Friday, May 3, 2013

Lot of hacking tutorial PDF's & Tools Download

HACKING TUTORIAL PDF'S

[   ]arp_spoofing_intro.pdf30-May-2005 19:08 29K
[   ]arp_spoofing_slides.pdf30-May-2005 19:08 124K
[   ]buffer_overruns.pdf30-May-2005 19:09 663K
[   ]cheating_chap.pdf30-May-2005 19:09 477K
[   ]cross-site_tracing.pdf30-May-2005 19:10 774K
[   ]crt_optical_tempest.pdf30-May-2005 19:10 400K
[   ]ddos_attacks_info.pdf30-May-2005 19:10 98K
[   ]etherleak_report.pdf30-May-2005 19:11 282K
[   ]fingerprint_scanners.pdf30-May-2005 19:13 1.2M
[   ]optical_tempest.pdf30-May-2005 19:12 346K
[   ]session_fixation.pdf30-May-2005 19:12 356K
[   ]ssh-timing.pdf30-May-2005 19:13 362K
[   ]wep_analysis.pdf30-May-2005 19:13 148K
[   ]wireless-ids.pdf30-May-2005 19:13 38K
[   ]wireless_auditing.pdf30-May-2005 19:13 113K
[   ]wlan_macspooof_detection.pdf30-May-2005 19:13 79K



[   ]arp_spoofing_intro.pdf30-May-2005 18:09 29K
[   ]arp_spoofing_slides.pdf30-May-2005 18:10 124K
[   ]atstake_etherleak_report.pdf30-May-2005 18:10 282K
[   ]atstake_gprs_security.pdf30-May-2005 18:10 132K
[   ]atstake_war_nibbling.pdf30-May-2005 18:12 668K
[   ]buffer_overruns.pdf30-May-2005 18:13 663K
[   ]cd_lifetime_study_nist.pdf30-May-2005 18:14 654K
[   ]cheating_chap.pdf30-May-2005 18:14 477K
[   ]coca-cola_evs2_programming.pdf30-May-2005 18:15 76K
[   ]ddos_attacks_info.pdf30-May-2005 18:15 98K
[   ]ddos_attacks_surviving.pdf30-May-2005 18:15 90K
[   ]defeating_encryption.pdf30-May-2005 18:16 491K
[   ]disclosure_helps_security.pdf30-May-2005 18:17 511K
[   ]disk_sanitization_practices.pdf30-May-2005 18:19 882K
[   ]dns_cache_snooping.pdf30-May-2005 18:17 127K
[   ]dos_via_algorithmic_complexity_attack.pdf30-May-2005 18:17 263K
[   ]encryption_flaws_no_risk.pdf30-May-2005 18:17 27K
[   ]ethereal_guide.pdf30-May-2005 18:26 2.5M
[   ]fbi_codis.pdf30-May-2005 18:26 2.5M
[   ]fiber_optic_taps.pdf30-May-2005 18:20 327K
[   ]finding_hidden_cameras.pdf30-May-2005 18:21 258K
[   ]forensic_guide_to_linux.pdf30-May-2005 18:31 2.7M
[   ]google_file_system.pdf30-May-2005 18:26 269K
[   ]hacking_coke_machines.pdf30-May-2005 18:26 8.0K
[   ]how_to_own_the_internet.pdf30-May-2005 18:27 313K
[   ]iis_security_countermeasures.pdf30-May-2005 18:39 4.3M
[   ]im_cultural_divide.pdf30-May-2005 18:29 704K
[   ]information_warfare_book.pdf30-May-2005 18:34 1.9M
[   ]internet_chatroom_surveillance.pdf30-May-2005 18:31 161K
[   ]intro_to_shellcoding.pdf30-May-2005 18:32 253K
[   ]ip_v5_cookbook.pdf30-May-2005 18:36 1.1M
[   ]lamo_charges.pdf30-May-2005 18:36 333K
[   ]layer2sniffing.pdf30-May-2005 18:36 121K
[   ]liberty_disappeared_from_cyberspace.pdf30-May-2005 18:37 174K
[   ]linux_userguide.pdf30-May-2005 18:48 4.5M
[   ]magstripe_interfacing.pdf30-May-2005 18:37 66K
[   ]md5_cryptographics_weakness.pdf30-May-2005 18:37 56K
[   ]microsoft_security_poster1.pdf30-May-2005 18:39 401K
[   ]microsoft_security_poster2.pdf30-May-2005 18:40 433K
[   ]microsoft_security_poster3.pdf30-May-2005 18:40 323K
[   ]mitm_bluetooth_attack.pdf30-May-2005 18:41 73K
[   ]msoffice_encryption_insecure.pdf30-May-2005 18:41 143K
[   ]ngs_passive_information_gathering.pdf30-May-2005 18:46 1.6M
[   ]nhtcu_computer_evidence_guide.pdf30-May-2005 18:43 431K
[   ]nist_info-sec.pdf30-May-2005 18:44 282K
[   ]nist_macosx_secuity_guide.pdf30-May-2005 18:51 3.1M
[   ]nist_pda_forensics.pdf30-May-2005 18:51 2.4M
[   ]nist_security_metrics_guide.pdf30-May-2005 18:49 569K
[   ]nist_voip_security.pdf30-May-2005 18:52 1.2M
[   ]nmap_host_discovery.pdf30-May-2005 18:51 110K
[   ]nsa_interview.pdf30-May-2005 18:51 87K
[   ]opensource_security_testing.pdf30-May-2005 18:56 2.1M
[   ]optical_tempest_crt.pdf30-May-2005 18:52 400K
[   ]optical_tempest_optical.pdf30-May-2005 18:52 374K
[   ]organisations_communication_structure.pdf30-May-2005 18:53 269K
[   ]owasp_guide.pdf30-May-2005 18:54 950K
[   ]paper_dtmf.pdf30-May-2005 18:53 185K
[   ]php_security.pdf30-May-2005 18:54 249K
[   ]physical_device_fingerprinting.pdf30-May-2005 19:13 9.9M
[   ]physical_security.pdf30-May-2005 18:55 529K
[   ]rfid_analysis.pdf30-May-2005 18:56 274K
[   ]safelocks_for_compscientist.pdf30-May-2005 19:01 2.6M
[   ]sanctuminc_http_attacks.pdf30-May-2005 18:56 159K
[   ]sans_attacking_dns_protocol.pdf30-May-2005 18:57 322K
[   ]securing_your_laptop.pdf30-May-2005 18:58 345K
[   ]security_first_responders_guide.pdf30-May-2005 19:00 874K
[   ]security_through_obscurity.pdf30-May-2005 19:00 64K
[   ]session_fixation.pdf30-May-2005 19:01 356K
[   ]sessionid_brute_force.pdf30-May-2005 19:01 483K
[   ]shatter_attack.pdf30-May-2005 19:01 179K
[   ]shatter_attack_redux.pdf30-May-2005 19:03 716K
[   ]skype_protocol.pdf30-May-2005 19:02 279K
[   ]snort_install_guide_fedora2.pdf30-May-2005 19:03 345K
[   ]ssh_timing_attack.pdf30-May-2005 19:04 362K
[   ]surveillance_nation1.pdf30-May-2005 19:04 755K
[   ]surveillance_nation2.pdf30-May-2005 19:05 513K
[   ]underground_book.pdf30-May-2005 19:07 1.2M
[   ]unix_rootkits_overview.pdf30-May-2005 19:06 403K
[   ]us_frequency_chart.pdf30-May-2005 19:07 102K
[   ]usdoj_forensics_guide.pdf30-May-2005 19:07 678K
[   ]wep_analysis.pdf30-May-2005 19:07 148K
[   ]wlan_ids.pdf30-May-2005 19:07 38K
[   ]wlan_macspooof_detection.pdf30-May-2005 19:07 79K
[   ]worm_propogation.pdf30-May-2005 19:08 254K
[   ]xss_anatomy.pdf30-May-2005 19:08 41K


