Calculate RAID Array Capacity, Speed and Tolerance Online

Let’s start it off with RAID. I have never written about RAID before on Hacker’s Lane. So in this post, I will be explaining about RAID, and it’s types. Plus, I will be pointing you to a site where you can calculate various aspects of a RAID. :)

What is RAID?

RAID stands for Redundant Array of Independent Disks. Put in simple words, it is “A bunch of harddisks connected together“. The drives present in the RAID array are called “RAID Members“.

(more…)

Get Advanced System Info with CPU-Z

There are many softwares out there that claim to gather info about your system. CPU-Z is one of these, and is so far the best of all that I have used. The thing I like about it is that it isn’t motherboard board specific unlike others. You can install it on any Windows-based PC and get a deep insight of your system within moments! (more…)

Delete undeletable files in Windows

Delete undeletable files
Delete undeletable files with Unlocker

In Windows, some files, mostly system files and viruses have a bad habit of not getting deleted easily. You have to close “explorer.exe” and then delete them through “cmd.exe”, and sometimes even that doesn’t helps!

These files mostly give out these errors when you attempt to delete them:

  • Cannot delete folder: It is being used by another person or program
  • Cannot delete file: Access is denied
  • Make sure the disk is not full or write-protected and that the file is not currently in use.
  • The source or destination file may be in use.
  • There has been a sharing violation.
  • The file is in use by another program or user. (more…)

BackTrack Linux – The Penetration Tool

According to Remote-Exploit.org:

“BackTrack is the most top rated linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes.”

BackTrack Logo
BackTrack Logo

The BackTrack Project was created by Mati Aharoni & Max Moser. The first n0n-beta version of BackTrack was released on May 26, 2006. The latest version of BackTrack is 4 Beta, the major change in this version is that, BackTrack is now Debian-based.

BackTrack is bundled with 300+ Security Tools, it has what all a security expert needs. BackTrack is also the favorite tool of security testers worldwide.

BackTrack has many added apps. to its default suite. The notable additions are:

  • Metasploit integration
  • RFMON Injection capable wireless drivers
  • Kismet
  • Autoscan-Network (AutoScan-Network is a network discovering and managing application)
  • NMap
  • Ettercap
  • Wireshark (formerly known as Ethereal)

Get BackTrack to get these features +a lot more :)

Download:

Password Viewers

Saving Passwords on IE, Firefox, Yahoo Messenger, etc helps you to easily access your account next time, without inserting your password, but this idea is no-good. Why? Read further to know the reason.

If someone has physical access to your computer, he can easily see your passwords using the softwares mentioned below, and there are other ways of password-theft online.

What these softwares basically does is it finds the file in which the passwords are saved, decrypts them and makes them visible to the user. You can carry these softwares in your Flash Drive and use them on your victims.

Some good password viewers:

  1. MSPass: Displays saved passwords of Messengers. Works for Yahoo Messenger, Google Talk, Windows Live/MSN, Skype and many others.
    Download:http://www.easy-share.com/1904610098/mspass.zip
  2. IE PassViewer: Displays saved passwords of Internet Explorer.
    Download:http://www.easy-share.com/1904610097/iepv.zip
  3. Password Fox: Displays saved passwords of Mozilla Firefox.
    Download:http://www.easy-share.com/1904610099/passwordfox.zip

TrueCrypt- For All Your Encryption Needs

TrueCrypt is a free, open-source, disk encryption software which protects your disks/files from unauthorized access. It is a software with bundles of features, simple and advanced. Its main features are:

  • Creation of virtual encrypted disks (&) mounting them as real disks.
  • Encrypting the entire HDD or a partition of HDD.
  • Encrypting a whole removable drive, such as USB Flash Disk.
  • Encrypted Disks can contain Hidden OS.
  • Encrypted disks can be made hidden, so that you’re not forced by anyone to reveal the password and view your files.
  • TrueCrypt Volumes cannot be identified, it will appear as an unknown file. (Unless you have the TrueCrypt Software directly installed on your PC, and the format of your volumes is shifted to .tc instead of anyfiles( .*).
  • TrueCrypt supports the following algorithms:
  1. AES-256
  2. Serpent
  3. Twofish

I myself have tried TrueCrypt on my USB and found it super!
You can get more information of TrueCrypt from its official site: http://www.truecrypt.org

Download TrueCrypt:

  1. From Easy Share: Click Here!
  2. From Easy Share: Portable Version– Click here!

ProRat

ProRat is a RAT (Remote Administration Tool), made by the PRO Group. It is just an awesome program for remotely administering another PC.
SNAP of ProRat:

Its features are:

  • Remote Control
  • System Info, App. Status, Task Manager
  • Add Processes, Files, Download Files
  • Some Funny Stiff for Fun
  • Admin FTP
  • Give Damage: Format Drives
  • Remote Downloader
  • Run MS-DOS Command, Batch Script, VBScript
  • Add a Registry Entry
  • Keylogger: Password Recording
  • Screnshots, Direct Windows Viewing
  • Send Message, Chat
  • Shutdown, Restart, Control Panel, IExplorer, Registry, Printer and Online Controls
  • Much More…Get ProRat to check it out…!

Download it from the Official Site…

Official Site: http://www.prorat.net