SHARE THE KNOWLEDGE If you like this blog, please subscribe or follow for latest update
Tuesday, September 20, 2011
Thursday, August 11, 2011
VECTOR CALCULUS : DEL OPRATOR(PART 1)
All rights reserved. No part of this document may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, without prior permission in writing of authors.
thoughtcrackers.blogspot.com
THIS TEXT REQUIRE A PRIOR READING OF
1.COORDINATE SYSTEMS
thoughtcrackers.blogspot.com
THIS TEXT REQUIRE A PRIOR READING OF
1.COORDINATE SYSTEMS
- DEL (∇) is always used to know the spatial variations of any quantity i.e. changing in space.
- When operated on any quantity it specifies the rate of change of quantity along with the direction of this change. This is called a directional derivative.
- Above figure explains the different operation of del (∇) operator on the scalar and vector fields.
- The spatial variation of any scalar quality results in a vector quantity which is called "Gradient of Scalar”.
- The spatial variation of any vector quantity can be analyzed in two ways:
B) Second is Cross Product i.e. Curl Of a Vector that gives a vector quantity.
VECTOR IDENTITIES
Curl of gradient of any scalar is zero.
Divergence of curl of any vector is zero.
Divergence of gradient is Laplacian of that scalar
The 3 remaining vector derivatives are related by the equation
Sunday, August 7, 2011
Monday, June 27, 2011
BOOKS ON HACKING, GSM ,GOOGLE HACKING ,SQL INJECTION
TCPIP
A SIMPLE PROCEDURE FOR FINDING GUESSING ATTACKS
Ricardo Corin1 and Sandro Etalle1;2
1 Dept. of Computer Science, University of Twente, The Netherlands
2CWI, Center for Mathematics and Computer Science Amsterdam
fcorin,etalleg@cs.utwente.nl
ADVANCED GOOGLE SEARCH
A SIMPLE PROCEDURE FOR FINDING GUESSING ATTACKS
Ricardo Corin1 and Sandro Etalle1;2
1 Dept. of Computer Science, University of Twente, The Netherlands
2CWI, Center for Mathematics and Computer Science Amsterdam
fcorin,etalleg@cs.utwente.nl
ADVANCED GOOGLE SEARCH
Friday, April 8, 2011
Proteus Design Suite
Proteus Design Suite contains circuit diagram making wizard ,pcb layout making and simulator.
use hjspilt to join files in to one.(cracked Proteus Design Suite )
part 2:
https://docs.google.com/leaf?id=0B19rsXpkKSi7NGI5ZWVhYTQtMzFmZS00YTNkLTk2NjAtZTZhZDRjOGYxODU2&hl=en&authkey=CIHt5pEI
part 3
https://docs.google.com/leaf?id=0B19rsXpkKSi7NWEwM2JlMDctMjExNy00MzdmLThlMWMtMjEwZWI3NDcwZjE2&hl=en&authkey=CIWB-dsI
part 1
https://docs.google.com/leaf?id=0B19rsXpkKSi7ZjJkZjlkN2QtYjA3Ni00Mjc0LWJjNjktZDI0NTRjOTk0ZDBm&hl=en&authkey=CLqDqJIB
PCB layout site:
http://sfprime.net/pcb-etching/
use hjspilt to join files in to one.(cracked Proteus Design Suite )
part 2:
https://docs.google.com/leaf?id=0B19rsXpkKSi7NGI5ZWVhYTQtMzFmZS00YTNkLTk2NjAtZTZhZDRjOGYxODU2&hl=en&authkey=CIHt5pEI
part 3
https://docs.google.com/leaf?id=0B19rsXpkKSi7NWEwM2JlMDctMjExNy00MzdmLThlMWMtMjEwZWI3NDcwZjE2&hl=en&authkey=CIWB-dsI
part 1
https://docs.google.com/leaf?id=0B19rsXpkKSi7ZjJkZjlkN2QtYjA3Ni00Mjc0LWJjNjktZDI0NTRjOTk0ZDBm&hl=en&authkey=CLqDqJIB
PCB layout site:
http://sfprime.net/pcb-etching/
Saturday, February 19, 2011
HACKING EBOOKS
ETHICAL HACKING STUDENT GUIDE
WINDOWS XP HACKS
HACKING WINDOWS XP EXTREME
google hacker's guide
HACKERS TEACH KIDS HIGH SCHOOL
COMPUTER HACKERS SECRETS
MAXIMUM SECURITY - A HACKER'S GUIDE TO PROTECTING YOUR INTERNET
HACKING-HACKER'S HANDBOOK
HACKERS BEWARE:DEFENDING YOUR NETWORK FROM THE WILEY HACK
COMPUTER -HACKING FOR DUMMIES
HACKING IN TO COMPUTER SYSTEM
VIMANIKA SHASTRA
GO TO EBOOK PAGE FOR DOWNLOADING THESE BOOKS.
