How to use Windows 7 without activation

0 comments
http://m14hackersworld.blogspot.com

How to use Windows 7 without activation

Hi do you know that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately 1 year! Here is a way to Use windows 7 without activation.
Read more »

Access Any Website Or Forum Without Registering [COMPLETE]

0 comments
http://m14hackersworld.blogspot.com
[TUT] How to acces sites/forums without registering [COMPLETE]

Access Any Website Or Forum Without Registering
Let's come straight to the point !

Visit any forum or website to find something useful and they will ask you to register. Every time a forum asks me to register, I simply close the site. You would probably do the same. But this time, lets face it.

Before I begin, you should know how things work. All websites and forums will block unregistered users, but they won’t block Google Bot. What we will do is to switch our User Agent to that of Google Bot and freely browse any website or forum without registering.

First grab the add-on for Firefox called ‘user agentHere and install it. Now go to Tools > User Agent Switcher > Options and then again to Options.



user agent switcher options

Select User Agent from the left sidebar and click Add. Now in the description field type:
Code:
crawl-66-249-66-1.googlebot.com

and in user agent field type:
Code:
Googlebot/2.1 (+http://www.googlebot.com/bot.html)

as shown in the screenshot below.

adding a new user agent

Select Google Bot as your User Script by going to Tools > User Agent Switcher.

selecting google bot as user agent.

Now browse any website or forum without registering. Enjoy!

How to secure your wireless router

7 comments
http://m14hackersworld.blogspot.com

How to secure your wireless router

This is step by step on how to secure your wireless router
1
Connect your wireless router per the instructions in your user manual.

2
Open your Internet browser and enter the IP address assigned to your router. Major manufacturers assign different default IP addresses to their routers. For example, Netgear routers use 192.168.0.1 while Linksys uses 192.168.1.1. Consult your manual for details.

3
Log in to your router configuration by typing the username and password specified in your manual.

4
Set your Service Set Identificatier (SSID) by typing it into the box. This is the name of your wireless network. Make it a unique phrase; the default SSID is usually the name of the router manufacturer, such as Netgear or Belkin.

5
Set your wireless network's security protocol to WPA 2.0 -- Wi-Fi Protected Access. This encrypts any data sent over the network and allows access only to users who have the security key. Set your security key as something not easily guessed. A string of random numbers and letters is recommended. Be sure to record this security key in a safe place so you can recall it when adding a new device to your network or changing network security settings

Thanks hope you enjoyed

How to Create an Encrypted Zip Archive in Mac OS X and Windows

1 comments
http://m14hackersworld.blogspot.com

How to Create an Encrypted Zip Archive in Mac OS X and Windows

Archive files are great for portability and saving space, but a lot of people don't know they can also be encrypted. There are a lot of archiver programs out there, but most of them can open a file that's been encrypted using other software, as long as you're using a recent version.

Here's how to do it in both Mac OS X and Windows.

Mac OS X (Option 1)
There are two different methods for Mac users. The first uses the Apple Terminal. Open it up and type in the following command:

zip -e ~/Desktop/archive.zip

Then, drag the folder with the files you want to encrypt into the Terminal window. The command should look like this:

zip -e ~/Desktop/archive.zip /Path/to/folder

Now, just come up with a strong password and you're all set.

Mac OS X (Option 2)
The other option in OS X is to create a disk image. To do this, open the Automator program and select Service.

Choose files or folders from the first drop-down menu, then select Finder as the program. Drag the New Disk Image into the workflow area, then select Size disk image to fit contents and check the box next to it marked Encrypt.

Set the name and location where you want the file to be saved and change the last option to Reveal Finder Items.

Now, just save the workflow and it should become available in the Service menu. To use it to encrypt files, select the files and right-click, then choose your new disk image from the Services menu. Once you supply a password, it will encrypt them.

Microsoft Windows
In Windows, the easiest way to encrypt an archive is to do it directly from a program like WinZip. All you have to do is select the files, open the Actions menu, and choose Encrypt. Then just choose what type of encryption you want and enter a good password.

You can also do this while you're creating the archive by checking the Encrypt added files box.
Don't use WinZip? Here's a guide to encrypting files in 7Zip. Once you've created the archive, you should be able to open it in a recent version of any archiver software.

