• 26,769
  • +1,026
  • 3,010

LulzSec hacking group anno...

Lulz Security made its announcement through its Twitter account, giving no reason for its decision. A statement published on a file-sharing website said that its “planned 50-day cruise has expired”. The group leapt to prominence by carrying out attacks on companies such as Sony and Nintendo. Broadcasters Fox and PBS, the CIA, and the United States Senate...

Hacker Defender HxDef Root...

Type : TutorialLevel : Medium, AdvancedA few moment ago I’m looking for my backup files that maybe already been obsolete :p because I didn’t open it for almost 6-7 years 😮 LoL… I find Hacker Defender HxDef Rootkit on my HDD 🙂 this rootkit is really famous that time…I know maybe for some of you it’s just simple rootkit and...

Friday Free Wallpaper #18 ...

In my free times I like to watch movies, and this movie also great if you like cartoon and Chinese martial art. Here’s the wallpaper. FYI this is kungfu panda 1 wallpaper 🙂Kung-Fu Panda WallpaperFilesize : 6.06 MBFiletype : JPGResolution : 1280 x 1024pxQuantity : 30 pcsDownload...

LulzSec Releases Over 62,0...

Innocent accounts hacked, released. Rogue hacker group LulzSec is at it again, recently boasting on its Twitter that it had hacked the accounts of over 62,000 and provided a dump of emails and passwords free for download. CRO of F-secure, Mikko H. Hypponen, believes that the emails and passwords were from a database kept by website Writerspace.com, according to the...

Friday Free Wallpaper #17 ...

Macro WallpaperYou love photography much?Maybe this macro wallpaper can add a reference for your photo shot technique.Filesize : 10.2 MBFiletype : JPGResolution : 1024×640 ~ 1600x1200pxQuantity : 17 pcsDownload...

Tuesday Great Themes #18 [...

Kentucky SummerFilesize : 6.177 MBFiletype : RARDownload Link Tuesday Great Themes 18 Kentucky Summer:www.fileserve.com/file/5PdQFtSwww.enterupload.com/qfyyfbcd5p4r/Kentucky_SummerT.rar.htmlPreview...

5 Steps to Set Up Backdoor...

Type : TutorialLevel : Medium, AdvancedSome people and student asking about what should we do after successfully compromising or exploiting victim?Some exploit such as CVE-2010-3962 when executed can make victim computer hangs. When computer hangs some user choose to restart the computer and it will make the previous exploit become ineffective.What...

Sony Ready To Move Past Ha...

Long before the iPod, there was the Walkman. Then, the CD, the DVD and Blu-ray. Over the decades, Sony has contributed to or invented some of the most significant consumer products in the world. Of course, the company is also in the entertainment business. Sony makes movies, the cameras to make movies, and the Blu-ray players and TVs people watch them on at home. It...

Friday Free Wallpaper #16 ...

 Food WallpaperDo you like coffee much?this wallpaper also have a bunch of coffee wallpaper and another food wallpaper and also fruit too..Filesize : 61.8 MBFiletype : JPGResolution : 1024×640 ~ 1600x1200pxQuantity : 130 pcsDownload...

Hackers jailbreak iOS 5 in...

Like clockwork, hackers said they’ve removed the digital locks in the latest version of Apple’s iOS so it will run applications not officially sanctioned by the company. iOS 5 was unveiled on Monday, and a beta version was made available to a limited number of developers. Within hours, members of the iPhone Dev Team posted pictures that showed it had been...

Tuesday Great Themes #17 [...

Deer LakeFilesize : 2.57 MBFiletype : RARDownload...

15 Steps to Hacking Window...

Type : TutorialLevel : Medium, AdvancedWhat is Evilgrade?Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates. It comes with pre-made binaries (agents), a working default configuration for fast pentests, and has it’s own WebServer and DNSServer modules. Easy to set up...

Evilgrade 2.0 Error on Bac...

I’m running Evilgrade on Backtrack 5… Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates. It comes with pre-made binaries (agents), a working default configuration for fast pentests, and has it’s own WebServer and DNSServer modules. Easy to set up new settings, and has an...

Page 18 of 29« First...10...1617181920...Last »