Inbuilt with multi-purpose announcement bar Check here

  Regarding our Twitter account
User Avatar Forum: News
Posted by: Viper - 10-08-2018, 12:57 AM - No Replies

Apparently the clueless people at Twitter thought our site breaks any part of their policy. Yet everything they are against is listed in our disallowed blackhat activity rule. One if their policy states the site must be accessible without registration and it is. I've sent a email, let's see what piss poor excuse they pull. Until then we are not eligible to advertise.

Print this item

  Frat house dilemma.
User Avatar Forum: The Lounge
Posted by: iC3Man69 - 09-09-2018, 11:12 PM - No Replies

Short backstory: I’ve been looking for a place in the heart of downtown for a while now. Rent out here is about $1200 USD for a one-bedroom (to yourself). 

Yesterday I went to a friends party at a frat house, and they were explaining how they have a room available for $350 USD/month. Comes with wifi, laundry, electric. The drawbacks are shared washrooms & kitchens. The house itself is quite old & there is always red cups thrown around. 

Has anybody here lived in a frat house before? And how did you enjoy it?

I feel like the weekly parties might get a little out of hand, but I’d love to make new lifelong friends at the same time. 

Also if I do move in I wouldn’t be a member of their fraternity but I still know many people so it’s chill

Print this item

  [TUT] How to Become a Professional Penetration Tester
User Avatar Forum: Beginner Hacking
Posted by: 4non - 09-09-2018, 11:04 PM - No Replies

First Steps Down a Lengthy Road

A pentester must know a lot about a lot, while specializing will be a goal after you are hired, you must be a general expert in many fields of study. It can be very daunting for a budding infosec student or hobbyist to look at everything a pentester should know. A lot I.T people will fantasize about being a pentester, but most of them won't even start the process because it seems very difficult and time consuming. And they are correct. If you don't absolutely love security testing, talking about security subjects, learning new techniques, and having to spend hours (if not days) to figure out a problem, then this is not for you.

Still here? Alright lets dig into what subjects make up the core knowledge an entry level pentester should be very well versed in.

1. Networking

One of the most essential skills for a penetration tester to learn is how computers talk to each other. Learn the ins and outs of TCP/IP, 3-way handshakes, protocols and packet inspection. Get to the point where you can go to a white board and map out a network communication using the OSI module and write in depth how it all works. Don't just know each level of the OSI module, fully understand each level, know every protocol associated with each level. This is crucial because analyzing traffic through packet dumps you will need to analyze every wrapper, every address, etc. An expert will be able to read and manipulate network traffic on the packet level, once you have that sort of understanding you are solid.

How to prepare: 

* Study Network+, CCNA Security, read TCP/IP Illustrated Part 1. 
* Practice with Wireshark, inspect traffic, understand how packets are created and transmitted. 
* Study HTTP, know it inside and out. "HTTP The Definitive Guide" is a great resource. 
* Use Burpsuite (more on this later) to proxy and inspect web traffic.

2. Understanding the Internet

In the networking section I mentioned HTTP and Burpsuite, so lets discuss that next. Most people think they understand the internet, they are wrong. Can you write out a full HTTP request and response? Do you know every HTTP verb? Do you know the difference between HTTP 1.0 and HTTP 1.1 and HTTP 2.0 or HTTP 0.9 without having to research it? Do you know most of the HTTP response codes, not just general information but specific codes. Do you know how a CDE works? Ok lets assume the answer to most of that is no because most people don't actually study how the internet works. When you are performing web application testing, code review, and API review, you will need to know how it all works.

How to prepare:

* Read "HTTP The Definitive Guide"
* Read "The Tangled Web"
* Be familiar with RFC 2616 and other related RFCs.
* Practice inspecting web-traffic with both Wireshark and Burpsuite.

3. Operating Systems

As a pentester you will have to test all operating systems. You don't get to choose only Windows environments running only Windows 7 and below. You will run into many different types of environments, running Linux and Macs as well and Windows. You should be comfortable with all types of operating systems and how to enumerate information, use of command line (CMD, Powershell, Bash), and how to download/install and execute programs. Looks simple but that is a lot of knowledge. If you got access to Windows Server 2012, could you change roles, add a new admin, push updates etc? If you got on a Ubuntu Box as a webuser, can you enumerate to find insecure files or permissions? Of course you don't need to memorize everything, Google is your friend, but you should have a general knowledge of how to do everything and use Google as a backup for the fine details. 

How to prepare:

* Create a VM of at least one Linux distro and one Windows Server. A Mac VM would be handy, but it is similar enough to Unix that knowing Linux commands will at least help. With those VM's or using them as hosts, attain admin level knowledge of their functionality. There are many web courses, books, and websites that will provide you with great knowledge.

I Have the Core Knowledge, Now What?

Congratulations, if you attained all the core knowledge listed above, you are no longer a noob. That is a lot of knowledge to have about technology and with it you can probably get a decent entry level tech job. Now it is time, if you haven't already, to get a job. Most pentesters come from varying backgrounds such as Network Admin, I.T Helpdesk, Security Analyst, Web Development, Programmers, and more. The point is, get a job in technology, doesn't need to be security related immediately though that is a bonus. At this point you should also look at getting a few certs, Network+ and CCNA would be great for getting into a networking job. MCSA is good for geting into a System Admin role. If you mastered the core knowledge then you should have no issues getting a few of the entry level certs.

You may be asking, why wasn't programming listed as core knowledge. There is a good argument that it should be but I think programming should be part of the next step. Mastering everything in the first section will take at least a year or two depending on how fast you can learn, your current background in technology, etc. Adding programming on top of that immediately will take up even more time, and if you don't have a reason to learn coding yet then you are likely to forget a lot. 

Ok so now you have a job in I.T, it pays shit but it looks good on the resume. Every job you have from now on will be a stepping stone. Don't expect to remain at any one job for more then two years because the way to the top is a ladder and getting complacent will get you stuck on a lower rung. Of course if you do find that you really enjoy being a Network Admin, System Admin, Security Analyst and don't feel like pursuing Penetration Testing, that is perfectly fine. Those jobs are great and will provide you with a good future.

Now though, for those who want to keep climbing the ladder, we start to dig deep into security.

How to Become a Hacker?

1. Learn Defensive Security

Probably one of the most asked questions on HF is how to become a hacker. Well to start off if you mastered those core topics you are well on your way. Now we can apply security to each of those core topics. I find it best to learn Blue Team (Defensive Security) before jumping into Red Team (Offensive Security). Because while studying defensive security first you will also learn about offensive security. And any pentester should know what kind of defenses may be in place to prevent a reverse shell, code execution, logging, standard AV behavior and more. Also going down this route can lead to a security analyst position which is a great lead into penetration testing. Of course you can skip this step if you want, learn the advance subjects listed later, and you probably can still get into penetration testing. This is only my recommendation.

How to Prepare:

* Study: Security+ and CISSP (don't have to get cert but at least study).
* Understand common defense techniques such as how Anti-Virus works, how Web Application Firewalls work, how Firewalls/IDS/IPS work and where they are installed in networks. 
* Create your own lab setup, play with setting up Splunk and other free security tools. 
* Study compliance such as HIPPA, PCI DSS, and FedRAMP. Study standards such as ISO 9000 and NIST.

At this point you should be able to design, at least on paper, a fully secured network and understand each type of security device you put in place for the layered security. You also should be able to write a Security Policy and understand different security controls based on the compliance or security standard any company may want to utilize. 

If you are not a Security Analyst or on an I.T Security team at this point, start applying. You now have the knowledge to get at least a level 1 security position.