Crack IDM Manually Windows 7

9 comments
http://m14hackersworld.blogspot.com
Crack IDM Manually Windows 7
Crack IDM Manually (Specially for window 7 users)

Mostly time after updating your IDM, it shows error "you have registered IDM using fake serial key". If you are windows 7 user, then this post is for you, because for XP/Vista users , users can easily access full version IDM by downloading it from here without any keygen & error,

Follow these steps:

Download the IDM, then click on Registration.
A dialog box will appear asking for Name, Last Name, Email Address and Serial Key.
Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:
  1.                         RLDGN-OV9WU-5W589-6VZH1
  2.                         HUDWE-UO689-6D27B-YM28M
  3.                         UK3DV-E0MNW-MLQYX-GENA1
  4.                        398ND-QNAGY-CMMZU-ZPI39
  5.                        GZLJY-X50S3-0S20D-NFRF9
  6.                        W3J5U-8U66N-D0B9M-54SLM
  7.                        EC0Q6-QN7UH-5S3JB-YZMEK
  8.                        UVQW0-X54FE-QW35Q-SNZF5
  9.                        FJJTJ-J0FLF-QCVBK-A287M


After clicking, it will show error message that you have registered IDM using fake serial key and IDM will exit.
Now Go to the path C:\WINDOWS\system32\drivers\etc\hosts
Open hosts file with notepad.
Now copy the below lines of code and paste it to below 127.0.0.1 localhost
  1.                                     127.0.0.1 tonec.com
  2.                                     127.0.0.1 www.tonec.com
  3.                                     127.0.0.1 registeridm.com
  4.                                     127.0.0.1 www.registeridm.com
  5.                                     127.0.0.1 secure.registeridm.com
  6.                                     127.0.0.1 internetdownloadmanager.com
  7.                                     127.0.0.1 www.internetdownloadmanager.com
  8.                                     127.0.0.1 secure.internetdownloadmanager.com
  9.                                     127.0.0.1 mirror.internetdownloadmanager.com
  10.                                     127.0.0.1 mirror2.internetdownloadmanager.com

Save it.
Now check IDM, it should be converted to full version.
Note: This Tutorial is for all windows but In Windows 7 sometimes it denied access to write anything on hosts file, so first you must be logged in as Administrator and then change the file permissions of hosts file.

Enjoy it.


How To Remove One Operating System from Dual Boot Windows?

0 comments
http://m14hackersworld.blogspot.com
How To Remove One Operating System from Dual Boot Windows?
     
Removing a dual boot can be dangerous and it does not guarantee that windows will forget about the 2nd boot sector. Most of us install two operating system in the pc just like windows xp and window 7 to get entertained by both the ends and can use any of them one by one. This adds ability to use any version but side by side adds some heavy burden on system and kills its performance.

How to remove one operating system from windows
Press Start Button and choose Run or cmd, you can also open Run command by pressing Windows Key + R
Now in cmd or Run dialog just type

 sysdm.cpl

and press enter, now System Properties Dialog will open in front of you.
Click on Advanced Tab and press Setting under Start up and Recovery option.
Now under System Startup Area click on Edit Button, if you have only one operating system installed then you will not see any Edit Button.
Now  a notepad file will open, that’s the boot.ini file.

“[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(1)WINDOWS
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)WINDOWS=”Windows XP Professional” /fastdetect
multi(0)disk(0)rdisk(0)partition(2)WINNT=”Windows 7” /fastdetect”



Now suppose if you want to delete Windows XP Professional from your system, just delete below line.

multi(0)disk(0)rdisk(0)partition(1)WINDOWS=”Windows XP Professional” /fastdetect

Now you had to remove the remaining files or operating system folder from the drive in which its installed so just navigate to the drive and delete the operating system folder and then restart your system

VPN CHECK PRO

1 comments
http://m14hackersworld.blogspot.com
VPN CHECK PRO
Do you feel half secure while using your VPN service?
What if you can get that other half?

The best security solution for your VPN connection and Computer ID.
Auto login for VPN and OpenVPN. Shutdown network or close and
autostart programs upon VPN crash. Unlimited programs supported.
Read more »

ESET Nod32 SmartSecurity & ESET Nod32 AntiVirus 2013 Usernames & Passwords

3 comments
http://m14hackersworld.blogspot.com
ESET Nod32 SmartSecurity & ESET Nod32 AntiVirus 2013 Usernames & Passwords

  1. Nod32 Username:TRIAL-74367616 Eset Password:3xn7t534h4
  2. Nod32 Username:TRIAL-74367611 Eset Password:aef87mdfp2
  3. Nod32 Username:TRIAL-74367614 Eset Password:bj8tuj3n38
  4. Nod32 Username:TRIAL-74367607 Eset Password:cd32d85c8a
  5. Nod32 Username:TRIAL-74369681 Eset Password:akdba5um4a
  6. Nod32 Username:TRIAL-74369710 Eset Password:x8xabubpfj
  7. Nod32 Username:TRIAL-74369739 Eset Password:6pnb783pn4
  8. Nod32 Username:TRIAL-74369783 Eset Password:sabf6vb2vj
  9. Nod32 Username:TRIAL-74369815 Eset Password:2s3h2b3x44
  10. Nod32 Username:TRIAL-74369845 Eset Password:7ashunrxak
  11. Nod32 Username:TRIAL-74369855 Eset Password:pb8e6k26tt
  12. Nod32 Username:TRIAL-74369876 Eset Password:erhjp3fve6
  13. Nod32 Username:TRIAL-74369918 Eset Password:hfvmu5ebvc
  14. Nod32 Username:TRIAL-74369912 Eset Password:dsfh8uthds
Read more »

Advanced SystemCare with Antivirus 2013

0 comments
http://m14hackersworld.blogspot.com

Advanced SystemCare with Antivirus 2013

Based on #1 ranked BitDefender antivirus technology and IObit anti-malware engine, Advanced SystemCare with Antivirus 2013 incorporates top anti-virus capabilities, as well as the already proven comprehensive PC tune-up ability. It is a part of IObit antivirus project dedicating to provide more and better value-added services with our users. With its real-time protection against viruses, spyware and phishing attacks, powerful tuning-up and cleaning functionality, Advanced SystemCare with Antivirus 2013 provides always-on, automated, and all-in-one protection against all kinds of security threats, system slow down, freeze and crash. It ensures PC security, and maintains maximum computer performance automatically without slowing down your system. Advanced SystemCare with Antivirus 2013 is compatible with other security softwares like anti-virus, anti-malware, firewall, etc.

Advanced SystemCare with Antivirus 2013 is a stand-alone product. Besides the newly built-in antivirus functionality, it includes all the features of Advanced SystemCare PRO. PRO users who uninstalled Advanced SystemCare during the trial can easily revert it back at any time.

Click here to download for free trial

  • Installation Instructions:

  • 1.Disconnect internet

  • 2.Install Program.

  • 3.Use Given serial To register 

  • 4.Serial:
  • 94ABB-892A2-78B72-6DFD6



Better Protection, and No Performance Lag Anymore. See Comparison below

Key Benefits

  1. Unrivaled Detection Rate and Maximum Protection
  2. One click to clean hidden and stubborn Viruses, Trojans, worms, spyware, adware and various malware. Advanced SystemCare with Antivirus 2013 also provides an always-on, automated, and proactive protection against all kinds of Internet security threats, with rapid virus database updating.
  3. Enjoy Confident Security without System Slowdown
  4. Your system runs at its top speed without any performance lag, due to our industry-leading Internet security technology.
  5. Safe Surf, Search, Download and Share with Confidence
  6. Proactive Virus Control technology monitors processes behavior in real-time, scans files shared with email and blocks possible threats. Unmatched detection rate assures you a safer environment while using your PC.
  7. Get Highly-tuned Performance and Enjoy the New PC Feeling
  8. Already proven powerful PC tune-up ability unleashes the full power of your PC. With Real-time optimization and ActiveBoost feature, system resources are intelligently managed to ensure you a super-fast PC.


