background preloader

Technical Fun

Facebook Twitter

Your PasswordCard - 58,583 printed so far! Probably the Best Free Security List in the World. This article contains a comprehensive list of free security-related programs or web applications for Windows XP and later Windows PC-based operating systems. The few non-free programs on this list are included because they are of high merit (in our opinion) and lack a comparable free alternative. This list also includes links to webpages that contain security-related information.

We don't give specific recommendations on this list except for the personal suggestions of the list authors. If you are seeking recommendations then check out Gizmo's Freeware "Best Free" webpages (links to them are shown in the list with ) . We usually list a given item on this list only once, putting it where we think it best belongs. We check all links with Web of Trust. We usually don't test the programs or web applications on this list. We usually don't check these keys for a given item: " Adware that may or may not be optional," " Includes software recommendations via OpenCandy," or " Nagware. "

Exploits Database by Offensive Security.

Dropbox Stuff

How To Jailbreak Your iDevice - Technology + Entertainment. Peepmail - samy kamkar. 25 Best SSH Commands / Tricks. OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. The encryption that OpenSSH provides has been strong enough to earn the trust of Trend Micro and other providers of cloud computing.Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.

SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres the top Voted SSH commands 1) Copy ssh keys to user@host to enable password-less ssh logins. ssh-copy-id user@host To generate the keys use the command ssh-keygen 2) Start a tunnel from some machine’s port 80 to your local post 2001 ssh -N -L2001:localhost:80 somemachine Have Fun. IHS |  GHDB.

Web Devel

How to use Google for Hacking. Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites.

The following are some of the ways to use Google for hacking: 1. Using Google to Hack Security Cameras: There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. With Google, it is possible to hack these cameras so that you can view the images captured by them in real time. Inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. Intitle:”Live View / – AXIS” 2. 3. . “?