Friday, November 29, 2013

How to Create a VPN Server on Your Windows Computer Without Installing Any Software

How to Create a VPN Server on Your Windows Computer Without Installing Any Software

create-vpn-server-in-windows
Windows has the built-in ability to function as VPN server, although this option is hidden. This trick works on both Windows 7 and Windows 8. The server uses
the point-to-point tunneling protocol (PPTP.)
This could be useful for connecting to your home network on the road, playing LAN games with someone, or securing your web browsing on a public Wi-Fi connection – a few of the many reasons you might want to use a VPN.

Limitations

While this is a pretty interesting feature, it may not be the ideal way to allow VPN connections to your local network. It has some limitations:
  • You will need the ability to forward ports from your router.
  • You have to expose Windows and a port for the PPTP VPN server directly to the Internet, which is not ideal from a security standpoint. You should use a strong password and consider using a port that isn’t the default port.
  • This isn’t as easy to set up and use as software like LogMeIn Hamachi and TeamViewer. Most people will probably be better off with a more complete software package like those two.

Creating a VPN Server

First, you’ll need to open the Network Connections window. The quickest way to open it is to press the Windows key, type ncpa.cpl, and press Enter.
open-ncpa.cpl-on-windows-8
Press the Alt key, click the File menu that appears, and select New Incoming Connection.
windows-new-incoming-connection
You can now select the user accounts that can connect remotely. To increase security, you may want to create a new, limited user account rather than allow VPN logins from your primary user account. (Click Add someone to create a new user account.) Ensure the user you allow has a very strong password, as a weak password could be cracked by a dictionary attack.
windows-select-vpn-user-accounts
Select the Through the Internet option to allow VPN connections over the Internet. You can also allow incoming connections over a dial-up modem, if you have the dial-up hardware.
allow-vpn-connections-through-the-internet
You can then select the networking protocols that should be enabled for incoming connections. For example, if you don’t want people connected to the VPN to have access to shared files and printers on your local network, you can uncheck the File and Printer Sharing option.
select-vpn-networking-protocols
Click the Allow access button and Windows will set up a VPN server.
allow-vpn-access-in-windows
If you want to disable the VPN server in the future, you can delete the Incoming Connectionsitem from your Network Connections window.
delete-incoming-connections-vpn-server

Router Setup

You will now need to log into your router’s setup page and forward port 1723 to the IP address of the computer where you set up the VPN server. For more instructions, read How to Forward Ports on Your Router.
For maximum security, you may want to create a port forwarding rule that forwards a random “external port” – such as 23243 – to “internal port” 1723 on your computer. This will allow you to connect to the VPN server using port 23243, and will protect you from malicious programs that scan and attempt to automatically connect to VPN servers running on the default port.
You can also consider using a router or firewall to only allow incoming connections from specific IP addresses.
To ensure you can always connect to the VPN server, you may want to set up a dynamic DNS service like DynDNS on your router.

Connecting to Your VPN Server

To connect to the VPN server, you will need your computer’s public IP address (its IP address on the Internet) or its dynamic DNS address, if you set up a dynamic DNS service above.
Use the Connect to a network option in Windows and enter your computer’s public IP address. Provide the username and password you created to log in.
For more instructions on connecting, read How to Connect to a VPN on Windows.

Thursday, November 28, 2013

Friday, November 22, 2013

Acunetix Web Vulnerability Scanner 9.0 Build 20130904 Full Keygen Free Download


Acunetix Web Vulnerability Scanner 9.0 Build 20130904 Full Keygen Free Download




Your Website Security Audit with Acunetix Web Vulnerability Scanner

as many as 70% of websites That Could have vulnerabilities lead to the theft of sensitive corporate data Such . as credit card information and customer lists
Hackers are concentrating Their efforts on web -based applications - shopping carts , forms, login pages , dynamic happy, etc. . . Accessible 24/7 from anywhere in the

world , insecure web applications Provide easy access to backend corporate databases

Firewalls , SSL and Locked -Down Against Web Servers are Futile ! Application Hacking

Web attacks application Launched on port 80/443 , go straight through the firewall , past operating system and network level security , and right in to the heart of your corporate data and implementation . Tailor -made web applications are insufficiently tested Often , Have undiscovered vulnerabilities and are therefore easy prey for hackers

