Receive Daily Updates

Enter your email address:

Showing newest 29 of 142 posts from 7/1/10 - 8/1/10. Show older posts
Showing newest 29 of 142 posts from 7/1/10 - 8/1/10. Show older posts

Saturday, July 31, 2010

Stranger from Indian Cyber Army Proves <=Shak=> from Pakhaxors is Biggest Noob

Stranger from Indian Cyber Army Proves <=Shak=> from Pakhaxors is Biggest Noob

Few days back Pakistani hackers hacked the below Indian website. Here is the full article. In response to that, Stranger from Indian Cyber Army re hacked that website and openly challenges to all Pakistani Hackers & PAKHAXORS CREW to re hack OR edit remove his defacements from their police websites.

Here is the actual test for skill and talent. Indians has shown that they can re hack the Pakistani hackers defacements. Now its time for Pakistani hackers to show how much they are skilled by re hack the police websites hacked by ICA CREW member Stranger.


The bellow message has been published by ICA CREW Members

Biggest IdIoT <=Shak=> was here
AM THE BIGGEST N00B IN THE WORLD
We PakHax0rs we Jokers

INDIAN ZINDABAD
P0rk1stan r0ckzzz

N0w Tell Me who is the biggest noob whoz defacements are getting edited i told you guys you can't do except x=x admin/admin or simple sql injection with sql i helper ... i have a question for you have u ever hacked a site skillfully am challenging you if you can edit remove my defacements from your police websites

./Stranger L0gg3d 0ut
read more "Stranger from Indian Cyber Army Proves <=Shak=> from Pakhaxors is Biggest Noob"

Warning from Pakistan Cyber Army to Indian Cyber Army

Warning from Pakistan Cyber Army to Indian Cyber Army

All latest defacements by Pakistani Cyber Army is cited below:

http://www.indiatradecenter.in/itc/shak.html

http://www.drbindu.in/shak.html

http://blaxxun.in/shak.html

http://www.axiomstrategy.in/shak.html

http://www.bhootnath.in/shak.html

http://www.agnicient.com/shak.html

http://www.accurate.in/shak.html

Here are the few screen shots taken by Freehacking Team




Lets C his response on this to PAKISTANI CYBER ARMY....I am waiting..!!
read more "Warning from Pakistan Cyber Army to Indian Cyber Army"

Black Hat: The Largest Hacker Conference 2010 Best 5 Takeaways

Black Hat: The Largest Hacker Conference 2010 Best 5 Takeaways

Black Hat, the largest and most visible hacker conference, is winding down in Las Vegas. It always brings a series of shocks and this year didn't disappoint. What did we learn this year?

1. Your money isn't safe - Researcher Barnaby Jack demonstrated how to hack automated teller machines (ATMs). He did it both by physically opening the machine and installing malware on it and by compromising it over the network. It turns out these machines, or at least some of them, aren't all that aggressively secured.

2. Your cell phone isn't safe - It was a bad week for mobile security. Project Carmen Sandiego showed that you don't have to be a phone company or government to find out who's using a particular cell phone number or where they are located. The security company Lookout revealed that Android wallpaper applications are needlessly gathering personal data. For years mobile malware has been just over the horizon, but it seems to be closer than ever to being a real problem. F-Secure's Mikko Hypponen was quoted as saying "Eventually, virus writers will realize it is easier to make money by infecting phones than it is by infecting computers."

3. Your electric service isn't safe - Jonathan Pollet, founder of Red Tiger Security, told Black Hat attendees of the weaknesses in Supervisory Control And Data Acquisition (SCADA) systems used in utilities like power companies to manage and monitor equipment. SCADA vendors and users are way behind IT generally when it comes to security. Vulnerabilities go for long times unpatched. Unnecessary software, like chat clients, are used on critical systems, which are sometimes connected to the Internet. Pollet also warned of the weak security state of "smart meters" being rolled out all over the country.

4. Your home router isn't safe - A new trick found by researcher Craig Heffner makes it easier for attackers to gain usable access to your home network. Hacking into the router can be done in many ways, but once you're in it's hard to get an address on the internal network. Heffner showed a Javascript hack that allows an attacker to use DNS Rebiding to gain an internal address. There are mitigating measures you can take, but they're complex or inconvenient.

5. Black Hat itself isn't safe - For the first time this year, Black Hat made their sessions available through a video feed, using a 3rd party service, for a $395 fee. One subscriber realized that it was easy to trick the service into providing the videos for free. It's not a good thing to show weakness like this to the Black Hat crowd.

There was some good news at the show. To add on to their recent announcement of a sandbox architecture for Reader for Windows, Adobe announced that it will be joining in Microsoft's MAPP program to provide advance notice to security vendors of vulnerability disclosures. This should help users to protect themselves better.
read more "Black Hat: The Largest Hacker Conference 2010 Best 5 Takeaways"

You will be billed $90,000 for this hacked cell phone call

Among the scary talks at the Black Hat security conference yesterday was one entitled “You will be billed $90,000 for this call.” That title was an exaggeration, but it certainly highlighted the risks facing users with unprotected mobile phones.

The talk by security expert Mikko Hypponen of security firm F-Secure showed how a compromised cell phone could make surreptitious long-distance calls that could cost you lots of money. It was one of a number of talks about the subject of hacking smartphones, which are vulnerable because they have the same capabilities and networking technology as computers.

Hypponen, chief resource officer at F-Secure, followed the trail of hackers who hid malicious code in an anti-terrorist shooting game for smartphones. A hacker, apparently from Russia, hacked a legitimate game and planted a virus in it. The hacker then offered the tainted app for free on a copycat website.

“It is actually a very good game that suddenly was free,” the security researcher said. “Download sites thought it was the real deal.”

The malware was clever. The game software was modified to wait a while before its payload was triggered. The program hidden within it triggered eight phone calls that charged premium rates and billed the calls to the smartphone owner’s monthly bill. The malware stopped at just $12 per month worth of phone calls, so that it could escape notice. Hypponen said there were perhaps 500 pieces of malicious code targeting cell phones, far smaller than the number targeting PCs. But the number is growing.
read more "You will be billed $90,000 for this hacked cell phone call"

XSSer Storm - Open Source Penetration testing tool

XSSer is an open source penetration testing tool that automates the process of detecting and exploiting XSS injections against different applications.

It contains several options to try to bypass certain filters, and various special techniques of code injection.

XSSer v0.6a aka "XSSer Storm!" supports this new features:
-g DORK Process search engine dork results as target urls
(ex:inurl:vulnerable.asp?id=)
--Ge=DORK_ENGINE Search engine to use for dorking (scroogle,
duck, altavista, bing)
-c CRAWLING Crawl target hierarchy parameters (can be slow!)
--Cw=CRAWLING_WIDTH Number of urls to visit when crawling
--Dfo Encodes fuzzing IP addresses in DWORD format

Download: http://xsser.sourceforge.net
read more "XSSer Storm - Open Source Penetration testing tool"

Friday, July 30, 2010

Make Money Online: Earn Online | Make Money with Twitter Online

Make Money Online: Earn Online | Make Money with Twitter Online

SponsoredTweets referral badge SponsoredTweets referral badge SponsoredTweets referral badge

Follow me on Twitter HERE

    Make Money Online: Earn Online | Make Money with Twitter Online

    Twitter Advertising:
    Sponsored Tweets is a new Twitter advertising platform that connects advertisers with tweeters. Advertisers can create sponsored conversations on Twitter. Tweeters can earn money for spreading the word.

