After searching a lot i found dis amazing thing. its like a proxy browser. It can change your permanent IP to static IP. so just when u restart your browser u will have new IP... u can also set intervals between changing your proxy...so now download multiple files at d same time......it also has integration of IDM with it..
tip:
u have to close this particular browser than open again and it will start downloading from RAPIDSHARE again no need to disconnect..
easy..
The software name is TORPAK.
Download it here.
links click here to go to given topic
sign text quotes
..
teach me rulz i will teach u how to break it..........
Hi Friends
below u can see a comment box please comment me so that i can improve my site i m in developing state and want to make worlds best blog so please help me
Tuesday, June 3, 2008
Get a New IP Address Even If You Have a Static IP
To start off, you need a direct connection to your modem and computer. If you have a router, disconnect it and directly hook up your modem to your computer.
1. Open up the command prompt by pressing Start->Run and typing in cmd
2. In the command prompt, type “Ipconfig/all”. This will tell you your current IP Address. After, type “ipconfig/release”. Keep the command prompt open for easy access.
3. Go to “Network Connections” (accessible through the control panel). Right click “Local Area Connection” and click “Properties”
4. With “Internet Protocol (TCP/IP) selected, click the “Properties” button.
5. A new window will open. Under the “General” tab, select “Use the Following IP address”. Under “Ip Address”, put “10.0.0.1″. Press the “Tab” key on your keyboard.
6. Press Ok on both open windows.
7. Repeat steps 3-4. Under the “General” tab, press the radio button “Automatically Assign Me an Ip Address”. Press ok on both windows.
8. Go back to the command prompt and type in “Ipconfig/all”. You’ll now notice you have a new IP address.
So, this will be handy if you want to by-pass Rapidshare 1 hour download limit, provided that you have a static IP address.
1. Open up the command prompt by pressing Start->Run and typing in cmd
2. In the command prompt, type “Ipconfig/all”. This will tell you your current IP Address. After, type “ipconfig/release”. Keep the command prompt open for easy access.
3. Go to “Network Connections” (accessible through the control panel). Right click “Local Area Connection” and click “Properties”
4. With “Internet Protocol (TCP/IP) selected, click the “Properties” button.
5. A new window will open. Under the “General” tab, select “Use the Following IP address”. Under “Ip Address”, put “10.0.0.1″. Press the “Tab” key on your keyboard.
6. Press Ok on both open windows.
7. Repeat steps 3-4. Under the “General” tab, press the radio button “Automatically Assign Me an Ip Address”. Press ok on both windows.
8. Go back to the command prompt and type in “Ipconfig/all”. You’ll now notice you have a new IP address.
So, this will be handy if you want to by-pass Rapidshare 1 hour download limit, provided that you have a static IP address.
Top 10 Password Crackers
After the tremendously successful 2000 and 2003 security tools surveys, Insecure.Org is delighted to release this 2006 survey. Fyodor asked users from the nmap-hackers mailing list to share their favorite tools, and 3,243 people responded. This allowed them to expand the list to 100 tools, and even subdivide them into categories. This is the category page for password crackers -- the full network security list is available here. Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with.
Here is the list, starting with the most popular:
#1 | Cain and Abel : The top password recovery tool for Windows UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented. Also categorized as: packet sniffers |
#2 | John the Ripper : A powerful, flexible, and fast multi-platform password hash cracker John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find here, here, or here. |
#3 | THC Hydra : A Fast network authentication cracker which support many different services When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC. |
#4 | Aircrack : The fastest available WEP/WPA cracking tool Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files). Also categorized as: wireless tools |
#5 | L0phtcrack : Windows password auditing and recovery application L0phtCrack, also known as LC5, attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows NT/2000 workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, but you can still find the LC5 installer floating around. The free trial only lasts 15 days, and Symantec won't sell you a key, so you'll either have to cease using it or find a key generator. Since it is no longer maintained, you are probably better off trying Cain and Abel, John the Ripper, or Ophcrack instead. |
#6 | Airsnort : 802.11 WEP Encryption Cracking Tool AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It was developed by the Shmoo Group and operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. You may also be interested in the similar Aircrack. Also categorized as: wireless tools |
#7 | SolarWinds : A plethora of network discovery/monitoring/attack tools SolarWinds has created and sells dozens of special-purpose tools targeted at systems administrators. Security-related tools include many network discovery scanners, an SNMP brute-force cracker, router password decryption, a TCP connection reset program, one of the fastest and easiest router config download/upload applications available and more. Also categorized as: traffic monitoring tools |
#8 | Pwdump : A window password recovery tool Pwdump is able to extract NTLM and LanMan hashes from a Windows target, regardless of whether Syskey is enabled. It is also capable of displaying password histories if they are available. It outputs the data in L0phtcrack-compatible form, and can write to an output file. |
#9 | RainbowCrack : An Innovative Password Hash Cracker The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished. |