Skip to main content

Posts

Showing posts from September, 2017

My life

¶¶¶¶¶£I think I m dumb -____+ I can't do anything like topper or avarage psn do I think I m failure !! now just wait and watch that where my honest effort and hard work lead me (it's just a memory) for future...

some useful sites

SOME USEFUL  WEBSITES  ONLINE EDUCATIONAL SUPPORT www.khanacademy.org www.academicearths.org www.coursera.com www.edx.org www.open2study.com www.academicjournals.org codeacademy.org youtube.com/education BOOK SITES www.bookboon.com http://ebookee.org http://sharebookfree.com http://m.freebooks.com www.obooko.com www.manybooks.net www.epubbud.com www.bookyards.com www.getfreeebooks.com http://freecomputerbooks.com www.essays.se www.sparknotes.com www.pink.monkey.com ONLINE EDUCATIONAL SUPPORT http://www.ocwconsortium.org / http://www.ocwconsortium.org/en/courses/ocwsites http://ocw.tufts.edu   -Tuft University http://ocw.upm.es   -Univesidad Politechnica, Madrid http://www.open.edu/openlearn / http://ocw.usu.edu /  -Utah State University http://open.umich.edu /  -University of Michigan http://ocw.nd.edu /  -Nore Dame University ANSWERS TO QUESTIONS www.ehow.com www.whatis.com www.howstuffwork.com www.webopedia.com www.plagtracker.com www.answers.co

HTML5 CSS3 JavaScript Bootstrap SemanticUI DOM Manipulation jQuery Unix(Command Line) Commands NodeJS NPM ExpressJS REST MongoDB Database Associations Authentication PassportJS Authorization Course Download Size: 8GB http://www.mediafire.com/file/8oh53mvhbag4yi5/The+web+developer+bootcamp+by+COLT+STEEL+%28UDEMY%29.part01.rar http://www.mediafire.com/download/6u43z73on2tbydz/The_web_developer_bootcamp_by_COLT_STEEL_%28UDEMY%29.part02.rar http://www.mediafire.com/download/i0iv8hfc9xfke7c/The_web_developer_bootcamp_by_COLT_STEEL_%28UDEMY%29.part03.rar http://www.mediafire.com/download/x43s5j03cxy2zlk/The_web_developer_bootcamp_by_COLT_STEEL_%28UDEMY%29.part04.rar http://www.mediafire.com/download/bwb3j2d9ph9h7hc/The_web_developer_bootcamp_by_COLT_STEEL_%28UDEMY%29.part05.rar http://www.mediafire.com/download/c0td6zpb6pcl3y4/The_web_developer_bootcamp_by_COLT_STEEL_%28UDEMY%29.part06.rar http://www.mediafire.com/download/wgr35c3xcl3yxeg/The_web_developer_bootcamp_by_COLT_STEEL_%28UDEMY%29.part07.rar http://www.mediafire.com/file/bzsozu9c44zo1m9/The+web+developer+bootcamp+by+COLT+STEEL+%28UDEMY%29.part08.rar Password: necron33

HTML5 CSS3 JavaScript Bootstrap SemanticUI DOM Manipulation jQuery Unix(Command Line) Commands NodeJS NPM ExpressJS REST MongoDB Database Associations Authentication PassportJS Authorization Course Download Size: 8GB http://www.mediafire.com/file/8oh53mvhbag4yi5/The+web+developer+bootcamp+by+COLT+STEEL+%28UDEMY%29.part01.rar http://www.mediafire.com/download/6u43z73on2tbydz/The_web_developer_bootcamp_by_COLT_STEEL_%28UDEMY%29.part02.rar http://www.mediafire.com/download/i0iv8hfc9xfke7c/The_web_developer_bootcamp_by_COLT_STEEL_%28UDEMY%29.part03.rar http://www.mediafire.com/download/x43s5j03cxy2zlk/The_web_developer_bootcamp_by_COLT_STEEL_%28UDEMY%29.part04.rar http://www.mediafire.com/download/bwb3j2d9ph9h7hc/The_web_developer_bootcamp_by_COLT_STEEL_%28UDEMY%29.part05.rar http://www.mediafire.com/download/c0td6zpb6pcl3y4/The_web_developer_bootcamp_by_COLT_STEEL_%28UDEMY%29.part06.rar http://www.mediafire.com/download/wgr35c3xcl3yxeg/The_web_developer_bootcamp_by

