<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-653482834696682667</id><updated>2025-12-03T14:49:20.358+05:30</updated><category term="Hacking"/><category term="Security"/><category term="Tool"/><category term="WebTrick"/><category term="Internet"/><category term="Web Browser"/><category term="System"/><category term="Web Hacking"/><category term="News"/><category term="windows feature"/><category term="Social Networking"/><category term="BackTrack Series"/><category term="IP Address"/><category term="Mobile"/><category term="Proxy"/><category term="Book"/><category term="virus"/><category term="AntiVirus"/><category term="Command Prompt"/><category term="Contest"/><category term="Cracking"/><category term="Gmail"/><category term="Keylogger"/><category term="YouTube"/><category term="Hacking Lab"/><category term="Wireless Hacking"/><category term="Batch Programming"/><category term="Hardware"/><category term="Javascript"/><category term="Malware"/><category term="Metasploit"/><category term="Network Security"/><category term="Phishing"/><category term="Video Tutorial"/><category term="Android"/><category term="Linux"/><category term="Media Player"/><category term="VPN"/><category term="openssl"/><category term="vulnerability"/><title type='text'>HACKARDE</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default?start-index=26&amp;max-results=25'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>232</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-7890633013237671349</id><published>2015-03-11T00:26:00.000+05:30</published><updated>2015-03-18T01:57:23.689+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="openssl"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability"/><title type='text'>FREAK ( Factoring RSA Export Keys) : Vulnerability Forces Weaker Encryption</title><summary type="text">






















&lt;!--[if gte mso 9]&gt;
 
  
 
&lt;![endif]--&gt;
&lt;!--[if gte mso 9]&gt;
 
  Normal
  0
  
  
  
  
  false
  false
  false
  
  EN-US
  X-NONE
  X-NONE
  
   
   
   
   
   
   
   
   
   
  
  
   
   
   
   
   
   
   
   
   
   
   
  
&lt;![endif]--&gt;According to Freak attack tracking website, the HTTPS
connection is vulnerable “If the server
accepts RSA_EXPORTS Cipher suites and </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/7890633013237671349/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2015/03/freak-factoring-rsa-export-keys.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/7890633013237671349'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/7890633013237671349'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2015/03/freak-factoring-rsa-export-keys.html' title='FREAK ( Factoring RSA Export Keys) : Vulnerability Forces Weaker Encryption'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRMuJJCVFDRNH95Dj0WMNugSproaQwLL036UFaR8t_71kxX8MmFP_J9IOyhIrpoc0Sy-4VBhp1OXhZ_FZy7Vp1ct5Cf_1s116Iq4SjkE5MnsCO4JBuqpEnljttT4dtAg2jKUPcokY7QV5z/s72-c/1.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-2718169150171743346</id><published>2014-11-27T01:41:00.000+05:30</published><updated>2014-11-27T01:41:14.076+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><title type='text'>CryptoWall Ransomware Malware - Introduction</title><summary type="text">





















&lt;!--[if gte mso 9]&gt;
 
  
 
&lt;![endif]--&gt;

&lt;!--[if gte mso 9]&gt;
 
  Normal
  0
  
  
  
  
  false
  false
  false
  
  EN-US
  X-NONE
  X-NONE
  
   
   
   
   
   
   
   
   
   
  
  
   
   
   
   
   
   
   
   
   
   
   
  
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;
 
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
</summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/2718169150171743346/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2014/11/cryptowall-ransomware-malware.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/2718169150171743346'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/2718169150171743346'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2014/11/cryptowall-ransomware-malware.html' title='CryptoWall Ransomware Malware - Introduction'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYg7bqzlb2gibdANtGGSpb7HnDNA3MjsXfq2Wxt-KUULKfX7XQSfPVnhdMM4aWVKKAV0YPIqUMw1VvgcUXw7lCX2Z5K9UH3AlnMlVAw7akbmGuIE1WctV0dNKTmraqsZjKy3tqF0V5Lo7x/s72-c/1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-2864824623804457215</id><published>2012-11-26T03:00:00.004+05:30</published><updated>2012-11-26T03:03:03.252+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>How To Secure Small Company Network By Cost View</title><summary type="text">



Today , many small companies not able to buy expensive
security devices like Firewall , so fault increase randomly in network
security. The main issues here, how to increase the network security in small
companies. I am going to giving you introduction about it, also tell you that
how can you increase your company security by only making some enhancement in
Router.

In this article , I am </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/2864824623804457215/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/11/how-to-secure-small-company-network-by.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/2864824623804457215'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/2864824623804457215'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/11/how-to-secure-small-company-network-by.html' title='How To Secure Small Company Network By Cost View'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkOlzVhT7CcjusIBZMJULHaRScfR-baN5Acdq6a5JEOmFabAiB2A5mjFd6Pa_Es6rvKWJDd7LkTjv07IqYhuRSlJsKQll-hen0CH8NKzjhWdeh9QZMbI9Bxh8j_b5RwuiBYiJ6KFGbA4oY/s72-c/1.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-4795255389399030613</id><published>2012-08-30T03:56:00.002+05:30</published><updated>2012-08-30T03:56:09.964+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="VPN"/><title type='text'>Make Virtual Private Network (VPN) Between Routers </title><summary type="text">

Hi friends, after a long period me again came with a very interesting thread in which me tell you How you can make your own VPN (Virtual Private Network) between your Home Router and Office Router.



For this me use Cisco 3700 router.&amp;nbsp;



Router R1 works as Home Router and R3 works as Office Router and between R1 and R3 we will use router R2 as Internet Router. You can see full diagram in</summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/4795255389399030613/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/08/make-virtual-private-network-vpn.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/4795255389399030613'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/4795255389399030613'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/08/make-virtual-private-network-vpn.html' title='Make Virtual Private Network (VPN) Between Routers '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTj_bk8JkBvSfORGtW_V6rls6uxKOU3C4QGhV1ckPsiHioUAB7qD3AUBvubYuEhZJCTxDIYMR0QTavOyBeagKaIpMuDpAm3ONJsNQbrKuNpv0WtIis9iQkCRKvSkvVKDHsGPKSJKzubde3/s72-c/VPN100.png" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-2677736752722202195</id><published>2012-06-23T10:54:00.000+05:30</published><updated>2012-06-23T10:54:10.056+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Tool"/><category scheme="http://www.blogger.com/atom/ns#" term="WebTrick"/><title type='text'>On-line Services To Decipher Passwords</title><summary type="text">





I am going to given you some link of online decipher password tool for different software. I hope that you will enjoy it...





Online DynDNS Password Decoder











Online Foxmail Password Decoder












Online IDM Password Decoder










Online IMVU Password Decoder










Online Meebo Password Decoder









Online Trillian Password Decoder











Online Base64 </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/2677736752722202195/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/06/on-line-services-to-decipher-passwords.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/2677736752722202195'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/2677736752722202195'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/06/on-line-services-to-decipher-passwords.html' title='On-line Services To Decipher Passwords'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheMR2TPX3jI6vnI60gJXUdIgjhdzMIA6JIb0VTQoyUjf3NhNoZLv-_eDijXwdhuQ0oxzz5nE6hVsdOp0Li7uaUt7va6-T7dOnbh0pNehKqJxQvDmNbXNZ0M6KYCiJjN56tXfpi4u-Y14Gi/s72-c/1.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-7661784442704418942</id><published>2012-06-18T16:23:00.000+05:30</published><updated>2012-06-18T16:23:07.853+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tool"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Hacking"/><title type='text'>On-line Website Scanner</title><summary type="text">



Hello friend today i am going to tell you about some on-line scanner tool which are helpful for you in case of web application security testing. I hope you like it and bookmark in your browser for future work done.



RFI SCANNER&amp;nbsp;





Whois Ping Port Scanner NSlookup &amp;amp; Traceroute





HASHBOOT





VNC SCANNER





SSH SCANNER





SSL ANALYZER&amp;nbsp;





RDP SCANNER





WEB </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/7661784442704418942/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/06/on-line-website-scanner.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/7661784442704418942'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/7661784442704418942'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/06/on-line-website-scanner.html' title='On-line Website Scanner'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-3920027294621983822</id><published>2012-06-16T01:32:00.000+05:30</published><updated>2012-06-16T01:51:54.966+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cracking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="System"/><title type='text'>Offline R00T Access in Linux</title><summary type="text">



Hello friend, today tutorial tell you how to root access in Linux. Use this thing when you forget your Linux password . It is possible but only then if there is no grub menu encrypted, if not we are able to have a root access. but WHAT IS GRUB MENU ?



GRUB or the GRand Unified Bootloader is the bootloader commonly installed by Linux distributions on your hard disk. GRUB is responsible for </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/3920027294621983822/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/06/offline-r00t-access-in-linux.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/3920027294621983822'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/3920027294621983822'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/06/offline-r00t-access-in-linux.html' title='Offline R00T Access in Linux'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiucppMIsRZeVsEkIgechNhMIRA511_vBH3Ihlz1KmlDyIn3ENRvxDuLIGJl1MxIwge_3xWTlQIfOcmZRRsKk-jZs7BOZlheNDjpz7djAPNYVM5T0GN6DKYy1CjLBCT-uAKueVNH4RE5EsM/s72-c/grub2.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-7058307054706046456</id><published>2012-06-14T13:12:00.002+05:30</published><updated>2012-06-14T13:12:34.894+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tool"/><title type='text'>[Tool] DarkComet RAT Remover</title><summary type="text">







DarkComet RAT Remover will detect any kind of instance of darkcomet running in memory even if an hacker try to obfuscate the loader to be undetected by common Antivirus softwares, also it detects registry threats and keyloggers logs.



1. Detect DarkComet Even if crypted.

2. Detect DarkComet Even if visualized.

3. Detect DarkComet Even if injected in a remote process.

4. Detect </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/7058307054706046456/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/06/tool-darkcomet-rat-remover.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/7058307054706046456'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/7058307054706046456'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/06/tool-darkcomet-rat-remover.html' title='[Tool] DarkComet RAT Remover'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6FO5WNMl_-eNXhNBYJf8XgSTiWfQEE7_HSlnVg9nd_9SAHvIPfyGcrwn83M9Upax8_uyD_lIoOJqOWjMi6M7P8HHElANUs5QRQIH6ZABSvnfKirYV0jGwcX3TcfU9gk2k5NUX9La2ArM2/s72-c/darkcomment.PNG" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-7704631698020163165</id><published>2012-06-10T15:30:00.001+05:30</published><updated>2012-06-10T15:30:22.281+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Web Hacking"/><title type='text'>The Beginners Guide to XSS</title><summary type="text">
Full Credit goes to MaXe for his amazing thread



___ -:: Introduction ::- ___

What is XSS and what does it refer to?
XSS aka Cross Site Scripting is a client-side attack where an attacker can craft a malicious link, containing script- code which is then executed within the victim&#39;s browser when the target site vulnerable to and injected with XSS is viewed. The script-code can be any language </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/7704631698020163165/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/06/beginners-guide-to-xss.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/7704631698020163165'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/7704631698020163165'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/06/beginners-guide-to-xss.html' title='The Beginners Guide to XSS'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-3399847960943896193</id><published>2012-06-07T00:06:00.001+05:30</published><updated>2012-06-07T00:06:35.499+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="BackTrack Series"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Metasploit"/><title type='text'>Hack Victim Windows OS based System by Exploit PDF file</title><summary type="text">



Hello friend now one again a more interesting post here on Windows OS based system hacking. I am happy because you like my old thread on same topic&amp;nbsp;http://www.hackarde.com/2012/04/hack-victim-windows-os-based-system-by.html&amp;nbsp;. But today post based on hack by exploit PDF File. So let start.



