So far, i have give some third party websites to track ip address of victim. Today we are going to create our own website or webpage to track victim IP address. I have written this PHP code for you.
Let me explain in two different methods
Method 1:
Log ip and redirect to some other...
I installed in ubuntu inside Windows XP. It works perfectly for 2 months. Recently I met with this problem:
mount: mounting /sys on /root/sys failed: no such file or directory
mount: mounting /dev on /root/sys failed: no such file or directory
mount: mounting /sys on /root/sys failed: no such...
Update:
The forum is deleted becoz we are not able to maintain it.
—
Hi BTS readers, We are proud to say our Ethical Hackers, programmers Forum is launched now. Join with us now.
Our forum’s page rank is 2.
Our forum is mainly concerned with two parts:
Programming(My Favorite part)...
Usually if we download free software from public file hosting service website, it may contain some virus or keylogger. If you run the program without scanning, it leads to problem in your computer. So it is necessary to scan your files before you run or open.
For scanning purpose, you don’t...
Wireshark 1.6.1 and 1.4.8 have been released. Installers for Windows, Mac OS X 10.5.5 and above (Intel and PPC), and source code are now available.
In both wireshark versions vulnerability is fixed
For more details and Download wireshark versions from here...
Want to make your friend shock? Call your friend from their number and make them shocked. Now i will explain you how to do that
Steps to Follow:
1. Go to http://www.mobivox.com and register there for free account.
2. During registration, remember to insert Victim mobile number in “Phone...
Use your Pen drive as RAM using the Eboostr Accelerate.
Download Eboostr
Eboostr download
Features
No Hardware Upgrades Needed
Launch Favorite Applications Faster
Use Hidden RAM
New and Improved Cache Configuration
Windows 7 Compatible
For more details visit...
In this post i will guide you to how to create a FTP server in your home. Though there is lot of steps to folow, but it is very simple to do that. So i just follow my steps .
What you need?
Serv-U 10.0 or other versions
No-IP.com Website
Step 1: How to get the static address in NO-IP.COM...
We are using Airtel GPRS for free from 2005 . Still Airtel didn’t debug it. But Airtel block many of browser and client Now the Airtel is GPRS is again hacked using Proxifier.
How to use it?
dialup number- *99# or *99*1# (it depends handset model)
Access point- airtelfun.com (default airtel...
T5V6P3XV8NNR
Today I am going to guide you to create a Batch Program to delete all unwanted temporary files from your temp folder.
1.Copy this code :
ECHO This Batch File deletes all unwanted Temporary files from your
system ECHO Now we go to the Windowstemp directory.
cd %temp%
ECHO...
Every time that you send an email, copies are stored permanently on multiple email servers as well as the recipient’s inbox and anyone they decide to send it to. Your emails can be stored and scanned in more places than you can imagine. Do you want people storing your email messages forever? Do...
In this tutorial i will guide you to top 10 important and famous command prompt commands with their usage.
1. ipconfig :
This is the top most command for seeing the ip address,subnet mask and default gateway also includes display and flush DNS cache, re-register the system...
Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.
1. Open the command prompt (Start->Run->type...
Obviously everyone want shortcut for everything. Here is the trick to create a shortcut
for shutdown on Desktop.Follow the steps.,
Step1: Right click on your desktop.click new and click new shortcut.
Step2:a small window will open.
for shutdown type as “shutdown -s -t 00
for logoff type as...
Hibernation is a power saving option which was designed primarily for laptops. Unlike “sleep mode” which puts the open documents and files into the memory, hibernation puts all the open files and documents on to the hard disk and shuts down the computer without drawing even a small amount of...
HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that...
What is Blind SQL Injection:
Some Websites are vulnerable to SQL Injection but the results of injection are not visible to the attacker. In this situation, Blind SQL Injection is used. The page with the vulnerability may not be one that displays data but will display differently depending on the...