bidvertise
LiveCD Utilities For Wireless Hacking 2010 - Complete Update 13.03.2010 | 634.76 MB
Posted by kk in Hacking tools, Internet Tools on Wednesday, March 24, 2010
An edited and slightly updated version of the popular LiveCD for working with wireless networks. Based on Ubuntu, provides a graphical interface.
Disk boot, there is a script for installation on the PC hard drive or a virtual machine (VirtualPC is not supported). Integrated about 50 tools to work with the network - scanners, sniffers, password crackers, and so on. utilities. In addition, it is - a full linuh sustainable yadrom.Posle installed on the hard disk system can be russified, supplemented, adjusted to taste vladeltsa.V addition to the Back Track 4 - a very powerful set of tools for working with networks in the first place - wireless. There is a decent set of drivers for many types adapterov.V inete different models has been known since 2007, the popular view that his creation had to do with the FBI.
Title: Wireless Hacking LiveCD FBI Version
Version: 2009 - Update Tools 2010
Released: 2009
Developer: GNU
Type: Hack & Tools
Language: English
Medicine: Not required
System requirements:
RAM> 256 Mb
CPU> 800 GHz
HDD> 4 Gb
Installation:
Resulting image stored on a CD or mounted on VMWare.
Download :
http://hotfile.com/dl/32565969/fbbcf23/LiveCD_Wireless.part2.rar.html
http://hotfile.com/dl/32566005/92af769/LiveCD_Wireless.part3.rar.html
http://hotfile.com/dl/32566069/2bc61b4/LiveCD_Wireless.part4.rar.html
http://hotfile.com/dl/32566116/1ed9293/LiveCD_Wireless.part5.rar.html
http://hotfile.com/dl/32566169/ae427dd/LiveCD_Wireless.part6.rar.html
http://hotfile.com/dl/32566471/fe6b23c/LiveCD_Wireless.part7.rar.html
Steganos Safe 2009 v11.1.1.8835 | 15.83 Mb
Posted by kk in Antivirus, System Utilities
Steganos Safe - Highly secure data protection that's fast and easy. It's more than a little unsettling knowing that a perfect stranger has access to your private things. But this is exactly what can happen if your laptop or portable media gets lost or stolen. When you consider the staggering number of incidents involving lost or stolen hardware, it's crucial to ensure that you're protecting your data in order to safeguard your privacy.
Apart from the manual password entry, data can also be encrypted via USB stick or mobile phone, for example. Thus, employees do not have to remember their passwords: They only have to connect their USB stick to make the safe open automatically. If someone forgets about his password or loses a key device, the administrator can use the Emergency Decryption Key (EDK) to access the data. The password chosen originally still remains secret. The use of these features can be configured and controlled via group policies.
Features
- Hotkey Support - Open and close your safe conveniently using a key combination.
- Mail client Safe - Protect e-mails, contacts, calendar entries and tasks in the safe. This protects your mail client data when you lose your PC. Works for Outlook, Outlook Express and Windows Mail.
- Emergency decryption with the Emergency Decryption Key (EDK) - If a user has forgotten a password, the administrator can nevertheless access data using the Emergency Decryption Key. However, the password actually used by the user always remains a secret.
- Active Directory support - Convenient and central installation, configuration and administration through the standard Windows technology; Active Directory.
- Security policies - Administrative templates for the group policy editor enable you to implement your security policies: Determine password policies, whether data is to be permanently destroyed and how this would be done and if key devices such as USB sticks are permitted for use - and much more.
- No training, no hidden costs - Can be implemented without additional infrastructure or expensive training.
- Share secure drives in a network - Several authorized users receive read access to a common secure drive in the network. For each session, the first one to open the Safe receives read/write access, all following users have read only-access.
- MSI-based installation - Installation through Windows Installer or other software management systems.
- 256 Bit AES in real time - Uncracked. Unrivalled. The world's most progressive encryption algorithm protects your data. So fast that you don't even notice it.
- Any number of safes - Create any number of secure drives - each with up to 512 GB capacity. And change the size as required.
- Steganos Portable Safe - Simply take your encrypted data with you: On CD and DVD or even rewriteable on USB sticks. Usable anywhere without additional software - all you need is a password.