About My Life at University Exam

Every time I failed to.stand on my expectation my be beacose of may be Mind power I forget the notes on exam Vanchelu Bhulay gyu increase mind power sharpen your Axe clear concept very very very clearly So final conclusion of successfully tackle all the exam of life increase the mind power  (Sharpen Your Axe to chopped down the tree)

Books collection for your Lifetime Journy

50 REASONS TO READ BOOKS 1. Books help to feel more confident. 2. Books help to travel around the world in the cheapest way. 3. Books develop your personality. 4. Books provide food for thought. 5. Books make you laugh and think. 6. Books draw you towards perfection. 7. Books stimulate creativity. 8. Books bring out writing talent. 9. Books help in communicating. 10. Books clear your vision. 11. Books satisfy your curiosity. 12. Books help you make more choices. 13. Books help you build literary talent. 14. Books do not require any special device to teach. 15. Books increase your attention span. 16. Books are fruitful pastime. 17. Books can be used anytime, anywhere. 18. Books provide entertainment, when others fail. 19. Books make you powerful. 20. Books help you know the 'Whys' and 'Hows' of everything. 21. Books help you to create and spread fun. 22. Books help you travel across time intelligently. 23. Books keep you updated with facts and figu

Do you want to create undeletable folder that no one can delete and put all your important stuff there?

TechSpice: Do you want to create undeletable folder that no one can delete and put all your important stuff there? Am gonna show you a simple trick on how to create undeletable folder using CMD •Launch CMD •Note that you cannot create such folder on drive C which contain Windows OS •Type in the letter of the drive you wanna create the folder in.such as E •Now type in md con\ and then enter (md means make directory) ○Now you have just created a new folder on drive E which is undeletable.

Repair corrupted Pen Drive or SD card using CMD

TechSpice: Repair corrupted Pen Drive or SD card using CMD This process involves Windows command prompt which is commonly known as CMD. In this, you have to enter some CMD commands and Windows will forcefully format your corrupted pen drive/SD card. Connect the corrupted pen drive or SD card to your computer. However your mouse on the Start button and Right. Click Command Prompt (Admin). A CMD window will open. Type diskpart and press Enter. Type list disk and press Enter. A list of all the storage devices connected to your computer will be displayed. Type select disk <the number of your disk> and press Enter. (Example: select disk 1). Important: Make sure you enter the number correctly. Otherwise, you may format your internal hard drive. You can type list disk again to check whether you are going correctly. There will be a star (asterisk symbol) before the name of the selected disk.Type clean and press Enter. Type create partition primary and hit Enter. Type active. T

Bypass Android Pattern Lock (various method)

1. Bypass Android Pattern Lock from ADB Tool You can bypass or disable your android pattern lock from usinh ADB (Android Debugging Bridge) Tool. You can download this tools from its official website. ADB tools work with your Window PC Linux, You can easily bypass android lockscreen from ADB Tools. Make Sure USB Debugging is enabled in your android phone. If your Mobile USB Debugging is not enabled in your android phone, you can;t use this method. 1. Download and Install ADB Drivers in your Window PC. 2. Connect Your Android Phone with your Window PC. 3. Open Command Prompt , type adb devices and press enter. 4. Now you see your Device Name with its model number. 5. Type   one by one these commands in your Command Prompt Screen.👇👇👇 ▶️ adb shell   ▶️ su       ▶️ rm /data/system/gesture.key ▶️ now enter any pattern in your android phone and you can easily bypass android pattern lockscreen from using adb in your windows pc. Good to Go✈️✈️✈️😄😄 2. Bypass Android Pattern Lo

How to change your phone from 3G to 4G

How to change your phone from 3G to 4G •Your phone must be rooted •Install root explorer •Search for a file called 'persist.radio.lteon' •Open that file and change it from 'false' to 'true' save •Reboot your phone. You will be able to see "LTE/wcdma/gsm (auto connect)" in network mode.

