background preloader

Ethical Hacking

Facebook Twitter

Kali Linux.

Others Resources EH

CCNA. Webpages EH. Exploit-ID | Exploit Information Disclosure. Telnet.org. Jailbreak basics: Everything you need to know for iPhone and iPad | TiPb. We see quite a few questions in our Jailbreak Forums about jailbreak basics. So, we've decided to compile a master list of some basic jailbreak magic right here in one place. Hopefully this will help a lot of you beginner jailbreakers learn the ropes (and maybe even help some of you decide whether the leap to the jailbreak world has its advantages for you). We've included common jailbreak lingo, popular jailbreak apps and tools, and videos highlighting some awesome jailbreak utilities!

Common ways to Jailbreak There are usually several ways to Jailbreak depending exactly when a new version of iOS is released, when a new exploit is found, and when new Jailbreaks are released. Some are one-button easy, others command-line complicated. Here are the latest and the simplest. If you're not sure, here's how to find out which iOS software and iPhone modem firmware you're running. iOS 5.0 & 5.0.1 (GSM/CDMA) Jailbreak (untethered) iOS 5 & 5.0.1 (GSM/CDMA) Jailbreak (tethered) AppleTV Jailbreak Cydia. WIRELESS - Securitytools. FREE Computer Training - Computer Repair Classes - Laptop Repair Instruction - Data Recovery Lessons - Web Design Seminars - Computer Security Counseling - Apprenticeship Program. How to Design a Search Engine Marketing Strategy. Most of my visitors always asking me that, which Operating system is used by Hackers ?. We can’t say that particularly all Hackers are using which Operating system,that completely depends on their mind sets and Compatibility.But as per records Linux is the Most used flavor for Hacking,because of its high anonymity and strength,hackers normally depends on Linux flavors.

But here Question is not about Windows or Linux.Its all about Which is the Specific Operating System used by the Hackers ?. We have majorly two Operating systems which are extremely Powerful and Strength enough to do What ever a Hackers want.Those operating systems are also Flavors of Linux only,and also these are most widely used by the Ethical Hackers,Hackers,Penetration Testers and etc.The two Operating systems are… 1) BackTrack - Download this from . 2) Live-hacking - Download this from .

BackTrack Operating System : LiveHacking Operating System : LIVE HACKING | Ethical Hacking and Penetration Testing Online Magazine. Top 10 Most Famous Hackers of All Time. BackTrack Linux - Penetration Testing Distribution.