Jump to content

L3arn3r

Active Members
  • Posts

    55
  • Joined

  • Last visited

Posts posted by L3arn3r

  1. No guys! it can be more huge stuff and my grandpa will never allow me to do this sort of stuff.

    As far as i already know the idea of "engadget.com" is good but the same issue is huge "DISH"

    What i am looking for is simple WIFI like "AWUS036N" because it is small and as from my room window the "whole view (more than 4+ miles)" is clear, no house or no tallest buildings.

    So if you are sure about any small wifi USB to get maximum range then kindly let me know.

  2. If it came with something like cPanel or other interface to control billing, etc, log in and check your monthly billing cycle/usage stats. Most every hosting company has some sort of admin panel that shows monthly bandwidth usage, but thats most. I can't think of one that doesn't have one, but then again, that depends on what kind of hosting you have and what the admin/control panel, or other such interface the host offers you. I've never hosted a site with anyone that didn't have some sort of login area that showed basic monthly bandwidth usage though and I've been running my own sites since around 2000 or so, and every host I've ever used had some place to check it when logged into your account.

    Yes, i have cPanel access as a ROOT now tell me steps?
  3. 4+ Miles shoot thats going to be hard without a strong antenna and a clear view over looking the 4+ miles. You'd be able to do that easy if The World Trade Center was still up in New York City but if you're signal has to go thru alot of stuff like houses and walls and trees its going to be tough.

    what would you suggest about strong antenna?

    Kindly try to post any strong antenna name if you know about it.

  4. Well, In simple words Want to get wifi from "4+" miles so is out there any sort of stuff to do this job?

    Of course should be in cheap price with good quality.

  5. I was just testing some wifi tricks and got some questions in my mind.

    1) Let's suppose i am in "NY" and just got a handshake WPA.cap but this time i didn't used any tool to crack it and moved to "LA" now i want to crack the passwd using that .cap file? (In simple words is it possible to find a passwd using RouterA.cap if RouterA is not available on that location where i want to crack the key but have captured file)?

    2) is it possible to crack multiple .cap files at the same time like RouterA.cap RouterB.cap Routerc.cap?

    Kindly explain in details.

  6. digip Thank you for your cooperation.

    I have sort it out finally that was on Exception list by my anti and accidently that was removed by me so this is why it was automatically removed.

    "digip" If i wasted your time then accept my apologies. it was not my fault but was crap psychology.

    Issue Solved

  7. I bought a CentOS 5 Dedicated Hosting and server administrator said 10 TB Bandwidth has been allocated to your server. Now the question is how can i verify that i have complete 10 TB Bandwidth on my server?

  8. Have you tried running in compatibility mode? Right click on the file and choose Troubleshoot Compatibility. Go through the wizard and see if it helps.

    Not Solved.

    Still looking for the solution?

  9. We have a program which is necessary to use and i am sure that program is not a infected or anything as the issue is we can use that program on Win xp or old version of windows but when it comes to Windows seven it runs a file called "Werfault.exe" and terminate that program so the question is how we can turn of this "Werfault.exe" debug scan process or how we can run that program?

  10. We have three connection of internet from different three internet companies but the issue is user need to go upto the floor to access different internet connection.

    Is there any way to use 2nd floor computer use as proxy no matter if i need to run any file or script on 2nd floor computer?

    No i cannot configure wi-fi or wired network to perform this task.

    I only have one option to use 2nd floor computer as proxy :S

  11. <p>

    It is pointless to do so in my opinion. Reasons below.

    • They will most likely conflict with each other
    • Active scanning will cause disk thrashing
    • Resource hogs
    • Antivirus is almost pointless

    If Antivirus are pointless then what would you suggest to use?

    Lots of ways to bypass AV these days, but if you need solutions I use these three when using questionable downloads, along with a sandbox, like Sandboxie or a virtual machine with no network card or internet access.

    http://anubis.iseclab.org/

    http://virusscan.jotti.org/en

    https://www.virustotal.com/en/

    If i will give you exe via PM then can you verify that attacker all information like IP, port?

  12. Hey,

    I want to install multiple antivirus in One PC as We already have an example like virustotal.com etc... they are running all anti's in one machine so Would like to know how it can be done?

    You may post links or any sort of information you have with your own knowledge!

  13. I was just playing with netcat on cmd. trying to backconnect something and it was successfully connected and then starting browsing then again i looked on cmd backconnect was disconnected so again i tried to connect but this time it say's "nc.exe not found" then i check my floder nc.exe was not there :S sounds like someone deleted.

    I have checked all Established port but there were no extra port.

    is it possible to do this sort of task without port? (I mean rat meta both use port)

    is there anyway to find logs on win that which user deleted my file?

    How would you find rat keylogger etc... in your PC without format the whole disk?

  14. How many bots we need to take down any sort of website?

    How we can verify any site that blahblah.com can be take down with 1k bots?

  15. If My question sounds like stupidly then want to know same question but in another way how i can scan my victim's network through victim PC.

    If i will use his desktop to do metasploit things then he can see that what i am doing. would like to do silently.

    Just Share idea's how would you do?

  16. Hey,

    Let's suppose I have a victim and i can run anything on victim machine but victim is connected on LAN with 2k or 3k another users so is it possible to exploit all machines through one victim?

    Any Idea?

    Any Suggestion?

    Any link?

    Any Google Keyword?

  17. Would you please give me a explanation rather than a posting public link.

    See If you remember when we use SET then SET itself store those all exploit temporary files in (set/src/program_junk/ here are all Files)

    Same thing i am asking for metsploit that when we exploiting on that time where metasploit store exploit temporary files?

    If my question is incorrect or you think it's just a crap question then please i would like to grow up my knowledge so kindly explain me how it works?

×
×
  • Create New...