Your PasswordCard - 58,583 printed so far! Probably the Best Free Security List in the World. This article contains a comprehensive list of free security-related programs or web applications for Windows XP and later Windows PC-based operating systems.
The few non-free programs on this list are included because they are of high merit (in our opinion) and lack a comparable free alternative. This list also includes links to webpages that contain security-related information. We don't give specific recommendations on this list except for the personal suggestions of the list authors. If you are seeking recommendations then check out Gizmo's Freeware "Best Free" webpages (links to them are shown in the list with ) . We usually list a given item on this list only once, putting it where we think it best belongs. We check all links with Web of Trust. We usually don't test the programs or web applications on this list. We usually don't check these keys for a given item: " Adware that may or may not be optional," " Includes software recommendations via OpenCandy," or " Nagware.
How To Jailbreak Your iDevice - Technology + Entertainment. Peepmail - samy kamkar. 25 Best SSH Commands / Tricks. OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on.
Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. The encryption that OpenSSH provides has been strong enough to earn the trust of Trend Micro and other providers of cloud computing.Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions. SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres the top Voted SSH commands 1) Copy ssh keys to user@host to enable password-less ssh logins. ssh-copy-id user@host To generate the keys use the command ssh-keygen 2) Start a tunnel from some machine’s port 80 to your local post 2001.
GHDB. Welcome to the Google Hacking Database (GHDB)!
We call them 'googledorks': Inept or foolish people as revealed by Google. Whatever you call these fools, you've found the center of the Google Hacking Universe! Advisories and Vulnerabilities (215 entries) These searches locate vulnerable servers. These searches are often generated from various security advisory posts, and in many cases are product or version-specific.
Error Messages (68 entries) Really retarded error messages that say WAY too much! Files containing juicy info (230 entries) No usernames or passwords, but interesting stuff none the less. Files containing passwords (135 entries) PASSWORDS, for the LOVE OF GOD!!! Files containing usernames (15 entries) These files contain usernames, but no passwords...
Footholds (21 entries) Examples of queries that can help a hacker gain a foothold into a web server.
How to use Google for Hacking. Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine.
However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking: 1. Using Google to Hack Security Cameras: There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc.
Inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. Intitle:”Live View / – AXIS” 2. Intitle:index.of finances.xls.