Thursday, 10 October 2013
Samsung unveiled its first smartphone with a curved screen – check out the video and photos
inShare
Samsung announces the Galaxy Round, its first smartphone with a curved screen [Video]
Samsung teased plans to launch a smartphone with a curved screen with
a press statement last month, and today the Korean company unveiled the device: it’s called the Galaxy Round, as many had predicted.
The phone sports a 5.7-inch 1080p screen — which is the same size as
the...
GTA V Breaks 7 Guinness World Records

GTA V Breaks 7 Guinness World Records in Less Than 1 Month 1. Best-selling action-adventure video game in 24 hours 2. Best-selling video game in 24 hours 3. Fastest entertainment property to gross $1 billion 4. Fastest video game to gross $1 billion 5. Highest grossing video game in 24 hours 6. Highest revenue generated by an entertainment product in 24 hours 7. Most viewed trailer for an action-adventure video gam...
Getting Background (Module 2)

Getting Background
Click Topic to Download
What is Foot Printing? (9.06 mb)
History Lessons - Way Back Machine (13.82 mb)
Using Your Resources - Job Listings, People Searches, Social Networks (11.64 mb)
Using Whois Lookups (15.36 mb)
Using DNS To Extract Information (15.70 mb)
Finding Network Ranges (12.63 mb)
Google Hacking (9.47 mb)
Mining For Information Using Google Hacking (10.85 mb)
Google Hacking...
Saturday, 5 October 2013
Hacking for Dummies - 3rd Edition
+(ATTiCA).jpg)
A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!It's
bad enough when a hack occurs-stealing identities, bank accounts, and
personal information. But when the hack could have been prevented by
taking basic security measures-like the ones described in this
book-somehow that makes a bad situation even worse. This beginner guide
to hacking examines some of the best security...
The Art of Human Hacking
The first book to reveal and dissect the technical aspect of many social engineering maneuvers
From elicitation, pretexting, influence and manipulation all aspects
of social engineering are picked apart, discussed and explained by using
real world examples, personal experience and the science behind them to
unraveled the mystery in social engineering.
Kevin
Mitnick—one of the most famous social engineers in the world—popularized
...
Hacking The Art of Exploitation

Hacking is the art of creative problem solving,
whether that means finding an unconventional solution to a difficult
problem or exploiting holes in sloppy programming. Many people call
themselves hackers, but few have the strong technical foundation needed
to really push the envelope.
Rather than merely showing how to
run existing exploits, author Jon Erickson explains how arcane hacking
techniques actually work. To share the art...
Friday, 4 October 2013
GTA Online update arriving to fix broken bits
You may have a better chance of playing Grand Theft Auto Online soon,
after developer Rockstar Games announced it aims to have updates ready
on Friday that fix the most common problems players have reported.
"The latest title update for GTA Online is live for
PlayStation 3. We're working to have this up for
Xbox 360 as soon as possible today," the game maker posted
on Friday morning. The massively successful GTA V, which raked in $900...
YouTube quitter offered job by Queen Latifah
"Sometimes I think you need to forcefully close one door, in order for the other one to open a little easier."
These are the words of Ludwig Wittgenstein, in a speech to a philosophical symposium in 1932.
Wait, no. They're actually the words of Marina Shifrin, the world-famous YouTube quitter, in conversation with Queen Latifah.
Unless you have been paralyzed by a government stoppage, you'll know that Shifrin became terribly famous by posting...
Apple appeals e-books conspiracy ruling
Apple has appealed a major federal court decision this summer that it
violated antitrust laws and conspired to fix e-book prices.
A "notice of appeal" document was filed by Apple attorney Orin Snyder
Thursday. The appeal includes the final judgment by Judge Denise Cote in
the Southern District of New York, as well as an injunction that
requires it to modify its agreements with book publishers and hire an
external monitor for two years.
In...
Underground Drugs Market website 'Silk Road' Founder Arrested by FBI

The FBI had seized a website called 'Silk Road', that was considered one of the most popular Underground places on the Internet for buying drugs and other illicit goods and services.
They arrested the site's alleged founder, Ross William Ulbricht, known as "Dread Pirate Roberts," in San Francisco, who reportedly had 26,000 Bitcoins worth $3.6 million.
The
FBI used information from Comcast in the investigation and...
FBI demands SSL Keys from Secure-Email provider Lavabit in Espionage probe

During the summer, The Secure email provider 'Lavabit' and preferred service for PRISM leaker Edward Snowden decided to shut down after 10 years to avoid being complicit in crimes against the American people.
The U.S. Government obtained a secret court order demanding private SSL
key from Lavabit, which would have allowed the FBI to wiretap the
service’s users, according to Wired.
Ladar Levison, 32, has spent ten years...
Yahoo is now offering up to $15,000 in bug bounty after policy review

