<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-939522308368542738</atom:id><lastBuildDate>Sat, 14 Sep 2024 10:53:16 +0000</lastBuildDate><title>LEARN ETHICAL HACKING group of best articles avaliable on the net</title><description></description><link>http://learn-ethical-hacking.blogspot.com/</link><managingEditor>noreply@blogger.com (therightguy)</managingEditor><generator>Blogger</generator><openSearch:totalResults>11</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-939522308368542738.post-4673839706949497061</guid><pubDate>Thu, 31 Jul 2008 20:52:00 +0000</pubDate><atom:updated>2008-07-31T13:56:30.718-07:00</atom:updated><title>REDUCE FIREFOX RAM USAGE</title><description>If you were having less than 512mb ram then you must always be wondering why firefox uses such a large amount of RAM. Well to limit firefox to it&#39;s RAM usage you can do the following trick:&lt;br /&gt;&lt;br /&gt;Type&lt;span style=&quot;font-weight: bold;&quot;&gt; about:config&lt;/span&gt; in the address bar&lt;br /&gt;Now do the following:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;In the Filter text box, at the top of the page, type &lt;b&gt;browser.cache&lt;/b&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Double-click the &quot;browser.cache.memory.capacity&quot; entry.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;The default is 50000. If you don&#39;t have a lot of memory on your system, for example, between 512MB and 1GB, change the number to 15000 and click OK.&lt;/li&gt;&lt;/ol&gt;And know you can easily run any other application with firefox.</description><link>http://learn-ethical-hacking.blogspot.com/2008/07/reduce-firefox-ram-usage.html</link><author>noreply@blogger.com (therightguy)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-939522308368542738.post-7588553964187685902</guid><pubDate>Thu, 31 Jul 2008 20:49:00 +0000</pubDate><atom:updated>2008-07-31T13:50:33.223-07:00</atom:updated><title>FASTEN UP FIREFOX BY 20%</title><description>&lt;span style=&quot;font-weight: bold; color: rgb(255, 0, 0);&quot;&gt;FASTEN UP FIREFOX:&lt;/span&gt;&lt;br /&gt;This trick will teach you to fasten up firefox to it&#39;s full limits(even on a Broadband connection)&lt;br /&gt;firstly go to&lt;span style=&quot;font-weight: bold;&quot;&gt; about:config&lt;/span&gt; as told before&lt;br /&gt;search for the following keywords and set them by clicking on them&lt;br /&gt;&lt;br /&gt;Scroll down the page and find this entry and set it.&lt;br /&gt;&lt;br /&gt;Set &quot;network.http.pipelining&quot; to &quot;true&quot;&lt;br /&gt;&lt;br /&gt;Set &quot;network.http.proxy.pipelining&quot; to &quot;true&quot;&lt;br /&gt;&lt;br /&gt;Set &quot;network.http.pipelining.maxrequests&quot; to some number like 30. This means it will make 30 requests at once.&lt;br /&gt;&lt;br /&gt;Lastly right-click anywhere and select New-&gt; Integer. Name it &quot;nglayout.initialpaint.delay&quot; and set its value to &quot;0&quot;. This value is the amount of time the browser waits before it acts on information it receives.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;</description><link>http://learn-ethical-hacking.blogspot.com/2008/07/fasten-up-firefox-by-20.html</link><author>noreply@blogger.com (therightguy)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-939522308368542738.post-1826112305499754230</guid><pubDate>Thu, 31 Jul 2008 20:23:00 +0000</pubDate><atom:updated>2008-07-31T13:49:40.032-07:00</atom:updated><title>FIREFOX HACKING about:config</title><description>HOPE you must be using Firefox to browse the web. If not so then co and get it now(you will find the link above)&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0); font-weight: bold;&quot;&gt;HACK:1&lt;/span&gt; TYPE about:MOZILLA IN THE ADDRESS BAR&lt;br /&gt;           You will find a short powm by mozilla&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 102, 102); font-weight: bold;&quot;&gt;HACK:2 &lt;/span&gt;TYPE about:config&lt;br /&gt;           You will find the config page of firefox&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 102);&quot;&gt;HACK:3&lt;/span&gt; TYPE&lt;b&gt;chrome://browser/content/browser.xul&lt;br /&gt;           AND YOU GET FIREFOX BROWSER INSIDE A FIREFOX BROWSER&lt;br /&gt;&lt;br /&gt;&lt;/b&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9eY1rtU_ZaO6S_sg3DMzvPd8NeyCjTUrrOar6DaYMQT08YKMkgSp3QULemOdMY0esUkdGmqaQQI-JIgRKmSCk5kFFr4HmJFvRKMp_EC2Cj7eY4iTgh85sWs6o0xOtlUxo9ApG3dxNT0c/s1600-h/FIREFOX.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9eY1rtU_ZaO6S_sg3DMzvPd8NeyCjTUrrOar6DaYMQT08YKMkgSp3QULemOdMY0esUkdGmqaQQI-JIgRKmSCk5kFFr4HmJFvRKMp_EC2Cj7eY4iTgh85sWs6o0xOtlUxo9ApG3dxNT0c/s400/FIREFOX.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5229279038113134050&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;FOR A LARGER SCREENSHOT CLICK ON IMAGE&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;</description><link>http://learn-ethical-hacking.blogspot.com/2008/07/firefox-hacking-aboutconfig.html</link><author>noreply@blogger.com (therightguy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9eY1rtU_ZaO6S_sg3DMzvPd8NeyCjTUrrOar6DaYMQT08YKMkgSp3QULemOdMY0esUkdGmqaQQI-JIgRKmSCk5kFFr4HmJFvRKMp_EC2Cj7eY4iTgh85sWs6o0xOtlUxo9ApG3dxNT0c/s72-c/FIREFOX.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-939522308368542738.post-412446483092796045</guid><pubDate>Thu, 31 Jul 2008 20:16:00 +0000</pubDate><atom:updated>2008-07-31T13:22:22.948-07:00</atom:updated><title>Invisible side of a web site-See what web sites hide from you</title><description>You may know that every website has a fill called robots.txt in it&#39;s root. This file allows or disallows the search engines to report that results to you that the website owner don&#39;t want to tell you about. BUT do you know that still you can view these results by typing &lt;span style=&quot;font-weight: bold;&quot;&gt;/robots.txt&lt;/span&gt; after the website address.&lt;br /&gt;for ex. if you want to know what Microsoft hides from you just type www.microsoft.com/robots.txt and you will find the list of directories that bill gates want to hide from you.</description><link>http://learn-ethical-hacking.blogspot.com/2008/07/forbidden-side-of-web-site-see-what-web.html</link><author>noreply@blogger.com (therightguy)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-939522308368542738.post-4843141138610120599</guid><pubDate>Thu, 31 Jul 2008 20:08:00 +0000</pubDate><atom:updated>2008-07-31T13:09:30.161-07:00</atom:updated><title>THE BEST SITE FOR HACKING</title><description>THE BEST SITE FOR LEARNING HACKING IS http://www.hackthissite.org/ BUT THE PROBLEM IS THAT THIS SITE REMAINS 50% OFFLINE. YOU MIGHT BE LUCKY ENOUGH TO GET INTO IT.</description><link>http://learn-ethical-hacking.blogspot.com/2008/07/best-site-for-hacking.html</link><author>noreply@blogger.com (therightguy)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-939522308368542738.post-7501939947524029882</guid><pubDate>Thu, 31 Jul 2008 19:58:00 +0000</pubDate><atom:updated>2008-07-31T13:01:20.163-07:00</atom:updated><title>Google Algorithm Exposed : SearchToons</title><description>The Google Algorithmic manner of ranking and serving relevant online and indexed documents to specific Google queries has been a mystery to many over the past decade, with search marketers and mathematicians working to expose the way Google ranks sites.&lt;br /&gt;&lt;br /&gt;Here we look at two disciplines of figuring out the workings behind Google, and two concise calculations.&lt;br /&gt;&lt;code&gt;&lt;a href=&quot;http://www.searchenginejournal.com/&quot;&gt;&lt;img src=&quot;http://www.searchenginejournal.com/GoogleAlgo1.jpg&quot; /&gt;&lt;/a&gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;code&gt;&lt;a href=&quot;http://www.searchenginejournal.com/&quot;&gt;&lt;img src=&quot;http://www.searchenginejournal.com/GoogleAlgo2.jpg&quot; /&gt;&lt;/a&gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;artcile source:www.searchenginejournal.com</description><link>http://learn-ethical-hacking.blogspot.com/2008/07/google-algorithm-exposed-searchtoons.html</link><author>noreply@blogger.com (therightguy)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-939522308368542738.post-6236793409965920949</guid><pubDate>Thu, 31 Jul 2008 19:46:00 +0000</pubDate><atom:updated>2008-07-31T12:49:24.891-07:00</atom:updated><title>REMOVE WINDOWS LOGIN SCREEN</title><description>&lt;p&gt;Now if you want to boot up XP faster then why not remove the bootup screen.&lt;/p&gt;&lt;p&gt;Just do this&lt;/p&gt;&lt;p&gt;Click on your Start Button&lt;br /&gt;Click on the Run&lt;br /&gt;In the browser box, type: MSCONFIG&lt;br /&gt;Click OK&lt;br /&gt;Click the BOOT.INI tab&lt;br /&gt;Check the /NOGUIBOOT box&lt;br /&gt;Click Apply, then OK&lt;br /&gt;When it asks you to restart, please do so. &lt;/p&gt;  &lt;p&gt;And now no more Windows XP splash screen.&lt;/p&gt;</description><link>http://learn-ethical-hacking.blogspot.com/2008/07/remove-windows-login-screen.html</link><author>noreply@blogger.com (therightguy)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-939522308368542738.post-4375859353853128405</guid><pubDate>Thu, 31 Jul 2008 19:40:00 +0000</pubDate><atom:updated>2008-07-31T12:43:41.915-07:00</atom:updated><title>HACK WINDOWS XP ADMIN PASSWORD</title><description>Well you might be unable to get the admin password but you can surely reset it to your liking.&lt;br /&gt;follow these steps.&lt;br /&gt;&lt;br /&gt;Log in and go to your DOS command prompt and enter these commands exactly:&lt;br /&gt;&lt;br /&gt;cd\&lt;br /&gt;cd\windows\system32&lt;br /&gt;mkdir xphack&lt;br /&gt;copy logon.scr xphack\logon.scr&lt;br /&gt;copy cmd.exe xphack\cmd.exe&lt;br /&gt;del logon.scr&lt;br /&gt;rename cmd.exe logon.scr&lt;br /&gt;exit&lt;br /&gt;&lt;br /&gt;So what you just told windows to backup is the command program and the screen saver file. Then you edited the settings so when windows loads the screen saver, you will get an unprotected dos prompt without logging in. When this appears enter this command that’s in parenthesis (net user password). So if the admin user name is ouradmin and you want the password 1234 then you would enter “net user ouradmin 1234″ and now you’ve changed the admin password to 1234. Log in, do what you want to do, copy the contents of xphack back into system32 to cover your tracks</description><link>http://learn-ethical-hacking.blogspot.com/2008/07/hack-windows-xp-admin-password.html</link><author>noreply@blogger.com (therightguy)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-939522308368542738.post-9214621042828717347</guid><pubDate>Thu, 31 Jul 2008 19:15:00 +0000</pubDate><atom:updated>2008-07-31T12:17:01.725-07:00</atom:updated><title>How to learn to hack in easy steps</title><description>Let&#39;s start&lt;br /&gt;~~~~~~~~~~~&lt;br /&gt;&lt;br /&gt;If you read carefully all what i&#39;m telling here, you are smart and you work hard on it,&lt;br /&gt;you&#39;ll be able to hack. i promise. That doesn&#39;t really make you a hacker (but you&#39;re on the way).&lt;br /&gt;A hacker is someone who is able to discover unknown vulnerabilities in software and able to&lt;br /&gt;write the proper codes to exploit them.&lt;br /&gt;&lt;br /&gt;NOTE: If you&#39;ve been unlucky, and before you found this document, you&#39;ve readen the&lt;br /&gt;guides to (mostly) harmless hacking, then forget everything you think you&#39;ve learnt from them.&lt;br /&gt;You won&#39;t understand some things from my tutorial until you unpoison your brain.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Some definitions&lt;br /&gt;~~~~~~~~~~~~~~~~&lt;br /&gt;&lt;br /&gt;I&#39;m going to refer to every kind of computer as a box, and only as a box.&lt;br /&gt;This includes your PC, any server, supercomputers, nuclear silos, HAL9000,&lt;br /&gt;Michael Knight&#39;s car, The Matrix, etc.&lt;br /&gt;&lt;br /&gt;The systems we&#39;re going to hack (with permission) are plenty of normal users, whose&lt;br /&gt;don&#39;t have any remote idea about security, and the root. The root user is called&lt;br /&gt;superuser and is used by the admin to administer the system.&lt;br /&gt;&lt;br /&gt;I&#39;m going to refer to the users of a system as lusers. Logically, I&#39;ll refer to&lt;br /&gt;the admin as superluser.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Operating Systems&lt;br /&gt;~~~~~~~~~~~~~~~~~&lt;br /&gt;&lt;br /&gt;Ok, I assume you own a x86 box (this means an intel processor or compatible) running windoze9x,&lt;br /&gt;or perhaps a mac (motorola) box running macOS.&lt;br /&gt;&lt;br /&gt;You can&#39;t hack with that. In order to hack, you&#39;ll need one of those UNIX derived operating&lt;br /&gt;systems.&lt;br /&gt;This is for two main reasons:&lt;br /&gt;&lt;br /&gt;-the internet is full of UNIX boxes (windoze NT boxes are really few) running webservers and&lt;br /&gt;so on. to hack one of them, you need a minimun knowledge of a UNIX system, and what&#39;s better&lt;br /&gt;than running it at home?&lt;br /&gt;&lt;br /&gt;-all the good hacking tools and exploit codes are for UNIX. You won&#39;t be able to use them unless&lt;br /&gt;you&#39;re running some kind of it.&lt;br /&gt;&lt;br /&gt;Let&#39;s see where to find the unix you&#39;re interested on.&lt;br /&gt;&lt;br /&gt;The UNIX systems may be divided in two main groups:&lt;br /&gt;&lt;br /&gt;- commercial UNIXes&lt;br /&gt;- free opensource UNIXes&lt;br /&gt;&lt;br /&gt;A commercial unix&#39;s price is not like windoze&#39;s price, and it usually can&#39;t run on your box,&lt;br /&gt;so forget it.&lt;br /&gt;&lt;br /&gt;The free opensource UNIXes can also be divided in:&lt;br /&gt;- BSD&lt;br /&gt;These are older and difficult to use. The most secure OS (openBSD) is in this group.&lt;br /&gt;You don&#39;t want them unless you&#39;re planning to install a server on them.&lt;br /&gt;&lt;br /&gt;- Linux&lt;br /&gt;Easy to use, stable, secure, and optimized for your kind of box. that&#39;s what we need.&lt;br /&gt;&lt;br /&gt;I strongly suggest you to get the SuSE distribution of Linux.&lt;br /&gt;It&#39;s the best one as i think, and i added here some tips for SuSE, so all should be easier.&lt;br /&gt;&lt;br /&gt;Visit &lt;a href=&quot;http://www.suse.de/&quot;&gt;http://www.suse.de/&lt;/a&gt; and look for a local store or order it online.&lt;br /&gt;(i know i said it the software was free, but not the CDs nor the manual nor the support.&lt;br /&gt;It is much cheaper than windoze anyway, and you are allowed to copy and distribute it)&lt;br /&gt;&lt;br /&gt;If you own an intel box, then order the PC version.&lt;br /&gt;&lt;br /&gt;If you own a mac box, then order the PowerPC version.&lt;br /&gt;&lt;br /&gt;Whatever you do, DON&#39;T PICK THE COREL DISTRIBUTION, it sucks.&lt;br /&gt;&lt;br /&gt;It&#39;s possible you have problem with your hardware on the installation. Read the manual, ask&lt;br /&gt;for technical support or buy new hardware, just install it as you can.&lt;br /&gt;&lt;br /&gt;This is really important! READ THE MANUAL, or even buy a UNIX book.&lt;br /&gt;Books about TCP/IP and C programming are also useful.&lt;br /&gt;&lt;br /&gt;If you don&#39;t, you won&#39;t understand some things i&#39;ll explain later. And, of course, you&#39;ll&lt;br /&gt;never become a hacker if you don&#39;t read a lot of that &#39;literature&#39;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;the Internet&lt;br /&gt;~~~~~~~~~~~~&lt;br /&gt;&lt;br /&gt;Yes! you wanted to hack, didn&#39;t you? do you want to hack your own box or what?&lt;br /&gt;You want to hack internet boxes! So lets connect to the internet.&lt;br /&gt;&lt;br /&gt;Yes, i know you&#39;ve gotten this document from the internet, but that was with windoze&lt;br /&gt;and it was much easier. Now you&#39;re another person, someone who screams for knowledge and wisdom.&lt;br /&gt;You&#39;re a Linux user, and you gotta open your way to the Internet.&lt;br /&gt;&lt;br /&gt;You gotta make your Linux box to connect to the net,&lt;br /&gt;so go and set up your modem (using YaST2 in SuSE).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;for full article go here &lt;a href=&quot;http://etricks.in/2008/03/learn-hacking-good-one.html&quot;&gt;http://etricks.in/2008/03/learn-hacking-good-one.html&lt;/a&gt;</description><link>http://learn-ethical-hacking.blogspot.com/2008/07/how-to-learn-to-hack-in-easy-steps.html</link><author>noreply@blogger.com (therightguy)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-939522308368542738.post-3809298621151386335</guid><pubDate>Thu, 31 Jul 2008 19:13:00 +0000</pubDate><atom:updated>2008-07-31T12:13:42.142-07:00</atom:updated><title>The Pitfalls of Java as a First Programming Language</title><description>Because of its popularity in the context of Web applications and the ease with which beginners can produce graphical programs, Java has become the most widely used language in introductory programming courses. We consider this to be a misguided attempt to make programming more fun, perhaps in reaction to the drop in CS enrollments that followed the dot-com bust. What we observed at New York University is that the Java programming courses did not prepare our students for the first course in systems, much less for more advanced ones. Students found it hard to write programs that did not have a graphic interface, had no feeling for the relationship between the source program and what the hardware would actually do, and (most damaging) did not understand the semantics of pointers at all, which made the use of C in systems programming very challenging.&lt;br /&gt;&lt;br /&gt;for full article go here &lt;a href=&quot;http://www.stsc.hill.af.mil/CrossTalk/2008/01/0801DewarSchonberg.html&quot;&gt;http://www.stsc.hill.af.mil/CrossTalk/2008/01/0801DewarSchonberg.html&lt;/a&gt;</description><link>http://learn-ethical-hacking.blogspot.com/2008/07/pitfalls-of-java-as-first-programming.html</link><author>noreply@blogger.com (therightguy)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-939522308368542738.post-8682586167517387666</guid><pubDate>Thu, 31 Jul 2008 19:03:00 +0000</pubDate><atom:updated>2008-07-31T12:11:24.988-07:00</atom:updated><title>FIRST STEP TO HACKING</title><description>WELL ETHICAL HACKING IS SOMETHING WHICH IS FULL OF EXCITEMENT, ZEAL AND INVOLVES A LOT OF HARD WORK. You ought to know a lot of languages like python, perl and other scripting languages. Below I list some points which you should ponder upon before thinking to do that CEH course.&lt;br /&gt;&lt;h2 class=&quot;title&quot; style=&quot;clear: both;&quot;&gt;Basic Hacking Skills&lt;/h2&gt;&lt;span class=&quot;sect2&quot;&gt;&lt;a href=&quot;http://www.catb.org/%7Eesr/faqs/hacker-howto.html#skills1&quot;&gt;&lt;/a&gt;&lt;/span&gt;1. Learn how to program.&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;2. Get one of the open-source Unixes and learn to use and run it.&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;3. Learn how to use the World Wide Web and write HTML.&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;4. If you don&#39;t have functional English, learn it.&lt;br /&gt;&lt;br /&gt;Once you have fulfilled that criteria then you canproceed to become a successful hacker</description><link>http://learn-ethical-hacking.blogspot.com/2008/07/first-step-to-hacking.html</link><author>noreply@blogger.com (therightguy)</author><thr:total>0</thr:total></item></channel></rss>