Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Monday, July 26, 2010

Crack PDF Password | Download Advanced PDF Password Recovery Tool

Crack PDF Password | Download Advanced PDF Password Recovery Tool

Get access to password-protected PDF files quickly and efficiently! Instantly unlock restricted PDF documents by removing printing, editing and copying restrictions! Advanced PDF Password Recovery recovers or instantly removes passwords protecting or locking PDF documents created with all versions of Adobe Acrobat or any other PDF application.

Features and Benefits
* Supports all versions of Adobe Acrobat, including Acrobat 9
* Supports GPU acceleration
* Supports all third-party products producing PDF files
* Instantly unlocks PDF documents with printing, copying and editing restrictions
* Removes “owner” and “user” passwords
* Recovers passwords to open
* Supports 40-bit and 128-bit RC4 encryption as well as 128-bit and 256-bit AES encryption
* Patent-pending Thunder Tables® technology recovers 40-bit passwords in a matter of minutes
* Dictionary and brute-force attacks with user-defined masks and advanced templates
* Three editions to satisfy the most demanding and savvy customers
* Optionally removes JScript code, form fields and digital signatures
* Batch mode allows automatic processing of multiple files
* Highly optimized low-level code optimized for modern multi-core CPUs

DOWNLOAD 1

DOWNLOAD 2 - Mirror

DOWNLOAD 3 - Mirror

Pak Haxors Verified Sellers Online SCAM by Dj.h@xOr & varified

Pak Haxors Verified Sellers Online SCAM by Dj.h@xOr & varified from www.pakhaxors.com

[NOTE: All the below information has been received by Mr.Amrik from Malaysia. We have not edited or changed any information received. If anyone have any proof against this information, feel free to contact FREE HACKING Team]

I am amrik from malaysia. I have been spam by Dj.h@xOr and also varified () from www.pakhaxors.com......I here by officially inform u guys not to support those kids

Here is the proof:

THIS IS MY CONVERSATION WITH dj.h@xor. He is a Ripper....dun trust him

Show Recent Messages (F3)

Got an iPhone or iPod Touch?
Send free SMS messages and access your contacts on the go with Yahoo! Messenger for the iPhone. Get it now.

Dj.h@xor: listen u their
Se7en: Online transfers :
Western Union
Moneygram
ikobo
Se7en: he show me this from the website
Se7en: how bout the malaysia fund transfers?
Dj.h@xor: u want rreal western union transfer its not cheap
Dj.h@xor: i can do western union transfer i an show u proof
Dj.h@xor: if u need
Dj.h@xor: but remember not cheap
Se7en: how to claim from the guy LR i send
Se7en: cheapest?
Dj.h@xor: we discuss price later first let me show u proof
Dj.h@xor: i have made a trf to my client just today
Dj.h@xor: u want to tracj his trf ?
Se7en: yes
Dj.h@xor: ok open westernunion.com
Dj.h@xor: and track this info
Dj.h@xor: mtcn 9168565031
Dj.h@xor: sender first name : inger
Dj.h@xor: last name : poulsen
Dj.h@xor: track this then come to me
Se7en: Status : Available for pick up by receiver
Dj.h@xor: see
Dj.h@xor: now this is call real person
Se7en: how to claim my LR from that guy?
Dj.h@xor: u cant
Dj.h@xor: its not paypal
Dj.h@xor: u cant claim LR
Se7en: he has to pay back
Dj.h@xor: i dont think so
Dj.h@xor: lr has no option for refund
Dj.h@xor: like paypal
Se7en: i know
Se7en: my balance left USD: $24.75
Se7en: he took USD49.50
Dj.h@xor: haha
Dj.h@xor: 24 $ , i never do trf for 24
Se7en: u got to.....just this time
Se7en: smallest amount?
Dj.h@xor: no tnx
Se7en: what can we get for 24?
Dj.h@xor: i dont know its ur money do watever u want to do
Se7en: what do u sell for 24
Se7en: then the cheapest WU transfer cost?
Dj.h@xor: for quick transfer , u will get ur trf in 10 minutes $200
Se7en: my bank balance left RM134.00
Se7en: how bout bank transfer to malaysia bro
Dj.h@xor: yes
Dj.h@xor: but price is same
Dj.h@xor: how much 134 = to usd ?
Se7en: USD33.90
Dj.h@xor: oh no no thats v cheap
Se7en: maybe u can....coz the verify seller is from ur site
Se7en: once get i will do again
Se7en: mera bharosa karo bhai
Dj.h@xor: no barosa warosa thing on business dude
Dj.h@xor: he scam u this does not mean i will change my fees
Dj.h@xor: i show u proof
Dj.h@xor: i think thats enough
Se7en: i know....
Se7en: how to find that guy? u know him rite?
Dj.h@xor: no i know him online
Dj.h@xor: and listen 1 thing
Dj.h@xor: dont spread any news at PH
Dj.h@xor: thats u got scam
Dj.h@xor: this is fame of PH
Dj.h@xor: i will gegt this man
Dj.h@xor: and try to recover ur money
Se7en: i want my refund
Dj.h@xor: if u post any shit on PH
Se7en: i will coz i got all his logs
Dj.h@xor: i will ban u and u will not get any refund
Se7en: bro
Se7en: u got any fullz?
Dj.h@xor: no i dont sell credit cards
Dj.h@xor: i only use it for myslef
Dj.h@xor: remember wat i said
Dj.h@xor: i9 will be leaving for now for few hours
Se7en: ok
Dj.h@xor: btw im from saudi arabia basically for lahore
Se7en: okies.....then whom u recomend to buy fullz?
Se7en: anyone?
Dj.h@xor: i will come later
Dj.h@xor: and tell u
Dj.h@xor is typing...
Dj.h@xor: c ya now
Se7en: k bye
Dj.h@xor has signed out. (7/22/2010 11:31 PM)

FINDING OF THIS ONLINE FRAUD
  1. Check the spelling of VERIFIED on PAK HAXORS forum. Its VARFIED. Is this spelling mistake or what ?? I have not found VARFIED in any dictionary.
  2. From the above chat it is very clear that DJ.h@xor is very much aware about the scam which has been done. The scammer is the verified seller on PAKHAXORS. Still DJ.h@xor is asking for money rather then helping the victim. Where is the authenticity for PH here. Are they doing hacking ONLY FOR MONEY ?? Bullshit man. According to Dj.h@xor online scam doesn't mean that he will change his fees. Very nice.
  3. Dj.h@xor threatened to the victim that if he spread this ONLINE SCAM news, he will ban him from the community. May God bless you KIDS.
  4. In their RULES section, nothing has been mentioned regarding what these KID's will do in case of such online SCAM. Nowhere they have mentioned regarding it on the forum.

Gmail Hacking: How to Hack Gmail: Best Gmail Hacks

Gmail Hacking: Best Gmail Hacks: How to Hack Gmail

100 Great Gmail Hacks for Email Addicts

Readers, I have found this tutorial very useful got all GMAIL ADDICTS. If you’re a Gmail user, you know that it’s a powerful email tool, even if you’re just using it for basic functions. However, there are so many options and hacks that you can take advantage of to take your email to the next level that it can be worth your while to learn a little bit more about what Gmail is really capable of doing. Read on to learn about 100 ways to hack Gmail for the better. Hope you link this.

Saturday, July 24, 2010

Download Conference videos from Phreaknic 13 (2009) | 2.88 GB

Download Conference videos from Phreaknic 13 (2009) | 2.88 GB

Acidus – Something New Something Web Something Not Security
Awards + Why you suck
Brian Blankership – DD-WRT
Brian Wilson & Ryan Linn – Its 9AM do you know where your hashes are
Decius Speaks
DOSMAN & Dave – Lock Picking is Not a Crime
Droops & Morgellon – Arduino Fun Part Deux
FAMULUS – Amateur Nuclear Fusion
HackerSpaces – Panel Talk
Intx80 of Dual Core Performance
Irongeek – Darknets
Java Talk – Brent Baldwin & Robert Jason talk Coffee
Presmike & Sippy – (RETRI) Rapid Enterprise Triaging
Ryan Anderson – How to Build a Cheap SAN
Scott Moulton – DIY Data Recovery Diagnostics
Tyler Pitchford – Introduction to Reverse Engineering
Ulysses – A Brief History of Locks

Download(Hotfile)
http://hotfile.com/dl/57068676/a6cefd1/_PHREAKNIC_13.part01.rar.html
http://hotfile.com/dl/57068670/482f01e/_PHREAKNIC_13.part02.rar.html
http://hotfile.com/dl/57068665/6aa94bb/_PHREAKNIC_13.part03.rar.html
http://hotfile.com/dl/57068686/6aa7819/_PHREAKNIC_13.part04.rar.html
http://hotfile.com/dl/57068938/36a7638/_PHREAKNIC_13.part05.rar.html
http://hotfile.com/dl/57068983/9b2de2b/_PHREAKNIC_13.part06.rar.html
http://hotfile.com/dl/57068999/10a72b7/_PHREAKNIC_13.part07.rar.html
http://hotfile.com/dl/57068974/62b9c9e/_PHREAKNIC_13.part08.rar.html
http://hotfile.com/dl/57068997/c9f18cd/_PHREAKNIC_13.part09.rar.html
http://hotfile.com/dl/57069012/be9fce8/_PHREAKNIC_13.part10.rar.html
http://hotfile.com/dl/57069009/cae16c9/_PHREAKNIC_13.part11.rar.html
http://hotfile.com/dl/57069049/9a7b02a/_PHREAKNIC_13.part12.rar.html
http://hotfile.com/dl/57069032/aaec895/_PHREAKNIC_13.part13.rar.html
http://hotfile.com/dl/57069078/fb566fc/_PHREAKNIC_13.part14.rar.html
http://hotfile.com/dl/57069075/5c7b1df/_PHREAKNIC_13.part15.rar.html

Download(Uploading)
http://uploading.com/files/9b82f2me/_PHREAKNIC_13.part01.rar/
http://uploading.com/files/458b6b33/_PHREAKNIC_13.part02.rar/
http://uploading.com/files/m232m19c/_PHREAKNIC_13.part03.rar/
http://uploading.com/files/m8md5432/_PHREAKNIC_13.part04.rar/
http://uploading.com/files/bd51bacm/_PHREAKNIC_13.part05.rar/
http://uploading.com/files/2526b848/_PHREAKNIC_13.part06.rar/
http://uploading.com/files/e4954fd2/_PHREAKNIC_13.part07.rar/
http://uploading.com/files/dfmee91d/_PHREAKNIC_13.part08.rar/
http://uploading.com/files/b5143678/_PHREAKNIC_13.part09.rar/
http://uploading.com/files/3b4b6eec/_PHREAKNIC_13.part10.rar/
http://uploading.com/files/1b241776/_PHREAKNIC_13.part11.rar/
http://uploading.com/files/ce7be5fa/_PHREAKNIC_13.part12.rar/
http://uploading.com/files/1a9153cd/_PHREAKNIC_13.part13.rar/
http://uploading.com/files/22be8m4f/_PHREAKNIC_13.part14.rar/
http://uploading.com/files/m4f47m19/_PHREAKNIC_13.part15.rar/

Download Ultimate Crackers Kit | Best Hacker Toolbox

Download Ultimate Crackers Kit | Best Hacker Toolbox

Hacker Toolbox consists of the latest hacking tools. A profusion of hacking, cracking, phreaking tools & files will familiarize you with how hackers break into your machine and steal your information. You can also learn hacking

Techniques from a good collection of source codes for virus and tools, instructional documentation, tutorials and much more. You can act like a master hacker to customize your own program with the editors and executable file tools.

Categories: Backdoor, Crack tool, Disassembler, DoS tool, Document, E-mail tool, Editor, Encryption & decryption tool, Executable file tool, Icq tool, Keylogger, MISC, Packet forging, Phreak tool, Scanner, Sniffer, Snoop tool, Source
code, Spoof, Virus.

DOWNLOAD

HACK Megaupload: Download Megaupload Premium Link Generator

HACK Megaupload: Download Megaupload Premium Link Generator

Everybody hates the wait time and the slow downloads. This is a program that will allow you to download like a premium user.

1. Paste your megaupload link (with http://)
2. Generate
3. Copy the link

Download from hotfile

CYBER WAR: Chinese military sets up first cyber base

CYBER WAR: Chinese military sets up first cyber base

China’s secretive military has opened its first cyber base headquarters but has assured that the facility is not aimed at launching cyber war.

People’s Liberation Army (PLA) on Monday launched the centre that is dedicated to handling all types of cyber threats and related issues.

The centre marks the debut of a new force in China to tackle potential cyber threats and to safeguard national security, PLA Daily reported but did not mention the location of the headquarters.

It marks the emergence of China's military power in information support and security, the daily said.

“The setup of the base just means that our army is strengthening its capacity and is developing potential military officers to tackle information-based warfare,” a top army official said, denying the perception that it was aimed at penetrating other country’s networks for disrupting them.

The base will be used to gather online information and “build up walls” to safeguard confidential military information, he added.

“It is a ‘defensive’ base for information security, not an offensive headquarters for cyber war,” he was quoted as saying by Global Times.

He also said that the question about whether to build a cyber war headquarters similar to that of the US or not had triggered a heated debate among some senior military officials in China.

The current level of information technology in the Chinese army lags behind that of the US.

Meanwhile there are 13 DNS servers around the globe, of which the root server and nine others are all located in US, he said.

Li Fei, a network security expert at the National Defence University, told the Global Times that the major purpose for establishing the base was to enhance the army’s strength in network defence, but he refused to give details about the base.

Cyber security attracted worldwide concern recently.

Some foreign media blamed Chinese hackers for a string of attacks on some websites that belong to government agencies and military institutions in other countries, including some sensitive ministries in India.

Refuting the reports, the National Computer Network Emergency Response Team (CNCERT) of China said “most foreign countries that developed advanced informational system and cyber technology are equipped with professional hacker teams.”

“They never mention their cyber force but keep rumour mongering and overstating the cyber threat from Chinese hackers, which conversely reflect they're covering up their political purpose of building up a cyber army,” Zhou Yonglin, an official with CNCERT, Xinhua News Agency reported.

Cyber Wars in Iran | “Iranian Cyber Army”

The internet is often seen as the domain of dissidents and free spirits. But the Iranian regime like many others has long recognised the importance of winning the virtual propaganda war, and the talk for the last couple of years has been of an “Iranian Cyber Army”, a band of dedicated regime loyalists who attack opposition websites and other virtual targets.

But untangling myth from reality in this murky world is difficult. Has the Iranian Revolutionary Guards Corps, IRGC, really deployed one of the largest forces of hackers on the planet, or is it smoke and mirrors, designed to intimidate dissident web users?

The years 1999 to 2009 were a golden decade for freelance hackers in Iran, “an era of chaos”, as a network security expert in the country describes it. With no comprehensive internet legislation or other barriers, groups of young hackers operated at will, even attacking sensitive government websites belonging to the army, the prosecutor general and even the space agency.

A member of “Emperor”, one of these groups, says it was once commissioned by a local firm to destroy a government database, while in the 2005 presidential election, it was asked to hack into two candidates’ websites.

Phishing Attack With Phishing Kit | Hackers New Creativity With Phishing Attacks

Phishing Attack With Phishing Kit | Hackers New Creativity With Phishing Attacks

A new attack has been uncovered using a phishing kit that has an indestructible infrastructure due to its residence in the cloud.

In the majority of phishing schemes when the main server is taken down the main collection point is also removed, but with this kit the data collection space is hosted separately from the phishing websites, Imperva discovered.
Once a server is taken out, all hackers need to do with the cloud-based kit is to re-post the web front end in a new location.

Imperva explained this case is also interesting for its provenance and operation.

Created by two “master hackers”, the phishing kit was posted on hacker forums. Those who used the kit then became part of the master hackers’ “army”, meaning all the data they acquired went back to the creators, who did not have to put in the hours implementing the attack.

The masters’ underlings did not know a thing about their leaders’ activities either and, depending on the country, the kit’s creators will not have broken the law as they just wrote the software.

And as each of the subsidiary hackers has their own campaign, taking down numerous domains will not affect other schemes that report back to the master hackers.

One of the overlords claimed their kit has been downloaded 200,000 times, Imperva said, but this could be an exaggeration, according to the security company’s chief technology officer Amichai Shulman.

"To some extent this is malware-as-a-service," Shulman told IT PRO, adding that the attack shows how hackers will abuse technologies people are widely using - in this case the cloud.

“This is definitely showing a shift from the normal models that we have seen so far regarding phishing,” Shulman said.

It appears hackers are getting creative with phishing attacks.

Cisco Warning against "FarmVille" | Farmville Hacker can create security threats

Cisco Warning against "FarmVille" | Farmville Hacker can create security threats

If your employees are playing popular Facebook games at work - and undoubtedly, some of them are - they are opening up malware avenues for hackers and cybercriminals, according to Cisco. This is just one of the findings of a midyear security report delivered by Cisco this week that reiterated earlier conclusions on social media, virtualization, cloud computing and mobile device use are opening up new security threats in the enterprise.

Cisco found that 7% of a global sample of users accessing Facebook spend an average of 68 minutes per day playing the interactive game "FarmVille." "Mafia Wars" was the second most popular game, with 5% of users each racking up 52 minutes of play daily. That was followed by "Café World," which is played by 4% of users chewing up 36 minutes of wasted time per day.

Cisco says that although the loss of productivity is not a security threat, cybercriminals are believed to be developing ways to deliver malware via these games. But there may be an even more nefarious element at work trying to breach the corporate enterprise through social networks.

New threats are now emerging from terrorist organizations, according to Cisco. The US Government has even awarded grants to examine how social networks and other technologies can be used to organize, coordinate, and incite potential attacks.

This should not be surprising, as terrorists groups or those linked to them have used chat rooms in the past to plot potential attacks or recruit sympathizers.

But the real danger may lie within: Cisco's research found that 50% of end users admitted they ignore company policies prohibiting the use of social media tools at least once a week, and 27% said they change the settings on corporate devices to access prohibited applications.

So Cisco recommends enterprises do the following:
  • Enforce granular per-user policies for access to applications and data on virtualized systems;
  • Set strict limits for access to business data;
  • Create a formal corporate policy for mobility;
  • Invest in tools to manage and monitor cloud activities;
  • Provide employees with guidance on the use of social media in the workplace.
Easier said than done according to this earlier Cisco study, which found that employees are regularly looking for ways to circumvent company IT security policies to use unsupported devices and applications; currently use applications not supported by the company security doctrine; and use unsupported devices that breach security policies and lose sensitive company information.

In addition, Cisco's most recent research found that cybercriminals are exploiting the gap between how quickly they can access a vulnerability and the time it takes enterprises to deploy technologies to protect their networks:

While legitimate businesses spend time weighing the decision to embrace social networking and peer-to-peer technologies, cybercriminals are among the early adopters, using them to not only commit crimes but also to enhance their communications and to speed transactions with each other.

Seems the stone enterprises are rolling up the hill keeps getting bigger.

Mobile BlueTooth Hacking tool: Download Super Bluetooth Hack

Mobile BlueTooth Hacking tool: Download Super Bluetooth Hack

Hack the bluetooth with this awesome package:

Once connected to a another phone via bluetooth you can:

- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best

"Call from his phone" it includes all call functions like hold etc.

Super Bluetooth Hack for S60 2nd-3rd devices.

Works very well on sony ericsson phones [ TESTED ]

Download Link | 12.70 Mb

Friday, July 23, 2010

How to Jailbreak iPhone | Hack iPhone: iPhone Hacking

How to Jailbreak iPhone | Hack iPhone: iPhone Hacking

Readers, in this tutorial you will learn all about Iphone Hacking. A step by step method with video tutorials. Below is the table of contents:
  • Why Jailbreak your iPhone?
  • How to Jailbreak your iPhone
  • Backup all your App Store and Jailbreak apps & their settings
  • Restore all your App Store and Jailbreak apps & their settings
  • Hardening your iPhone
  • Installing tools
  • Using custom apps and scripts
  • Setting up your environment
  • Links
Why Jailbreak your iPhone?
  • Record movies (with sound) for free!
  • Use your iPhone’s 3G Internet connection with your laptop!
  • Customize the look of your iPhone & Play more free games!
    (like Quake, NES & GameBoy titles)
  • Stream video with audio live to the Internet with Qik!
    http://qik.com/
  • Use your iPhone as a penetration testing tool!
And more…
http://www.hackthatphone.com/

How to Jailbreak your iPhone

*FIRST!!!!!* Backup your iPhone to iTunes.

Get QuickPWN for your platform from the iPhone Dev Team’s site.
http://blog.iphone-dev.org/

Then follow one of these guides (making sure there is a jailbreak for your version of the iPhone firmware):
http://thebigboss.org/guides/ (Windows)

Backup all your App Store and Jailbreak apps & their settings.