2. Can I Start Coding Yet?

Yes, now it is time to learn how to write programs. One thing to keep in mind is that you don't need to be a programmer to be a penetration tester. In fact, unless you already are a programmer, studying to become one would be a waist of time. What you should know though is the basics of computer science and how to write at least basic scripts/programs for security testing. We want to know how to test applications, find insecure code and exploit it, but we don't need to be dev ops to do that. Of course the more you know about programming the better you will be at testing it, but that is only one of many areas a pentester needs to know. If programming is your thing then you should start that much earlier in the training, add it to your core knowledge set, go to school for it, and make that your job. You can later move to penetration testing if you want but there are better jobs in my opinion, such as Malware Analyst (reverse engineer) or Security Researcher (finding and creating zero days exploits). Both of which rely heavily on being an expert at programming and are also awesome jobs.

For penetration testers though we want to keep it simple. Python is a great language to learn and master. You can learn about computer science with Python, write custom security tools etc. Python runs natively on Linux and Mac and soon Microsoft will be adding it natively on Windows. I recommend learning Python 2.x first but also know how to write in Python 3.x. There are a ton a great free resources for learning Python but the one I found most useful for starting out is "Learning Python the Hard Way". After that you can move to books like "Black Hat Python" and "Violent Python". 

While I recommend sticking with one language until you truly mastered it, there are other languages that will be valuable to learn, at least to the point where you can read source code and understand it.

* C and ASM for exploit development.
* PHP for server side.
* HTML for web development.
* JavaScript for client Side.

By no means is this a complete list of languages to be familiar with but it is a great start. Once you understand programming basics it really comes down to learning different syntaxes. Of course there are many differences between Python and C (not to mention ASM) but you should be able to jump into C and be able to apply some previous knowledge to it. Once you know the basics, one of the best ways to learn coding is to review source code found on github and other places.

3. Learn Offensive Security

At this point you should be level 2 or 3 in whatever security job you chose. You know all the security lingo, you can program, you can develop security policies and perform risk analysts etc. You are comfortable and an above average user on any operating system. You should also have at least two to four certifications. So lets get into the nitty gritty of popping shells. Once you start really digging into security testing you will understand why you had to learn so much other information first. Imagine attempting a reverse shell from a friends computer to your local host, and nothing happens. You don't understand, the software worked in your personal lab so whats wrong? Well that is where networking knowledge comes in. Maybe the program does not have the correct permissions, maybe an AV is blocking it, there are many possibilities and if you lacked the above knowledge you would be stuck, probably writing a post on HF asking for help. But because you followed this tutorial and you studied hard for the last few years, you can easily troubleshoot the problem. Now it is time to learn about the art of hacking.

How to Prepare (in no particular order):

** Highly recommend reading "Web Application Hackers Handbook". Know it inside and out.
* Pick up a book on the basics of hacking. The material will be very out dated but it will provide you solid knoweldge.
* Use YouTube and other sources to learn about: getting shells such as php shells, reverse shells, bind shells, etc. 
* Learn about enumerating a host, port scanning, manual and automated methods of searching for security vulnerabilities. 
* Learn how to exploit well known vulnerabilities, such as MS08-067 and MS17-010.
* Learn basics of privilege escalation methods, both manual and automated. 
* Learn how to enumerate hosts in a network, capturing packets in wireshark, doing broadcast scans with nmap, using netbios and smb to enumerate hosts etc. 
* Learn how to research for vulnerabilities.
* Be able to modify scripts to fit your needs. And be able to troubleshoot older exploits to work with more modern libraries. 

Truly there is a lot that I didn't cover. This section is more about organic learning then a strict regiment. You will bounce from topic to topic. As you learn more about one subject you will find something you don't understand and you will study that as well. For a more controlled learning environment I would suggest some online courses. They are expensive but they will provide a more comprehensive and structured form of learning. The PWK is good for those who are already advanced with the core hacking subjects. While elearnsecurity is very good for those who need a bit more hand holding to learn the same (and more) skills that the PWK teaches. Your goal now is to get the OSCP but you can get something like PPTP first to help prepare you for PWK.

4. Practice Practice Practice.

Now its time to put all that information to practicle application. Time to practice your skill set. There are a couple of methods to practice legally.

1. Build your own lab.
2. Use an online lab.

In this day and age there is no reason not to use online labs except if you want to be familiar with how to set up a virtual lab. There are many free labs online including "" and "" as well as others. Then there are paid for labs which are very beneficial such as "". You can also look into to find pre-made insecure vm images to practice on. The point is, you should be actively practicing security testing in lab environments, this is the best way to learn.

Steps 3 and 4 will take you at least one year, especially if you are actively working full time. Once you have a couple of advance certs like the OSCP, it is time to move on.

Time to Become a Penetration Tester

If you followed the steps I provided then going from a complete noob (knew nothing about security, networking etc) to penetration tester will take around 5 to 7 years. This time will obviously be shorter if you are already in the IT field, have gone to college for computer science or related field etc. So if you start at the age of 16 you can probably get a penetration tester job by 23 or so, not bad. I started much later in life and it took me about 6 years from starting college to getting hired as a penetration tester. By now you will be very versed in infosec and related technologies. Your resume will be great, multiple certs, multiple jobs showing a clear climb in expertise and desire to improve yourself. You will be more qualified then most people who are applying to Penetration Tester jobs. 100% if you apply to enough places you will get a job.

I recommend applying to places that are entry level friendly. Because even with the jobs you had and the expertise you have in labs...that is not practical experience. You will start as a level 1 (or whatever they call it) for at least the first year. But once you have one year of real experience you are golden. If after two years you are not making $100k, look for a new job because you are worth it.

Print this item

  New Theme
User Avatar Forum: News
Posted by: Viper - 09-02-2018, 10:57 PM - No Replies

This will be the new theme, the bases seem to be working. I'll be working on it to fix some issues that I have noticed already. The mobile theme is now officially removed.

Print this item

Information What's next in the future?
User Avatar Forum: News
Posted by: Viper - 09-02-2018, 08:09 PM - No Replies

Long time I've post here but I'm still here doing some back door management. The next major thing to do is a good responsive theme, I want 1 universal theme so every device has the same experience. The next step after that is to invest some money in advertisement with google and bing. Might also drop some pocket change in the social media sites just to test the waters over there. I really want to build our SEO in order to grow, so I've got to meet googles requirements. I'll leave you guys with this

Print this item

Star Power Supply Unit By Tier Ratings
User Avatar Forum: Computer Overclocking, Customizing, and Hardware
Posted by: Japanese - 09-02-2018, 07:31 PM - No Replies

This list is subject to change as new Power Supply Units come out on a regular basis and standards may change or issues with units on the list may develop. 

Sleeve-bearing fans are marked with yellow asterisks *** 
These types of fans have a higher tendency to break down faster than non-sleeve bearing fans. Keep this in mind when making your PSU selection.

Tier 1 - Best

  • Antec - High Current Pro, High Current Platinum
  • be Quiet! - Dark Power Pro P10, Dark Power Pro 11
  • Bitfenix - Whisper
  • Cooler Master - V-series (modular, not to be confused with the VSM), MasterWatt Maker
  • Corsair - AX, AXi, HXi, RMi, RMx, SF, Vengeance
  • Enermax - Platimax, Enermax Revolution SFX 650W
  • EVGA - G2, G3, P2, PS, T2, 1000G1, 850W and above GS
  • FSP - Aurum PT
  • LEPA - G1600
  • NZXT Hale90V2
  • Seasonic - X, Platinum, Snow Silent, all Fanless units, Prime
  • Sentey - Platinum Power, Golden Steel Power
  • Silverstone - Nightjar
  • Super Flower - Leadex Gold/Platinum/Titanium
  • Thermaltake - 1250D-T RGB
  • XFX - Pro Gold, Pro Black, XTS
Tier 2
  • Antec - EDGE, TruePower Classic
  • Azza - Platinum
  • Cooler Master - VSM-series (semi-modular)
  • Corsair - Most RM variants, HX, "grey label" TXM
  • Enermax - Digifanless, RG, GX
  • EVGA - GQ, B2, 550W and 650W GS
  • Fractal Design - Edison M, Tesla R2 650W/1000W, Newton R3
  • FSP - Hydro G, Dagger SFX
  • Gigabyte - XP1200M
  • NZXT - Hale82 N higher-wattage versions
  • Rosewill - Quark, Fortress, Capstone
  • Seasonic - S12G, G-series/SSRM, M12II 750W/850W
  • Sentey - Solid Power SS
  • Super Flower - Golden Green, Leadex Silver
  • Thermaltake - Toughpower Grand/RGB, Toughpower Grand Platinum, Toughpower DPS Platinum
  • XFX -  Pro XXX, XTR, TS Gold
Tier 3
  • Antec - High Current Gamer, Neo ECO
  • be Quiet! - Straight Power E10
  • Bitfenix - Fury 
  • Corsair - "Grey unit" CXM***, CSM, some RM variants
  • Deepcool - DQ-ST
  • Enermax -  Enermax Revolution SFX 650W***
  • Fractal Design - Tesla R2, Integra M
  • FSP - Hydro X
  • Lian Li - SFX-L
  • LEPA - G600
  • NZXT - Hale82 N lower-wattage units
  • OCZ - ZX
  • PC Power & Cooling - Silencer Mk III, Turbo Cool
  • Rosewill - Lightning, Silent Night, Tachyon, Photon
  • Seasonic - M12II 520/620, M12II EVO 520W/620W, S12II, ECO 430W
  • Silverstone - Gold Evolution, Strider Gold, SX700 SFX
  • Super Flower - Platinum King
  • Thermaltake - DPS Gold/RGB, London, BlueEvo 2.0, Smart Pro RGB
  • Vivo - 24K 650W
  • XFX - Core, ProSeries Bronze, TS Bronze
  • Zalman - EBT
Tier 4
  • Antec - EarthWatts/EA Green, Earthwatts Platinum
  • be Quiet! - Power Zone, Pure Power L9, Straight Power E9, Pure Power L8
  • Corsair - Old CXM "Green unit" variants, Rev. 3 "Green unit" variants
  • Cooler Master - GM, GX Storm
  • Cougar - LX
  • Enermax - Revolution X't
  • EVGA - 600B/700B (don't buy the 700B, I don't understand why it exists), NEX-series gold-rated units, BQ
  • Fractal Design - Tesla R2 500W
  • FSP - Aurum Pro, Aurum, Hydro
  • Inwin - Classic Series
  • Rosewill - Capstone G
  • Seasonic - SS, SSP
  • Silverstone - Strider Plus, Gold SFX
  • Thermaltake - Toughpower Gold, Paris
Tier 5
  • Antec - Basiq VP-F, Basiq BP
  • Corsair - Rev. 2 CX "Green unit" variants
  • Enermax - NaXn 82+
  • EVGA - 450B/500B, NEX-B
  • OCZ - ZT, ModXStream
  • Rosewill - Glacier
  • Silverstone - Bronze SFX
  • XFX - XT
Tier 6
  • Antec - Basiq VP
  • Cooler Master - B2
  • Corsair - VS
  • EVGA - 430W/500W/600W 80 PLUS units
  • FSP - Raider Silver
  • Fractal Design - Integra R2
  • LEPA - MX-F1
  • NZXT - Hale82 V2
  • OCZ - Fatal1ty
  • Rosewill - Hive, ARC (M)
  • Silverstone - Strider Essential
  • Thermaltake - LitePower, ToughPower, Smart series
  • Zalman - GS/GT
Tier 7 - Worst
  • Cooler Master - Elite series
  • EVGA - 400W non-80 PLUS certified
  • FSP - Hexa
  • Thermaltake - TR2
  • These are all crap

Print this item

Star International Computer Parts List
User Avatar Forum: Computer Overclocking, Customizing, and Hardware
Posted by: Japanese - 09-02-2018, 07:30 PM - No Replies

Here is a list of retailers that sell computer components from various countries in case the country you live in or the user who you're making a build for lives in an area that is not supported by PCPartPicker.

Keep in mind that the world is an everchanging place, some vendors may no longer be active or may have been bought out by another competitor. 
Double check your country's business listing for accuracy!

North America

PC Domino
PC Mexico
Digital Life
Dimercom Mexico
PC Digital
PC Experts
Tunueva PC

Central and South America (includes Caribbean)
New Bytes
Big Point Computadores

Mega Mamute <--- caters more to gamers
Oficina Dos Bits <--- caters more to office PCs but sells gaming parts
Balão De Informatica <--- Best Buy type store that sells PC parts
E Armasem
Sysconn <--- huge selection, sells lots of gaming and overclocking specific components
The Terabyte Shop
X5 Computadores
Chip Art Informatica
Big's Online
Compu Job <---- sells pre built rigs and PC parts

PC Ofertas
PC Factory

Costa Rica

Cubix <--- ships to Costa Rica, Dominican Republic, and Guatemala, mainly sells pre built rigs and a few components but nothing like Newegg

Info Shop

Tecno Mega


Intercom Mex Jamaica <--- ships to multiple countries in Central and South America as well


Grupo Importek



Australia and South Pacific
PC Case Gear
Mwave Australia
Scorpion Technology
IT Estate
Static ICE Price search engine

Preis Suchmaschine
My Lemon

Forcom Multimedia Hotshop <--- Sells lots of overclocking, cooling, and gaming-specific components
Info Occases <--- Kind of like a Radio Shack for Belgium, sells more accessories (ink, toner, wires, etc) with a few PC parts on the side
Bytes At Work <---- Geared toward gamers

Labtech Data
Fonix Computer
EDB Priser


Tieto Friikki <--- Radio Shack for Finland, sells PC parts
Verkko Kauppa
Jimm's PC Store
Only 4 Pro <--- Geared toward servers and home theater components

PC Look (France, has English version) Well organized, have some very high quality parts. They look like the have a good selection and water cooling also.
Magic PC
Grosbill <--- geared toward gamers and enthusiasts
Rue Du Commerce

E Shop

Geizhals Preisvergleich
Warehouse 2


Start <-- sells lots of networking, overclocking, and cooling components
Omnis <-- electronics and gadgets store for Iceland, sells PC parts in addition to games and consoles
OK Búðin
Verslun TRS


Giga PC <---- Electronics store, sells PC parts
Planet Computer Pisa <--- sells liquid cooling and overclocking components
Alien PC
Computer Discount
Mon Click <---- Sells networking components
Next HS

MA 1
Grupa Dateks

Ultra Malta

Vobis Computer

Dustin Home <--- Best Buy / Fry's type store for Norway, sells PC parts
Tofte Elektriske

Kuanto Kusta
Modding World <--- geared toward gamers and sells overclocking components
FJM Hardware Solutions
Clikfiel Informatica
Atlas Informatica <--- sells gaming-specific hardware and overclocking components

Misco Sweden Tigerdirect for Sweden.
Max FPS <--- geared toward overclockers
PCB Hardware Distribution
Baron Dator

Preis Suchmaschine

Eastern Europe
Armenia <--- Authorized Asus reseller and distributor, doesn't have much of a variety of components though

Bosnia And Herzegovina
Kim Tec

Multi Rama
Speed Computers
Voodoo Computers
Fly System


Czech Republic
Alfa Computers
Heureka <------ PC Part Picker style, also helpful for finding lots of other goods
Centrum Obchodu <--- Kind of like a Best Buy / electronics type store
FT Trade Group <--- sells PC Parts in addition to lots of other goods

Algorithm Computer Shop

MCS Computer

Alti Doo

Hard PC
Media King <--- Geared toward home theater PCs
Pro Line

Extreme Computers <--- sells overclocking components
PC Fun
PC Coolers <--- Gaming and modding specific, similar to

Micro Systems
Emmi <--- has an incredibly helpful PC Part Picker style configurator
Winwin (same stuff as emmi @ higher prices)
Qbit Computers


GG Shop

East Asia
Newegg China <--- Yes, Newegg does have an official Chinese distribution site
360 Buy
IC Son
51 Buy
Beijing E Cyclone
Wai Fong International

