This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Hiding Files Using Alternative Data Streams

-Taken from my post at http://forums.educationd.info (I am the original author, go check)...

Okay, so why would we want to hide files using alternative data streams? Well, for example, you could hide a .exe file in a text file and send it through gmail or whatever.

So, first things first, we create a new text file. Inside the text file we type "blah blah blah", type whatever you want, it really doesn't matter. Save the text file as "test.txt" (or whatever you want).

Next, copy the .exe (or whatever file you wish to hide) to the same directory in which you saved "text.txt". In this case, my file will be "server.exe".

Now open up you command prompt, and navigate to the directory in which you saved the "test.txt" and enter the following command...

Code:
type server.exe > test.txt:server.exe
"server.exe" should have been successfully hidden in an alternative data stream within "test.txt". (if you open up "test.txt", you'll see that it looks exactly the same, even the file size )

You can now delete the original "server.exe".

To run the hidden "server.exe", open up the command prompt and enter the following...

Code:
start ./test.txt:server.exe
Aaand, thats it!

-Phate

Stenography Method For Hide Your(*.txt) Data..Without Loosing Quality

Firslty Thanks to invite me!And i want to say i dont know english very well.oopss:
In This My Post i write about Stenography Method For Hide Your Data..
For example if you want to hide your data(*.txt data) in *.scr file without lossing quality of *.scr or in another type of file(it`s analogic):
I write this batch script:
@REM CODED BY aka.step
cls
echo off
chdir %homedrive%\stenografik
cd %homedrive%\stenografik\image\
type %homedrive%\stenografik\image\1.scr>>10.txt
cd %homedrive%\stenografik\image
copy /B %homedrive%\stenografik\image\10.txt + %homedrive%\stenografik\src\1.scr %homedrive%\stenografik\src\2.txt
cd ../
copy /B %homedrive%\stenografik\src\2.txt + %homedrive%\stenografik\image\1.scr %homedrive%\stenografik\lib\step_by.scr
del /Q %homedrive%\stenografik\src\2.txt
del /Q %homedrive%\stenografik\image\10.txt
cls
start %homedrive%\stenografik\lib
exit
============Thats All.. Your *.Txt Hided In you Screensaver or in another file type:))
If you want to open stenography file and to see your confidenciale data, open your file with notepad which placed in
%homedrive%\stenografik\lib\step_by.scr <<==In This File You Have confidenciale data..(step_by.scr)
It`s very simple method but it`s very powerfull too..
With This method you can hide *.txt in(*.mp3,*.avi,*.jpg,*.gif and etc....)
Aka.Step

Hunting Of Keylogger

In This Video I illustrate how to hunt keylogger wich configured delivery logs with ftp..
For download video=>http://ifolder.ru/5540890
pass for download hexed

Bruteforce of rambler.ru e-mail accaunt

In this video i illustrate how to remotely bruteforce e-mail accaunt on rambler.ru
http://rapidshare.com/files/98326940/bruteforce.rar.html

Manual_Unpacking_of _MEW 11 1.2 -> NorthFox/HCC

Manual_Unpacking_of _MEW 11 1.2 -> NorthFox/HCC packer
http://rapidshare.com/files/100845900/handle_mew.rar.html

Manual Unpacking of aspack 2.12 packer

Manual Unpacking of aspack 2.12 packer
http://rapidshare.com/files/102329720/Aspack_2.12_Al.y.rar.html

MD5-hash cracking with Md5crack-sse.exe

How to crack MD5 algorithmic hash?It`s simple.In this video i illustrate this with
MDcrack-sse.exe(it`s command line tool)
Video and program included in archive..
http://rapidshare.com/files/108863477/hash_cracking_md5Collision.rar.html
[img]http://i024.radikal.ru/0804/4c/06ff5c1abe5c.jpg[/img]
[img]http://i006.radikal.ru/0804/3a/cde54205b563.jpg[/img]