1. Open your Backtrack terminal and run command &quot; msfconsole &quot; for start Metasploit </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/3399847960943896193/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/06/hack-victim-windows-os-based-system-by.html#comment-form' title='13 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/3399847960943896193'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/3399847960943896193'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/06/hack-victim-windows-os-based-system-by.html' title='Hack Victim Windows OS based System by Exploit PDF file'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7rz4FCZHhlAJqmJj86IKc0MojcBOcyNgkk5JfCtVxNe_aCOP_ZqQ-ZTnCQVKlMPv5e6GJCA4p19rn4hX6ptPuUjyZNJ81SVDQTzPncvPGhKE3CxoJF62j63QuEW_fKxU8decodewBsRZ2/s72-c/pdf11.png" height="72" width="72"/><thr:total>13</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-8463997841124874623</id><published>2012-06-03T23:36:00.002+05:30</published><updated>2012-06-03T23:36:48.622+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="BackTrack Series"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Browser"/><title type='text'>How to install google chrome in Backtrack ?</title><summary type="text">



Hello friend now Ajai come again with new tutorial on backtrack. I am very happy because my Backtrack Tutorial series like by many viewer and also found a lot of mail about query on backtrack. Now come on our thread without spend time. Thread tittle show everything about tutorial.&amp;nbsp;



1. First open your Backtrack terminal and run command &quot;apt-get install chromium-browser&amp;nbsp;&quot; for </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/8463997841124874623/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/06/how-to-install-google-chrome-in.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/8463997841124874623'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/8463997841124874623'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/06/how-to-install-google-chrome-in.html' title='How to install google chrome in Backtrack ?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOHwnLCKHdTZoa6POUdP2o1EBS7vXYud0W-YuhMu73TelICFnPypu57WYg52NUSx8pc-HSybNeB18zcS4pegqQmkRMaisbNxJUP6CqBfyyWNIWnHPfFaaj00x-h7Lu4HE-GK42x5Mr4Zdx/s72-c/chrome21.png" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-7712622797291368420</id><published>2012-05-31T00:08:00.000+05:30</published><updated>2012-05-31T00:08:42.776+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="BackTrack Series"/><category scheme="http://www.blogger.com/atom/ns#" term="Gmail"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Hacking"/><title type='text'>How to Hack FaceBook,Gmail and yahoo ID by Backtrack Phishing?</title><summary type="text">

Hello guys ! Long time before i wrote a tutorial on same topic&amp;nbsp;http://www.hackarde.com/2012/03/hack-facebookgmailyahoo-and-twitter.html&amp;nbsp;which like by mostly people but some visitor mail me and said it was not working for that. I made a promise to C&#39;DUDE for make a new tutorial on same topic so now according to my promise i am come again with new trick.



First open your Backtrack </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/7712622797291368420/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/05/how-to-hack-facebookgmail-and-yahoo-id.html#comment-form' title='21 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/7712622797291368420'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/7712622797291368420'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/05/how-to-hack-facebookgmail-and-yahoo-id.html' title='How to Hack FaceBook,Gmail and yahoo ID by Backtrack Phishing?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgevGrfmMhsDJDwWkRB3QP-hzjmGuYyByNkt1WphDz0-BHIGCmPhIEfUQQVBFOuQfRq2jQOIi_EwLsbn-pJIVc5UuxKfmtAoSNdF-_XdpR1A3FqqJFTFfn466UQT7yRbr-M5uDWuNwhZLN/s72-c/fb21.png" height="72" width="72"/><thr:total>21</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-704485629000439402</id><published>2012-05-28T09:04:00.000+05:30</published><updated>2012-05-28T09:04:23.150+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="BackTrack Series"/><category scheme="http://www.blogger.com/atom/ns#" term="Metasploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="WebTrick"/><title type='text'>How to collect Website Email Address</title><summary type="text">





Now i am going to tell you how to collect all email address of any site. So for this open your metasploit framework or go to Backtrack 5 terminal and type &quot;msfconsole&quot; &amp;nbsp;by which Metasploit open , see below picture....