ESET NOD32 Antivirus & ESET Smart Security Username And Password Update 8-16 Oct 2012

1 comments
http://m14hackersworld.blogspot.com
ESET NOD32 Antivirus & ESET Smart Security Username And Password Update 8-16 Oct 2012


Username & Password Of Eset Smart Security 4, 5 & 6

Username: EAV-72006391
Password: 57pscc4d3j
Expiry Date: 11.12.2012

Username: EAV-72009466
Password: 88txub65nu
Expiry Date: 11.12.2012

Username & Password Of Eset Antivirus 4, 5 & 6

Username: EAV-72093755
Password: hjbk7nf5fu
Expiry Date: 11/3/2013

Username: EAV-72088402
Password: 7afjsrbfxt
Expiry Date: 11.03.2013

Cyber-D's Autodelete 3.11

0 comments
image[4]

Cyber-D's Autodelete can delete old files in a folder (and subfolders) you selected. Simply select the folder you wish to clean (downloads for example), set the rules (older than 30 days since created) and how to delete (move, recycle, secure delete). The cleanup is done on system startup only so it does not stay open in the background or you can run the cleanup manually. Log files are created per clean session and filters can be applied. Cleaning status window, run on startup and log files can be disabled if you wish.

 

If you are not satisfied with Autodelete, then you might want to give Belvedere a try. I did not make Belvedere myself, but it can also do what Autodelete does and more.

Cyber-D's Autodelete is also featured on PCWorld.

If you get an "Error 5:" message when autodelete runs, then you most probably are a Windows Vista user and have UAC (User Account Control) turned on. The only way to run autodelete with UAC on is by running it as an administrator. You can also right-click on the autodelete shortcut and go to the 'advanced' tab, then the 'advanced' button and activate 'run as administrator'. The program will not give an error but you will get a UAC warning every time the program runs. I have not found a way to avoid this, so the only advice I can give is to disable UAC by going to the control panel and in the search type 'disable UAC', you will be given a link to disable UAC.

You can also avoid UAC prompts by ising Microsoft’s Compatibility Toolkit. Read more about it here: http://www.ghacks.net/2010/07/08/get-rid-of-uac-prompts-with-microsofts-application-compatibility-toolkit/

PAD XML file

download[4]

How To Use BTGuard To Completely Anonymize Your Bittorrent Traffic

1 comments
http://m14hackersworld.blogspot.com

How To Use BTGuard To Completely Anonymize Your Bittorrent Traffic

If you're using BitTorrent without taking special measures to hide your activity, it's just a matter of time before your ISP throttles your connection, sends you an ominous letter, or worst case, your ISP gets a subpoena from a lawyer asking for your identity for a file-sharing law suit. Here's how to set up a simple proxy to keep your torrenting safe and anonymous.

Note, you don't need to be doing anything illegal. Maybe you just want to keep Big Brother out of your business and from throttling your connection. Either way, if you really want to keep your activity private, your best bet involves routing your BitTorrent connection through an external service. BTGuard is a dead simple BT-focused proxy server and encryption service, and it's my service of choice. Below, I'll explain what it does, how it works, and how to set it up to privatize and anonymous your BT traffic.
Read more »

SendBlaster 2 Pro + Serial

0 comments
http://m14hackersworld.blogspot.com

SendBlaster 2 Pro + Serial

SendBlaster is the best bulk email software for managing your mailing list.
Discover the free solution or the cost effective one, a one-time payment package which allows you to easily manage your email marketing using a desktop bulk email software.
Read more »

Axure RP Pro 6.5 Full Version

4 comments
http://m14hackersworld.blogspot.com

Axure RP Pro 6.5 Full Version

Axure RP Pro 6.5 Full Version is a web design software. Axure RP is the leading tool for rapidly creating wireframes, prototypes and specifications for applications and web sites. Axure RP enables application designers to create wireframes, flow diagrams, prototypes, and specifications for applications and web sites faster and easier than creating static mockups with their current tools. Used by professionals including business analysts, information architects, usability experts, product managers, and IT consultants around the world from Fortune 1000 companies to independent agencies. Axure RP has become an essential tool for successful application design.

Wireframes are an effective tool for collecting and presenting functionality, navigation, and content of an application or web site. Attaching annotations or notes to elements or widgets on the wireframe eliminate guesswork and help clarify specific functions. With Axure RP Pro, creating annotated wireframes is fast and effective, allowing you to focus on the design instead of the documentation.

Download Axure RP Pro 6.5 Full Link Offical Website
Download Axure RP Pro 6.5 Full Link Sharebeast
Link password: koskomputer

RP Pro 6.5.0.3043 Serial Key

License: KosKomputer
Key    : dcENpZgjsYDoFPNYx9JMm77TfrzIMlv5iXfdwturL4pDe7DEHjEfjvfCodDKdjLr

Unprotected Network Cams

0 comments
http://m14hackersworld.blogspot.com

Unprotected Network Cams

Ok, You can find an protected NETWORK cams.

