Receive Daily Updates

Enter your email address:

Showing newest 31 of 124 posts from 5/1/10 - 6/1/10. Show older posts
Showing newest 31 of 124 posts from 5/1/10 - 6/1/10. Show older posts

Monday, May 31, 2010

German Underground Forum Carders.cc Hacked

Hackers have penetrated German underground forum carders.cc, copied login details, e-mail addresses and private e-mails from several thousand members and published them on RapidShare. According to a list seen by The H's associates at heise Security, the forum software had also logged the IP addresses of nearly one thousand members over a specific period. These have also been published.

The forum was used by criminals for various illegal activities, such as trading stolen credit card details and login details for online games. As well as posts from forum members, the SQL dumps from the forum application uploaded to RapidShare unfortunately also include a range of victim-related data.

The unidentified hackers may well be the same group which hacked the 1337-crew underground forum in late 2009 and likewise published the stolen data – in response, German police arrested a number of forum members and administrators.

This time around, the hackers have published information on how they hacked the site in a magazine-type format entitled 'owned and exposed'. They point out that their hack was made easier by the laxness of the access rights to the Linux system assigned by the administrator. Reportedly, all users had read access to the entire system including /root, and the web server account was set up as owner of all files.

In a German language message to their members, the group behind carders.cc describes it as "a dark day for the scene" and apologises for logging IP addresses. They add that this was not done deliberately, but was the result of an error by administrator Zagerus, who has now been "suspended". They anticipate that only the team behind the site will be caught up in any legal investigations.

This strike against criminals who spend their time hacking other people's servers may give rise to a degree of malicious joy, but the hackers' actions have also resulted in data belonging to unwitting users being spread around the internet. It seems less a simple case of 'good vs. evil', more a conflict between competing groups with resultant collateral damage.

SOURCE: http://www.h-online.com
read more "German Underground Forum Carders.cc Hacked"

Cyber crime expands: Hackers can rent Botnets

If the unlimited virus concerns are troubling you, then there's more. Now, botnets are available on rent for as cheap as $67 for 24 hours or $9 for an hour. This empowers anyone to launch distributed denial of service (DDoS) attacks, sell fake antivirus software and relay spam to unsuspecting email users via millions of compromised PCs.

The cyberpunks are unanimously, hawking their wares via online forums and banner advertising. This readily reduces the barriers to entry for criminals who can't code, empowering relatively unskilled cyber criminals to inflict major damage and financial loss. "Organizations need to be wary of the fact that their critical online applications or services could be taken down in under a day by a criminal renting services from bot herders," said Rick Howard, director of intelligence at iDefense, a VeriSign's security intelligence service. It was an iDefense report that highlighted the entire botnet selling picture.

The business impact is witnessed when it's revealed that Zeus, a botnet which is around 3.6 million compromised PCs in the U.S. alone, is sold in the criminal underground as a kit for around $3,000-4,000. In June 2009, security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster, ABC, Oracle, Cisco, Amazon, and BusinessWeek The full-fledged botnet comes with different add-ons and price tags for, instance an upgrade for attacking Windows 7 or Vista is priced at $2,000 or for Jabber IM broadcasting to receive stolen data in real time it costs $500. So, soon any whiz kid, who wants to opt for easy money can ease his appetite with a little cash, at the cost of financial security of others.
read more "Cyber crime expands: Hackers can rent Botnets"

Hacker posts Hitler photo on State House website


The official website of State House was last evening pulled down after unknown people hacked into it and posted a picture of the Nazi German dictator Adolf Hitler. The image stayed on the site for more than 24 hours having been posted on Saturday until about 4:00pm on Sunday when the site was finally pulled down.

The hacker claiming to be called Kaka Argentine posted the photo of Hitler with a Nazi Party symbol on his chest on Saturday. The controversial posts, conspicuous on the home page, were posted below the picture of President Museveni greeting the Masaka Municipality MP, John Kawanga during a meeting at Munyonyo Hotel on May 25.

This is not the first time the strangers hijack the government departments’ website.
Last year, hackers calling themselves “the Ayyildiz team” posted pro- Palestine items on the website of the ministry of defense, accusing Israel of killing innocent Palestinians.

The presidential press secretary, Ms Linda Nabusayi, said they had received information that the posts were a result of an internal wrangle within the company that had been outsourced to manage the website.

“I have been told that the external service providers have issues within their company and that one workers who has since left could be the one behind this,” she said.

ICT Minister Aggrey Awori said State House has been a target of such attacks and blamed the cyber crime on opposition elements both within the country and outside whom he said were in the business of “electronic harassment” against State House and the government.

He said a new set of cyber laws that the government is pushing forward will help “track them and put them away”. Ms Nabusayi said State House would terminate the contract of the service provider.

SOURCE: http://www.monitor.co.ug
read more "Hacker posts Hitler photo on State House website"

Download Office 2010 All-in-One For Dummies: The Leading Book on MS Office

Publisher: For Dummies 2010 | 816 Pages | ISBN: 0470497483 | PDF | 23 MB

The leading book on Ms Office, now fully updated for Office 2010

Ms Office, the world’s leading productivity suite, has been updated with new tools. Veteran Office users as well as newcomers will need the comprehensive information in this bestselling All-in-One guide. With a self-contained minibook devoted to each Office application plus minibooks on how Office works together and how you can expand its usefulness, Office 2010 All-in-One For Dummies gets you up to speed and answers the questions you’ll have down the road.
Ms Office is the office productivity suite used around the globe; nearly every business worker encounters it daily The 2010 revision will affect all applications in the suite Eight minibooks cover Word, Excel, PowerPoint, Outlook, Access, Publisher, common Office tools, and ways to expand Office productivity Also covers the new online versions of Word, Excel, and PowerPoint as well as changes to the interface and new tools and techniques Office 2010 All-in-One For Dummies makes it easy to learn to use Office and gets you up and running on all the changes and enhancements in Office 2010.

read more "Download Office 2010 All-in-One For Dummies: The Leading Book on MS Office"

Download Microsoft Office 2010 Blue Edition Free

Microsoft Office 2010 Blue Edition Multi4 Update 30052010[Fully Activated Forever] | 790MB
Microsoft intends to release Microsoft Office 2010 Technical Preview to invited guests who register to sign up for Office 2010 CTP Program only by July 2010. Office 2010 was previously known by codename Office 14 (taken cue from its version), and wrongly assume to be Office 2009. The setup installer of both 32bit (x86) and 64bit (x64) Office 2010 Technical Preview 1 (TP 1) has been leaked to BT network. The leaked Office 2010 Technical Preview 1 has the version of 14.0.4006.1010, a pre-trial version provided to premium Microsoft partners.
It's unclear whether it is the leaked Office 2010 TP1 build will be the version that is going to be released officially by Microsoft in July. And it's still unclear yet whether Microsoft will make available publicly for Office 2010 Beta downloads, which is said to be will be having 2 betas - Beta 1 in July 2009 and another Beta 2 in November 2009. The betas is said to be different from Technical Preview, where TP is just meant as an engineering milestone for the development of Office 2010 and related products that leading to RTM that will reach in July 2010, according to Office 2010 IT Blog. Office 2010 is expected to RTM and released as final product in May 2010, with the exception of Exchange Server 2010, where Exchange Server 2010 beta already available from official download links.

