Are You Sure Your Password is Safe?
Since the appearance of computers and the necessity of storing confidential information, passwords became part of our lives. But password hacking programs also appeared; as a ready to offer a solution...
View ArticleTypolight
Once you begin working with Typolight, you will realise that the capabilities of the product out of the box are extremely impressive. There is alot more functionality when comparing to other CMS...
View ArticleDotCMS
dotCMS is a portal-based Web Content Management System. It offers a compelling set of features out of the box all on an extensible platform that can be customized to suit just about any Web CMS need –...
View ArticleA Crook is Caught One Day or the other
Hackers had broken into the Department of Defense's computers - again. With news like this, combined with the fact that other hackers are constantly seeking to steal people's identity, send out spam...
View ArticleCMS Made Simple
To get a site up with CMS Made Simple is just that, simple. For those with more advanced ambitions there are plenty of addons to download. And there is an excellent community at your service. The cms...
View ArticleU.S. Still Top Spammer, Report Says
At the end of 2010, the United States remained on top of the "Dirty Dozen" list of spam relaying nations compiled by IT security firm Sophos. While the list, which is complied on a quarterly basis,...
View ArticleOutlaws of Technology! Hacker or Cracker
In order to study the comparison the between the hackers and crackers, it is important to understand the respective definitions. While apparently the words hacking and cracking seems synonymous, yet...
View ArticleModx CMS
The MODx Ajax CMS and PHP Application Framework brings plenty to the table, with as it is a application framework, not only is ModX a CMS, but it is a Web application builder as well, supporting forms...
View ArticleHave You Checked Your Credit Report Lately?
Credit card hacking has become one of the new security headaches of consumers. Although in face to face transactions the percentage of credit card fraud is almost a tenth of a percent, in online...
View ArticleHacking Linux : Programmers test themselves
Since Microsoft has a huge chunk of the operating system's market in the world, it is the first victim of hackers. But that doesn't mean that Linux hacking doesn't exist. Although is less common than...
View ArticleChina leadership 'orchestrated Google hacking'
Google left the mainland after refusing China's demand to censor its searchesSenior Chinese figures were behind the hacking of Google earlier this year which forced the search engine to quit the...
View ArticleSql Poizon v1.1
After a very successfull release of Sql Poizon v1.0, The Exploit Scanner Tool, I am hereby introducing you with the new release which is more handy. It has new features as well as bug fixes from the...
View ArticleDrupal
Unlike Mambo, it is easy to hack the templates, layout, menus and navigation of a Drupal site, which make it the perfect system for developers and designers alike. It’s architecture is somewhat...
View ArticleTor-ramdisk
Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose sole purpose is to securely host a Tor server purely in RAM. For those not familiar with Tor, it is a system which allows the user to...
View ArticleTypo 3
If you are looking for power over simplicity then Typo 3 is one such option. Starting out with TYPO3 does require time and dedication, both from an administrative point of view. End users can expect to...
View ArticleProxy Switcher
This is an instantaneous change proxy settings on the fly. " The program will automatically download a huge list of proxy servers, checks them for availability and anonymity. You can surf the Internet...
View ArticleImpress CMS
I’ve recently come across an impressive contender that I’ve had to add to the list. ImpressCMS is a fairly recent fork of Xoops, the project has managed to impress both the audience and the jury,...
View ArticleGnackTrack
GnackTrack is a Live (and installable) Linux distribution designed for Penetration Testing and is based on Ubuntu. Although this sounds like BackTrack, it is most certainly not; it's very similar but...
View ArticleHiren's BootCD 13
Hiren's BootCD - an indispensable tool used by many computer technicians and system administrators. This is a utility for working with hard drive, its recovery and diagnostic tools diagnosis of all the...
View ArticleInkscape version 0.48 Portable
Inkscape merupakan salah satu pengelola gambar vektor yang sifatnya open source dan tidak kalah kemampuannya dengan pengolah gambar vektor lainnya versi berbayar (lisensi) seperti Adobe Illustrator,...
View ArticleSandcat
The most advanced fault-injection testing tool for web applications.Sandcat combines Syhunt's state-of-the-art, multi-process scanning technologies with the incredibly fast Lua language to perform...
View ArticleSim Card Data Recovery Software
Sim Card Data Recovery Software (Allows you to recover SMS text messages, Phone book contacts, Last dialed and fixed dialed numbers, Service provider name, Card identification number, location and IMSI...
View ArticleChaosmap
Chaosmap is an information gathering tool and DNS / whois / Web server scanner. It can be used to look up DNS names with a dictionary with or without using a salt. Salting for DNS means it will append...
View ArticleAcunetix 7 Enterprise - Portable
- On first startup will ask for web license,but don't worry. All you have to do is to click Next, then again Next, and Next and finish. Can not register for each machine, their licensing system...
View ArticleBlackbuntu
Blackbuntu is distribution for penetration testing which was specially designed for security training students and practitioners of information security.Blackbuntu is penetration testing distribution...
View Article
More Pages to Explore .....