Are you website or blog owner? want to have some number of hits for websites. You can do this by batch programming. It is simple Batch program.
What is the Use?
Your page will get more no of hits. By sending to your friends and other victims, you can more hits to your website from various IP...
You can create a big size file using windows default command prompt itself. Why we need huge size file? When you create virus or you can use in your college for occupying the memory.
First of all Decide the Size of huge file. For eg, if you decide 1 milliion byte,then we should convert it to...
pc runs slower than usual.
Stops responding
computer crashes, and restarts every few minutes.
Applications on the computer do not work correctly.
Disks or disk drives are inaccessible.
Can’t print items correctly.
Unusual error messages
Distorted menus and dialog boxes.
There is a double...
The total income of cybercriminals reaches more than 75 million rubles per month.
Almost half of all fraudulent call centers are in prisons. The total income of cybercriminals reaches more than 75 million rubles per month.
“It is not just individual malefactors who call customers, but...
Dogs can smell smartphones, microSD cards, etc., which can serve as evidence in criminal investigations.
New times dictate new conditions - US law enforcement agencies are now training their service dogs to find not only drugs and weapons, but also electronic devices.
According to the...
PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control. The stub size is around 14kb and can be compiled on any Unix like system.
Why not use a traditional Backconnect/Bind Shell?
PostShell...
Global security giant Kaspersky and robot cybersecurity firm Alias Robotics have announced a partnership that will seek to enhance protection for robots used in operational technology (OT) infrastructure.
Used in many industrial operations, robots – a key component of Industry 4.0 – represent...
INTERPOL is set to join The Coalition Against Stalkerware, and will help advance the group’s efforts by educating the global law enforcement community on how to proactively investigate the use of stalkerware, as well as provide support to victims.
The alliance was first set up in November to...
Smartphones have permeated into every modern person’s life, and many of the daily tasks we used to perform on a computer are now getting done on our iPhones and Androids (and 2.8% of us apparently still use the Windows phones). Checking emails, accessing social media sites, chatting with...
Tracing or Routing a website using command prompt. This tip is only meant for educational purpose. I mainly use this trick to find out the hosting provider where a particular domain is hosted.
Follow the below steps:
1. Start->Run->CMD ie; open Command prompt
2. Type the following command and...
n this new hacking tutorial we will be Piping Crunch with Aircrack-ng so we can get rid of the constantly increasing dictionary files used to retrieve WiFi passwords from cap files. When we pipe the output from Crunch with Aircrack-ng the data will be fed directly into Aircrack-ng instead of a...
All of us will hack it with a clone site. What clone site is? Duplicate site is a real site (usually login site) that actually if you try to login or pressing any button that will transfer you to another link will not work. Once we make the clone site and dispatched it to our sufferer, he will...
i decided to share this little awesome tool that uses mitm attack to inject a JS miner in wifi network. Hope you will like, Enjoy!
Concept:
Performs a MITM attack to all selected victims
Injects a js script in all the HTML pages requested by the victims
The js script injected contains a...
when you delete some files, they will show windows error like “Error Deleting File or folder”. Now i am going to guide you to delete such files.
You may meet with these errors:
Cannot delete file: Access is denied
There has been a sharing violation.
The source or destination file may be in...
Have you at any point considered how programmers really get esteem from a huge number of taken Visas (and check cards)?
So, there's a major worldwide market for taken charge card numbers. At the point when you catch wind of a major hack in which a great many Visa numbers this typically occurs...
Bugtraq:
Bugtraq is famous for its electronic mailing list that is purely dedicated to computer security. It is available in Debian, Ubuntu, and OpenSUSE. The Bugtraq developer team consists of experienced
hackers and developers that offer a great service for ethical pen testers. It comes with a...
XSS can be used in 2 conditions.
Sometimes there are forums that have particular fields that allow HTML posts..
Or a vulnerability in the search field.
A vulnerable search field that allows html searches and uses $_GET function instead of $_POST
Okay so.. lets talk about the Search field first...
When i studied second year(cse), my friends told that autorun.inf is virus. I thought so. Because my antivirus blocks autorun.inf files. In third year when i search about autorun.inf file in net, i realize about the auto run file.
Today i bring some files from my college system. When i insert...
This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have experienced a situation where in we need to gain access to a...
The other day, I stumbled across an interesting blog post with the subject Certified Ethical Hacker (CEH) vs. Offensive Security Certified Professional (OSCP) . . . and How to Start Your Ethical Hacker Career”. I did not only read this article but I devoured it and kept nodding my head, in...