Now run command &quot;search gather&quot; for see command &quot;gather/search_email_collector&quot; , see below pic..












Now run command &quot;use gather/</summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/704485629000439402/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/05/how-to-collect-website-email-address.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/704485629000439402'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/704485629000439402'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/05/how-to-collect-website-email-address.html' title='How to collect Website Email Address'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDgvixVqJs0W59FChEVYYu74PM5nc7W9W_mIwiDTXdJaankDuAiEMQ6KWALWIVpPxygCSZMpbJQvSN2ynxzYegUlvYJG3YUBpwRNOy4Kv7vMykk3LJLRNQF-Ek2_i6sQBgD7KopmSiUVnM/s72-c/EmailC11.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-4031950438942644046</id><published>2012-05-24T16:45:00.000+05:30</published><updated>2012-05-24T16:45:06.816+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="IP Address"/><category scheme="http://www.blogger.com/atom/ns#" term="Proxy"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Browser"/><category scheme="http://www.blogger.com/atom/ns#" term="WebTrick"/><title type='text'>Anonymous With SSH Tunnel + TOR</title><summary type="text">



Hello Friends!! today i am come with one more tutorial. I thought you read my old post &amp;nbsp;Anonymous on Cyber Space &amp;nbsp;http://www.hackarde.com/2012/05/how-to-use-tor-in-windows-for-anonymous.html&amp;nbsp; today post enhance of my last post. Today i am going to teach you use TOR with SSH Tunnel and use it on your Website hacking activity.



First Download two tool from here and Install it :</summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/4031950438942644046/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/05/anonymous-with-ssh-tunnel-tor.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/4031950438942644046'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/4031950438942644046'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/05/anonymous-with-ssh-tunnel-tor.html' title='Anonymous With SSH Tunnel + TOR'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgD_2rWgNdzyDCG2Z433I8iAzHTOrOMfekVn4r1EFAecBC-3IkEAf7kie-LXIC_qdSOtGHiivsr0k517c7wd6GHC29Clga5gZqU-yTU6qw0aLG20Miw6hl0LdeT5BgipoKJjTVeNuTs8RF/s72-c/tor51.png" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-3067708471584199930</id><published>2012-05-20T02:50:00.000+05:30</published><updated>2012-05-20T02:50:32.615+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="IP Address"/><category scheme="http://www.blogger.com/atom/ns#" term="Proxy"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Browser"/><title type='text'>How to use TOR in Windows for Anonymous working</title><summary type="text">



Hello friends, me with my new tutorial. I know you think about why i have down in this month in write the new thread, so wanna tell you now this time i am busy with my project. Well now a g8t Anonymous Web Surfing post here, mostly i used this with SQL Injection attack.



When you use TOR then you connect with a network who&#39;s that totally anonymous and never trace by your ISP because it&#39;s </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/3067708471584199930/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/05/how-to-use-tor-in-windows-for-anonymous.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/3067708471584199930'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/3067708471584199930'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/05/how-to-use-tor-in-windows-for-anonymous.html' title='How to use TOR in Windows for Anonymous working'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0B7WvHxTXTcfWHA29PhE9Gm_0Djs-CwOn7VJ5q0mMBFjG9Mr_KvQGErhRfY9cMld6xYoqZWfoacDzrVqiOVO287ZM3hbaU-eE-5TXoi6Etmi3kYYu0bOxB6Hcqhv2hiKIW1E64hpBfoWM/s72-c/tor1.PNG" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-3018826205069501579</id><published>2012-05-13T03:32:00.000+05:30</published><updated>2012-05-14T11:37:03.281+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="BackTrack Series"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Lab"/><category scheme="http://www.blogger.com/atom/ns#" term="Tool"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Browser"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="WebTrick"/><title type='text'>Set Own Hacking Lab in Backtrack 5</title><summary type="text">



For Know more about hacking lab and also make own hacking lab in Windows OS read my old tutorial.....



http://www.hackarde.com/2012/03/design-your-own-web-hacking-lab-on.html




Now today i am going to telling you how to setup Hacking Lab in Linux or Backtrack OS.



