Hacker (computer security)

From Wikipedia, the free encyclopedia.

Pages

Friday, May 3, 2013

About me

                                                                      Jford B. Ayop                                                    contact...

Monday, April 29, 2013

ProRat v1.9

Remote Administrator with ProRat v1.9 Prorat is one of RAT (Remote Administration Tools) are widely used to take over the computer system. Tool made by PRO Group, a group of Turkish hackers community, can be used as a tool Hacking computers in a network. Use of Prorat quite simple, you simply enter the IP (Internet Protocol) is the target computer and then go through one open port. The hardest part is finding where an open port. But you can...

Paki Hacking ToolKit v 1.0

Paki Hacking ToolKit v 1.0 Paki Hacking ToolKit v 1.0 which contains Following Features:- MD5 TOOL  Email Spam  SQL Tool  Encryption & Decrypter  ASCII Art  Ping Web  Google Dorks Scanner  Requirements ==>Require .Net framwork 4.0 to run this application. ==>And it will be run on All Microsoft Operating systems ==>Minimum requirement Windows Xp ==>Don't remove any file inside RES f...

Dark-Jumper v5.8

Dark-Jumper v5.8 Darkjumper is a free tool what will try to find every website that hosts at the same server as your target. Then check for every vulnerability of each website that host at the same server. features of "Darkjumper": · scan sql injection, rfi, lfi, blind sql injection · autosql injector · proxy support · verbocity · autoftp bruteforcer · IP or Proxy checker and GeoIP Requirements: · Python Download: He...

BlaZer's Tool Kit

BlaZer's Tool Kit - All in One Hacking Tools Pack : Free Download Features: ★ Inbuilt Web Browser with Java Script and Flash ★ Email Bomber ★ Port Scanner ★ Screen Recorder ★ Pinger ★ Anti-Virus Finder ★ File-Downloader and much more..... Requirements: • Dot Net Framework Compatible OSes • Windows 7 (32 & 64 Bit) (Tested).. • Windows Vista (32 & 64 Bit) (Tested).. • Windows XP (32 & 64 Bit) (Tested)... Features...

Armitage

Armitage : Graphical Cyber Attack Management Tool Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don’t use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you. Armitage...

What is a Hacker

What is a Hacker? In one sense it's silly to argue about the ``true'' meaning of a word. A word means whatever people use it to mean. I am not the Academie Française; I can't force Newsweek to use the word ``hacker'' according to my official definition. Still, understanding the etymological history of the word ``hacker'' may help in understanding the current social situation. The concept of hacking entered the computer culture at...

Sunday, April 28, 2013

.I.T history

A history of information technology The history of information technology can be dated back to as early as 2600 BC when the Egyptians would write on the papyrus plant. It also thought that religious leaders in Mesopotamia kept the first books at this time, which is now southern Iraq. In more recent years the very first apple mac was released in 1984, IBM released the very first pc in 1981 and the then tiny company Microsoft produced...