Wellcome To Bangladesh Cyber Army

Bangladesh Cyber Army is Non-profit knowladgebase in Bangladesh. Lets We make a new world,A true World .

Security is the Big Challenge.

Security is your own Right.Everywhere Needs Security.Stay Connected With us.Get Bangladesh Cyber Army Update Tools and Keep secure your System.

Networking is Easiest way to stay connected each other.

Get our Latest Tutorial and Get more knowledge about Networking .

Get Our Unique Program.All feature is Updated.!

Get Up Hacker Every one Don't takes our Glory . We must Won The True Race.

Tuesday, March 12, 2013

Backtrack Setup Manually For Hacking !


The Linux (Backtrack) of all the problems that will be tried.If you do not yet have just added Join us.So go ahead and download it backtrack part by part. (Brand new, please do not disturb)
However, more One
What is Backtrack?
=> Backtrack a Linux-based operating system.
Why backtrack?
=> We mainly use Linux for hacking. And backtrack the hacking tools available to all. So we have to choose Backtrack action.
How do I set up backtrack / no harm will PC 's / ......?
=> No. We Done setup that is fully secure and that any problem that you are.
I do not say we'll use Backtrack for hacking Windows, so we'll keep this as our main pichira with the moves to create a PC Backtrack install it.
Therefore, we use the Backtrack VirtualBox installed so that we do the same with Windows and Backtrack use.
I hope you understand.
• Go to the first page to Download the Backtrack. Here
• The download on the right side of the press.

1.Release Backtrack   :  Backtrack 5 R3

    2.Window Manager:  :    Gnome....

    3.Architecture             :    32..........

    4.Image Type:             :   ISO      

    5.Download Type       :   Direct or torrent

    6.We'll Direct Download then click No Thanks            

  Please wait for download to finish it up.

• we installed virtualbox can be installed, but it is much more System hacking is no longer good for
• virtualbox's website and go to the bottom download

No More Today This file are too large


Friday, March 1, 2013

World Wide Web Top Secret !



Nice to meat all of them, I can not write I'm still a good bn. Forgiveness perspective view.
              I remember the scene where the Godfather holliwood  photo with her ​​pet murderer never face to face not meet the mandate through the network on the go with a very secret, or what are anjelina starring Julie 'Hacker' do not know the name of the movie is where the perpetrators of the crime within the network law and Order --- where they could not force the nose throat?
At first sight, the silver screen, but these movies are saiphai just false unknown networks like the Internet  is one of our known darkness ...
Promote excellence in information technology with the Internet, it has become the most mahasamudrera gets a big one. Keeping with the increased ability to search Engines. In particular, Google's name will be balatei, which is now one of the most trusted bryande been parinita. I think what we can suggest a net session without? Impossible!
But Google's ability to get this?
You'll be surprised to know that when you are no longer in the Google search results for hundreds of thousands of information you up before putting it on the Internet, only 10 per cent from! The Google of online information, 90 percent do not know! Eleme only 10 percent of the time within the search results that appear in front of the customer. The remaining 90 percent are unfamiliar to you always.
A survey has shown that the amount of data stored on the web than 500 times higher than the data stored in the invisible web. In fact, this is one part of the glacier is visible on the net is popped Ocean Deep Web is the real ocean itself!
Our topic today is unknown Black web
Black Web can be divided into two, which are
• 1. The Deep Web
• 2. The Dark Web
They are all part of the Deep Web is the Internet search engine to find, but if you know their address, you can go to this section.
The Dark Web is the part where conventional ways the Internet can not let you, you can not enter common Browsers. The software's help, you can enter here.
What is the origin of this part of the internet? It is impossible to correct it.
In fact, neither you nor I am not alone internet! Your every action, every glance watching your Internet Service provider download. They are no longer any need for your whole profile of the Secret Agency’s they Supply . This means you do not have freedom of movement no!
In the world of the Internet, the group felt the need for a system where they can secretly manage their activities. Army, the revolutionary, hackers, Actually real Administration wanted a system where the exchange of information between the Office of confidence or stolen information can get back to you chaffer with offenders. The world of online censorship many countries are very strict, Equally   Antiparty  been thinking about a system where the government can not administer. It would have been the origin of this is unknown. It all offenders who lure them with the fear of being caught in the nets do not dare discuss.

Now the question is why the Deep Web, search engines can not read?
This is because search Engines their search for the supervision of virtual robots with the Crawler. The Crawler is recorded on the website Websites  the HTML tag. Moreover, some of the requests are recorded from the site in search engines. Now that the site admin does not want to find that their site is not search engine rather, they use the Robot Exclusion Protocol, which entered Crawler or prevent them from existing sites to find. Some sites have a certain dynamic that is subject to the requirements of this type of site can be found to exist, the Crawler's possible this is not all. There are some sites that have links from other sites. The isolated site, also in the search.

Moreover, it could not leave the house search engine technology is still in its old. Text search Engines apart from the other formats (such as Flash format) webpage  not find!
The Deep Web data from the web surface quality of the information. These are very ornate and relevant. Understand what you are searching Engines!