Offering cash rewards for vulnerability reports has become something of a norm when it comes to big tech companies these days.
Yahoo has changed its bug bounty policies following a deluge of negative
feedback in the wake of the news that ethical hackers were rewarded with $12.50 in gift vouchers for security flaw discoveries.
The company unveiled a new program to reward reporters who shed light on
bugs and vulnerabilities classified...
Adobe Gets Hacked; Hackers Steal 2.9 million Adobe Customers accounts

Hackers broke into Adobe
Systems’ internal network on Thursday, stealing personal information on
2.9 million customers and the source code for several of Adobe’s most
popular products. This an absolutely massive blow to Adobe, especially
their reputation.
Adobe, which makes Photoshop and other programs, revealed that cyber attackers had access user information, including account IDs and encrypted passwords as well as credit...
Bitcoin Talk forum hacked; Database for Sale by Hacker; Website currently down

Bitcoin Talk, the popular Bitcoin discussion forum, has been hacked and as it stands the site is currently unreachable.
Bitcointalk has been down for nearly 6 hours. The forums have been allegedly hacked and Defaced by “The Hole Seekers” and selling 150,000 emails and hashed passwords stolen from Bitcointalk.org for 25 Bitcoins, where the passwords are hashed with sha256crypt.
Hacker embedded the “1812 Overture” song in the background...
13 Anonymous Members indicted and accused of participating in 'Operation Payback'

A U.S. Grand jury indicted and accused 13 members of the hacking group Anonymous for allegedly participating in the cyber attacks against a number of websites as an anti-copyright campaign called "Operation Payback"
Hackers took down the sites by inflicting a denial of service, or DDoS, attack, including those belonging to the Recording Industry Association of America, Visa and MasterCard.
The attacks were in retaliation for...
MineCraft 1.6.4 Cracked Online Server list

Instructions:
Make sure you read the ReadMe file first!
1. Download and install Minecraft.
2. Run the shortcut from the desktop or start menu.
3. Pick a username.(this is very important for multiplayer)
4. Enjoy the game in single player or multiplayer.(server list provided)
DOWNLOAD ...
Thursday, 3 October 2013
Unlock Root Pro 3.36

"Rooting" your device means obtaining
"superuser" rights and permissions to your Android's
applications."Rooting" your device means obtaining "superuser"
rights and permissions to your Android's applications."Rooting" your
device means obtaining "superuser" rights and permissions to your
Android's applications.
"Rooting" your device means obtaining "superuser" rights and permissions
to your Android's applications.
Support nexus 4/7 android...
Introduction to Hacking By InfiniteSkills (Module 1)
Introduction to Hacking
Click Below Topics To Download Videos
All video are in Uploaded in 720p
1.What you should expect from the video (5.07mb)
2.What is Hacking? (6.69mb)
3.Why do we Hack? (11.78mb)
4.Types Of Hacking (Ethical, Black Hat, Gray Hat, Hacktivism, Etc)(17.20mb)
5.Being Ethical (8.43mb)
6.Legal Issues around Hacking (17.33mb)
7.Methodology (14.44mb)
8.Types of Attacks (14.92mb)
9.Skills Necessary...
Monday, 30 September 2013
Counter Strike - Source Aimbot + Wallhack 2013

An aimbot is a type of computer game box used in first-person shooter games to provide varying levels of target acquisition
assistance to the player. It is sometimes incorporated as a feature of a
game (where it is usually called "auto-aim" or "aiming assist").
However, making the aim-bot more powerful in multiplayer games is considered cheating, as it gives the user an advantage over unaided players.
DOWNLOAD HE...
Sunday, 29 September 2013
Saturday, 28 September 2013
The C Programming Language ebook
The computing world has undergone a revolution since the publication of
the first edition of the C Programming Language. During this time, the C
language has changed and spread beyond its origins as the language of
the UNIX operating system. This second edition provides a more
comprehensive and contemporary definition of the C language as defined
by the ANSI standard_the "ANSI C". The most striking change relates to
the new form of function...
The Hacker's Underground Handbook
The information given in this underground handbook will put you into a
hacker's mindset and teach you all of the hacker's secret ways. The
Hacker's Underground Handbook is for the people out there that wish to
get into the the amazing field of hacking. It introduces you to many
topics like programming, Linux, password cracking, network hacking,
Windows hacking, wireless hacking, web hacking and malware. Each topic
is introduced with an...
Hacking Web Apps Ebook
How can an information security professional keep up
with all of the hacks, attacks, and exploits on the Web? One way is to
read Hacking Web Apps. The content for this book has been
selected by author Mike Shema to make sure that we are covering the most
vicious attacks out there. Not only does Mike let you in on the anatomy
of these attacks, but he also tells you how to get rid of these worms,
trojans, and botnets and how to defend against...
Subscribe to:
Posts (Atom)