Hack purchade Application buy LuckyPatcher

HOW TO HACK IN-APP PURCHASE WITH LUCKY PATCHER STEPS.......... 1. Download Lucky Patcher from the channel. Search for it. 2. Open lucky patcher. 3. If your device is not rooted skip to step 6. 4. For rooted device, and tap on toolbox at the bottom, scroll to find “patch to android” and tap on it. 5. Tick all the patches, tap apply and wait sometime. Your device reboots. 6. Close Lucky patcher and open app/game where you want to hack in app purchases. 7. Browse to buying area and tap “Buy” or something similar. 8. Now Lucky patcher window will appear asking you “Do you want to get this item for free?” 9. Tap Yes. Now you will get everything for free. Gracias 🙌

how to earn more from blog or websites

how to earn more Your going to need two things, 1. A Blog or a Website ( To host your Adsense Ads ) 2. Microworkers Account ( The process may take longer if your account is not Verifed ) Now once you have both things set up your website or blog with the Adsense account you, ( Make sure your Adsense account Is Approved before starting ) Now go sign up on http://www.microworkers.com , Once your signed up. You need Invest $10.00 to speed up the process. Or you can do it the free way be doing Jobs, But your still going to need to Invest $10 to be able to start a Campaign. ( If you do jobs then invest you will have free money to keep hiring workers to do your task Once you have enough funds to start a Campaign Set it up like this, Workers: 30 Workers will earn: $0.11 Tittle l Yourwebsite name: Click 2x What is expected from Workers? l 1. Go to http://yourwebsite.com / 2. Click on 2 of the adsense Ads (adchoices sign) Required proof that task was finished? l 1. Landing pag

All Abput Hacking course link(Exllent source for self learner)

https://www.xorrior.com/You-Have-The-Right-to-Remain-Cylance / cissp materials https://mega.nz/#F!0iYwVCoZ!PjSCPfATgBZSlQWFbrIqgg https://github.com/offensive-security/exploit-database http://cou.s3.amazonaws.com/UD3M1/swift-3-ios-10.rar https://mega.nz/#F!5UJSxLQJ!X7uO6tA35UXPtjT_ymnk9g CURSO Offensive Security Wireless Attacks - WiFu PDF: https://mega.nz/#!GIIFUB7D!fU5gFgB5g32Hk9CDHufhpXt-9DGt8IidkP3dGqYB0No PARTE 1 VIDEOS https://mega.nz/#!SQZigRxR!U65s7kUzMNx6JyO1KTSQovez06fm5Rg7XiJUR1C-HMc PARTE 2 VIDEOS https://mega.nz/#!PM43BQhA!p8muge9eaiakUHEgyMwa8o9dVKJy7fJ1mT5xsNNAMyI PARTE 3VIDEOS https://mega.nz/#!GUhyRZAQ!YicVpDyph5DFKLJqeuTjHTYAt0ESLx4Jlbj1PjKbFk4 PARTE 4 VIDEOS https://mega.nz/#!LQ4gDYRL!vfgqPUmXCykD7cPNWiQP7djEm4PijSWr1obVNN6snOc PARTE 5 VIDEOS https://mega.nz/#F!BPRm3RwJ!ESU2aM2Jd8-UE3f1xJDuSA https://mega.nz/#F!cEJwyCiS!eqvEnnoaSEdeL2J1-A47Dg : courses https://mega.nz/#F!3hJm1JxS!5crex2erSinPqDi_UPN2hA : burp suite https://mega.nz/#F!xqIijA4D!5

