WELCOME

for any suggestion's please mail to this id:

nanduriraja537@gmail.com,raja.mic539@gmail.com

Friday, April 29, 2011

How To Export Images Media File From PowerPoint Presentations PPT


01) Open your MS power point and press Ctrl+O

02) Find Select and Open the ppt file from which you want to extract or export pics.

03) Press F12

04) Press Tab and select file type html

05) Hit enter and save.

06) Now go to same folder where your ppt is lying.

07) Find the folder and open

08) Arrange all file as per file type.

09) Delete all files except image files.

10) Same way you can export or extract all media files from any ppt file without using or installing any software.

Wednesday, April 27, 2011

Catch Sizzling Tosha-D Ultimate Photoshoot — A latest album starring sizzling Tosha, has playback by sister duo Preeti-Pinky. Produced by Anwar Ali Kh

Catch Sizzling Tosha-D Ultimate Photoshoot — A latest album starring sizzling Tosha, has playback by sister duo Preeti-Pinky. Produced by Anwar Ali Khan and directed by Rajiv S Ruia, the album's music is composed by Amjad-Nedeem. Its lyrics are penned by Shabbir Ahmed.

Catch Sizzling Tosha-D Ultimate Video Song


Backtrack 4 Download for Windows VMWare & Torrents


BackTrack is a live CD Linux distribution that focuses on penetration testing. A merger of two older security-related distros — Whax and Auditor Security Collection — BackTrack bundles more than 300 security tools.

BackTrack is based on the SLAX distribution (a live CD derived from Slackware) and runs a patched 2.6.20 kernel. It offers users both KDE and Fluxbox desktop environments.
To start using BackTrack, download the ISO image and burn it to a CD. Insert the disc and boot your machine. Once booted, the system start at runlevel 3 (text mode), where you must log in as root and choose whether to start KDE or Fluxbox or just use the terminal.

BackTrack provides clear, concise instructions for logging in, starting the window manager, and configuring the video card before you see the login prompt. If you’ve never used BackTrack before, use a graphical environment, since it will help you understand how all the included applications are organized and let you take advantage of some graphical utilities. When the window manager comes up you’ll find some ordinary desktop programs, such as Firefox, Gaim, K3b, and XMMS, within a nice environment with beautiful wallpaper and window transparency.

Don’t let the attractive appearance fool you — BackTrack packs a punch. The security tools are arranged inside a Backtrack submenu. This is a big improvement over older releases, because you can easily follow an attack methodology: starting by collecting information and end by hiding your actions.

The tools are arranged in 12 categories, such as vulnerability identification, penetration, privilege escalation, radio network analysis, and reverse engineering. Among the more than 300 security tools you’ll find such familiar names as the Metasploit Framework, Kismet, Nmap, Ettercap, and Wireshark (previously known as Ethereal).

One of the core points of this release is the attention to detail. For example, when you choose most of the programs from the Backtrack menu, a console window opens with the output of the program’s help. Some tools have been bundled with scripts that in a few steps configure and run the program for you. For example, if you run the Snort intrusion detection application, a script asks for some passwords and then sets up MySQL, Apache, Base, and Snort itself so you can easy browse alert logs via a Web browser.

If you open Firefox or Konqueror you’ll find some useful security-oriented bookmarks. In the Documents submenu the developers have included PDF manuals for the ISSAF and OSSTMM security methodologies. There are also some tools that you wouldn’t expect inside a live CD; for example, you have a popular debugger for Windows, OllyDbg, which runs fine through Wine, so you can even debug .exe files.

If you like the live CD, you can install BackTrack to a hard drive (decompressed, it requires 2.7GB of space) or USB memory stick (compressed, 700MB) using a graphical wizard.
While BackTrack is an excellent tool, nothing is perfect. Unfortunately it doesn’t include Nessus, the popular security scanner, due to license problems. I tried to start PostgreSQL from the Services menu, but it gave an error. And it seems as if the developers forgot to update the Backtrack menu in Fluxbox, because it offers the previous version arrangement. Tools like VMware and Nessus appear on the menu but are broken links because they have been removed from this release.

Despite a few little bugs and problems, BackTrack is the best distribution I’ve found for handling security-oriented tasks out of the box.

Download Links :

Last Update: 11.01.2010
Description: Image Download
Name:: bt4-final.iso
Size: 1570 MB
MD5: af139d2a085978618dc53cabc67b9269



Description: VM Image Download
Name:: bt4-final-vm.zip
Size: 2000 MB
MD5: 733b47fad1d56d31bc63c16b3706a11c



FOR OLDER VERSIONS CLICK HERE

To learn HOW TO USE BACKTRACK & for all BACKTRACK TUTORIALS & COMMANDS: CLICK HERE & JOIN THIS FORUM

Wednesday, April 20, 2011

Stupid Teenagers Must Die (2006)

Released : 2006

Genres : Comedy

Rate : 1 Star2 Stars3 Stars4 Stars5 Stars (3 votes, average: 4.00 out of 5) Loading ... Loading ...

