Technical Fun

Facebook Twitter

Your PasswordCard - 58,583 printed so far! Probably the Best Free Security List in the World. This article contains a comprehensive list of free security-related programs or web applications for Windows XP and later Windows PC-based operating systems.

Probably the Best Free Security List in the World

The few non-free programs on this list are included because they are of high merit (in our opinion) and lack a comparable free alternative. This list also includes links to webpages that contain security-related information. Exploits Database by Offensive Security. Windows Loader - Current release information.

Dropbox Stuff

How To Jailbreak Your iDevice - Technology + Entertainment. Peepmail - samy kamkar. 25 Best SSH Commands / Tricks. OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on.

25 Best SSH Commands / Tricks

Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. The encryption that OpenSSH provides has been strong enough to earn the trust of Trend Micro and other providers of cloud computing.Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions. SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres the top Voted SSH commands 1) Copy ssh keys to user@host to enable password-less ssh logins.   GHDB. Welcome to the Google Hacking Database (GHDB)!

  GHDB

We call them 'googledorks': Inept or foolish people as revealed by Google. Whatever you call these fools, you've found the center of the Google Hacking Universe! Advisories and Vulnerabilities (215 entries) These searches locate vulnerable servers. These searches are often generated from various security advisory posts, and in many cases are product or version-specific. Error Messages (68 entries) Really retarded error messages that say WAY too much!

Web Devel

How to use Google for Hacking. Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine.

How to use Google for Hacking

However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking: 1.

Using Google to Hack Security Cameras: