<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>PC Tips by Anu</title><description>Learn how to Hack Ethically! Know more about Cyber Security and Technology. Get cool Computer Tricks, Tips, How-To guides and more from experts. Don`t Learn to HACK - Hack to LEARN. That`s my motto and I stick to it.</description><managingEditor>noreply@blogger.com (Anu)</managingEditor><pubDate>Tue, 24 Mar 2026 18:33:28 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">547</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://pctipsbyanu.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>� Copyright PCTipsbyAnu 2012. All rights reserved.</copyright><itunes:image href="http://3.bp.blogspot.com/__t1BLgLYBq4/TBURlYRKlaI/AAAAAAAAACI/80KtVT6r5nM/s1600/Copy+of+18102009106-small.jpg"/><itunes:keywords>hacking,cracking,computer,security,ethical,hacking,vulnerability,assessment,penetration,testing,sql,injection,cross,site,scripting,web,security,hacking,tools,web,hacking,ethical,hacking,penetration,testing,backtrack,metasploit,wwwhack,Hack</itunes:keywords><itunes:summary>Learn how to Hack Ethically! Know more about Cyber Security and Technology. Get cool Computer Tricks, Tips, How-To guides and more from experts. Don`t Learn to HACK - Hack to LEARN. That`s our motto and we stick to it, we are all about Ethical Hacking, Penetration Testing &amp; Computer Security.</itunes:summary><itunes:subtitle>PC Tips by Anu</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Software How-To"/></itunes:category><itunes:category text="Education"><itunes:category text="Educational Technology"/></itunes:category><itunes:category text="Technology"><itunes:category text="Podcasting"/></itunes:category><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Business"><itunes:category text="Careers"/></itunes:category><itunes:author>Anu Tiger</itunes:author><itunes:owner><itunes:email>admin@pctipsbyanu.tk</itunes:email><itunes:name>Anu Tiger</itunes:name></itunes:owner><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><title>CISCO Password Crack</title><link>http://pctipsbyanu.blogspot.com/2013/01/cisco-password-crack.html</link><category>cisco password crack</category><category>cisco type 7 password crack</category><category>crack cisco enable password</category><category>crack roouter password</category><category>crack type 7 password</category><category>enable password carck</category><category>type 7 password</category><pubDate>Mon, 14 Jan 2013 10:11:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-5115545722544504546</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" height="342" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_g0R9-3xjhi0OPdvQmhF-qF-JJJWW7uZLht8lQmnfxZntGuq_CnTLxcy9TebtEOWmJFfsiU7uPoRda_kMk1BqtFEHDIRUmIc1CQScZnHln9l-jMsBM2F_dTu_Vd-W6NsxsH9NNtYvZG6u/s400/password-recovery2.jpg" width="400"&gt;&lt;/div&gt;&lt;noscript&gt;&lt;br&gt;
&lt;p&gt;This page uses Javascript, and alas, your browser does not support it.&lt;/p&gt;&lt;/noscript&gt;&lt;br&gt;
Wanna crack cisco Type 7 Password??&lt;br&gt;
Than this post is very useful for you. Because here, you don&amp;#39;t have to read the type of decryption formula nor have to read a full page of trick. Here you just have to do is that, copy  your TYPE 7 password and paste it in &amp;#39;Password&amp;#39; box and than click on &amp;#39;CRACK&amp;#39;.&lt;br&gt;
So easy :)&lt;br&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2013/01/cisco-password-crack.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_g0R9-3xjhi0OPdvQmhF-qF-JJJWW7uZLht8lQmnfxZntGuq_CnTLxcy9TebtEOWmJFfsiU7uPoRda_kMk1BqtFEHDIRUmIc1CQScZnHln9l-jMsBM2F_dTu_Vd-W6NsxsH9NNtYvZG6u/s72-c/password-recovery2.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>How to exploit Internet Explorer 8 to get ROOT access?</title><link>http://pctipsbyanu.blogspot.com/2012/10/how-to-exploit-internet-explorer-8-to.html</link><category>BackTrack</category><category>Browser</category><category>exploit</category><category>hack</category><category>How to hack</category><category>ie8 hack</category><category>Internet</category><category>internet explorer hack</category><category>Metasploit</category><category>meterpreter</category><category>win7 hack</category><category>win8 hack</category><category>windows hack</category><pubDate>Tue, 9 Oct 2012 10:05:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-4517071422127561039</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ2BjO8hMSLIZdY0ebDi5HPuDdfngba8uSG-D5IBvQLIRDL0EkoSKyq5_CRThXpXZBME2sa4spxGme9ggzQRBXcXRVfY1LTydr9BEPZMgeHRaN_UdCrD5yKAwXb6MoSpedMnj-kNicDm4k/s1600/internet-explorer-hack-css.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="276" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ2BjO8hMSLIZdY0ebDi5HPuDdfngba8uSG-D5IBvQLIRDL0EkoSKyq5_CRThXpXZBME2sa4spxGme9ggzQRBXcXRVfY1LTydr9BEPZMgeHRaN_UdCrD5yKAwXb6MoSpedMnj-kNicDm4k/s320/internet-explorer-hack-css.jpg" width="320"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b style="color: #484440; font-family: inherit; font-size: 15px; line-height: 16px;"&gt;&lt;br&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="color: #484440;"&gt;&lt;span style="font-size: 15px; line-height: 16px;"&gt;Today I&amp;#39;m telling you an easiest way to hack into any windows using Internet Explorer. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="color: #484440;"&gt;&lt;span style="font-size: 15px; line-height: 16px;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2012/10/how-to-exploit-internet-explorer-8-to.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ2BjO8hMSLIZdY0ebDi5HPuDdfngba8uSG-D5IBvQLIRDL0EkoSKyq5_CRThXpXZBME2sa4spxGme9ggzQRBXcXRVfY1LTydr9BEPZMgeHRaN_UdCrD5yKAwXb6MoSpedMnj-kNicDm4k/s72-c/internet-explorer-hack-css.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author><enclosure length="19528" type="image/jpeg" url="http://2.bp.blogspot.com/-uL-aMl7mQtg/UHOpDz-5CDI/AAAAAAAABy8/5BXWnBnncbo/s1600/internet-explorer-hack-css.jpg"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Today I&amp;#39;m telling you an easiest way to hack into any windows using Internet Explorer.  Read more »</itunes:subtitle><itunes:author>Anu Tiger</itunes:author><itunes:summary>Today I&amp;#39;m telling you an easiest way to hack into any windows using Internet Explorer.  Read more »</itunes:summary><itunes:keywords>hacking,cracking,computer,security,ethical,hacking,vulnerability,assessment,penetration,testing,sql,injection,cross,site,scripting,web,security,hacking,tools,web,hacking,ethical,hacking,penetration,testing,backtrack,metasploit,wwwhack,Hack</itunes:keywords></item><item><title>How to protect your smart phone from getting hacked?</title><link>http://pctipsbyanu.blogspot.com/2012/02/how-to-protect-your-smart-phone-from.html</link><category>how to prevent hackers</category><category>Mobile</category><category>protect mobile</category><category>protect smart phone</category><category>Security</category><category>security software</category><category>smart phone</category><category>wifi usage</category><pubDate>Thu, 2 Feb 2012 10:57:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-1242252942957770286</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia7aWr9DlRbIq6fftTFgNri3eVEw1HgW-M25KIiKCHfvxBcKqm4Sj2gxPvrlhGC0yOUYWzC4CaEHFsTyRbIDg_ycCwT5BsaQrjGdBIrgRVigRITfJvksqQtBLkTtt_QOkhlTnAUgAZO9mi/s1600/protect-smart-phone-from-getting-hacked,mobile-phone-security-software,PC+Tips+by+Anu.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="152" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia7aWr9DlRbIq6fftTFgNri3eVEw1HgW-M25KIiKCHfvxBcKqm4Sj2gxPvrlhGC0yOUYWzC4CaEHFsTyRbIDg_ycCwT5BsaQrjGdBIrgRVigRITfJvksqQtBLkTtt_QOkhlTnAUgAZO9mi/s320/protect-smart-phone-from-getting-hacked,mobile-phone-security-software,PC+Tips+by+Anu.jpg" width="320"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;span id="goog_1174154519"&gt;&lt;/span&gt;&lt;span id="goog_1174154520"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;span style="font-size: small;"&gt;Most people are comfortable with the idea of installing anti-virus 
software and security programs on their home PC in order to ward off 
hackers and malicious code. But with the rise of smart-phone technology 
people have become complacent about the safety of the personal 
information that they carry around on the multi-tasking device in their 
pockets. You have to think of a smart phone as a small computer which, 
as with all such devices, is vulnerable to hackers unless you take steps
 to protect it.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2012/02/how-to-protect-your-smart-phone-from.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia7aWr9DlRbIq6fftTFgNri3eVEw1HgW-M25KIiKCHfvxBcKqm4Sj2gxPvrlhGC0yOUYWzC4CaEHFsTyRbIDg_ycCwT5BsaQrjGdBIrgRVigRITfJvksqQtBLkTtt_QOkhlTnAUgAZO9mi/s72-c/protect-smart-phone-from-getting-hacked,mobile-phone-security-software,PC+Tips+by+Anu.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author><enclosure length="19026" type="image/jpeg" url="http://3.bp.blogspot.com/-pTxX-0EW8iQ/Tyod6gMIwQI/AAAAAAAABxw/YUPe742QWKE/s1600/protect-smart-phone-from-getting-hacked,mobile-phone-security-software,PC+Tips+by+Anu.jpg"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Most people are comfortable with the idea of installing anti-virus software and security programs on their home PC in order to ward off hackers and malicious code. But with the rise of smart-phone technology people have become complacent about the safety of the personal information that they carry around on the multi-tasking device in their pockets. You have to think of a smart phone as a small computer which, as with all such devices, is vulnerable to hackers unless you take steps to protect it. Read more »</itunes:subtitle><itunes:author>Anu Tiger</itunes:author><itunes:summary>Most people are comfortable with the idea of installing anti-virus software and security programs on their home PC in order to ward off hackers and malicious code. But with the rise of smart-phone technology people have become complacent about the safety of the personal information that they carry around on the multi-tasking device in their pockets. You have to think of a smart phone as a small computer which, as with all such devices, is vulnerable to hackers unless you take steps to protect it. Read more »</itunes:summary><itunes:keywords>hacking,cracking,computer,security,ethical,hacking,vulnerability,assessment,penetration,testing,sql,injection,cross,site,scripting,web,security,hacking,tools,web,hacking,ethical,hacking,penetration,testing,backtrack,metasploit,wwwhack,Hack</itunes:keywords></item><item><title>How to Hack Website database using XPath tech?</title><link>http://pctipsbyanu.blogspot.com/2012/02/how-to-hack-website-database-using.html</link><category>hack</category><category>hack website</category><category>How to</category><category>Injection</category><category>SQL Injection</category><category>Tutorial</category><category>website hacking</category><category>xpath</category><category>xpath injection</category><pubDate>Wed, 1 Feb 2012 13:42:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-8554750422737743632</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="color: black; font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEics3R0NCki0xZzdVBkKvtsWDFM7dHcgTKCHIBBceYDHHweLc42GAw0gN_fOz2xBmQahvbkpmDRmmjXWfmO3MeALg5EDzHJWqzaDqoJgldCyjgb4nJQQp0cPKsl6efrIQNrdeCAsFEAdYvL/s320/website-database-hack,+hack-website,+website-hack,+how-to-hack,+PC+Tips+by+Anu,+Anu+Tiger.jpg" width="320"&gt;&lt;/div&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style="color: black; font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
Everyday many website gets hacked by hackers but most of the hackers are
 hacking those website just for popularity nothing else. Today i am 
writing this tutorial on XPath Injection, in which i will explain you, &lt;b&gt;How Hackers Hack Website Using XPath Injection&lt;/b&gt;. &lt;span class="status" style="color: white;"&gt;M4ERRHCQZ2PY&lt;/span&gt;&lt;br&gt;
&lt;br&gt;
In a typical Web Application architecture, all data is stored on a 
Database server. This Database server store data in various formats like
 an LDAP, XML or RDBMS database. The application queries the server and 
accesses the information based on the user input.&lt;br&gt;
&lt;br&gt;
Normally attackers try to extract more information than allowed by 
manipulating or using the query with specially crafted inputs.Here, in 
this tutorial we’ll be discussing XPATH Injection techniques to extract 
data from XML databases.&lt;/div&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2012/02/how-to-hack-website-database-using.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEics3R0NCki0xZzdVBkKvtsWDFM7dHcgTKCHIBBceYDHHweLc42GAw0gN_fOz2xBmQahvbkpmDRmmjXWfmO3MeALg5EDzHJWqzaDqoJgldCyjgb4nJQQp0cPKsl6efrIQNrdeCAsFEAdYvL/s72-c/website-database-hack,+hack-website,+website-hack,+how-to-hack,+PC+Tips+by+Anu,+Anu+Tiger.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>Web Security Scanner For Windows (32 bit &amp; 64 bit)</title><link>http://pctipsbyanu.blogspot.com/2012/02/web-security-scanner-for-windows-32-bit.html</link><category>Download</category><category>Javascript</category><category>scanner</category><category>Security</category><category>SQL Injection</category><category>tool</category><category>Unix</category><category>vulnerability</category><category>web</category><category>web security</category><category>web security scanner</category><category>Windows</category><category>xss</category><pubDate>Wed, 1 Feb 2012 13:14:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-7512622276431369292</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMEDPVrUzXuetDU1RqbubcRwk9CWi58UTuK0Wsb7fDzjno4aOM5y23PWctEFsCVSqOeRkLHd33nTOknTXA1v7RUHvSQv_W0DCrPrXJFNFxQDfCG3FFAmndkO5Nq0Mkt7tBMs69c0iYcKb0/s320/Wireless-WEP-Hack1.jpg" width="320"&gt;&lt;/div&gt;
&lt;br&gt;
Vega is a GUI-based, multi-platform, free and open source web security 
scanner that can be used to find instances of SQL injection, cross-site 
scripting (XSS), and other vulnerabilities in your web applications. 
Vega also includes an intercepting proxy for interactive web application
 debugging. Vega attack modules are written in Javascript, users can 
easily modify them or write their own. This is the Windows 32-bit and 64-bit 
version.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2012/02/web-security-scanner-for-windows-32-bit.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMEDPVrUzXuetDU1RqbubcRwk9CWi58UTuK0Wsb7fDzjno4aOM5y23PWctEFsCVSqOeRkLHd33nTOknTXA1v7RUHvSQv_W0DCrPrXJFNFxQDfCG3FFAmndkO5Nq0Mkt7tBMs69c0iYcKb0/s72-c/Wireless-WEP-Hack1.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>Exploiting a cross-site scripting vulnerability on Facebook</title><link>http://pctipsbyanu.blogspot.com/2012/02/exploiting-cross-site-scripting.html</link><category>cross site scripting</category><category>exploit</category><category>exploit a cross-site scripting</category><category>exploit facebook</category><category>facebook</category><category>facebook hack</category><category>facebook vulnerability</category><category>hack</category><category>Internet</category><category>Tutorial</category><category>Vulnb</category><category>xss</category><pubDate>Wed, 1 Feb 2012 12:58:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-5288841259771040724</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBRrv9Ssidns1p82IzwBvYnOSrLctaA4S7JvcXBBE4KBAcyxllAbqSQ_gPiKyyZM9NyRnBij31VMpHeXaUSNZeyXw6rTOn5zjmBcWFzENcak_7vS9V3LlGFw4I5mxnZxJGigY9Q481AMjU/s400/facebook-privacy-PC+Tips+by+Anu-+Anu+Tiger.jpg" width="400"&gt;&lt;/div&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
Take a walk through most workplaces and you will surely notice 
someone browsing a social networking site. No wonder that website 
popularity services like Alexa rate Facebook the second most visited 
website after Google and before Youtube!  We trust these websites to 
reflect the public image that we want to portray and sometimes even 
trust with secrets. A single cross-site scripting vulnerability
 allows attackers to do anything (that the victim may do) on behalf of 
the victim. In this article we will look at how Facebook accounts could 
be compromised through such a simple, yet effective vulnerability.
&lt;/div&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;br&gt;
&lt;b&gt;HTTP Only does not protect your site (or Facebook) from XSS exploitation&lt;/b&gt;&lt;br&gt;
&lt;/div&gt;&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2012/02/exploiting-cross-site-scripting.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBRrv9Ssidns1p82IzwBvYnOSrLctaA4S7JvcXBBE4KBAcyxllAbqSQ_gPiKyyZM9NyRnBij31VMpHeXaUSNZeyXw6rTOn5zjmBcWFzENcak_7vS9V3LlGFw4I5mxnZxJGigY9Q481AMjU/s72-c/facebook-privacy-PC+Tips+by+Anu-+Anu+Tiger.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>Linux Rootkit 2012</title><link>http://pctipsbyanu.blogspot.com/2012/02/linux-rootkit-2012.html</link><category>anti-kill functionality</category><category>Download</category><category>hide files and directories</category><category>hide processes</category><category>hide sockets and connections</category><category>kbeast</category><category>Kernel</category><category>keystroke logging</category><category>Linux</category><category>Programming</category><category>Rootkit</category><category>Script</category><category>Tools</category><category>Unix</category><pubDate>Wed, 1 Feb 2012 10:15:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-703637884617505792</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" height="307" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMrqYtDgKSv2B9oEBIBm1W_gfgV00uhmtZqjGccCT2W-5QFEofE3O13FH3a7n62-VFs6lzlE4IcFMwloVN160EkudrYYFgPk3MJ0o4gi7-MPac39CJ5R-hbdRw2ogE19WTvbQCWFeeXeQf/s320/linux-rootkit%252C+ubuntu-rootkit%252C+hack-via-rootkit%252C+download-rootkit%252C+PC+Tips+by+Anu%252C+Anu+Tiger.jpg" width="320"&gt;&lt;/div&gt;
&lt;br&gt;
KBeast (Kernel Beast) 2012 is a Linux rootkit that hides the loadable 
kernel module, hides files and directories, hides processes, hides 
sockets and connections, performs keystroke logging, has anti-kill 
functionality and more. &lt;br&gt;
&lt;br&gt;&lt;br&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2012/02/linux-rootkit-2012.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMrqYtDgKSv2B9oEBIBm1W_gfgV00uhmtZqjGccCT2W-5QFEofE3O13FH3a7n62-VFs6lzlE4IcFMwloVN160EkudrYYFgPk3MJ0o4gi7-MPac39CJ5R-hbdRw2ogE19WTvbQCWFeeXeQf/s72-c/linux-rootkit%252C+ubuntu-rootkit%252C+hack-via-rootkit%252C+download-rootkit%252C+PC+Tips+by+Anu%252C+Anu+Tiger.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>How to tracks IPs in log files and executes shell commands per each IP?</title><link>http://pctipsbyanu.blogspot.com/2012/02/how-to-tracks-ips-in-log-files-and.html</link><category>Download</category><category>execute shell command</category><category>Linux</category><category>log 2 command</category><category>PHP</category><category>php script</category><category>Programming</category><category>Rootkit</category><category>Shell</category><category>tool</category><category>track webserver log file</category><category>watch inactivity from user ip</category><pubDate>Wed, 1 Feb 2012 09:41:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-1138434711557900549</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjC9TVXBlEwI-wOW7gr3rdUh3m5sqKUxIJsKxKsT2mWsiGERmP_3pjeDlzrMecb3N8R3K53faS0yETBl0weBPG2rH5f5vXC4zC5_A4dDz4I8XbLpFepPPR7aGRRYCoN1FzUL8qqYRF-gIw-/s320/javascript.jpg" width="320"&gt;&lt;/div&gt;
&lt;br&gt;
Here is a PHP script that tracks IPs in log files and executes 
shell commands per each IP. It was created as a sort of reverse
 fail2ban or cheap VPN-firewall: a machine with a closed firewall can be
 told, by a foreign machine, to accept connections from a specific IP.&lt;br&gt;
&lt;br&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2012/02/how-to-tracks-ips-in-log-files-and.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjC9TVXBlEwI-wOW7gr3rdUh3m5sqKUxIJsKxKsT2mWsiGERmP_3pjeDlzrMecb3N8R3K53faS0yETBl0weBPG2rH5f5vXC4zC5_A4dDz4I8XbLpFepPPR7aGRRYCoN1FzUL8qqYRF-gIw-/s72-c/javascript.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>Best practices to stay safe on Facebook and avoid being hacked</title><link>http://pctipsbyanu.blogspot.com/2012/01/best-practices-to-stay-safe-on-facebook.html</link><category>facebook</category><category>Internet</category><category>login approvals</category><category>login notifications</category><category>prevent facebook hack</category><category>Privacy</category><category>protect your password</category><category>safe from hackers</category><category>Secure</category><category>secure browsing</category><category>Security</category><category>Tutorial</category><category>wot</category><pubDate>Sun, 29 Jan 2012 12:08:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-7245150062763139370</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiigbHT8HaPvGyPBjhNPDZC9d7-A8aXCUYy7d-d5Ep4Aa9bUb2-aLm0ISWogXM58yEsSpDxl1v1wRKmRSvz4hmnCdSN07D6LJquakbtmDIK6QUA0dgwyIqg-UoqnFyFxqRsKR_3Q2edcvH-/s400/facebook-security-tips-PC-Tips-by-Anu-Tiger.png" width="400"&gt;&lt;/div&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
As Facebook has emerged as the most 
popular Social Networking site (with a user base of 800 Million active 
users) it has also gained attention of hackers and spammers. As in the 
case of Windows, the more popular it is, more are the chances of it 
getting attacked. The reason that both Windows and Facebook are easy 
target is same: it has large number of population and most of them are 
common users with limited or no knowledge of “security”. It is an open 
secret that people are the weakest link when it comes to security. 
Keeping this in mind, I would like to request readers not to be the 
weakest link and to follow these best practices to avoid being hacked:&lt;/div&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2012/01/best-practices-to-stay-safe-on-facebook.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiigbHT8HaPvGyPBjhNPDZC9d7-A8aXCUYy7d-d5Ep4Aa9bUb2-aLm0ISWogXM58yEsSpDxl1v1wRKmRSvz4hmnCdSN07D6LJquakbtmDIK6QUA0dgwyIqg-UoqnFyFxqRsKR_3Q2edcvH-/s72-c/facebook-security-tips-PC-Tips-by-Anu-Tiger.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>Hack Networks with your mobile device</title><link>http://pctipsbyanu.blogspot.com/2012/01/hack-networks-with-your-mobile-device.html</link><category>Android</category><category>Android Applications</category><category>apk</category><category>Download</category><category>hack</category><category>hack wifi with mobile</category><category>Hacking tools</category><category>iwifi</category><category>Software</category><category>wifi</category><category>wifi hack</category><pubDate>Sun, 29 Jan 2012 11:48:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-5625640115660631013</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgydisNeJZDfBC7U0qHrE8TgDWrWGClmJfiDsx3wL87vMHq8dN3fyZzctGy-tBBA5c_TSw6gOBdlMaWjEiV4q-HXpwfv2_UA6_DdqO0UYfIFtQo2chcEO2GMqIAfZoIEOBbCZwuUQ3JBWlL/s320/Android-WiFi-Hack-PCTipsbyAnu-Anu+Tiger.png" width="320"&gt;&lt;/div&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;b&gt;&lt;span style="font-size: small;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;b&gt;&lt;span style="font-size: small;"&gt;&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; color: black; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;b&gt;&lt;span style="font-size: small;"&gt;&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; color: black; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;Features &lt;/span&gt;&lt;/span&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;ul class="(null)" style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;li&gt;&lt;b&gt;&lt;span style="font-size: small;"&gt;&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; color: black; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;Hacks WEP, WPA, and WPA2 &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style="font-size: small;"&gt;&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; color: black; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;Very simple and easy to use layout&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style="font-size: small;"&gt;&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; color: black; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;Works on All Android OS phones &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style="font-size: small;"&gt;&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; color: black; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;Works on iPod Touch 1st, 2nd, 3rd, and 4th gen &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style="font-size: small;"&gt;&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; color: black; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;Works on iPhone 1st, 2nd, 3G, 3GS, 4, 4s &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style="font-size: small;"&gt;&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; color: black; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;Works on iPad 1 and iPad 2&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2012/01/hack-networks-with-your-mobile-device.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgydisNeJZDfBC7U0qHrE8TgDWrWGClmJfiDsx3wL87vMHq8dN3fyZzctGy-tBBA5c_TSw6gOBdlMaWjEiV4q-HXpwfv2_UA6_DdqO0UYfIFtQo2chcEO2GMqIAfZoIEOBbCZwuUQ3JBWlL/s72-c/Android-WiFi-Hack-PCTipsbyAnu-Anu+Tiger.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>How to enable Secure HTTPS browsing in Facebook for preventing hack?</title><link>http://pctipsbyanu.blogspot.com/2012/01/how-to-enable-secure-https-browsing-in.html</link><category>browsing</category><category>facebook</category><category>facebook https</category><category>hack</category><category>How to</category><category>https</category><category>Internet</category><category>Security</category><category>technology</category><category>Tutorial</category><pubDate>Sun, 29 Jan 2012 11:32:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-9036915794560501748</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: center;"&gt;
&lt;img border="0" height="271" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6BMqU685ZFeuhichfO4-LZ6uV9VgFYcY9bY9JUXV5hNXRskPneUGdGH7LrcG7dEEfNIZzv7DNoabUpF58nHQxfjIKdEryePlh6h3q5McI7mhBFHh-qKzOYMKlQDjJSqj_W24mTrT3s6KT/s320/facebook+main+safe.jpeg" width="320"&gt;&lt;/div&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
With the 
advancement of technology advanced are the dangers. On an unsecure wi-fi
 connection hacking facebook is child’s play. You might have heard of “&lt;strong&gt;Firesheep&lt;/strong&gt;” add on of Firefox which enables to login in to others’ opened facebook account on the same network. Apart from that,&lt;strong&gt; packet sniffers&lt;/strong&gt; can also be used to steal your password on the fly. &lt;strong&gt;Man in the middle&lt;/strong&gt; attacks are also very popular in the same sense.&lt;/div&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2012/01/how-to-enable-secure-https-browsing-in.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6BMqU685ZFeuhichfO4-LZ6uV9VgFYcY9bY9JUXV5hNXRskPneUGdGH7LrcG7dEEfNIZzv7DNoabUpF58nHQxfjIKdEryePlh6h3q5McI7mhBFHh-qKzOYMKlQDjJSqj_W24mTrT3s6KT/s72-c/facebook+main+safe.jpeg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>Microsoft Windows Remote Code Execution</title><link>http://pctipsbyanu.blogspot.com/2012/01/microsoft-windows-remote-code-execution.html</link><category>advisory</category><category>code</category><category>Download</category><category>execution</category><category>hack</category><category>Remote</category><category>remote code execution</category><category>Security</category><category>web</category><category>Windows</category><pubDate>Sat, 21 Jan 2012 15:35:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-5971155272485626953</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_MfxDhShpK4NmRTXiMI3brm8KPBPrVPzgeu78KLSVxKaj_SPmnwhlKjsQvVTEoqZTVohBrUavQOturQEH_OlBmoXR5bcDX3oMi1JNlSqrfttkZ2EokopjlmJSBM8WUTbgP-o9XS3v5bg4/s320/microsoft+windows+remote+code+execution+-+PC+Tips+by+Anu+Tiger.jpg" width="320"&gt;&lt;/div&gt;
&lt;br&gt;
VUPEN Vulnerability Research Team discovered a vulnerability in 
Microsoft Windows. The vulnerability is caused by a use-after-free error
 in the TIME (datime.dll) module when loaded via a specific behavior, 
which could be exploited by remote attackers to compromise a vulnerable 
system via a specially crafted web page.&lt;/div&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2012/01/microsoft-windows-remote-code-execution.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_MfxDhShpK4NmRTXiMI3brm8KPBPrVPzgeu78KLSVxKaj_SPmnwhlKjsQvVTEoqZTVohBrUavQOturQEH_OlBmoXR5bcDX3oMi1JNlSqrfttkZ2EokopjlmJSBM8WUTbgP-o9XS3v5bg4/s72-c/microsoft+windows+remote+code+execution+-+PC+Tips+by+Anu+Tiger.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>John The Ripper 1.7.9 Jumbo 5</title><link>http://pctipsbyanu.blogspot.com/2011/12/john-ripper-179-jumbo-5.html</link><category>BeOS</category><category>Crack</category><category>cracker</category><category>DOS</category><category>Download</category><category>Hacking Tool</category><category>john the ripper</category><category>jtr</category><category>Linux</category><category>NTLM hash</category><category>OpenVMS</category><category>password crack</category><category>tool</category><category>Windows</category><pubDate>Tue, 27 Dec 2011 14:32:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-4028893461893410627</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQIIVIpmwNPwU8HYZNd-xGOgR_j1OLrtN1bXvNa7juZJBdKEUS571RDizXNgdwwvZlYKqu3PWIJglIEK7jQyiEqmIdnTR5Cxt8Ibeo4c1WshIWpKEB0KjO2sBpuiGQnMvlvg5bKW5VvjhO/s400/john-the-ripper.jpg" width="222"&gt;&lt;/div&gt;
&lt;br&gt;
John the Ripper is a fast password cracker, 
currently available for many flavors of Unix, Windows, DOS, BeOS, and 
OpenVMS. Its primary purpose is to detect weak Unix passwords. It 
