Saturday, 5 April 2014


Tor Browser Bundle is a modified Firefox ESR, pre-configured to protect users' privacy and anonymity on the web, bundled with Tor to allow users to use the Tor anonymity network. It's available for OS XMicrosoft Windowsand Linux.

Tor works by routing Internet traffic through several "onion" servers, obscuring the originating address. This naturally provides anonymity for other Internet programs that are configured to connect to it on the system, or even network. Applications can be directed to the Tor network through

Vulnerability in World's Largest Site Turns Million of Visitors into DDoS Zombies


Vulnerability in World's Largest Site Turns Million of Visitors into DDoS Zombies
An application layer or 'layer 7' distributed denial of service (DDoS) attacks is one of the most complicated web attack that disguised to look like legitimate traffic but targets specific areas of a website, making it even more difficult to detect and mitigate.

Just Yesterday Cloud-based security service provider 'Incapsula' detected a unique application layer DDoS attack, carried out using traffic hijacking techniques. DDoS attack flooded one of their client with over 20 million GET requests, originating from browsers of over 22,000 Internet users.

What makes this case especially interesting is the fact that the attack was enabled by persistent XSS vulnerability in one of the world’s largest and most popular site - one of the domains on Alexa’s “Top 50” list.

Thursday, 14 November 2013

Download VMware workstation 9 (with key)



VMware Workstation is one of the most popular and widely used application for running and managing virtual operating systems via remote connections. By offering broad operating system support, industry leading feature set, high performance tools, and rich user experience, VMware Workstation represents the perfect companion for serious PC enthusiasts, technical professionals and businesses who wants to have access to the best possible tools in the world. 

Tuesday, 12 November 2013

Download Microsoft Office 2010 for Free


Office 2010  is a version of the Microsoft Office productivity suite for Microsoft Windows, It is the successor to Microsoft Office 2007 and the predecessor to Microsoft Office 2013. Office 2010 includes extended file format support, user interface updates, and a changed user experience. 64-bit version of Office 2010 is available, although not for Windows XP or Windows Server 2003. Microsoft Office 2010 is a worthy upgrade for businesses and individual users who need professional-level productivity apps

Features of Office 2010 include:

  • Ribbon interface and Backstage View across all applications
  • Background Removal Tool

Tuesday, 29 October 2013

Power iso (with key)


PowerISO is a powerful CD / DVD / BD image file processing tool, which allows you to open, extract, burn, create, edit, compress, encrypt, split and convert ISO files, and mount ISO files with internal virtual drive. It can process almost all CD / DVD / BD image files including ISO and BIN files. PowerISO provides an all-in-one solution. You can do every thing with your ISO files and disc image files.

Tuesday, 22 October 2013

Creating Wi-Fi HotSpot in Windows 8 – Share Laptop Internet Connection


Enabling or creating Wi-Fi hotspot in window 8 is really a hard option if you are a gui user and find it hard to play with the core windows options. In windows seven there was an option to create the Wi-Fi hotspot but it’s not the case with the Windows 8. In Windows 8 you will need cmd to create a hotspot. Later you will share your laptop internet connection with the hotspot through thewindows Network and sharing center.

Friday, 26 July 2013

Adobe Dreamweaver CS6 (Crack ONLY)


Adobe Dreamweaver is a web design and development application that provides a visual WYSIWYG editor (colloquially referred to as the Design view) and a code editor with standard features such as syntax highlightingcode completion, and code collapsing as well as more sophisticated features such as real-time syntax checking and code introspection for generating code hints to assist the user in writing code.[4] The Design view facilitates rapid layout design and code generation as it allows users to quickly create and manipulate the layout of HTML elements. Dreamweaver features an integrated browser for previewing developed webpages in the program's own preview pane in addition to allowing content to be open in locally installed web browsers. It provides transfer and synchronization features, the ability to find and replace lines of text or code by search terms or regular expressions across the entire site, and a

Thursday, 25 July 2013

SIM Card Flaw Could Wreak Havoc on Millions of Phones


No one knows how many mobile phones are currently in use with old-school DES-encrypted SIM cards inside, but the number could reach into the hundreds of millions, and it appears all of those phones could easily be hijacked. Hackers could access not only personal identification data, but also payment information stored on the cards. Most of the vulnerable devices are probably outside the U.S.

About 25 percent of mobile phones currently in use may be vulnerable because they rely on 1970s-era Data Encryption Standard security, according to Security Research Labs.
Out of 1,000 SIM cards it tested over two years, 250 used DES instead of more advanced approaches such as triple DES or the Advanced Encryption Standard, the lab said.
About 7 billion SIM cards are used worldwide, Survey Research estimated, so as many as 1.75 billion of them could conceivably be employing DES security, putting owners of phones with those SIM cards at risk.

Monday, 8 July 2013

How To Hack An Administrator Account With A Guest Account


(The only way this is going to work is if your account has permission to mody files in folder
«system32»)

Ever wanted to hack your college pc with guest account/student account so that you
can download with full speed Hack Administrator !!!!there ? or just wanted to hack
your friend’s pc to make him gawk when you tell your success story of hacking ?
well,there is a great way of hacking an administrator account from a guest account by
which you can reset the administrator password and getting all the privilages an
administrator enjoys on windows.. Interested ? read on…

Sunday, 7 July 2013

6 Worst Reasons of hard disk failure


Today I publish this post because, my hard hisk was failed due to some problem and all important data  was lost, so its important to know about Hard Disk failure. In this post I mention the reason of the Hard Disk faliure, its Symptom, reason and solution.
Hard disks are often containing the bundle of important information and a huge capacity to store valuable data. But no one would take interest to backup their data or important files so that it can be recovered anytime at the time of failure or corruption. Hard disk failure can happen anytime due to bad power supply, virus attack, damaged block and sectors, corrupted operating system files e.g., NTLDR, boot.ini, msdos.sys etc.
Here, are the list of  top 6 reasons of hard disk failure with its solutions which will surely help’s the user to recover  data from the conditions easily and without affecting or modifying any data. If in any conditions, the solutions mentioned below would unable to resolve issue, then switch to any data recovery software immediately to avoid any further damages to the system or to the data.

Saturday, 6 July 2013

Hacking Dropbox Account, Vulnerability allows Hacker to bypass Two-Factor Authentication




Q-CERT team found a critical vulnerability that allows the attacker to bypass the two-factor authentication in the most popular file sharing service 'DropBox'.

Two Factor Authentication is an extra layer of security that is known as “multi factor authentication” that requires not only a password and username but also a unique code that only user can get via SMS or Call.
Zouheir Abdallah demonstrated, if an attacker already knows the username and password of the victim's Dropbox account, which is protected by two-factor authentication, it is still possible to hack that Dropbox account using following explained technique.

Friday, 5 July 2013

Get System Information by Simple CMD Command : Systeminfo

There are many ways to view your system information. But each of these ways has some advantages and disadvantages. You can't get information about all issues from a system. As a result you should know different ways to view your PC information. In this site two posts have already been published about viewing system information. 

  1. DirectX Diagnostic Tool: Press Start + R > Type dxdiag > Press Enter > Get Details of your system. 
  2. Speccy: A third party tool to view system information. It shows both hardware and software information. Also great for measuring the system temperature.