. Acunetix - A Worldwide Leader in Web Application Security
Acunetix hAS pioneered the web application security scanning technology: . Its engineers have Focused on web security as early as 1997 and Developed an engineering lead in web site analysis and vulnerability detection

Acunetix Web Vulnerability Scanner Includes Many Innovative < / strong> Features:
  • AcuSensor Technology
  • Industry 's most advanced and in-depth SQL injection and Cross site scripting testing
  • advanced penetration testing tools , : such as the HTTP Editor and the HTTP Fuzzer
  • Visual macro recorder makes testing web forms and password protected areas easy
  • Support for pages with CAPTCHA , single sign-on and Two Factor authentication Mechanisms
  • Extensive reporting facilities Including PCI compliance reports
  • Multi -threaded and lightning fast scanner crawls Hundreds of thousands In of pages with ease
  • Intelligent crawler Detects web server type and implementation language
  • Acunetix crawls websites and Analyzes Including flash content , SOAP and AJAX
  • Port scans a web server and runs security checks against network services running on the server
    NEW Features Available in Acunetix Web Vulnerability Scanner V9 :
    • Full HTML5 Support with Acunetix DeepScan Technology
    • Comprehensive scanning of Single Page Applications and JavaScript -based websites
    • Mobile Website Support
    • Blind Detection of XSS vulnerabilities with AcuMonitor
    • Automated detection of DOM -based XSS vulnerabilities
    • New Vulnerabilities Detected Server Side Request Forgery ( SSRF )
    • XML External Entity ( XXE )
    • Mail Header Injection
    • Host Header based Attacks 

    Download  the executable : http://adf.ly/atwDq  +  crack1   or crack2
  • password is: pikizone.com    (if needed)

       
      This my cracked version scanning  (22/11/2013) 





    Sunday, November 10, 2013

    .Net compressor free download

    Download free .Net compressor , .net compressor is a tool that ecrypt and compress .net applications like servers ..You can download it from mediafire

    Tuesday, September 24, 2013

    Havij 1.7 final release !! clean version , on mediafire links

    Havij Pro v1.17 CRACKED - in fact, the new version over the old favorites with Havij Crack

    What\'s New?
    • Dump all
    • New bypass technique for MySQL exploitation parenthesis
    • Write file feature additional for MSSQL and MySQL.
    • Loading HTML type inputs
    • Random signature generator
    • Saving information in CSV format
    • Advanced evasion tab within the settings
    • Injection tab in settings
    • \'Non-existent injection worth\' will currently be modified by
    user (the default value is 999999.9)
    • \'Comment mark\' is modified by user (the default worth is --)
    • Disabling/enabling of work
    • Bugfix: adding manual information in tables tree read
    • Bugfix: finding string columns in PostgreSQL
    • Bugfix: MS Access blind string kind information extraction
    • Bugfix: MSSQL blind motorcar detection once error-based technique fails
    • Bugfix: all information blind strategies fail on rehear
    • Bugfix: idea columns/tables in MySQL time-based injection
    • Bugfix: blinking once merchandising into file
    • Bugfix: loading project injection kind (Integer or String)
    • Bugfix: HTTPS multi-threading bug
    • Bugfix: command execution in MSSQL 2005