supports several crypt(3) password hash types commonly found on Unix 
systems, as well as Windows LM hashes. On top of this, many other hash 
types are added with contributed patches, and some are added in John the
 Ripper Pro.&lt;span&gt; &lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2011/12/john-ripper-179-jumbo-5.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQIIVIpmwNPwU8HYZNd-xGOgR_j1OLrtN1bXvNa7juZJBdKEUS571RDizXNgdwwvZlYKqu3PWIJglIEK7jQyiEqmIdnTR5Cxt8Ibeo4c1WshIWpKEB0KjO2sBpuiGQnMvlvg5bKW5VvjhO/s72-c/john-the-ripper.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>HACK : Download F.B.I RAT with Full source coding</title><link>http://pctipsbyanu.blogspot.com/2011/12/hack-download-fbi-rat-with-full-source.html</link><category>Download</category><category>hack</category><category>hack pc with RAT</category><category>hack remote pc</category><category>Hacking tools</category><category>Keylogger</category><category>Programming</category><category>RAT</category><category>Script</category><pubDate>Tue, 27 Dec 2011 14:20:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-1850549276940706700</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="margin-left: 1em; margin-right: 1em; margin-top: 0px; padding: 0px;"&gt;
&lt;img align="" alt="" class="selected " src="http://www.techmantras.com/sites/default/files/ana1997110106.gif" style="width: 350px;"&gt;&lt;/div&gt;
&lt;br&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 18px;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin: 0px 0px 1em; padding: 0px;"&gt;
&lt;/div&gt;
&lt;div style="margin: 0px 0px 1em; padding: 0px; text-align: left;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 18px;"&gt;F.B.I RAT (Full Backdoor Intergration) V0.1. &lt;/span&gt;&lt;/span&gt;Supports
 xp/Vista/Windows 7, all features have been tested on these OS&amp;#39;s 
including injection, but there have been some limitations on the 
sniffer.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2011/12/hack-download-fbi-rat-with-full-source.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh1R0fSXyJi-6JuQVbmNIXncK6DAUFLNmp33C9Afcyj-Or0aMFs0r5BMunkMdl59KShK8ua-VS3ycuYd4SmVctPmP0HCpNdlJZO8zcCpk8T3pDX2YEaER_AHUdg8_K2tFo-Usrx_Ndb0aB/s72-c/download.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">4</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>GSM Mobile hacking : Sim cloning</title><link>http://pctipsbyanu.blogspot.com/2011/12/gsm-mobile-hacking-sim-cloning.html</link><category>gsm hack</category><category>listen calls</category><category>Mobile</category><category>mobile cloning</category><category>sim cloning</category><category>sim editor</category><category>trace mobile location</category><category>Tutorial</category><pubDate>Tue, 27 Dec 2011 14:12:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-1880151525769564198</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" height="256" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh60zp7ruqjiCNyr04WwDDl-a5SmBfhu6Vyck0LN1iiFCP4zK4v-oISS0jfLsk_K6MYcfIT8oXFqNzcCSCfx5I5QMx9obdgkUCMGNKEIUnPZt9UfxXBb02IRn5W3u_HUmsQPGSEZa52iWF6/s320/Track+gsm+mobile%252C+sim+cloning%252C+trace+mobile+location.jpg" width="320"&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
Let&amp;#39;s talk about the fun stuff. The first trick I will discuss is an
activity that is becoming quite prevalant, SIM cloning. If you have
paid attention to any cell phone related tutorials in the past, then
you may remember cloning being made popular by certain public figures. &lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
Well, even with GSM this trick still holds relevant. How
could such a flaw exist in a system that is obviously concentrated on
preventing such fraudulant use? &lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
The flaw is within the COMP128
authentication algorithm used as an instantiation of A3/A8 widely used
by gsm providers. Unfortunately for these providers, the COMP128
algorithm is just not strong enough to prevent fraud. We attack the
algorithm by using a chosen-challenge attack, which works by forming a
number of specially-chosen challenges and querying the SIM card for
each one. Then by analyzing the responses from these queries, we are
able to determine the value of the secret key that is used for
authentication. So how do we perform this attack?&lt;/div&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2011/12/gsm-mobile-hacking-sim-cloning.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh60zp7ruqjiCNyr04WwDDl-a5SmBfhu6Vyck0LN1iiFCP4zK4v-oISS0jfLsk_K6MYcfIT8oXFqNzcCSCfx5I5QMx9obdgkUCMGNKEIUnPZt9UfxXBb02IRn5W3u_HUmsQPGSEZa52iWF6/s72-c/Track+gsm+mobile%252C+sim+cloning%252C+trace+mobile+location.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>SQL Injection : False SQL Injection / Advance Blind SQL Injection</title><link>http://pctipsbyanu.blogspot.com/2011/12/sql-injection-false-sql-injection.html</link><category>advance sql injection</category><category>Download</category><category>exploit</category><category>hack</category><category>Hack via sql injection</category><category>PHP</category><category>Programming</category><category>Script</category><category>SQL Injection</category><category>sql injection methods</category><category>Tutorial</category><pubDate>Tue, 27 Dec 2011 13:47:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-8488114222240929758</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" height="154" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2BA1JBsuPXNwua1ucGZWE2aRNNBAWreWoAzn-z3q8lgfIB-yrXnmFVZ75zKHPXnMg2321MyzpQ0LPKj2i9VXseZ5rQE0lZS_WuM2sUrmL0FhXcrCFaFEox7JwqRlp6qzRRbCyH4YUV6iB/s320/sqlinjection.jpg" width="320"&gt;&lt;/div&gt;
&lt;br&gt;
This is a brief whitepaper called False SQL Injection and Advanced Blind SQL Injection. This document is written for publicizing of new SQL injection method about detour some web firewall or some security solution.&lt;br&gt;
&lt;br&gt;
In order to read this document, you have to understand basic MySQL 
principles. I classified the term &amp;quot;SQL Injection&amp;quot; as 2 meanings. The 
first is a general SQL Injection, we usually call this &amp;quot;True SQL 
Injection&amp;quot;, and the second is a &amp;quot;False SQL Injection&amp;quot;. Though in this 
documentation, you can know something special about &amp;quot;True SQL Injection&amp;quot; &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2011/12/sql-injection-false-sql-injection.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2BA1JBsuPXNwua1ucGZWE2aRNNBAWreWoAzn-z3q8lgfIB-yrXnmFVZ75zKHPXnMg2321MyzpQ0LPKj2i9VXseZ5rQE0lZS_WuM2sUrmL0FhXcrCFaFEox7JwqRlp6qzRRbCyH4YUV6iB/s72-c/sqlinjection.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>Windows Media Player 11.0.5721.5262 Denial Of Service</title><link>http://pctipsbyanu.blogspot.com/2011/12/windows-media-player-11057215262-denial.html</link><category>Crack</category><category>DDOS</category><category>denial of service</category><category>exploit</category><category>Programming</category><category>remote ddos</category><category>remote denial of service exploit</category><category>Tutorial</category><category>Windows</category><category>windows Denial Of Service</category><category>windwos exploit</category><pubDate>Tue, 27 Dec 2011 13:18:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-3584210444233082582</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0RlHqD7D5zazszKl8I39Ax8defe3JvesEARXx59JaIYsj9BZHZOKIocc51Q6xyDVxJsGbYMJS0JyfPzAkA_v67y4CstzJqwB-JEfwXhEa55jCujbQ_wJUWEAyz-RbCvRfBWnZ55xUuF2V/s1600/windows-hack.png"&gt;&lt;/div&gt;
&lt;br&gt;
Microsoft Windows Media Player version 11.0.5721.5262 remote denial of service exploit.&lt;br&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2011/12/windows-media-player-11057215262-denial.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0RlHqD7D5zazszKl8I39Ax8defe3JvesEARXx59JaIYsj9BZHZOKIocc51Q6xyDVxJsGbYMJS0JyfPzAkA_v67y4CstzJqwB-JEfwXhEa55jCujbQ_wJUWEAyz-RbCvRfBWnZ55xUuF2V/s72-c/windows-hack.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>HOW TO : Android updates with daster menus &amp; bulk uploading</title><link>http://pctipsbyanu.blogspot.com/2011/12/how-to-android-updates-with-daster.html</link><category>Android</category><category>android bulk apload</category><category>bilk upload</category><category>Download</category><category>dropbox</category><category>Mobile</category><category>mobile client</category><pubDate>Tue, 27 Dec 2011 13:05:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-771424163445080547</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br&gt;
&lt;br&gt;
&lt;div class="separator" style="clear: both; font-family: inherit; text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;/div&gt;
&lt;h2 style="font-family: inherit;"&gt;
&lt;/h2&gt;
&lt;span style="font-family: inherit;"&gt;


    
    &lt;/span&gt;
     
     &lt;div style="font-family: inherit;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwXtv91UeN1BBoFI7nbEznS0552AOqLhDVgvdUULlbgOJzBNJ4bckPAJJaV5PVJk898decocPp8J9AFTBKuFYonb1LiQvEiUSrFEtMs3llC3zN4NA6HoIendHIhX58zHKXKveoiWdnKHAS/s320/androids.gif" width="320"&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
Android:
 Dropbox just rolled out an update for their Android mobile client; grab
 it today to enjoy a slew of new features including faster menus, bulk 
upload, and more. &lt;/div&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2011/12/how-to-android-updates-with-daster.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwXtv91UeN1BBoFI7nbEznS0552AOqLhDVgvdUULlbgOJzBNJ4bckPAJJaV5PVJk898decocPp8J9AFTBKuFYonb1LiQvEiUSrFEtMs3llC3zN4NA6HoIendHIhX58zHKXKveoiWdnKHAS/s72-c/androids.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>How to hack keylogger/RAT's password?</title><link>http://pctipsbyanu.blogspot.com/2011/12/how-to-hack-keyloggerrats-password.html</link><category>email password hack</category><category>FTP Server</category><category>hack</category><category>hack keylogger password</category><category>hack rats password</category><category>How to hack</category><category>Internet</category><category>Keylogger</category><category>keylogger hack</category><category>RAT</category><category>RAT hack</category><category>RAT server</category><category>Security</category><category>Wireshark</category><pubDate>Tue, 27 Dec 2011 12:15:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-8177357357128821829</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSBbF8_FPqz_0DQPsFjB57XlOiR599EVwulHvVM4rT-JZ5XXug1m3C67mYCe98JQ-9UIEqNRKy-9Wcq3ya27_3_2ztivD-zgr8clHkwfHMKfCXVPRT_x2m3tyfPpS3EeAGmod7_mUCysbP/s1600/FEA78E134A55A348174175896D9.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="280" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSBbF8_FPqz_0DQPsFjB57XlOiR599EVwulHvVM4rT-JZ5XXug1m3C67mYCe98JQ-9UIEqNRKy-9Wcq3ya27_3_2ztivD-zgr8clHkwfHMKfCXVPRT_x2m3tyfPpS3EeAGmod7_mUCysbP/s400/FEA78E134A55A348174175896D9.jpg" width="400"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;b&gt;&lt;a href="http://www.pctipsbyanu.co.cc/search/label/Keylogger?max-results=8"&gt;Keylogger&lt;/a&gt;&amp;#39;s and RAT&amp;#39;s&lt;/b&gt; nowadays are everybody&amp;#39;s problem across the &lt;a href="http://www.pctipsbyanu.co.cc/search/label/Internet?max-results=8"&gt;internet&lt;/a&gt;. &lt;b&gt;Hackers&lt;/b&gt; use keyloggers to &lt;a href="http://www.pctipsbyanu.co.cc/search/label/How%20to%20hack%20email?max-results=8" target="_blank"&gt;&lt;b&gt;hack the email passwords&lt;/b&gt;&lt;/a&gt;
 of the victim which they receive in the form of emails or text files on
 their respective FTP servers. They spread their keyloggers with the 
help of cracks, keygen&amp;#39;s or patches of popular software&amp;#39;s or simply 
through hack tools. So friends, today i will teach you how to &lt;a href="http://www.pctipsbyanu.co.cc/search/label/Programming?max-results=8"&gt;reverse engineer&lt;/a&gt; the keylogger or &lt;a href="http://www.pctipsbyanu.co.cc/search/label/RAT?max-results=8" title="Rat source code"&gt;RAT&lt;/a&gt; to hack the hackers FTP server or &lt;b&gt;email password&lt;/b&gt;.&lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2011/12/how-to-hack-keyloggerrats-password.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSBbF8_FPqz_0DQPsFjB57XlOiR599EVwulHvVM4rT-JZ5XXug1m3C67mYCe98JQ-9UIEqNRKy-9Wcq3ya27_3_2ztivD-zgr8clHkwfHMKfCXVPRT_x2m3tyfPpS3EeAGmod7_mUCysbP/s72-c/FEA78E134A55A348174175896D9.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author><enclosure length="61139" type="image/jpeg" url="http://1.bp.blogspot.com/-TTYPCN4b6iA/TWKIBPTTJMI/AAAAAAAAAx8/ICXTnV51rvM/s1600/FEA78E134A55A348174175896D9.jpg"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Keylogger&amp;#39;s and RAT&amp;#39;s nowadays are everybody&amp;#39;s problem across the internet. Hackers use keyloggers to hack the email passwords of the victim which they receive in the form of emails or text files on their respective FTP servers. They spread their keyloggers with the help of cracks, keygen&amp;#39;s or patches of popular software&amp;#39;s or simply through hack tools. So friends, today i will teach you how to reverse engineer the keylogger or RAT to hack the hackers FTP server or email password. Read more »</itunes:subtitle><itunes:author>Anu Tiger</itunes:author><itunes:summary>Keylogger&amp;#39;s and RAT&amp;#39;s nowadays are everybody&amp;#39;s problem across the internet. Hackers use keyloggers to hack the email passwords of the victim which they receive in the form of emails or text files on their respective FTP servers. They spread their keyloggers with the help of cracks, keygen&amp;#39;s or patches of popular software&amp;#39;s or simply through hack tools. So friends, today i will teach you how to reverse engineer the keylogger or RAT to hack the hackers FTP server or email password. Read more »</itunes:summary><itunes:keywords>hacking,cracking,computer,security,ethical,hacking,vulnerability,assessment,penetration,testing,sql,injection,cross,site,scripting,web,security,hacking,tools,web,hacking,ethical,hacking,penetration,testing,backtrack,metasploit,wwwhack,Hack</itunes:keywords></item><item><title>Hack windows admin/administrator password</title><link>http://pctipsbyanu.blogspot.com/2011/12/hack-windows-adminadministrator.html</link><category>cmd</category><category>hack</category><category>hack password with cmd</category><category>hack windows password</category><category>password hack</category><category>Password hacking</category><category>Tips n Tricks</category><category>Vulnb</category><category>Windows</category><pubDate>Tue, 27 Dec 2011 11:48:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-5939757263435366680</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0RlHqD7D5zazszKl8I39Ax8defe3JvesEARXx59JaIYsj9BZHZOKIocc51Q6xyDVxJsGbYMJS0JyfPzAkA_v67y4CstzJqwB-JEfwXhEa55jCujbQ_wJUWEAyz-RbCvRfBWnZ55xUuF2V/s1600/windows-hack.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0RlHqD7D5zazszKl8I39Ax8defe3JvesEARXx59JaIYsj9BZHZOKIocc51Q6xyDVxJsGbYMJS0JyfPzAkA_v67y4CstzJqwB-JEfwXhEa55jCujbQ_wJUWEAyz-RbCvRfBWnZ55xUuF2V/s1600/windows-hack.png"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
This is one of the best
method to Hack Windows
XP Administrator
Password. For  hacking admin you must have log in
as guest or limited account. This methodod 
hacking sdmin is very easy. You don&amp;#39;t need any
software or live cd. All
hacking is  done manual. To hack XP admin password follow these steps. Please
backup your files which we are going to use here.&lt;/div&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2011/12/hack-windows-adminadministrator.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0RlHqD7D5zazszKl8I39Ax8defe3JvesEARXx59JaIYsj9BZHZOKIocc51Q6xyDVxJsGbYMJS0JyfPzAkA_v67y4CstzJqwB-JEfwXhEa55jCujbQ_wJUWEAyz-RbCvRfBWnZ55xUuF2V/s72-c/windows-hack.