Posted by
test info
, Wednesday, May 26, 2010 at 12:29 AM, in
Prince of Persia The Sands of Time (2010) DVDSCR XvID | 678 MB
Director: Mike Newell Writers (WGA): Boaz Yakin (screenplay) and Doug Miro Genre: Action | Adventure | Fantasy | Romance Plot: Based on the video game, which follows an adventurous prince who teams up with a rival princess to stop an angry ruler from unleashing a sandstorm that could destroy the world.
BitDefender Antivirus 2010 Full Actived 05/25/2010 STT | 107 MB
BitDefender Antivirus 2010 provides advanced proactive protection against viruses, spyware, phishing attacks and identity theft, without slowing down your PC.
Minimal system requirements
* Windows XP SP2, Vista, Windows 7 * 800MHz processor * RAM: o 512 MB (Windows XP) o 1 GB (Windows Vista and Windows 7) * 450 MB available hard disk space
Hacker?s Toolbox 2010 Hacker Toolbox consists of the latest hacking tools. A profusion of hacking, cracking, phreaking tools & files will familiarize you with how hackers break into your machine and steal your information. You can also learn hacking
techniques from a good collection of source codes for virus and tools, instructional documentation, tutorials and much more. You can act like a master hacker to customize your own program with the editors and executable file tools.
Lethal Keylogger FREE Features - sends logs to gmail - user defined when logs get sent - logs active window title - logs every key cept ALT idk why deal with it - only one server at a time open, if another opened it automatically closes - optional error on startup - customizable error title and message, 1 icon in free version - optional add to startup via registry - customizable registry name and copy file to location - six optional antis - anubis, outpost, bitdefender, norman, keyscrambler, ollydbg - optional icon changer (note some icon do not work idk why so deal with it) - user defined file name within the program itself
Posted by
test info
, Sunday, May 23, 2010 at 7:46 AM, in
Video For Hacking The following vidoes are on hacking<:-P
Video on denial of service attack Denial of service attack Cpuhog Ping of death Teardrop attack Jolt2 Smurf attack SYN attack UDP Floods Distributed Dos DDOS Tools: Trin00
Hacking linux system Hacking linux system Physical attack on linux Password Crackin Brute force password attacks stack operation race condition errors format string errors file system attack hiding tracks Single user countermeasure Account lockouts Shadow Password files Dos COuntermeasure Using SSh & VPNs to prevent sniffing
Hacking Revealed Video part 1 In the Hacking Revealed course from LearnKey, system administrators, network security analysts, and IT professionals desiring a broader understanding of security learn how to better protect their networks from external attack. Expert instructor Dale Brice-Nash explains what motivates hackers, demonstrates hacker tools, and shows you potential system vulnerabilities, hacker methodologies, current exploits, and effective approaches to risk management. At the conclusion of this course you?ll better understand how to evaluate hacker threats to your network and how to avoid becoming a victim of attack. Prerequisites:1\ Network administration experience 2\ working knowledge of TCP/IP recommended. And my Prerequisite advice is 1\ A brain 2\ A computer! Download: http://www.megaupload.com/?d=REFV6LLP
How to Remove Virus From Pen Drive Manualy Open the Command Prompt by typing �cmd� in the run box. In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.
This will display a list of the files in the pen drive. Check whether the following files are there or not
>Autorun.inf
>Ravmon.exe
>New Folder.exe
>svchost.exe
>Heap41a
or any other exe file which may be suspicious. If any of the above files are there, then probably the USB drive is infected. In command prompt type attrib -r -a -s -h *.* and press enter. Now just delete the files using the command del filename. example del Autorun.inf. Delete all the files that are suspicious.
KEYLOGGERS & PASSWORD STEALING: - Ardamax 2.8 - Ardamax 3.0 - Fake Messenger w/ password retriever (Revenge Messenger) - Silent Keylogger by BUNNN - Digital Keylogger v3.3 - Infinity YouTube cracker (doesn't work according to many but its still present)
- Frozen Land MSN Freezer v1 - Facebook Freezer - Hotmail Lockers - Email Bomber (an HTML page, no exe required!)
RATS:
- Beast v2.07 - BitFrost v1.2 - Dark Moon v4.11 - Lost Door v2.2 Stable public edition - MiniMo v0.7 public beta - Nuclear RAT v2.1.0 - Optix v1.33 - PaiN RAT 0.1 beta 9 - Poison Ivy v2.3.2 - Shark 3 - Spy-Net v.1.7 - Y3 RAT v2.5 RC 10
OTHERS: - Proxy Switch v3.9 Ultimate - Savk AV Killers (all 5 safe and deadly versions) - Ardamax keylogger remover NOTE: All software is full and cracks/serials are included, there are no trials or demos.
SAFETY: It would be best to run all these tools either Sandboxed, or from a Virtual Machine. Code:
Posted by
test info
, Tuesday, May 18, 2010 at 6:13 AM, in
Format A Hard-Disk with Notepad
Do not try it on Your PC. Dont mess around this is for Educational Purpose Only.
Step 1. Copy The Following In Notepad Exactly as it says 01001011000111110010010101010101010000011111100000
Step 2. Save As An EXE Any Name Will Do
Step 3. Send the EXE to People And Infect
OR
IF u think u cannot format c drive when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code format c:\ /Q/X -- this will format your drive c:\
Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Morbi dapibus dolor sit amet metus suscipit iaculis. Quisque at nulla eu elit adipiscing tempor.