Sim Directories / Mobile networks - (GSM - 3G networks). PART-1/x

In this curse we will say a few things about Mobile Networks (GSM-3G) & Sim analysing (Directories, bypassing security etc.)

So let's start with some general theory:

Almost every Sim has directories like:...

TIP-0day: Microsoft-IIS/7.5 - Microsoft-IIS/6.0 with FireWall [ban ip]

Sometimes when you try to do an   SQL-i attack  the firewall bans your ip!

Easy way o solve this problem
Before start the SQL-i, open a Dos/Ddos program and start hit the website...after some minutes the WebSite will start overloading BUT will not be down. Meanwhile the firewall will not be working OR will work a lot slower than before, so it is easy to do an SQL-i attack!

Tested on:  -   Microsoft-IIS/7.5   -  Microsoft-IIS/6.0

TIP: use the Ddos program with a proxy and do the SQL-i with other ip [VPN or proxy]

Facebook hack: Enlarge locked profile picture [real size] (display picture hack)

Ever wanted to see full size profile picture of your crush, who has made her account display picture visible to only limited people?. Well you have good news! this new profile picture hack allows you to view large size of locked profile picture(current) of any user you want...

Don’t believe me? Lets make a try!. Please do-not Misuse it.
Step #1. Open any Facebook profile with locked display picture. ...

Top Wi-Fi Security Threats and How to Secure

Wi-Fi threats like war driving and WEP cracking used to take away the sleep of CEOs. However, with the maturing of 802.11n products, a lot of industries are investing in faster, bigger WLANs that can able to support all those mission-critical applications. However, such an initiative also doesn’t assure 100% security from the Wi-Fi threats. top wifi security threatsThe following lines discuss about top five Wi-Fi security threats and the necessary ways to seek prevention. Have a look: ...

A Virus Program to Restart the Computer at Every Startup

Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.

For this, the virus need to be doubleclicked only...

How to find the IP address of the email sender in Gmail, Yahoo mail, Hotmail, AOL, Outlook Express, etc.

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender....