Gadgets Security

Keep your mobile gadget secure

Wednesday, September 7, 2011

Windows E-Books Reader Server.

Today WhiteCyber Team want to share how to make a simple Windows E-Books Reader Server. To make your old computer become powerfull and meaning full in your library. You could try make E-Book Reader Server from one Personal Computer. Require System Computer with processor Pentium IV or later. Minimum memory 268 Mb. Using Windows XP. We try to make this system in SMAN 1 Salatiga's Library. Tools : 1. XAMP : We will use this program to make Windows XP become a server. download...

Saturday, July 23, 2011

Howto Crack pdf File Password

If you want to crack pdf file passwords use pdfcrack.PDFCrack is a GNU/Linux (other POSIX-compatible systems should work too) tool for recovering passwords and content from PDF-files. It is small, command line driven without external dependencies. The application is Open Source (GPL). pdfcrack Features Supports the standard security handler (revision 2 and 3) on all known PDF-versions Supports cracking both owner and userpasswords Both wordlists and bruteforcing the password is supported Simple...

Top 5 Tips for protecting your mobile from phone hacking

Phone hacking can happen to anyone. Here's how to secure your phone. As you've no doubt heard by now, phone hacking is the new ‘in' thing with newspapers and scrupulous media types. But it's not just celebrities having affairs who need to worry; you too could be the victim of phone hacking. So it's time to tighten up security on your mobile phone and start protecting it in the same way you would protect your PC. Here is PC Advisor's Top 5 Tips for protecting your mobile from phone hacking. 1. Change your voicemail pin  If you have got an old phone or phone contract, then there's a good...

Friday, July 22, 2011

exploitdbee.py – Easily Search For Exploits In BackTrack’s Exploitdb (files.csv).

This is a simple Python tool to help you search for exploits in the BackTrack Exploit Database. Features Search the exploitdb archive Case sensitive & insensitive Change output mode Automatically copy your exploits Requirements python (tested with python 2.7.1 and 2.5.2) local exploitdb (pre-installed on BackTrack Linux) Usage exploitdbee.py [-c] [-d path]exploitdbee.py "windows 7" remoteexploitdbee.py -c Microsoft IIS -d /tmpYou can download exploitdbee.py v1.0 here: exploitdbee...

Wednesday, July 20, 2011

Mengaktifkan & Menonaktifkan Regedit

Kesal kan apabila regedit hilang karena perbuatan virus? Atau mungkin juga teman-teman anda sering mengutak-atik registry anda? Karena itu saya ada sebuah trik nih, yang berfungsi untuk menampilkan dan menyembunyikan regedit, yaitu dengan sebuah sedikit sihiran javascript, simple, bahkan orang awam pun bisa membuat program seperti ini. Caranya?ketik script dibawah ini di notepad. -------------------------------------------------------- // Program Sederhana Mengamankan Regedit // Nama Program: regedit_java.js var vbCancel = 2; var vbYesNoCancel = 3; var vbYes = 6; var vbNo = 7; var vbQuestion...

Page 1 of 7412345Next