Jump to content

iskey

Retired Staff
  • Content Count

    347
  • Donations

    $0.00 
  • Joined

  • Last visited

  • Days Won

    19

Everything posted by iskey

  1. iskey

    How Do I Create Windows Administrator?

    Running with Administrator Privileges The first step in establishing which type of account your application needs to run under is to examine what resources the application will use and what privileged APIs it will call. You may find that the application, or large parts of it, do not require administrator privileges. Writing Secure Code, by Michael Howard and David LeBlanc offers an excellent description of how to carry out this assessment and is highly recommended. (This resource may not be available in some languages and countries.) You can provide the privileges your application needs with less exposure to malicious attack by using one of the following approaches: Run under an account with less privilege. One way to do this is to use PrivilegeCheck to determine what privileges are enabled in a token. If the available privileges are not adequate for the current operation, you can disable that code and ask the user to logon to an account with administrator privileges. Break into a separate application functions that require administrator permissions. You can provide for the user a shortcut that executes the RunAs command. For detailed instructions on how to set up the shortcut, search for "runas" in Help. Programmatically, you can configure the RunAs command under the AppId Key registry key for your application. Authenticate the user by calling CredUIPromptForCredentials (GUI) or CredUICmdLinePromptForCredentials (command line) to obtain user name and password. For an example, see Asking the User for Credentials. Impersonate the user. A process that starts under a highly privileged account like System can impersonate a user account by calling ImpersonateLoggedOnUser or similar Impersonate functions, thus reducing privilege level. However, if a call to RevertToSelf is injected into the thread, the process returns to the original System privileges. If you have determined that your application must run under an account with administrator privileges and that an administrator password must be stored in the software system, see Handling Passwords for methods of doing this safely. https://msdn.microsoft.com/en-us/library/windows/desktop/ms717801(v=vs.85).aspx
  2. Hello All IPSW Downloads LinK: http://www.felixbruns.de/iPod/firmware/
  3. Hello Installation Tutorial * Switch off your BlackBerry 10 device * Run the AutoLoader File * Connect your BlackBerry 10 Device to your PC via USB * Quickly Turn on your BlackBerry 10 device * The AutoLoader will detect your device and starts the installation * Please hold till the AutoLoader reaches to 100% and CLOSES automatically * Disconnect your BlackBerry 10 device and wait till it starts again Download http://developer.blackberry.com/blackberry10devalpha/devalpha_update.html Q10 models 100-1, -2, -3, -4, -5: Download the 10.1.0.4633 OS Q10 models 100-1, -2, -3, -4, -5: Download the 10.1.0.4687 OS Q5 model 10.1.0.4633 OS Q10/Q5 OS V10.2.01.2234 New update Q10/Q5 _10.2.01.2228_SQN100-1-2-3-4-5 Download Q5/Q10 10.3.0.296 Autoloader
  4. Hey Find MEP from your phones PRD number. Every BlackBerry phone has a PRD number which can be find on the label inside the phones battery compartment, see below. 1. Power your BlackBerry Off. 2. Remove battery cover. 3. Remove battery. 4. Look for PRD-XXXXX-XXX number in the white label on the back. 5. Select your phone's PRD number from the dropdown list below to display the correct MEP number. Ensure the PRD number matches exactly. Link : http://bbs.x-mobila.ru/prd.php Find more Solution ------ is-key
  5. Hey importantly, neither I nor the Forum is responsible for the damage incurred during the mishandling of this tutorial is urgently contacted a professional to have a meers of the operation The Samsung Galaxy S6 (SM-G920) cell phone from T-Mobile USA is using a custom firmware preventing the phone from being unlocked by code as there is no way to enter it (these phone are simply not asking for “SIM Network Unlock PIN”). Before this post, the only way to Unlock the phone was by using the official T-Mobile “Mobile Device Unlock App” which is an Android app called “Device Unlock” that allows you to request and apply a mobile device unlock directly from the device. And absolutely no code that you’ll be able to buy online will work using this app. So what do you do if you get an Unlock Code but you cannot use it? Now there is a solution consisting of an upgrade to the firmware of the phone with MetroPCS Firmware instead of T-Mobile, and this will allow the phone to ask for the Unlock Code. Below you will find a tutorial about how to do this. Once you flash (update) your Phone with this New Firmware, please make sure that your Samsung SM-G920T is now asking for “SIM Network Unlock PIN”. And if the answer is yes you can then click this link to order the Unlock Code of your Samsung Galaxy 6 from T-Mobile USA. Service Name: Samsung T-Mobile USA [NEW GEN 2015] – NCK + SPCK (1<>4 Hours Mon-Fri) – [Tool ID: 775] Please note: This method has been proven to work because it uses Samsung’s Official programs and the Official stock MetroPCS provided Images. As with any Official carrier or manufacturer firmware flashing this must be done at Your Own Discretion. The instructions are outlined CLEARLY and you must follow the instructions exactly. If any issues arise we cannot take responsibility for any issues. If you do not want to proceed, unfortunately we are unable to provide refunds as stated on our website before ordering. Please contact us for more information. You MUST perform these instructions and make sure the phone prompts with a NON accepted sim before you order or No Refunds! Step by Step Tutorial Firmware Upgrade Samsung Galaxy S6 (SM-G920T) to MetroPCS Firmware Disclaimer: UnlockBase is not responsible if users break / brick or damage their phone while trying to use this method. You must not use this firmware for any other Android Cell Phone other than the Samsung Galaxy S6 (SM-G920T) from T-Mobile USA. Do so at your own risk. If you’re not sure what you are doing, please seek assistance at a local cell phone service center in your area. Step 1 (Preparation): Galaxy S6: Download the Special MetroPCS Firmware for Samsung SM-G920T. https://www.unlockbase.com/download/samsung-galaxy-6-sm-g920t-metropcs-firmware.zip Download ODIN v3.10.0 Service Software using this link (NEW: Odin v3.10.5 or Odin v3.10.6) Make sure your phone battery is charged more than 60%. Enable USB Debugging, by open Settings > Developers Option > USB Debugging If Developers Option is hidden, go to Settings > About Phone > Built Number (tap on it for 5-8 times) Make sure you install the Samsung Galaxy S6 USB drivers on your PC, if you haven’t already. thttps://www.unlockbase.com/download/samsung-galaxy-6-official-windows-drivers.zip Optional: Download he Original T-Mobile Firmware for Samsung SM-G920T. https://www.unlockbase.com/download/samsung-galaxy-6-sm-g920t-tmobile-firmware.zip Step 2 (Update Firmware): Run Odin3 v3.10.0 as administrator (Right-Click: Run as Administrator). Switch OFF your Samsung Galaxy S6. Boot in download mode, by pressing the Volume Down + Home + Power Key simultaneously. When you see the screen below: Tap Volume Up button to enter Download Mode. Connect the Samsung Galaxy S6 to your PC with the USB cable. Odin will automatically detect your phone and show the “Added!” message. In the Odin, click on AP or PDA and then choose :- For Galaxy S6 (SM-G920T) :G920T1UVU1AOCH_G920T1TMB1AOCH_TMB_HOME.tar.md5 file. Ensure Auto Reboot and F. Reset Time options are selected selected in Odin while the Re-Partition option is unchecked (this is very important). Click Start in Odin and wait for the software to update your phone. nce the root installation is done, your phone will reboot and soon a PASS message with a green background appears in the left-most box at the very top of Odin. You can close Odin after device turns on. Your Samsung Galaxy S6 is now fully updated with MetroPCS Firmware! AFTER FLASHING A SAMSUNG GALAXY S6 FROM T-MOBILE WITH THIS FIRMWARE THE PHONE WILL FINALLY ASK FOR A NETWORK CODE WHEN YOU PUT A NON APPROVED CARRIER’S SIM CARD ON THE PHONE. AFTER YOU HAVE UNLOCKED YOUR PHONE YOU CAN STILL FLASH A T-MOBILE FIRMWARE BACK TO THE DEVICE SO THAT IT GOES BACK TO ORIGINAL STOCK AND SO DOES NOT LOSE WARRANTY. BUT THE PHONE WILL RELOCK AS SOON AS YOU FLASH IT BACK WITH T-MOBILE FIRMWARE. Download the Original T-Mobile Stock Firmware for Samsung SM-G920T (Galaxy S6). https://www.unlockbase.com/download/samsung-galaxy-6-sm-g920t-tmobile-firmware.zip Troubleshooting : I am stuck on the SAMSUNG BOOT LOGO! What do I do?First, do not worry, your phone is not broken. Simply follow the instructions below: a. Wait at least 5 minutes to make sure you are stuck on the logo screen b. Pull the battery out and wait 30 seconds, then put the battery back in c. Turn the phone on by: HOLDING VOLUME UP + HOME + POWER you will soon see the RECOVERY page Tip: when the phone turns on let go of the power button ONLY, when you see the recovery let go of everything d. Scroll down to WIPE factory user data reset and select it when prompted scroll to YES and select it to do a factory wiping e. Scroll down to WIPE CACHE PARTITION and select it, when prompted scroll to YES and select it to do a wipe on cache Tip: Use the volume rockers to navigate and the power button to Select your option f. Reboot the phone, you should load properly now
  6. Hello All Second Samsung Z3X Box PRO update for Z3x box offers new unique solution for unlock and cert reading for Samsung Galaxy S6 and S6 Edge. Unlock way is fully safe, without wipe and touch imei or any calibration data. While unlock nv_data.bin saving in backup folder. Activation is usually done within 1 minute to 1 hour. After you received email confirmation perform the following: Shell Software > Settings and Card tools > Run hardware Wizard > Add new activation New unique solution released for unlock and cert reading from Samsung Galaxy S6 and S6 Edge. Unlock way is fully safe, without wipe and touch imei or any calibration data. While unlock nv_data.bin saving in backup folder. Supported models: SM-T331 (Direct Unlock, Flashing, Write CERT, Reset MSL, Wipe EFS) SM-T331C (Direct Unlock, Flashing, Write CERT, Reset MSL, Wipe EFS) SM-T335 (Direct Unlock, Flashing, Write CERT, Reset MSL, Wipe EFS) SM-T337A (Direct Unlock, Flashing, Write CERT, Reset MSL, Wipe EFS) SM-T337T (Direct Unlock, Flashing, Write CERT, Reset MSL, Wipe EFS) SM-T337V (Direct Unlock, Flashing, Write CERT, Reset MSL, Wipe EFS) SM-T525 (Direct Unlock, Flashing, Write CERT, Reset MSL, Wipe EFS) SM-T113NU (Direct Unlock,CERT Read/Write,Flashing) SGH-T159 (Direct Unlock/Read codes/, Repair IMEI/SN/BT, flashing) - First in the World GT-S5610K (Direct Unlock/Read codes/, Repair IMEI/SN/BT, flashing) SGH-S275M (Direct Unlock/Read codes/, Repair IMEI/SN/BT, flashing)- First in the World SGH-S275R (Direct Unlock/Read codes/, Repair IMEI/SN/BT, flashing)- First in the World SM-N915A (Direct Unlock, Flashing, Write CERT, Reset MSL, Wipe EFS) SM-G920A (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G920F (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G920FQ (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G920I (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G920K (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G920L (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G920S (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G920T1 (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G920T (CERT Read/Write,Flashing)- First in the World SM-G920W8 (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G925A (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G925F (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G925FQ (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G925I (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G925K (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G925L (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G925S (Direct Unlock*,CERT Read/Write,Flashing)- First in the World SM-G925T (CERT Read/Write,Flashing)- First in the World SM-G925W8 (Direct Unlock*,CERT Read/Write,Flashing)- First in the World
  7. iskey

    Torrent Search Engine

    Happy New Year 2015 Torrent Search in over 450+ torrents websites at the same time. http://www.toorgle.com/ Enjoy
  8. iskey

    Hello everyone.

    welcome sacinic hope you find all what you need here
  9. Microsoft's Hyperlapse is the name given to the new tech which is just out from their research division for public consumption, the technology allows users to create smooth and stabilized time lapses from first-person videos. Apps powered by the technology help you record and produce super-stabilized videos on Android, Windows Desktop and Windows Phone. The algorithmic tools works it's magic to your shaky footage resulting into high-speed, super-smooth clips that users can enjoy. Official video introduction to Microsoft's Hyperlapse is shared below. https://youtu.be/twncW4PLdsY
  10. iskey

    Best Hidden Android Secret Codes

    awsome ShammY Great good work
  11. iskey

    Free PDF Unlock Online Utility

    nice job Great ...... Thank you Shammy
  12. hello just try it your temporary e-mail address. http://10minutemail.com/ CP Moderator Message: Mr Grumpy - Coded links
  13. iskey

    How to uninstall AVAST antivirus !

    thank you
  14. for free https://www.udemy.com/ethical-hacking-and-penetration-testing-kali-linux/?couponCode=dferxcfg+v45#/ Ethical Hacking and Penetration Testing course Ethical Hacking (EH) and Web Application Penetration Testing (WAPT) Course is IT Security (Offensive) Security Course that teaches you how to find vulnerabilities (bugs or loopholes, like coding mistakes, configuration mistakes or errors etc) in any applications and Network infrastructures including networking devices, mobiles etc- Web Application Penetration is specific to digging the same specific to web applications. </p> <p> Ethical Hacking for Computer Security<br> Ethical hackers are computer security experts who focus on penetration testing and weaknesses in an organization’s information systems.<br> <br> Using the same destructive techniques of intruders, ethical hackers are able to produce security evaluations with information about vulnerabilities and recommend potential solutions. </p> Students will be shown how to gather information intelligence, find web application and system security vulnerabilities, how to scan using Nmap and bypass IDS protected targets, how to hack clients using modern web browsers and how to collect important information once a system has been hacked into. This course is ideal for web developers, IT security professionals, network engineers, Windows and Linux administrators, security engineers, database administrators and webmasters as well as anyone interested in learning basic ethical hacking techniques. Upon completion, students will be able to apply ethical hacking practices to identify potential weaknesses, and understand the moves hackers would make to attempt to exploit a system. Students will also have the knowledge to recommend security measures that will make systems more impenetrable to hackers. SECTION 1: Ethical Hacking and Penetration Testing (Kali Linux) 1 Welcome 8.27 MB 2 System Requirements 12.32 MB 3 System Requirements 12.32 MB SECTION 2: Introduction $ installing 4 What This Course Will Cover 02:16 5 Prerequisites 02:53 6 Acquiring Dradis 04:24 7 Installing Dradis 02:31 8 Using Dradis 04:01 9 Adding Notes 02:50 10 Categorizing Information 04:10 11 Review of Scan Types 04:35 12 Advanced Scanning 