Don’t forget that your special even if you are colored.


I am like a cheeta.

Even if your of a certain foreign race; you are special ,and just because you are not true supreme American like me  you still are special and don’t be afraid to tell people or else my people will still label you too quiet too make any change in the way your affirmative action is handled this goes for foreign races and minors………

This is the big article you need to live by.

cad1(a contempt™)

Here is the official number count give or take a few compact discs of my very own mixed album RENO© and blast off_

The listening award goes to the skateboard crews ……

530 sold so far…….

thanks , GEZE

The Thursday for a get together

First the wood says is that you on that song? He didnt know he thought my music playing in the mega mall on the southside of reno was somebody else. He was selling a pair of nikes good luck 😦 I plan to sell some music later and it’s 12;30 🙂 I HAVE BEEN BORED AND THESE PEOPLE ARE TRYING TO HELP!!! I will endorse a show in Reno for Kutt Kalhoun a stranger.(pen test).?wtf Geze blows pink salmon vagina and sucks water out a white bitch tonight hopefully and says THANK THE LORD1

What do you think about Los Angeles?

United we stand and beat we lose so LA is the matrix to all my friends look at the staples center would you believe that we are outnumbered by haters gangbangers and drug dealers in this world we are forced to take advantage of. Our goal is to be the best of all the other side of the World.  I am personally going to entrust anon. But the unknown is a good friend of the World. Tell me what you think of Los Angeles. ?Thanks rdarw

Hack or die


I am like a cheeta.

Could we say wordpress is better?

LinkedIn To Pay Users Up To $1,500 In Spam Settlement

According to the suit, the company repeatedly sent out unwanted emails as part of its “Add Connections” service.

LinkedIn CEO Jeff Weiner pictured on Nov. 6, 2014. The social media site has settled a $13 million settlement regarding its “Added Connections” feature. 

LinkedIn CEO Jeff Weiner admitted in May that the social networking site was guilty of “sending too much email” to some users. “That needs to be corrected and improved, and it will be,” he told Buzzfeed.

But it seems those improvements may have come a little too late for the company.

On Friday, LinkedIn announced that it will be paying some of its members up to $1,500 each after settling a $13 million class-action lawsuit for sending out too many emails related to one of the website’s services.

The company made the announcement in an email.

As NBC Chicago reports, the lawsuit was aimed at LinkedIn’s “Add Connections” service that lets users import contacts from their email accounts and send invitations to connect on the site.

The suit claims, however, that LinkedIn repeatedly “spammed” those contacts with unwanted emails .

The way the “Add Connections” service works is that an email invitation is sent out by LinkedIn to the contact. But if the person does not respond to the invitation within a certain amount of time, LinkedIn follows up by sending them two more reminder emails.

According to the lawsuit, LinkedIn members did not consent to the additional emails when they chose to use the feature.

LinkedIn said in an email to users Friday that anyone who used the service between Sept. 17, 2011, and Oct. 31, 2014, is eligible to file a claim. The filing deadline is Dec. 14.

The amount that each user will receive will depend on how many people come forward, but LinkedIn said each person could earn up to $1,500. (This amount will likely be much less, however.)

(Click here to file a claim. A Claim ID was sent by LinkedIn to users in the email.)

According to KTLA-TV, the suit was filed against LinkedIn in 2013.

The company did not admit any wrongdoing in the settlement, but said in a statement that it “decided to resolve this case so that we can put our focus where it matters most: finding additional ways to improve our members’ experiences.”

LinkedIn says it has revised its disclosures to clarify that two reminder emails will be sent as part of its “Add Connections” feature. The company says it will, by year’s end, also offer an option to users to cancel a connection invitation, thereby halting any additional reminder emails from being sent out.

Fuck slonee contempt yu


I am like a cheeta.

Tools I’ve found that are great to Learn If you like to try computer TRICKS this i express.

found by ʂ₥ǻṜť crÊщ™ ĤāСҞҼr5
My Experiments with Hacking
A blog on hacking and cyber security.
Top 10 Best Hacking Tools
Posted on 12:25 PM by Thanglalson Gangte
Hacking always involves tools. A good hacker knows how to use tools to his best advantage. An even better hacker writes his own tools. Here I have listed the top 10 most popular tools used in hacking. It is advisable to master these tools to become a good hacker. Note that all the tools listed here are completely free.
1. Nmap

Nmap is also known as the swiss army knife of hacking. It is the best port scanner with a lot of functions
In hacking, Nmap is usually used in the footprinting phase to scan the ports of the remote computer to find out wich ports are open.
2. Wireshark

Wireshark is a packet sniffer. It captures all network traffic going through a network adapter. When performing man in the middle attacks using tools like Cain, we can use Wireshark to capture the traffic and analyze it for juicy info like usernames and passwords. It is used by network administrators to perform network troubleshooting.