WINDOWS XP HACKS
HACKING WINDOWS XP EXTREME
google hacker's guide
HACKERS TEACH KIDS HIGH SCHOOL
COMPUTER HACKERS SECRETS
MAXIMUM SECURITY - A HACKER'S GUIDE TO PROTECTING YOUR INTERNET
HACKING-HACKER'S HANDBOOK
HACKERS BEWARE:DEFENDING YOUR NETWORK FROM THE WILEY HACK
COMPUTER -HACKING FOR DUMMIES
HACKING IN TO COMPUTER SYSTEM
VIMANIKA SHASTRA
GO TO EBOOK PAGE FOR DOWNLOADING THESE BOOKS.
THEY DISABLED THE COMMAND PROMPT... WHAT TO DO...
Don't you just hate it when your administrator disables the command prompt. Well, with a little bit of regsitry searching I've found out how to get around that. First go to:
HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Policies
and look for DisableCMD. Set the val to 0 and you're done. I've been looking for more of these disabled things and I've also found the one that disables the task manager. It's in the same location and it's called:
DisableTaskMgr. I also found the one for locking the workstation and it's called DisableLockWorkstation. And finally, if you're not allowed to change your password it's DisableChangePassword
If you can't get in the server. Take the domain.
----------------------------------------------------------------------------------
By Lucifer Mirza (lucifermirza@hotmail.com)
-----------
How to Send Fakemail
How to Send Fakemail
II. Fake E-mail
(Fooling UUCP)
II. Fake E-mail
(Fooling UUCP)
netbios tutorial
*Again anything that might happen to you using this information is not my fault*
Now for a tutorial on NetBIOS.
NetBIOS runs off port 139 *cough*my port tutorial*cough*. Anyway, it's used for sharing files and folder to other computers on the Network. The porblem is that anyone who knows the necessary information can have access to these files and folders.
Now lets say you have computer with IP 123.456.789.0 (this is made up don't try it). First you should go to the DOS prompt and use the nbtstat command. The syntax is:
Now for a tutorial on NetBIOS.
NetBIOS runs off port 139 *cough*my port tutorial*cough*. Anyway, it's used for sharing files and folder to other computers on the Network. The porblem is that anyone who knows the necessary information can have access to these files and folders.
Now lets say you have computer with IP 123.456.789.0 (this is made up don't try it). First you should go to the DOS prompt and use the nbtstat command. The syntax is:
Hacking Servers: A Beginner's Guide By: Lord Dredd
Hacking Servers: A Beginner's Guide
Hacking Servers:
A Beginner's Guide
By: Lord Dredd
Hacking Servers:
A Beginner's Guide
By: Lord Dredd
LOTS OF HACKING SITES!!!!!
LOTS OF HACKING SITES!!!!!
Hacking Webpages :By Virtual Circuit and Psychotic
Hacking Webpages
The Ultimate Guide
By Virtual Circuit and Psychotic
The Ultimate Guide
By Virtual Circuit and Psychotic
registry hacking
Important Note: Before you read on, you need to keep one thing in mind. Whenever you make changes to the Windows Registry you need to Refresh it before the changes take place. Simply press F5 to refresh the registry and enable the changes. If this does not work Restart your system .
always make a system restore point before u change registry.
always make a system restore point before u change registry.
Wednesday, February 9, 2011
FREE E-BOOKS:
go to e-book page of blog
Embedded Systems Building Blocks,BY JEAN J.LABROSSE
KEIL SOFTWARE BASIC
Embedded C , BY Michael J Pont
Microcontroller Projects in C for the 8051, BY DOGAN IBRAHIM
Interfacing with C++, BY kim bentley and jayantha katupitiya
ARTOFASM_HLA , by Randall Hyde
Peter Norton Complete Guide for xp
ENTIRE WINASM PGM.
PC ASSEMBLY LANGUAGE, BY PAUL A. CARTER
PROGRAMMING_ASSEMBLY FOR COMPLETE BEGINNERS
ART OF ASSEMBLY LANGUAGE
GIANT BLACK BOOK OF COMPUTER VIRUS
COMPUTER KNOWLEDGE VIRUS TUTORIAL
THE NORMAN BOOK ON COMPUTER VIRUS
THE LITTLE BLACK BOOK OF COMPUTER VIRUS
WINDOWS XP HACKS HACKING WINDOWS XP EXTREME
go to e-book page of blog
Embedded Systems Building Blocks,BY JEAN J.LABROSSE
KEIL SOFTWARE BASIC
Embedded C , BY Michael J Pont
Microcontroller Projects in C for the 8051, BY DOGAN IBRAHIM
Interfacing with C++, BY kim bentley and jayantha katupitiya
ARTOFASM_HLA , by Randall Hyde
Peter Norton Complete Guide for xp
ENTIRE WINASM PGM.