- USB stick as key - Open your safe without a password: simply by using a USB stick, SmartPhone, PDA, memory card or digital camera.
- Use mobile phones as access tokens for secure drives - You can open the safe with your ActiveSync-capable SmartPhone - with Bluetooth even without a cable. When you move away from your computer the safe closes automatically.
- Dynamic safe size - Specify the size of your secure drives yourself - and change these at any time as you require.
- Shredder - Deleted files can often be recreated. Is that what you want? Steganos Shredder provides secure deletion - and more.
- Only the best passwords - The integrated multilingual dictionary recognizes unsafe passwords - and warns you.
- Automatic updates - Steganos keeps your software up-to-date - free of charge within a generation.
Rapidshare,Megaupload Download Manager Time Bypassing | 11 MB
Posted by kk in Hacking tools, Internet Tools, Keygens/Cracks
-. 100% download working for rapidshare, megaupload and all the filehosting sites....
-. Also 100% download working for all the sites.
Extra Features:
. Plugin: New [VP] VIP-File.com, Added Full support. (Unlimited!)
-. Plugin: New [LB] LetItBit.net, Added Full support.
-. Plugin: New [NG] NetGull.com, Added Full support.
-. Plugin: New [HF] HotFile.com, Added Full support.
-. Plugin: New [UB] UploadBox.com, Added Full support.
-. Plugin: New [SO] Share-Online.biz, Added Full support.
-. Plugin: New [SP] SpeedShare.org, Added Full support.
-. Plugin: [FF] FileFactory.com, was improved to provide better support.
-. Plugin: [FY] FileFlyer.com, will now check for file's viability more often.
-. Plugin: [RS] RapidShare.com, was fixed.
-. Plugin: [UT] Uploaded.to, was fixed.
-. Added download support for a new host: [YT] youtube
-. Added download support for a new host: [FF] FileFactory.com
-. Added download support for a new host: [SS] SendSpace.com
-. Added download support for a new host: [FY] FileflYer.com
-. Added download support for a new host: [NL] NetLoad.in
-. Added download support for a new host: [ES] EgoShare.com
-. Added download support for a new host: [DF] DepositFiles.com
-. Added download support for a new host: [EZ] Easy-Share.com
-. Added download support for a new host: [UT] Uploaded.to
-. Drastically improved the link verification speed. [+Added the new hosts!]
and more download plugins... try it now... its free...
TeamViewer 5.0.8081 Portable l 6.78 MB
Posted by kk in Hacking tools, Internet Tools on Tuesday, March 23, 2010
Features of TeamViewer:
Remote Control without Installation:
· With TeamViewer you can remotely control any PC anywhere on the Internet. No installation is required, just run the application on both sides and connect - even through tight firewalls.
Remote Presentation of Products, Solutions and Services:
· The second TeamViewer mode allows you to present your desktop to a partner. Show your demos, products and presentations over the Internet within seconds - live from your screen.
File Transfer:
· TeamViewer comes with integrated file transfer that allows you to copy files and folders from and to a remote partner - which also works behind firewalls
Works behind Firewalls:
· The major difficulties in using remote control software are firewalls and blocked ports, as well as NAT routing for local IP addresses.
· If you use TeamViewer you don't have to worry about firewalls: TeamViewer will find a route to your partner.
Highest Security Standard:
· TeamViewer is a very secure solution. The commercial TeamViewer versions feature completely secure data channels with key exchange and RC4 session encoding, the same security standard used by https/SSL.
No Installation Required:
· To install TeamViewer no admin rights are required. Just run the software and off you go...
High Performance:
· Optimized for connections over LANs AND the Internet, TeamViewer features automatic bandwidth-based quality selection for optimized use on any connection.
Title : TeamViewer
Version : 5.0.8081 Portable
Developer : Teamviewer.com
Homepage : teamviewer.com
Updated : 2010.03
License / Price : Free
Language : EN
Platform : Windows 2K/XP/2K3/Vista/7
Size : 6.78 mb
Homepage-http://www.teamviewer.com/index.aspx
How to bypass Cyberoam Client – Hack Cyberoam
Posted by kk in Hacking tools, Internet Tools on Monday, March 15, 2010
Many of my friends and reader have been asking for an way to bypass cyberoam. Most of the organizations , educational institutes like schools and colleges are implementing cyberoam –unified threat management system now-a-days. Cyberoam is used to make filtration’s to the sites being browsed by the users i.e. unwanted sites are being blocked (Eg:facebook, orkut etc) Let see the details of cyberoam before cracking cyberoam.
