<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4973592786516830049</id><updated>2024-09-01T16:10:02.130+07:00</updated><category term="Hacking"/><category term="Tutorial"/><category term="Tips-tricks"/><category term="Internet Hacking"/><category term="Viruses"/><category term="Hack Tools"/><category term="Downloads"/><category term="Network Security"/><category term="Windows"/><category term="Linux"/><category term="Backtrack 4"/><category term="Backtrack linux"/><category term="Email"/><category term="Operating System"/><category term="Security"/><category term="Symbian"/><category term="Virology"/><category term="IP hacking"/><category term="Password Hacking"/><category term="Anti Virus"/><category term="Computer"/><category term="Programming"/><category term="Proxy Server"/><category term="SQL database"/><category term="Windows Hacking"/><category term="Break Security"/><category term="Cryptograph"/><category term="Install"/><category term="MD5 Cracking"/><category term="Mozilla"/><category term="Website"/><category term="Command Prompt Hack"/><category term="Introduction"/><category term="JavaScript"/><category term="Phising"/><category term="System"/><category term="Browser"/><category term="C++ Programming"/><category term="Cracking"/><category term="Facebook"/><category term="Keylogger"/><category term="Scanner"/><category term="Software"/><category term="Android"/><category term="Anonimous"/><category term="Autorun"/><category term="Axecrypt software"/><category term="Bkackberry"/><category term="Encryption"/><category term="Iphone"/><category term="Malware"/><category term="Mobile hacking"/><category term="Portable"/><category term="Python"/><category term="Registry"/><category term="Smartphone"/><category term="Uncategory"/><title type='text'>archives tech</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>79</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-8564611203242841950</id><published>2011-04-25T17:05:00.001+07:00</published><updated>2011-04-25T17:05:05.057+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Portable"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips-tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>USB flash drive portable browsers</title><summary type="text">    
    Have you ever been some  place other than your home on your computer? If your answer is anything  other then yes, you need to stop being a computer hugging hippy and go  outside, get a whif of some fresh air, step on some dog crap and  accidently run over a cat. It’ll do you some good. Anyways, have you  visited someone somewhere and while using his/her/its computer, you  realized you </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/8564611203242841950/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/usb-flash-drive-portable-browsers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/8564611203242841950'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/8564611203242841950'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/usb-flash-drive-portable-browsers.html' title='USB flash drive portable browsers'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-2737307649375161373</id><published>2011-04-25T02:56:00.001+07:00</published><updated>2011-04-25T02:56:11.463+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Introduction"/><title type='text'>School of Hack part-1</title><summary type="text">You never ask, “How do I become a  hacker?” and you never say “I am a hacker.”  Nowadays, you will run into  countless YouTube Videos and blogs regarding “hacking.” I’m glad to  hear Mr. Cracker’s first few episodes focused on what is a hacker and  how does one hack. However, there are many stories that can be credited  for tainting the term, like an incident in Los Alamos in 1982.

Webster’s </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/2737307649375161373/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/school-of-hack-part-1.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/2737307649375161373'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/2737307649375161373'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/school-of-hack-part-1.html' title='School of Hack part-1'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-4881695232349325014</id><published>2011-04-25T02:47:00.002+07:00</published><updated>2011-04-25T02:58:59.737+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Introduction"/><title type='text'>School of Hack</title><summary type="text">I’m glad to have seen a positive  response on the first part  of this series. Before I elaborate in programming in python or other  hacking languages, I want to discuss with you the second important skill  in hacking. In case you have not guessed it, if you want to become a  hacker, you need know an Open Source UNIX operating system.

Can you hack in Windows?&amp;nbsp; Yes. Windows is a  good </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/4881695232349325014/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/school-of-hack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/4881695232349325014'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/4881695232349325014'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/school-of-hack.html' title='School of Hack'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-5187640721462060742</id><published>2011-04-25T02:24:00.004+07:00</published><updated>2011-04-25T03:29:06.310+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Uncategory"/><title type='text'>Write for CyberCROW</title><summary type="text">
Would you like to earn a few bucks  by writing about what you know? Well, now you CAN! I  will pay $1.00 whole dollars via PayPal for every article that you  submit and possibly more depending on the content. That’s a free Subway one dolla’ foot long! But the article must be:

original content
related to security/hacking
proper grammar ( I’m not going to be doing proofreading)
the article must </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/5187640721462060742/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/write-for-mrc.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/5187640721462060742'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/5187640721462060742'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/write-for-mrc.html' title='Write for CyberCROW'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-5292185751400042945</id><published>2011-04-25T02:19:00.002+07:00</published><updated>2011-04-25T02:50:23.930+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Python"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips-tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>Installing Python on Linux</title><summary type="text">
I’m  back. Being that summer was in session,  let’s say school was out, and I  disappeared for a while doing some  stuff for business purposes. So last  time I wrote, School of  Hacks – Part 2,  I emphasized the use or learning and understanding a  UNIX/Linux  Operating System. Based on the feedback, it goes without  saying that  learning Python is a popular response to learn next.

I plan to </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/5292185751400042945/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/installing-python-on-linux.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/5292185751400042945'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/5292185751400042945'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/installing-python-on-linux.html' title='Installing Python on Linux'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-3116120026264069577</id><published>2011-04-24T08:43:00.000+07:00</published><updated>2011-04-24T20:27:38.401+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack 4"/><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Cracking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hack Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>Hacking/Cracking WEP Using Backtrack: A Beginners Guide</title><summary type="text">A. SCOPEThis tutorial is intended for users with little or no experience with  linux or wifi. The folks over at remote-exploit have released BacktrackGet it Remote-Exploit.org - Supplying offensive security  products to the worlda tool which makes it ridiculously easy to access any network secured  by WEP encryption. This tutorial aims to guide you through the process  of using it </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/3116120026264069577/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/hackingcracking-wep-using-backtrack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/3116120026264069577'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/3116120026264069577'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/hackingcracking-wep-using-backtrack.html' title='Hacking/Cracking WEP Using Backtrack: A Beginners Guide'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-4987761525428903143</id><published>2011-04-24T02:13:00.000+07:00</published><updated>2011-04-25T01:19:39.487+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack 4"/><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Operating System"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>Backtrack 4 Forensics Capabilities</title><summary type="text">When you first boot up the new Backtrack 4, you may have noticed  something slightly different.   So what is this “Start BackTrack  Forensics” option about? Live CDs and ForensicsFor a long time now, Linux Live CDs have been very useful for  forensic acquisition purposes in instances where for one reason or  another you can’t utilize a hardware write blocker. When configured not  to automount </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/4987761525428903143/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/backtrack-4-forensics-capabilities_24.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/4987761525428903143'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/4987761525428903143'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/backtrack-4-forensics-capabilities_24.html' title='Backtrack 4 Forensics Capabilities'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-4090270385692395228</id><published>2011-04-24T02:06:00.000+07:00</published><updated>2011-04-24T20:27:38.401+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack 4"/><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Operating System"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips-tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>Customizing the BackTrack Image</title><summary type="text"> Customizing the BackTrack iso is  simple, using a pre-made script. Ideally, you should be editing the ISO  file *on a BackTrack install* to ensure correct versions of squashfs,  etc. Otherwise your mileage will vary.  Please note that the script is  very basic, and will need some modification (such as the hardcoded iso  filename, etc). Make sure to look through it before running it.  For  more </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/4090270385692395228/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/customizing-backtrack-image.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/4090270385692395228'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/4090270385692395228'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/customizing-backtrack-image.html' title='Customizing the BackTrack Image'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-5576866069563461583</id><published>2011-04-24T02:02:00.000+07:00</published><updated>2011-04-24T20:27:38.402+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack 4"/><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Install"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Operating System"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>Install BackTrack in VMWare</title><summary type="text">Follow the basic install instructions here to get BackTrack installed in a VMware  machine.Log into BackTrack. To install the VMWare drivers, the kernel  source and headers need to be in place. By default in the BackTrack 4  final release, the kernel (denoted by {version} ) is configured and  ready. However in some cases, you might need to make sure you have the  latest kernel sources by typing </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/5576866069563461583/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/install-backtrack-in-vmware.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/5576866069563461583'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/5576866069563461583'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/install-backtrack-in-vmware.html' title='Install BackTrack in VMWare'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-6047956866858125804</id><published>2011-04-24T01:49:00.000+07:00</published><updated>2011-04-24T20:27:38.402+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack 4"/><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Install"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Operating System"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>BackTrack Live USB Install</title><summary type="text">This method of getting a live install to a USB drive is the simplest  available using Unetbootin. Note that we will format the USB drive and  erase its contents. Plug in your USB Drive (Minimum USB Drive capacity 2 GB)Format the USB drive to FAT32Download Unetbootin from http://unetbootin.sourceforge.net/Start Unetbootin and select diskimage (use the backtrack-final ISO)Select your USB drive and </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/6047956866858125804/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/backtrack-live-usb-install.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/6047956866858125804'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/6047956866858125804'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/backtrack-live-usb-install.html' title='BackTrack Live USB Install'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-4070761510726050207</id><published>2011-04-24T01:44:00.000+07:00</published><updated>2011-04-24T20:27:38.402+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack 4"/><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Install"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Operating System"/><title type='text'>BackTrack Dual Boot Install with Windows (Tested on Win 7)</title><summary type="text">This method of installation is the simplest available. The assumption  is that the you have a Windows installation taking up all the space on  your drive, and you would like to resize and repartition your drive to  allow a BackTrack install alongside your Windows. BACK UP YOUR WINDOWS  INSTALLATION FIRST. Boot BackTrack on the machine to be installed. Once booted, type in  “startx” to get to the </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/4070761510726050207/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/backtrack-dual-boot-install-with.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/4070761510726050207'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/4070761510726050207'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/backtrack-dual-boot-install-with.html' title='BackTrack Dual Boot Install with Windows (Tested on Win 7)'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-7703054683041325899</id><published>2011-04-24T01:40:00.000+07:00</published><updated>2011-04-24T20:27:38.402+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack 4"/><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Install"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Operating System"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>Install BackTrack to Hard Disc</title><summary type="text">BackTrack Clean Hard Drive InstallThis method of installation is the simplest available. The assumption  is that the whole hard drive is going to be used for BackTrack.Boot BackTrack on the machine to be installed. Once booted, type in  “startx” to get to the KDE graphical interface.Double click the “install.sh” script on the desktop, or  run the command “ubiquity” in console.Select your </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/7703054683041325899/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/install-backtrack-to-hard-disc.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/7703054683041325899'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/7703054683041325899'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/install-backtrack-to-hard-disc.html' title='Install BackTrack to Hard Disc'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-3151156508164390485</id><published>2011-04-24T00:59:00.001+07:00</published><updated>2011-04-25T01:26:36.841+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Break Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL database"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>Break the Database of Website using SQL Injection</title><summary type="text">
  
&amp;nbsp;In this tutorial i  am going to guide how to hack the website database using SQL  injection.&amp;nbsp; First of all you need to understand what is sql injection,  so kindly read  this tutorial

How to Break the Database:
 
Step 1 :
