Introduction-Parallel computing

Parallel computing is a form of computation in which many calculations are carried out simultaneously,[1] operating on the principle that large problems can often be divided into smaller ones, which are then solved concurrently ("in parallel"). There are several different forms of parallel computing: bit-level, instruction level, data, and task parallelism. Parallelism has been employed for many years, mainly in high-performance computing, but interest in it has grown lately due to the physical constraints preventing frequency scaling.[2] As power consumption (and consequently heat generation) by computers has become a concern in recent years,[3] parallel computing has become the dominant paradigm in computer architecture, mainly in the form of multicore processors.[4]


Parallel computers can be roughly classified according to the level at which the hardware supports

IP address spoofing

Background

The basic protocol for sending data over the Internet network and many other computer networks is the Internet Protocol ("IP"). The header of each IP packet contains, among other things, the numerical source and destination address of the packet. The source address is normally the address that the packet was sent from. By forging the header so it contains a different address, an attacker can make it appear that the packet was sent by a different machine. The machine that receives spoofed packets will send a response back to the forged source address, which means that this technique is mainly used when the attacker does not care about the response or the attacker has some way of guessing the response.
In certain cases, it might be possible for the attacker to see or redirect the response to his own machine. The most usual case is when the attacker is spoofing an address on the same LAN or WAN.

Send Mails anonmously

Well sometimes when you want to send someone a mail and do not want to disclose your identity , you use a tool called GOOGLE and search for the following terms-~~ “How to send anonymous mails to someone” “how to spoof emails” and “how to send mails with some other sender address”.
There are a few ANON mailer sites and other softwares. i have tested them all and these are the results
1.Anonmail2emkei.cz/ On number one position was the emkei.cz. It provides many options including the attachment,X-Mailer, Header,
SMTP Server selection,Date and time selection ETC. they do not record the mails or log them which ensures our privacy. this is the best fake mailing service out there. The message is delievered within a minute or 30 secs and will look like this ~~

2. On the second position hails the http://send-email.org/. This service is free and delievered the messages in seconds. but this has one weak point!! It dosent allow you to enter your own fake email address which is bad for fake emailing.
Anonmail3
3.Anonmail4next comes https://www.silentsender.com/. Silent sender is a secure site ie: HTTPS. silent sender is a service that works in a different way. You type in the message and send the mail to the respected person anonymously. Teh person gets a code and then he/she has to go to there site and enter the code to see the message. In this process the identity of the sender is secured and there is no way in which people can tell that you have send the message untill and unless you have written your name in it.
Anonmail5
The code in the pic has to be entered here for the person to see the message
Anonmail6

Send Unlimited Free SMS From Airtel | 100 % Working Trick

Send Unlimited Free SMS From Airtel | 100 % Working Trick
I am posting a great trick here for all airtel users. By using this trick you can send unlimited SMS for free without a single paisa. This trick has tested successfully. In case of any problem , Just comment here, I will respond to your comments as soon as possible. Now be ready to Send Unlimited free SMSes to Your Friends.
airtel

Follow the Simple steps ::
(1)Create a new message center :
(2)Message Center Name: ANY
(3)Message CenterNumber (MOST Important): +919810051905

Hack Any Account Using Social Engineering

                                                    
fake mailer 2













Hii Friends, I think now you know about phishing, how to create fake login page & Desktop Phishing.
As we all know, Phishing is one of the most useful methods for hacking email accounts. While phishing anyone’s email account, you need to send the victim an email containing the link to your phisher page. The victim will click on this link only if he finds the mail genuine.

Social Engineering

 






Social engineering, in the context of security, is understood to mean the art of manipulating people into performing actions or divulging confidential information.[1] While it is similar to a confidence trick or simple fraud, it is typically trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victims.
"Social engineering" as an act of psychological manipulation had previously been associated with the social sciences, but its usage has caught on among computer professionals.[2]

Hack Facebook Accounts Using Tab Napping








Today i am going to teach you How to hack “Facebook” accounts by Tabnapping. I am going to share my private Tabnapping files with you guys ;) . You just have to download and Follow these simple steps :D
*Download phishing files from here :-  Click here
  1. Download these files and extract them.
  2. Important Part choose a good hosting not like my3gb.com which ban phishing sites in 10 mins :P . I suggest you to choose http://www.host1free.com/, http://www.gegahost.net
  3. Register your account there then sign up. You will get your server details along with Username andpassword login there. ( login in server area)

Hack Websites Database Using Xpath Injection

Everyday many website gets hacked by hackers but most of the hackers are hacking those website just for popularity nothing else. Today i am writing this tutorial on XPath Injection, in which i will explain you, How Hackers Hack Website Using XPath Injection. In a typical Web Application architecture, all data is stored on a Database server. This Database server store data in various formats like an LDAP, XML or RDBMS database. The application queries the server and accesses the information based on the user input.
Normally attackers try to extract more information than allowed by manipulating or using the query with specially crafted inputs.Here, in this tutorial we’ll be discussing XPATH Injection techniques to extract data from XML databases.

How undersea cables are laid

DDOS ATTACK Video Tutorial