Monday, 10.18.2021, 10:31 PM

Ethical Hacking - By Chintan Gurjar

Site menu
«  October 2021  »
Our poll
Rate my site
Total of answers: 168
Main » Entries archive

My Lockbox Professional Edition | 5.67 MB

Views: 813 | Added by: handsome_devil | Date: 11.16.2010 | Comments (0)

Malware Removal Software Free Download: Norman Malware Cleaner

Norman Malware Cleaner 1.8.2 Portable [13/11/2010] | 90.08 Mb

Norman Malware Cleaner is a Norman program utility that may be used to detect and remove specific malicious software (malware). Note that it should not be used as a substitute for running normal proactive antivirus protection, but rather as a reactive tool to handle systems that are already infected.
... Read more »
Views: 973 | Added by: handsome_devil | Date: 11.16.2010 | Comments (0)

PHP Programming: The Basics Tutorials
English | 800x600 | MP4V | 25fps - 315kbps | Audio 66kbpskbps-44100Hz | 587MB
Geren : Video training and tutorials

In Real World PHP Pro ... Read more »
Views: 1120 | Added by: handsome_devil | Date: 11.16.2010 | Comments (0)

What cloud computing really means

Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT’s existing capabilities.

Cloud computing is at an early stage, with a motley crew of pro ... Read more »
Views: 1102 | Added by: handsome_devil | Date: 11.16.2010 | Comments (0)

Cyber War Sabotaging The System: Are We Ready??

Looking at the growing menace and to ‘try to excite student and create an interest in ethical hacking , Ankit fadiya a self proclaimed ethical ... Read more »
Views: 3646 | Added by: handsome_devil | Date: 11.15.2010 | Comments (0)

WiFi Slax Wireless Hacking Live-CD v3.1 + Plugins Updated

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. Both sides must have the same WEP key, which is usually a ... Read more »
Views: 832 | Added by: handsome_devil | Date: 11.15.2010 | Comments (1)

InstantCrypt Portable | 5.95 Mb

InstantCrypt is a powerful encryption tool using the Open PGP standard designed to send and receive secure email.
 It encrypts ("scrambles") your email so that only the intended recipient can read it. It connects easily to your previously installed email or Web mail. Written for those who occasionally, but not always, want or need to exchange encrypted emails, for those with no or only little knowledge of enc ... Read more »
Views: 1384 | Added by: handsome_devil | Date: 11.15.2010 | Comments (0)

HJSplit 3.0 Portable | 10.32 Mb

Now what's the use of a program like HJSplit? Think of a file of 20 Mb, and try to send this to a friend. Using email this does not succeed, it is simply too large, and how to put it onto a floppy? HJSplit will enable you to split the large file into smaller chunks, which can be much more easily sent and stored.

What about a backup of very large Gigabyte sized files? HJSplit also can handle these! E.g. HJSplit al ... Read more »
Views: 801 | Added by: handsome_devil | Date: 11.15.2010 | Comments (0)

Posted By Chnitan Gurjar,


Hi guys this is chintan again.Today I am going to show you that how to spy on the mobile phone.there is a software named "Mobile-Spy",this software is used to spy on the any mobile phone.It records every sms and its information and also the GPS position of the mobile phone if it has a GPS then.

Working Function 
Views: 872 | Added by: handsome_devil | Date: 11.14.2010 | Comments (0)

How to Defend Your Account & Passwords From Hackers

GUEST POST BY DarkL00k aka Ajay Dhaka

How many times have you heard so ... Read more »
Views: 2143 | Added by: handsome_devil | Date: 11.13.2010 | Comments (0)

« 1 2 ... 7 8 9 10 11 12 13 »