PERL SCRIPTS
[TXT]anti_spam.txt30-May-2005 19:13 1.9K
[TXT]apache_log_view.txt30-May-2005 19:13 9.1K
[TXT]binary_conv.txt30-May-2005 19:13 2.1K
[TXT]cgi_honeypot.txt30-May-2005 19:13 1.7K
[   ]chat.zip30-May-2005 19:13 11K
[TXT]cmd_log.txt30-May-2005 19:13 45K
[TXT]console.pl30-May-2005 19:13 12K
[TXT]cron_comp.txt30-May-2005 19:13 7.2K
[TXT]downloader.txt30-May-2005 19:13 478
[TXT]envvars_show.txt30-May-2005 19:13 325
[TXT]file_downloader.txt30-May-2005 19:13 737
[TXT]govmilhits_php.txt30-May-2005 19:13 1.2K
[TXT]html_getter.txt30-May-2005 19:13 423
[TXT]ip_resolver.txt30-May-2005 19:13 5.3K
[TXT]irc_chat_bot.txt30-May-2005 19:13 7.0K
[TXT]irc_chat_bot_text.txt30-May-2005 19:13 3.6K
[TXT]md5hash_database.txt30-May-2005 19:13 9.8K
[TXT]messenger_interface.txt30-May-2005 19:13 4.9K
[TXT]net_send_ips.txt30-May-2005 19:13 1.0K
[TXT]pinger.txt30-May-2005 19:13 1.0K
[   ]random_avatar.zip30-May-2005 19:13 17K
[TXT]referer_set1.txt30-May-2005 19:13 292
[TXT]referer_set2.txt30-May-2005 19:14 3.1K
[TXT]referer_spam.txt30-May-2005 19:14 1.5K
[   ]remote_ftplcommand.zip30-May-2005 19:14 5.5K
[   ]rootboard.zip30-May-2005 19:14 38K
[TXT]shell.txt30-May-2005 19:14 5.5K