Like business, house, public bulidings, police stations, government buildings, etc.

Post the weird/interesting ones you find 

just google any one of these ->

inurl:/view/view.shtml?videos=

inurl:ViewerFrame?Mode=

inurl:ViewerFrame?Mode=Motion
Read more »

How To Start Hacking - The Right Way [A Unique Guide]

0 comments
http://m14hackersworld.blogspot.com
How To Start Hacking - The Right Way [A Unique Guide]

Table of Contents:
-----------------------------------------------

  1. What is a Hacker ?
  2. Types of Hacker
  3. Black Hat Hacker
  4. White Hat Hacker
  5. Grey Hat Hacker
  6. Choosing your side
  7. Knowing Cyber Laws
  8. Never Give Up
  9. Finding Learning Sources
  10. Asking Questions
  11. Doing Practically
  12. Be Creative
  13. No Hesitation
  14. Language
  15. Behavior
  16. About Tutorial
  17. About Me


-----------------------------------------------

What is a Hacker ?
Hacker is a person that have great knowledge about computer, though the term also refer to a person who find vulnerability in a computer system. It also refer to a person that have unauthorized access to a computer or network.
Read more »

How to remove any RAT or Keylogger from PC?

0 comments
http://m14hackersworld.blogspot.com

How to remove any RAT or Keylogger from PC?

So , i was looking to make a thread on removing viruses from computer. but i was so busy. So now i ma free so i thought to share it to you.

So go through these steps:

  1. Goto start
  2. Type msconfig
  3. A screen will be opened. Goto Start Up Tab
  4. Now go down in the list box.
  5. Check for the Different assemblies , which seems to be a Weird Publisher or any else.
  6. Uncheck them
  7. restart PC
Read more »

WinRar Password Remover Finder Cracker with crack / patch

1 comments
http://m14hackersworld.blogspot.com

WinRar Password Remover Finder Cracker with crack / patch

Quote:
How does this work? WinRar doesn't lock you out after you have tried the wrong password a few times. This tries tons of passwords in no time until it figures it out. It has three different approaches you can use. I don't understand them all but the above describes it best.

RAR Password Recovery is a powerful tool to recover lost (forgotten) passwords for a RAR/WinRar archives. The program supports the Brute-Force attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program is able to resume the previous interrupted attack.

Read more »

Chinese hackers attack on White House computers

0 comments
http://m14hackersworld.blogspot.com

Chinese hackers attack on White House computers

The White House acknowledged Monday that one of its computer networks was hit by a cyber attack, but said there was no breach of any classified systems and no indication any data was lost. Including systems used by the military for nuclear commands were breached by Chinese hackers.

A conservative newspaper that has been regularly critical of the Obama administration, called The Washington Free Beacon, first published the report on Sunday and said that the attackers were linked to the Chinese government.
Read more »

Cyber Attacks on Six Major American Banks

0 comments
http://m14hackersworld.blogspot.com

Cyber Attacks on Six Major American Banks

According to reports, some of the United States biggest financial institutions  including Wells Fargo, JPMorgan Chase, Bank of America, Citigroup, and Bancorp were hit by a series of cyber attacks last week, by a group claiming Middle Eastern ties, that caused Internet blackouts and delays in online banking.

The banks suffered denial-of-service attacks, in which hackers barrage a website with traffic until it is overwhelmed and shuts down. Such attacks, while a nuisance, are not technically sophisticated and do not affect a company’s computer network or, in this case, funds or customer bank accounts.

Hacktivists, calling themselves "Mrt. Izz ad-Din alQasssam Cyber Fighters," attacked Wells Fargo and posted on Pastebin that U.S. Bancorp and PNC Financial Services Group are next. The group said it had attacked the banks in retaliation for an anti-Islam video that mocks the Prophet Muhammad. It also pledged to continue to attack American credit and financial institutions daily, and possibly institutions in France, Israel and Britain, until the video is taken offline. The New York Stock Exchange and Nasdaq were also targeted.

Frustrated customers of Bank of America, JPMorgan Chase, Citigroup, U.S. Bank, Wells Fargo and PNC, who could not get access to their accounts or pay bills online, were upset because the banks had not explained clearly what was going on.

