All Type of Breaking news

This site is created for latest breaking news.

All Type of Breaking news

This site is created for latest breaking news. .

All Type of Breaking news

This site is created for latest breaking news.

All Type of Breaking news

This site is created for latest breaking news.

All Type of Breaking news

This site is created for latest breaking news.

Tuesday, May 24, 2011

how to easily remove exif information?


the more uncomfort way for me to do it till now was to convert it to bmp and then back to jpeg. that removes all of the exif data.

Useful Photography Links

Learning About & Choosing a Camera
Film Vs. Digital

Digital Camera Information
Digital Photography Review (dpreview)
Steve's Digicams (Great reviews site)

Digital Storage Media
Flash Memory Cards

Lightning Photography
Lightning Photography & Storm Chasing Tutorial

Lunar Photography (The Moon)
Keith's Moon Photography

Macro Photography
Nikon SLR Macrophotography

Nature & Wildlife Photography
Nature Photographers Online Magazine
North American Nature Photography Association

Cyberforensics

Current and proposed courses

  • CNIT 499x/581x Basic Computer Forensics
  • CNIT 581x Advanced Research Topics in Cyber Forensics
  • CNIT 499x/581xCyber Forensics: Advanced Technologies ('06)
  • CNIT 499x/581x Cyber Forensics: Small Scale Digital Devices ('06)
  • CNIT 499x/581x Cyber Forensics: Hardware Essentials ('06)
  • CNIT 499x/581x Applied Digital Crime Scene Analysis ('07)
  • CNIT 499x/581x Expert Witness Testimony ('07)
Contact: Dr. Hackingraz 
Mobile no:9808442890
Description
The objective of the cyberforensics signature area is to become the primary national and international resource for the developing scientific discipline of digital forensic science. The cyberforensics team is following a 3-phased approach based on the development of the Purdue Cyberforensics Lab that was officially opened Summer '04. The approach focuses on (1) education and training for students, faculty, and law enforcement, (2) leading edge research in cyberforensics, and (3) operational support for federal, state, and local law enforcement. The SIG has a memorandum of understanding in place with the National White Collar Crime Center (NW3C), the Indiana State Police, the Center for Education and Research in Information Assurance and Security (CERIAS/CS Department) and ITaP. An additional and equally important objective is to develop an area of specialization in cyberforensics at both the undergraduate and graduate levels. Currently, there are 9 masters students and 2 doctoral students focusing their studies in the area of cyberforensics.

Sunday, May 22, 2011

anti leech hacking tutorial

I was just asking to know if there is some audiance before
here is my methode
for hacking anti leech
we gona use a soft calde proxo mitron
proxomitron is an anti bull script web proxy it' works buy applying some rules to elliuminte pop up and many other thing but for our cas we need to desactive all this filtring first goto
w-w.proxomitron.info
download a copy of the soft
then you need to unselect all the option of the soft
and clik on log window
no go to a anti leech web site









use the plug in and not netpumper
in the plugin
add a proxy
you must put this proxy adress
127.0.0.1 8080 for http
the same for ftp
now select the file to download a click download
watch in proximitron log winodws you will see many internal forwarding
if the file are located in a ftp server
proximitron dont handel them
and you will find an error
in a ftp adress
if it's a http adress
you will find some thing like
get /blablalma/bla/file
site tr.com
and you have foudn the adress
it' tr.com/blabla/file