Open your terminal and run below write command...







cd /var/www



sudo -s



wget wget http://voxel.dl.sourceforge.net</summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/3018826205069501579/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/05/set-own-hacking-lab-in-backtrack-5.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/3018826205069501579'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/3018826205069501579'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/05/set-own-hacking-lab-in-backtrack-5.html' title='Set Own Hacking Lab in Backtrack 5'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiPdVF-Ja3mDZPGsydcg06pUNMPzSyR56dRleLQFcrm5RdCQX1RmCbRVOib5I9M2D4iGNEUSUKMCps8E6WFbi3iUW5OAh9VOfpwWYl55xXynVY7RM2uxQKi8nz9aosQztqemREGKWkyCGa/s72-c/damm1.png" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-4310696989267462855</id><published>2012-05-08T22:43:00.001+05:30</published><updated>2012-05-08T22:43:22.506+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="IP Address"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tool"/><category scheme="http://www.blogger.com/atom/ns#" term="WebTrick"/><title type='text'>Block IP address range of Spies and Hacker</title><summary type="text">



Some times you face DDOS attacks by any IP or Range of IP so how to stop him (Spies and Hacker) by his IP.



Now guess you face attack from Australian Country IP range so how to stop him. Today tutorial telling you how to stop some IP.



I am going to use PeerBlock Tool for my purpose. For Download PeerBlock Click Here



And install that, after installation open PeerBlock it&#39;s look like </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/4310696989267462855/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/05/block-ip-address-range-of-spies-and.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/4310696989267462855'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/4310696989267462855'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/05/block-ip-address-range-of-spies-and.html' title='Block IP address range of Spies and Hacker'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUzJr-GUAB7efFsRJ_WK_iQIICUEbntx7uyz7hvmlMJBqZBQHF-ykaSOdMKzkHlRzFt6uTKtwlD9_5WI9xr0dyX687sHQ-VW0AtPrXLJhC3spiWAZ1E7V05Ux55EmY-WTo32Q4eiPjYegr/s72-c/21.PNG" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-1530258737124867574</id><published>2012-05-05T07:21:00.000+05:30</published><updated>2012-05-14T03:58:11.301+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>THIS TIME IT IS FOR REAL 6 JUNE 2012</title><summary type="text">





Major Internet service providers (ISPs), home networking equipment manufacturers, and web companies around the world are coming together to permanently enable IPv6 for their products and services by 6 June 2012.



Organized by the Internet Society, and building on the successful one-day World IPv6 Day event held on 8 June 2011, World IPv6 Launch represents a major milestone in the global </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/1530258737124867574/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/05/this-time-it-is-for-real-6-june-2012.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/1530258737124867574'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/1530258737124867574'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/05/this-time-it-is-for-real-6-june-2012.html' title='THIS TIME IT IS FOR REAL 6 JUNE 2012'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuo6q-gmdvcT7D3B8jTkgZq3MNV6XBkH6olAnMgISryf6xICi8WCLFe7Pt2dkOkjarv0Gu6Sak4T61HBiNKJRRZ_a__Oua6MIsvHuPH5Grj0BnT_EczonRd_oI3ZPAug0Kt1cMR15OmLCs/s72-c/IPv6.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-943432230449256641</id><published>2012-05-03T23:29:00.000+05:30</published><updated>2012-05-03T23:29:22.018+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="BackTrack Series"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Find Vulnerability in Joomla Website By BackTrack</title><summary type="text">



Hello Friends , Hackarde again come with new tutorial which makes you sharp against the Cyber Crime world of Internet. Today thread helpful for that person who works as a Website Developer and works on Joomla website Development technology. This thread also helpful for that person who&#39;s that want safe his Joomla Website.