The setup installer of the leaked download will install Microsoft Office Plus 2010 edition, with Access 2010, Excel 2010, InfoPath 2010, OneNote 2010, Outlook 2010, PowerPoint 2010, Publisher 2010, and Word 2010. Project Professional 2010, SharePoint Designer 2010 and Visio Professional 2010 are also included in the leaked RAR archive download. Office 2010 supports Windows XP SP3, Windows Vista, and Windows 7.

Important note is that Office2010 TP 1 is still in early stage of development, and may contain bugs, although most individual programs such as Word 2010 and Excel 2010 are usable in everyday life. It?s also interesting to know that Office 2007, the predecessor of Office 2010, is version 12. Office 2010 will be version 14, skipping version 13, the number that Microsoft assumes may be not so lucky.

Download from hotfile:
http://hotfile.com/dl/45747454/a2624a5/bLuE-aCtIvAt3d.part1.rar.html
http://hotfile.com/dl/45747617/762c0f0/bLuE-aCtIvAt3d.part2.rar.html
http://hotfile.com/dl/45747650/f3187ea/bLuE-aCtIvAt3d.part3.rar.html
http://hotfile.com/dl/45747681/2e20d3e/bLuE-aCtIvAt3d.part4.rar.html
http://hotfile.com/dl/45747732/c4b5cce/bLuE-aCtIvAt3d.part5.rar.html
http://hotfile.com/dl/45747785/56ac78c/bLuE-aCtIvAt3d.part6.rar.html
http://hotfile.com/dl/45747803/f4aafb6/bLuE-aCtIvAt3d.part7.rar.html
http://hotfile.com/dl/45747818/164d922/bLuE-aCtIvAt3d.part8.rar.html
Download from uploading:
http://uploading.com/files/dc95f75a/bLuE-aCtIvAt3d.part1.rar/
http://uploading.com/files/b61d6f45/bLuE-aCtIvAt3d.part2.rar/
http://uploading.com/files/fea274e1/bLuE-aCtIvAt3d.part3.rar/
http://uploading.com/files/355eceam/bLuE-aCtIvAt3d.part4.rar/
http://uploading.com/files/393f54ce/bLuE-aCtIvAt3d.part5.rar/
http://uploading.com/files/b2m413fc/bLuE-aCtIvAt3d.part6.rar/
http://uploading.com/files/b99353em/bLuE-aCtIvAt3d.part7.rar/
http://uploading.com/files/7846a248/bLuE-aCtIvAt3d.part8.rar/
read more "Download Microsoft Office 2010 Blue Edition Free"

How to Optimize System Performance: Magic Memory Optimizer 8.2.1.511 | 1.7 Mb

Magic Memory Optimizer 8.2.1.511 | 1.7 Mb

Whether you want to optimize your system performance or cleanse fragmentation collected in your system with as little effort as possible, Magic Memory Optimizer is the tool of choice. No other program is as feature-rich, yet as easy to use as Magic Memory Optimizer.

Magic Memory Optimizer is designed to tackle difficult but crucial problems of memory management. Memory is the most precious resource in your computer; when it becomes low, your computer will slow down severely or crash. Windows doesn't handle your memory properly by itself. Over time, no matter how much memory you have, Windows will slowly lose memory, bringing you to a critical state. Magic Memory Optimizer solves these problems by reclaiming lost memory for your programs.

BitBitCare PC Optimize System Inc. provides users with Free Magic Memory Optimizer and Magic Memory Optimizer (full function). Free Magic Memory Optimizer is totally free, however, some functions are limited. Users who registered Magic Memory Optimizer are entitled to have a license for all its features, excellent technical support and version upgrade.

read more "How to Optimize System Performance: Magic Memory Optimizer 8.2.1.511 | 1.7 Mb"

Antivirus Scanning Without Installation: Dr.WEB CureIt! 5.00.13 | 32 MB

Dr.WEB CureIt! 5.00.13 [22.05.2010] | 32 MB

Dr.WEB CureIt! is an antivirus and anti-spyware scanning tool that is developed on the Dr.WEB engine which will help you quickly scan and cure, if necessary, a computer without installation of the Dr.WEB Anti-virus.

Dr.WEB CureIT! automatically detects the language of the OS it is installed to and sets the scanner interface accordingly (if the local language is not supported, English is enabled).

Dr.WEB CureIt! supports the following languages: Russian, Arabic, Armenian, Bulgarian, Byelorussian, Czech, English, Estonian, French, Georgian, German, Greek, Hungarian, Japanese, Latvian, Lithuanian, Polish, Portuguese, Slovakian, Spanish, Ukrainian.

Dr.WEB CureIt! contains the most up-to-date add-ons to the Dr.WEB virus bases going up to twice per hour frequency at periods of high malware submissions

Dr.WEB CureIT! detects and removes
- Mass-mailing worms
- E-mail viruses
- Peer-to-peer viruses
- Internet worms
- File viruses
- Trojans
- Stealth viruses
- Polymorphic viruses
- Bodiless viruses
- Macro viruses
- MS Office viruses
- Script viruses
- Spyware
- Spybots
- Password stealers
- Keyloggers
- Paid Dialers
- Adware
- Riskware
- Hacktools
- Backdoors
- Joke programs
- Malicious scripts
- Other malware
Support of Chinese (China) and Dutch languages is added

read more "Antivirus Scanning Without Installation: Dr.WEB CureIt! 5.00.13 | 32 MB"

Hack Acrobat Adobe PDF Hacking | Edit PDF with PDF Suite Professional Edition

PDF Suite Professional Edition 2010 v9.0.32.36863 Portable | 29.56 Mb

PDF Suite allows you to read, create, convert, edit, review & secure PDFs. We don’t believe in a steep learning curve or in overpriced PDF applications. With PDF Suite’s intuitive interface, you’ll start managing electronic documents within minutes!

PDF Suite Professional 2010 PDF Suite Pro is compatible with any PDF application and fully integrated with Microsoft Office. You can manage any document created with Adobe Acrobat Version 9 or older. PDF Suite PRO allows you to create your own PDF files, secure your documents.

View PDF
PDF Reader feature: view, print, search & save PDF files, Adobe Acrobat documents.
Read PDF
Manage PDF-based documents: reading, printing & searching.
Create PDF
PDF Converter function: create PDF documents software applications.
Convert to PDF
Generate PDF from any application with a right-click from Windows Explorer.
Edit PDF
PDF Editor to modify your PDF document formatting.
Format PDF
Modify & reorder page layout, objects, fonts & graphics.
Review PDF
PDF Review function: annotate, comment & indicate PDF archives changes
Annotate PDF
Add notes, highlighting & email PDF with a single-click.
Export PDF
PDF Export feature: save "PDF to Word" & "PDF to image" formats
Reuse PD
Save to Microsoft Word or image formats (.JPEG, .GIF, .PNG & .BMP).


read more "Hack Acrobat Adobe PDF Hacking | Edit PDF with PDF Suite Professional Edition"

Protect SWF Files From Flash Decompilers: Download SWF Protection 1.4 | 2.18 MB

SWFProtection 1.4 | 2.18 MB

SWFProtection is a strong and easy to use Flash SWF encryption tool which helps you protect SWF files from Flash decompilers. The program protects not only Actionscripts, but also all images, sounds, buttons and sprites resources in your SWF files.

