1:38 AM
First let’s take a look at what it means to be a hacker. Many people assume hackers speak a mysterious arcane language or know all the secret codes to unlock the internet. The truth is, they simply understand the rules of the system…and how to exploit them. Computers are simply complex systems of command codes running on top of one another. It’s all very linear and mathematical. The “sacred language” we mentioned before is called binary code. It’s a system of 0s and 1s that computers use to communicate. It’s basically a loooong serious of Yeses and Nos, repeating over and over to create patterns of command and response. The bells and whistles are all coded with binary. Math. That’s right. You want to learn how to become a hacker?
Labels:
IT
HTML colortable
12:19 AMFFB2B2 | FF9999 | FF6666 | FF4D66 | FF6699 |
FF6633 | FF4D33 | FF3333 | FF334D | FF3366 |
FF4D00 | FF3300 | FF0000 | FF0033 | FF0066 |
E53300 | E53333 | E50000 | E50033 | E50066 |
CC3333 | CC3300 | CC0000 | CC0033 | FF7F7F |
FF997F | FFB299 | FFCC99 | FFE599 | FFE500 |
FF4C4C | FF664C | FF7F66 | FF9966 | FFB266 |
FF4C00 | FF6600 | FF7F00 | FF9900 | FFB200 |
E54C00 | E56600 | E57F00 | E59900 | E5B200 |
E54C4C | E5664C | E57F66 | E59966 | FFCC00 |
FFFFCC | FFFFB2 | FFE5B2 | FFCC7F | E5E500 |
E5FF99 | FFFF99 | FFE599 | FFCC66 | E5CC00 |
E5FF66 | FFFF66 | FFE566 | FFCC33 | E5E566 |
E5FF00 | FFFF00 | CCFF99 | B2FF7F | 99FF7F |
CCFF66 | 99FF66 | 99FF99 | 7FFF99 | 7FFFB2 |
CCFF00 | 7FFF66 | 66FF66 | 66FF7F | 66FF99 |
99FF00 | 66FF00 | 00FF00 | 00FF66 | 00FF99 |
66E500 | 33E500 | 00E500 | 00E533 | 00E566 |
66CC00 | 33CC00 | 00CC00 | 00CC33 | 00CC66 |
99B200 | 66B200 | 33B200 | 00B200 | 00B233 |
99E500 | 99CC00 | 99FFFF | 99FFF0 | 99FFE5 |
66E5FF | 66F0FF | 66FFFF | 66FFF0 | 66FFE5 |
00E5FF | 00F0FF | 00FFFF | 00FFF0 | 00FFE5 |
66F0F0 | 33F0F0 | 00F0F0 | 00F0E5 | 00F0CC |
B2F0FF | 66E5E5 | 33E5E5 | 00E5E5 | 00E5CC |
B2E5FF | CCE5FF | B2FFFF | 99B2E5 | B2CCE5 |
99CCFF | 7FB2FF | 99B2FF | 7F99FF | 9999FF |
6699FF | 667FFF | 6666FF | 4C66FF | 7F4CFF |
3399FF | 3366FF | 3333FF | 4C33FF | 664CFF |
0066FF | 0033FF | 0000FF | 3300FF | 6600FF |
0066CC | 0033CC | 0000CC | 3300CC | 6600CC |
0066B2 | 0033B2 | 0000B2 | 3300B2 | 6600B2 |
9F99FF | 9F99E5 | B2CCFF | CC99FF | E5B2FF |
9F7FFF | 9F66FF | 9F7FCC | 9F66CC | CC66FF |
8F00FF | 9F00FF | 9F00E5 | 9F00CC | CC00FF |
7300E5 | 7F00E5 | 7F00CC | 7F00B2 | B200E5 |
7F33E5 | 7F33CC | 7F33BF | 663399 | 9900CC |
CCB2FF | E566FF | FF66FF | FF66E5 | FF66CC |
E599FF | E500FF | FF00FF | FF00E5 | FF00CC |
FF99FF | CC00E5 | E500E5 | E500CC | E500B2 |
FF99E5 | FF99CC | B200CC | CC00CC | CC00B2 |
E5E5FF | F2E5FF | FFE5FF | FFE5F2 | FFE5E5 |
E5F2FF | F2F2FF | FFF2FF | FFF2F2 | FFF2E5 |
E5FFFF | F2FFFF | FFFFFF | FFFFF2 | FFFFE5 |
D9F2F2 | E5F2F2 | F2F2F2 | F2F2E5 | F2F2D9 |
CCE5E5 | D9E5E5 | E5E5E5 | E5E5D9 | CCD9D9 |
CCD9CC | D9D9D9 | D9CCD9 | C0CCCC | D9D9CC |
B2C0C0 | C0CCC0 | CCCCCC | CCC0CC | CCCCC0 |
99B2B2 | B2C0B2 | C0C0C0 | C0B2C0 | C0C0B2 |
8C9999 | 99B299 | B2B2B2 | B299B2 | B2B299 |
997F7F | 997F99 | 7F7F7F | 7F997F | 7F7F99 |
7F6666 | 7F667F | 666666 | 667F66 | 66667F |
664C4C | 664C66 | 4C4C4C | 4C664C | 4C4C66 |
4C3333 | 4C334C | 333333 | 334C33 | 33334C |
330000 | 330033 | 000000 | 003300 | 000033 |
8C998C | 999999 | 998C99 |
Copyright by IT CRAZY
Labels:
HTML
Hacking Video Course
2:34 AM
