Search:
Type: Posts; User: shakuni; Keyword(s):
Search:
Search took 0.02 seconds.
-
September 25th, 2008, 05:24 AM
Hi everybody
Yesterday I created this application for a friend, which gets geolocation in google maps via IP address.
Its here, http://apps.hackingtuts.com
Although it is very trivial, still...
-
July 31st, 2008, 03:18 PM
-
July 31st, 2008, 06:52 AM
Just what the title says?
How to get info about a person through his phone number?
And please don't answer that I should call him to ask myself.
I need this info because of a bet with my friend...
-
June 26th, 2008, 02:41 PM
Is there any search engine that provide case sensitive searching. I am sure that google searches are not case sensitive.
-
For my Malware Research I need samples of the following two kinds of Malware(description from Peter Szor's book). Please give me the names or samples of any of them,
Thanks.
-
-
Actually I am working on a new kind of steganography tool. I can't give you the details of it now but I will post it when it is completed.
I don't understand this.
-
Yes, "may be" then I can't determine your physical location.
But I am trying to develop a tool that will find IP from physical location, something like reverse of traceroute. But now I realize that...
-
I need to convert pdf to jpg and bmp for some purpose and I want to do it in assembly (or C/C++/ java). Obviously I will have to use some pdf pasing library/SDK. So do you guys know of any good one ?...
-
I know that the physical location of a computer can be easily determined if we know its IP address.
What I want to get the is IPs from geographical information alone.
for instance, I want to know...
-
How can I access the files that are in use by other processes using win32api ?
Say there is this file called "locked.txt", which is in use by process A. Now how can I copy this file to another...
-
April 14th, 2008, 09:33 AM
Just setup a honepot and you'll get everything that is in the wild.
Enjoy!
-
March 26th, 2008, 12:04 PM
My log file told me that a couple of exploits(LSASS and DCOM exploits) were tried on my system's one of the VM (windows xp2) from the following IPs
10.8.240.93
10.8.154.135
But how is this...
-
March 23rd, 2008, 06:15 AM
While researching for my book ("Malware : Writing Malicious Code"), I came across this-
Now my question is-
How can I emulate an API, for example, How can I write code that'll manipulate...
-
February 16th, 2008, 11:01 AM
yes it will, actually it just overwrites them. But it won't effect the image if the string that is to be hidden is small.
-
February 14th, 2008, 10:19 AM
Basic Image stegnographer v 0.1
The following source and explanation is a bit oversimplified. But I am still learning about steganography.
A bitmap contains a header section(first 54 bytes) and...
-
January 26th, 2008, 06:28 AM
Thanks for suggestions.
I have completed a potential chapter list and index of the book.
I want to make virus writing so easy that it will not be "cool" anymore.The problem is that it will make...
-
January 26th, 2008, 06:20 AM
Some system monitoring program gave me this message
which means that it is executing the function whose name is c which is exported by jkhfd.dll
I dissassembled the file(jkhfd.dll) and found...
-
January 10th, 2008, 02:07 PM
I read Mark Ludwig's "The Giant Black Book of computer viruses" a few years back. However it is obsolete now and there is no book to fill its place. Although there are good books on writing rootkits,...
-
December 24th, 2007, 01:34 PM
What's the meaning of "donating" when they aren't useful for anyone.I throw them in recycle bin.
-
October 21st, 2007, 06:31 PM
but "a visible window and dialogue boxes" are not required to understand the working of some process.One can always start the process inside the kernel level debugger and monitor its behaviour.
-
October 21st, 2007, 03:18 PM
Can't we get into this "system account" ?
-
October 21st, 2007, 11:32 AM
I have four partitions on my computer, say c,d,e and f.Out of these windows is installed on c drive.
And I have two users on my computer, one is admin and another is InternetUser.I have configured...
-
October 15th, 2007, 08:57 AM
<history lesson>
A few days ago I downloaded a book on cryptanalysis in pdf format, it was huge in terms of size (40 MB).
After downloading it I found that I can't read it because it is corrupt. So...
|
|