SWFProtection can also stop your SWF files from opening on local computer and limit SWF files to be hosted on specified domains, which enables you to prevent others from downloading your SWF files, then opening them from their local computers or uploading to their own websites.

With the built-in Preloader maker, SWFProtection can help you add professional and customizable Flash Preloader to your Flash movie in just a few clicks.

SWFProtection works with AS2 and AS3, Adobe Flash Version 6, 7, 8, 9 and 10. The program runs on all versions of Windows, including 98, ME, XP, 2000, 2003 Server, Vista and 7, 32bit and 64bit.


read more "Protect SWF Files From Flash Decompilers: Download SWF Protection 1.4 | 2.18 MB"

Friday, May 28, 2010

Mail Delivery Times and Realistic Expectations

This is guest post shared by Sheryl Owen

For as long as I can remember there has been a running joke about how long it can take the USPS to deliver mail. I think this somewhat tarnished reputation may be more due to people procrastinating and not actually putting the letter or package into the mail more than anything. With that said, I dug more deeply into just what the USPS says the American public should expect for standard delivery times. In addition to that I went ahead and did some research on how often they actually hit these standard delivery times as well as how the USPS rates compared to other governmental agencies in terms of public satisfaction scores. You might be surprised by the results.

Standard Delivery Times

One of the most important points that can’t be over-stressed is that for STANDARD mail, the USPS doesn’t make any guarantees at all (even that the letter or package will be delivered). That does not mean they won’t try to deliver every package in a timely fashion at all it just means that the sender doesn’t have any service guarantees to work with for standard mail.

As with most things in life and certainly in business, the responsibility lies with the sender to understand the levels of service and to plan properly to get things delivered in a timely manner. For instance it is not reasonable if you live in San Francisco, CA to send a birthday card to your mother in Cleveland, OH via standard mail and expect it to arrive the next day. The smartest thing to do would be to plan to the outside window for standard mail which is 9 days and make sure you send Mom’s birthday card 9 days early.

As promised early on in the article, I did some research on how often the USPS actually meets their stated delivery times and the answer was 96% of the time for overnight express mail and no worse than 93% of the time for express mail. In addition, according to a recent study by GfK Roper Consulting, 92% of the American public is very happy with the service provided by the USPS (92% of the respondents rated the service very good). You can read more about this at National Association of Letter Carriers website (nalc.org). The bottom line is that the USPS does deliver on their service promises and most people do recognize their commitment to service. Here is a quick breakdown of public perception of the USPS versus other governmental agencies:

read more "Mail Delivery Times and Realistic Expectations"

Thursday, May 27, 2010

First Human Infected With Computer Virus | Hacking into Human Body

Let the hysteria begin: Computer viruses have apparently made the leap from PC to person, BBC News reports.

Mind you, this was all intentional. British scientist Mark Gasson of the University of Reading introduced a computer virus into an RFID chip (similar to the chips implanted in pets to identify them if they go missing) and then implanted the infected chip into his own hand.

In its uninfected state, Gasson's chip lets him pass through secured doorways and turn on his cell phone, so it has practical real-world capabilities.

An infected chip could pass malicious code on to chip scanners as, say, the bearer passes through a security door. The virus could then spread to other systems in the network, depending on the complexity and cleverness of its programming.

Right now this is just a proof of concept, but it’s a sobering one in a world where "touchless" networking systems like RFID are becoming more and more commonplace, while the security of these systems has been largely ignored.

Recently issued passports, which include an RFID chip now by default, have already been subject to extensive hacking attempts — and numerous hacking successes. Some people even suggest whacking your passport with a hammer to disable the RFID chip inside. (We don't endorse this, however.)

What happens when you have an actual RFID implant? BBC News notes that these chips are becoming popular receptacles for medical information, so that if a person is unconscious, medical responders can still determine if someone has a critical allergy or a rare condition that a hospital might need to be aware of. What happens if a virus scrambles or even reverses this information?

The issue of viruses moving from computer to human may not be the nightmare that Hollywood makes it out to be — but the threat is becoming more real than we might like to believe.
read more "First Human Infected With Computer Virus | Hacking into Human Body"

Wednesday, May 26, 2010

Learn to crack any version of Winrar – An Introduction to Cracking Part 2

Sorry for a late update folks..My final exams are here and hence I was a bit busy in studies (and playing Metal Gear Solid 2 if anybody cares :D ). As I have less time to blog, I might as well write a quick and dirty guide to crack Winrar using 2mo6rrn11Ollydbg this time. Ollydbg is a debugging program which I tout as the best debugging and disassembling program available to us,the lesser mortals. It has an extremely intuitive interface (although at first run, it might be cryptic for many) and one can write off their own plugins to extend functionality. You must have a basic idea of memory address and assembly language, or you might want to read the part one of this tutorial - Learn to crack any version of Winrar – An Introduction to cracking

 

Update -

Hi Folks..Due to sheers amount of load the initial post was taking, I had to move the post on cracking winrar from my homepage to here

 

Like This post ?  You can buy me a Beer :)

Posted by XERO. ALL RIGHTS RESERVED.

read more "Learn to crack any version of Winrar – An Introduction to Cracking Part 2"

Monday, May 24, 2010

How to send Bulk Emails & Newsletters to Your Customers

Kristanix Email Sender Deluxe 2.24 | 9.40 Mb

With Email Sender Deluxe, sending out personalized bulk email and newsletters to your customers and clients just got a whole lot easier! Simply choose your recipients, write your email and hit Send! You can easily import recipients from databases, Excel, text files or enter them manually. You can store email templates, so you don't have to type the whole newsletter again the next time you send one. If you send out newsletters regularly or need to notify your customers about new products and services, Email Sender Deluxe is here to help you.

Features:
- Send personalized emails quickly!
- Easily import recipients from databases
- Import recipients from files
- Easy-to-use HTML editor
- Easily manage multiple "from" email accounts
- Store email templates for re-use later
- Personalize each email
- Preview all emails before they are sent.
- Insert both embedded images and images that are linked to.
- Send file attachments to all recipients.
- Send both plain text and HTML versions of the email.
- Use multiple email encodings such as languages and standards.
- Send using multiple connections for maximum speed.
- Automatically retry failed emails.
- Update latest recipients from databases and files automatically.
- Send using SMTP server, Direct Send (DNS) or Pickup Service.
- Easily manage "from" accounts, recipient groups and email templates.

Home Page - http://www.kristanixsoftware.com

Download - http://www.fileserve.com/file/sKrYjsy
read more "How to send Bulk Emails & Newsletters to Your Customers"

Boot Disk Download: Boot Disk Collection v1

Boot Disk Collection v1 (20/05/2010) | 1.5GB

Contain:
  • Sos Usb Boot Flash Drive 100509
  • LiveCD Windows7 by Xalex
  • Hiren's BootCD 10.4
  • Windows Key Enterprise 9.3.815
  • Acronis True Image Home Plus Pack 13.0.7046
  • Acronis Disk Director Server 10.0.2239
  • Paragon Hard Disk Manager 2010 Pro
How to use:
  • Burn with any good program, I recommend ImgBurn and UltraISO.
It is possible to work with USB:

Option number 1: You will need again UltraISO. Open the image from the distribution of the program, click the "self-loading" - "Burn hard disk image, choose your flash drive, the method of USB-HDD +, formatted in fat32 and presses" Enter. " UltraISO itself will automatically make your flash drive bootable, rename the configuration in syslinux and the interior, too, the only highly recommend to open it in notepad and check with your own eyes, may contain errors.

Option number 2: Find the manufacturer of your flash chip, download it at the desired utility and write the image to stick as USB-CDROM.

Download:
http://hotfile.com/dl/43851476/6cafec4/BootDiskCollection_v1.part01.rar.html
http://hotfile.com/dl/43852738/23473b3/BootDiskCollection_v1.part02.rar.html
http://hotfile.com/dl/43853695/9fe9743/BootDiskCollection_v1.part03.rar.html
http://hotfile.com/dl/43854400/8631e90/BootDiskCollection_v1.part04.rar.html
http://hotfile.com/dl/43855627/88a05aa/BootDiskCollection_v1.part05.rar.html
http://hotfile.com/dl/43858070/96be8b4/BootDiskCollection_v1.part06.rar.html
http://hotfile.com/dl/43861725/1ff929d/BootDiskCollection_v1.part07.rar.html
http://hotfile.com/dl/43858865/8ec3183/BootDiskCollection_v1.part08.rar.html
http://hotfile.com/dl/43860215/cdfab35/BootDiskCollection_v1.part09.rar.html
http://hotfile.com/dl/43859806/304a9a6/BootDiskCollection_v1.part10.rar.html
http://hotfile.com/dl/43864114/c2fa969/BootDiskCollection_v1.part11.rar.html
http://hotfile.com/dl/43868561/de3dddd/BootDiskCollection_v1.part12.rar.html
http://hotfile.com/dl/43861176/2279617/BootDiskCollection_v1.part13.rar.html
http://hotfile.com/dl/43871518/eeb6a67/BootDiskCollection_v1.part14.rar.html
http://hotfile.com/dl/43862937/e71f635/BootDiskCollection_v1.part15.rar.html
http://hotfile.com/dl/43863390/9ecd79f/BootDiskCollection_v1.part16.rar.html
read more "Boot Disk Download: Boot Disk Collection v1"

Download Free MP3 Music: Super MP3 Download

Super MP3 Download PRO v4.5.7.2 | 6.85 MB

FREE Music Downloads, Unlimited Listening Online, Billboard Hot 100, 14 Categories Of Hottest Songs And More! Super MP3 Download is easy to use application created to help you search and download over 100 million MP3 files. You can try the searched results to decide which one to download. Super MP3 download always brings you the hottest songs in the world; it recommends you the Billboard Hot 100 every week and lists the hottest songs of 14 categories, from electrical to religious, mainstream to indie, hip-hop to classical, etc. Besides, you can do advanced search by artist, title, album, and edition. You can even choose specific edition of live, piano, guitar or cover etc. to search. Super MP3 Download - Clean of any form of badware (viruses, spyware, adware, etc.) Get Super MP3 Download Pro version to enjoy more features - NO LIMITS on your downloads, advanced search enabled, download multiple songs at the same time and more!

Key Features:
• Over 100 Million MP3 for Free. Super MP3 Download is free to use. You can search and download over 100 million MP3 from the largest download network fast and FREE.
• Bring You The Hottest Songs. Super MP3 download always brings you the hottest songs in the world. We recommend you the Billboard Hot 100 every week and list the hottest songs of every category, from electrical to religious, mainstream to indie, hip-hop to classical.
• Unlimited Listen To Music OnlineSuper MP3 Download. You can unlimited listen to over 100 million songs online for FREE. You can try the searched results to decide which one to download.
• Advanced Search (With Pro Edition). Super MP3 download can search songs by title, artist, album, and edition. You can even search the live, piano, guitar or cover editions of your favorite songs.

Homepage:

http://www.super-mp3-download.com/

Download:

http://www.fileserve.com/file/d6ejhwk
read more "Download Free MP3 Music: Super MP3 Download"

Sunday, May 23, 2010

Windows 7 Ultimate 64Bit Cracked: Download Windows 7 Ultimate 64Bit

Windows 7 Ultimate 64Bit (2010-05-21) l 3 GB

Windows 7 Ultimate 64-Bit
Updated 21st May 2010

Release Notes
This has been made from the official Retail DVD, the only thing thas has been slipstreamed are updates up to the 21st May 2010. This DVD is not unattended.

Crack Instructions
- Install Windows 7 without using a serial key (install as Trial) or automatically Activating.
- Unpack the Windows 7 Loader .zip file (in the crack directory) to your Desktop.
- Run and Reboot. Your PC is now Genuine.

Included Hotfixes
  1. KB971033 - Update for Windows 7 for x64-based Systems
  2. KB971468 - Security Update for Windows 7 for x64-based Systems
  3. KB972270 - Security Update for Windows 7 for x64-based Systems
  4. KB974431 - Update for Windows 7 for x64-based Systems
  5. KB974571 - Security Update for Windows 7 for x64-based Systems
  6. KB975467 - Security Update for Windows 7 for x64-based Systems
  7. KB975496 - Update for Windows 7 for x64-based Systems
  8. KB975560 - Security Update for Windows 7 for x64-based Systems
  9. KB976264 - Update for Windows 7 for x64-based Systems
  10. KB976422 - Update for Windows 7 for x64-based Systems
  11. KB976662 - Update for Windows 7 for x64-based Systems
  12. KB977074 - Update for Windows 7 for x64-based Systems
  13. KB977863 - Cumulative Update for Media Center for Windows 7 x64-based Systems
  14. KB978262 - Cumulative Security Update for ActiveX Killbits for Windows 7 for x64-based Systems
  15. KB978542 - Security Update for Windows 7 for x64-based Systems
  16. KB978601 - Security Update for Windows 7 for x64-based Systems
  17. KB978637 - Update for Windows 7 for x64-based Systems
  18. KB979099 - Update for Rights Management Services Client for Windows 7 for x64-based Systems
  19. KB979306 - Update for Windows 7 for x64-based Systems
  20. KB979309 - Security Update for Windows 7 for x64-based Systems
  21. KB979683 - Security Update for Windows 7 for x64-based Systems
  22. KB980182 - Cumulative Security Update for Internet Explorer 8 for Windows 7 for x64-based Systems
  23. KB980232 - Security Update for Windows 7 for x64-based Systems
  24. KB980302 - Update for Internet Explorer 8 Compatibility View List for Windows 7 for x64-based Systems
  25. KB980408 - Update for Windows 7 for x64-based Systems
  26. KB981332 - Security Update for Windows 7 for x64-based Systems
read more "Windows 7 Ultimate 64Bit Cracked: Download Windows 7 Ultimate 64Bit"

Download Ethical Hacking Videos: Certified Ethical Hacker Training Version 6 - 2009 (4 DVDs) | 13.52 GB

If you want to stop hackers from invading your network, first you've got to invade their minds.
Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes.

The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival.

If hacking involves creativity and thinking 'out-of-the-box', then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of 'defense in depth'. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

To achieve the Certified Ethical Hacker Certification, you must pass the CEH exam 312-50

WARNING: Students are warned against attending CEH training at unauthorized training centers. Only those who attend CEH training at EC-Council ATCs are eligible for CEH certification. Also you will be required to show proof of official CEH training attendance when you apply for EC-Council's LPT certification and Master of Security Science (MSS) degree program.
EC-Council has certified IT professionals from the following organizations as CEH:

* Cisco Corporation
* Novell
* Canon
* Hewlett Packard
* US Air Force Reserve
* US Embassy
* Verizon
* Pfizer
* HDFC Bank
* University of Memphis
* Microsoft Corporation
* Worldcom
* Trusecure
* US Department of Defense
* Fedex
* Dunlop
* British Telecom
* Supreme Court of the Philippines
* United Nations
* Ministry of Defense, UK
* Nortel Networks
* MCI
* Check Point Software
* KPMG
* Fleet International
* Cingular Wireless
* Columbia Daily Tribune
* Johnson & Johnson
* Marriott Hotel
* Tucson Electric Power Company
* Singapore Police Force
* PriceWaterhouseCoopers
* SAP
* Coca-Cola Corporation
* Quantum Research
* US Military
* IBM Global Services
* UPS
* American Express
* FBI
* Citibank Corporation
* Boehringer Ingelheim
* Wipro
* New York City Dept of IT & Telecom - DoITT
* United States Marine Corps
* Reserve Bank of India
* US Air Force
* EDS
* Bell Canada
* Sony
* Kodak
* Ontario Provincial Police
* Harris Corporation
* Xerox
* Philips Electronics
* US Army
* Schering
* Accenture
* Bank One
* SAIC
* Fujitsu
* Deutsche Bank
* Symantec
* Sun Microsystems
* Google Corporation
* McAfee
* Dell Corporation
* Verizon
* Motorola
* Singapore Airlines
* Infosys
* TATA Consultancy
* Deloitte
* Oracle

Download from Hotfile:

http://hotfile.com/list/530230/3009d01

Download from Uploading:

http://uploading.com/files/538996m7/CEH6-loveyou4e.txt/
read more "Download Ethical Hacking Videos: Certified Ethical Hacker Training Version 6 - 2009 (4 DVDs) | 13.52 GB"

Download Shadow Government – DVDRip (2009)

Shadow Government – DVDRip (2009)
How the Secret Global Elite is using surveillance against you

SHADOW GOVERNMENT provides up-to-the minute analysis of the ever changing technological landscape and new evidence that an ultra-secret global elite controls technology, finance, international law, world trade, political power and vast military capabilities.

John Wilson wakes up, gets ready for his day and heads to work. He has no idea that he’s being watched, tracked and studied. Is he a threat to national security? Is he a terrorist or a criminal? No, he’s an ordinary American citizen. Like everyone else, John’s rights and freedoms have been systematically destroyed – all in the name of security and convenience. Is it about peace and unity? Or is it about ultimate global power? What if there were hidden forces with no ties to democracy or constitutional rights in power? What if new laws, media propaganda and Secret Societies labeled John a danger to society? And what if all this set the stage for a Biblically prophesied global government run by the Antichrist? Leading researchers, authors and minds like Grant Jeffrey, Dr. Katherine Albrecht, Edward G. Griffin, Daniel Estulin, Gary Kah, Chuck Missler, Joan Veon, Brad O’Leary and many others take you through the incredible and hidden world of Surveillance, Rights and Freedoms, Global Government and Bible Prophecy.

DOWNLOAD:
http://hotfile.com/dl/44283673/b671427/ShadowGovt.part1.rar.html
http://hotfile.com/dl/44283676/0a08a81/ShadowGovt.part2.rar.html
http://hotfile.com/dl/44283679/dc1b71a/ShadowGovt.part3.rar.html
http://hotfile.com/dl/44283680/3f99492/ShadowGovt.part4.rar.html
http://hotfile.com/dl/44283681/633ac13/ShadowGovt.part5.rar.html
http://hotfile.com/dl/44283682/f5666a1/ShadowGovt.part6.rar.html
read more "Download Shadow Government – DVDRip (2009)"

Hack Facebook | Hackers Can Delete Facebook Friends: Latest Flaw


A bug in Facebook's Web site lets hackers delete Facebook friends without permission.

The flaw was reported Wednesday by Steven Abbagnaro, a student at Marist College in Poughkeepsie, New York. But as of Friday morning, Pacific time, it had still not been patched, based on tests conducted by the IDG News Service on a reporter's Facebook friends list.

A malicious hacker could combine an exploit for this bug with spam or even a self-copying worm code to wreak havoc on the social network, Abbagnaro said in an interview.

He's written proof-of-concept code that scrapes publicly available data from users' Facebook pages and then, one by one, deletes all of their friends. For the attack to work, however, the victim would first have to be tricked into clicking on a malicious link while logged into Facebook. "The next thing you know, you have no friends," Abbagnaro said.

The security researcher is not going to release the code used in his attack until after Facebook fixes the flaw, but he says that technically competent hackers could figure out how to pull off the attack.

That's because Abbagnaro's code exploits the same underlying flaw that was first reported by M.J. Keith, a senior security analyst with Alert Logic.

Last week, Keith discovered that Facebook's Web site was not properly checking code sent by users' browsers to ensure that they were authorized to make changes on the site.

Called a cross-site request forgery bug, the flaw is a common Web programming error, but Facebook has had a hard time eradicating it from the site. After Keith first reported the issue, Facebook thought it had fixed the problem, only to discover that it could still be exploited to make users "like" Facebook pages without their consent.

Similarly, Facebook appears to have missed Abbagnaro's delete-friend vector as well.

"I am just blown away that this keeps happening," Keith said in an e-mail interview.

Facebook representatives couldn't immediately be reached for comment.

Facebook's security team has been under siege lately, with worm attacks and site flaws popping up on a regular basis. These security issues come as the social network has been hit with intense criticism for not adequately protecting users' privacy, and inappropriately sharing user data with advertisers.

Users have been quitting the social network and a campaign proclaiming May 31 as Quit Facebook Day has gained some traction.

Despite all of its other problems, Facebook should have fixed this latest flaw by now, Abbagnaro said. "I'm not sure why they haven't fixed it yet because it is pretty serious."
read more "Hack Facebook | Hackers Can Delete Facebook Friends: Latest Flaw"

Facebook Hacking: Facebook page that miffed Pakistan downed

The Facebook page that led to Pakistan banning access to the web site from within the country has been taken down.

Facebook denied having taken down the page itself, suggesting the author of the page - entitled Everybody Draw Mohammed Day! - had unilaterally decided it wasn't such a good idea after all.

Maybe it was downed by hackers. Details of a hack that allowed attackers to remove Facebook friends were published recently but a hack that allows pages to be downed has not been documented as far we we know.

The page had attracted more than 100,000 viewers most of whom were just curious, although many appeared rabidly bonkers.

Some maintained the effort was an attempt to highlight the importance of free speech. All very laudable but just because you can do something doesn't mean you should - especially if with the only aim of causing offence.

Pakistan moved quickly to block facebook and followed this up with a ban on YouTube.

It is not yet clear whether the disappearance of the page from Facebook will encourage Pakistan to lift the ban.
read more "Facebook Hacking: Facebook page that miffed Pakistan downed"

Hacking Commercial Quantum Encryption System | Commercial Quantum Cryptography System Hacked

Scientists have succeeded in completely hacking a commercial quantum encryption system for the first time ever.

Theoretically quantum cryptography - using quantum systems to encrypt information securely - is perfectly secure. To read more about Quantum Encryption, visit @ Hackers Beware: Quantum Encryption is Coming

It takes advantage of the fact that it is impossible to chalk out measurements of a quantum system without disturbing it in some way.

Thus, if two people produce a shared quantum key to encode their messages, they are almost sure no third party can eavesdrop without introducing errors that will show up when they compare their keys, setting off a warning.

However, in practice no quantum cryptographic system is perfect and errors will creep in due to mundane environmental noise.

Quantum physicists have calculated that as long as the mismatch between two person's keys is below a threshold of 20 per cent, security has not been breached.

But now quantum physicist Hoi-Kwong Lo and his team at the University of Toronto in Ontario, Canada, have hacked a commercial system released by ID Quantique (IDQ) in Geneva, Switzerland, while remaining below the 20 per cent threshold.

"Even with a relatively simple attack, the hacker can get the complete key, and nobody would know anything about it," Nature quoted Lo, as saying.

Lo's hack works by intercepting the bits that two people, say Alice sends to Bob, while creating the key, and resending a slightly modified version to Bob.

In standard quantum cryptographic techniques, Alice encodes each bit using the polarization of photons. When she sends these bits out, the polarization should be perfectly oriented in one of four directions, separated by 45 degrees (north, northeast, east or southeast).

In a perfect world, any hacking attempt would disturb a significant fraction of the bits' orientations, introducing errors just above the threshold.

But in practice, Alice cannot switch orientations for successive bits instantaneously - each time she wants to send a bit with a new orientation, she must change the voltage applied to the photon to shift its orientation.

This gives the hacker time to swoop in and hijack the bit before it is sent out to Bob, measure it, and then send it on its way again.

However, if the hacker simply sends the bit to Bob along one of the four orientations that Alice originally defined, his presence will be discovered because his measurements will introduce random errors into the system that exceed the 20 per cent limit.

But Lo's team has now shown that if the hacker sneakily sends the bits along slightly different directions, the errors introduced by his interference will fall just under the 20 per cent threshold at 19.7 per cent.

Gregoire Ribordy, chief executive of IDQ, says Lo's hack does not threaten the security of IDQ's commercial product, which contains extra alarms above those included in the version that was sold to Lo's group a few years ago. (ANI)
read more "Hacking Commercial Quantum Encryption System | Commercial Quantum Cryptography System Hacked"

Hacked original 'Draw Mohammed Day' Facebook page back online

Despite the best efforts of the talented Turkish cyberjihadi Ali Hassan, the original 100,000-member 'Everybody Draw Mohammed Day' Facebook page is back online with all photos, posts and links intact. Running commentary appears as lively as it was May 20.

The news has been flying fast and furious since Everybody Draw Mohammed Day kicked off May 20. Yet no news may be more important for EDMD proponents than reports that the original 100,000 member-strong EDMD page (update: 110,000) is now back up and running at Facebook after nearly two full days offline. That downtime was the direct result of Turkish cyberjihadi Ali Hassan's successful hacker attacks on the EDMD page creator's computer, and not Facebook self-censorship as many had speculated. The two mysterious and unexplained takedowns on May 20, which had left the main EDMD page inaccessible, reminded many of the South Park Mohammed censorship by Comedy Central. The reporting was not praising.

The newly accessible EDMD page contains apparently complete archives and posts, as well as photo albums with over 12,000 entries. The Jawa Report links a hot-off-the-presses interview with the Administrator of the hacked EDMD Facebook page group. Kudos to Facebook for standing up for freedom of speech, and in the face of withering fire directed at them by most everyone, from angry conservative bloggers to enraged Islamist extremists. On that note, the Lahore High Court (LHC) has asked Pakistan's Foreign Minister to lodge an official sovereign protest with the US Government over the "blasphemous" EDMD Facebook page. Now I'm not 100% sure about this one anymore, but aren't we outside of Lahore's legal jurisdiction?
read more "Hacked original 'Draw Mohammed Day' Facebook page back online"

Rediffmail - Spammed,Ad powered and defeated..

Ages ago,I use to have a Rediffmail ID,only to be harassed by poor spam filter,low space,barrage of ads and more quirks.I picked my gmail one approx 5 years ago and it beats rediff one hands on any day.Rediffmail - Spammed,Ad powered and defeated..Year later Rediff incarnates itself with a new mail system,advertises it self as faster and better with TV ads,but the bottom line remains the same - It sucks flatly !
I cant recall the number of reasons which makes it suck (they were too many) but keeping myself sane whilst writing this review makes me openfire at these points - 

POOR (-EST) SPAM FILTER
Yep..If you are a rediffian,and you email is picked up by a spammer,be prepared to get loads of emails proclaiming to enlarge your organs,get fake Rolex watches or even to get a fortune on your name. Even if you create filters and try to block them,they are persistent and the spam filter hits rock bottom when it comes to blocking of spam. 

AD-HEADACHES
Rediffmail literally makes your day by sending tons of ads in your inbox,worse,by embedding them in interface. Compare it with cleanest ad interfaces of Gmail. Ads are ultra annoying and eat up bandwidth. Feels like classic yahoo mail ? Its Yahoomail + lots of ads + spam = rediffmail 
POP3 Access
Rediff allows you to access POP for a premium (or 15 messages ) which is not worth the meager services it provides ! 

HORRIBLE CUSTOMER SUPPORT
You will think I m kidding,but rediffmail customer support answered my question after 3 weeks when I sent them a query regarding their encryption system,when i had forgotten that i had even sent them an email.Trust me,they need to improve their customer support to make a mark in the market.
However,I rediffmail seems to get some new tweaks under its mail engine,which must be mentioned here -
SPEED
Rediff has got speed,yep raw speed,the interface has it and you can feel it,but that makes me seriously wonder if they sacrificed some encryption algorithms to achieve this or make some cache in our hard disk..yep i am quite sceptic as a person :) 

The After Math
Well..what do you expect..Rediff sucks as compared to other email services and that's the flat truth. I moved on to Gmail aeons ago and have been enjoying all the perks which I can really enjoy (the labs,adsense,blogger,sms,feeds and even more) unlike rediff in which you get loads of offers which you can never redeem (the horrendous ads :P ) .
Email Me :)Keep Mailing me your views :)
POSTED BY XERO . ALL RIGHTS RESERVED.
read more "Rediffmail - Spammed,Ad powered and defeated.."

Friday, May 21, 2010

Google Celebrates Pacman – The Best Google Doodle Ever :)

As a special tribute to Pacman on its 30th anniversary, Google has unleashed the best Google doodle ever..an interactiveGoogle Celebrates Pacman ? The Best Google Doodle Ever :) - theprohack.com videogame (with full sound efx) on Google homepage..and that too is Pacman and Google at its best. Still Google is a day early as the legendary game was launched on 22 May 1980 in Japan 30 years before and has spawned numerous spinoffs altogether.But the classic has not lost its charm..not for me..ever..When folks at Namco were developing it,who knew that a game about pill chomping and eating ghosts can revolutionize the videogame genre.

The Videogame on Google homepage can be played by clicking on the “Insert Coin” button and Pacman can be controlled using mouse or using Keyboard..Love you Google :) The game will be live for the next 2 days and make sure you play it before,else you might be dusting off Google at Wayback machine.

Google Celebrates Pacman ? The Best Google Doodle Ever :) -  - theprohack.com

In the mean time, you can check out the game by clicking here or by going to Google home page.

( btw…i guess the chomp chomp voice is getting on my nerves while i m surfing net :| )

 

Like This post ?  You can buy me a Beer :)

Posted by XERO. ALL RIGHTS RESERVED.

read more "Google Celebrates Pacman – The Best Google Doodle Ever :)"

Free Penetration Testing & Vulnerability Assessment by Centuno Solutions

Secure business information environments start with powerful network security solutions and IT solutions that provide a secure framework critical to the safety and integrity of your business information.

Centuno Solutions can maximize your network security with customized solutions. From vulnerability assessment to network security solutions, experts can eliminate your security risks while ensuring the seamless operation of your business applications.

'One Stop Shop' concept eliminates the hassles of working with multiple information security companies. Centuno Solutions can handle all of your small business software development, security, IT, and project maintenance.

Centuno is now offering a Free Penetration Testing. Perform a vulnerability assessment and evaluate the defense of your current network security solutions.

The best way to evaluate the security of your system is by actually trying to break into it. Centuno Solutions security penetration testing process simulates an actual hacker attack. This real life penetration test attack simulation involves analyzing your business systems for potential vulnerabilities, weaknesses, or misconfigurations.

At the end of the penetration test, you receive a report detailing the vulnerabilities found in addition to information on the impact and a proposal for mitigating the security risk.

Some of the penetration testing services we offer include:
  • Network and Port Scanning
  • Identification of Systems and Services
  • Firewall and Router Penetration Testing
  • Vulnerability Research
  • Password Cracking
  • Internet Web Application Security Penetration Testing
  • Reverse Engineering of Proprietary Applications
  • Research for Zero Day Exploits
For more information on security penetration testing services, click to contact a penetration test expert with Centuno Solutions today.
read more "Free Penetration Testing & Vulnerability Assessment by Centuno Solutions"

Thursday, May 20, 2010

Amarjit Singh| Hackers Lifestyle | Venturous Bikers Club Trips & Tours

This post is dedicated to all my fellow readers, who are in touch with me using GTALK. You can also add me. My GTALK id is [email protected]. Due to less time, the response may be late, but will respond to each and every ping once get free time.

So many of my net friends always ask me about a life style of hacker. Well rather then explain anything, I thought to share my BIKING CLUB with you guys. Our biking club is VENTUROUS BIKERS CLUB. Visit our official site and I have posted all my tour & trips pics with full details there. Few of mine all time favorite trips mentioned below. You click on hyper links for photographs & tour videos. Hope your like this post.


It was only the morning 10. The last night I had been spent with making morning plannings. This time it was really freaking out for me. We had 3 Cane's of petrol inside us first and then we walk across the road towards the lake. Today, when I awoke, I suddenly realized that it was one of the best day of my life, ever! I will marvel at God's seemingly simple gifts: the morning dew, the sun, the clouds, the trees, the flowers, the birds. Today, none of these miraculous creations will escape my notice. For more click here


WOWW...What The Wonderful Experience it was..!!..Since my school time, I had not seen any of my brother's marriage. During school times, I was so small..really kid and no matters what hapenning in my near world. Now here I would like to share my experince with you guys. Punjabis believe in doing everything larger than life and a special occasion like marriage is celebrated like a big carnival, exhibiting splendid glamour. I will try my level best to give you a feel about 100% punjabi desi style wedding. Hope you like this post and morover the photographs.


It was a detour from our usually biking and we decided to hire a cab for our outstation venture..
seems the gods of all my teammates were not on their sides.....It was a very evenful experience and an eye opener for all of us.

It was the 9:00pm of 24th April,09 and I was at our office to pick all the 6 fellows for our well planned trip to Surkanda Devi temple near Dhanaulti. Inder has come specially for this trip to Delhi. After picking all of them, we went to the nearest DHABA in Delhi. Here we took some food & after that searched for our PETROL....ooaahhaaa.. For more click here


There is no place like Golden Temple on this planet. It is beyond any number game. Its a place where you get solution of all d problems. A place where you can feel comfortable you relaxed even more than your own home. Most Sikh people visit Amritsar and the Darbar Sahib at least once during their lifetime, particularly during special occasions such as birthdays, marriage, birth of children, etc. For More Click Here


He is RD.....Ramandeep Singh, pyar se sab isko RD bolte hai. I suggested him to use "X" as suffix. Tab ye ban jaiga RDX. The police will catch him and thro into the jail.....He is a mirror-cracking material, so girls, pls beaware of him. For more click here


This time it was really freaking out for me. We had taken one-one desi patiyala of petrol [Ghar di kadi] inside us first, and then we walk across the road towards the Haveli [Shelter type…. for domistic animals like cows & buffalos]. Here I tried to diminutive the animals food & it was really tough job. After this we came back to the CHUBARE [The top floor in villages] & start messing with the GUNS. I went to my big bro Navi’s home where he has two 12-bore rifles. For more click here


Well to say this was my trip, my post……… would be totally untrue. At best, this was my dream. There are ppl in this world, some of them so wonderful, that made this dream become an unforgetable trip & you are reading this post on this blog. I would like to thank all of them, an in particular:

Apna Jaat, pyara Jaat, sabka raaj dulara Jaat….Dinesh Singh…Mentor, guru, friend & big bro, who taught me …..he he he he he chalo chodo abb kya batao, ki kya kya sikha gya bhai jaate jaate mere ko…..& stayed with me right till the end. If he had not encouraged me all the way, I would never be hold that much…..but wat???? Abbe khud he samaz jao..