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author><enclosure length="47966" type="image/png" url="http://1.bp.blogspot.com/-ADnObcJEPP8/TK889qE1KbI/AAAAAAAAAeI/zQIR3KCKyl8/s1600/windows-hack.png"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>This is one of the best method to Hack Windows XP Administrator Password. For  hacking admin you must have log in as guest or limited account. This methodod  hacking sdmin is very easy. You don&amp;#39;t need any software or live cd. All hacking is  done manual. To hack XP admin password follow these steps. Please backup your files which we are going to use here. Read more »</itunes:subtitle><itunes:author>Anu Tiger</itunes:author><itunes:summary>This is one of the best method to Hack Windows XP Administrator Password. For  hacking admin you must have log in as guest or limited account. This methodod  hacking sdmin is very easy. You don&amp;#39;t need any software or live cd. All hacking is  done manual. To hack XP admin password follow these steps. Please backup your files which we are going to use here. Read more »</itunes:summary><itunes:keywords>hacking,cracking,computer,security,ethical,hacking,vulnerability,assessment,penetration,testing,sql,injection,cross,site,scripting,web,security,hacking,tools,web,hacking,ethical,hacking,penetration,testing,backtrack,metasploit,wwwhack,Hack</itunes:keywords></item><item><title>PHP Shell - mass mailer, ddoser, connect-back shell, bind shell &amp; more</title><link>http://pctipsbyanu.blogspot.com/2011/12/php-shell-mass-mailer-ddoser-connect.html</link><category>back connect via php</category><category>bind shell backdoor</category><category>Bind shell via php</category><category>DDoser</category><category>Linux</category><category>mass mailer</category><category>mass mailer via php</category><category>PHP</category><category>Programming</category><category>Script</category><category>Shell</category><category>Web Server</category><category>web server fuzzer</category><pubDate>Mon, 26 Dec 2011 19:32:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-97890855430313780</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoMp7-rpGD6kK8HfpOt7feHI5Iqt_TecMW7rNhffOZF8Ib0cVLIY9JEri7rtvF7KbfO9KcsZYSTCnf0H2KwOIFTeXuE2pVvqr8lZfDjnzhWlEnU_Mkd8un3kakbwfMkWKo_JULuZ-0p7Kv/s1600/c.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="298" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoMp7-rpGD6kK8HfpOt7feHI5Iqt_TecMW7rNhffOZF8Ib0cVLIY9JEri7rtvF7KbfO9KcsZYSTCnf0H2KwOIFTeXuE2pVvqr8lZfDjnzhWlEnU_Mkd8un3kakbwfMkWKo_JULuZ-0p7Kv/s400/c.jpeg" width="400"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br&gt;
Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , &lt;br&gt;
A simple Web-Server Fuzzer , DDoser, Back Connect , Bind Shell etc etc ! This shell &lt;br&gt;
has immense capabilities and have been written with some coding standards in mind for better editing and customization.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;i&gt;&lt;b&gt;Customization&lt;/b&gt;&lt;/i&gt;&lt;br&gt;
&lt;br&gt;
1. Email Trace back is set to Off as default and emails will not be sent , If you are setting &lt;br&gt;
This feature on make sure you change the default email address (lionaneesh@gmail.com) to Your email &lt;br&gt;
Address, Please Change it before using.&lt;br&gt;
&lt;br&gt;
2. As default Lock Mode is set to on! This should not be change unless you want your shell exposed.&lt;br&gt;
&lt;br&gt;
3. As default the Anti-Crawler Feature is set to “off” ! Change it to “on” for anti-crawler support , and longer Shell life! &lt;br&gt;
&lt;br&gt;
4. A variable named greatings can be changed to change the Shell&amp;#39;s greating message. &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2011/12/php-shell-mass-mailer-ddoser-connect.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoMp7-rpGD6kK8HfpOt7feHI5Iqt_TecMW7rNhffOZF8Ib0cVLIY9JEri7rtvF7KbfO9KcsZYSTCnf0H2KwOIFTeXuE2pVvqr8lZfDjnzhWlEnU_Mkd8un3kakbwfMkWKo_JULuZ-0p7Kv/s72-c/c.jpeg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author><enclosure length="5189" type="image/jpeg" url="http://1.bp.blogspot.com/-xagiGFu4qcA/TSa5poL8GnI/AAAAAAAAAtY/ltSmuNVUvWc/s1600/c.jpeg"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , A simple Web-Server Fuzzer , DDoser, Back Connect , Bind Shell etc etc ! This shell has immense capabilities and have been written with some coding standards in mind for better editing and customization. Customization 1. Email Trace back is set to Off as default and emails will not be sent , If you are setting This feature on make sure you change the default email address (lionaneesh@gmail.com) to Your email Address, Please Change it before using. 2. As default Lock Mode is set to on! This should not be change unless you want your shell exposed. 3. As default the Anti-Crawler Feature is set to “off” ! Change it to “on” for anti-crawler support , and longer Shell life! 4. A variable named greatings can be changed to change the Shell&amp;#39;s greating message. Read more »</itunes:subtitle><itunes:author>Anu Tiger</itunes:author><itunes:summary>Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , A simple Web-Server Fuzzer , DDoser, Back Connect , Bind Shell etc etc ! This shell has immense capabilities and have been written with some coding standards in mind for better editing and customization. Customization 1. Email Trace back is set to Off as default and emails will not be sent , If you are setting This feature on make sure you change the default email address (lionaneesh@gmail.com) to Your email Address, Please Change it before using. 2. As default Lock Mode is set to on! This should not be change unless you want your shell exposed. 3. As default the Anti-Crawler Feature is set to “off” ! Change it to “on” for anti-crawler support , and longer Shell life! 4. A variable named greatings can be changed to change the Shell&amp;#39;s greating message. Read more »</itunes:summary><itunes:keywords>hacking,cracking,computer,security,ethical,hacking,vulnerability,assessment,penetration,testing,sql,injection,cross,site,scripting,web,security,hacking,tools,web,hacking,ethical,hacking,penetration,testing,backtrack,metasploit,wwwhack,Hack</itunes:keywords></item><item><title>Linux vs Windows</title><link>http://pctipsbyanu.blogspot.com/2011/12/linux-vs-windows.html</link><category>comparsion between linux and windows</category><category>Linux</category><category>linux vs windows</category><category>which one is best linux or windows</category><category>Windows</category><category>windows vs linux</category><pubDate>Mon, 26 Dec 2011 19:17:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-4876915424378945708</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="font-family: inherit; margin-left: 1em; margin-right: 1em;"&gt;
&lt;img alt="windows os vs linux os" class="aligncenter size-large wp-image-10899" height="239" src="http://cdn1.dailytut.com/wp-content/uploads/2011/07/windows-os-vs-linux-os-560x239.jpg" title="windows-os-vs-linux-os" width="560"&gt;&lt;/div&gt;
&lt;br&gt;
&lt;br&gt;
&lt;div style="font-family: inherit; text-align: justify;"&gt;
As anyone who is knowledgeable about computer systems might know, there has long been a war between the operating systems of &lt;strong&gt;Linux and Windows&lt;/strong&gt;. What, precisely does each &lt;strong&gt;operating system&lt;/strong&gt;
 have, which is better suited for the average user’s needs ?  To answer 
that, the pros and cons of the differing systems will be examined.&lt;/div&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2011/12/linux-vs-windows.html#more"&gt;Read more »&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item><item><title>How to protect facebook timeline?</title><link>http://pctipsbyanu.blogspot.com/2011/12/how-to-protect-facebook-timeline.html</link><category>facebook</category><category>facebook timeline</category><category>how to prevent hackers</category><category>Internet</category><category>Network</category><category>protect facebook account</category><category>protect facebook timeline</category><category>protect timeline</category><category>Security</category><category>timeline review</category><category>Tips n Tricks</category><pubDate>Mon, 26 Dec 2011 19:14:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-4251734951219205440</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxlxeig7EX6Cd4XrMLO47uhy_qgiPX9Y2Lufn6_1H_5E8plOXvy_cRUXk1KtGKf0tGNY2QnArOVL8f8_cFVO5LCkLsmW_lV9lFZn-fzBUkkJeigXZVAvnKaYtHtrQm6Q95JYj57pdPxleZ/s1600/evil-Facebook-danger.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="217" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxlxeig7EX6Cd4XrMLO47uhy_qgiPX9Y2Lufn6_1H_5E8plOXvy_cRUXk1KtGKf0tGNY2QnArOVL8f8_cFVO5LCkLsmW_lV9lFZn-fzBUkkJeigXZVAvnKaYtHtrQm6Q95JYj57pdPxleZ/s320/evil-Facebook-danger.jpg" width="320"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style="font-family: inherit; text-align: justify;"&gt;
&lt;strong&gt;Facebook Timeline&lt;/strong&gt; brings great new set of features to give totally a &lt;strong&gt;new facebook&lt;/strong&gt; experience. The recent Facebook Christmas Theme spam gone viral couple of days ago and many profile got infected. It is important to protect your &lt;em&gt;facebook timeline&lt;/em&gt;