First we need to check whether website is vulnerable or not( i meant  hackable or not) . In order to that, you need to  find a page that looks  like this:



</summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/3151156508164390485/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/break-database-of-website-using-sql.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/3151156508164390485'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/3151156508164390485'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/break-database-of-website-using-sql.html' title='Break the Database of Website using SQL Injection'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW3EstsJlXTmNUOYM_4FfQZuUyaifjoG2SrxOon3HHO76k3N6IBKMggfIpbuSMaX2jmi72lzchiKsvnIJHzVKxceWYW69YHHlrwAc5snHdCKgmvvOTpeAAYhH2om8dw41WA26mpl9B_ks/s72-c/sql+injection+2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-6576525235228132634</id><published>2011-04-24T00:49:00.000+07:00</published><updated>2011-04-24T20:27:38.403+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL database"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>What is Database and MY SQL Injections</title><summary type="text">  In this i&#39;ll give you intro to the SQL Injections. Next post will give  you detailed information about the SQL injections.What is the Database?&amp;nbsp; Datbase is an application that stores a collection of Data.Database  offers various APIs for creating, accessing and managing the data it  holds. And database(DB) servers can be integrated with our web  development so that we can pick up the </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/6576525235228132634/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/what-is-database-and-my-sql-injections.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/6576525235228132634'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/6576525235228132634'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/what-is-database-and-my-sql-injections.html' title='What is Database and MY SQL Injections'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVbIhsQMtG-a24WG4F7oybyglnCeSSShhbnI1u1IJAZCS_xaYFXViuOvDqzbeAzZK3kRncpApq_esqJ7HXaZyGhqUS2BlYz3uDkBfG2Lb4DePuSCWqk8U7X3Oj1MKPkqUTXXoCD2xMiuA/s72-c/sql+injection.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-5591946608729593282</id><published>2011-04-24T00:46:00.001+07:00</published><updated>2011-04-25T01:29:08.822+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL database"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips-tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><category scheme="http://www.blogger.com/atom/ns#" term="Website"/><title type='text'>METHODS USED FOR WEBSITE HACKING</title><summary type="text">COMMON METHODS USED FOR WEBSITE HACKING
 Remote File Inclusion or RFI 
SQL injection
Cross site scripting or XXS
Local file inclusion or LFI
Directory Traversal attack



RFI: 
&amp;nbsp; RFI stands for Remote File Inclusion and it allows the attacker to   upload a custom coded/malicious file on a website or server using a   script.&amp;nbsp; The vulnerability occurs due to the use of user supplied input</summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/5591946608729593282/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/methods-used-for-website-hacking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/5591946608729593282'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/5591946608729593282'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/methods-used-for-website-hacking.html' title='METHODS USED FOR WEBSITE HACKING'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-3751627626060348941</id><published>2011-04-24T00:31:00.000+07:00</published><updated>2011-04-24T20:27:38.403+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack 4"/><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Downloads"/><category scheme="http://www.blogger.com/atom/ns#" term="Hack Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="IP hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Operating System"/><category scheme="http://www.blogger.com/atom/ns#" term="Password Hacking"/><title type='text'>Backtrack 4 Linux Introduction to BTS readers-Hack professionally</title><summary type="text">Back Track 4-The OS known  for Hacking/Penetration Testing.Back Track 4 -  Ethical Hacking Tutorials(BTS)BackTrack is Linux Based Penetration Testing Operating  system which help the security professionals to test the security of the  system.  The Special thing the about this OS is that no need to  install.  You can run the Backtrack directly from CD,Flash/Pen  Drive.(you can install the </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/3751627626060348941/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/backtrack-4-linux-introduction-to-bts.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/3751627626060348941'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/3751627626060348941'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/backtrack-4-linux-introduction-to-bts.html' title='Backtrack 4 Linux Introduction to BTS readers-Hack professionally'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9sVXULgJ-HQEphOeuYXLCO9z7kNAE1OUTo9ayRQTA_SnNXm4-RsxUd1Of_kFwj0MAQUPb_Br-mshDWHHi5X-I-e8uXy0uc-pQt4R4Xx3Vw9ixd4i-S2YvQvIZLVyNphSDEfyI6tpteCY/s72-c/BackTrackLinux_4_r2_Hacking_and+Security.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-8533646633310428305</id><published>2011-04-11T15:42:00.000+07:00</published><updated>2011-04-24T20:27:38.403+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Break Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Downloads"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Virology"/><category scheme="http://www.blogger.com/atom/ns#" term="Viruses"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows Hacking"/><title type='text'>How to hide the windows while running the virus code?</title><summary type="text">Good Morning Friends...!!&amp;nbsp; This day will be great day!&amp;nbsp; Because Break The Security get top rank in blogger directories.&amp;nbsp; Now i am going to introduce a new tool called as &quot;CMDOW&quot; .&amp;nbsp;&amp;nbsp; When you create and send virus to victim, the virus running process may be shown to victims.&amp;nbsp; This tool will hide that also.About CmdowCmdow is a Win32 commandline utility for NT4/2000/XP</summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/8533646633310428305/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/how-to-hide-windows-while-running-virus.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/8533646633310428305'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/8533646633310428305'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/how-to-hide-windows-while-running-virus.html' title='How to hide the windows while running the virus code?'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-1233972196596075525</id><published>2011-04-11T15:24:00.000+07:00</published><updated>2011-04-24T20:27:38.403+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Hack Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Mozilla"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>How to Hack Facebook account using Wi-Fi?</title><summary type="text">Recently You mozilla add on namely &quot; FireSheep&quot; is used for hack thousands of email accounts . As reported by techcurnch, Firesheep has been downloaded more than  104,000 times in roughly&amp;nbsp; within 24 hours.What is the Special in FireSheep?&amp;nbsp;Using FireSheep add on you can control any account without knowing the username and password .&amp;nbsp;&amp;nbsp; Famous Social Network Facebook is victim of</summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/1233972196596075525/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/how-to-hack-facebook-account-using-wi.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/1233972196596075525'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/1233972196596075525'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/how-to-hack-facebook-account-using-wi.html' title='How to Hack Facebook account using Wi-Fi?'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFu8RrUa1QRSJ2vLacmRtFXAi5VFGUtzEwMyHUBeKgwQk_0arAFLbet19i6fjfjJiixVWJnyW8_jPaXY4eAoRce4J-bBQmyFwkR-xuNA1sv6uAAQg3wAY09724Gwl5bAPN9eo1qdsmW2M/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-6864124834586974599</id><published>2011-04-11T14:51:00.000+07:00</published><updated>2011-04-24T20:27:38.403+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Email"/><category scheme="http://www.blogger.com/atom/ns#" term="Hack Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Password Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Phising"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips-tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>How to create fake or Phishing web page for gmail</title><summary type="text">&amp;nbsp;This post will explain you how to create fake or phishing web page for gmail.  This Procedure can be used to make fake page for other websites like yahoo,msn,or any other sites which you want to steal the password of particular user.Steps for Creating Phishing or Fake web Page:Step 1:Go to the gmail.com.&amp;nbsp; Save the Page as &quot;complet HTML&quot; fileStep 2:Once you save the login page </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/6864124834586974599/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/how-to-create-fake-or-phishing-web-page.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/6864124834586974599'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/6864124834586974599'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/how-to-create-fake-or-phishing-web-page.html' title='How to create fake or Phishing web page for gmail'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja9r2p6zCsorpM6O6-f1cEDwHwgHz5zow887OysGPukbzbv9bEIS6z_xD96xKvxKbmW9qxT3RfvO_UaH0fC_uCh1dONFt0n5TNpMqeO5muv3SN3ec2tuhu1LXUiGwdN3t1EBKBscZrMGw/s72-c/Gmail+phishing.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-337611150568486142</id><published>2011-04-11T14:45:00.000+07:00</published><updated>2011-04-24T20:27:38.404+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Email"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Phising"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips-tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>Different types of Email Account Hacking</title><summary type="text">The Basic level Hacking is Email Account Hacking.&amp;nbsp; Everyone like to do first email account hacking only.&amp;nbsp; So here is the tutorial for budding hackers about email Hacking.There are different types of Email Account Hacking .&amp;nbsp; Here is some of them :Social Engineering PhishingBrute Force Attack&amp;nbsp;Keylogger&amp;nbsp;Guessing the Answer for the Security QuestionSocial Engineering:Social </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/337611150568486142/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/different-types-of-email-account.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/337611150568486142'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/337611150568486142'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/different-types-of-email-account.html' title='Different types of Email Account Hacking'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW_blnUrEU2-ZQ8DtUDFkxQAdxE3I6wKA_pOtmsnZRPIBKNpr5ebAzoW4uWWlvuezXtpmGPJGKRigjxxGLk_4f-1bnzLUJUSVTegR0NOyd5j40EumIwmrN1PpH3YDCun7-BzrBa09hFZ8/s72-c/email+this.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-4905146071139369739</id><published>2011-04-11T14:42:00.001+07:00</published><updated>2011-04-25T01:34:29.959+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Email"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Phising"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips-tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><category scheme="http://www.blogger.com/atom/ns#" term="Website"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Use Original Domain Address for Phishing Web page</title><summary type="text">
Hi friends ,&amp;nbsp; you may have known about how to create phishing web Page.&amp;nbsp; If you don&#39;t know about Phishing Web Page, you need to read this tutorials first:
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Different  Types of Email account
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; How  To Create fake or phishing web pageOnce you know the basics of Phishing web Page ,come to this post.  

Ok </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/4905146071139369739/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/use-original-domain-address-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/4905146071139369739'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/4905146071139369739'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/use-original-domain-address-for.html' title='Use Original Domain Address for Phishing Web page'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4cCn_nDgHeMRtbdEjB_bTyq3qvqkHBh-u_2il4bpjVx1-Gf68EcHj0OkDEs6-pJ70wE936VTVlHTA4v6RibyKr1CxFyEeh_bXCgJ4PLG6P3S3Rlaue1tKtk3j-HBiS_cnlZt5r0eVIUk/s72-c/Phishing2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-7606050710073707051</id><published>2011-04-11T14:21:00.000+07:00</published><updated>2011-04-24T20:27:38.404+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Email"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips-tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>Temporary Disposable Email address Services</title><summary type="text">&amp;nbsp;While signing up to an online account or doing such stuff on web, you  can use these temporary disposable email addresses provided by email  services. This keeps your real email address protected from spam. These  services provide you with email addresses of the format you desire.  Temporary email addresses last for time duration varying from few hours  to some months, depending on the type</summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/7606050710073707051/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/temporary-disposable-email-address.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/7606050710073707051'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/7606050710073707051'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/temporary-disposable-email-address.html' title='Temporary Disposable Email address Services'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-5749095103348240617</id><published>2011-04-11T14:18:00.000+07:00</published><updated>2011-04-24T20:27:38.404+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Email"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips-tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>You can now send a self destruction Email from Big string</title><summary type="text">Every time that you send an email, copies are stored permanently on multiple email servers as well as the recipient&#39;s inbox and anyone they decide to send it to. Your emails can be stored and scanned in more places than you can imagine. Do you want people storing your email messages forever? Do you want something that you type today to be used against you tomorrow, next week, next month or even </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/5749095103348240617/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/you-can-now-send-self-destruction-email.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/5749095103348240617'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/5749095103348240617'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/you-can-now-send-self-destruction-email.html' title='You can now send a self destruction Email from Big string'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-5529996374884333918</id><published>2011-04-11T14:11:00.000+07:00</published><updated>2011-04-24T20:27:38.404+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Email"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips-tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>How you are getting large number of spam mail ? Know why</title><summary type="text">Are you getting lot of spam mails to your inbox?&amp;nbsp; Do you know why it comes to your mail? The mistake is yours only.&amp;nbsp; Because of you only you are getting larger number of spam.&amp;nbsp; How you responsible for that? Go ahead to know what is your mistake.Spam Mail Definition: Also known as junk mail.&amp;nbsp; Sending large number of identical message to numerous recipients .&amp;nbsp;&amp;nbsp; </summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/5529996374884333918/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/how-you-are-getting-large-number-of.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/5529996374884333918'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/5529996374884333918'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/how-you-are-getting-large-number-of.html' title='How you are getting large number of spam mail ? Know why'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4973592786516830049.post-8064938797214459474</id><published>2011-04-11T14:04:00.000+07:00</published><updated>2011-04-24T20:27:38.405+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Email"/><category scheme="http://www.blogger.com/atom/ns#" term="Mozilla"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips-tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>How to Access Multiple Gmail accounts in Firefox without logout?</title><summary type="text">are you having multiple gmail accounts? As far as browsers concerned , we can login with only one gmail account.  Here  i am going to introduce a new Mozilla add on.  This add on will allow you to login in multiple account without logout the accounts.How to do?visit:https://addons.mozilla.org/firefox/addon/748and Install the Add on.Now visit:http://userscripts.org/scripts/show/16341click on “</summary><link rel='replies' type='application/atom+xml' href='http://archivestech.blogspot.com/feeds/8064938797214459474/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://archivestech.blogspot.com/2011/04/how-to-access-multiple-gmail-accounts.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/8064938797214459474'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4973592786516830049/posts/default/8064938797214459474'/><link rel='alternate' type='text/html' href='http://archivestech.blogspot.com/2011/04/how-to-access-multiple-gmail-accounts.html' title='How to Access Multiple Gmail accounts in Firefox without logout?'/><author><name>glewoCROW</name><uri>http://www.blogger.com/profile/01909620908253425415</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='33' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPGDJevQuDzq49TwwkRt_NOqYkUmZxWkg0BwMGxuv7lkYw1Z9_E_iKZHx0C__645hWxwFqfHqBXifsdpljf2RwtwglUzqa0t-c-feElnSWUfNGlGAoNy8tnLxWuNeKQ/s220/cr.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdnXA-_HfAtRjzW1EufH2whdNgZ-VzGbi0juI2txGLCway_9ow-pi6KIN0iOjlxtMXD1n4VpH75Bft2ryAIPVB3zkfGZB80SmfwQ2JbCAJkfyA785sKCx7n-Gb5vAtnTeIRPhBtf_BMXQ/s72-c/gmail-multi-login.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>