Just visit the site for tutorial folks :)

website -- http://www.leetshares.com

Facebook Auto Liker

Unknown 17 8:35 PM

Just visit the site for tutorial folks :) website --  http://www.leetshares.com

Credits to onhax.net

Camtasia Studio 8

The screen-capture video tool Camtasia Studio has long balanced a strong set of features with a friendly interface and graceful learning curve. Version 8 continues the tradition with cool, new features that don’t bog down the app with any additional complexity. Camtasia’s price–$300–may raise eyebrows, but make no mistake: this screencasting software is serious business. New and advanced users both should be able to learn the software and start producing professionally looking videos in little time.

Serial Keys ?

Yeah..we got ‘em..You may have seen these keys everywhere on the internet.But we got the right method to activate it..So follow us :)

How to Activate ?
this will be a bit tricky,follow correctly

Download & install the latest trial version of Camstasia Studio
Launch it,always choose 30 day trial mode
After launching go to Help > Enter Software Key
Disconnect internet connectivity from your computer
Paste a serial key from the list below
Fill your Name & Press Finish [ image ]
You will get an error message saying there’s a trouble validating the key,Just OK it [ image ]
Now Exit from  Camstasia Studio completely
Reconnect your computer to internet
Now launch Camstasia Studio again (If you get a register message just close it)
That’s it registered :)

License Keys

G4DCD-9CC5J-JTDPC-FQJ9X-X735A

GCABC-CPCCE-BPMMB-XAJXP-S8F6R

EA5AC-CLMAM-A8W6W-EZLYM-LM58F

HLCZF-HDCPL-KGB6W-ZSCAZ-VF6A2

CD2AA-QZBHD-C3KJL-E9HRV-Q797C

ABHKC-9YZZB-55MCB-5A4C7-S5868


Downloads



Camtasia Studio 8 Latest Version Serial Keys Give Aways

Credits to onhax.net Camtasia Studio 8 The screen-capture video tool Camtasia Studio has long balanced a strong set of features w...

Computer hacking is a practice with many nuances. Intent, whether benign or malicious, is often in the eyes of the beholder. When examining the root cause of a website hack or application exploit, it pays to follow the money. A hacker will be motivated by whomever or whatever is sponsoring his or her actions. The computer security industry coined the term “ethical hacking” to describe a hacker who benevolently attacks a network or other security system – whether private or public – on behalf of its owners. Ethical hackers are also called white hat hackers, as distinguished from the black-hatted bad guys.
One grey area in ethical hacking is hacktivism, where the hacker detects and reports (but sometimes exploits) security vulnerabilities as a form of social activism. In these cases the motivation isn’t money, but rather to call attention to an issue or injustice the hacker believes merits social change. However, the victim of the hack may not be so receptive to this message. Ethical hacking should always be undertaken with the express advance consent of the targeted organization – as many black hat hackers claim to be ethical hackers when caught.

Why Use Ethical Hacking?

Why pay someone to hack into your own application or website? To expose its vulnerabilities of course. Any law enforcement officer will tell you to prevent crime, think like a criminal. To test a security system, ethical hackers use the same methods as their malicious brethren, but report problems uncovered to their client instead of taking advantage of them. Ethical hacking is commonplace in the Federal government, where the practice initiated in the 1970s, and many large companies today employ white hat teams within their information security practice. Other online and internet slang terms for ethical hackers include “sneakers”, red teams and tiger teams. Computer programmers can even learn ethical hacking techniques from a variety of certification authorities.
In the world of application security, online ethical hacking takes the form of penetration testing. “Pen tests” are performed in as realistic scenarios as possible to ensure that the results accurately mimic what an intruder could potentially achieve. Manual application testing employs human experts – ethical hackers – that attempt to compromise the app and report what they find. Typically a variety of tests are performed, from simple information-gathering exercises to outright attacks that would cause damage if actualized. A full blown ethical hack might even include social engineering techniques such as emailing staff to dupe them into revealing passwords and other account details.