The most interesting part of the Dark goodbye on the web ...
Your current web browser can not access these sites. They all practice outside of the Internet, it does not take into account any protocol. And they are so odd addresses (such as sdjsdhsjhsuyumnsdxkxcoioiydsu67686hsjdhjd.onion) that lay people are very difficult to remember. This site is the invisible part of the internet. Special knowledge (such as programming, networking, proxy) if you can not access this network. Another peculiarity of this part of the World Wide Web sites, such as top-level(TLD) domains (such as. Com) rather than using the "Pseudo Top Level Domain" using the original World Wide Web from a second network under. I have a domain of Bitnet, Onion, Freenet, and more.
Most of the world! I can not imagine life  which is what you get here. I did not ever imagine that it can be taken apart Secret Agency's site, so you are always here. The issue that you can get into your head. This year, WikiLeaks has announced that they will release more new data, but you might be able to post Surprised this all data from the Dark Web has a number of years ago. Any book is the latest edition to the surface of the web of copyright law, it's not because you are being transferred dedarase.

There are more depraved Entertainment! Child pornography from the surface of the Genital Mutilation's video on the web, and it is here Hot Topics.
There are some sites where marjuyana, Heroine from all kinds of home delivery of the drug. Dark web  users Are Adictted.
There are some sites where Criminal groups with education on how to make the pudding powder, some site arms are sold canned. It started from the rocket  Luncer, martar AK 47 like to buy the weapon.
Arabian - Democrate this spring darkweb join  them. Darkweb range of mail services, chat services, there is nothing much you can keep a secret identity.

Like, there's more! Several days ago I was visit on a site under equivalent kilar  where the money is available to rent! What's terrible, is not it? I was not. The site is the work of his own about the way I kilar On says
"I would call you up in slyat. I would not be able to offer the professional  end way. I know that I was not interested. You just give me the money and I will pay him that. Target age must be at least 18,
The target is male or girl that I can not come
I do not pregnant women as a target
I do not torture the target
If you're a member of a political personality or law enforcement agencies target the additional charge.
There is no extra charges for the fact that I am the sort of suicide or accident can.
After down pemment done within four weeks.
Outside the U.S. for target 5000 dollars extra travel charge applicable.
I work, I'll send you pictures of targets "
Black forest is the word you enter where you think twice before you take each step. Surface hacking technique that you see on the web is the dark part of the information from the web write by 1%. The hacker is terrible and Programming in a pair of them, and you can hack mail. Moreover, the government has Agents.

The question is how this all works with Network Law enforcement agencies continues to front of nose?
It is our understanding that such a network can be a little ...
The Network had become popular in the web dark web Surface Network is a onion Network. Pseudo-top-level-domain is onion.Onion. It's spooky sites address! Originally created for the U.S. Navy, but this was masked by the net users first choose Network. onion can not let your browser, you can download the Tor browser.
Torr to hide your identity, so this is what it will be almost impossible to identify your location. When you access a site with torr torr when you go through onion authenticated encryption difficult to send this request. The data you send to the proxy onion data, it becomes complicate the script.

The data in the original proxy onion like internet in which the members of Serve onion rautars waiting. Before entering the data again gateway onion networks get & IPsec encryption through it. Network time out once more through the encryption. onion way through several routers in IPsec encryption, encryption is where the output of one to one and a router knows that the data is coming from a router. Finally, when the data arrives in the recipient's hands go through the process dicription return to the original position. This is why many of the Network Layer, or Xhosa name onion Network.
Now, if this data is stolen during this data calacalira can not find it in his behalf or that of its sender or as receiver! I do not know it themselves onion rautar. But yes, there are two parts may be monitoring Sender-Receiver's location where he or she can understand.
This is why these kinds of mystical system of Law and Order List from the network all the time. Black is the most popular marketplace networks onion inside Silkroad, Forbes million sold as of last year there - was purchased. In currency trading is not common here, traffic is kind of virtual currency called Bitcoin. Microsoft, Apple products are found in 80% of discount.

This irregularities inside this kind of support system, why?
I really do not need to have an open platform. Child pornography that was created to lead this Network arekabhabe his work. And I always step ahead of cyber-terrorists from Service agencies. For example, we can say that Internet Protocol ^ 6 but have yet to surface on the web, the Internet Protocol ^ 4 at very old period. But probably the most under  using IP ^ 6.
Since internet user's people like Bad have all the time to adapt to it, it continues to be so. Once in a while I say that Dark web Visit on the web, but if you miss part of ice shelled sailer taste like the ocean.
If yes, do not go too far. I got, the plentiful money, so they need thousands of talented web Hacker Dark Dark hire people on the web, I was able to keep wait.
Some tips
• # The Dark web access on the Web, Flash, shock wave to spend about. Anonymity You can easily overturn them.
• # paid proxy service use. They are using military agencies and their services grating.
• # Destination Website if you are easily hacked, you could not leave a likely cause. What was your original data in the Dark Do not use the web.
Remember, you are not alone on web Dark of the Surface Web, the walls have ears ...... Welcome to the Dark on the web.


Related Posts Plugin for WordPress, Blogger...