Entradas

Mostrando entradas de julio, 2011

Songs.pk hacked by Indishell Against Mumbai blasts

Imagen
Songs.pk hacked by Indishell Against Mumbai blasts 1 digg digg Posted by THN Reporter On 8:44 AM Songs.pk hacked by Indishell Against Mumbai blasts Patriotic Indian Hackers " Indishell " / Indian Cyber Army finally Strike to the Biggest Pirated Music Download Website of Bollywood Albums run by Pakistan crew. The hack is perform against the Mumbai blasts - Wednesday 13 July 2011. Pakistan issues a condemnation after three attacks blamed on terrorists strike Mumbai, targeting the city's Opera House district, its Zaveri bazaar and the central Dadar area. Indian hackers Hack the Songs.pk and add there deface page with a message at http://songs.pk/usersonline/usersonline.php . Message By Indishell " Pray for all the innocent victims of Mumbai attack ..This is a small answer from All Indians.. Remember we are Together..You can just kill innocent people .. Women & Childrens..But There is no Future for you.. We are coming with huge speed..Corruption will

PuTTY v.0.61 New Version released After 4 years

Imagen
DISA hacked THE CRAZIES Hackers Leaks Server Certificates of Defense Information Systems Agency (DISA).... EC-Council Academy Hacked EC-Council Academy Hacked by GaySec (Malaysian hackers) Songs.pk hacked Songs.pk hacked by Indishell Against Mumbai blasts Pentagon Hacked Pentagon Admits to biggest ever data breach UK Vodafone Hacked UK Vodafone Phone Hacking method exposed DISA hacked THE CRAZIES Hackers Leaks Server Certificates of Defense Information Systems Agency (DISA).... EC-Council Academy Hacked EC-Council Academy Hacked by GaySec (Malaysian hackers) Songs.pk hacked Songs.pk hacked by Indishell Against Mumbai blasts Pentagon Hacked Pentagon Admits to biggest ever data breach UK Vodafone Hacked UK Vodafone Phone Hacking method exposed PuTTY v.0.61 New Version released After 4 years digg Posted by THN Reporter On 11:41 PM PuTTY v.0.61 New Version released After 4 years After four Years, Putty's New version finally Released today.Here are the PuTTY

Red Hat......

Red Hat, el proveedor líder mundial de soluciones de open source empresarial, ha anunciado el lanzamiento de Red Hat Enterprise MRG 2.0, que incluye mejoras en las capacidades de mensajería del producto, en los componentes de computación distribuida y comunicación en tiempo real. Red Hat Enterprise MRG 2.0 incluye importantes avances en rendimiento, escalabilidad y gestión, y también incluye soporte para la última versión de la plataforma Red Hat Enterprise Linux, permitiendo a los clientes beneficiarse de los avances realizados en Red Hat Enterprise Linux 6.1. Red Hat Enterprise MRG ofrece alta velocidad y baja latencia, un estándar abierto de aplicaciones de mensajería; un kernel de núcleo determinado en tiempo real de baja latencia y un programador de computación distribuida de alto rendimiento para cargas de trabajo distribuidas y en cloud. El lanzamiento de Red Hat Enterprise MRG 2.0 amplía la funcionalidad de Enterprise MRG, con las siguientes mejoras: · Soporte para Red Hat En

Account created successfully.....

Account created successfully. Settings * FTP Username: YourName@jaypettyjohn.com * Password: i-iS)4eFCmo^ * FTP Server: http://www.facebook.com/l/KAQDcjd_1AQDu1seA81LBMt5R8V1PPvUmqQ0rrDP54IAY3w/ftp.jaypettyjohn.com * FTP Server Port: 21 * Quota: unlimited MB

203.59.48.53

PUTTY LOG.....HACK HACK HACK FOR ADVANCE HACKERS...NO LAMMERS !!!

Imagen
  The Hacker's Language Language, in short it's a mean to communicate with each other, people generally talk with each other by using sentences, phrases, etc, etc, there are many different languages which can be found spoken all over and around the world. Basically, every different country has its own language, so its not possible for others to communicate with them and also it's very hard for a person to learn every those such languages. For this people had made a common language, which can be used to communicate with each and everyone, i.e., English. Hackers have also found there own language, which they basically use to communicate with each other. The Hacker's language used by the hackers to communicate with each other hackers is ' leet '. For example , leet spelling of the word leet include 1337 and l33t. It was originally created by a groups of chatters/gamers in early 1980s, it was developed to frustrate text filters created by BBS or Internet Chat S

How to download youtube videos without using any downloader?

Imagen
How to download youtube videos without using any downloader? ......................................................................................................................................................... Hey guyzzz now u dont need to have any additional downloader for youtube because this tricks will surely workuout for you. Here is the easiest way to download any video from Youtube. 1.While playing the video on youtube.com, Copy its location from the address bar like http://www.youtube.com/watch?v=S2JSr6QNGdM&feature=feedrec_grec_index then add the word ‘ kick ’ between www. and youtube .com/link……. EXAMPLE:www. kick youtube.com/watch?v= S2JSr6QNGdM&feature=feedrec_grec_index 2. you can also add "Kiss" & "save" in place of kiss. 3. u can also goto www.keepvid.com just paste the youtube video url in the bar nd press download you will get the desired list of formats of video available for downloads. That’s it, Download without an

LDAP INJECCTION ADVANCE HACKING AND FOR ADVANCE HACKERS...

LDAP son las siglas de L ightweight D irectory A ccess P rotocol (en español Protocolo Ligero de Acceso a Directorios ) que hacen referencia a un protocolo a nivel de aplicación el cual permite el acceso a un servicio de directorio ordenado y distribuido para buscar diversa información en un entorno de red. LDAP también es considerado una base de datos (aunque su sistema de almacenamiento puede ser diferente) a la que pueden realizarse consultas. Un directorio es un conjunto de objetos con atributos organizados en una manera lógica y jerárquica. El ejemplo más común es el directorio telefónico, que consiste en una serie de nombres (personas u organizaciones) que están ordenados alfabéticamente, con cada nombre teniendo una dirección y un número de teléfono adjuntos. Un árbol de directorio LDAP a veces refleja varios límites políticos, geográficos u organizacionales, dependiendo del modelo elegido. Los despliegues actuales de LDAP tienden a usar nombres de Sistema de Nombres de D