Latest Post

Get back control over Windows updates with StopUpdates10.

Window is may be the most popular OS being used in the world and Windows 10 is the latest initiation. It has its many good points but one of most unpopular aspects is its updates. Updates are fine and is a welcome treat to keep your computer safe and running well. 

But what is frustrating is how it can interrupt your work or about to work and reboots your computer on its own in order to install the updates. And that there in nothing you can do to stop it until StopUpdates10 came along.

This app can stop Windows updates, even the forced ones. Upgrade notifications that keeps you bugged and are annoying to boot are stopped too with this app. It blocks policy registry keys to block updates and blocks several processes that are used for updating. It is small and easy to use. This app does not delete the files and change the file rights on the updates. 

Control updates with StopUpdates10

DOWNLOAD

Update drivers in your PC with Snappy Driver Installer. 

There is an application that you can use to update or installing your drivers and that application is Snappy Driver Installer. This is a handy program that you can use when there is no internet connection around in which you need to install drivers on new computers or just updating it.  

This program is written in C/C++, has fast indexing of files, is portable, automatic updating over the internet, state of the art algorithm, support for driverpacks and folders, virus warnings and more. 



Put your driverpacks on with this application.

Make it convenient to install and update drivers in your PC with Snappy Driver Installer

DOWNLOAD


EDITORS REVIEW
Virtualization software allows the use of different operating systems, operating at the same time, without rebooting. A great tool for users who need to run applications written for Mac OS X on their Windows 7 PC, for example is VirtualBox. It offers free virtualization for any x86 or AMD64/Intel64 computer. It supports not only the two aforementioned OS's, but Vista, XP, 2000, Linux, and many more.
VirtualBox is a free x86 virtualization software developed by Oracle Corporation that runs along with different platforms including Windows, Linux and Mac.


VirtualBox features modularity with sophisticated programming interface and client/server design, making it more efficient to use. It can toggle along from one virtual machine GUI or from command line and remote access. It also features Guest Addition for different operating systems and it includes mouse pointer integration and screen solutions.

VirtualBox also has three additional enhancements for the latest version and these include Virtual USB controllers, Remote Desktop Protocol and USB over DRP.



What is Telegram Messenger?

 Telegram Messenger is a messaging app that works over the internet, just like WhatsApp or Facebook Messenger. That means you can send messages for free by using a wi-fi connection or your mobile data allowance (providing you have enough data). According to Telegram, the service has more than 200 million monthly active users. It launched in 2013.

 How does it differ from other messaging apps?

 Telegram’s main selling point is security. It claims all its activities – including chats, groups and media – are encrypted, meaning even if they are intercepted, they won’t be visible without being deciphered first. However, some security experts have cast doubt on how secure Telegram is.

 Which devices can use Telegram?

 Telegram can be used on smartphones, tablets, laptops and desktop computers. The Telegram app is available for Android, iOS, Windows Phone, Windows NT, macOS and Linux. 


 Who uses Telegram? 

All sorts of people, but it has gained notoriety as the terrorists’ messaging app of choice. It was reportedly used by ISIS, who recommended it to its supporters and members because of its security features. Telegram responded by blocking public channels operated by ISIS to spread propaganda. But it refused to censor private messages based on “local restrictions on freedom of speech”.

 Why was it banned in Russia? 

Recently, a Russian court ruled that Telegram should be banned because the service refused to hand over user data. The Russian authorities claim this was to combat terrorism.

Link download:



In this tutorial "How to Randomly Hack a Home Routers", we are going to show you how to use port scanner to identify home routers (and even office routers :p) and after that we will try to log in to those routers.



In the world most of users doesn't change there router's default password because most of them only know how to use without know how to configure the router itself. So that's the point. We can use that vulnerability to hack the routers.
Requirements:
  • Port Scanner (I use zenmap )
  • Web Browser (I use Google Chrome)
  • Internet Connection
First of all I want to tell you why I use Zenmap because Nmap is the best friend of hackers and Zenmap is the graphical user interface of nmap.

Step by Step How to Randomly Hack a Home Routers

1. We should select an IP range. I have selected IP range that includes my public IP address.
XXX.XXX.30.0-XXX.XXX.30.255

2. Now let's scan for home routers.
When you finished your scan, You can find IP addresses which has open ports such as http port(80), ftp port(21) and telnet port(23).
I have found many IP addesses with port 80 is opened.

How to Randomly Hack a Home Routers
So I stopped my scan.

3. Now you can access these addesses using your web browser because http port is opened and we need to find whether the web page is router log in page.


4. If you see the alert error messages, it says TD-8817. So we can Google for it
search "TD-8817 default username and password"

5. Now let's try to access these IP addresses using default logins we just got on step 4.
Default username and passwords are not same for every routers.
With username : admin and password : admin, we can log in to the router administration page

Attacker can do several harmful things when they can access router page, such as:
  • Redirecting DNS to malicious websites
  • Phishing Attacks
  • etc

Conclusion:
Because most of users doesn't change their router passwords. It's a very bad habit because hackers can access your router form anyplace through internet when you are online and It is very harmful to you. So you must change your home router's password. Keep it on you mind.

Hope you found it useful 🙂

Hello, in this tutorial you will learn how to Create Password Stealer using VB Visual Studio.net that send the passwords of the victim to your email.

The recovery files + code.txt (which include the code written bellow) + the visual basic project.
DOWNLOAD HERE
REQUIREMENTS:
1) A mail.com account (their stmp is open and available for 3rd party apps)
2) Basic knowledge in vb.
3) Visual Studio 2008 or more (there is a free version however I will be using the ultimate version of 2013)
4) Nirsoft password recovery bins
5) A victim.

OVERVIEW:
We are going to create an exe file when opened it extracts 4 application which recover saved password on famous web browsers (chrome, Firefox ..Etc.) then launches them in command line mode , they will export the saved password into a text file which will be read by our app then sent to us by email.
We are using vb.net because it is a very easy programming language and it is common in malicious software.

Step by Step How to Create Password Stealer using VB Visual Studio.net:

1)    Open visual studio and create a new project like this
2)    You will get something like this , it is called the designer here you choose how your app looks like, but for our app we want it to be silent and not visible.

3)    Right click on this form and click “View Code <>”
You will get something like this, this is where we put out code.

This is called an event handler, whatever code you put between this and “End Sub” will be executed when the program first opens (before it appears).

4)    Now we need to add the nirsoft password recovery programs to our resources so on your right you need to click on the solution explorer

Then you need to click on My Project, this should appear

Click on resources -> add resource -> add existing file..
A dialog will appear choose the 4 files you downloaded (1.exe , 2.exe , 3.exe  ,3.exe)

5)    Now go back to the coding section and write this code (explained in the green text)

6)    Now we need to click Ctrl – Shift – B  to build our exe (it should show where it saved the exe like in the picture)

CONCLUSION:
You should not open any random exe files unless you are sure it is safe , a tip would be scanning it on virus total or similar sites , what I personally do is open said programs in Sandboxi

Notes: if you are having problems building the project turn off your anti-virus.

Author Name

Biểu mẫu liên hệ

Tên

Email *

Thông báo *

Được tạo bởi Blogger.