Reference

Ankit Fadia Hacking Guide

February 26, 2018 at 8:26 am 0 comments

[pdf-embedder url=”https://th3stars.com/wp-content/uploads/2018/02/Ankit-Fadia-Hacking-Guide.pdf” title=”Ankit Fadia Hacking Guide”]

Advanced Search by Google

February 26, 2018 at 4:41 am 0 comments

[pdf-embedder url=”https://th3stars.com/wp-content/uploads/2018/02/Advanced-Search-by-Google.pdf” title=”Advanced Search by Google”]

A Guide to Facebook Security

February 26, 2018 at 3:41 am 0 comments

[pdf-embedder url=”https://th3stars.com/wp-content/uploads/2018/02/Guide-to-Facebook-Security.pdf” title=”Guide to Facebook Security”]

Computer Virus & Its Types (Name and Description)

February 26, 2018 at 3:22 am 0 comments

   Types of Viruses: 1. Resident Viruses Resident viruses are the other basic level of file infectors. These type of viruses not infect your computer direct, infact they install themselves on computer. It allows them to work even when the original source of the infection has been eradicated. On theRead More

The Basics of Protecting Against Computer Hacking

February 26, 2018 at 3:10 am 0 comments

[pdf-embedder url=”https://th3stars.com/wp-content/uploads/2018/02/The-Basics-of-Protecting-Against-Computer-Hacking.pdf” title=”The Basics of Protecting Against Computer Hacking”]

A Beginners Guide To Hacking Computer Systems

February 26, 2018 at 3:02 am 0 comments

[pdf-embedder url=”https://th3stars.com/wp-content/uploads/2018/02/A-Beginners-Guide-To-Hacking-Computer-Systems.pdf” title=”A Beginners Guide To Hacking Computer Systems”]

Complete Penetration Testing & Hacking Tools List

February 25, 2018 at 7:22 am 0 comments

Penetration Testing & Hacking Tools List Contents Online Resources Penetration Testing Resources Exploit Development Open Source Intelligence (OSINT) Resources Social Engineering Resources Lock Picking Resources Operating Systems Tools Penetration Testing Distributions Docker for Penetration Testing Multi-paradigm Frameworks Vulnerability Scanners Static Analyzers Web Scanners Network Tools Wireless Network Tools Transport LayerRead More

40+ Free Best Tools that will help your become a powerful Hacker

February 25, 2018 at 4:58 am 0 comments

In this article we are going to share 50 free best tools that will help you on your way to become a powerful hacker. We are going to start with password cracking software. Password Cracker Software It is often referred as the password recovery tool which can be used toRead More

Cracking Tutorial Compilation Vol.1

February 24, 2018 at 5:52 pm 0 comments

[pdf-embedder url=”https://th3stars.com/wp-content/uploads/2018/02/Cracking.Tutorial.Compilation.Vol_.1.Tikka_.Wang_.pdf” title=”Cracking.Tutorial.Compilation.Vol.1.Tikka.Wang”]

Linux-101-Hacks

February 24, 2018 at 5:13 pm 0 comments

[pdf-embedder url=”https://th3stars.com/wp-content/uploads/2018/02/Linux-101-Hacks.pdf”]

Cracking Passwords Guide

February 24, 2018 at 4:50 pm 0 comments

[pdf-embedder url=”https://th3stars.com/wp-content/uploads/2018/02/Cracking_Passwords_Guide.pdf”]

Delete An Undeletable File

February 24, 2018 at 4:13 pm 0 comments

Delete An “undeletable” File Open a Command Prompt window and leave it open. Close all open programs. Click Start, Run and enter TASKMGR.EXE Go to the Processes tab and End Process on Explorer.exe. Leave Task Manager open. Go back to the Command Prompt window and change to the directory theRead More

Bandwidth Explained!

