Tor Browser Bundle is a modified Firefox ESR, pre-configured to protect users' privacy and anonymity on the web, bundled with Tor to allow users to use the Tor anonymity network. It's available for OS X, Microsoft Windowsand Linux.
Learning Zone
Tips and Tricks, PC solution, Tech News, Softwares
Saturday, 5 April 2014
Vulnerability in World's Largest Site Turns Million of Visitors into DDoS Zombies
Just Yesterday Cloud-based security service provider 'Incapsula' detected a unique application layer DDoS attack, carried out using traffic hijacking techniques. DDoS attack flooded one of their client with over 20 million GET requests, originating from browsers of over 22,000 Internet users.
What makes this case especially interesting is the fact that the attack was enabled by persistent XSS vulnerability in one of the world’s largest and most popular site - one of the domains on Alexa’s “Top 50” list.
Thursday, 14 November 2013
Download VMware workstation 9 (with key)
VMware Workstation is one of the most popular and widely used application for running and managing virtual operating systems via remote connections. By offering broad operating system support, industry leading feature set, high performance tools, and rich user experience, VMware Workstation represents the perfect companion for serious PC enthusiasts, technical professionals and businesses who wants to have access to the best possible tools in the world.
Tuesday, 12 November 2013
Download Microsoft Office 2010 for Free
Office 2010 is a version of the Microsoft Office productivity suite for Microsoft Windows, It is the successor to Microsoft Office 2007 and the predecessor to Microsoft Office 2013. Office 2010 includes extended file format support, user interface updates, and a changed user experience. A 64-bit version of Office 2010 is available, although not for Windows XP or Windows Server 2003. Microsoft Office 2010 is a worthy upgrade for businesses and individual users who need professional-level productivity apps
Features of Office 2010 include:
- Ribbon interface and Backstage View across all applications
- Background Removal Tool
Tuesday, 29 October 2013
Power iso (with key)
PowerISO is a powerful CD / DVD / BD image file processing tool, which allows you to open, extract, burn, create, edit, compress, encrypt, split and convert ISO files, and mount ISO files with internal virtual drive. It can process almost all CD / DVD / BD image files including ISO and BIN files. PowerISO provides an all-in-one solution. You can do every thing with your ISO files and disc image files.
Tuesday, 22 October 2013
Creating Wi-Fi HotSpot in Windows 8 – Share Laptop Internet Connection
Enabling or creating Wi-Fi hotspot in window 8 is really a hard option if you are a gui user and find it hard to play with the core windows options. In windows seven there was an option to create the Wi-Fi hotspot but it’s not the case with the Windows 8. In Windows 8 you will need cmd to create a hotspot. Later you will share your laptop internet connection with the hotspot through thewindows Network and sharing center.
Friday, 26 July 2013
Adobe Dreamweaver CS6 (Crack ONLY)
Adobe Dreamweaver is a web design and development application that provides a visual WYSIWYG editor (colloquially referred to as the Design view) and a code editor with standard features such as syntax highlighting, code completion, and code collapsing as well as more sophisticated features such as real-time syntax checking and code introspection for generating code hints to assist the user in writing code.[4] The Design view facilitates rapid layout design and code generation as it allows users to quickly create and manipulate the layout of HTML elements. Dreamweaver features an integrated browser for previewing developed webpages in the program's own preview pane in addition to allowing content to be open in locally installed web browsers. It provides transfer and synchronization features, the ability to find and replace lines of text or code by search terms or regular expressions across the entire site, and a
Thursday, 25 July 2013
SIM Card Flaw Could Wreak Havoc on Millions of Phones
No one knows how many mobile phones are currently in use with old-school DES-encrypted SIM cards inside, but the number could reach into the hundreds of millions, and it appears all of those phones could easily be hijacked. Hackers could access not only personal identification data, but also payment information stored on the cards. Most of the vulnerable devices are probably outside the U.S.
About 25 percent of mobile phones currently in use may be vulnerable because they rely on 1970s-era Data Encryption Standard security, according to Security Research Labs.
Out of 1,000 SIM cards it tested over two years, 250 used DES instead of more advanced approaches such as triple DES or the Advanced Encryption Standard, the lab said.
About 7 billion SIM cards are used worldwide, Survey Research estimated, so as many as 1.75 billion of them could conceivably be employing DES security, putting owners of phones with those SIM cards at risk.
Monday, 8 July 2013
How To Hack An Administrator Account With A Guest Account
(The only way this is going to work is if your account has permission to mody files in folder
«system32»)
Ever wanted to hack your college pc with guest account/student account so that you
can download with full speed Hack Administrator !!!!there ? or just wanted to hack
your friend’s pc to make him gawk when you tell your success story of hacking ?
well,there is a great way of hacking an administrator account from a guest account by
which you can reset the administrator password and getting all the privilages an
administrator enjoys on windows.. Interested ? read on…
Sunday, 7 July 2013
6 Worst Reasons of hard disk failure
Today I publish this post because, my hard hisk was failed due to some problem and all important data was lost, so its important to know about Hard Disk failure. In this post I mention the reason of the Hard Disk faliure, its Symptom, reason and solution.
Hard disks are often containing the bundle of important information and a huge capacity to store valuable data. But no one would take interest to backup their data or important files so that it can be recovered anytime at the time of failure or corruption. Hard disk failure can happen anytime due to bad power supply, virus attack, damaged block and sectors, corrupted operating system files e.g., NTLDR, boot.ini, msdos.sys etc.
Here, are the list of top 6 reasons of hard disk failure with its solutions which will surely help’s the user to recover data from the conditions easily and without affecting or modifying any data. If in any conditions, the solutions mentioned below would unable to resolve issue, then switch to any data recovery software immediately to avoid any further damages to the system or to the data.
Saturday, 6 July 2013
Hacking Dropbox Account, Vulnerability allows Hacker to bypass Two-Factor Authentication
Q-CERT team found a critical vulnerability that allows the attacker to bypass the two-factor authentication in the most popular file sharing service 'DropBox'.
Two Factor Authentication is an extra layer of security that is known as “multi factor authentication” that requires not only a password and username but also a unique code that only user can get via SMS or Call.
Zouheir Abdallah demonstrated, if an attacker already knows the username and password of the victim's Dropbox account, which is protected by two-factor authentication, it is still possible to hack that Dropbox account using following explained technique.
Friday, 5 July 2013
Get System Information by Simple CMD Command : Systeminfo
There
are many ways to view your system information. But each of these ways
has some advantages and disadvantages. You can't get information about
all issues from a system. As a result you should know different ways to
view your PC information. In this site two posts have already been
published about viewing system information.
- DirectX Diagnostic Tool: Press Start + R > Type dxdiag > Press Enter > Get Details of your system.
- Speccy: A third party tool to view system information. It shows both hardware and software information. Also great for measuring the system temperature.
Subscribe to:
Posts (Atom)