Veracode and Ethical Hacking: Automated Tools to Expose Vulnerabilities

Penetration testing exposes software coding errors and other vulnerabilities that threaten critical data, user accounts and other application functionality. Not all pen tests are performed manually, however. Ethical hackers may employ automated tools such as static analysis and dynamic analysis. Veracode performs both dynamic and static code analysis and finds security vulnerabilities such as malicious code or insufficient encryption that may lead to security breaches. Using Veracode, penetration testers and other ethical hackers can spend more time prioritizing and remediating problems and less time finding them.
sacrificing security.


What is Ethical Hacking?

Unknown Reply 8:07 PM

Computer hacking is a practice with many nuances. Intent, whether benign or malicious, is often in the eyes of the beholder. When ex...

One Hundred Cross-site Scripting Payloads

Unknown Reply 1:02 AM

1) <iframe src=" javascript:prompt(1) "> 2) <svg><style>{font-family&colon;'<iframe/onloa...





1.Web Developer

The Web Developer extension adds a toolbar button to the browser with various web developer tools. This is the official port of the Web Developer extension for Firefox.

2.d3coder

This extension enables you to encode and decode selected text via the context menu. This reduces the time you spend on looking up encoded values and gives you more time to concentrate on the important things of development. 

3.Site Spider

Use this extension to spider a website looking for dead links. One can restrict the spidering to a directory, a domain, or any other regular expression. The spider can also follow one link beyond this restriction, allowing one to find broken external links.

4.Session Manager

A simple yet powerful extension for managing sets of tabs. Session Manager is a simple yet powerful extension that makes it quick and easy to save, update, remove, and restore sets of tabs.

5.Request Maker

Request Maker is a tool for penetration testing. With it you can easily capture requests made by web pages, tamper with the URL, headers and POST data and, of course, make new requests. Request Maker only captures requests sent via HTML forms and XMLHttpRequests; it doesn't fill the log with useless information about images and style sheets.

6.EditThisCookie

EditThisCookie is a cookie manager. You can add, delete, edit, search, protect and block cookies.

7.Cache Killer

This extension allows you to easily disable caching in Chrome. When Cache Killer is activated, it will clean your Browser Cache before every page load. With just one click you can disable or enable this feature.

8.XSS Rays

XSS Rays is a security tool to help pen test large web sites. It's core features include a XSS scanner, XSS Reverser and object inspection. Need to know how a certain page filters output? Don't have the source? No problem. XSS Rays will blackbox reverse a XSS filter without needing the source code.

9.Port Scanner

The Port Scanner extension determines lively services on the host using TCP port interrogations. Port Scanner will check which TCP ports are listening. You can test these ports to see if they are running. It is recommended that any services which are not necessary be disabled. Use Port Scanner to scan individual ports to determine if the device is listening on that port. Port Scanner will analyse given IP address or URL for open ports to help you to secure it.

10.HPP Finder

HPP Finder is a Chrome extension designed for detecting HPP attempts. HPP Finder can detect URLs and HTML forms that might be susceptible of parameter pollution, but it is not a complete solution against HPP. 

Turn Your Chrome Browser Into A Penetration Testing tool

1. Web Developer The Web Developer extension adds a toolbar button to the browser with various web developer tools. This is the...

Deep Web list links march 2014 (.onion)

Unknown Reply 4:25 PM

10 Useful Firefox Add-ons For Hackers

Unknown 2 2:53 PM

Mozilla Firefox 1. Greasemonkey Allows you to customise the way a web page displays or behaves, by using small bits of JavaScrip...

Linux
8 Most 'Powerful' Supercomputers In The World; Powered by Linux.

Here's the list :

1. Tianhe-2

Tianhe-2 or TH-2 (literally "Skyriver-2", idiomatically "Milky Way 2") is a 33.86 petaflops supercomputer located in Sun Yat-sen University, Guangzhou, China. It was developed by a team of 1300 scientists and engineers. It is the world's fastest supercomputer according to the TOP500 list for June and November 2013. The development of Tianhe-2 was sponsored by the 863 High Technology Program, initiated by the Chinese government, the government of Guangdong province, and the government of Guangzhou city. It was built by China's National University of Defense Technology (NUDT) in collaboration with the Chinese IT firm Inspur. 