Representatives for other banks also confirmed that they had experienced slow Internet performance and intermittent downtime because of an unusually high volume of traffic. Security researchers said the attack methods were too basic to have taken so many US bank sites offline. The hackers appeared to be enlisting volunteers for the attacks with messages on various sites.

IT Security professionals need to realize that the hackers are doing damage to websites without having to access the corporate servers. They are hitting the site hard without breaking in. A safety barrier must be created and maintained.

How To Convert Virtual Machines Between VirtualBox and VMware

1 comments
http://m14hackersworld.blogspot.com

How To Convert Virtual Machines Between VirtualBox and VMware


Migrating to another virtual machine program can be intimidating. if you already have your virtual machines set up they way you like them, you don’t necessarily have to install them from scratch – you can migrate your existing virtual machines.

VirtualBox and VMware use different virtual machine formats, but each supports the standard Open Virtualization Format. Convert your existing virtual machine to OVF or OVA and you’ll be able to import it into another virtual machine program.
Read more »

Japan introduces piracy penalties for illegal downloads

0 comments
http://m14hackersworld.blogspot.com

Japan introduces piracy penalties for illegal downloads

Japan-based internet users who download copyright infringing files face up to two years in prison or fines of up to two million yen ($25,700; £15,900) after a change to the law.

Such activity has been illegal since 2010, but until now had not invoked the penalties.

It follows a lobbying campaign by country's music industry.

But critics said that efforts should have remained focused on stopping users making such material available.

In Japan illegal uploads of copyright infringing music and videos carry a maximum 10 year prison sentence and a 10 million yen fine.

Read more »

50 SQL Vuln Links For Hacking Tests

0 comments
Read more »

TOP 103 HACKING SHELLS | DOWNLOAD

0 comments
http://m14hackersworld.blogspot.com

TOP 103 HACKING SHELLS | DOWNLOAD

List of ALL hacking Shells

  1. C99Shell v. 1.0 beta (5.02.2005)  PHP
  2. b374k PHP
  3. b374k-mini-shell PHP
  4. Cyber Shell  PHP
  5. GFS Web-Shell  PHP
  6. NFM 1.8  PHP
  7. r57shell  PHP
  8. Small Web Shell by ZaCo  PHP
  9. nsTView v2.1  PHP
  10. DxShell v1.0  PHP
  11. C99madShell v. 2.0 madnet edition  PHP
  12. CTT Shell  PHP
  13. GRP WebShell 2.0 release build 2018 (C)2006,Great  PHP
  14. Crystal shell  PHP
  15. Loaderz WEB Shell  PHP
  16. NIX REMOTE WEB SHELL  PHP
  17. Antichat Shell  PHP
  18. CasuS 1.5  PHP
  19. Sincap 1.0  PHP
  20. C99Shell v. 1.0 pre-release build(safe-mode)  PHP
  21. hiddens shell v1  PHP
  22. Web-shell (c)ShAnKaR  PHP
  23. Predator  PHP
  24. KA_uShell 0.1.6  PHP
Read more »

Govt partially bans Facebook, YouTube in Kashmir

0 comments
http://m14hackersworld.blogspot.com

Govt partially bans Facebook, YouTube in Kashmir

Govt partially bans Facebook, YouTube in Kashmir
After SMS, more restrictions on freedom of expression
SRINAGAR, Oct. 01: Amidst the President’s call to Kashmir’s youth for belief in the Indian democracy, the government has partially blocked popular social-networking site, Facebook, and YouTube in Jammu and Kashmir.
The sine die ban was imposed on Thursday—the day President made an inspiring speech during the convocation at Kashmir University—and ever since the cell phone and PC users in the state have not been able to access the sites. It followed the daylong communication gag witnessed in Kashmir on September 21 in wake of the expected mass protests against the anti-Islam film.
Read more »

Quick Heal Internet Security 2013 FREE DOWNLOAD with PRODUCT KEY License :

1 comments
http://m14hackersworld.blogspot.com

 Quick Heal Internet Security 2013 FREE DOWNLOAD with PRODUCT KEY License :

It is a comprehensive Internet security suite designed specially for Windows PC which protects your system from all kinds viruses, worms, malware, Trojan or malware arising from the Internet.

