of research such as google search, is hypocritical and even dangerous. Thanks to sites like this one however, you can fight back and access the web the way it was meant to be accessed.

By browsing the web through our service, the majority of the blocked websites you want to go to can be accessed again. Best of all, due to continuing advertiser support, Vtunnel can provide this valuable service completely free of charge. TightVNC: VNC-Compatible Free Remote Control / Remote Desktop Software. Adeona: A Free, Open Source System for Helping Track and Recover Lost and Stolen Laptops.

Online Guide to Practical Privacy Tools. Seriously secure mobile messaging. Open source anti-theft solution for laptops, phones & tablets – Prey. How to Secure Your PC: 11 Steps. Edit Article Edited by Askmeaskme, Lojjik Braughler, Teresa, BethyB and 24 others So you have just bought a new personal computer for your home (rather than for a workplace or as a server) and want to secure it (including protecting it from viruses and spyware). Privacy (including encryption, cryptography and anonymity) is a part of security but broad enough to need covering separately.

Think of Privacy as the flipside of the coin. Making backups of data, defragging, system restore points are only indirectly related. Five tips to stay secure despite NSA encryption cracking. How to Surf the Web Anonymously" The Internet has a way of lulling you into a false sense of anonymity. After all, how can anyone know your true identity in a virtual world? The truth is that simply by connecting to the Internet, you share information about your computer, your geographical location and even about the Web sites you visit.

The goal of anonymous Web surfing is to circumvent the technologies that track your online activity and may potentially expose your personal information to others. By surfing anonymously, no one knows who you are, where you're connecting from or what sites you are visiting. VulnerabilityAssessment.co.uk. Help Net Security. Internet freeware: Security. Best Privacy Tools. ANONYMITY & PRIVACY. [ English | German ] Protection of Privacy on the Internet JAP (called JonDo in the scope of the commercial JonDonym anonymous proxy servers - AN.ON remains free of charge) makes it possible to surf the internet anonymously and unobservably. Without Anonymization, every computer in the internet communicates using a traceable Address. That means: the website visited, the internet service provider (ISP), and any eavesdropper on the internet connection can determine which websites the user of a specific computer visits.

Secure File Transfer Alternatives. Overview Transferring files between machines (and users) is a common occurrence. Perhaps you need to send a class roster spreadsheet to an office assistant or a document containing a grant proposal to a colleague at another University. In each of these cases, it's important to know what options are available to get your file from point A to point B and to understand whether the method you choose provides adequate security given the sensitivity of the data being transferred.

This document will describe some of the most common protocols that can be used to transfer files and it will list the pros and cons for each. Terminology. Sandboxie - Sandbox software for application isolation and secure Web browsing. Fix Tracking! Hack Attack: Turn your $60 router into a $600 router. How To Crack A Wi-Fi Network’s WPA Password With Reaver. Your Wi-Fi network is your convenient wireless gateway to the internet, and since you’re not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right?

Knowing, as you might, how easy it is to crack a WEP password, you probably secure your network using the more bulletproof WPA security protocol. Here’s the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers’ current passwords with relative ease. Wifi security : Hacking wifi.

Hack Any Password Protected Wi-Fi Network Full Free Download. How to Hack Someones IP Address 2014 - Come to Hack. Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. Finding out someone's IP address is like finding their phone number, an IP address can be used to find the general location where that person lives. How to Break Into a Windows PC (and Prevent It from Happening to You) #3038363. Soda Machine Hack. Most modern vending machines have little computers inside. A tiny screen usually displays some information.

474 Things To Do When You're Bored. Clicking pictures has never been so much fun! - clikr. How to Sketch out Everyone around You. The Best BitTorrent Websites « GeekLimit. Posted by AtariBoy | Filed under Software, Web BitTorrent is a great way of transfering large files across the net without putting large loads of servers. All you need are the torrent files. Here are a few of the best sites you can get legal and not-so-legal torrents from. BitTorrent.com – The origonal site from the creator of the BitTorrent protocol. Legaltorrents.com – 100% Legal torrents, many independant films and music. Linux Tracker - As many Linux ISOs as you can handle, all free of course.

Torrentz.com - One of the best torrent search engines available. The Pirate Bay – The biggest tracker of them all, many not-so-legal torrents. Torrentspy - Moving towards more legal torrents, a very popular site. TorrentPortal – Lots of Ads, but if you can get past them its a gold mine of great torrents. Demonoid - A great community, invite only. JabberWalker – Another torrent search page. TorrentBytes - A nice simple forum style torrent list site. MegaNova – In the wake of SuprNova, nice fast search.