Wikileaks Under Attack

The WikiLeaks website crashed Tuesday in an apparent cyberattack after the accelerated publication of tens of thousands of once-secret State

Saturday, 24 August 2013

Fascinations Levitron Revolution Platform With EZ Float Technology

The Levitron Revolution features EZ Float technology to make levitating your favorite collectibles a snap The levitating magnetic hover disc can hold up to 13 ounces in mid-air 4 white accent LEDs spotlights your item beautifully People wont believe that its possible until they see it for themselves Objects continuously revolve in space inspiring wonder and amazement  U can buy at: http://goo.gl/GPYkGp Product Description From the Manufacturer Our most advanced levitation device yet. Product Description Fascinations Levitron Revolution Platform w/ EZ Float Technology Discover the secrets of levitation with Fascinations...

Saturday, 9 February 2013

Samsung Galaxy Q With Full HD Flexible Display To Be Announced At MWC 2013

It seems that even though Samsung Galaxy S4 release date was not set or MWC 2013, there will be another Samsung terminal that will attract the public’s attention. I am talking about Samsung Galaxy Q, a dual-display smartphone, which was previously teased by the South Korea-based phone maker. The guys atMobileGeeks have information that the model is real, and that Samsung will announce it at Mobile World Congress 2013 in Barcelona. The idea behind the Samsung Galaxy Q concept is that the two displays can be “united” in a single 1,080p screen. It’s true there were other companies that failed with their attempts to make successful...

Sunday, 1 July 2012

6.5 Million Encrypted LinkedIn Passwords Leaked Online [REPORT]

It’s not a good day for LinkedIn. After reports that its iOS app potentially violates user privacy by sending detailed calendar entries to its servers, comes a report that 6.46 million encrypted LinkedIn passwords have leaked online. A Russian forum user claims he has hacked LinkedIn, uploading 6,458,020 encrypted passwords (without usernames) as proof. The passwords are encrypted with the SHA-1 cryptographic hash function, used in SSL and TLS and generally considered to be relatively secure, but not foolproof. Unfortunately, it also seems that passwords are stored as unsalted hashes, which it makes it much easier to decipher...

Sunday, 20 November 2011

Hack Computers Inside LAN Network

Today,I will write about hacking computer inside the LAN network.This technique will be taking advantage of Port 139.Most of the time,Port 139 will be opened.First of all,I will do a port scanning at the target computer which is 192.168.40.128.This computer is inside my LAN network.I will scan it using Nmap.I get the result and it shows Port 139 is opened up for me.Now you will need both of these tools:** USER2SID & SID2USER** NetBios Auditing ToolYou can get both of them on the Internet.After you get both of them,put them in the C:\ directory.You now need to create a null session to the target computer.Now open the Command Prompt and browse...

How to Trace an IP Address

Whenever you get online,your computer is assigned an IP address. If you connect through the router, all of the computers on that network will share a similar Internet Protocol address; though each computer on the network will have a unique Internet address. An IP address is the Internet Protocol (IP) address given to every computer connected to the Internet. An IP address is needed to send information, much like a street address or P.O. box is needed to receive regular mail. Tracing an IP address is actually pretty straightforward, and even though it's not always possible to track down a specific individual, you can get enough information to...

Page 1 of 23123Next

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites