Live Ddos View

Live DDoS Attack Map | Apakau

Live DDoS Attack Map

This map is the fruit of collaboration between Google Ideas and Arbor Networks in an effort to raise awareness about distributed denial of service attacks in the world everyday.

Exploring the Data

The Digital Attack Map displays global DDoS activity on any given day. Attacks are displayed as dotted lines, scaled to size, and placed according to the source and destination countries of the attack traffic when known. Some features include:

  • Use the histogram at the bottom of the map to explore historical data.
  • Select a country to view DDoS activity to or from that country.
  • Use the color option to view attacks by class, duration, or source/destination port.
  • Use the news section to find online reports of attack activity from a specified time.
  • View the gallery to explore some examples of days with notable DDoS attacks.

Sign Up

Friday, July 10, 2015

How To crack wireless passwords with net tools 5 [TUT]

Get Into any Wireless Network with, Net tools 5
Have Wireless signals in your area? but cant use them cuz they have security? This Tut will tell you how too use nettools 5 to get into them,

First you need too see what wireless networks are in your area,
this is pretty simply first,

Open Control Panel

[​IMG]

Then view network status and tasks,
[​IMG]

Then click on manage wireless networks,
[​IMG]

Once you find what kinda security it has, as high lighted below, open nettools
[​IMG]

NetTools Side of TuT,
[​IMG]

Once you have nettools open, then, Start> Network Tools> WEP/WPA Key Generator, it should look like it is below,
[​IMG]

Once Open, select the type of security that the Wireless network your trying to get into has, then select "Hex (0-9,A-F)",
[​IMG]

Now you Need too select a Key Length, the best one too use is, 64/40 bits, once you have done that,Be sure to click on the Calculate Key Space,
[​IMG]

Now simply hit Generate Code, and your code will appear,
[​IMG]

Now simply copy and paste that into the password bar, when prompt to, when your connecting too the Wireless signal,
[​IMG]

Then press ok and you're connected to the internet.

[​IMG]




Net Tools DownLoad Link #DarkSec

Tracking Hackers Down - Then Striking Back

Track the Bastards Down

SecurityTN-July-6-ART2.jpgWhen a computer is attacked, it's often possible to obtain an IP address that's close to the attacker's location. Intrusion alerts from programs like Norton, McAfee and Malwarebytes often provide the best address they can. And you can find similar information in the "full tracking headers" or "message sources" of email messages. These headers have different names in different email systems and are viewed in different ways. But once you determine how to open a full header in your email system, search it for a "from" or "source" IP and trace that address.

To do so, slip the address into a few of the many Web services that map IP locations. My current favorites (in this order) are:


They'll probably map the address to slightly different locations. That's because each service uses a different geolocation database and tries to find the Internet router that's closest to the target IP. The accuracy of the result depends on the database used and the number of known routers in the target IP area.

For example, I just traced my own PC's IP address, and these services mapped it to Medford, Mass.; downtown Boston, and, yes, just down the road in my own hometown. But all locations were within 6 miles of my PC, so the results were pretty darned accurate. Your traces may get equally close to the attackers' locations (and might also tell you the ISPs they are using).