(sqli,xss)Hacker khizer javed sharing knowledge

Homepage Sign up  Muhammad Khizer Javed Some of My Friends Think That I’m a geeky hacker, but I don’t know anything about computers. #Penetration_tester on #HackerOne & #Bugcrowd Aug 29 SQLi & XSS Vulnerabilities in a Popular Airlines Website | BugBounty POC  Hey Guys, Some of my friends was asking for another Writeup. so Here’s One :) Last month I decided to practice a little So I took one of the popular websites… Lets Take That Website as goodwesite.com (As Its Not a public Program) Lets start from a Little basics. What is SQL Injection Vulnerability? This vulnerability allows an unauthenticated user to grab data from the victim’s website database, including sensitive user information. Why This issue existed? This issue existed because goodwebsite allowed improperly sanitized user input in a login Page; which is basically the same as adding user input inside a raw SQL query. Using this attack vector, an attacker could leak hashed passwords & Some other data

Hackers stole from four banks a billion rubles with the help of a bot

Hackers stole from four banks a billion rubles with the help of a bot Special services disclosed a group of cybercriminals who deceived Promsvyazbank, Trust, Uralsib and a credit institution Zenit. 16 young people in Moscow organized a gang and engaged in fraud on the Internet. The choice of criminals fell on the banking sphere and operations on-line. In just four months, programmers robbed credit institutions for a billion rubles.The scam succeeded thanks to a special program, which they came up with. - A group of Internet scammers with knowledge of programming and technology developed a bot that, at a certain point in time after carrying out transactions from the account to the account, canceled operations, "a source in law enforcement agencies said. - However, by this time, money already on a payment order through Internet banking was sent, and the team came to the bank late. Basically, transfers were from dollar to ruble accounts, or from dollar to euro. The leader of the

Nigerians lured Western companies more than $ 3 billion

Nigerians lured Western companies more than $ 3 billion Interpol, together with Trend Micro, calculated the losses of Western companies from the actions of "Nigerian" fraudsters and came to the conclusion that in recent years, intruders have grown adorable in the subtleties of BEC fraud and over three years have grown over $ 3 billion. The meaning of BEC-fraud is sending out credible-looking accounts and office notes, through which criminals cheat employees to transfer funds to fake accounts. In addition, such letters can be infected with malicious keyloggers. BEC fraud is becoming a major concern for businesses: last year the FBI already reported a loss of one billion dollars only in the US.It is known that some victims lost tens of millions of dollars at a time, like, for example, the Austrian company FACC, which lost more than $ 54 million. The report also indicates that West African scammers are improving their skills and are already capable of turning complex and sop

Ourmine Source code

Ourmine Source code PASTEBIN new paste trends     #OURMINE# sourcecode  A GUEST  AUG 30TH, 2017  19 NEVER Not a member of Pastebin yet?   Sign Up , it unlocks many cool features! rawdownloadreport3.01 KB   <html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><style> body {   font: 600 1em/1.5 "Neuton";   background: black;   color: #ffffff;   text-align: center;   margin: 0; } p {   text-transform: uppercase;   letter-spacing: .5em;   display: inline-block;   border: 4px double rgba(0,166,252,.25);   border-width: 4px 0;   padding: 1.5em 0em;   position: absolute;   top: 18%;   left: 50%;   width: 40em;   margin: 0 0 0 -20em; } p span {   font: 700 6em/1 "Oswald", sans-serif;   letter-spacing: 0;   padding: .25em 0 .325em;   display: block;   margin: 0 auto;   /*text-shadow: 0 0 80px rgba(0,152,255,.5);*/ /* Clip Background Image */   backgr