February 24, 2018 at 3:17 pm 0 comments

This is well written explanation about bandwidth, very useful info. BandWidth Explained Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between yourRead More

10 Reasons why PCs Crash U Must know

February 24, 2018 at 3:07 pm 0 comments

10 reasons why PCs crash U must Know Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.” You have just beenRead More

Hacking Webpage – The Ultimate Guide

February 24, 2018 at 7:03 am 0 comments

Hacking Webpage – The Ultimate guide Author : Virtual Circuit and Psychotic Well Psychotic wrote one of the most helpful unix text files in cyberspace but with the mail that we recieved after the release of our famous 36 page Unix Bible we realised that unix isn’t for everybody soRead More

Ad and Spam Blocking

February 24, 2018 at 6:14 am 0 comments

Ad and Spam Blocking for Neophytes / written by yours truly, R a v e N (blacksun.box.sk) version 1.8, 9/9/1999 Converted to HTML by Penguin Note: whenever you see something like this: blah(1) it means that if you don’t understand the meaning of the word blah there’s an explanation about itRead More

Secure Sockets Layer or SSL

February 24, 2018 at 3:27 am 0 comments

______________________________________________________________ Secure Sockets Layer or SSL Torn Apart By Ankit Fadia ankit@bol.net.in _______________________________________________________________ Secure Sockets Layer or SSL is a secure protocol, which is the reason why secure E-Commerce and E-Banking is possible. It has become the de facto standard for secure and safe only transactions. When Netscape first developed SSL,Read More

IP How To

February 24, 2018 at 2:53 am 0 comments

Before you can change your IP you need some information. This information includes your IP range, subnet mask, default gateway, dhcp server, and dns servers. 1. Getting your IP range – Getting information about your IP range is not difficult, I recommend using Neo Trace on your own IP. ButRead More

Misc Linux Tips & Tricks

February 24, 2018 at 2:48 am 0 comments

Tips Speeding up your hard drive (#1) Get faster file transfer by using 32-bit transfers on your hard drive Just add the line: hdparm -c3 /dev/hdX to a bootup script. If you use SuSE or other distros based on SYS V, /sbin/init.d/boot.local should work for you. This enables 32-bit transferRead More

Backtracking EMAIL Messages

February 24, 2018 at 2:31 am 0 comments

Backtracking EMAIL Messages Tracking email back to its source: Twisted Evil cause i hate spammers… Evil or Very Mad Ask most people how they determine who sent them an email message and the response is almost universally, “By the From line.” Unfortunately this symptomatic of the current confusion among internetRead More

Hacking On Telnet Explained

February 23, 2018 at 9:12 am 0 comments

Telnet: the Number One Hacker Tool   In this Guide you will learn: What is telnet? How to telnet How to get telnet accounts <begin11c.shtml> Why you might not want to telnet <begin11c.shtml> How to install a telnet server on your home Windows computer <begin11c.shtml> How to turn off aRead More

Proxy How To

February 23, 2018 at 8:49 am 0 comments

Proxies What is a Proxy Server? A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. I know many are looking for IP MaskersRead More

Telnet Trick Port 25

February 23, 2018 at 6:31 am 0 comments

Network solutions shut down that nifty telnet thing on whois.intenic.net on the default telnet port (25), despite many protests. However, there is something fun you can do with telnet with whois.internic.net or any other cooperating domain name server. At your DOS prompt in Windows (search for command.com or cmd.exe toRead More

Introduction to Buffer Overflow

February 23, 2018 at 3:30 am 0 comments

Introduction to Buffer Overflow by Ghost_Rider Intro Hello, here I am again, this time I’ll let you know what is in fact buffer overflow and how you can detect if some program is vulnerable to buffer overflow exploits. This tutorial has C source code, so if you don’t know CRead More

20 Great Google Secrets

February 21, 2018 at 4:51 pm 0 comments

20 Great Google Secrets http://www.pcmag.com/article2/0,4149,1306756,00.asp excl.gif No Active Links, Read the Rules – Edit by Ninja excl.gif Google is clearly the best general-purpose search engine on the Web (see www.pcmag.com/searchengines But most people don’t use it to its best advantage. Do you just plug in a keyword or two andRead More

Anonymity

February 21, 2018 at 4:43 pm 0 comments

Anonymity complete GUIDE By Theraider & Dangerous R. Anonymity on the web [ t a b l e o f c o n t e n t s ] 01 – table of contents 02 – introduction 03 – first tips 04 – about proxies 05 – cookies 06 –Read More