    Here’s How It Works:
    All you need is a Twitter account to get started. Sponsored Tweets is a whitelisted Twitter application and uses your Twitter credentials to create an account.

    SponsoredTweets.com is a wholly owned property of IZEA. Founded in 2006, IZEA is the world leader in sponsored conversations. IZEA pioneered the sponsored conversation space and continues to create innovative platforms like Sponsored Tweets to help our customers realize their objectives.

    IZEA is a venture-backed company that has raised $10 million from some of the world’s leading investors. We are headquartered in beautiful downtown Orlando, Florida and serve a diverse base of social media creators and advertisers around the globe.

    Sponsored Tweets will never auto-inject any Advertiser message into a Tweeter’s Twitter stream. Tweeters always have the ability to control the message, either through writing their own tweet copy or approving an Advertiser’s message. Sponsorships are never forced; Tweeters and Advertisers much mutually select each other.
    read more "Make Money Online: Earn Online | Make Money with Twitter Online"

    Join Free Hacking Team: Get Latest Updates Directly from Amarjit Singh

    Social Networking

    I do use a variety of social networking sites . You’re welcome to connect with me on them however I check some more than others.

    Workshop on ETHICAL HACKING in RAYAT & BAHRA college (Punjab) on 20-21st august. Follow me for more details. If you also want to attend this workshop, follow me on Twitter and get all latest information over there. I am arranging for some discount (40% to 50%) for all my readers. Keep in touch and will update you.

    Join me & earn money online.

    SponsoredTweets referral badge

    Add me on Facebook HERE

      Follow me on Twitter HERE

        Add me on Myspace HERE

          Connect me on Linkedin HERE

            You can also contact me on any of my mail ID mentioned below. Your email will be read but due to the large volumes of emails received a reply may not be prompt.
              read more "Join Free Hacking Team: Get Latest Updates Directly from Amarjit Singh"

              Recover RAR Password: RAR Password Recovery Magic

              RAR Password Recovery Magic 6.1.1.320 | 1.7Mb

              RAR Password Recovery Magic is a powerful tool designed to recover lost or forgotten passwords for a RAR/WinRAR archives. RAR Password Recovery Magic supports the customizable brute-force and dictionary-based attacks.RAR Password Recovery Magic has an easy to use interface. All you need to do to recover your password is just to add your file to the operation window.

              Key Features:

              - Recover passwords for RAR/WinRAR archives.
              - Custom character set for "brute-force" attack supported.
              - You can select character from a range of character options including:
              - Letters, Numbers, symbol...
              - Large wordlist dictionary.
              - Work in the background.
              - Features a user-friendly interface.

              Download Links

              http://hotfile.com/dl/58492469/d107754/RARPass.rar.html

              http://www.fileserve.com/file/PzPJ589/RARPass.rar
              read more "Recover RAR Password: RAR Password Recovery Magic"

              CSS-TRICKS by Chris Coyier: Use of css-sprites to use bibleoteki jQuery


              All video lessons from the CSS-TRICKS by Chris Coyier
              MOV | 960x720 | stereo 96 kbps | 7.23 GB
              Gender: elearning

              All the video lessons from the site CSS-TRICKS.COM. They reveal the secrets of the various web-design: from the use of css-sprites to use bibleoteki jQuery and create a template for CMS WordPress "from scratch". While all the lessons in English, the author explains everything quite clear. Quality videos - Excellent.

              Download with Hotfile :
              http://hotfile.com/dl/58306750/6e65f44/CSSTRlCKS.part01.rar.html
              http://hotfile.com/dl/58306752/ff4733c/CSSTRlCKS.part02.rar.html
              http://hotfile.com/dl/58306753/0f21e83/CSSTRlCKS.part03.rar.html
              http://hotfile.com/dl/58306780/13bab13/CSSTRlCKS.part04.rar.html
              http://hotfile.com/dl/58306786/3085d3f/CSSTRlCKS.part05.rar.html
              http://hotfile.com/dl/58312529/be63470/CSSTRlCKS.part06.rar.html
              http://hotfile.com/dl/58313225/d8f33c7/CSSTRlCKS.part07.rar.html
              http://hotfile.com/dl/58314074/6ae052d/CSSTRlCKS.part08.rar.html
              http://hotfile.com/dl/58314758/4222910/CSSTRlCKS.part09.rar.html
              http://hotfile.com/dl/58315642/3092513/CSSTRlCKS.part10.rar.html
              http://hotfile.com/dl/58307176/20c9c68/CSSTRlCKS.part11.rar.html
              http://hotfile.com/dl/58307180/e8bf2b3/CSSTRlCKS.part12.rar.html
              http://hotfile.com/dl/58307185/e5d0bca/CSSTRlCKS.part13.rar.html
              http://hotfile.com/dl/58307195/9232905/CSSTRlCKS.part14.rar.html
              http://hotfile.com/dl/58307200/3921bcb/CSSTRlCKS.part15.rar.html
              http://hotfile.com/dl/58306985/74ac384/CSSTRlCKS.part16.rar.html
              http://hotfile.com/dl/58307705/c12017e/CSSTRlCKS.part17.rar.html
              http://hotfile.com/dl/58308468/f5b995a/CSSTRlCKS.part18.rar.html
              http://hotfile.com/dl/58309228/7fb6c03/CSSTRlCKS.part19.rar.html
              http://hotfile.com/dl/58309980/40f1a1e/CSSTRlCKS.part20.rar.html
              http://hotfile.com/dl/58307560/978e619/CSSTRlCKS.part21.rar.html
              http://hotfile.com/dl/58307573/f3ef55c/CSSTRlCKS.part22.rar.html
              http://hotfile.com/dl/58307577/9f526cb/CSSTRlCKS.part23.rar.html
              http://hotfile.com/dl/58307585/0e41c83/CSSTRlCKS.part24.rar.html
              http://hotfile.com/dl/58307597/64b8292/CSSTRlCKS.part25.rar.html
              http://hotfile.com/dl/58310742/4f1f630/CSSTRlCKS.part26.rar.html
              http://hotfile.com/dl/58311575/3f113bc/CSSTRlCKS.part27.rar.html
              http://hotfile.com/dl/58312248/b9aa6ee/CSSTRlCKS.part28.rar.html
              http://hotfile.com/dl/58312904/af743bc/CSSTRlCKS.part29.rar.html
              http://hotfile.com/dl/58313756/9c40afa/CSSTRlCKS.part30.rar.html
              http://hotfile.com/dl/58308029/f240857/CSSTRlCKS.part31.rar.html
              http://hotfile.com/dl/58308037/0e66a69/CSSTRlCKS.part32.rar.html
              http://hotfile.com/dl/58308047/e01e5d3/CSSTRlCKS.part33.rar.html
              http://hotfile.com/dl/58308050/d64663e/CSSTRlCKS.part34.rar.html
              http://hotfile.com/dl/58308057/708aebe/CSSTRlCKS.part35.rar.html
              http://hotfile.com/dl/58314653/6540ea4/CSSTRlCKS.part36.rar.html
              http://hotfile.com/dl/58314786/8992cae/CSSTRlCKS.part37.rar.html

              Mirror SharingMatrix :
              http://www.sharingmatrix.com/file/15195653/CSSTRlCKS.part01.rar
              http://www.sharingmatrix.com/file/15195659/CSSTRlCKS.part02.rar
              http://www.sharingmatrix.com/file/15196111/CSSTRlCKS.part03.rar
              http://www.sharingmatrix.com/file/15196067/CSSTRlCKS.part04.rar
              http://www.sharingmatrix.com/file/15196477/CSSTRlCKS.part05.rar
              http://www.sharingmatrix.com/file/15196829/CSSTRlCKS.part06.rar
              http://www.sharingmatrix.com/file/15196837/CSSTRlCKS.part07.rar
              http://www.sharingmatrix.com/file/15197005/CSSTRlCKS.part08.rar
              http://www.sharingmatrix.com/file/15197009/CSSTRlCKS.part09.rar
              http://www.sharingmatrix.com/file/15197537/CSSTRlCKS.part10.rar
              http://www.sharingmatrix.com/file/15198015/CSSTRlCKS.part11.rar
              http://www.sharingmatrix.com/file/15198019/CSSTRlCKS.part12.rar
              http://www.sharingmatrix.com/file/15198477/CSSTRlCKS.part13.rar
              http://www.sharingmatrix.com/file/15198483/CSSTRlCKS.part14.rar
              http://www.sharingmatrix.com/file/15199079/CSSTRlCKS.part15.rar
              http://www.sharingmatrix.com/file/15199065/CSSTRlCKS.part16.rar
              http://www.sharingmatrix.com/file/15199787/CSSTRlCKS.part17.rar
              http://www.sharingmatrix.com/file/15200501/CSSTRlCKS.part18.rar
              http://www.sharingmatrix.com/file/15200507/CSSTRlCKS.part19.rar
              http://www.sharingmatrix.com/file/15200881/CSSTRlCKS.part20.rar
              http://www.sharingmatrix.com/file/15200895/CSSTRlCKS.part21.rar
              http://www.sharingmatrix.com/file/15201251/CSSTRlCKS.part22.rar
              http://www.sharingmatrix.com/file/15201639/CSSTRlCKS.part23.rar
              http://www.sharingmatrix.com/file/15287443/CSSTRlCKS.part24.rar
              http://www.sharingmatrix.com/file/15201983/CSSTRlCKS.part25.rar
              http://www.sharingmatrix.com/file/15287463/CSSTRlCKS.part26.rar
              http://www.sharingmatrix.com/file/15287707/CSSTRlCKS.part27.rar
              http://www.sharingmatrix.com/file/15287715/CSSTRlCKS.part28.rar
              http://www.sharingmatrix.com/file/15287983/CSSTRlCKS.part29.rar
              http://www.sharingmatrix.com/file/15287991/CSSTRlCKS.part30.rar
              http://www.sharingmatrix.com/file/15287973/CSSTRlCKS.part31.rar
              http://www.sharingmatrix.com/file/15287975/CSSTRlCKS.part32.rar
              http://www.sharingmatrix.com/file/15288341/CSSTRlCKS.part33.rar
              http://www.sharingmatrix.com/file/15288353/CSSTRlCKS.part34.rar
              http://www.sharingmatrix.com/file/15202313/CSSTRlCKS.part35.rar
              http://www.sharingmatrix.com/file/15288773/CSSTRlCKS.part36.rar
              http://www.sharingmatrix.com/file/15288369/CSSTRlCKS.part37.rar

              Mirror FileServe :
              http://www.fileserve.com/file/Qw3VEvV/CSSTRlCKS.part01.rar
              http://www.fileserve.com/file/3NWwE4W/CSSTRlCKS.part02.rar
              http://www.fileserve.com/file/UhruF7R/CSSTRlCKS.part03.rar
              http://www.fileserve.com/file/bRqeGs2/CSSTRlCKS.part04.rar
              http://www.fileserve.com/file/bmdP4P7/CSSTRlCKS.part05.rar
              http://www.fileserve.com/file/vntbYMx/CSSTRlCKS.part06.rar
              http://www.fileserve.com/file/an3CcEh/CSSTRlCKS.part07.rar
              http://www.fileserve.com/file/smvH6p2/CSSTRlCKS.part08.rar
              http://www.fileserve.com/file/KwPFMRM/CSSTRlCKS.part09.rar
              http://www.fileserve.com/file/FQgYAtU/CSSTRlCKS.part10.rar
              http://www.fileserve.com/file/XCuvChH/CSSTRlCKS.part11.rar
              http://www.fileserve.com/file/53tWgJK/CSSTRlCKS.part12.rar
              http://www.fileserve.com/file/uKUKnNZ/CSSTRlCKS.part13.rar
              http://www.fileserve.com/file/uUGvwBb/CSSTRlCKS.part14.rar
              http://www.fileserve.com/file/yhpqTXM/CSSTRlCKS.part15.rar
              http://www.fileserve.com/file/PS3ZrAw/CSSTRlCKS.part16.rar
              http://www.fileserve.com/file/9yKzgEt/CSSTRlCKS.part17.rar
              http://www.fileserve.com/file/vuerN5r/CSSTRlCKS.part18.rar
              http://www.fileserve.com/file/j7WMaEv/CSSTRlCKS.part19.rar
              http://www.fileserve.com/file/W4wJZJG/CSSTRlCKS.part20.rar
              http://www.fileserve.com/file/fDK2xrh/CSSTRlCKS.part21.rar
              http://www.fileserve.com/file/upGTqU9/CSSTRlCKS.part22.rar
              http://www.fileserve.com/file/ffU3X8x/CSSTRlCKS.part23.rar
              http://www.fileserve.com/file/ddDshmR/CSSTRlCKS.part24.rar
              http://www.fileserve.com/file/Nmj4KGx/CSSTRlCKS.part25.rar
              http://www.fileserve.com/file/WZauHG4/CSSTRlCKS.part26.rar
              http://www.fileserve.com/file/vjmNCfC/CSSTRlCKS.part27.rar
              http://www.fileserve.com/file/bN35WGw/CSSTRlCKS.part28.rar
              http://www.fileserve.com/file/Rfxvs5S/CSSTRlCKS.part29.rar
              http://www.fileserve.com/file/kPQzpje/CSSTRlCKS.part30.rar
              http://www.fileserve.com/file/wWjE8SM/CSSTRlCKS.part31.rar
              http://www.fileserve.com/file/bHZucwy/CSSTRlCKS.part32.rar
              http://www.fileserve.com/file/eRVu49D/CSSTRlCKS.part33.rar
              http://www.fileserve.com/file/4k6NjrQ/CSSTRlCKS.part34.rar
              http://www.fileserve.com/file/Y9HuadS/CSSTRlCKS.part35.rar
              http://www.fileserve.com/file/UJe6z6V/CSSTRlCKS.part36.rar
              http://www.fileserve.com/file/wwTxgwU/CSSTRlCKS.part37.rar
              read more "CSS-TRICKS by Chris Coyier: Use of css-sprites to use bibleoteki jQuery"

              Neu in Adobe Photoshop CS5 - Audio Videos Tutorials

              Alles, was Photoshop CS5 in der Standard und ExtendedEdition Neues zu bieten hat – anschaulich, praxisnah und in bunte Workshops verpackt! So starten Sie sofort durch mit den neuen HDRFunktionen, automatischer Objektivkorrektur, verbesserter Auswahl und Maskenbearbeitung, inhaltssensitiven Reparaturwerkzeugen, den spannenden neuen Pinsel und Verkrummungsoptionen und vielem mehr. Fur Anwender der ExtendedVersion steht die fantastische Welt des 3DDesigns offen. Legen Sie einfach los!
              Ihr(e) Trainer: Maike Jarsetz, Gerhard Koren, Barbara Luef, Uli Staiger

              Wenn Sie wissen wollen, ob sich der Umstieg auf Photoshop CS5 fur Sie lohnt, dann sind Sie hier genau richtig. Gleich vier fuhrende Experten haben sich die neuen Funktionen detailliert unter die Luge genommen und fuhren live vor, was sie fur Sie und ihre Aufgabenstellungen bringen. Und wenn Sie sich bereits fur ein Update auf CS5 entschieden haben, sind Sie mit diesem Wissensvorsprung gleich produktiv!

              Download from Hotfile
              http://hotfile.com/dl/58428167/3d71aba/VI2BRNUINPHCS.part01.rar.html
              http://hotfile.com/dl/58428168/763ba81/VI2BRNUINPHCS.part03.rar.html
              http://hotfile.com/dl/58428179/a8dfedc/VI2BRNUINPHCS.part04.rar.html
              http://hotfile.com/dl/58428178/d44b21c/VI2BRNUINPHCS.part02.rar.html
              http://hotfile.com/dl/58428239/3ef8f22/VI2BRNUINPHCS.part05.rar.html
              http://hotfile.com/dl/58428255/d8b9598/VI2BRNUINPHCS.part07.rar.html
              http://hotfile.com/dl/58428274/cd00355/VI2BRNUINPHCS.part06.rar.html
              http://hotfile.com/dl/58428276/4a9dd2e/VI2BRNUINPHCS.part08.rar.html
              http://hotfile.com/dl/58428357/8df40bd/VI2BRNUINPHCS.part09.rar.html
              http://hotfile.com/dl/58428360/45b439e/VI2BRNUINPHCS.part11.rar.html
              http://hotfile.com/dl/58428396/8481376/VI2BRNUINPHCS.part10.rar.html
              http://hotfile.com/dl/58428400/67a17c8/VI2BRNUINPHCS.part12.rar.html

              Download from Uploading
              http://uploading.com/files/m731a43a/VI2BRNUINPHCS.part01.rar/
              http://uploading.com/files/2fe8e6ed/VI2BRNUINPHCS.part02.rar/
              http://uploading.com/files/57e77b83/VI2BRNUINPHCS.part03.rar/
              http://uploading.com/files/91e476ba/VI2BRNUINPHCS.part04.rar/
              http://uploading.com/files/ae437581/VI2BRNUINPHCS.part05.rar/
              http://uploading.com/files/e386b6fc/VI2BRNUINPHCS.part06.rar/
              http://uploading.com/files/492b1dff/VI2BRNUINPHCS.part07.rar/
              http://uploading.com/files/352a44d8/VI2BRNUINPHCS.part08.rar/
              http://uploading.com/files/m3mc8a46/VI2BRNUINPHCS.part09.rar/
              http://uploading.com/files/d69395b5/VI2BRNUINPHCS.part10.rar/
              http://uploading.com/files/89e7f8fe/VI2BRNUINPHCS.part11.rar/
              http://uploading.com/files/f4d92f72/VI2BRNUINPHCS.part12.rar/

              Download from FileServe
              http://www.fileserve.com/file/MHktDCv
              http://www.fileserve.com/file/3QxpEQh
              http://www.fileserve.com/file/pAjZRJC
              http://www.fileserve.com/file/uD4h3BM
              http://www.fileserve.com/file/3BVJ3p9
              http://www.fileserve.com/file/FbXsMrV
              http://www.fileserve.com/file/fJqNBUc
              http://www.fileserve.com/file/HVVJFwQ
              http://www.fileserve.com/file/DUkR7Qp
              http://www.fileserve.com/file/udeJufQ
              http://www.fileserve.com/file/6RFqaw5
              http://www.fileserve.com/file/RSb2MEc
              read more "Neu in Adobe Photoshop CS5 - Audio Videos Tutorials"

              WEBmarketing Traffic Secrets 2.0: Audio Videos Tutorials

              This course is designed genius WEBmarketing John Rhys (John Reese) and is a modern reworking of his own compendium Traffic Secrets, published in 2004. John tells how the roll out their websites and generate tons of traffic, earn a lot deneg.Dzhon Rice (John Reese) created 3 sites included in the TOP500, operating in the market WEBmarketing for 15 years and on this point suffers apparent delusions of grandeur.

              Download from Hotfile
              http://hotfile.com/list/535675/704f404

              Download from Uploading
              http://uploading.com/linklists/a48bf96c/Traffic_Secrets_2.0/
              read more "WEBmarketing Traffic Secrets 2.0: Audio Videos Tutorials"

              Free Download McAfee VirusScan Enterprise 8.7i

              Free Download McAfee VirusScan Enterprise 8.7i

              With McAfee VirusScan Enterprise, we've taken anti-virus protection to the next level by combining intrusion prevention and firewall technology in a single solution for PCs and file servers. Manage it with McAfee ePolicy Orchestrator for security policy compliance and enterprise-level reporting.

              Benefits:
              Get maximum protection Gain maximum protection for your PCs and servers with combined anti-virus, firewall, and intrusion prevention technology Block multiple types of threats
              Defend your systems against viruses, buffer overflows, and blended attacks Minimize damage
              Limit the harm done to your PCs and servers with advanced outbreak functionality Stop threats that write to memory Block threats that do not write to disk with in-memory scanning Prevent rootkit infestation Stop rootkits and hidden files from installing Single console Control and manage VirusScan from a single console with ePolicy Orchestrator and get detailed enterprise-level reporting Hacker-proof protection Stop worrying about disruptions; malware or hackers cannot disable VirusScan Enterprise

              Features:
              Cover all the bases Block a broad range of viruses and malicious code—even those hidden in compressed files; find new, unknown viruses with advanced heuristics and generic detection Defend against threats that target Microsoft Protect against exploits targeted at Microsoft applications and services—especially for Microsoft Windows OS services, Microsoft Word, Microsoft Excel, Internet Explorer, Microsoft Outlook, and SQL server Curb outbreak damage Limit outbreak damage, even before DAT files are issued; close ports, monitor applications and email engines, block files and directories, and trace and block infection sources Scans memory for malicious code Detect threats that write to memory rather than disk, such as CodeRed and SQLSlammer Protect email programsDetect and scour viruses in Microsoft Outlook and Lotus Notes—including HTML text and attachments Keep script-type threats at bay Prevent threats that exploit javascript or Visual Basic from executing Optimize updating for remote systems Tailor field updates to physical locations and connection speeds: resume updating after a broken connection is re-established Lock down files Keep VirusScan Enterprise files from being altered with enhanced access protection rules Advanced rootkit detection
              Scan system memory for installed rootkits, hidden processes, and other concealed malicious code

              Workstation requirements
              Intel Pentium or Intel Celeron processor running a minimum of 166 MHz 32MB of RAM Minimum 38MB free disk space Microsoft Windows NT 4.0 SP6 or greater Microsoft Windows XP Home and Professional SP1, SP2 Microsoft Windows 2000 Professional SP3 or later Microsoft Windows Vista (32-bit and 64-bit) Microsoft Internet Explorer, version 5.0 or higher
              NOTE: McAfee VirusScan 4.5.1 supports Microsoft Windows 98/ME

              Server requirements
              Intel Pentium or Intel Celeron processor running a minimum of 166 MHz 32MB of RAM Minimum 38MB free disk space Microsoft Windows NT 4.0 Server; Microsoft Windows NT 4.0 Enterprise Server, SP6/6a Microsoft Windows 2000 Server; Microsoft Windows 2000 Advanced Server, SP3, SP4 Microsoft Windows Server 2003: Standard, Enterprise, or Web Edition (32-bit and 64-bit), SP1 Microsoft Cluster Server (MSCS) Other supported platforms: XP Tablet PC, Citrix MetaFrame 1.8 & XP Support; EMC Celerra File Server Support Microsoft Internet Explorer, version 5.0 or higher

              Release: 26.09.2008
              Lang: Multilingual
              Size: 56,3 Mb

              read more "Free Download McAfee VirusScan Enterprise 8.7i"

              Free Download F-Secure Anti-Virus for Server 8.00

              F-Secure Anti-Virus for Server 8.00

              F-Secure Anti-Virus protects your home or small office computer against viruses, worms, and Trojans. With this program, viruses, worms, and Trojans attacking via e-mail, web, floppy disks and CD-ROMs are stopped in real-time. Thus, the program enables you to surf the Internet, open e-mail attachments and use your computer without fear of any virus infections


              read more "Free Download F-Secure Anti-Virus for Server 8.00"

              Keygen & Serial keys for all EA Games Download Free


              Keygen & Serial keys for all EA Games Download Free | EA Keygen for Over 135 Games Including BF2142 | 5.5 MB

              This is an insane keygen, it includes serials for over 135 games; including: All Battlefield Games ,Black And White ,Every C&C Game, All FIFA games, etc. This is a rare keygen as there are only a few floating around the net!

              http://hotfile.com/dl/58420405/e55b076/EAKeygen.New.rar.html
              read more "Keygen & Serial keys for all EA Games Download Free"

              Free Kaspersky Activation Key: Kaspersky All version Activation Key


              Free Kaspersky Activation Key: Kaspersky All version Activation Key (30th July 10) | 5.61 MB


              read more "Free Kaspersky Activation Key: Kaspersky All version Activation Key"

              Ncrack - High-speed network authentication cracker

              Ncrack - High-speed network authentication cracker

              Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack was designed using a modular approach, a command-line syntax similar to Nmap and a dynamic engine that can adapt its behaviour based on network feedback. It allows for rapid, yet reliable large-scale auditing of multiple hosts.

              Ncrack's features include a very flexible interface granting the user full control of network operations, allowing for very sophisticated bruteforcing attacks, timing templates for ease of use, runtime interaction similar to Nmap's and many more.

              Ncrack was started as a "Google Summer of Code" Project in 2009. While it is already useful for some purposes, it is still unfinished, alpha quality software. It is released as a standalone tool and can be downloaded from the section below. Be sure to read the Ncrack man page to fully understand Ncrack usage.


              read more "Ncrack - High-speed network authentication cracker"

              Hack Network Protocols | Download Yersinia: Network Exploitation Tool

              Hack Network Protocols | Download Yersinia: Network Exploitation Tool

              Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. This is not any other network scanning and analysis tool like Nmap. This is a real hacking tool already loaded with exploits including the latest VTP(VLAN Trunking Protocol) DoS exploit.

              Attacks for the following network protocols are implemented:
              • Spanning Tree Protocol (STP)
              • Cisco Discovery Protocol (CDP)
              • Dynamic Trunking Protocol (DTP)
              • Dynamic Host Configuration Protocol (DHCP)
              • Hot Standby Router Protocol (HSRP)
              • IEEE 802.1Q
              • IEEE 802.1X
              • Inter-Switch Link Protocol (ISL)
              • VLAN Trunking Protocol (VTP)
              Attacks pertaining to specific network protocols:
              1. Spanning Tree Protocol
              2. Sending RAW Configuration BPDU
              3. Sending RAW TCN BPDU
              4. DoS sending RAW Configuration BPDU
              5. DoS sending RAW TCN BPDU
              6. Claiming Root Role
              7. Claiming Other Role
              8. Claiming Root Role dual home (MITM)
              Cisco Discovery Protocol
              1. Sending RAW CDP packet
              2. DoS flooding CDP neighbors table
              3. Setting up a virtual device
              Dynamic Host Configuration Protocol
              1. Sending RAW DHCP packet
              2. DoS sending DISCOVER packet (exhausting ip pool)
              3. Setting up rogue DHCP server
              4. DoS sending RELEASE packet (releasing assigned ip)
              Hot Standby Router Protocol
              1. Sending RAW HSRP packet
              2. Becoming active router
              3. Becoming active router (MITM)
              Dynamic Trunking Protocol
              1. Sending RAW DTP packet
              2. Enabling trunking
              802.1Q
              1. Sending RAW 802.1Q packet
              2. Sending double encapsulated 802.1Q packet
              3. Sending 802.1Q ARP Poisoning
              802.1X
              1. Sending RAW 802.1X packet
              2. Mitm 802.1X with 2 interfaces
              VLAN Trunking Protocol
              1. Sending RAW VTP packet
              2. Deleting ALL VLANs
              3. Deleting selected VLAN
              4. Adding one VLAN
              5. Catalyst crash
              Yersinia Official Website: http://www.yersinia.net/


              read more "Hack Network Protocols | Download Yersinia: Network Exploitation Tool"

              How to Remove Sensitive Data from Hard Drive: Download Eraser Media Sanitization Tool

              How to Remove Sensitive Data from Hard Drive: Download Eraser Media Sanitization Tool

              Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Eraser is currently supported under Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2.

              Most people have some data that they would rather not share with others - passwords, personal information, classified documents from work, financial records, self-written poems, the list continues.

              Perhaps you have saved some of this information on your computer where it is conveniently at your reach, but when the time comes to remove the data from your hard disk, things get a bit more complicated and maintaining your privacy is not as simple as it may have seemed at first.

              Your first thought may be that when you 'delete' the file, the data is gone. Not quite, when you delete a file, the operating system does not really remove the file from the disk; it only removes the reference of the file from the file system table. The file remains on the disk until another file is created over it, and even after that, it might be possible to recover data by studying the magnetic fields on the disk platter surface.

              Before the file is overwritten, anyone can easily retrieve it with a disk maintenance or an undelete utility.

              There are several problems in secure file removal, mostly caused by the use of write cache, construction of the hard disk and the use of data encoding. These problems have been taken into consideration when Eraser was designed, and because of this intuitive design and a simple user interface, you can safely and easily erase private data from your hard drive.

              Eraser Official Website: http://eraser.heidi.ie/


              read more "How to Remove Sensitive Data from Hard Drive: Download Eraser Media Sanitization Tool"

              Hole 196: WPA2 vulnerability discovered by Indian security researcher

              Hole 196: WPA2 vulnerability discovered by Indian security researcher

              Hole 196 refers to the page 196 of the 802.11 standard, which specifies the statement that is the basis for this attack, which I will explain to you later in the post.

              This vulnerability can let a malicious insider to decrypt traffic originating from other wireless devices on-the-fly. The upside of this attack, from a security point if view, is that the attacker has to first successfully authenticate with the access point. The downside, that means large organizations using WPA2 in trouble – as generally most damage comes from the inside. Md Sohail Ahmad is earlier known to have introduced the Cafe Latte attack along with our very own Vivek Ramachandran which they presented at ToorCon. Md Sohail Ahmad is going to demo the exploit at 2 upcoming conferences (Black Hat and DEF CON 18) so I’ll be looking out for the slides and videos on that.