Citizen of Pakistan laundered more than $ 19.6 million for hackers

Citizen of Pakistan laundered more than $ 19.6 million for hackers A 47-year-old Pakistani citizen admitted that he was involved in a money laundering scheme that was obtained by criminal means as a result of telephone fraud.Through the accounts of the attacker, a total of $ 19.6 million Muhammad Sohail Qasmani pleaded guilty to one count of charges - conspiracy to commit fraud using communications media. The suspect remains in custody without the right to bail. According to the prosecutor, Kasmani told the investigation that he was involved in an international criminal operation, the participants of which used a special kind of telephone fraud for conducting illegal transactions, and took out more than $ 19 million for shell accounts opened in 10 countries. For money laundering Kasmani received the money due to him share. He headed a large-scale fraudulent scheme, according to investigators, Noor Aziz, a 53-year-old resident of Pakistan.The fraudster's plan was as follows: hac

From every third online bank you can steal money

From every third online bank you can steal money   The share of financial applications in which critical vulnerabilities are encountered decreased in 2016, but the overall level of risk of identified vulnerabilities has become much higher. The most common defects were the mechanisms of identification, authentication and authorization. Such conclusions are contained in the report on the basis of work on the analysis of the security of financial applications, which were conducted by experts of Positive Technologies in 2016. As noted in the study, the popularity of electronic financial instruments in Russia over the past year has increased significantly due to the development of contactless payment systems: to the already familiar PayPass and payWave NFC-payment technology with the help of smartphones - Apple Pay and Google Wallet. However, the security of publicly available web and mobile applications in the financial sphere still leaves much to be desired, since such applications a

The source code of the WannaCry simulator for Android

The source code of the WannaCry simulator for Android   The source code of one of the most popular families of extortion software for Android - Slocker, the number of new versions of which has increased six-fold over the past six months, is published on the portal GitHub. The Trojan was placed by someone under the pseudonym fs0c1ety, which called on the users of the resource to contribute to its development and provide reports on the vulnerabilities found in it. SLocker (or Simple Locker) is an extortion software that encrypts existing files on the mobile device and blocks its screen. The Tor network is used to communicate with the C & C server. Slocker, which appeared in 2015, is one of the first families of extortionists for Android-devices. In the past year, thousands of Android-gadgets have been attacked by Slocker.In May of this year, security experts discovered more than 400 new Slocker variants, and a month later a version was imitated that simulated the WannaCry malware

How to Hack In purchase app with Lucky patche

How to Hack In purchase app with Lucky patcher Method 1: 1)Lunch Lucky patcher apk and grant root access. 2)You may minimize or close Lucky patcher at this moment and launch the app which you want to get the Pro vision or the paid vision. 3)Go to purchase section and click on buy or pro vision or anything that is written in your app. 4)Now the Lucky patcher's window opens itself instead of google in app purchase box. In that window you will see "Do you want to try to get this app for free" as shown in screen shots below and Select "yes". Non-rooted user Click on "send reply to application(Unsigned). 5)Done. Now you hacked the In app purchase successfully. If the app is supported, then the thing you are trying to download starts downloading or the feature you want Unlock will be unlocked. (You may also do as described below to increase your chance of success) 1)Open Lucky patcher apk and find Google play store. 2)Tap on it and select "open menu

Hack Any Application With Lucky patcher

Method 2: 1)Open Lucky patcher and find the app you want to hack the in app purchasement. 2)If in app purchasement available, you will see "In app purchases found" below the app. 3)Long press on the app or just tap on the app and click on "open menu of patches". 4)Select "Support patch for In app and LVL emulation. 5)Select apply, wait until it finishes. After that your device will reboot automatically. If your patch was successful, you may say goodbye to the obnoxious google in app emulation window, that used to come when you select to buy something. You can buy anything for free. Done! you may enjoy the hacked app now