WIN32 TOOLS


[   ]cryptcat_v1.0.0.zip13-Mar-2006 18:11 116K
[   ]ettercap_v0.6.9.exe13-Mar-2006 18:16 2.2M
[   ]john_v1.6.zip13-Mar-2006 18:13 763K
[   ]netcat_v1.1.zip13-Mar-2006 18:13 94K
[   ]nmapwin_v1.3.1.exe13-Mar-2006 18:17 4.8M
[   ]spade_v1.14.exe13-Mar-2006 18:13 1.8M
[   ]windump_v3.8.exe13-Mar-2006 18:11 388K

Remove Tags In Clothes (Security Tag )

Security Tags

How it works
http://www.youtube.com/watch?v=mVfz3hLx4Tk

Sunday, April 28, 2013

How to view original facebook profile picture in actual size

1.Find Profile ID
Think you find any familiar image from "Find us on Facebook" ad-don via any website like bellow and it enable profile privacy and cannot recognize from small size image.


Then you can use google chrome or Firefox option call inspect elements to find
profile ID 

It will show link like as https://fbcdn-profile-a.akamaihd.net/hprofile-ak-prn1/387722_114462822005027_325743855_n.jpg

2.
Highlighted part is profile ID
3.Then go that profile using like this
4.https://www.facebook.com/profile.php?id=114462822005027
5.Then you get that profile page in Facebook
6.Use Inspect element tool in google chrome or Firefox find profile picture location 




It will like this :
https://fbcdn-profile-a.akamaihd.net/hprofile-ak-frc1/c41.41.518.518/s160x160/387722_114462822005027_325743855_n.jpg


7.Remove highlighted part (s160x160/) and press enter in your web browser.Thats all.you get the privacy enable profile picture in original size.

Eg:
https://fbcdn-profile-a.akamaihd.net/hprofile-ak-frc1/c41.41.518.518/387722_114462822005027_325743855_n.jpg


Sunday, April 21, 2013

How To Update Linux Kernel In Ubuntu - Manually

  1. You must download appropriate ubuntu kernel release from
    http://kernel.ubuntu.com/~kernel-ppa/mainline/  (in this case I am download 2.6.32 kernel version for update)
     
  2. Download this 3 file types (it will depend on your processor architecture - my one is Intel 32bit - then i am downloaded i386 file types)

    (your downloaded file must contain this names as file name)

    i.   linux-headers-??????????_all.deb
    ii.  linux-headers-??????????_i386.deb
    iii. linux-image-????????????_i386.deb

    Ex: (my downloaded files in order to above file naming criteria)

    linux-headers-2.6.32-020632_2.6.32-020632_all.deb
    linux-headers-2.6.32-020632-generic_2.6.32-020632_i386.deb
    linux-image-2.6.32-020632-generic_2.6.32-020632_i386.deb
     
  3. Open Ubuntu terminal window and install above files one by one.
    [** YOU MUST INSTALL THESE FILES AS GIVEN ORDERS BELOW**]
     
  4. These files are store relevant folder (I am store on desktop).then open terminal from that folder
    type in terminal these commands in highlighted with blue.
     
  5. FIRST you have root privilege to install programs 
    sudo -i  (for install program as root: after it will ask password and type it)

    if you log as root then console show like this:
    root@ubuntu:/home/username/Desktop/

    STEP 1 .Then install our first file like this:
    dpkg -i linux-headers-2.6.32-020632_2.6.32-020632_all.deb

    STEP 2 .There after install our second file like this:
    dpkg -i linux-headers-2.6.32-020632-generic_2.6.32-020632_i386.deb

    STEP 3 .Finally install our third file using this command

    dpkg -i linux-image-2.6.32-020632-generic_2.6.32-020632_i386.deb
     
  6. Reboot the machine.
     
  7. Type uname -a  and find updated kernel versions .
    Find Kernel version in linux -ubuntu
    Find kernel version

Thursday, March 21, 2013

Create First iPhone App

Your First iOS App introduces you to the Three T’s of iOS app development:
  • Tools. How to use Xcode to create and manage a project.
  • Technologies. How to create an app that responds to user input.
  • Techniques. How to take advantage of some of the fundamental design patterns that underlie all iOS app development.
After you complete all the steps in this tutorial, you’ll have an app that looks something like this:
image: ../Art/appSimulator.png
As you can see above, there are three main user interface elements in the app that you create:
  • A text field (in which the user enters information)
  • A label (in which the app displays information)
  • A button (which causes the app to display information in the label)
When you run the finished app, you click inside the text field to reveal the system-provided keyboard. After you use the keyboard to type your name, you dismiss it (by clicking its Done key) and then you click the Hello button to see the string “Hello, Your Name!“ in the label between the text field and the button.
To benefit from this tutorial, it helps to have some familiarity with the basics of computer programming in general and with object-oriented programming and the Objective-C language in particular.





