Friday, 31 October 2014

Dell joins the cheap Windows tablet scrum, launches the Venue 8 Pro 3000 series!!!!

Dell is one of the leading technology inventor.We have heard of Dell's laptops,and now Dell is moving toward inovating tablets. Recently released Dell Venue 8 Pro is something to watch out.
                                                 For starters, the Venue 8 Pro has an 8-inch IPS display with   1280x800 resolution, and it packs 32GB of storage. Toshiba’s Encore Mini, for example, is street-priced at just $100, but it has a TN panel that’s limited to 1024x600 resolution and it comes with only 16GB

Wednesday, 26 March 2014

Can Backtrack be useful tool for hackers and developers?



Back track which is the special version of linux operating system is used for the programmers,developers and mainly for those who are related for network securitis. Back track stands in first position for top penetration testing distribution.                                                                                                                                                        
Here are the list of some of the awesome tools available in BackTrack 5r3 (the latest release).

To identify Live Hosts:dnmap – Distributed NMapaddress6 – (which acts as a IPV6 address conversion)
Information Gathering Analysis (Social Engineering)Jigsaw – Grabs information about company employeesUberharvest – Email harvestersslcaudit – SSL Cert auditVoIP honey – VoIP Honeypoturlcrazy – Detects URL typos used in typo squatting, url hijacking, phishing
Web CrawlersApache_users – Apache username enumeratorDeblaze – Performs enumeration and interrogation against Flash remote end points
Database AnalysisTnscmd10g – Allows you to inject commands into OracleBBQSQL – Blind SQL injection toolkit* If you are interested in Database Security see our Hacker Halted summary here.
Bluetooth AnalysisBlueranger – Uses link quality to locate Bluetooth devices
Vulnerability AssessmentLynis – Scans systems & software for security issuesDotDotPwn – Directory Traversal fuzzer
Exploitation ToolsNetgear-telnetable – Enables Telnet console on Netgear devicesTerminator – Smart Meter testerHtexploit – Tool to bypass standard directory protectionJboss-Autopwn – Deploys JSP shell on target JBoss serversWebsploit – Scans & analyses remote systems for vulnerabilities
Wireless Exploitation ToolsBluepot – Bluetooth honeypotSpooftooph – Spoofs or clones Bluetooth devicesSmartphone-Pentest-FrameworkFern-Wifi-cracker – Gui for testing Wireless encryption strengthWi-fihoney – Creates fake APs using all encryption and monitors with AirodumpWifite – Automated wireless auditor
Password ToolsCreddumpJohnnyManglefizzOphcrackPhrasendresherRainbowcrackAccchecksmbexec




you can read more about the backtrack by clicking here   click here

New Nokia's Android device-Nokia X....

With huge competition in the mobile market, Nokia the leading company in mobile has made its way toward the android platform. Nokia,which had been producing the mobile device with java,symbian,windows phone is now producing highly reliable android phone named as Nokia X. The phone is demanded over different countries due to its reliability.For detail of new Nokia X you can see below-


Nokia X Dual SIM

Nokia X Dual SIM

Saturday, 15 February 2014

Want to earn money online?

Want to make an easy money? Here is the link you can visit and make enough money.


By singning up you can start and spending some time you can easily make money. You only have to spend some hours on internet.It is the most popular site which offers money for online surveys and different other things..

Wednesday, 12 February 2014

Top Ten Penetration Testing Linux Distributions!!!!


OK, none of the following Pentesting distributions were in the top 100 list over at Distro Watch but we don’t care – we are talking about penetration testing tools – or specifically the creation of distro’s that have all the necessary open source tools that help ethical hackers and penetration testers do their job. Like everything else when it comes to choices, every pentesting distro has its own pros, cons and specialty. Some distro for example are better at web application vulnerability discovery, forensics, WiFi cracking, reverse engineering, malware analysis, social engineering etc.


1. BackTrack 5r3

The mamma or best known of Linux pentesting distros. BackTrack has a very cool strapline: “The quieter you become, the more you are able to hear.” That just sounds cool….

Upcoming Android Mobiles In India!!!!

Here are the latest upcoming android phones in indian market.. Some of them can be really useful for the user at affordable price.The ranking of the phones with price is given below-

RankingPhone & 91scoreViewedExpected Price

1

Nokia Normandy


Compare


3,196people viewed


NA

Saturday, 8 February 2014

The Top 10 Most Infamous Hackers of All Time!!!!

The Top 10 Most Infamous Hackers of All Time
Who among us has not been victimized by a virus? Not the virus that can make a person sick, but the kind that can cripple your computer, or worse, the entire network you are on. The culprits are those amazingly talented people who possess the ability to come up with programs to break into other people’s gadgets. Sometimes, they do it just for the heck of it and annoy the hell out of us. Other times, they use it to steal valuable information.
Regardless of their reasons, here is a list of the top 10 most infamous hackers of all time.