Shivlu Jain [The Tashan], Sanjoy Ghoshal [Udi baba..hmmhai bangoli babu], Logu [Agar is ko hindi aata hotta ……ya pir humko tamil atta hota ……….to ye hum sabki bajaa deta], Prashant [Mr.Kurta Pajyama…vo bhi chudidaar…kuch bhi bolo per ladka hai handsome] & finally my self [Sala bolo ya kutta bolo….ya bolo tum kamina….mai to nikaal dunga tumhare buttocks ka pasinaa]….Amazing friends. For more click here


Renowned as a picturesque picnic spot, Chakrata in Dehradun District of Uttaranchal State of India is a hill station and a famed tourist destination located at an altitude of about 7000 ft above the sea level. The town was known earlier as Jaunsar bawar, a small hamlet of Jaunsari tribe. For more click here.


The last night I had been spent with making morning plannings. This time it was really freaking out for me. Can life get better than this ? Check out snaps. Sometimes, a picture is really worth a thousand words. For more click here


Yet another unforgettable adventrous excursion to the 15th century - Neemrana fort:::: Thrill of zipping comes to Neemrana

Leaving behind all the worries of daily routine-office,boss,colleagues,one needs to snatch out time from one's hectic schedule to pacify one's minds and relieve oneself. To get this ease for ourselves, I and my friends---------- chalked out a plan to explore Thrill of zipping @ Neemrana Fort-Palace built since 1464 AD.

It is Rajasthan's closest palace from New Delhi, situated at 122 kms. on the Delhi-Jaipur highway - only 100 kms from Delhi's international airport. Sited on a majestic plateau, concealed in a horseshoe formation of the billion year old Aravalli ranges.

What more cud u ask for an excursion?????!!!!!!!! For more click here


Venturous Bikers Having Drinks: Best Weekend @ 4S Bar in GK-II



read more "Amarjit Singh| Hackers Lifestyle | Venturous Bikers Club Trips & Tours"

WinRAR Password Recovery | WinZIP Password Recovery Download Free Tools

Zip password Recovery Magic v6.1.1.169
ZIP Password Recovery Magic is an easy-to-use program that can help you to recover lost passwords for zip archives. ZIP Password Recovery Magic provides brute-force and dictionary recovery methods, you can pause and resume recovery job easily. ZIP Password Recovery Magic has an easy to use interface. All you need to recover your password is just to add your file to the operation window.


Winrar Password Remover and Finder
RAR Password Recovery is a powerful tool to recover lost (forgotten) passwords for a RAR/WinRar archives. The program supports the Brute-Force attack, dictionary-based attack and dramatically fastest “Booost-Up” attack. The program is able to resume the previous interrupted attack.

Here is a brief list of RAR Password Recovery advantages:

1. Recovers passwords for a RAR/WinRAR archives using combination of Brute-Force, Booost-Up or Dictionary attacks.
2. Very high speed of work (more than 3000 passwords per second in Brute-Force mode and up to 22000 passwords per second in Booost-Up mode).
3. Customizability.
3. Advanced heuristic processor.
4. User-friendly interface.
5. Large wordlist dictionary.
6. Ability to work in the background.
7. Autosave feature.

read more "WinRAR Password Recovery | WinZIP Password Recovery Download Free Tools"

Paul Pierce’s Twitter account has been hacked

If any of you are wondering about anything strange going on with Paul Pierce’s Twitter account then wonder no more, as news comes that his account has been hacked into. The account you will find here has been verified as being authentic by Athlete Interactive, the firm behind his account, but there are certain incidents that have come to everybody’s attention.

If you look here you will see the verification of the hacking. Some of the items that were posted are bizarre to say the least and Pierce of the Boston Celtics and his representatives will no doubt soon confirm they were not made by him, according to Rob Mahoney at nbcsports.com.

Some of the Tweets included things such as “You know we are going crazy tonight. Sorry Dwight” and even more strangely, “Anybody got a BROOM?” One thing that became clear though is that Pierce always Tweets via text or Twitter’s web site, but the imposter Tweets came through Twitterific, so it certainly seems as though someone has been playing games.
read more "Paul Pierce’s Twitter account has been hacked"

Michael Jackson: Disturbing photos of ripped body of his autopsy on internet

Internet is a double edged sword. If it has revolutionized the modern world with the screaming, new technologies, it also presents itself as a curse when it bares open its devilish fangs.

After Megan Fox’s topless photos from Passion Play have hit the net to the voyeuristic eyes of millions of males, a hideous possibility is knocking at the door waiting to devour Jackson’s fans.

There are genuine fears that the torn and ripped photos from Michael’s autopsy reports can find its way into the internet. Though, authorities are taking a stern vigilance, still in this age of hackers and tabloid, a scare is looming large amongst the officials and family members of MJ. If these photos are leaked, then a huge mayhem will follow and the disturbing images of the ‘King of Pop’ may haunt the minds of the sensitive fans for ever.

“Some of the edgier internet sites run by foreign operators are attempting to secure the photos through unauthorized release — with talk that the pictures could be worth upward of $5 million!” a source from National Enquirer reports.

It’s a pity how low can this world stoop for some cheap publicity and money……….
read more "Michael Jackson: Disturbing photos of ripped body of his autopsy on internet"

Snort – the best open source IDS

If you are in security, you might have heard of an Intrusion Detection system, which is a device or mechanism that Snort - open source IDS - theprohack.commonitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities. There are a lot of professional IDS available for commercial use,but when it comes to being free as freedom (read:open source), Snort is my favorite.Snort is is a very powerful tool open source IDS (Intrusion detection system) written by Martin Roesch & and is known to be one of the best IDS on the market even when compared to commercial IDS.Snort performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes, such as buffer overflows, stealth port scans, web application attacks, SMB probes, and OS fingerprinting attempts, amongst other features. Like Wireshark,Snort uses the libpcap library to capture packets.

Snort can be run in 4 modes:

  1. sniffer mode: snort will read the network traffic and print them to the screen.
  2. packet logger mode: snort will record the network traffic on a file
  3. IDS mode: network traffic matching security rules will be recorded (mode used in our tutorial)
  4. IPS mode: also known as snort-inline (IPS = Intrusion prevention system)

A lot of people in the very active snort community are sharing their security rules which is very useful if you are not an security expert and wants to have up-to-date rules.Snort can be combined with other free software such as sguil, OSSIM, and the Basic Analysis and Security Engine (BASE) to provide a visual representation of intrusion data..which is in fact a PHP script displaying alerts on a web interface. At the end of the day, Snort is a must have for any security researcher or  network paranoids out there..another mentionable IDS systems are Fragrouter,OSSEC HIDS and sGUIL.

You can download Snort from here

 

Like This post ?  You can buy me a Beer :)

Posted by XERO. ALL RIGHTS RESERVED.

read more "Snort – the best open source IDS"