Minggu, 18 November 2012

1 Characteristics of Women Fall In Love

Perhaps no one knows when and how she fell in love because sometimes it is very difficult to predict. But basically, there are some changes that happen to us when we really fell in love.

Consider the following characteristics and note. Are you really being hit by falling in love or not.

0 Characteristics and Signs Women Lust The sex High


Who would not be fond of sex? Want a girl or a guy all hooked definitely sex. This is reasonable, because the man had a passion, a gift from the creator, not just those who might not normally have the appetite.

    
But when asked what the heck is a maniac girl very same thing as sex, aka high sexual appetite, this jawabannnya.

0 These characteristics Female Sex Maniac


LENSAINDONESIA.COM: Women who love to satisfy her partner was not necessarily he can also enjoy the sex itself. Sometimes, women are only good at satisfying their partner, while he was not satisfied at all.However, there are also women who easily satisfy her in sex. These characteristics of women who enjoy sex or hiperseks:

0 Critical Strike (CS) Portable | 2012

Certainly familiar with his buddy infoteknomedia game Counter Strike? well this time I will share the game that can be said is similar to Counter Strike, the Critical Strike (CS) Portable. Game Critical Strike (CS) Portable is cross platform, so you can play with the android users, iOS, PC and the web version.

Cross-platform itself that according to wikipedia is a term in information technology on a software (software) that can be used in several different operating systems (Microsoft Windows, Linux, Mac OS, BSD, etc.). Generally, the software has the ability to cross-platform is a free software.

0 portable game collection

Portable Crazy Taxi

1 Naruto Ultimate Ninja 3 Mugen

Screenshoot :

1 download game kungfu panda full

0 Download pes 2012 full version with serial

pes 2012

0 PC GAME | Oral Sex Tsunade Hentai Full Free

PC GAME | Tsunade Hentai Full Free Oral Sex - It's never heard of naruto right? well this time to pass requests from loyal visitors of this blog, I share games adult / porn / sex of one of the figures that would have been familiar to you naruto mania. Tsunade:-D Hehe it seems odd that so wakaka ngshare game .. This game is a flash game, so it was not like the game to play pc games usually. You can use adobe, macromedia or SWF player that I include in artike this time to play this flash game.

0 Subtitle Indonesia Naruto All Episodes

Naruto Subtitle Indonesia All Episode
Because many friends of the request aspirasisoft little Naruto subtitle Indonesia, although eventually I would meet not 100%. Naruto is time I share is anime Naruto Shippuden Naruto before. Naruto totaled 220 episodes and not all Indonesian subtitle. So be patient, enjoy its existing link.
 





Previously I thank the uploader and creator hardsub and softsub:

1 PES 2013 FREE DOWNLOAD FULL VERSION LATEST UPDATE

FREE DOWNLOAD PES 2013 TERBARU UPDATE FULL VERSION

LINK UPDATE 

0 + How to easily and quickly Hack Wifi Hotspot dipassword

You want more funds ngenet but mediocre? Want to surf internet but trouble figuring out the wifi password? Well maybe this tutorial can allow you to get a connection via wifi is available in your location, so you can enjoy the free wifi.

How to hack wifi password is derived from a simple tool that will help us find nearby wifi networks, as well as tell you what password to use. This way you do not need to get confused just move where to look for free internet.

0 Tutorial: How to hack someone by knowing his IP


Hi guys. First of all, I want to say that I didn't make this tutorial myself, I found it on Hacking Library
If it's not authorized to post this kinda tutorials here, or if it has already been post, then I'm sorry to say useless things : )
the tutorial looks like that :

Sabtu, 17 November 2012

0 What is hacking? Introduction to Hacking

1.originally, someone who makes furniture with an axe1. A person who enjoys exploring the details of programmable systems
and how to stretch their capabilities, as opposed to most users,
who prefer to learn only the minimum necessary.

2. One whoprograms enthusiastically (even obsessively) or who enjoys programming
rather than just theorizing about programming.

1 Basic Mission Tutorial 1-10

Basic Web Hacking Challenges 1-10: Tutorial

Introduction:

This is my first Article/Tutorial so hopefully it is pretty good and that it is able to help those out who are in need and who want to become better Hackers.
This is meant as a Tutorial to help you learn what you should know for the different Basic Web Hacking Challenges and a guide to help you along.
It does not give you answers or tell you exactly what to do, it just helps lead you in the right direction with a little help and advice.
Please give me some feedback about what you think about it and what I could do to improve it.
-> DoS-man

1 Developers Needed For HackThisSite v6


Incomplete projects are a staple of HackThisSite, and the best solution to this problem is to create more projects to never get completed! First with v4, the project ran stagnate for over four years until it was finally scrapped. Then v5 happened, and went through a series of transitions and rewrites, and is still (not) going strong after 3+ years of work. So rather than waste more time on wasted time, what better idea is there than to start fresh, again?