              WPA2 uses two types of keys: 1) Pairwise Transient Key (PTK), which is unique to each client, for protecting unicast traffic; and 2) Group Temporal Key (GTK) to protect broadcast data sent to multiple clients in a network. PTKs can detect address spoofing and data forgery. “GTKs do not have this property,” according to page 196 of the IEEE 802.11 standard. These six words comprise the loophole, Ahmad says.

              read more "Hole 196: WPA2 vulnerability discovered by Indian security researcher"

              Pakistani Hackers Hacked 4 Indian Websites: Its game of Skill & Talent

              Pakistani Hackers Hacked 4 Indian Websites: Its game of Skill & Talent
              No official statement has been published on any of hacked website by Pakistani hackers.




              read more "Pakistani Hackers Hacked 4 Indian Websites: Its game of Skill & Talent"

              Stranger vs <=Shak=> OR Indishell vs Pak Haxors OR Indian Cyber Army vs Cyber Haxors

              Stranger vs <=Shak=>

              OR

              Indishell vs Pak Haxors

              OR

              Indian Cyber Army vs Cyber Haxors

              It seems this cyber war between techies of two nations getting more worst day by day. As per message received from Member of Indian Cyber Army Stranger "This time no defacing am leeching all your police , stock , gov documents in public if you f**k care for your country shit then stop your p0rki kids from hacking small indian communites and things "

              In response to Indian Hackers Forum http://h4ck3rs.in/ Hacked by Pakistani Hackers, Stranger said that "Pakistani hacked testing sites with installtion files on the server lolz and they call it ro0ting. Check my previous thread in this site that is called as rooting if you really ro0ted the server then show the root access now dont tell you lost it :P haha Really Grow Up Kids"

              In the meanwhile, the below Indian website has been defaced by Pakistani hackers.


              The below information has been published by Pakistani Hackers on the website.



              In response, the INDIAN CYBER ARMY has hacked below 2 Pakistani websites

              http://www.hafizabadpolice.gov.pk/ica.html



              On both the hacked website, below statements has been published by Indian Cyber Army

              Hacked BY Stranger

              Msg To :- P0rk ScRiPt KiDdIes No BaBiEs Is The CoRrEcT WoRd To YoU UH n pakjoers , We WaRnEd YoU MaNy TiMeS NoT T0 DeFaCe InDiaN SiTeS But You NeVeR LiSteNeD.. ItS TiMe To RePaY AlL YoUr CrImes NoW
              We HaVe RiSeN , RiSeN To DeStRoY YoUr CyBeR SpAcE We WiLl WhIpE OuT YoUr P0rk CyBeR ExiSTeNcE FrOm CyBeR W0rld N0w FeeL ThE PoWeR Of ICA
              You STiLl HaVe TiMe StOp DeFaCiNg InDiAn SiTeS
              B'CoZ Of YoUr FoOlIsHNeEs YoUr WeBmAsTeRs WiLl Be KiCkEd OuT Of ThERe JoB BuT We ArE DeFaCiNg A HiDdEn Page NoT LiKe YoU KiDs DeLeTiNg DaTa FrOm SiTe If YoU CoNtInUe ThE SaMe KiDdIsH ThInGs We Will Jst RM -RF Whole YoUr SeRvErS [ hope you know the meaning of rm-rf :P ]

              REMEMBER THAT

              stop donig single single SQLi, you Kidz [ PakHackers (real Kidz) & Urdu-shitz ] .. we have suggestion for you . I think you should try to secure ur b***h i mean ur Land-Pakistan .. Secure your Home first then talk about Cyber Sec .. Lol ... & Yeah .. STOP sl****g with Tali**nis ... We can f***k better .. STOP using your Land for anti-Indian activitis ... Elze If Indians Start a War On You There Will Be NO BORDER AND NO PAKISTAN IN THE WORLD
              UrDu S**T YoU HaCkInG Indian sites forgoted where your site is hosted pakistan me security naam ki cheez he nahi bachi jo you guys hosted your site in indian server WTF!! and YeA YoUr CaLLiNG AFGHAN KIDS FOR HELP :P We Got 2 Words For You S**K IT

              We Are:- -[silentp0is0n]- Mr.Xxxx aka InX_Ro0t Atul Dwivedi -Co0lt04d- str1k3r NEO Th3.RDX G00gl3w4rri0r Rj Indian
              read more "Stranger vs <=Shak=> OR Indishell vs Pak Haxors OR Indian Cyber Army vs Cyber Haxors"

              Pak Haxors Underground Hacking Technique Reveled by ~RADRULZS~

              Pakistani Hacker Crew Pak Haxors Underground Hacking Technique Reveled by ~RADRULZS~

              As per ~RADRULZS~, after searching few download sites like katz and phaze, he noticed few of the site which uploaded the apps belong to Pakistani Hacker. He then downloaded a few and scanned. He found that out of every 10 files, 8 were infected wid dwp Trojan and its signature was similar to istealer 6.0.

              Here is the proof


              This list of uploads are from
              Pak Haxors

              www.phazeddl.com/showsite/Pak%20Haxors/1/
              read more "Pak Haxors Underground Hacking Technique Reveled by ~RADRULZS~"

              Free Premium RapidShare account | Hack Rapidshare: Rapidshare Hacking

              Hack Rapidshare: Rapidshare Hacking | Timer count zero

              Enter the script given below to address bar when Rapidshare time count starts ..
              It will provide the direct download link.

              javascript:var c=0

              Premium RapidShare account, below is the list of all websites provide you free Premium RapidShare account.

              As opposed to software, this web-based approach allows users to avoid the waiting times (and Captcha) by using someone else’s RapidShare Premium service. Basically it works like this: The website owns a valid RS Premium account (or many) and offers them to be used publicly - just throw in the RS link and you’ll be downloading wait-and-captcha free. The catch? In most cases you’ll be limited to how many links you can download in a 24-hour period (usually between 3 and 5). Thus, using a few of these sites in different browser tabs will obviously allow you to download multiple files simultaneously. Then again, I don’t see why you can’t use different proxies to trick ‘em into thinking you’re an entirely different user!

              http://www.sonuhost.com — Allows for up to 3 RapidShare Links per day.
              http://www.rapidshare.co.in — 5 per day.
              http://www.rapidsharepremiumlinkgenerator.com/ — Limit not known.
              http://www.rsfox.com — 5 per day. Has a MegaUpload and a Megarotic link generator as well.
              http://www.veryrapidshare.com/PremiumDownload.aspx — 3 per day.
              http://www.rsgenerator.net — 2 per day. Also has a MegaUpload link generator.
              http://www.premify.com/rapidshare/index.php — 5 per day.
              http://www.kingrapid.com — 3 Links per day.
              http://megadl.info/rs/ — Not known.
              http://vipdirectory.net — 5 Links per day.
              http://www.rsdln.com/dl.html — 4 per day.
              http://rhost.cz — 3 per day.
              http://www.rapitshare.info — 5 per day.
              http://www.rapidloader.info — 5 per day.
              http://megaez.com — Unknown - no bandwidth available at time of test.
              http://www.rapidfile.us — 5 per day.
              http://freerslinks.com — Unknown - all slots for the day were gone at testing.
              http://xuply.com/rs.php — Unknown.
              http://www.rapidshare-premium.com — 10 per day.
              http://www.rapiddownloader.info — 5 per day.
              http://daiphyer.com/megaupload.com/premium/link/generator/megaupload.com — Unknown - for MegaUpload links only - users must be registered to use the service.
              http://oregonpr.com — 15 per day.
              http://hc-security.blogspot.com — Has a few different RS generators on site.
              http://chauthanh.info/megaupload — 10 different mirrors on site - MegaUpload links only.
              http://www.megauploadgenerator.com — MegaUpload links only.
              http://freerapid.org — They have 12 different mirrors for this - each with varying allowances on how many files can be downloaded in a day. Here are the ones that we recommend:
              -http://rsalmighty.com — 7 per day.
              -http://freerapid.org/rapid8.html — 4 per day.
              -http://freerapid.org/rapid2.html — 4 per day.
              -http://freerapid.org/rapid3.html — 4 per day.

              read more "Free Premium RapidShare account | Hack Rapidshare: Rapidshare Hacking"

              Thursday, July 29, 2010

              Indian Hackers Forum http://h4ck3rs.in/ Hacked by Pakistani Hackers

              Indian Hackers Forum http://h4ck3rs.in/ Hacked by Pakistani Hackers

              Now I am sure that by tomorrow morning, I am gonna see some defacements of biggest Pakistani website by INDIAN CYBER ARMY. Lets c.

              Below is the screen shot captures of hacked website.

              The below message has been published by Pakistani Hacker

              [ Site Security Bypassed ]

              (HACKED)

              ~&~

              [ DEFACED By ]

              [ HEX786 & Mister M0st Wanted ]

              - = This Is A Result Of What You People Are Doing.YOu Think There Is No One Who Will React To YOur Acts.U R Crossing Limits By Hacking Our Gov Websites.We Talk About Harmony,We talk about friendship But U Have always took our Peace as our Weakness.Stop Racism.Just Keep In Mind,our Army Is Defending Our Borders,Our Police Is There In Our Streets & V R Here To Secure Our Cyber World.U R Not Better Then Us In Anyway. So U Were Trying To Make Our Internet Hell.Did You Ever Think About Your Cyberworld.You Are NOt Super Secure.All What YOu Do For Fun Is Exploiting A Common Man.This Was Meant To Show You That U R not Far AWay From Us.Stop This Cyberwar Or You Will Suffer A Lot. =-

              [Message for Indians Hackers ]We Are Warning You, Stop this Cyber War You have Started Against Pakistan.Dont think that You're far Away from Us. We Will Make Your Internet Hell, See How We will Defeat You in Cyber War You'll Never Ever Forget. [ HEX786 ]


              If You Play with Fire, You Get Burned.If You do Something Dangerous,You will Get hurt.If U Think Against About Us U Will Lose Your Mind.Because We R Away For Your Mind.
              read more "Indian Hackers Forum http://h4ck3rs.in/ Hacked by Pakistani Hackers"

              Download ZoneAlarm Extreme Security 2010

              Download ZoneAlarm Extreme Security 2010

              The ZoneAlarm Extreme Security package includes everything in ZoneAlarm Security Suite and integrates the comprehensive Web security features of ZoneAlarm ForceField, which includes anti-phishing and drive-by download protection, as well as Web site security detection, a privacy mode for shared computers, and more.The ZoneAlarm Internet Security Suite will not only eradicate threats but also prevent them from ever entering in the first place. Comprehensive protection defends your PC with robust firewall technology and stops identity thieves and spammers in a single, easy-to-use application.

              ZoneAlarm ForceField application was created to be a lightweight software for your Web browser, designed to protect you from Web-based threats such as phishing and spy sites, theft, spyware downloads, and privacy invasions.
              Here are some key features of "ZoneAlarm Extreme Security":

              Antivirus:
              · New engine delivers the best virus protection with significantly enhanced detection and removal capabilities. Hourly signature updates, expanded coverage, and faster detection to find and remove even the most recent and aggressive viruses.

              Anti-Spyware:
              · More robust detection and removal functions perform deeper scans at every level and purge spyware from your PC.

              Anti-Spam & Anti-Phishing:
              · Stops spam with automatic spam blocking that automatically adapts to the latest spamming techniques. Protects against phishing emails that attempt to steal your money or identity.

              Identity Theft Protection :
              · While ZoneAlarm continues to secure your identity information on your PC, these new Identity Theft Protection services also prevent identity theft over the Internet and even in the physical world.

              Network and Program Firewall:
              · Delivers proactive firewall protection with multiple layers of security that stop inbound, outbound, and program attacks while remaining completely invisible to hackers.

              Operating System Firewall (OSFirewall):
              · This additional layer of security prevents hard-to-remove spyware, including rootkits and kernel-level threats, from getting onto your PC and causing damage.

              Auto-Learn:
              · Allows hassle-free computer operation from the moment of installation by hiding unnecessary security alerts, thereby drastically reducing interruptions during the first two weeks as the product learns the programs you typically use. Automatically configures security settings, and rates threats according to level of potential damage they represent.

              Game Mode:
              · One-click control temporarily suppresses most security alerts and prevents them from interrupting your fun while maintaining maximum protection for your PC.

              Wireless PC Protection:
              · Automatically detects wireless networks and secures your PC from hackers and other Internet threats wherever you're connected - at home or on the road.

              SmartDefense Service:
              · Provides your PC with real-time security updates, improved response to breaking spyware threats, and new attack protection capabilities.

              Superior Performance & Compatibility:
              · Allows your PC to run quickly and smoothly.

              Spy Site Blocking:
              · Prevents spyware from getting on your PC by blocking its primary source: spyware distribution websites.

              Privacy Protection:
              · Manages and blocks pop-up ads, online profiling, cookies, cache, and scripts so you can surf in peace.

              IM Protection:
              · Protects your instant messages - even those sent between different services - so they can't be monitored.

              Email Security:
              · Quarantines suspicious attachments to help defend against unknown viruses; automatically halts outbound messages to keep you from accidentally infecting others.

              Parental Control:
              · Prevents children from viewing inappropriate content on Web sites.

              Virtual Browsing:
              · Builds a protective shield around your web browser. It creates a temporary clone of your browser so that anything you do on the web runs in a protected shell, sealed off from your PC.

              Browser Threat Immunity:
              · Immunizes your browser against security holes in Internet Explorer and Firefox. Prevents web sites from installing spyware and other malicious software onto your computer without your knowledge.

              Private Browser:
              · Erases all cache, cookies, history and passwords from the current session when you close the browser. This prevents the next person who uses the computer from seeing where you've been.

              Keylogger & Screengrabber Jamming:
              · Keeps your keystrokes and click trails private. Discovers and blocks silent spyware from stealing your identity.

              Dangerous Download Detection:
              · Detects dangerous downloads and alerts you to problems before they begin. You can download files safely, and free from worry that they might harm your computer.

              Anti-Phishing:
              · Click where you want, your personal information remains secure. Dual-engine anti-phishing identifies and stops fraudulent websites that trick you into revealing personal data.

              Spy Site Blocking:
              · Prevents spyware from infiltrating your PC by detecting and blocking websites known to distribute spyware.

              Website Safety Check:
              · Checks the credentials on every website you visit, so you know if the website is a safe place to enter data and download files.

              Spyware Flushing:
              · Auto-cleans your Web browser memory each time you close it, wiping away spyware and other dangers.

              On-The-Fly Encryption:
              · Temporary file encryption protects the data you enter online from spyware for an additional measure of security.