Phase 1 : Detecting external IP and open ports
Step 1 : Download Free Port Scanner Software
The first software required to crack software is a free port scanner software. For your convenience i have upload it online and you can download:
Step 2 : Install free port scanner
Once you have downloaded the free port scanner , you have install it on your system. The installation is typical to any other software installation on windows. You can follow the screenshots for smooth installation.
A. Double click on setup file and initialize the installation.
B. Choose the directory (destination location) where the software has to be installed
C. Select the start menu folder
D. Choose whether you want to create desktop icon and quick launch icon (optional)
E. Ready to install !
F. Completion of installation and launching the application.
Step 3 : Detecting the static IP assigned to your organization.
We need to find out the static IP assigned to your organization which is allocated by the ISP. Here the mechanism of hacking cyberoam is the route the packets directly to the external IP of your organization , thus bypassing cyberoam. Detecting your external IP is pretty simple
- Goto www.WhatIsMyIP.com
Here the site will display your IP address. Please note down your IP address which we will be using again in the further steps.
Step 4 : Scanning open ports for your external IP address
Run the free port scanner software which was installed in Step 2. Enter the IP displayed atwww.WhatIsMyIP.com in the field for IP address. Keep the other settings default and perform and port scan. This may take a few minutes.
A. Entering IP address whose port has to be scanned.
B. Scan results
Once the scan is completed note down the port number of the port named “ndl-aas”. This ends the first phase of haking cyberoam
Phase 2 : Configuring proxy server
Step 1 : Download Proxifier – proxy software
The second software require to hack cyberoam is Proxifier. This software helps us to bypass cyberoam through proxy sevrer. For your convinience i have uploaded it online and you can download it
Step 2 : Install proxifier software
Once you have downloaded the proxifier software , you have install it on your system. The installation is typical to any other software installation on windows. You can follow the screenshots for smooth installation.
A. Double click on setup file and initialize the installation.
B. Accept Licence Agreement
C. Choose the directory (destination location) where the software has to be installed
D. Select the start menu folder
E. Choose whether you want to create desktop icon (optional)
F. Ready to install !
Please not to deselect launch application while finishing the installation process. proxifier is an proprietary software. If you cannot buy it you have to use a crack (Illegal – at your own risk). You need to replace the original exe file with the crack file , in the installation directory.
Step 3 : Configuring Proxifier software
The key of bypassing cyberoam lies in configuring the proxifier software. The IP address and port we detected earlier comes to use now.
- Under menu goto Proxy Settings
- After opening the proxy setting click on “Add”
- Enter the IP address and port which where detected in earlier step
- Use “HTTPS” protocol.
- Check if the proxy is working properly (Else can’t help)
- Select OK
- Done !!!!
- Open your favorite sites now !
Although this method is a tedious , time consuming it yields the best results. It is almost impossible for the network administrator to block this method !
Collection of most dangerous hack tools ever(All Latest 2010)
Posted by Sachin in Hacking tools on Friday, March 12, 2010
Includes:
Vista Activator
Cain & Abel
Neo IP Tracer v3.25
GFI.LANguard.Network.Security.Scanner.v8.0.2008012 1 Incl Keygen-SSG
G-Pass Easy Proxy (portable)
Damn NFO Viewer
Net Tools 5.0.7
DDPassword Unmask
ProcessExplorer
PerfectDisk
Hex Workshop
Cheat Engine 5.4
Sony Sound Forge 9.0c
10,000 Different Serial Keys
ACDSEE 8.0 build 39
All Programs include a Read Me or Instruction Texts for serials and installation instructions. Use them.
hack premium account rapidshare 2008
Posted by Sachin in Hacking tools
Hack Credit Cards
Posted by Sachin in Hacking tools
Hack Credit Cards | 5Mb
Generate valid Credit card numbers with their cvv numbers. Hack with their Valid Complete details and have some great fun.