Enter your email address:

Delivered by FeedBurner

feedburner count

How to Bypass Windows 8 Password Login Screen?

Labels: , , ,

In this tutorial, I will teach you how to bypass the Windows Password Login Screen using KON-Boot.It helps in bypassing the default windows password protection and upon reboot, it leaves no trace. The password isn't changed nor any system settings, it will be just bypass the login screen and deletes all the its temporary files after reboot. At the end of this tutorial, you will be able to log into password protected Windows OS (Tested on: Windows XP, Windows 7, Windows 8, Windows 8.1).

What and How to Port Scan? - Beginner's verison.

Labels: , ,

In this article I hope to impart basic amount of knowledge on port scanning.It is commonly used term while browsing through Hacking related articles. Though, you could always wiki for help. I believe this would be of more use.

Exploit: SQL Injection Vulnerability in Drupal 7.x

Labels: , , , ,

Safety and security scientists from SektionEins have actually uncovered a vital SQL Shot vulnerability in Drupal CMS that leaves a a great deal of web sites that utilizes Drupal in jeopardy.

PHP fixed Remote Code Execution Vulnerabilities.

Labels: ,

The susceptibility determined as "CVE-2014-3669" could induce an integer overflow when analyzing specifically crafted serialized information with the unserialize (). The susceptibility is simply a 32-bit system, however the risk is induced by the violation which the serialized information usually originate from user-controlled stations.

How to Stop and Prevent a DDoS Attack.

Labels: ,

Distributed denial-of-service (DDoS) assaults are all the time in high headlines worldwide, as they're plaguing web sites in banks, and nearly of virtually each group having a distinguished on-line presence. The primary trigger behind the proliferation of DDoS assaults is that there's a very low-price that the attacker has to incur to place such assault in movement. Thankfully, at present numerous prevention strategies have been developed to sort out such assaults. Earlier than delving additional into understanding concerning the methods to stop DDoS assault, let’s first perceive what precisely a DDoS assault is and eventually you will be able to perfom such an attack too through this article : How to DDoS Attack

How to Trace Back a Hacker's Malware?

Labels: , , ,

In this tutorial I'll be showing you ways to obtain a hacker's information, particularly his IP address.Once you have his IP address, you can trace it to the exact location through a number of IP Lookup tools such as this free one : http://whatismyipaddress.com/ip-lookup.If you have been successful in identifying the malware file that a Hacker infected you with, then it saves most of the trouble and we can simply work on this file. I will be showing you have an unprotected hacker can give himself up to the feds by doing something stupid like this. I believe, this tutorial is a must for every hacker who does not maintain is anonymity.

How to Crack MD5, SHA-1, SHA-2 Hashes.

Labels: , , ,

I've seen some requests for individuals to crack hashes, and a few individuals are not doing it right, simply giving a hash isn't enough to assist anyone in this matter,This tutorial will walk through the fundamentals and take a look at and assist you move into your way forward in hashing.