Hacking Webpage – The Ultimate Guide

Reference February 24, 2018 at 7:03 am 0 comments

Hacking Webpage – The Ultimate guide Author : Virtual Circuit and Psychotic Well Psychotic wrote one of the most helpful unix text files in cyberspace but with the mail that we recieved after the release of our famous 36 page Unix Bible we realised that unix isn’t for everybody soRead More

Ad and Spam Blocking

Reference February 24, 2018 at 6:14 am 0 comments

Ad and Spam Blocking for Neophytes / written by yours truly, R a v e N ( version 1.8, 9/9/1999 Converted to HTML by Penguin Note: whenever you see something like this: blah(1) it means that if you don’t understand the meaning of the word blah there’s an explanation about itRead More

Secure Sockets Layer or SSL

Reference February 24, 2018 at 3:27 am 0 comments

______________________________________________________________ Secure Sockets Layer or SSL Torn Apart By Ankit Fadia _______________________________________________________________ Secure Sockets Layer or SSL is a secure protocol, which is the reason why secure E-Commerce and E-Banking is possible. It has become the de facto standard for secure and safe only transactions. When Netscape first developed SSL,Read More

IP How To

Reference February 24, 2018 at 2:53 am 0 comments

Before you can change your IP you need some information. This information includes your IP range, subnet mask, default gateway, dhcp server, and dns servers. 1. Getting your IP range – Getting information about your IP range is not difficult, I recommend using Neo Trace on your own IP. ButRead More

Misc Linux Tips & Tricks

Reference February 24, 2018 at 2:48 am 0 comments

Tips Speeding up your hard drive (#1) Get faster file transfer by using 32-bit transfers on your hard drive Just add the line: hdparm -c3 /dev/hdX to a bootup script. If you use SuSE or other distros based on SYS V, /sbin/init.d/boot.local should work for you. This enables 32-bit transferRead More

Backtracking EMAIL Messages

Reference February 24, 2018 at 2:31 am 0 comments

Backtracking EMAIL Messages Tracking email back to its source: Twisted Evil cause i hate spammers… Evil or Very Mad Ask most people how they determine who sent them an email message and the response is almost universally, “By the From line.” Unfortunately this symptomatic of the current confusion among internetRead More

Hacking On Telnet Explained

Reference February 23, 2018 at 9:12 am 0 comments

Telnet: the Number One Hacker Tool   In this Guide you will learn: What is telnet? How to telnet How to get telnet accounts <begin11c.shtml> Why you might not want to telnet <begin11c.shtml> How to install a telnet server on your home Windows computer <begin11c.shtml> How to turn off aRead More

Proxy How To

Reference February 23, 2018 at 8:49 am 0 comments

Proxies What is a Proxy Server? A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. I know many are looking for IP MaskersRead More

Telnet Trick Port 25

Reference February 23, 2018 at 6:31 am 0 comments

Network solutions shut down that nifty telnet thing on on the default telnet port (25), despite many protests. However, there is something fun you can do with telnet with or any other cooperating domain name server. At your DOS prompt in Windows (search for or cmd.exe toRead More

Introduction to Buffer Overflow

Reference February 23, 2018 at 3:30 am 0 comments

Introduction to Buffer Overflow by Ghost_Rider Intro Hello, here I am again, this time I’ll let you know what is in fact buffer overflow and how you can detect if some program is vulnerable to buffer overflow exploits. This tutorial has C source code, so if you don’t know CRead More