Super Bluetooth Hack

its not the old one... its the new version based on MDM!!
however it is for symbian version this time :(

More in New Version :

1) Connect via BT/Irda
2) Reading SMS
3) Changing time/alarms
4) Pressing keys…

What else can you do once connected to a another phone via blue tooth?

1) Read SMS matches.
2) Turn off telephone.
3) Switch on music.
4) Choose modes (normal, without sound …)
5) Block Phone.
6) Read his Contacts
7) Change Profile
8) Play his Ringtone even if phone is on silent
9) Restore Factory Settings.
10) Restart the phone
11) Change Ringing Volume
And here comes the best
“Call from his phone” it includes all call functions like hold etc.
And much, much more



Install:
1) Download
2) Pour on the mobile
3) Run the Installer (what you download, incidentally need JAVA)
4) He finds it, and you will be able to run software
5) Choose the language and going configured
6) Click Connection
7) Click search devices
8) Choose the “victim”
9) AND MANAGE

download link : http://rapidshare.com/files/110006797/Super_Bluetooth_hack_New_2008.rar

Enjoy hacking but don't misuse...

Web Hacking: Attacks and Defense

Exposes complete methodologies showing the actual techniques and attacks. Shows countermeasures, tools, and eye-opening case studies. Covers the web commerce playground, describing web languages and protocols, web and database servers, and payment systems. Softcover.

Features include:
* Overview of the Web and what hackers go after
* Complete Web application security methodologies
* Detailed analysis of hack techniques
* Countermeasures
* What to do at development time to eliminate vulnerabilities
* New case studies and eye-opening attack scenarios
* Advanced Web hacking concepts, methodologies, and tools

"How Do They Do It?" sections show how and why different attacks succeed, including:
* Cyber graffiti and Web site defacements
* e-Shoplifting
* Database access and Web applications
* JavaĆ¢„¢ application servers; how to harden your JavaĆ¢„¢ Web Server
* Impersonation and session hijacking
* Buffer overflows, the most wicked of attacks
* Automated attack tools and worms

Code:

http://kewlshare.com/dl/77f374214043/Web_Hacking_-_Attacks_and_Defense_sho.rar.html

Comment below if you like and also if getting any problem!!