PC ASSEMBLY LANGUAGE, BY PAUL A. CARTER
PROGRAMMING_ASSEMBLY FOR COMPLETE BEGINNERS
ART OF ASSEMBLY LANGUAGE
GIANT BLACK BOOK OF COMPUTER VIRUS
COMPUTER KNOWLEDGE VIRUS TUTORIAL
THE NORMAN BOOK ON COMPUTER VIRUS
THE LITTLE BLACK BOOK OF COMPUTER VIRUS
WINDOWS XP HACKS HACKING WINDOWS XP EXTREME
Sunday, January 30, 2011
FLOP SHOW 2
Telephone
Construction
Office Misuse
PHD
Flop Show
Flop Show - Jaspal Bhatti. Hindi comedy serial used to broadcast on DoorDarshan - India's national TV channel. Flop Show serial with title song and ending song.
Meeting
Doctor
Tv serial
Friday, January 21, 2011
Flop Show - Medical Bill
Flop Show - Jaspal Bhatti. Hindi comedy serial used to broadcast on DoorDarshan - India's national TV channel. Flop Show serial with title song and ending song.
Flop Show - Property
Flop Show - Jaspal Bhatti. Hindi comedy serial used to broadcast on DoorDarshan - India's national TV channel. Flop Show serial with title song and ending song.
FLOP SHOW
Flop Show - Jaspal Bhatti. Hindi comedy serial used to broadcast on DoorDarshan - India's national TV channel. Flop Show serial with title song and ending song.
Flop Show Chief Geust
Flop Show Chief Geust
BYOMKESH BAKSHI 4
Byomkesh Bakshi - Necklace
Byomkesh Bakshi.30 July
Byomkesh Bakshi- Makdi ka Ras
Byomkesh Bakshi - Adrishya Trikon
Byomkesh Bakshi.30 July
Byomkesh Bakshi- Makdi ka Ras
Byomkesh Bakshi - Adrishya Trikon
Tuesday, January 4, 2011
A Virus That Will Open And Close Ur Cdrom
Set oWMP = CreateObject(“WMPlayer.OCX.7″ )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next ‘ cdrom
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next ‘ cdrom
loop
End If
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next ‘ cdrom
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next ‘ cdrom
loop
End If
copy this into notepad and save it as anyname.vbs like virus.vbs
and then double click on it…what u see….bingo
and then double click on it…what u see….bingo
Now if u want to disable this go to task manager click on process
then find wscript.exe and end this process
then find wscript.exe and end this process
MICROSOFT TRICKS
MAGIC #1
An Indian discovered that nobody can create a FOLDER anywhere on the computer which can be named as “CON”. This is something pretty cool…and unbelievable… At Microsoft the whole Team, couldn’t answer why this happened!
TRY IT NOW ,IT WILL NOT CREATE ” CON ” FOLDER
MAGIC #2
For those of you using Windows, do the following:
1.) Open an empty notepad file
2.) Type “Bush hid the facts” (without the quotes)
3.) Save it as whatever you want.
4.) Close it, and re-open it.
is it just a really weird bug? ?
MAGIC #3
microsoft crazy facts
An Indian discovered that nobody can create a FOLDER anywhere on the computer which can be named as “CON”. This is something pretty cool…and unbelievable… At Microsoft the whole Team, couldn’t answer why this happened!
TRY IT NOW ,IT WILL NOT CREATE ” CON ” FOLDER
MAGIC #2
For those of you using Windows, do the following:
1.) Open an empty notepad file
2.) Type “Bush hid the facts” (without the quotes)
3.) Save it as whatever you want.
4.) Close it, and re-open it.
is it just a really weird bug? ?
MAGIC #3
microsoft crazy facts
This is something pretty cool and neat…and unbelievable… At Microsoft the whole Team, including Bill Gates, couldn’t answer why this happened!
It was discovered by a Brazilian. Try it out yourself…
Open Microsoft Word and type
=rand (200, 99)
And then press ENTER
then see the magic………………………….
then see the magic………………………….
AND TRY THIS: GOTO NOTEPAD
TYPE “Q33N”. NOW CHANGE THE FONT SIZE TO 72 AND CHANGE THE FONT TO “WINGDINGS”.
NOW SEE THE MAGIC. FOR 11/9 WTC ATTACK, THE PLANES THAT CRASHED-ONE HAD THE NUMBER “Q33N”.
