Friday 5 July 2013

DriverPack Solution 13 Full Version [ for all windows ]

DriverPack Solution 13 Full Version [ for all windows ] 

-----------------------------------------------


DriverPack Solution 13 - is the latest version of the most popular program to automatically install the drivers. This version contains a number of new features and optimized for all platforms (x86-x64), and significantly simplifies the process of reinstalling Windows on virtually any computer. You will now be spared the trouble of finding and installing drivers, reducing them to a few clicks!

Automatic installation of drivers:

Install the DriverPack Solution on almost any computer for only about 5 minutes.
Saving of time
After downloading the Driver Pack Solution once no longer need to spend time searching for drivers.

Windows XP / Vista / 7 (x86-x64)

Supports all modern operating systems!
As a 32-and 64-bit version
Ease of use
Simple and intuitive interface.
Any driver for any computer
All the drivers on a single DVD-ROM
Simplify downloading new drivers from the Internet.
Ability to update drivers
Update the existing driver to more recent versions.
The program is suitable for all models of computers.
That includes free drivers for laptops: Asus, Acer, Sony, Samsung, HP, Lenovo, Toshiba, Fujitsu-Siemens, DELL, eMachines, MSI .

 Download

Download:

Passwd:www.tknowmore.blogspot.com

No comments

Free Download : CEH [ Certified Ethical Hacker Ebooks ] -

Free Download : CEH [ Certified Ethical Hacker Ebooks ] -

-----------------------------------------------

 1: Student Introduction
2: Introduction to Ethical Hacking
3: Hacking Laws
4: Footprinting
5: Google Hacking
6: Scanning
7: Enumeration
8: System Hacking
9: Trojans and Backdoors
10: Viruses and Worms
11: Sniffers
12: Social Engineering
13: Phishing
14: Hacking Email Accounts
15: Denial of Service
16: Session Hijacking
17: Hacking Webservers
18: Web Application Vulnerabilities
19: Web based Password Cracking Techniques
20: SQL Injection
21: Hacking Wireless Networks
22: Physical Security
23: Linux Hacking
24: Evading IDS Firewall and Honeypot
25: Buffer Overflows
26: Cryptography
27: Penetration Testing
28: Writing Virus Codes
29: Assembly Language Tutorial

30: Exploit Writing 1
31: Exploit Writing 2 

32: Exploit Writing 3
33: Reverse Engineering Techniques
34: MAC OS X Hacking
35: Hacking Routers, Cable Modems and Firewalls
36: Hacking Mobile Phones, PDA and Handheld Devices
37: Bluetooth Hacking
38: VoIP Hacking
39: RFID Hacking
40: Spamming
41: Hacking USB Devices
42: Hacking Database Servers
43: Cyber Warfare- Hacking Al-Qaida and Terrorism
44: Internet Content Filtering Techniques
45: Privacy on the Internet
46: Securing Laptop Computers
47: Spying Technologies
48: Corporate Espionage by Insiders
49: Creating Security Policies
50: Software Piracy and W
51: Hacking and Cheating Online Games
52: Hacking RSS and Atom.

53: Hacking Web Browsers
54: Proxy Server Technologies
55: Preventing Data Loss
56: Hacking Global Positioning System
57: Computer Forensics and Incident Handling
58: Credit Card Frauds
59: How to Steal Passwords
60: Firewall Technologies
61: Threats and Countermeasures
62: Case Studies
63: Botnets
64: Economic Espionage
65: Patch Management
67: Security Convergence
68: Identifying the Terrorists
69: prova 312-50
70: CEH - Classroom Lab Setup v6 -

& Many More:--

Download:

1st Part

2nd Part

3rd Part

4th Part

5th Part

6th Part

Password:- Maya Badmash

Password:- Maya Badmash
No comments

Chrome Crypter v5.3 Free Download [ 100% FUD ] UPDATED -

Chrome Crypter v5.3 Free Download [ 100% FUD ] UPDATED - 

 

--------------------------------------------------------------------------------------------------------------------------------

-------------------------------------------------------------------------------------


Chrome Crypter v5.3 Free Download [ 100% FUD ] UPDATED - See more at: http://blackhatcrackers.blogspot.in/2013/03/chrome-crypter-v53-free-download-100.html#sthash.TZl9Mu1P.dpuf
No comments

Encrypting Your Hard disk!!

Encrypting Your Hard disk!!

Using True Crypt:-

 Get it From Here:-

 

 

 

----------------------------------------------

Creating A Volume

Step 1: Download TC and open it.

Step 2: Click any "letter" and press create volume. - See more at: http://blackhatcrackers.blogspot.in/2013/06/how-to-encrypt-your-hard-drive.html#sthash.vuf0RVk6.dpuf

 Creating A Volume

Step 1: Download TC and open it.

Step 2: Click any "letter" and press create volume. - 

As Shown In Above Image!!

Step 3: Now click next 3 times.
Step 3: Now click next 3 times.

Step 4: Now press select file and save it somewhere hidden, for this tutorial I saved it to my desktop. - 
Step 5: Now click next with the settings I have on this picture 

Step 6: Here is where you can choose the size of the hidden drive. The bigger the longer it will take to format. - 
Step 7: Now choose a GOOD password. People can crack it. Use numbers, capital letters, symbols.
Step 8: Now once you are at this part, move your mouse in the box of True Crypt, this is a must -
Step 9: Now you will have a file like this, be sure to keep this file in a hidden place. Do Not Lose It.
-----------------------------------------------------------------------------------------------------------------------------

Opening The Volume:-
Step 1: Press select file and find your file, then click on mount.

Step 2: Now Put Your Password ..
Step 3:Now U Shud See like Above image!!

Now Go to Your Computer you Should See a Hidden Drive ,You Can Store Anything What You Want!!
----------------------------------------------------------------------

No comments

Websploit Toolkit!!--


WebSploit Is An Open Source Project For Scan And Analysis Remote System From Vulnerability


[+]Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector - inject reverse & bind payload into file format
[+]phpmyadmin - Search Target phpmyadmin login page
[+]lfi - Scan,Bypass local file inclusion Vulnerability & can be bypass some WAF
[+]apache users - search server username directory (if use from apache webserver)
[+]Dir Bruter - brute target directory with wordlist
[+]admin finder - search admin & login page of target
[+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+]MITM - Man In The Middle Attack
[+]Java Applet Attack - Java Signed Applet Attack
[+]MFOD Attack Vector - Middle Finger Of Doom Attack Vector
[+]USB Infection Attack - Create Executable Backdoor For Infect USB For Windows

DOWNLOAD LINK: https://adf.ly/Ni5sA
No comments

Labels

Games