• Bluesnarfing: Type of Bluetooth Hacking

    by  • March 22, 2009 • 0 Comments

    Bluesnarfing is one type of blue-tooth hacking. While it is similar to the bluejacking and bluebugging. It was discovered by Marcel Holtmann in october 2003. Bluesnarfing is unauthorized access of information or data from wireless device through blue-tooth technology. Connection is often between the desktop’s, LAP’s ,cellphones , PDA’s . Blue-tooth is very high speed […]

    Read more →

    Bluejacking: Type of Bluetooth Hacking

    by  • March 21, 2009 • 0 Comments

    Bluejacking is one of the type of Blue-tooth hacking. Bluejacking was first carried by the Malaysian IT consultant. In simple words Bluejacking means tempoarly hijacking someones device. Bluejacking allow the user to send business cards anonymously using Bluetooth wireless technology. Bluejacking is carried only to the Bluetooth enable device that is cell phones, PDA’s , […]

    Read more →

    Bluebugging: Type of Bluetooth Hacking

    by  • March 21, 2009 • 1 Comment

    Bluebugging is also one form of Bluetooth hacking .It was first discovered German researcher Martin Herfurt . He got the motivation from the Bluesnarf attack. Bluebugging is very much different from the bluesnarfing. In bluebugging allows an individuals to access the mobile phone commands using Bluetooth wireless technology without knowing the phone’s user .The hacker […]

    Read more →

    Firewalk Attack: Beyond The Boundaries of Security.

    by  • March 21, 2009 • 0 Comments

    Firewalk which was developed by two masterminds known as developed by Mike Schiffman and Dave Goldsmith furthers the techniques used both by static port traceroutes and hping. It can be successfully implemented to scan a host downstream from a security gateway to assess what rules relate to the target system, without any packets having to […]

    Read more →

    BLUETOOTH HACKING

    by  • March 20, 2009 • 1 Comment

    Bluetooth  is wireless technology of data and voice. It requires very low power .It has range from  10m-100m.It can transfer upto 1Mb/s of data. What is blue-tooth hacking ? Blue-tooth hacking is hacking the other device without the knowing that device.It is also know as Bluesnarfing. Blue-tooth hacking not only limited to cell phones ,but […]

    Read more →

    Get Rapidshare Premium Account Numbers Live

    by  • March 13, 2009 • 8 Comments

    Hii All, I have some new numbers for your Rapidshare download. Here are some rapidshare premium account numbers http://rapidshare.com/files/7361432/REAL_WAY_TO_EASY_GET_A_PREMIUM_ACCOUNT_-_NO_KEYGEN.ra Download this file You can get a free generator : It generates randomly free rapidshare account numbers. All these rapidsahre numbers are premium and you’ll surely find active ones by trying 2-3 searches on it. It […]

    Read more →

    Web Resource For Digital Technology:Thinkdigit.com

    by  • December 28, 2008 • 0 Comments

    Out of many web resources available on web for digital technology you can surely count on Thinkdigit.com , It is the online presence of one of the leading magazines in India named ‘Digit Magazine’ As a gadget savvy person, I always needed a place where I can get assured reviews of the digital products on […]

    Read more →

    Nokia Developer Conference 2009 In India

    by  • December 26, 2008 • 3 Comments

    Nokia is ready to set another benchmark this year for mobile application developers and IT industry by announcing its ‘Nokia Developer Conference 2009’ In Bangalore, India. The basic concept behind this conference is creating a forum where knowledge of developers across the nation will be shared. Presentation on various mobile technologies, developers success stories and […]

    Read more →

    Set Up Your Own Domain Name Server

    by  • December 21, 2008 • 3 Comments

    This is only a quick tutorial, there are literally hundreds of little tricks you can do with a DNS, but this will get your basics up and running. I’m assuming you want to setup a windows DNS server, but the principals will work for most servers. You will need.. 1) A domain name over which […]

    Read more →