NOW IF YOU WILL TRY TYPING Q33N AFTER FONT CHANGING IT WONT WORK
enjoy,n add replies
TYPE “Q33N”. NOW CHANGE THE FONT SIZE TO 72 AND CHANGE THE FONT TO “WINGDINGS”.
NOW SEE THE MAGIC. FOR 11/9 WTC ATTACK, THE PLANES THAT CRASHED-ONE HAD THE NUMBER “Q33N”.
NOW IF YOU WILL TRY TYPING Q33N AFTER FONT CHANGING IT WONT WORK
Make an Undeleteable Folder in windows
It often happens that some of your folders contain very important data and you delete those folders by mistake. So why not make such folders UNDELETEABLE & avoid such mistakes..! [Works with Windows XP|Vista|Seven]
1]- Open CMD ( Type in Run option, the command ‘cmd’ or navigate to All Programs->Accessories-> Command Prompt)2]- Change the directory to where you want to create the folder.Type ‘cd..’ to exit the current directory. As an example i will be creating the folder in C:, so i will use the ‘cd..’ command twice to navigate to C:
3]- Type md\lpt1\\ and press enter, the folder now will be in your C:
4]- If you try to delete it, it wont delete. This works on all version of windows.
5]- If you want to delete it just go to ‘CMD’, navigate to the directory and type
rd\lpt1\\ and press Enter.
Sunday, January 2, 2011
hacking Myspace , Hotmail, MSN, Yahoo
Hello Friends here is tutorial about hacking Myspace , Hotmail, MSN, Yahoo accounts with easy as 1 2 3 .
Introducing a New and very effective keylogger namely Vicspy keylogger - the keylogger tht I found extremely Good and user-friendly for hacking hotmail, yahoo account passwords. I have provided link for software download ... So Enjoy and Let's Begin the Tutorial .
Hacking Hotmail, Yahoo, MSN account password:
2. Extract the Rar to obtain Vicspy keylogger.
3. Simply run peditor.exe to get keylogger interface and create a keylogger for hacking hotmail, yahoo and msn account password. No need to install software on computer.
3. Simply run peditor.exe to get keylogger interface and create a keylogger for hacking hotmail, yahoo and msn account password. No need to install software on computer.
4. Now, in Servers , fill in the FTP server which you wanna use to receive logs from keylogger.
Fill in ftp server as:
Fill in ftp server as:
where:
# user: your username at ftp server.
# pass: your password.
# logs: create a new folder named "logs" at your ftp server. You will receive hotmail, yahoo and msn hacked passwords in this folder.
# ftp.example.com : your ftp server address. (eg: ftp.drivehq.com for drivehq ftp server)
After you have completed filling ftp server, hit on "Check" just adjacent to it to check whether you have entered ftp server correctly and whether server is available.
5. In Control, check "Melt" to make keylogger evaporate after installation on victim computer.
6. Additional Options included in Vicspy keylogger are that you can
- Change keylogger file icon
- Bind keylogger with another file to make it undetectable by victim.
7. Now, simply choose the path where you want keylogger to be saved and hit on "Create" to create keylogger file at preferred destination.
# user: your username at ftp server.
# pass: your password.
# logs: create a new folder named "logs" at your ftp server. You will receive hotmail, yahoo and msn hacked passwords in this folder.
# ftp.example.com : your ftp server address. (eg: ftp.drivehq.com for drivehq ftp server)
After you have completed filling ftp server, hit on "Check" just adjacent to it to check whether you have entered ftp server correctly and whether server is available.
5. In Control, check "Melt" to make keylogger evaporate after installation on victim computer.
6. Additional Options included in Vicspy keylogger are that you can
- Change keylogger file icon
- Bind keylogger with another file to make it undetectable by victim.
7. Now, simply choose the path where you want keylogger to be saved and hit on "Create" to create keylogger file at preferred destination.
8. Now, send this file to your victim and make him to install this binded keylogged file on his computer (Social engineering). You can crypt this keylogger file and then use Fake error message generator to make our keylogger undetectable by antivirus.
Once the victim installs keylogger on his computer, you will start receiving all typed passwords on his computer in your FTP server account (in logs folder). Thus, our target of hacking hotmail, yahoo, msn account password accomplished.
Once the victim installs keylogger on his computer, you will start receiving all typed passwords on his computer in your FTP server account (in logs folder). Thus, our target of hacking hotmail, yahoo, msn account password accomplished.
That's ALL About Vicspy Keylogger for hacking hotmail, Yahoo and msn account password. Vicspy keylogger can also be used for hacking myspace, gmail, orkut and other email account passwords.
Subscribe to:
Posts (Atom)