    Features
    1. Supported Databases with injection methods:
    MSSQL 2000/2005 with error
    MSSQL 2000/2005 no-error union-based
    MSSQL blind
    MSSQL time-based
    MySQL union-based
    MySQL blind
    MySQL error-based
    MySQL time-based
    Oracle union-based
    Oracle error-based
    Oracle blind
    PostgreSQL union-based
    MS Access union-based
    MS Access blind
    Sybase (ASE)
    Sybase (ASE) Blind
    2. HTTPS support
    3. Multi-threading
    4. Proxy support
    5. Automatic information server detection
    6. Automatic parameter kind detection (string or integer)
    7. Automatic keyword detection (finding the distinction between positive and negative responses)
    8. Automatic scan of all parameters.
    9. attempting completely different injection syntaxes
    10. choices for substitution house by /**/,+,... against IDS or filters
    11. Avoids exploitation strings (bypassing magic_quotes and similar filters)
    12. Manual injection syntax support
    13. Manual queries with result
    14. Forcing extrajudicial union
    15. Random signature generator
    16. totally customizable protocol headers (like referer, user agent...)
    17. Loading cookie(s) from web site for authentication
    18. Load HTML type inputs
    19. protocol Basic and Digest authentication
    20. Injecting uniform resource locator rewrite pages
    21. Bypassing ModSecurity internet application firewall and similar firewalls
    22. Bypassing WebKnight internet application firewall and similar firewalls
    23. Instant result
    24. idea tables and columns in MySQL<5 access="" also="" and="" blind="" br="" in="" ms="" nbsp="">25. fast retrieval of tables and columns for MySQL
    26. Resuming a antecedently saved table/column extraction session
    27. death penalty SQL question against associate Oracle information
    28. Custom keyword replacement in injections
    29. obtaining one complete row through one request (all in one request)
    30. merchandising information into file
    31. Saving information as XML
    32. Saving information as CSV format
    33. facultative xp_cmdshell and remote desktop
    34. Multiple table/column extraction strategies
    35. Multi-threaded Admin page finder
    36. Multi-threaded on-line MD5 cracker
    37. obtaining software package data
    38. obtaining tables, columns and information
    39. Command execution (MSSQL only)
    40. Reading remote system files (MySQL only)
    41. Creating/writing to a foreign file (MySQL and MsSQL)
    42. Insert/update/delete information
    43. Unicode support


    Saturday, July 27, 2013

    CEH v8 Certified Ethical Hacker Tools v8, 6 DVD on MEDIAFIRE LINKS




    EXCLUSIVE !!  FREE CEH ( certified ethical hacker ) V8 TOOLS TO DOWNLOAD
    FROM MEDIAFIRE LINKS, it's 23 GB of hacking and security tools !!

    PASSWORD  if required(for mediafire) :  free-4-free.blogspot.com



    http://adf.ly/UPBsh
    http://adf.ly/UPBzs
    http://adf.ly/UPC1P
    http://adf.ly/UPC34
    http://adf.ly/UQcw5
    http://adf.ly/UQdCR
    http://adf.ly/UQdEh
    http://adf.ly/UQdIU
    http://adf.ly/UqAV9  
    http://adf.ly/Ur1YS  
    http://adf.ly/UhJgK 
    http://adf.ly/UhJoR  
    http://adf.ly/UhJqQ   
    http://adf.ly/UwkKI

    ############################DVD1 END######################################


    DVD2

    http://adf.ly/V7L83
    http://adf.ly/V7L9y
    http://adf.ly/V7LBk
    http://adf.ly/V7LD9
    http://adf.ly/XeGT9
    http://adf.ly/XeGV8
    http://adf.ly/XeGXL
    http://adf.ly/Xga1A
    http://adf.ly/Xga3f
    http://adf.ly/Xga5t
    http://adf.ly/Xga82


    ############################DVD2 END######################################

    DVD3

    http://adf.ly/Z6fMG
    http://adf.ly/Z5ZhA
    http://adf.ly/b8WnW
    http://adf.ly/b8WrK
    http://adf.ly/b8WtF
    http://adf.ly/b8WwQ
    http://adf.ly/b8WzT
    http://adf.ly/b8X2F
    http://adf.ly/b8X5c
    http://adf.ly/b8X6w
    http://adf.ly/b8X95
    http://adf.ly/b8XBS
    http://adf.ly/b8XFL
    http://adf.ly/b8XHm
    http://adf.ly/b8XKI
    http://adf.ly/b8XM2
    http://adf.ly/b8XPh

    --------- OR ----------

    http://adf.ly/Z6fMG
    http://adf.ly/Z5ZhO
    http://adf.ly/Z5ZhQ

    ############################DVD3 END######################################



    ############################DVD4 END######################################
     DVD5

    http://adf.ly/bHlA9
    http://adf.ly/buwSl
    http://adf.ly/bHlDb
    http://adf.ly/bHlGV
    http://adf.ly/bHlIH
    http://adf.ly/bHlJp
    http://adf.ly/bHlLC
    http://adf.ly/bHlNT
    http://adf.ly/bHlPz
    http://adf.ly/bHlUA
    http://adf.ly/bHlX2
    http://adf.ly/bHlYI


    http://adf.ly/cBf7Yhttp://adf.ly/cBfKs############################DVD5 END######################################

    DVD6