To create the iOS app in this tutorial, you need Xcode 4.3 or later. Xcode is Apple’s integrated development environment (or IDE) for both iOS and Mac OS X development. When you install Xcode on your Mac, you also get the iOS SDK, which includes the programming interfaces of the iOS platform.


Create and Test a New Project

To get started developing your app, you create a new Xcode project.
1.Open Xcode (by default it’s in /Applications).
image: ../Art/project_chooser.jpg
If you’ve created or opened a project in Xcode before, you might see a project window instead of the Welcome to Xcode window.
2. In the Welcome to Xcode window, click “Create a new Xcode project” (or choose File > New > Project).
Xcode opens a new window and displays a dialog in which you can choose a template. Xcode includes several built-in app templates that you can use to develop common styles of iOS apps. For example, the Tabbed template creates an app that is similar to iTunes and the Master-Detail template creates an app that is similar to Mail.

image: ../Art/template_chooser.jpg
3. In the iOS section at the left side of the dialog, select Application.
4. In the main area of the dialog, select Single View Application and then click Next.
A new dialog appears that prompts you to name your app and choose additional options for your project.

image: ../Art/option_chooser_before.jpg


5. Fill in the Product Name, Company Identifier, and Class Prefix fields.
You can use the following values:
  • Product Name: HelloWorld
  • Company Identifier: Your company identifier, if you have one. If you don’t have a company identifier, you can use edu.self.
  • Class Prefix: HelloWorld



6. In the Device Family pop-up menu, make sure that iPhone is chosen.

7. Make sure that the Use Storyboards and Use Automatic Reference Counting options are selected and that the Include Unit Tests option is unselected.
8. Click Next.
Another dialog appears that allows you to specify where to save your project.
9. Specify a location for your project (leave the Source Control option unselected) and then click Create.
Xcode opens your new project in a window (called the work-space window), which should look similar to this:
image: ../Art/project_window.jpg
Take a few moments to familiarize yourself with the workspace window that Xcode opens for you. You’ll use the buttons and areas identified in the window below throughout the rest of this tutorial.
image: ../Art/workspace_window_callouts.png
If the utilities area in your workspace window is already open (as it is in the window shown above), you can close it for now because you won’t need it until later in the tutorial. The rightmost View button controls the utilities area; when the utilities area is visible, the button looks like this:


image: ../Art/utilites_button.jpg

If necessary, click the rightmost View button to close the utilities area.
Even though you haven’t yet written any code, you can build your app and run it in the Simulator app that is included in Xcode. As its name implies, Simulator allows you to get an idea of how your app would look and behave if it were running on an iOS-based device.
To run your app in Simulator
  1. Make sure that the Scheme pop-up menu in the Xcode toolbar has HelloWorld > iPhone 5.0 Simulator chosen.
    If the pop-up menu does not display that choice, open it and choose iPhone 5.0 Simulator from the menu.
  2. Click the Run button in the Xcode toolbar (or choose Product > Run).
    Xcode displays messages about the build process in the activity viewer, which is in the middle of the toolbar.
After Xcode finishes building your project, Simulator should start automatically (you might have to wait a few seconds for Simulator to appear on top of the workspace window). Because you specified an iPhone product (rather than an iPad product), Simulator displays a window that looks like an iPhone. On the simulated iPhone screen, Simulator opens your app, which should look like this:


image: ../Art/first_run.jpg
Source : developper.apple.com
Read more from : http://developer.apple.com/library/ios/#documentation/iphone/conceptual/iphone101/Articles/01_CreatingProject.html

Tuesday, March 5, 2013

Samsung SA100 Monitor Brightness Adjustment Tool




Adjust Monitor Brightness

You can download the program from the below links

Monitor Brightness Controller 1.2v (updated 08-03-2013)


Monitor Brightness
Type
Windows
Size
.exe
32-bit x86
213 KB
.7z
32-bit x86
14 KB

You can download the source code or preview online from 

 Source Mirror 1
 Source Mirror 2

Last Update 2013-03-06

if you are not windows 7 or vista user you must install Microsoft .net framework before run the program.

it can download bellow linkwww.microsoft.com/en-us/download/details.aspx?id=1639