###### CD1 Content ######
### Session 1 ###
# Understand the Purpose of the Course and the Phases of Hacking
# Acquire the Hardware and Software for Your Laboratory
# Build the Windows® 2000/XP Hacker Tool Analysis Laboratory
# Build the Linux Hacker Tool Analysis Laboratory
# Test Your Laboratory and Keep It Secure
### Session 2 ###
# Understand Low-Tech and Computer-Based Reconnaissance
# Use Sam Spade to Gather Information About Target
# Search the Web for Interesting Target Information
### Session 3 ###
# Understand Scanning Techniques
# Search for Modems Using THC-Scan
# Develop a Network Map Using Cheops-ng
# Conduct a Port Scan Using Nmap
# Scan for Vulnerabilities Using Nessus
###### CD2 Content ######
### Session 4 ###
# Analyze Buffer Overflows
# Crack Passwords on Windows® and Linux
# Sniff Data from the Network Using Sniffit
# Use Netcat, the Swiss Army Knife™ of Hacker Tools
### Session 5 ###
# Analyze an Application-Level Trojan Horse Backdoor (VNC)
# Analyze a Traditional RootKit (LRK4)
# Analyze a Kernel-Level RootKit (Kernel Intrusion System)
### Session 6 ###
# Understand File Hiding in Windows®
# Understand File Hiding in UNIX
# Analyze Protocol Tunneling Using Reverse WWW Shell
# Analyze Covert Channels Using Covert_TCP
http://rapidshare.com/files/120474904/Hack_Training_Video_Course_CD_1.part1.rar
http://rapidshare.com/files/120475704/Hack_Training_Video_Course_CD_1.part2.rar
http://rapidshare.com/files/120476347/Hack_Training_Video_Course_CD_1.part3.rar
http://rapidshare.com/files/120476877/Hack_Training_Video_Course_CD_1.part4.rar
http://rapidshare.com/files/120477655/Hack_Training_Course_CD_2.part1.rar
http://rapidshare.com/files/120478198/Hack_Training_Course_CD_2.part2.rar
http://rapidshare.com/files/120478891/Hack_Training_Course_CD_2.part3.rar
### Session 1 ###
# Understand the Purpose of the Course and the Phases of Hacking
# Acquire the Hardware and Software for Your Laboratory
# Build the Windows® 2000/XP Hacker Tool Analysis Laboratory
# Build the Linux Hacker Tool Analysis Laboratory
# Test Your Laboratory and Keep It Secure
### Session 2 ###
# Understand Low-Tech and Computer-Based Reconnaissance
# Use Sam Spade to Gather Information About Target
# Search the Web for Interesting Target Information
### Session 3 ###
# Understand Scanning Techniques
# Search for Modems Using THC-Scan
# Develop a Network Map Using Cheops-ng
# Conduct a Port Scan Using Nmap
# Scan for Vulnerabilities Using Nessus
###### CD2 Content ######
### Session 4 ###
# Analyze Buffer Overflows
# Crack Passwords on Windows® and Linux
# Sniff Data from the Network Using Sniffit
# Use Netcat, the Swiss Army Knife™ of Hacker Tools
### Session 5 ###
# Analyze an Application-Level Trojan Horse Backdoor (VNC)
# Analyze a Traditional RootKit (LRK4)
# Analyze a Kernel-Level RootKit (Kernel Intrusion System)
### Session 6 ###
# Understand File Hiding in Windows®
# Understand File Hiding in UNIX
# Analyze Protocol Tunneling Using Reverse WWW Shell
# Analyze Covert Channels Using Covert_TCP
http://rapidshare.com/files/120474904/Hack_Training_Video_Course_CD_1.part1.rar
http://rapidshare.com/files/120475704/Hack_Training_Video_Course_CD_1.part2.rar
http://rapidshare.com/files/120476347/Hack_Training_Video_Course_CD_1.part3.rar
http://rapidshare.com/files/120476877/Hack_Training_Video_Course_CD_1.part4.rar
http://rapidshare.com/files/120477655/Hack_Training_Course_CD_2.part1.rar
http://rapidshare.com/files/120478198/Hack_Training_Course_CD_2.part2.rar
http://rapidshare.com/files/120478891/Hack_Training_Course_CD_2.part3.rar
Labels:
Hacking
Subscribe to:
Posts (Atom)