India Vs Srilanka - CWC Final

Twenty eight years from that glorious June day at the Lord's, Indian cricket is yet again one win away from being the undisputed world champions.

The next four years may see a sway in fortunes, a change in the ICC rankings, and even a change in the team composition. One thing, however, will remain constant. We will be the World Champions. And we will travel Down Under for the next edition of the Cricket World Cup in 2015 as the holders. And all of this is just one win away.

India beat Pakistan - World cup Semi Finals

The battle of all battles lived up to its top billing. This was the blockbuster India-Pakistan semi-final that everyone had anticipated - in many ways the final before the final in the ICC World Cup.

Basics Of TCP/IP

TCP/IP is the protocol used for communication over the Internet and on most computer networks today. This article will explain the key concepts of how TCP/IP works . Original source of the article  - Hackthissite Modified by me  

Basics Of TCP/IP

In this article, we will take a look at the TCP/IP protocol stack to help us better understand how TCP/IP functions in the network. We'll look at the Department of Defense (DoD) protocol layers and the Open Systems Interconnect (OSI) model to help us better understand how the protocols and utilities function at the various layers. This is what I think to be a very easy ISO/OSI and DoD overview. But I guess that will be up to the readers.

India Vs Pakistan Cricket Match - Who Will Win ?

This is totally off topic but i was so interested to post this , original source of the article

India Vs Pakistan Cricket Match - Who Will Win ?

MOHALI: This match is going to be the biggest for the entire World Cup as two arch-rivals, India and Pakistan, are going to take on each other.
ICC Cricket World Cup 2011: Second Semi-Final - Pakistan vs India


If they were writing scripts, this is how they would have done it. First, let three of the four sub-continent teams make it to the quarter finals, with the fourth, Bangladesh, falling agonisingly short.
Next, they had the main hosts India beat the reigning champions Australia in a close match to effectively pass the baton. Then they had New Zealand upset South Africa to make sure that the chances of having 2 sub-continent teams in the final are very high. Then they had India vs Pakistan in the semi finals.

Man In The Middle Attack Using Ettercap

Mr Terence Kevin who is one of my blog readers requested me to write an article on EttercapEttercap is a suite for man in the middle attacks on LAN (local area network ). It features sniffing of live connections, content filtering on the fly and many other interesting tricks.It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. In this tutorial i will explain how to sniff (user names,passwords) in LAN using Ettercap

Hacker High school -e Book Download

The Hacker High school project is the development of license-free, security and privacy awareness teaching materials and back-end support for teachers of elementary, junior high, and high school students.
Today's teens are in a world with major communication and productivity channels open to them and they don't have the knowledge to defend themselves against the fraud, identity theft, privacy leaks and other attacks made against them just for using the Internet. This is the reason for Hacker High school.

Guidelines For Creating Strong Passwords

Its been a while since i wrote a Security article , Today i will be sharing some Guidelines For Creating  Strong Passwords .This article was originally written by .and its been modified by me.
Choosing the right password is something that many people find difficult, there are so many things that require passwords these days And remembering them all can be a real problem.Because of this a lot of People choose their passwords very badly. The simple tips given below are intended to assist you in choosing a good password

How To Surf The Web Anonymously With Tor and Vidalia

In one of my previous post  How to surf the web anonymously with proxies i explained the use and  Importance  of a proxy ?, why you need to stay anonymous ? ..etc .In this post i will explain How you can use Tor and Vidalia to surf the web anonymously

Crypter Software To Bypass Antivirus Detection

What is Crypter?

Crypter is a  software used to hide our viruses, keyloggers or tools from antiviruses so that they are not detected  by antiviruses. Thus, a crypter is a program that allow users to crypt the source code of their program. Generally, antivirus work by splitting source code of application and then search for certain string within source code. If antivirus detects any certain malicious strings, it either stops scan or deletes the file as virus from system.

What does Crypter do?

Crypter simply assigns hidden values to each individual code within source code. Thus, the source code becomes hidden. Hence, our crypted file  becomes  UD (undetactable ) or FUD (fully undetectable )

Hack Windows Administrator passwords Using Stick keys

Ever wanted to hack administrator accounts in college/school Pcs . so that you can download with full speed or just wanted to hack your friend’s PC to make him gawk when you tell your success story of hacking ? well there's a great way of hacking Windows administrator password which works 100 % even today......  interested ? read on ......

How To Use Trial Software's For Ever

How to Make a spoofed call

Caller ID is one of those things that many of us both love and hate. It’s great because if you are getting a call from that annoying neighbor down the street, you can skip it. However, it’s bad at times if the caller ID isn’t who you think it is .this method of using some ones number is called Caller ID spoofing

Caller ID spoofing is the act of making the telephone network to display any desired (Fake) number on the recipients Caller ID . It displays the fake number instead of the original number.With Caller ID spoofing we can make a call appear to have come from any phone number that we  wish. Have you ever wondered how to perform Caller ID spoofing? Read on to know how to a make a spoofed call  in few easy steps

10 Reasons Why PCs Crash

If your using PCs for a while you must have know that systems tend to act peculiarly at  times like rebooting, getting stuck in middle of a program  , or even getting corrupted . The following are the most common reasons why PCs crash 

How To Make a Bootable Backtrack CD / USB

In one of my previous post i explained how to install a Backtrack on Vmware . Today i will teach how to boot backtrack from CD/Usb .This method might come very handy when you are in schools, offices where you cant install third party software's . Backtrack is a Linux distro with all  the essential tools required for penetration testing this makes it a  must have Arsenal for every pentester .For those who don't know what backtrack is can read my previous article.from Here
© 101hacker | Design by Mukund edited by John
Powered by Blogger