Ads 468x60px

Friday, October 21, 2011

Security Threat Report 2011 Released


Malware is complex, seemingly everywhere and is often difficult to stop. It knows how to find your data?even on your mobile device and Mac. Targeting high-profile organizations, damaging data loss incidents and web threats — such as fake antivirus and SEO poisoning – continue to make headlines for malware attacks this year.

Wednesday, October 19, 2011

Exposure about privacy on facebook !



“Here we have the world's most comprehensive database about people, their relationships, their names, their addresses, their locations and the communications with each other, their relatives, all sitting within the United States, all accessible to U.S. intelligence.”
If you had any doubts regarding privacy on facebook, here is a list containing hundreds of user and password, how can this be ? Easy, any application that asks for permission can get your credentials!

Web Cookies Sniffer


WebCookiesSniffer is a new packet sniffer utility that captures all web site cookies sent between the web browser and the web server and displays them in a simple cookies table. The upper pane of WebCookiesSniffer displays the cookie string and the web site/host name that sent or received this cookie. When selecting a cookie string in the upper pane, WebCookiesSniffer parses the cookie string and displays the cookies as name-value format in the lower pane.

Sesame Channel Hacked, Porn Posted

On Sunday afternoon, some of the world’s worst lowlifes decided to hack the Sesame Street YouTube channel and replace some of the videos with pornographic clips.
For about 20 minutes yesterday, visitors to the YouTube channel of the popular children’s show saw hardcore porn instead of Elmo and Big Bird. The channel has nearly 150,000 subscribers, and usually hosts dozens of clips from the PBS program.But Sunday, the hackers replaced the page’s banner to read,

10,000 accounts hacked by TeamSwaSTika


Another group of Hackers, self titled Team Swastika, have caused panic amongst Facebook users after releasing the details of 10,000 accounts onto popular text sharing site, Pastebin. 
Pastebin, usually used to share source code, has frequently been host to a number of text files that contain the details of specific hacks by hackitivists and hacker groups. 

"Times of money" Database Hacked


{Source: The Hackers News}
General Information About the Vulnerability
This is again a critical vulnerability discovery made by zSecure Team in TimesofMoney website. The group claims that there exist a critical SQL Inejction Vulnerability in the timesofmoney's website using which an attacker can gain access to the site's entire database which contains the huge amount of customers confidential information. Even many indian banks are availing the service of the timesofmoney. This vulnerability may prove to be very critical for the company because TimesofMoney is India's one of the leaders in e-payment system. Existence of such a critical flaw in company's web may cause huge to the existing market reputation of the company concerned.

Social Engineering Toolkit Released


The Social Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of penetration testing. It’s main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed.

Hacking Password Protected Sites

There are many ways to defeat java-script protected websites. Some are very simplistic, such as hitting
[ctl-alt-del ]when the password box is displayed, to simply turning offjava capability, which will dump you into the default page.You can try manually searching for other directories, by typing the directory name into the url address box of your browser, ie: you want access to www.target.com .

Hacking Voicemail System

 Voice Mail is a relatively new concept and not much has been said about it.
It is a very useful tool for the business person and the phreak.  The way it
works is that somebody wishing to get in touch with you calls a number,
usually a 1-800, and punches in on his touch-pad your mailbox number and then

101 Ways To Increase Blog Traffic

This summary is not available. Please click here to view the post.

AIO Password Recovery Tools


 Recover Gmail , Gtalk, MSN, Windows Live , AIM Passwords
AIM.Password.Recovery.v1.09.Incl.KeyGen-F4CG
FileZilla.Password.Recovery.v1.05.Incl.KeyGen-F4CG
Gmail.Password.Recovery.v1.10.Incl.KeyGen-F4CG
Google.Password.Recovery.v1.10.Incl.KeyGen-F4CG
Google.Talk.Password.Recovery.v1.10.Incl.KeyGen-F4CG
PalTalk.Password.Recovery.v1.09.Incl.KeyGen-F4CG
Password.Recovery.for.MSN.v1.08.Incl.KeyGen-F4CG

INSTALLING XP IN 10 MINUTES!


STEP1 : After the Copy Part is Over … System is Rebooted as we all know In general Foramatting Procedure…
Now After Reboot The Below Image Will Appear….
STEP 2: Now As This Image APPEARS You Have to Press  ”Shift + F10 ”  . This Will Open The command Prompt…  Now type  taskmgr  in it. This will open the Task manager .

Tuesday, October 18, 2011

Pii Protection

Protecting personally identifiable information:
Virtually every organization acquires, uses and stores personally identifiable information about its customers, employees, patients, students and other individuals. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or otherwise compromising this data can carry a steep financial cost, damage a business’s reputation, and even lead to criminal prosecution, because of complex and frequently changing regulations. This white paper examines the challenges organizations

Charge Your Laptop In Few Munites


By using this technique will not charge you to sit for hours. U.S. Illinois University scientists have developed a technique through which your laptop or mobile will be charged in very less time . Three-D nano-structure is based on the technique used this technique not only mobile and laptop batteries to be charged but for the operation of the patients used the great big machines will be charged batteries in minutes with this technique.

Bypass Window XP Without Password


Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
You have several options to try and get around this problem.
If you have access to another user account with administrator rights, you can use that account to change the password
of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.

Hacking Start Button



Window's Tweak: Hack Your Start Button
I've gotten so many requests on how to change the Windows XP Start button, I'm going to teach you how to hack it to pieces manually.
Before you get started, you might want to print out this page for easy reference.

Hacking Webpages


Getting the Password File Through FTP
Ok well one of the easiest ways of getting superuser access is through
anonymous ftp access into a webpage. First you need learn a little about
the password file...

Cracking Zip Password Files


Tut On Cracking Zip Password Files..
What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.

Spyware Info


There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.
What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product,

Making Free Phone Call


Have you ever got stuck some ware and just about 6'ft away from you there is a pay phone, but yet you dont have any change(=( bummer) to call your famaly members or some one to come and pick you up(hehe that sux)?

Make Windows XP Run Faster


Services You Can Disable
There are quite a few services you can disable from starting automatically.
This would be to speed up your boot time and free resources.
They are only suggestions so I suggestion you read the description of each one when you run Services
and that you turn them off one at a time.

Making Animated Logo

How To Make An Animted Logo, the easy way
Things you will need:
QUOTE
1. Photoshop or Paintshop (any versions)
2. Xara3D 5.xx
3. Jasc animation shop 3.xx
4. DUH!! A pic you want as a logo LOL

20 Great Google Secret

Google is clearly the best general-purpose search engine on the Web
www.pcmag.com/searchengines
But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.