Nvidia releases the next Titan, the GTX Titan Black

Last year, Nvidia hoped to change the graphics card game when it released the GTX Titan, a high-performance, energy efficient card. Now, Nvidia has released an new model of the Titan, the GTX Titan Black.

Saturday, February 22, 2014

How to make bootable USB without any software?

This tutorial will help you in creating a bootable USB drive of Windows Vista and 7 which you can use to install Vista and 7 in any system. It might become very useful when you don't have access to DVD drive. Step 1: Insert your USB (4GB+ preferable) stick to the system and backup all the data from the USB as we are going to format the USB to make it as bootable. Step 2: Open elevated Command Prompt. To do this, type in CMD in Start menu search...

Hack others computer using Beast trojan

Step 1:- Download the necessary software  Beast 2.07 Step 2:- Open the software Step 3:- Now click on “Build server “button. Step 4:- Now in this window click on the notifications tab. Step 5:- In the notifications tab click on the e-mail button. Step 6:- Now In this window fill your proper and valid email id Step 7:- Now go to "AV-FW kill” tab. Step 8: - Now In this put a tick mark on the “disable XP firewall ". Step...

How to Hack Computer Password using Cain and Abel

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit...

SQL Injections Attack with Examples

This article explains basics of SQL Injection with an example that shows SQL Injection, and provides methods to prevent from these attacks. As the name suggests, this attack can be done with SQL queries. Many web developers are unaware of how an attacker can tamper with the SQL queries. SQL-Injection can be done on a web application which doesn’t filter the user inputs properly and trusts whatever the user provides. The idea of SQL injection is to make the application to run undesired SQL queries. All the examples mentioned in this...

Cross-site Scripting with Examples

In the previous article of this series, we explained how to prevent from SQL-Injection attacks. In this article we will see a different kind of attack called XXS attacks. XSS stands for Cross Site Scripting. XSS is very similar to SQL-Injection. In SQL-Injection we exploited the vulnerability by injecting SQL Queries as user inputs. In XSS, we inject code (basically client side scripting) to the remote server. Types of Cross Site Scripting XSS attacks are broadly classified into 2 types: Non-Persistent Persistent 1. Non-Persistent XSS...

Cookie Poisoning

Web site cookie poisoning came up twice in the last week while testing so I guess now is great time to talk about how to test the for the vulnerability of cookie poisoning. I'm not going to get into the details of how a cookie works but rather how to poison them. If you want details of how they work from a testing point of view read this respectable paper. Web sites use cookies (a lot of them), cookies can be permanent (on disk) or temporary (in memory), and cookies contain variables; variables that the site cares about, and can be messed with...

Denial-of-Service (DoS) Attack and Free DoS Attacking Tools

The denial of service (DOS) attack is one of the most powerful attacks used by hackers to harm a company or organization. Don’t confuse a DOS attack with DOS, the disc operating system developed by Microsoft. This attack is one of most dangerous cyber attacks. It causes service outages and the loss of millions, depending on the duration of attack. In past few years, the use of the attack has increased due to the availability of free tools. This...

Common methods to hack a website

Gone are the days when website hacking was a sophisticated art. Today any body can access through the Internet and start hacking your website. All that is needed is doing a search on google with keywords like “how to hack website”, “hack into a website”, “Hacking a website” etc. The following article is not an effort to teach you website hacking, but it has more to do with raising awareness on some common website hacking methods. The Simple...

Wednesday, February 19, 2014

First nonflammable lithium-ion battery will stop your smartphone, car, and plane from exploding

Lithium-ion batteries, despite being one of the most important pieces of modern technology, have always had a particularly grievous flaw: they’re highly flammable. If you puncture a lithium-ion battery, or you charge and discharge them improperly, you’ll usually have a pretty bad fire on your hands — or worse, if the conditions are just right, an explosion. Most notably, the Boeing 787 Dreamliner was grounded in 2013 due to its lithium-ion battery...

Flappy Bird’s removal from the app store: A case for piracy

Flappy Bird’s developer, Dong Nguyen, has broken his radio silence to say that he pulled the game for the sake of your well-being. Nguyen said he originally developed the game to help people relax and blow off steam, but instead it became an “addictive product” that caused harm to its players. I guess the game might still return, if Nguyen has a change of heart, but it seems unlikely at this point. Flappy Bird. Over the last few weeks, this...

New LIDAR chip will sharpen aerial mapping and autonomous car vision

Handheld laser rangefinders have been available to consumers for years, but increasingly powerful military and industrial versions of the technology are still being developed. A new breed of LIDAR (light detection and ranging) technology is being developed and tested by the US Air Force at a base in Massachusetts. This system is capable of precisely mapping over 300 square kilometers from the belly of an airplane in about half an hour. While it...

Happiness is a warm iGun: Dumb gun requires smart watch to shoot

Despite Apple’s impending release of a supposed iWatch, the non-phone smart device industry hasn’t yet taken off. Gun company Armatix hopes to take the smart device industry by storm with its new smart gun system. Armatix iP1 is a .22-caliber hand gun that has something of a symbiotic relationship with a paired smart watch. Thanks to a built-in RFID chip, the watch’s proximity to the gun acts as a safety. If the watch is within a close proximity,...

Downloading Torrent Using Internet Download Manager

Torrent is tiny file with .torrent extension which allows you to download huge amount of data. We use torrents to download various stuffs like movies, games, software package and plenty of different things. you'll transfer torrents from several website.  The transfer speed for torrents depends on seeds it has. It will make difficult for you to download files with very low or no seed counts. However with the assistance of this trick you'll...

How to Bypass Phone and SMS verification of Any Website

Nowadays, Almost most Websites reqired sms verification which includes Google, Facebook, YouTube, Online Shopping Sites and Other Survey Websites. First of all we should understand why SMS and Phone Verification System is Important? * Keep More Visitors for Market * Providing Extra Security for their Website * Keep Spammers out * Daily Advertisement and promotional ads daily Rather we can able to create and Bypass gmail (facebook, youtube,...

Silk Road 2.0 ‘hacked’ for millions, community tearing itself apart.

  Hackers like to play the cynical, world-weary intellectuals, but an awful lot of them still seem to go down with knives in their backs. More to the point, they often spend brief periods defending those who did the stabbing, refusing to be taken in by “government lies” about divisions in their precious community. The stubborn, almost sentimental refusal to quarantine friends is what felled many important members of Anonymous, and what brought...

Defending the Earth from asteroids with high-powered nuclear explosions

 Just over a year ago, the Chelyabinsk meteor entered Earth’s atmosphere, streaked across the southern Urals, and detonated in a fireball that was briefly brighter than the sun. In the wake of that event, governments have paid more attention to an inevitable eventual Earth-asteroid collision. While funding for asteroid detection methods has inched up for several years, the question of how we should deal with species-ending death rocks is...