3. Cain and Abel

Cain and Abel is a multipurpose windows only hacking tool. It is a bit old now, but it still does the job well. Cain can be used to crack windows password, perform man in the middle attacks, capture network passwords etc.

4. Metasploit

Metasploit is a huge database of exploits. There are thousands of exploit codes, payloads that can be used to attack web servers or any computer for that matter. This is the ultimate hacking tool that will allow you to actually “hack” a computer. You will be able to get root access to the remote computer and plant backdoors or do any other stuff. It is best to use metasploit under linux.

5. Burp Suite

Burpsuite is a web proxy tool that can be used to test web application security. It can brute force any login form in a browser. You can edit or modify GET and POST data before sending it to the server. It can also be used to automatically detect SQL injection vulnerabilities. It is a good tool to use both under Windows and Linux environments.

6. Aircrack-ng

Aircrack-ng is a set of tools that are used to crack wifi passwords. Using a combination of the tools in aircrack, you can easily crack WEP passwords. WPA passwords can be cracked using dictionary or brute force. Although aircrack-ng is available for Windows, it is best to use it under Linux environment. There are many issues if you use it under Windows environment.
8. Nessus

Nessus is a comprehensive automatic vulnerability scanner. You have to give it an IP address as input and it will scan that IP address to find out the vulnerabilities in that system. Once you know the vulnerabllities, you can use metasploit to exploit the vulnerablity. Nessus works both in Windows and Linux.

10. THC Hydra

Hydra is a fast password cracker tool. It cracks passwords of remote systems through the network. It can crack passwords of many protocols including ftp,http, smtp etc. You have the option to supply a dictionary file which contains possible passwords. It is best to use hydra under linux environment.

9. Netcat

Netcat is a great networking utility which reads and writes data across network connections, using the TCP/IP protocol. It is also known as the swiss army knife for TCP/IP. This is because netcat is extremely versatile and can perform almost anything related to TCP/IP. In a hacking scenario, it can be used as a backdoor to access hacked computers remotely. The use of netcat is limited only by the user’s imagination. Find out more about netcat at the official website.

10. Putty

Although putty is not a hacking software by itself, it is a very useful tool for a hacker. It is a client for SSH and telnet, which can be used to connect to remote computers. You may use putty when you want to connect to your Backtrack machine from your Windows PC. It can also be used to perform SSH tunneling to bypass firewalls.
Note: This list is not comprehensive. There are many tools that I have left out. Those tools that did not make the list are; Sqlmap, Havij, Acunetix Web Scanner, SuperScan, John the Ripper, Kismet, Hping3.
I have written another article about the top 5 website hacking tools.

Have you always wanted to know how to become a hacker? Great! Read this article and learn how to become a hacker.

This entry was posted in hacking, metasploit, security
Newer Post Older Post Home
Subscribe to: Post Comments (Atom)
You might also like
How To Become A Hacker
How To Become A Hacker
How to perform a Denial of Service attack to crash a website?
How to perform a Denial of Service attack to crash a website?
How To Practice Hacking Without Getting Into Trouble – Part 2 (Hacking With Metasploit)
How To Practice Hacking Without Getting Into Trouble – Part 2 (Hacking With Metasploit)
10 ways you can earn money as a computer science student
10 ways you can earn money as a computer science student
How To Become A Hacker
How to perform a Denial of Service attack to crash a website?
How To Practice Hacking Without Getting Into Trouble – Part 2 (Hacking With Metasploit)
10 ways you can earn money as a computer science student
Recommended by
Search for:

Articles and Tutorials
My PGP key
About Me
Contact Me

Popular Posts

Top 10 Best Hacking Tools
5 Best Tools For Hacking Web Applications
How To Practice Hacking Without Getting Into Trouble – Part 1 (Hacking Lab)
How To Become A Hacker
10 ways you can earn money as a computer science student
How to perform a Denial of Service attack to crash a website?

anonymous antivirus bypass firewall ceh ctf DOS earn money encryption freelance hacking java lab metasploit netbeans privacy programming review security sniffing technology tutorial vpn web application
About Me
My Photo

Thanglalson Gangte

View my complete profile
View Thanglalson Gangte’s profile on LinkedIn

► 2014 (4)

▼ 2013 (21)
► November (1)
► October (4)
▼ September (2)
Top 10 Best Hacking Tools
10 Technologies You Can Use To Make Your Life Easi…
► August (2)
► May (4)
► April (2)
► March (6)

► 2012 (2)

Powered by Blogger.
Copyright © 2013 My Experiments with Hacking
Design by WordPress Team | Blogger Template by cite