• Protocol (Network)

    Definition: A network protocol defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets Network protocols include mechanisms for devices to identify...
  • Introduction of Hacking

    What is hacking?Hacking used to be defined as "One who is proficient at using or programming a computer; a computer buff." However, this use has been turned around now, to mean that of a cracker - "One who uses programming skills to gain illegal access to a computer network or file." This...
  • Metasploit attack on Win 7 x86/x64 - Detailed for beginners

    Pentest on BT4 R1 GUIDE EXPLANATION: Text in {} = Titles # In front of text = Info Text in [] = Your Input # Here are some examples on [] from the guide beneath: # set LHOST [IP ADRESS INT.] = set LHOST 192.168.1.15 # rdesktop [IP]:[port] -u "[USERNAME]" = rdesktop...
  • Browse the Internet Anonymously

    .fullpost{display:inline;} Image Surfing on the net is not as secure as the average internet user may think. Your identity and what you are doing can be monitored easily. This is especially true for those with Wireless networks, those who browse the internet from their work computer and...
  • How to Hide Data in Image, Audio & Video Files: Steganography

    Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice....
  • How to avoid facebook scams

    v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Normal 0 Facebook is the part of people's daily life. It's no. 1 socail networking website so it is used for spreading scams by...

Sunday, February 27, 2011

Hack Facebook password is using Keyloggers. Today i will explain you how to hack Facebook password using keylogger. how to create your Facebook hacker keylogger, its a 100% Fully undetectable keylogger you can check this file using Virus total. Its a 100% FUD remote keylogger with several advanced features. its so easy that anyone can do it. On my website you will never get any infected tool....
CVE Identifiers (also called "CVE names," "CVE numbers," "CVE-IDs," and "CVEs") are unique, common identifiers for publicly known information security vulnerabilities. CVE identifiers have "entry" or "candidate" status. Entry status indicates that the CVE Identifier has been accepted to the CVE List while candidate status (also called "candidates," "candidate numbers," or "CANs") indicates that the...
The operating system is the most fundamental program that runs on your computer. It serves as the basis for how everything else works.   What is an operating system?An operating system (OS) is the main program on a computer. It performs a variety of functions, including determining what types of software you can install coordinating the applications running on the computer at any given...