Views : 998 views

Director : Jeff C. Smith

Cast : Jovan Meredith, Ashley Schneider, Devin Marble, Lindsay Gareth, Renee Dorian, Cory Assink, Jonathan Brett

Stupid Teenagers Must Die 2006 Watch Online – Youtube Links

Stupid Teenagers Must Die 2006 Watch Full Movie

TRY this....


MAGIC #1

Found that nobody can create a FOLDER anywhere on
the Computer which can be named as "CON".

This is something funny and in explicable? At Microsoft the whole Team, couldn't answer why this happened!
TRY IT NOW, IT WILL NOT CREATE A "CON"
FOLDER


MAGIC #2

For those of you using Windows, do the following:

1.) Open an empty notepad file
2.) Type "Bush hid the facts" (without the
quotes)
3.) Save it as whatever you want.
4.) Close it, and re-open it.

Noticed the weird bug? No one
can exp lain!

MAGIC #3

Again this is something funny and can't be explained?
At Microsoft the whole Team, including Bill Gates,
couldn't answer why this happened!
It was discovered by a Brazilian. Try it out
yourself? Open Microsoft Word and type

=rand (200, 99)

And then press ENTER
And see the magic?..!

Magic #4

Did you know that a flight number from one of the planes that hit one of the two WTC towers on 9/11 was Q33N. In Notepad / WordPad or MS Word, type that flight number i.e. Q33N. Increase the font size to 72. Change the font to Wingdings. ….. u will be amazed by the findings

Monday, April 4, 2011

How to Hack with c99 Shell Script: Download c99 shell script


How to Hack with c99 Shell Script: Download c99 shell script

c99 shell script upload hacking php enabled server

c99 shell script in text format to upload on unsecured uploader and command entire file system and execute a hack.

The c99 php (Hypertext Preprocessor) shell script is an awesome piece of hacking script. The only limitation of it being that it needs an unsecured uploader in order to get it uploaded and then the execution part is a piece of cake.

This c99 shell allows an attacker to hijack the web server process, allowing the attacker to issue commands, force brute etc on the server as the account under which PHP is running. The interface of this shell script is very user friendly, something not so much associated with hackers. Hackers are known to write either ugly looking interface codes or none interface at all, but this piece of code is very different, it may be called something which as been done very aesthetically.

In order for the script to work, the die statement needs to be removed, a piece of note has been attached so as to facilitate its removal. The usual process code for a hacker while using a c99 shell script is as follows-

1)Find out sites with an uploader.
2)Test if the file uploader is secure or not by uploading files with a server executable extension.
3)If yes then upload the shell script.
4)Execute the code by browsing to the uploaded page.
5)A well laid GUI of the upload directory will show up with a lot of relevant details.
6)Look for the details if whether safe mode is on or off, if safe mode is off then the entire server can be controlled and if its on then on the directory in which c99 shell script is uploaded will be controlled.
7)Apart from being able to chmod, modify and delete files c99 also lets its user brute force the ftp but it requires an additional dictionary file which can run into hundreds of MBs.
8)c99 shell can be self removed so the hacking can go undetected by just manipulating some configuration file parameters for example the admob or adsense publisher code.

Unlike its sister r57 script c99 is very much light and much more effective on a php enabled server. before newbie uploaders upload, execute or run this script to their servers, they should make sure that they upload it and test it in a very private and secretive manner. Uploading and running this script is a very risky affair so be careful. This script is a lovely piece of code to understand the exact mechanism of various types of hacks.

The all available shell hacking scripts can be freely downloaded from the following link. This link included:

C99 Shell

R57 Shell

Xhacker Shell v2

ASPXspy2

dQ99shell

Cmd Asp Shell

Vb Hacker Shell

CWShellDumper

C100 Shell

Tryag Bypass

Cgi.Pl

User.Pl User list perl

Safe0ver Bypass Shell

Sosyete Safe Mode Bypass Shell

Liz0zim Bypass Shell

Kacak Fso Shell v1.0

Ekin0x Shell

Zehir4 Asp Shell

Sim Attacker Shell

MySQL Shell

Remview Shell

Ajax Command Shell

AntiChat Shell

Efso Asp Shell


LinkWithin

Related Posts Plugin for WordPress, Blogger...