Skip to main content

Posts

Showing posts from December, 2014

How to download files from BitTorrent and about the Bit Torrent in detail.

        Downloads Using BitTorrent Files This article provides all the information you need to start using torrent files. BitTorrent is currently the best solution for downloading anything you can imagine. What is BitTorrent? BitTorrent is a P2P (peer to peer) files sharing format created by Bram Cohen. If you don't know what peer to peer is, click here . BitTorrent works a little differently than Kazza, WinMX, and the rest of the P2P clients everyone is used to. While Kazza lets you search for files within its network, BitTorrent does not. This is good and bad. On a good note, bad people like the RIAA can't regulate BitTorrent as it is not a service, but a method of delivery. On the down side, finding what you want may take a few mintues but there are plenty of sites out there with a wealth of links. What Can I Download with BitTorrent? I have listed some of the most common files and file types available below: Music (Mp3, AAC, etc) Movies (DivX,

About Basic Networking Topology

           Basic Networking Topology This article describes common topologies used for networking. These are a very basic examples, and large networks often use a combination of two or more topologies. Introduction The term "topology" is used to describe the infrastructure of a network. It is a basic map or scheme of how the network is constructed. Viewing the topology of a network is a lot like looking at the map of city. You can see the central points or landmarks. Popular points of the cities are usually surrounded by a dense population of residents. The same is true for computer networks. The popular points (usually servers) are surrounded by residents (client machines) that connect to the server. If you read a networking book about topology, they will probably cover the physical types of topologies like star, ring, bus, and mesh. While these were all commonly used topologies at one point in time, star is the primary topology used today.

How to maintain IP Ports and it's working in detail.

                              IP Ports This article describes ports, how they are used, and how they work. P orts were developed so that network devices and computers could accept data from multiple sources over the same IP address. Here is a simple example. Your TV service is the Internet, and the ports are your channels . You have many forms of entertainment, news, and information available through many different channels. Lets say 9xM is channel 85 on your TV. The same is true for web servers that run on port 80. Every port has a special purpose just as each channel serves a different television program. While you only have 1 cable TV subscription, you can still receive multiple channels. Two main types of ports: TCP and UDP. TCP stands for Transmission Control Protocol. UDP stands for User Data Protocol. Some programs on your computer will use TCP ports to communication and other may use UDP. It is important to know the difference between how th

Difference Between TCP Vs. UDP and it's working.

                             TCP vs. UDP T his article describes how TCP and UDP work, the difference between them, and why you would choose one over the other. O verview TCP (Transmission Control Protocol) is the most commonly used protocol on the Internet. The reason for this is because TCP offers error correction . When the TCP protocol is used there is a "guaranteed delivery." This is due largely in part to a method called "flow control" . Flow control determines when data needs to be re-sent, and stops the flow of data until previous packets are successfully transferred . This works because if a packet of data is sent, a collision may occur . When this happens, the client re-requests the packet from the server until the whole packet is complete and is identical to its original. UDP (User Datagram Protocol) is anther commonly used protocol on the Internet. However, UDP is never used to send important data such as webpage

How to hack mostly websites with HTML Injection in 3 minutes.

                           Hacking website- HTML Injection HTML Injection HTML Injection is a vulnerability which occurs in web applications that allows users to insert html code via a specific parameter for example or an entry point. This type of attack can be used in combination with some sort of social engineering in order to trick valid users of the application to open malicious websites or to insert their credentials in a fake login form that it will redirect the users to a page that captures cookies and credentials. In this tutorial we are going to see how we can exploit this vulnerability effectively once it is discovered. For the needs of the article the Mutillidae will be used as the vulnerable application. Vulnerable Form Of course in this example there is an indication that this form is accepting HTML tags as it is part of the functionality of the application. A malicious attacker will think that he can exploit the users of this applicati

How to Block Unwanted Websites Using HOSTS FILE and hack HOST file

Block or Redirect Unwanted Websites Using HOSTS File The hosts file is one of the interesting and useful feature of both Windows and Linux operating systems that provides many handy options in addressing network nodes. For instance, you can use the hosts file to block annoying ads, pop-ups, banners, porn sites, or even redirect one website to another . In this post I will show you how to play around with the hosts file to accomplish some of the above mentioned jobs.  Let's take some knowledge about host file. What is a hosts File? The hosts file is just like any other computer file that is used by the operating system to map hostnames and domain names on to their corresponding IP addresses . In other words, when you type “google.com” on your browser’s address bar, your computer will look for the hosts file to see if it contains the corresponding IP address for the domain name you typed (google.com). In case if no entry is present in the host

How to Hack IDM Manually 100% with in seconds.

                    IDM FULL VERSION DOWNLOAD  H ello friends, I am Ajay in last post I told you how to hack the idm automatically after that idm shows an errror then use this method. It's a manual method by using this method you can 100% hack the idm. T oday I am going to show you that how you can crack any latest version of Internet Download Manager manually . In this tutorial I am gonna show you IDM latest or any version cracking without any tool, without any key and without any keygen etc.. This is just a trick and it works 100% . Using this hack you can register the Internet Download Manager (IDM) for free using you own credentials i.e register on your Name and email ID. This is manually cracking and I hope you will get how this idea work. I read many things that people says they download crack of IDM, keygen etc and it contain Viruses,Trojan etc and it is obvious. So this method totally works on Trial pack . You have to download IDM from its of

How to hack website and their database with SQL Injection in 5 minutes.

                            Hacking website using SQL Injection -step by step guide W hat is SQL Injection   ? SQL injection is one of the popular web application hacking method.  Using the SQL Injection attack, an unauthorized person can access the database of the website. Attacker can extract the data from the Database. What a hacker can do with SQL Injection attack? 1.ByPassing Logins 2.Accessing secret data  3.Modifying contents of website   4.Shutting down the My SQL server So, here we go. Step 1: F inding Vulnerable Website : To find a SQL Injection vulnerable site, you can use Google search by searching for certain keywords. Those keyword often referred as 'Google dork'. S ome Examples: inurl:index.php?id= inurl:gallery.php?id= inurl:article.php?id= inurl:pageid= Here is the huge list of Google Dork. You can download... https://sites.google.com/site/trickntools/hacking Copy one of the above keyword and paste in the google. He

How to Hack GTA San Andreas with it's cheats

                                                         GTA SAN ANDREAS CHEATS GTA San Andreasd caption              Weapons, Health, Armor & Money LXGIWYL = Weapon Set 1, Thug's Tools PROFESSIONALSKIT = Weapon Set 2, Professional Tools UZUMYMW = Weapon Set 3, Nutter Tools HESOYAM = Health, Armor, $250k BAGUVIX = Semi-Infinite Health CVWKXAM = Infinite Oxygen ANOSEONGLASS = Adrenaline Mode FULLCLIP = Infinite Ammo, No Reload Police, Stats & Gangs          TURNUPTHEHEAT = Increase Wanted Level Two Stars TURNDOWNTHEHEAT = Clear Wanted Level BTCDBCB = Fat BUFFMEUP = Max Muscle KVGYZQK = Skinny AEZAKMI = Never Wanted BRINGITON = Six Star Wanted Level WORSHIPME = Max Respect HELLOLADIES = Max Sex Appeal VKYPQCF = Max Stamina PROFESSIONALKILLER = Hitman In All Weapon Stats NATURALTALENT = Max All Vehicle Skill Stats Spawning Objects AIWPRTON = Spawn Rhino OLDSPEEDDEMON = Spawn Bloodring Banger JQNTDMH