 against such spam &lt;a href="http://pctipsbyanu.blogspot.com/search/label/hack?max-results=8" target="_blank"&gt;attacks&lt;/a&gt;, as you will stand as the origin to spread 
the same spam message to your friends profile. You should do little 
modification of &lt;em&gt;privacy settings&lt;/em&gt; to prevent your &lt;strong&gt;friends&lt;/strong&gt; or &lt;strong&gt;friends of friends&lt;/strong&gt; posting on your timeline.&lt;/div&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2011/12/how-to-protect-facebook-timeline.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxlxeig7EX6Cd4XrMLO47uhy_qgiPX9Y2Lufn6_1H_5E8plOXvy_cRUXk1KtGKf0tGNY2QnArOVL8f8_cFVO5LCkLsmW_lV9lFZn-fzBUkkJeigXZVAvnKaYtHtrQm6Q95JYj57pdPxleZ/s72-c/evil-Facebook-danger.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author><enclosure length="10217" type="image/jpeg" url="http://3.bp.blogspot.com/-qwllNRsggTk/Tvh04tz8kcI/AAAAAAAABvI/IeOU2ndL04M/s1600/evil-Facebook-danger.jpg"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Facebook Timeline brings great new set of features to give totally a new facebook experience. The recent Facebook Christmas Theme spam gone viral couple of days ago and many profile got infected. It is important to protect your facebook timeline against such spam attacks, as you will stand as the origin to spread the same spam message to your friends profile. You should do little modification of privacy settings to prevent your friends or friends of friends posting on your timeline. Read more »</itunes:subtitle><itunes:author>Anu Tiger</itunes:author><itunes:summary>Facebook Timeline brings great new set of features to give totally a new facebook experience. The recent Facebook Christmas Theme spam gone viral couple of days ago and many profile got infected. It is important to protect your facebook timeline against such spam attacks, as you will stand as the origin to spread the same spam message to your friends profile. You should do little modification of privacy settings to prevent your friends or friends of friends posting on your timeline. Read more »</itunes:summary><itunes:keywords>hacking,cracking,computer,security,ethical,hacking,vulnerability,assessment,penetration,testing,sql,injection,cross,site,scripting,web,security,hacking,tools,web,hacking,ethical,hacking,penetration,testing,backtrack,metasploit,wwwhack,Hack</itunes:keywords></item><item><title>Create Android apps free for blog/website</title><link>http://pctipsbyanu.blogspot.com/2011/12/create-android-apps-free-for.html</link><category>Android</category><category>android application for blog</category><category>android application for website</category><category>android application free</category><category>Android Applications</category><category>make android application via rss</category><category>make free application</category><category>Mobile</category><pubDate>Mon, 26 Dec 2011 18:40:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-4364545030388281885</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtfFjgJMIq4vGrN6jom38U_kPmeTn1B2sIWiMoxBJu7KU1zEZdQT47WDphs8cJtfaVgXrL7z8sqIzrKyoxtzTOIgclqzidnhy_2YzpqqJ_ryWNnoWQ3Kdd4PPTOLFJQ340cavscGefGhj-/s1600/How-To-Make-Android-Apps.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtfFjgJMIq4vGrN6jom38U_kPmeTn1B2sIWiMoxBJu7KU1zEZdQT47WDphs8cJtfaVgXrL7z8sqIzrKyoxtzTOIgclqzidnhy_2YzpqqJ_ryWNnoWQ3Kdd4PPTOLFJQ340cavscGefGhj-/s1600/How-To-Make-Android-Apps.jpg"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style="font-family: inherit; text-align: justify;"&gt;
Android is one of the fast growing 
mobile platform in the existing ones. It is because of the interactive 
user interface and applications available for &lt;a href="http://pctipsbyanu.blogspot.com/search/label/Android?max-results=8" target="_blank" title="Android"&gt;android&lt;/a&gt;. Officially more than &lt;strong&gt;one million apps&lt;/strong&gt; are available for android and each one of them have a unique functionality. If you have your own &lt;strong&gt;android application for your blog or &lt;a href="http://pctipsbyanu.blogspot.com/search/label/Web+Site?max-results=10" target="_blank"&gt;website&lt;/a&gt;&lt;/strong&gt; surely it will generate a good traffic for your blog.&lt;/div&gt;
&lt;span style="font-family: inherit;"&gt;
&lt;/span&gt;&lt;div style="font-family: inherit; text-align: justify;"&gt;
Here are the steps to create your own &lt;strong&gt;android application for free&lt;/strong&gt;, to be more specific, this tutorial will help you to &lt;strong&gt;create an android application for website&lt;/strong&gt; or &lt;strong&gt;create an android app for your rss feeds&lt;/strong&gt;.&lt;/div&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2011/12/create-android-apps-free-for.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtfFjgJMIq4vGrN6jom38U_kPmeTn1B2sIWiMoxBJu7KU1zEZdQT47WDphs8cJtfaVgXrL7z8sqIzrKyoxtzTOIgclqzidnhy_2YzpqqJ_ryWNnoWQ3Kdd4PPTOLFJQ340cavscGefGhj-/s72-c/How-To-Make-Android-Apps.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author><enclosure length="41534" type="image/jpeg" url="http://2.bp.blogspot.com/-nWrAFWWP3RA/Tvhw4rNq35I/AAAAAAAABu8/epALJPlI_Fg/s1600/How-To-Make-Android-Apps.jpg"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Android is one of the fast growing mobile platform in the existing ones. It is because of the interactive user interface and applications available for android. Officially more than one million apps are available for android and each one of them have a unique functionality. If you have your own android application for your blog or website surely it will generate a good traffic for your blog. Here are the steps to create your own android application for free, to be more specific, this tutorial will help you to create an android application for website or create an android app for your rss feeds. Read more »</itunes:subtitle><itunes:author>Anu Tiger</itunes:author><itunes:summary>Android is one of the fast growing mobile platform in the existing ones. It is because of the interactive user interface and applications available for android. Officially more than one million apps are available for android and each one of them have a unique functionality. If you have your own android application for your blog or website surely it will generate a good traffic for your blog. Here are the steps to create your own android application for free, to be more specific, this tutorial will help you to create an android application for website or create an android app for your rss feeds. Read more »</itunes:summary><itunes:keywords>hacking,cracking,computer,security,ethical,hacking,vulnerability,assessment,penetration,testing,sql,injection,cross,site,scripting,web,security,hacking,tools,web,hacking,ethical,hacking,penetration,testing,backtrack,metasploit,wwwhack,Hack</itunes:keywords></item><item><title>Auto rooting script : Hack PC with script</title><link>http://pctipsbyanu.blogspot.com/2011/12/auto-rooting-script-hack-pc-with-script.html</link><category>auto rooting</category><category>auto-rooting</category><category>Backdoor in perl</category><category>Download</category><category>hack</category><category>Hack Linux</category><category>hack pc with script</category><category>Linux</category><category>Perl</category><category>Programming</category><category>Root access</category><category>Script</category><category>script download</category><pubDate>Sat, 24 Dec 2011 10:07:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8233510296460619742.post-4105238694148864220</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPrldB113kyWCAfBEqz2P2IrGn9wiRQ5Jf6H4Yb0sB28uO1bgpmyzego1JUCl2YaebYR3ngNu1DxppSzwHOUjINBW1gdd_P8M0fSQa6wt1rZv07ytVxIGikSNsXniR_0j2sj2jExQm4Jhv/s320/terminal.png" width="320"&gt;&lt;/div&gt;
&lt;br&gt;
This is the auto-rooting script that is written for Linux, SunOS, Mac OS X, and FreeBSD.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;/div&gt;&lt;a href="http://pctipsbyanu.blogspot.com/2011/12/auto-rooting-script-hack-pc-with-script.html#more"&gt;Read more »&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPrldB113kyWCAfBEqz2P2IrGn9wiRQ5Jf6H4Yb0sB28uO1bgpmyzego1JUCl2YaebYR3ngNu1DxppSzwHOUjINBW1gdd_P8M0fSQa6wt1rZv07ytVxIGikSNsXniR_0j2sj2jExQm4Jhv/s72-c/terminal.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>admin@pctipsbyanu.tk (Anu Tiger)</author></item></channel></rss>