It’s custom-made DNAScan Technology is capable of detecting even the unknown viruses.

It is priced at INR 1449 or $40 per year license.

Read more »

Quick Heal Total Security 2013 FREE DOWNLOAD with PRODUCT KEY License

0 comments
http://m14hackersworld.blogspot.com

Quick Heal Total Security 2013 FREE DOWNLOAD with PRODUCT KEY License :

Is an all-round computer security cum optimizer application for Windows PC which not only defends your computer from all kinds of threats that emerge from Internet, USB or email, but also optimize your computer.

It’s custom-made DNAScan Technology is capable of detecting even the unknown viruses. It also has PC Tuner that makes maximizes your PC performance.

Read more »

Billions of Windows Users Affects with Java Vulnerability

0 comments
http://m14hackersworld.blogspot.com
Billions of Windows Users Affects with Java Vulnerability

Researchers at Security Explorations disclosed a new vulnerability in Java that could provide an attacker with control of a victim's computer. The researchers have confirmed that Java SE 5 – Update 22, Java SE 6 – Update 35, and Java SE 7 Update 7 running on fully patched Windows 7 32-bit operating systems are susceptible to the attack.

Read more »

Beacon : A new advance payload for Cobalt Strike

0 comments
http://m14hackersworld.blogspot.com
Beacon : A new advance payload for Cobalt Strike

Raphael Mudge (Creator of Cobalt Strike) announced Another Advance Payload for Cobalt Strike called "Beacon". In a conversation with M14 Network Inc. Raphael said "A big gap in the penetration tester's toolbox are covert command and control options, especially for long engagements. Beacon is a new feature in Cobalt Strike to remedy this problem."
Read more »

ARMY : USB Drive responsible for over 70 percent of Cyber Security Breaches

0 comments
http://m14hackersworld.blogspot.com

ARMY : USB Drive responsible for over 70 percent of Cyber Security Breaches

A ban on the use of pen drives has not been able to safeguard cyber security as it has now been labeled as a major threat in defence forces, the Army officials said. The use of pen drives as an easy-to-carry storage device has increased in the recent past and internal reports have confirmed that over 70 percent cyber security breaches in the armed forces are due to their unauthorised use

Read more »

How to Sucessfully steal someone's IP with PHP Script (No cmd BS)

0 comments
http://m14hackersworld.blogspot.com

How to Sucessfully steal someone's IP with PHP Script (No cmd BS)

I see that ALOT of people think that using netstat command in CMD is a good way to trace IPs
But there is a MUCH better way to grab someones ip that dose not require Skype IP resolver , CMD or that shit
Requirements : Web hosting
We can steal peoples IP's with a simple PHP Script
Basically copy this PHP code below :
Read more »

Waffit (wafwoof) - Web Application Firewall Detection Tool | Backtrack 5 R3 | Tutorial

0 comments
http://m14hackersworld.blogspot.com

Waffit (wafwoof) - Web Application Firewall Detection Tool | Backtrack 5 R3 | Tutorial


WAFW00F allows to identify and fingerprint WAF products protecting a website. This tool was written by Sandro Gauci && Wendel G. Henrique.
Features:-

  1. This tool can only detect limited numbers of firewalls, listed below.
  2. Profense
  3. NetContinuum
  4. Barracuda
  5. HyperGuard
  6. BinarySec
  7. Teros
  8. F5 Trafficshield
  9. F5 ASM
  10. Airlock
Read more »

Auslogics Disk Defrag Pro Full Version

0 comments
http://m14hackersworld.blogspot.com

Auslogics Disk Defrag Pro Full Version

The professional edition of your favorite defragmenter. Now delivers even more speed to your hard drive, thanks to new optimization algorithms and boot-time defrag technology.