40.01 MB 13 Scripting Engine 35.15 MB 14 Investigating Scan Types with Wireshark 106.97 MB 15 Importing Results to Dradis 23.9 MB 16 Aquiring Nessus 37.72 MB 17 Setting Up Nessus 52.04 MB 18 Configuring Nessus 35.68 MB SECTION 3: Scan 19 Scan Details Network 25.92 MB 20 Scan Details Credentials Plugins Options 35.54 MB 21 Scan Details Web Applications 56.83 MB 22 Starting Scan 18.77 MB 23 Reviewing Results 70.78 MB 24 False Positives 51.41 MB 25 Setting Up Jobs 17.77 MB 26 Acquiring Nexpose 43 MB 27 Setting Up Nexpose 17.86 MB 28 Configuring Nexpose 39.59 MB 29 Adding Hosts to Nexpose 44.51 MB 30 Reviewing Results & Manual Checks 60.38 MB 31 Netcat 65.8 MB 32 Protocol Checking 80.07 MB 33 SSL Client 90.79 MB 34 SSLScan 94.5 MB 35 Snmpwalk 72.67 MB SECTION 4: Metasploit 36 Acquiring Metasploit 45.66 MB 37 Setting Up Metasploit 9.71 MB 38 Metasploit Web Interface 37.17 MB 39 Configuring Workspaces 20.94 MB 40 Running Nmp from metasploit 32.4 MB 41 Import Nessus Results 29.26 MB 42 Scanning with Metasploit 75.07 MB 43 Looking at Vulnerabilities 79.7 MB 44 Searching Vulnerabilites 51.26 MB 45 Running Exploits 48.47 MB 46 Post Exploitation Data Gathering 67.32 MB 47 Pivoting & Tunneling 42.24 MB 48 Writing an MSF Plugin 93.17 MB 49 Writing Fuzzers 102.77 MB 50 Social Engineering Toolkit 24.9 MB 51 Spear Phishing 88.06 MB 52 Browser Plugins with Chrome 94.97 MB 53 Browser Plugins with Firefox 47.91 MB 54 Tamperdata 52.22 MB 55 Performing Injections 26.86 MB 56 Cookie Data with Tamperdata 112.77 MB 57 SQL Inject Me 58.93 MB 58 XSS Me 54.91 MB 59 Firebug 84.03 MB 60 Hackbar 61.06 MB 61 Wappalyzer 39.74 MB 62 Passive Recon 85.83 MB 63 Groundspeed 33.8 MB 64 Acquiring Webgoat 72.88 MB 65 Practicing Web Application Attacks 24.55 MB 66 Basics of Webgoat 39.46 MB 67 Working Through Lessons 62.52 MB 68 Acquiring Burpsuite 29.07 MB 69 Installing Burpsuite 22.01 MB 70 Running Burpsuite & Configuring Your Browser 22.37 MB 71 Spidering 33.33 MB 72 Passive Scanning 35.2 MB 73 Active Scanning 48.03 MB 74 Investigating Results 88.56 MB 75 Password Attacks 55.03 MB 76 Fuzzing Attacks 85.17 MB 77 Doing Sequencing 50.18 MB 78 Using the Intruder 69.16 MB 79 Acquiring W3Af 21.86 MB 80 Installing W3Af 30.4 MB 81 Running W3Af 19.23 MB 82 Configuring W3Af 53.76 MB 83 Acquiring & Configuring Zed Attack Proxy ZAP 61.56 MB 84 Quick Start with ZAP 37.64 MB 85 Scanning with ZAP 46.62 MB 86 Spidering with ZAP 40.46 MB 87 Fuzzing with ZAP 46.02 MB 88 Web Architecture 45.57 MB 89 Basics of SQL Injection 31.78 MB 90 Manual Testing 56.19 MB 91 SQLMap 126.58 MB SECTION 5: Exploits 92 Command Injection 39.96 MB 93 Cross Site Scripting 34.91 MB 94 Spear Phishing 62.83 MB 95 Cross Site Request Forgery 19.54 MB 96 Roque Servers 69.9 MB 97 Spoofed Certificates 121.81 MB 98 Course Wrap up 6.91 MB 99 Next Steps 9.87 MB
  15. take tour here http://onhax.net/windows-server-2012-r2-iso-key-is-herelatest/
  16. iskey

    IBM SPSS 22 [COMPLETE]

    Try this one Installer: http://www14.software.ibm.com/download/data/web/en_US/trialprograms/W110742E06714B29.html Serial Number: 9DNCAF2O3QVDV7FBIO696OO6GWLNXZPPRYTPWF2PPX7C8T6Y24LMVV2ET7DOLX5CXAL5YDLL79UPGEFCPDXP5Q8O5E
  17. iskey

    virus/malware

    great
  18. iskey

    File Name Too Long

    to fix registry
  19. iskey

    File Name Too Long

    please use avg tune up 2015 with key
  20. iskey

    File Name Too Long

    i did not find key for quick heal internet security
×