This thread help you find Vulnerability or loop hole or Weakness on </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/943432230449256641/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/05/find-vulnerability-in-joomla-website-by.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/943432230449256641'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/943432230449256641'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/05/find-vulnerability-in-joomla-website-by.html' title='Find Vulnerability in Joomla Website By BackTrack'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNDCueLpn3xM5cLPsOkpl2ZrSvpyKL0jCZ-6AZZGp2JtyI4hj6XiUHQlSlOII5EMTeRj5qSKEZhLhR2gClwf6Lchp-zNSepQL8510yChMiQL5M6MQgRbI4zjgM2xG8NoUrLYgvHfvryZ3h/s72-c/11.png" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-11721672644238997</id><published>2012-04-25T01:21:00.001+05:30</published><updated>2012-04-26T22:21:02.103+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="System"/><title type='text'>Make Your Own Operating System In Some Minutes</title><summary type="text">





Hello Friend, Now i am again come with a new interesting topic , today High Quality Post based on Operating System. No No !! i am not going tell you about a new OS. My today post tell you how to make your own Operating System, Plz read again because i think that you think what i said in back line .



You think a g8t knowledge necessary for read forward but i say noop (no) because this OS </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/11721672644238997/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/04/make-your-own-operating-system-in-some.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/11721672644238997'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/11721672644238997'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/04/make-your-own-operating-system-in-some.html' title='Make Your Own Operating System In Some Minutes'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpVWPAykxvbsc3fqZeODplBO7aRjivcU5jN-m6G9y6-GvY8IsOsd6NssvKJcHiG6ErFaM6T91Sbl_W8O2Y9-TsPMlcDGmB7g1ldBprBTDfVwa4-GsVNNghsPIi9fACTBj0SZxE1aSxpwwq/s72-c/101.PNG" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-4040296690786215503</id><published>2012-04-20T16:34:00.001+05:30</published><updated>2012-04-20T16:34:41.097+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="AntiVirus"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>Removing General Viruses Including Autorun.inf</title><summary type="text">



Today Post tell you how to remove a general virus who&#39;s that also include Autorun.inf file. This tutorial made by The 7th Sage so total credit go to him.



I had also write some good post on removing the virus, i think you also like that so given you post link...



Remove Malware Before your AntiVirus



Remove Google Redirect Virus from your system





So let&#39;s start The present post.



</summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/4040296690786215503/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/04/removing-general-viruses-including.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/4040296690786215503'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/4040296690786215503'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/04/removing-general-viruses-including.html' title='Removing General Viruses Including Autorun.inf'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtGzW54N3zPYMpispi6Lk8MVCRG3j3baHmZJw687WGAZq4AL4Jup4fbs-7IV0dkSJfettKn8HYMW3Jt0tBBaBcissrkJ1GjZLs0_pe2ZOmfRLXLj6sSt9vIwoydjSUraiRfFtkqTdzN0Nb/s72-c/61.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-4090556950122480644</id><published>2012-04-18T15:41:00.000+05:30</published><updated>2012-04-18T23:54:48.501+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="BackTrack Series"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="IP Address"/><title type='text'>Use Address Resolution Protocol By BackTrack</title><summary type="text">



Now again a good Backtrack tutorial here. I want you read this tutorial carefully because i will used this tutorial on Future post.



Today i am telling you , how you can use &amp;nbsp;ARP &amp;nbsp;( Address Resolution Protocol ) in backtrack. For this object i am going to use ARPING tool of Backtrack 5 R1. First thing here , what is ARP ?



&amp;nbsp;The Address Resolution Protocol is a request and </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/4090556950122480644/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/04/use-address-resolution-protocol-by.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/4090556950122480644'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/4090556950122480644'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/04/use-address-resolution-protocol-by.html' title='Use Address Resolution Protocol By BackTrack'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0lugJpB_Jx6mL_1Kmp_A8l_oGQfB-k8CxymQ9NYyW-tN19cefC94d3LZfP-xwnyuGjOxCUFPMRBjJT8OhraS1NUdBzc1_z_LZPTlkpIkk5VVHu2x1qsH_O6eBTg6-g4t_WFIU2-YKD8Fc/s72-c/1.png" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-4343402350866541369</id><published>2012-04-15T01:24:00.000+05:30</published><updated>2012-04-15T01:24:33.879+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Proxy"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Browser"/><category scheme="http://www.blogger.com/atom/ns#" term="WebTrick"/><title type='text'>Toonel- Fast Internet and Anonymous Surfing</title><summary type="text">



After a long period i am again come on Fast internet topic with Anonymous Surfing (Proxy). Today i am telling you about a very nice tool which helpful for you on both above write topic . I think mostly new internet user never hear about it because further development of this multi-platform java-based application has been stopped since 2006.





toonel.net is a proxy server developed to save </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/4343402350866541369/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/04/toonel-fast-internet-and-anonymous.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/4343402350866541369'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/4343402350866541369'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/04/toonel-fast-internet-and-anonymous.html' title='Toonel- Fast Internet and Anonymous Surfing'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqygjqcaKpKUdQREurhIeszn7m_TbOTcLWf3iDght4n0KKurQPu60Q54xQYmGCJ7ZknaQgCU_dQe9aXse69vpBlS4sX5JB8z_U8HJf8zxPE5iMcarkHoQIkpGrWnCEwpMRuXTIw3Zsohc4/s72-c/101.PNG" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-2490657281140365624</id><published>2012-04-12T22:04:00.000+05:30</published><updated>2012-04-12T22:04:49.423+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="BackTrack Series"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Hacking"/><title type='text'>Kill TCP Session in Linux</title><summary type="text">





Hello friend , after some time i am again come with new thread. In this time, i am busy with my Project so sorry for wait. Today post topic based on killing TCP session in Linux. You can use this trick with any Linux Version OS , here i am use backtrack for showing you.



Step 1: First open your Linux Terminal , now i am going to install &quot;ngrep&quot; application for killing session. For install</summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/2490657281140365624/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/04/kill-tcp-session-in-linux.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/2490657281140365624'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/2490657281140365624'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/04/kill-tcp-session-in-linux.html' title='Kill TCP Session in Linux'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqNHyMpR5kt8m6nhQmb2sX9xAN9oNA_1j5czyGVgIOh7YZd4YqXTPueclGfGizTR4sReJ2TGwDGcdnGoMg4qjjaeoB_Ewcgwe1Nt8VjWfivzD6YtYPBFz_tw7Al17_5L24NRfhBQBhdQB_/s72-c/a.PNG" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-653482834696682667.post-6573350204661987813</id><published>2012-04-09T00:32:00.000+05:30</published><updated>2012-04-09T00:32:05.599+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="System"/><category scheme="http://www.blogger.com/atom/ns#" term="windows feature"/><title type='text'>IP Forwarding - How to make Windows XP as a Router</title><summary type="text">







Do you aware that enabling IP forwarding using Windows XP Professional will make it as a simple router, so that you can have 2-3 different networks at home and those computers manage to talk to each other from different network. The router is needed to send/receive the traffic from one network to another network or access Internet. The benefit is you don’t have to buy additional router </summary><link rel='replies' type='application/atom+xml' href='http://hackarde.blogspot.com/feeds/6573350204661987813/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackarde.blogspot.com/2012/04/ip-forwarding-how-to-make-windows-xp-as.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/6573350204661987813'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/653482834696682667/posts/default/6573350204661987813'/><link rel='alternate' type='text/html' href='http://hackarde.blogspot.com/2012/04/ip-forwarding-how-to-make-windows-xp-as.html' title='IP Forwarding - How to make Windows XP as a Router'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/03053993544155340569</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzVeR4o42bP4KJeY9S-lUTkhqUKPAGOO2oiI4s_sqlMvPjvP_ICTnZhIDFmY1mO35nh2s6SMB_lwrxL9Mz-hgQxV3oZJ3ejX-e8Y24uaZr-PJURASkuZkFwsacU7i8ImjLjySjjuL0IUE0/s72-c/21.jpg" height="72" width="72"/><thr:total>2</thr:total></entry></feed>