Useful Google drive Link

*Useful links* *useful google drive links* Google drive movies - https://drive.google.com/drive/u/0/mobile/folders/0B6FjKMQKynZILTlwZHl4ajUwcFU *Programming language collection on google drive* - https://drive.google.com/drive/folders/0ByWO0aO1eI_MN1BEd3VNRUZENkU *Books*- https://drive.google.com/drive/folders/0B0hgUX3me1_RNi1KTXBzXzdXSzA *Google drive hacking ebook collection* - https://drive.google.com/drive/folders/0B-JzQsKoJaANbTFGN0RWLWhONms *Books for reading* - https://drive.google.com/drive/folders/0B09qtt10aqV1SGxRVXBWYmNIS2M *Books (novels)* - https://drive.google.com/drive/folders/0B1v9Iy1jH3FXdlNDeUNHNEVsZlE *Books* - https://drive.google.com/drive/folders/0B1Ef5shqGHDNRGEwd3BYb0N3Um8 *C programming tutorial* google drive - https://drive.google.com/drive/folders/0B1qoi1IlEKwaM2tSMFBmOGUyNzg *Udemy course google drive link* - https://drive.google.com/drive/folders/0B1HQDi7EkA9XNlR3STF5SVJIVUk *Programming books google drive* - https://drive.google.com/drive

Hack WhatsApp by Mac spoofing

Hack WhatsApp by Mac spoofing TIP: Please note that we must first spoof the MAC address of the target phone. To do so, we are going to use the Terminal app. 3: Launch the Terminal App and type  $ su . Press "Enter". 4: In the next step, enter  " $ busybox iplink show eth0"  and tap "Enter". TIP: If you get a "device not found" message, enter  wlan0 instead of eth0  in the spaces provided. 5: In the next step, type " $ busybox ifconfig eth0 hw ether"  followed by your MAC address. Replace the  XX:XX:XX:XX:XX:XX  with your MAC address. TIP: You have now successfully spoofed your MAC address. You can confirm this by entering the following command " $ busybox iplink show eth0". 6: Launch your WhatsApp and enter the phone number of the target WhatsApp account. 7: Before you can completely hack the victim's WhatsApp you will be required to confirm the hack. In this case, choose call verification. 8: Write down the code

Sqli Fully Explained

What is SQL Injection? SQL injection attack is a code injection technique or method, which is used to attack data driven applications. In this attack, malicious SQL statements are inserted in entry field for execution. SQL injection attack (SQLIA) is considered one of the top web application vulnerabilities. By using SQL Injection method it is very easy to hack vulnerable website. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database. Using SQL Injection attack method an attacker can get complete DB of website and User ID and Password can be exploded, an attacker can also Shut down My SQL Server and Server will stop working. An attacker can modify content of website and bypass login. Requirements :- • SQL Injection Dorks. • Vulnerable Website. • Firefox with Hack bar add-on. • Little bit understanding of SQL • Fresh Mind to Understand it. Step 1. Find Vulnerable website. An attacker always use Google,

Guide to Penetesting (1337)

The No-Bullshit Guide to Pentest Here's a few suggestions in no particular order. > Learn python > Learn assembly for at least x86 > Set up a test lab > Put a small Windows domain in your lab and try to go from a regular user foothold to domain admin. Also try to go from a local administrator to domain admin. You can simulate that scenario by having a privileged account login to a workstation used by the local admin as if it were helpdesk troubleshooting a problem, then attack it as the stolen local admin account and use a tool like Mimikatz to get the privileged account and pivot from that workstation. > Grab some intentionally vulnerable virtual machines and poke at them in your lab. Vulnhub has these for download and there's several other places too. > If you're wanting to get into web app pentesting, learn javascript, learn how web servers work, learn how web browsers work, fire up wireshark and capture then analyze the traffic when you browse t

some Btc earning Site to Earn btc Wothout investing

Trusted and regularly paying sites...keep earning more and more daily daily basis.. http://www.payinvest.bi z https://www.hourpower.biz https://hashflare.io/ http://globalgenex.com/Join.aspx? https://wiredcoins.com/ https://www.autofillmatrix.biz/ https://profitshare.ltd/ http://www.citylinebux.com/ https://scheriton.com/? https://scheriton.com/

How to Hack Any Financial company(with rat)

