Defcon ethical hacking tools Realeased

Tools Released at DEF CON 18 gtoolbarsnoop by Jeff Bryner Description: snoops out cookies, bookmarks, emails and favorite icon traffic from the google toolbar’s network traffic. Homepage Link: http://jeffbryner.com/ http://p0wnlabs.com Email Address: jeff [at] jeffbryner ]dot[ com Tool URL: http://p0wnlabs.com/defcon18/defcon18.zip Local Copy: https://media.defcon.org/dc-18/tools/dc-18-gtoolbarsnoop.zip   FOCA Informatica64 Description FOCA is a tool for Windows Systems that […]

Defcon Official Conference

  <iframe src=”http://files.bannersnack.com/iframe/embed.html?hash=bdpl435i&wmode=transparent&clickTag=www.bytecode.in%2Flanding_pages%2Fcehv8%2Findex.htm&t=1377808690” width=”250” height=”250” seamless=”seamless” scrolling=”no” frameborder=”0” allowtransparency=”true“></iframe>

IP Voice Technologies

Cisco Voice Technologies: Cisco Unified Communications 500 (UC500) – Appliance providing firewall, NAT, Integrated Voicemail & Auto Attendant, Built in FX0 & FXS Ports, VPN, Optional Wireless and Music on Hold. This is a part of the Cisco Smart Business Communications System (SBCS) range. Cisco Unified Communications Manager Express (CME) – Next step up from […]

IP Voice Technologies

Cisco Voice Technologies: Cisco Unified Communications 500 (UC500) – Appliance providing firewall, NAT, Integrated Voicemail & Auto Attendant, Built in FX0 & FXS Ports, VPN, Optional Wireless and Music on Hold. This is a part of the Cisco Smart Business Communications System (SBCS) range. Cisco Unified Communications Manager Express (CME) – Next step up from […]

Ajax ModalPopUpExtender Example to edit the gridview row values in asp.net

Introduction: Here I will explain how to show the modal popup using Ajax ModalPopupExtender to edit Rows in a GridView using asp.net. Description: In my previous post I explained clearly how to show the gridview images with lightbox effect. Same way we can display popup using Ajax futures. In ajax we have ModalPopup extender to […]

San and Voice Security

San and Voice Security SAN Security SANs help reduce capital and operating expenses, increase storage versatility to respond to changing business priorities & requirements and improve backup, replication & recovery. Communication types– 1. Fibre Channel – The primary SAN transport for host to SAN communications. 2. iSCSI – This uses an IP network to transport […]

jQuery Show Gridview Row Details in Tooltip on MouseHover in Asp.net

<html xmlns=”http://www.w3.org/1999/xhtml”> <head> <title>Show Gridview Rows Details in tooltip with jQuery</title> <script src=”http://code.jquery.com/jquery-1.8.2.js” type=”text/javascript”></script> <script src=”jquery.tooltip.min.js” type=”text/javascript”></script> <script type=”text/javascript”> function InitializeToolTip() { $(“.gridViewToolTip”).tooltip({ track: true, delay: 0, showURL: false, fade: 100, bodyHandler: function () { return $($(this).next().html()); }, showURL: false }); } </script> <script type=”text/javascript”> $(function () { InitializeToolTip(); }) </script> <style type=”text/css”> #tooltip { […]

Asp.net send email using c#

Asp.net send email using c#  Introduction: In this article I will explain how to send email using asp.net. Description: In realtime we will use gmail,yahoo,hotmail etc to send mails to particular user here I will show to how to implement mail sending concept in asp.net. To implement mail concept in asp.net first we need to […]

All About Carding :)

All About Carding 🙂 ================================================== LEGAL TIDBITS ================================================== This FAQ is intended for educational PURPOSES ONLY. If youre a federalle and youre reading this, you better be educating yourself ================================================== THE BIG QUESTION: WHAT IS CARDING? ================================================== – Well, defined loosely, carding is the art of credit card manipulation to access goods or services by […]

Hacker Halted Competitions and Activitites

Hacker Halted Competitions and Activitites- Hacker Halted Conference and Workshop   Capture the Flag Cyber Operations – Find the Link and Stop the Madness! SITUATION: Analysts suspect a foreign government may be supporting known terrorist groups, one of which is planning an operation in the near future. Previous CNE operations have provided access into part […]

Visual Studio 2012 Computer Training Classes & Certification

Visual Studio 2012 Computer Training Classes & Certification Visual Studio 2012 authorized computer classes are at ONLY Training Centers—a Microsoft Gold Learning Partner. Microsoft Visual Studio 2012 is loaded with new capabilities for Windows 8, the web, SharePoint, mobile, and cloud development. The authorized training you’ll receive at ONLY can help you prepare for Visual […]

HOW BE USE THEHARVESTER.PY

TheHarvester.py theHarvester is a python script used for information gathering using google bing pgp and various online sources present, the harvester gives host details, mails, sub domains and various other important informations to google hackers. The actual current sources supporteed are:   google: google search engine – www.google.com msn: microsoft search engine – search.msn.com pgp: […]

CCNA security – Intrusion detection and Prevention System Tutorial

CCNA security- Topic – Intrusion Prevention system and Intrusion Detection System IPS Introduction Types of IPS/IDS solutions IDS (Intrusion Detection System) – Sits outside the routing path (Promiscuous mode connected to a SPAN port) and raises alerts in the event of suspicious traffic. This can signal to another router to block traffic but this traffic […]