23 Oct 2015
14 Oct 2015
AIR CRACKING (Linux tool)
KISMET (Linux tool)
NET-CUT (windows)
NET-STUMBLER (windows)
SWS SCANNER
Top Wifi Hacking Tools And Ways
Top Wifi Hacking Tools And Ways
In today's world everyone wants to access the internet through the WiFi for high speed.WiFi hacking was done before on Linux distribution now it can be done on the windows too.Today we brought you top 5 WiFi hacking tools which will help in hacking the WiFi using the windows and Linux.
1. NET CUT (windows)
This driver package and install the upgrade under Windows 32-bit and 64-bit is .tested both. Net-cut network will disconnect any WiFi device. There's a device on the same network connection to the Internet for the Android application use is WiFi kill. WiFi connection on your device and get the entire network.2. NET STUMBLER (windows)
Net-stumbler also known as network stumbler ,this is a windows based tool can easily find wireless signals being broadcast within range .3. AIR CRACKING (Linux tool)
AIR CRACKING WiFi it famous for hacking WiFi password cracking tool that helps is one.The Packet Sniffer, wireless network detector, WEP and WPA / WPA2-PSK cracker and includes analysis tool for wireless LAN's.4. KISMET (Linux tool)
Kismet is an 802.11 layer 2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, anti cloaking) hidden networks, and inferring the presence of non beaconing networks via data traffic.5. SWS SCANNER
it is specially designed to make a whole war driving process a lot easier.it can also manage many tasks related with wireless networking.
Botnets
DNS Spoofing
Facebook Phishing.
Keylogging
Man In the Middle Attacks
Mobile Phone Hacking
Session Hijacking
Sidejacking With Firesheep
Stealers
USB Hacking
Top 9 Facebook Hacking Techniques And Ways
Facebook is one of the most used social networking site with million users, as a reason if which it has become the number 1 target of hackers have, I have written a couple of post related to facebook hacking here. I mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2015, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the Top 9 Facebook Profile Hacking Techniques .
1. Facebook Phishing
Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims “Email Address” and “Password” is stored in to a text file, The hacker then downloads the text file and gets his hands on the victims credentials.
2. Keylogging
Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.
3. Stealers
Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are softwares specially designed to capture the saved passwords stored in the victim's browser, Stealers once FOOD can be extremely powerful.
4. Session Hijacking
In a session hijacking attack, connection for a hacker to access victims' accounts on a Web site used to authenticate a user uses the browser cookie stole the victims: an HTTP fees If you are accessing your session hijacking can often be very dangerous, session hijacking is widely used LAN.
5. Sidejacking With Firesheep
The attacker and the victim is on the same WiFi network, but it is still popular now a days, attacks were common in late 2010 Sidejacking, Firesheep side jacking widely used to attack, Firesheep works. HTTP session hijacking attacks as a side jacking another name, but it is targeted by the WiFi users.6. Mobile Phone Hacking
Millions of Facebook users through their mobile phone to access Facebook. The hacker then perhaps his / her Facebook account can access the victims can access the mobile phone. A cell phone is used to monitor many of them are mobile software.7. DNS Spoofing
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.8. USB Hacking
If an attacker has physical access to your computer, they just automatically store passwords in the browser program with a function to extract a USB is inserted, you also get access to the link below which can be read by the attack is posted on
9. Man In the Middle Attacks
The victim and the attacker on the LAN and are on a switch based network, a hacker client and server W / B can place himself or he, ARP poisoning capture all traffic because of the default gateway can act as gateways to the other name for the man in the middle attacks, a very broad topic and is beyond the scope of this article.
10.Botnets
Botnets are not commonly used for hacking facebook accounts, because of it’s high setup costs, They are used to
carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is
same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the
compromised computer. Some of the most popular botnets include Spyeye and Zeus.
10 Oct 2015
DLX is a reduced instruction set computer
Little Computer 3
Little Man Computer
Low level languages
Next Byte Codes
Types of low level language
Low level languages
"In computer science, a low-level programming language is a programming language that provides little or no abstraction from a computer's instruction set architecture commands in the language map closely to processor instructions. Generally this refers to either machine code or assembly language".
Low level languages must be written for a specific processor architecture and cannot be written or taught in isolation without referencing the processor for which it was written. Unlike higher level languages, using an educational assembly language needs a representation of a processor. Assembly is the most helpful programming language to use for learning about fundamental computer processor operation.