  1. Defragments system files (MFT, pagefile, hiberfil, etc.)
  2. Offers a choice of 4 disk optimization algorithms
  3. Not only defrags, but prevents further fragmentation
  4. Uses special algorithms for SSD and VSS-enabled drives
  5. Shows detailed reports and performance charts
Read more »

uTorrent Turbo Accelerator Full Version

1 comments
http://m14hackersworld.blogspot.com

uTorrent Turbo Accelerator Full Version

uTorrent Turbo Accelerator is a newly added software in the family of the popular p2p client uTorrent plug-ins. The highly developed architecture behind this app allows you to download movies, music, games and other files you want at the highest possible speed. With uTorrent Turbo Accelerator not only the bandwidth of your Internet connection is managed noticeably with more efficiency but you will have the advantage of locating more sources to download from.
Read more »

229 Scrapebox-Passed HTTP Proxies - Freshly Verified w/ Screenshot

0 comments
http://m14hackersworld.blogspot.com

229 Scrapebox-Passed HTTP Proxies - Freshly Verified w/ Screenshot

Sharing some free scrapebox proxies from the proxy list we maintain.
Subscribe for daily updates. Enjoy!

Verified Time: 2012-09-29, 4:30 PM PST
Checked with Scrapebox V1.15.54 (Timeout: 45s, Threads: 50)
Source: TheBigProxyList.com

Scrapebox Passed HTTP Proxies (229):


  1. 198.27.111.85:8080
  2. 201.159.107.78:8080
  3. 190.248.93.210:8080
  4. 116.48.147.1:3128
  5. 41.59.59.235:80
Read more »

USSD attack for android devices can wipe your data or also disable your SIM card

0 comments
http://m14hackersworld.blogspot.com

USSD attack for android devices can wipe your data or also disable your SIM card

Researcher found a serious vulnerabilities(USSD) on many android devices which can wipe your data and also disable you SIM cards.
This USSD(Unstructured Supplementary Service Data) exploit can work remotely and clean all your device data. Many samsung devices are affected including, Samsung S III, Samsung Galaxy Beam, S Advance, Galaxy Ace and Galaxy S II.
Read more »

WhatWeb - Website Identification Tool | Backtrack

0 comments
http://m14hackersworld.blogspot.com

WhatWeb - Website Identification Tool | Backtrack

WhatWeb - Website Identification Tool | Backtrack

Introduction

According to their website, WhatWeb identifies websites. Its goal is to answer the question, "What is that Website?". WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.
Read more »

Brute Force 2.0.1 - Email Hacker!

0 comments
http://m14hackersworld.blogspot.com

Brute Force 2.0.1 - Email Hacker!

What it looks like in action:
Ok this is basically a Brute Forcer for email and youtube accounts which requires only a password list. I will NOT explain how to find a good list of passwords.
Anyways Enjoy.
Read more »

Some Very Interesting Websites For Hacking.

0 comments
http://m14hackersworld.blogspot.com

Some Very Interesting Websites For Hacking.

Hello folks, Here are some cool websites for information gathering about your victim and other cool tools online. Have fun…

www.centralops.net -
This is a very interesting website for online information gathering website with all the basic tools inbuilt.
Read more »

Ultrasurf Proxy tool - Bypass all internet blocking system

0 comments
http://m14hackersworld.blogspot.com

Ultrasurf Proxy tool - Bypass all internet blocking system

UltraSurf is a proxy application. It will Bypass All Internet Blocking Systems. By using this software you can access all the sites blocked by national / corporate firewalls. It is a free application. It brake all the access list. This application is nothing but just searching the proxy list
which is fast and available. It will automatically change our IE’s proxy server to local proxy. That means this application will work as a web proxy server.
Read more »

Free Download : CEH [ Certified Ethcial Hacker Materials ]

0 comments
http://m14hackersworld.blogspot.com

Free Download : CEH [ Certified Ethcial Hacker Materials ]
Ethical Hacking ~ Lab's - 70 Topics Covering almost that Things you need ~ 254.7 MB

!! CERTIFIED ETHCIAL HACKER !!

1: Student Introduction
2: Introduction to Ethical Hacking
3: Hacking Laws
4: Footprinting
5: Google Hacking
6: Scanning
7: Enumeration
8: System Hacking
Read more »

How to Crash Small Websites

0 comments
http://m14hackersworld.blogspot.com

How to Crash Small Websites



TOOLS REQUIRED :

Port Scanner : Click Here To Download
rDos : Click Here To Download

Step One: First we need to find the websites IP Adress. This is very easy todo.

Ok so say they URL is http://www.yoursite.com ok now that you have your URL open Up Cmd todo this press Start>Run>cmd Once you have CMD open you type ping http://www.yoursite.com press enter and you will get the ip of the website. (YOU MUST REMOVE HTTP:// AND ANY /'s).
Read more »