Quantum Computers
Enter Komputer

Bic Camera <--- This is a Best Buy / gadget type store but they do sell PC parts
PC Depot
Faith GO <--- Gamestop for Japan, sells PC parts and pre-built rigs in addition to games and consoles
Joshin <--- Store retailer only, no online shop
Two Top <--- sells pre-built rigs and PC parts
Dospara <--- geared toward gamers and overclockers


PC Hub
PC Express
PC Worx
Dynaquest PC Sales
Wired Systems
PC Madness -
VillMan Computers -

CH Computer <--- Geared toward overclockers

South Korea
Da Na Wa <---- Amazon style place that sells PC parts in addition to lots of other goods
PC 4 All

PC Store

TK Com 99
Invade IT <--- geared toward gamers and overclockers


Western Asia and Middle East
Advanti Online

Al Nabaa

Cooling Sys

Logic PC
Gold Top Computers
Sky PC <--- sells pre-built rigs and PC parts
Zig Zag 2000 <--- sells pre-built rigs and PC parts
KSP <-- not the best selection but competitive prices and has information in English, Hebrew, and Russian
Zap <--- Department store that sells PC parts in addition to lots of other goods
1 PC

PC Zone Shop

Saudi Arabia
Asbis Saudi <--- also ships to Qatar, Oman, UAE, and Yemen

Hepsi Burada <--- Amazon type place that sells PC parts in addition to lots of other goods
Tekno Biyotik <--- Geared toward gamers and overclockers
Eksen Biligisayar
Vatan Computer

Gridz Direct
Uber <---- geared toward gamers and overclockers

Quality Data Systems

FDC International

South Africa
The Prophecy Shop
ComX Computers
Landmark Computers
Rebel Tech
Rock Bottom <--- sells overclocking and networking components
Rampage Gaming <--- geared specifically toward gamers and enthusiasts
Firefly Tech <--- Best Buy type store for South Africa
Vidicom IT <--- sells pre-built rigs <- amazon style <- ebay style

3CI International
Group Carrefour Informatique
Micro Computers International

Indian Subcontinent
Flipkart Much like Amazon for India
The IT Depot
Lynx Chandigarh
Swami PC
MD Computers

Pakistan Office Products

Central Asia
Bersar <---- gaming specific
DL Computers
Pulser <--- Authorized Asus reseller and distributor

Overhard <--- geared toward overclockers
UL Mart
Just Com Russia
Dom Comp
Omsk <--- Gaming specific
Techno Style
Meijin <--- Russian version of Digital Storm, sells pre built rigs and PC parts

Print this item

Star August 6 2018
User Avatar Forum: News
Posted by: Viper - 08-06-2018, 12:57 PM - No Replies

  • Added a new guest warning
  • Added a new thank you system
  • Fixed permissions for registered/l33t and r00t tier. 

For site updates follow the news subforum or twiiter

Print this item

  4 de agosto 2018
User Avatar Forum: News
Posted by: Viper - 08-04-2018, 01:23 PM - No Replies

  • Styled usernames are now globally visible 
  • New and improved mobile theme, old one was removed.
  • A Easter egg 
  • 404 
  • Shotbox, it now sits at the top and isn't broken. 
Small changes but a long way to go still.

Print this item

  August 3
User Avatar Forum: News
Posted by: Viper - 08-03-2018, 10:06 PM - No Replies


  • Added some new stars for the entire staff team and some black stars for root. Not 100% done, maybe like 40% done cause I'm too lazy to change the image source. 
  • 2FA is now accessable for anyone registered, won't make security a premium option. Avoid locking yourself out or losing access to your account.
  • Added a shotbox but having issue with a security issue while editing the global page. Have to contact my host for this to be fixed. Till then we have a broken shotbox.
  • Shity mobile theme, might get replaced if I can't edit it the way I want
  • Some back site stuff meant only for Admin eyes, don't worry about it doesn't impact you in any way...yet.

Print this item