2. K Computer

The K computer is a supercomputer manufactured by Fujitsu, currently installed at the RIKEN Advanced Institute for Computational Science campus in Kobe, Japan. The K computer is based on a distributed memory architecture with over 80,000 computer nodes. It is used for a variety of applications, including climate research, disaster prevention and medical research. The K computer's operating system is based on the Linux kernel, with additional drivers designed to make use of the computer's hardware.

3. IBM Mira

Mira is a petascale Blue Gene/Q supercomputer. It has a performance of 8.16 petaflops and consumes 3.9 MW in power. The supercomputer was constructed by IBM for Argonne National Laboratory's Argonne Leadership Computing Facility with the support of the United States Department of Energy, and partially funded by the National Science Foundation. Mira will be used for scientific research, including studies in the fields of material science, climatology, seismology, and computational chemistry. The supercomputer is being utilised initially for sixteen projects, selected by the Department of Energy.

4. Titan

Titan is a supercomputer built by Cray at Oak Ridge National Laboratory for use in a variety of science projects. Titan is an upgrade of Jaguar, a previous supercomputer at Oak Ridge, that uses graphics processing units (GPUs) in addition to conventional central processing units (CPUs). It is the first such hybrid to perform over 10 petaFLOPS. Titan employs AMD Opteron CPUs in conjunction with Nvidia Tesla GPUs to improve energy efficiency while providing an order of magnitude increase in computational power over Jaguar. It uses 18,688 CPUs paired with an equal number of GPUs to perform at a theoretical peak of 27 petaFLOPS

5. IBM Sequoia

IBM Sequoia is a petascale Blue Gene/Q supercomputer constructed by IBM for the National Nuclear Security Administration as part of the Advanced Simulation and Computing Program (ASC). Record-breaking science applications have been run on Sequoia, the first to cross 10 petaflops of sustained performance. The entire supercomputer runs on Linux, with CNK running on over 98,000 nodes, and Red Hat Enterprise Linux running on 768 I/O nodes that are connected to the filesystem

6. Stampede

Stampede is one of the most powerful machines in the world for open science research. Funded by the National Science Foundation Grant ACI-1134872 and built in partnership with Intel, Dell and Mellanox, Stampede went into production on 7 January, 2013. Stampede comprises 6400 nodes, 102400 cpu cores, 205 TB total memory, 14 PB total and 1.6 PB local storage. The bulk of the cluster consists of 160 racks of primary compute nodes, each with dual Xeon E5-2680 8-core processors, Xeon Phi coprocessor, and 32 GB ram. The cluster also contained 16 nodes with 32 cores and 1 TB ram each, 128 "standard" compute nodes with Nvidia Kepler K20 GPUs, and other nodes for I/O (to a Lustre filesystem), login, and cluster management. Stampede can complete 9.6 quadrillion floating point operations per second.

7. SuperMUC

SuperMUC will be the successor of the Höchstleistungsrechner Bayern II (HLRB II). The SuperMUC will have 18,432 Intel Xeon Sandy Bridge-EP processors running in IBM System x iDataPlex servers with a total of 147,456 cores and a peak performance of about 3 petaFLOPS. The main memory will be 288 terabytes together with 12 petabytes of hard disk space based on the IBM General Parallel File System (GPFS). It will also use a new form of cooling that IBM developed, called Aquasar, that uses hot water to cool the processors, a design that should cut cooling electricity usage by 40 percent, IBM claims.

8. JUQUEEN

JUQUEEN at the Forschungzentrum Jülich is a 28-rack Blue Gene/Q system. It will have a peak performance of about 5,872 Tflops. JUQUEEN runs Red Hat Enterprise Linux.

credits to 
4ntipatika

8 Most 'Powerful' Supercomputers In The World; Powered by Linux.

Unknown Reply 2:37 PM

Linux 8 Most 'Powerful' Supercomputers In The World; Powered by Linux. Here's the list : 1. Tianhe-2 Tianhe-2 or TH-2 (li...

Search

Technology & Computers - Top Blogs Philippines

Popular Posts

Categories