• 26,769
  • +1,026
  • 3,010

Vodafone Hacked – Ro...

The Hacker’s Choice (http://www.thc.org) announced a security problem with Vodafone’s Mobile Phone Network today.An attacker can listen to _any_ UK Vodafone customer’s phone call.An attacker can exploit a vulnerability in 3G/UMTS/WCDMA – the latest and most secure mobile phone standard in use today.The technical details are available at...

Zuckerberg and Google elit...

Mark Zuckerberg, Google founders Larry Page, Sergey Brin, and a whole raft of Google’s top brass have suddenly activated the privacy settings on their Google+ profiles. Even though they want you to expose your entire life to world+dog over the interwebs, they would rather not. The newly activated privacy settings has made it impossible to see who is following...

Tuesday Great Themes #19 [...

White Glass Windows 7 ThemesSimple and clean windows 7 white glass, to activate and use this theme just do a few steps below :1. Copy the contents of the folder with the subject in (usually) C: \ Windows \ Resources \ Themes.2. Through the control panel and a popup menu, select "Personalize" and run the theme.If you want your themes looks...

Security experts claim Goo...

SECURITY EXPERTS have criticised Google’s decision to ban all .co.cc domains from search results, claiming that it’s both inefficient in preventing abuse and unsustainable in the long run. Google took the unprecedented step of deindexing the entire .co.cc second-level domain (SLD) at the beginning of this month because of the high number of malicious web...

Create EXE Backdoor Using ...

How to Create EXE Backdoor Using Metasploit and Backtrack 5 in 4 simple steps, have you imagine when you click and open your notepad application it contain backdoor or malicious codes? or when you start your windows o.s it also start explorer.exe services, but this explorer.exe containing backdoor or malicious codes? Actually embedding backdoor into EXE files...

How to do Hacking the Inte...

Type : TutorialLevel : Medium, AdvancedA few days ago there's someone put a message on my contact in this website, he asking about "is it possible to do hacking outside LAN(Local Area Network)?". When you see all of my articles, 80% of all hacking articles were written for Local Area Network, because I'm doing in my own lab, "so how...

Friday Free Wallpaper #20 ...

Another Exotic Cars wallpaper, hope you like it 🙂Filesize : 15.23 MBFiletype : JPEGResolution : 1920 x 1200pxQuantity : 58 pcsDownload Link:hotfile.com/dl/123547326/2302f55/exotic_car_wallpaper.rar.htmlwww.fileserve.com/file/jCU5zUmMediafirePreview...

Hackers Select a New Targe...

The hackers, calling themselves the A-Team, assembled a trove of private information and put it online for all to see: names, aliases, addresses, phone numbers, even details about family members and girlfriends. But their targets were not corporate executives, government officials or clueless bank customers. They were other hackers. And in trying to unmask the...

5 Steps to Enable Remote D...

Type : TutorialLevel : Beginner, MediumLast year when I'm teaching about computer security class, one student come and ask "can you give me simple tutorial how to use command prompt?", then I say "I don't think so it will be do in a short course because learning about command prompt you should practice everyday for first times and...

4 Steps Metasploit Meterpr...

Type : TutorialLevel : Beginner, Medium, AdvancedInformation leakage is one of the largest threats that corporations face and much of it can be prevented by educating users to properly secure their data. Users being users though, will frequently save data to their local workstations instead of on the corporate servers where there is greater control.(from:...

Top 25 dangerous software ...

MITRE AND THE SANS INSTITUTE have released their 2011 list of the top 25 most dangerous software errors. The software coding errors were ranked as the highest due to their ability to let hackers take over systems, steal data, or freeze up the software altogether to stop it from working. The threats are divided into three key areas – insecure interaction between...

Analysts calm fears of ind...

Fears over a recent malware outbreak described by one firm as “practically indestructible” have been quelled by other security analysts who noted there is a simple method to stop it spreading. Dubbed TDL4, the malware was the subject of a recent report from Kaspersky Lab which characterised the malware as “the most sophisticated threat...

Friday Free Wallpaper #19 ...

Butterfly WallpaperYou like to design?this adobe illustrator file maybe can add your reference to enrich your design collection.Filesize : 14.5 MBFiletype : Adobe IllustratorResolution : ~Quantity : 1 file 6 pcs picsDownload...

Page 17 of 29« First...10...1516171819...Last »