With v6, we plan on writing everything in as many languages as we can muster, to keep people from getting bored and to keep future developers from being able to maintain it! The expected languages include Ruby, Perl, Python, PHP,
Java, node.js, C, C++, C--, C+-, C#, Visual Basic 6, Lisp, Lua, Ada, x86 Assembly, Prolog, Fortran, Cobol, Herp-a-Derp, Brainfuck, and any other languages people can throw at us. We need developers who aren't afraid to never complete a project, not meet deadlines, and fail to deliver on promises.

1 DNS poisoning via Port Exhaustion

Today we are releasing a very interesting whitepaper which describes a DNS poisoning attack against stub resolvers.
It discloses two vulnerabilities:
  1. A vulnerability in Java (CVE-2011-3552, CVE-2010-4448) which enables remote DNS poisoning using Java applets. This vulnerability can be triggered when opening a malicious webpage. A successful exploitation of this vulnerability may lead to disclosure and manipulation of cookies and web pages, disclosure of NTLM credentials and clipboard data of the logged-on user, and even firewall bypass.
  2. A vulnerability in multiuser Windows environments which enables local DNS cache poisoning of arbitrary domains. This  vulnerability can be triggered by a normal user (i.e. one with non-administrative rights) in order to attack other users of the system. A successful exploitation of this vulnerability may lead to information disclosure, privilege escalation, universal XSS and more.

Jumat, 16 November 2012

0 Neil Armstrong dies


Cincinnati - legendary U.S. astronaut who was the first man to land on the moon, Neil Armstrong, has died at the age of 82 due to heart disease, early Sunday morning hrs. Beginning this August he underwent surgery to expedite the blocked coronary arteries.

»We are very sorry to break the news that Neil Armstrong had died following complications from cardiovascular procedures," the official statement of the Armstrong family.

0 Tutorial: How to Crack WPA/WPA2

This tutorial walks you through cracking WPA/WPA2 networks which use pre-shared keys. I recommend you do some background reading to better understand what WPA/WPA2 is. The Wiki links page has a WPA/WPA2 section. The best document describing WPA is Wi-Fi Security - WEP, WPA and WPA2. This is the link to download the PDF directly. The WPA Packet Capture Explained tutorial is a companion to this tutorial.

0 The basics of installing Backtrack 5R2 for the purposes of secure remote access.

So you are finally realizing how far behind the times you are and want to experiment with Backtrack. Better late than never :) With the new release of Backtrack 5 R2, they have not included a VMware image like in previous versions. So you have either two options, boot in live mode and lose changes and settings upon each boot-up cycle, or you can install backtrack to a partition on your machine. Now both have their pros and cons like everything else in the world, however this article is to help those out there who are opting to install to a partition. This is a great option if you want to have a Backtrack box always up and waiting to wreak network havoc with a remote install of backtrack that you can always connect to. I have a Backtrack box up that I access remotely if I want to do some testing and don’t want to boot up an image and go through all the hassle of setting the entire thing up, I just SSH into the box and do what I need to do. This article is help you securely setup your Backtrack box so that it can be accessed remotely from any computer that sits on the same subnet.

1 Cyber criminals are mass producing attack techniques, says Verizon

A recent post on The Inquirer had me facepalming pretty hard. According to Verizon cyber criminals are focusing on attacking small and medium sized businesses using automated scripts that exploit vulnerabilities in the same exact way every time. No shit, sherlock…
Using automated “scan & pwn” styled scripts is nothing new; people have been using them since the dawn of friggen time. It started with just supplying google dorks with your vulnerabilities and led to completely automated tools such as Mass Defacers and the like. Currently we have tools such as Metasploit which interface with nmap scans to help automate the attacking of network services and even some of the more popular web applications. Why then is Verizon acting like this is something new when these are the same exact attacks we have been seeing for years? Is Verizon behind the times? The recent infographic released by Verizon (link here: https://s3.amazonaws.com/infographics/Worst-IT-Security-Breaches-800.png ) was supposed to give insight into the attacks Verizon was recently seeing. After reading this post about Verizon just catching up with the “scan & pwn” styled attacks makes me wonder just how skewed this infographic really is and if it is even a reputable source.

1 Hacking Facebook ,Gmail account using Backtrack and SET

Hello, friends i am back with a latest post on hacking facebook,gmail accounts using backtrack and social engineering kit.Things you needed are following:---> 1. Backtrack 5 R2 2. Internet connection 3. A brain Now follow all my steps like i am showing in this post:----->



1. First open the social engineering kit using this command in cd /pentest/exploits/set and then press enter and then type ./set and hit enter like in image.

2. Now type 1 to select Social-Engineering Attacks and hit enter as in image.


3. Now type 2 to select Website Attack Vectors and hit enter as in image.
 
4. Now type 4 to select Tabnabbing Attack Method and hit enter.


5. Now type 2 to select Site Cloner and hit enter.


6. Now enter the site address whom which you want to create fake pages.


7. Now ti will start cloning the site. 8. Now send ur ip address as a link to victim.


9. Now when victim click on it he/she get the fake page and when he fill the details he will got hacked. Note : its for educational purpose.
 

Cracker Copyright © 2011 - |- Template created by O Pregador - |- Powered by Blogger Templates