D4rkN3T H4RcK3R: Tools Required: .. Like RAT (pdf format) .. Fake call .. Fake SMS .. Webmail or SendBlaster .. Message Format. I have had good success doing what i am about to show you today. What is CEOCFO Job? CEOCFO is either hacking a CEO or CFO and gaining access to his/her inbox, or another process whereby you send email message (spoofed email) to employees, especially the controller or finance director and sometimes the chief financial officers (CFO) with a look-alike domain name. Sometimes email message could sound very urgent. I have seen most people do CEOCFO the WRONG WAY, collecting LONG email list and blasting it, which is ABSOLUTELY WRONG. This could earn you good money within MINUTES if done properly. You have to take time to understand the target organization’s relationships, activities, interests and travel and/or purchasing plans. To do this successfully, you need to focus on a particular website. One website. Let me BREAK it down..... Target any web

btc doubler Script(real one) Free Free

Sandip Jadhav: // if (profit > profit_max) {     //     error_title = "Maximum profit exceeded";     //     error_info = "Maximum profit: " + number_format(profit_max, devise_decimal);     //     error_value = "Maximum profit exceeded - Maximum profit: " + number_format(profit_max, devise_decimal);     //     error = true;     // }     // else if (amount > balance) {     //     error_title = "Bet amount";     //     error_info = "Maximum bet: " + number_format(balance, devise_decimal);     //     error_value = "Bet amount - Maximum bet: " + number_format(balance, devise_decimal);     //     error = true;     // }     // else if (amount > bet_max) {     //     error_title = "Bet amount";     //     error_info = "Maximum bet: " + number_format(bet_max, devise_decimal);     //     error_value = "Bet amount - Maximum bet: " + number_format(bet_max, devise_decimal);     //    

deface code

<html><head> <meta http-equiv="content-type" content="text/html; charset=windows-1252"> <meta content="text/html; charset=utf-8"> <title> Damaged By r00t 3v!L</title> <meta name="Description" content="Imposible_Attack"> <link rel="SHORTCUT ICON" href=" http://us.yimg.com/i/mesg/emoticons7/61.gif "> <style> body,div,h2{margin:0;padding:0} h2{font-size:100%;font-weight:normal} #unknown{background:#310404;font-family:Palatino Linotype;z-index:999999;position:fixed;left:0px;width:100%;height:100%;z-index:999999} .unknown{background:-webkit-radial-gradient(rgba(0,0,0,0.1),rgba(0,0,0,0.3) 50%,rgba(0,0,0,0.7));background:-moz-radial-gradient(rgba (0,0,0,0.1),rgba(0,0,0,0.3) 50%,rgba(0,0,0,0.7));background:-ms-radial-gradient(rgba(0,0,0,0.1),rgba(0,0,0,0.3) 50%,rgba (0,0,0,0.7));background:radial-gradient(rgba(0,0,0,0.1),rgba(0,0,0,0.3) 50%,rgba (0,0,0,0.7));position:abso

rdp Hacking Full tut

Lemme show you some of my ways of Hacking RDP FRESH all countries.***Most important is your DICTIONARY.... forget about tools for now....Go and Get a dictionary of Password and UserName (But, password is very important) becuase, most people still use ADMIN< ADMIN!, ADMIN1 and you can guess...(google it, and don't be a noobiee).Good.now, 1. Download VNC Scanner.... (Google it)2. Download DuBrute ver. 2.2.... (works great) if you can get PM me i will give.3. Google Ip rangers in Countries (Google it)after this you are set to go...;Open VNC scanner and input the IP rangers (202.34.1.2 - 202.34.255.255 )... so ifyou need IP rangers in AFGHANISTAN..... if you got.... put it in and choose AFGANISTAN....IF UK or USA do same. and clcik on SCAN.you waitIt will run and run and give you success of IP which you can hack RDP depending on country you choose.After that on VNC Scanner, click Run Parse... it will select the best for you and then click on SAVE.... (But, before save... choose fil