Little Man Computer (LMC) is an instructional model of a simple von Neumann architecture computer with all basic features of modern computers. It can be programmed in machine code (usually decimal). It is based on the concept of having a little man locked in a small room. At one end of the room are 100 mailboxes or (memory), each capable of holding a three digit instruction or data. At the other end of the room are two mailboxes labeled INBOX and OUTBOX which receive and emit data. In the middle of the room is a work area with a simple two function (add and subtract) calculator called the Accumulator and a resettable counter called the Program Counter. The Program Counter is similar to what a doorperson uses to keep track of how many people have entered a facility it can count up 1, or it can be reset to 0. As specified by the von Neumann architecture, memory contains both instructions and data. The user loads data into the mailboxes and then signals the little man to begin execution.
Next Byte Codes (NBC) is a simple language with assembly language syntax that is used to program Lego Mindstorms NXT programmable bricks. The command line compiler emits NXT compatible machine code, and supports Windows, Mac OS X and Linux.
Little Computer 3 (LC-3), is an assembly language with a simplified instruction set, but can be used to write moderately complex assembly programs and is a theoretically viable target for C compilers. It is simpler than x86 assembly but has many features similar to those in more complex languages. These features make it useful for teaching basic programming and computer architecture to beginning college computer science and computer engineering students, which is its most common use.
DLX is a reduced instruction set computer (RISC) processor architecture by the main designers of the MIPS and the Berkeley RISC designs, two benchmark examples of RISC design. DLX is essentially a cleaned up, simplified MIPS, with a simple 32-bit load/store architecture. It is widely used in college-level computer architecture courses.
MIX and MMIX are hypothetical computers used in Donald Knuth's monograph, The Art of Computer Programming (TAOCP). Paraphrasing Knuth: The MIX systems are computers intended to illustrate machine-level aspects of programming, so its machine language is simple, elegant, easy to learn. It also includes all the complexities needed for high performance in practice, so in principle it can be built and perhaps be competitive with some of the fast general-purpose computers. MIX is hybrid programmable in binary and decimal numbers; most programs written for it will work using either form. Software implementations for MIX and MMIX have been developed by Knuth and made freely available. Several versions of both emulators exist. MIX is a 1960s-style computer. It is superseded by MMIX, a newer modern computer architecture, a 64-bit RISC instruction set architecture (ISA). For MMIX, Knuth collaborated with the architects of the MIPS and Alpha ISAs.
8 Oct 2015
What Is Graphic Communication? importance of graphic communication
Graphic communication is the result of a long evolution of tools and techniques.
That evolution was greatly accelerated by the establishment of modern,
industrial societies—and graphic communication itself greatly contributed
to modern social and economic development, to the extent that today visual
communication is a readily identifiable force in the growth of both Western and
Eastern “postindustrial” information economies.
According to historical literature, graphic communication has taken as long
as 30,000 years to evolve (Meggs 1998). The role of the visual communicator—
and the function of communication—developed slowly: cave paintings
done between 15,000 and 10,000 B.C., the invention of writing with pictographs
in Mesopotamia (3100 B.C.), the invention of paper and Chinese relief
printing (second century A.D.), the rise of late medieval illuminated manuscripts
(eighth century A.D.), and the breakthrough of movable type in Europe (1450
A.D.) all contributed to that development. Investigation of communication
design over the last century reveals patterns of technological, economic, occupational,
spatial, and cultural development that can be attributed to the creation
of an information-driven economy and society that relies on communication
design and technology for stability and growth.
Although enhanced and changed by modern technology, including software
and computers, the basics of communication have essentially remained the
same through the millennia. Communication is a process that requires a sender
(the designer), a message (information or an effort to persuade), a medium (the
delivery platform), and a receiver of that message (the audience). Communication
comes in various forms and is delivered in various media, or platforms for communication
delivery. These media include all forms of printed paper or material
(books, magazines, newspapers, brochures, flyers, signage, and billboards), the
Internet, mobile phones and handheld devices, television, radio, CDs and DVDs,
videos, video games, and films. Media transmitted to mass audiences is called
mass media; it includes television, film, recordings, mobile technology, magazines,
books, the Internet, and radio. Conversely, a brochure, part of a collection of collateral
material, may only be seen by a few people.