Submitted by Sajeev on 30 September, 2009 - 12:38
This is a simple article to setup a DNS Server in
Ubuntu. Please follow the steps to make this. Setting up DNS Server is
used to serve the new domain names using your IP. This is kind of providing
Step1: We need to install bind 9 for this
Submitted by vismaya on 19 September, 2009 - 17:47
This application will generate network unlock codes for your mobile
phone which you simply enter into the phone keypad to unlock your phone
to all networks
remove your sim card and switch on the phone
type *#06# to get phone serial number and enter this into the program along with your phone model number and current network
click on calculate button and you will receive a list of unlock codes
(i usually find that either the first or last code works fine)
enter the code into your phone (use the * key for the pw+ characters)
your phone will say something like 'sim restrictions lifted' and then reboot itself
thats it you can now use any simcard in your phoneDownload:
Submitted by vismaya on 19 September, 2009 - 17:32
* Download any book from Google Books marked as 'Full view'
* Partially download any book from Google Books marked as 'Limited preview'
* Access to any book available only for US citizens
* Searching for hidden pages (not indexed by Google Books)
Submitted by vismaya on 14 September, 2009 - 23:44
Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer.
The goal is to support as many services which allow remote authentication as
possible. The author considers following items as some of the key features of this
- Thread-based parallel testing. Brute-force testing can be performed against multiple
hosts, users or passwords concurrently.
- Flexible user input. Target information (host/user/password) can be specified in
a variety of ways. For example, each item can be either a single entry or a file
containing multiple entries. Additionally, a combination file format allows the user
to refine their target listing.
- Modular design. Each service module exists as an independent .mod file.Read more..
Submitted by Sajeev on 13 September, 2009 - 18:35
Going through the searches and links on the email, I came across this fantastic way of viewing content that requires registration, without actually registering for these sites.
Trick I use is to visit BugMeNot and in the search box, enter the webite you want to view content from, for exampleNyTimes. This will then give you a list of usernames and passwords that you can use to login to the website and view the content. Along with the username and passwords, it provides their accuracy percentage. This way, you dont have to go through the annoyance of registering yourself.
Submitted by vismaya on 10 September, 2009 - 19:10
Hooking Key Events
There are different ways to catch the keys as they are being typed,
but one of the most efficient is to monitor system events for key
events. This is done with a hook, which forces Windows to call your own
functions when a certain type of event happens.
First, let's see how
you can set a hook to catch keyboard events, with SetWindowsHookEx(): Read more..
Submitted by vismaya on 10 September, 2009 - 18:51
[Laurent Gaffi?] has discovered an exploit that effects Windows Vista, Windows 7
and possibly Windows Server 2008 (unconfirmed). This method attacks via
the NEGOTIATE PROTOCOL REQUEST which is the first SMB query sent. The
vulnerability is present only on Windows versions that include Server Message Block 2.0
and have the protocol enabled. A successful attack requires no local access to the machine and results in a Blue Screen of Death
Submitted by vismaya on 9 September, 2009 - 00:01
Techmantras is one year old now and the way Techmantras has progressed over the past one year is nothing short of outstanding. On this memorable day I would like to tell about our past one year journey. We registered Techmantras in January 08 and came online in September 08.We had out fair share of difficulties in between. We being students found it difficult to come online regularly but we still continued with the same zeal and passion. We created the site framework quickly and started posting. But technical work was and is never finished. We make modifications every day. We also see to it that we maintain the quality of our content.Read more..
Submitted by Sajeev on 8 September, 2009 - 13:38
PERHAPS YOU HAVE BOUGHT A PHONE AND WANT TO CLONE IT WITH ANOTHER PHONE THAT YOU HAVE IN USE THAT IS OLDER OR SOMETHING. WE WILL GO OVER THE BASICS OF WHAT YOU NEED TO CLONE A CELL PHONE:
1) SYSTEM ID
2) AREA CODE
3) CELL PHONE NUMBER
1) SYSTEM IDRead more..
Submitted by vismaya on 8 September, 2009 - 00:33
In HITBSecConf2009 Vipin Kumar (Founder nvLabs.in) demonstrated how easily Windows 7 can be attacked via boot sectors using Vbootkit 2.0.
Submitted by Sajeev on 7 September, 2009 - 22:58
I will teach you how to make a basic Auto-Hacking USB Drive. There are probably many different variationsof this. I will be showing you the most basic.
You need two things:
1) A USB Drive devoted to this
2) The programs and files that I will show you how to make or where to get. If you have trouble making the two files that I show you how to create, they can be downloaded at the end.
Submitted by Sajeev on 7 September, 2009 - 21:16
In this tutorial, I will show you how to take down websites via DDoS. For this tutorial we will be using one of the most effective and one of the least known tools called "Low Orbit Ion Cannon", created by Anonymous members from 4chan.org, this program is one of the best for DDoS'ing, and I have successfully used it to DDoS websites. An internet connection as bad as mine (2,500 kb/s) was able to keep a site down for a day with this program running. Remember that this tool will work best with high internet speeds, and try not to go for impossible targets (like Google, Myspace,Yahoo). LOIC is used on a single computer, but with friends it's enough to give sites a great deal of downtime.
Prerequisites: Download LOIC (Low Orbit Ion Cannon). Open up LOIC.
Submitted by vismaya on 7 September, 2009 - 14:29
very easy way to connect two PCs is using a USB-USB cable. Connecting
two PCs with a cable like this you can transfer files from one PC to
another, and even build a small network and share your Internet
connection with a second PC. In this tutorial we will explain you how
to connect two PCs using a cable like this.Read more..
TechMantras is definitely not a site that promotes or encourages computer hacking (unethical), but rather it is a Technology & Computer Security
website. In fact, Computer Hacking and Computer Security are the two
concepts that goes hand-in-hand. They are like the two faces of the
same coin. So with the existence of close proximity between Hacking and
Security, it is more likely that people often mistake our site to be
one that promotes Hacking. But in reality, our goal is to prevent
hacking. We believe that unless you know how to hack (ethically), you
cannot defend yourself from malicious hack attacks. Know Hacking
but No Hacking!
Your usage of this website constitutes your agreement to the following terms.
Submitted by vismaya on 7 September, 2009 - 11:58
MySpace is one of the most widely used
Social Networking website by many teenagers and adults acropss the
globe. I have seen many cheaters create secret Myspace accounts in
order to exchange messages with another person and have secret
relationships. So, it’s no wonder many people want to know how to hack
a Myspace account. In this post you’ll fine the real and working ways
to hack a Myspace.
THINGS YOU SHOULD KNOW BEFORE PROCEEDING
With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to
hack a Myspace: They are Keylogging and Phishing. All the other ways
are scams! Here is a list of facts about Myspace hacking.
1. There is no ready made software or
program that can hack Myspace just by entering the target username or
URL. If you come accross a site that claims to sell a program to hack
Myspace then it’s 100% scam.Read more..
Submitted by vismaya on 7 September, 2009 - 11:47
Most of you may be curious to know how to find the IP address of
your friend’s computer or to find the IP address of the person with
whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll
show you how to find the IP address of a remote computer in simple
I have created a PHP script to make it easier for you to find the IP
address of the remote computer of your choice. Here is a step-by-step
process to find out the IP address.
1. Download the IP Finder script (IP_Finder.ZIP) that I have created.
2. Open a new account in X10Hosting (or any free host that supports PHP).
3. Extract the IP_Finder.ZIP file and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.Read more..
Submitted by vismaya on 5 September, 2009 - 22:12
First get firefox and the cookie editor plugin for it...they will be required in this operation.
Then make two fake accounts...u will ned one to receive the cookie and one to advertise your script so that if orkut starts deleting such profiles your real account wont be compromised.Its your choice.
Submitted by vismaya on 5 September, 2009 - 21:41
“Offensive Security 101 v.2.0? is a course designed for network
administrators and security professionals who need to get acquainted
with the world of offensive security. The course introduces the latest
hacking tools and techniques, and includes remote live labs for
exercising the material presented to the students.
This course gives a solid understanding of the penetration testing
process, and is equally important for those wanting to either defend or
attack their network.
Offensive Security 101 v.2.0 qualifies you for 40 ISC2 CPE Credits.
This applies to students who submit their exercise documentation at the
end of the course, or pass the certification challenge.
Submitted by vismaya on 5 September, 2009 - 16:35
Submitted by vismaya on 4 September, 2009 - 21:57
Windows 7 could be one of Microsoft's greatest operating systems, if
it fulfills the promise shown by the unofficial beta version (build
7000) we have been testing for the past couple of days.
Improved taskbar and full-screen previews
The taskbar at the bottom of your screen is what you use to launch
programs and switch between them when they're open. In Windows 7 you
can pin any program to the taskbar so it’s always just a click away,
and you can rearrange the icons on the taskbar just by clicking and
dragging. We’ve made the icons considerably bigger, too, so they’re
easier to use. Hover over the icons and you’ll see thumbnails of every
file or window that open in that program, and if you hover over the
thumbnail, you’ll see a full-screen preview of that window. Move the
cursor off the thumbnail and the full-screen preview disappears