              Seamless Integration:
              · Compatible with all popular web browsers, including Internet Explorer and Firefox on XP and Vista.

              Security Software Compatibility:
              · Run ZoneAlarm ForceField with your current antivirus or security suite, for an essential level of critical web protection you would not have otherwise. It is compatible with all security software currently on the market.

              Fast and Easy to Use:
              · Installs in seconds and runs fast so it won't slow you down. You can surf the web like always, knowing your PC is protected. ZoneAlarm ForceField runs automatically, without any setup or training.

              Requirements:

              · 1 GHz or faster processor
              · Minimum system RAM: 512 MB
              · 250MB of available hard-disk space


              read more "Download ZoneAlarm Extreme Security 2010"

              ATM Hacking: How to Hack ATM Machine

              ATM Hacking: How to Hack ATM Machine | Armed with exploits, ATM hacker hits the jackpot

              Black Hat A startling percentage of the world's automated teller machines are vulnerable to physical and remote attacks that can steal administrative passwords and personal identification numbers to say nothing of huge amounts of cash, a security researcher said Wednesday.

              At the Black Hat security conference in Las Vegas, Barnaby Jack, a security researcher with IOActive, demonstrated attacks against two unpatched models from two of the world's biggest ATM makers. One exploited software that uses the internet or phone lines to remotely administer a machine made by Tranax Technologies. Once Jack was in, he was able to install a rootkit that allowed him to view administrative passwords and account PINs and to force the machine to spit out a steady stream of dollar bills, something the researcher called “jackpotting.”

              “It's time to give these devices an overhaul,” Jack told a standing room-only audience during day one of the two-day conference. “There hasn't been a secure development methodology from the get go. The simple fact is companies who manufacture the devices aren't Microsoft. They haven't had 10 years of continued attacks against them.”

              In a second attack against a machine from Triton Systems, Jack used a key available for sale over the internet to access the model's internal components. He was then able to use a install his rootkit by inserting a USB drive that was preloaded with the malicious program.

              Both Triton and Tranax have patched the vulnerabilities that were exploited in the demos. But in a press conference immediately following his talk, Jack said he was confident he could find similarly devastating flaws – including in machines made by other manufacturers as well.

              Jack said he wasn't aware of real-world attacks that used his exploits, but this foiled attack from earlier this year appears to involve many of the same techniques.

              “Every ATM I've looked at, I've found a game-over vulnerability that allows me to get cash from the machine,” he said.

              To streamline his work, Jack developed an exploit kit he calls Dillinger, named after the 1930s bank robber. It can be used to access ATMs that are connected to the internet or the telephone system, which Jack said is true of most machines. The researcher has developed a rootkit dubbed Scrooge, which is installed once Dillinger has successfully penetrated a machine.

              Jack said vulnerable ATMs can be located by war-dialing large numbers of phone numbers or sending specific queries to IP addresses. Those connected to ATMs will send responses that hackers can easily recognize.

              read more "ATM Hacking: How to Hack ATM Machine"

              Facebook Hacking: 100 million Facebook pages leaked on torrent site

              Facebook Hacking: Hacker Proves Facebook’s Public Data Is Public | 100 million Facebook pages leaked on torrent site

              Security specialist Ron Bowes has once again proven how easy it is to glean valuable user information from Facebook, by spidering Facebook’s online directory and compiling it all into one neat little torrent that could be downloaded off his site, SkullSecurity.com.

              Bowes created a torrent containing over 171 million entries with links to profiles that provide access to the names, addresses and phone numbers of 100 million users, one fifth of Facebook. Bowes accessed Facebook’s directory, which has the default dictum “Anyone can opt out of appearing here by changing their Search privacy settings.” Yeah, but should they have to?

              These kinds of security breaches will only encourage more hackers desperate for attention. Now would be a good time for Facebook to set their default search to “Friends Only.” Why? Because most people are aren’t quite aware that check mark next to “Everyone” includes a hacker who can grab your personal info, package it up and sell it to the highest bidder.

              According to Bowes the torrent contains (at 2.8 GB, our torrent is “still downloading”) …
              • The URL of every searchable Facebook user’s profile.
              • The name of every searchable Facebook user, both unique and by count (perfect for post-processing, datamining, etc).
              • Processed lists, including first names with count, last names with count, potential usernames with count, etc.
              • The programs [Bowes] used to generate everything [which makes it easy for other hackers to replicate the process]
              read more "Facebook Hacking: 100 million Facebook pages leaked on torrent site"

              Hackers post fascist slogans on Nazi camp website

              Hackers replaced a "Book of the Dead" with neo-Nazi slogans and symbols on World War Two concentration camp Buchenwald's website (www.buchenwald.de) on Wednesday and completely erased the Mittelbau Dora camp website.

              "Brown is beautiful," read one slogan in English, referring to the color of the uniform shirts of Adolf Hitler's SA stormtroopers. "We'll be back," threatened another in German.

              "By damaging the services and documentation that we offer -- such as the Book of the Dead at Buchenwald concentration camp -- the perpetrators were trying to efface the memory of the victims of the crimes of the Nazis," said Volkhard Knigge, head of the Buchenwald memorial foundation, in a statement.

              The foundation, which is dedicated to preserving the camp's remains in commemoration of the victims and promoting public knowledge and historical research into the Holocaust, said the hacker attack had been reported to police.

              In Buchenwald the Nazis incarcerated nearly a quarter of a million people, many of them Jews, who were forced to work in arms factories. An estimated 56,000 of them died of exhaustion, starvation or illness, or were executed.

              Mittelbau Dora nearby also provided forced labor for a Nazi weapons factory and it is estimated that one third of the 60,000 prisoners held there died.
              read more "Hackers post fascist slogans on Nazi camp website"

              Wednesday, July 28, 2010

              WikiLeaks Exposed Sensitive Materials to The Public | Freedom of Information Act


              WikiLeaks Exposed Sensitive Materials to The Public | Freedom of Information Act

              Hi readers, here is a big surprise for you. Today while surfing, I have found a wonderful website http://www.wikileaks.org. Wikileaks is an international organization which publishes anonymous submissions and leaks of sensitive documents while preserving the anonymity of sources. Its website, launched in 2006.

              Within a year of its launch, the site claimed a database that had grown to more than 1.2 million documents. Video posted on a website called Collateral Murder established Wikileaks as a prime portal for unauthorized, accurate accounts, documents and video from distant battlefields.

              Wikileaks went public in January 2007, when it first appeared on the Internet. WikiLeaks combines the protection and anonymity of cutting-edge cryptographic technologies with the comfortable presentation style of Wikipedia, although the two are not otherwise related. WikiLeaks network also collects materials in person and from postal drops. WikiLeaks also run a network of lawyers and others to defend their work and their sources.

              WikiLeaks information is distributed across many jurisdictions, organizations and individuals. Once a document published it is essentially impossible to censor.

              WikiLeaks staff examine all documents and label any suspicions of inauthenticity based on a forensic analysis of the document, means, motive and opportunity, cost of forgery, what the authoring organization claims and so on. WikiLeaks become world leaders in this and have an enviable record: as far as can be determined, they have yet to make a mistake. This does not mean they will never make a mistake, but so far, method is working and have a reputation to protect.

              FOR MORE INFORMATION VISIT: wikipedia
              read more "WikiLeaks Exposed Sensitive Materials to The Public | Freedom of Information Act"