Use backup/restore to save all your apps and settings and restore them before/after you run an Apple update, reset your iPhone, or take your iPhone in for service.

What you’ll need on your computer (all free):
SSH client (Terminal or Putty on Windows)
SFTP client (Cyberduck or WinSCP on Windows)

Use Cydia to install the following apps on your iPhone (all free):
AppBackup
AptBackup
BossPrefs
OpenSSH

Connect your computer and iPhone to the same network.
Use BossPrefs to enable SSH & get your iPhone’s WiFi IP address.
SSH into your iPhone.

Run this command, save the output as a text file named applist on your computer.
A=`dpkg -l | awk '{print $2}'`; echo $A

Edit the applist text file, erase everything from the beginning up to & including “Name”.
Also take out the word “Firmware”.
Save file.

Use SFTP to connect to your iPhone and backup the following:

Info about Cydia installed apps: /private/etc/apt
All Cydia installed apps & settings: /private/var/stash/ApplicationsXXXXXX
Cycorder movies: /private/var/mobile/media/Videos
NES ROMs: /private/var/mobile/media/ROMs

Run AptBackup and tell it to backup.
Run AppBackup and tell it to backup all.
Let iTunes do a complete backup of your iPhone.

Optional
Run iPhoneNotes.app program on a Mac and export notes from iPhone.

Once iTunes has backed everything up you can use MobileSyncBrowser on a Mac to browse through the
information in all the previous backups iTunes has made of your iPhone.

Restore all your App Store and Jailbreak apps & their settings.

Use iTunes to restore or upgrade your iPhone. Then close iTunes and quit the “iTunes Helper” background program.

Jailbreak your iPhone.

What you’ll need on your computer (all free):
SSH client (Terminal or Putty on Windows)
SFTP client (Cyberduck or WinSCP on Windows)

Use Cydia to install the following apps on your iPhone (all free):
AppBackup
AptBackup
BossPrefs
OpenSSH

Connect your computer and iPhone to the same network.
Use BossPrefs to enable SSH & get your iPhone’s WiFi IP address.
SFTP into your iPhone.

Copy the apt directory from your computer, back to this folder on your iPhone
/private/etc/apt

Copy all your Jailbreak apps from your computer, back to this folder on your iPhone
/private/var/stash/ApplicationsXXXXXX

To backup Cycorder movies, copy the Videos dir to your computer
/private/var/mobile/media/Videos

Copy your ROMs folder from your computer, back to this folder on your iPhone
/private/var/mobile/media/

Open the applist text file you created and copy everything in it.
SSH into your iPhone.

Type in this command: apt-get install x
where x text copied from the applist text file.

Open BossPrefs on your iPhone > More > Fix User Dir Permissions
Reboot your iPhone and start iTunes and let it restore your regular iPhone stuff.
Wait for iTunes to restore the iPhone, let it reboot and sync all your content back on the iPhone.
Run AptBackup and Restore.
Run AppBackup and Restore.

Hardening your iPhone

Change default passwords for root and mobile accounts.

Settings > Wi-Fi > Ask to Join Networks > Off
Settings > General > Auto-Lock > 3 Minutes
Settings > General > Passcode Lock > On

BossPrefs
Turn off unused services: Wifi, Bluetooth, SSH
Disable Apple App Killswitch

Installing Tools

App Store
Mocha VNC Lite
Remote Desktop Lite
Snap

Cydia
BossPrefs
MobileTerminal
OpenSSH

Selections > All Packages
iPhone 2.0 Toolchain
Metasploit - takes about 3-4 minutes to load.
netcat
Nmap
StumblerPlus
tcpdump
wget
whois

Search
diskdev-cmds
libxml2
Make
SQLite v3

Command Line
apt-get
apt-get update
apt-cache search nmap
apt-get install nmap

Using Custom Apps and Scripts

Before using SSH, SFTP or the Terminal make the following change:
Settings > General > Auto-Lock > Never

Propecia is an extremely fast Class C port scanner.
http://packetstormsecurity.org/UNIX/scanners/propecia.c

Compile
gcc -o propecia propecia.c
ldid -S propecia
./propecia

My custom script using Propecia and nmap.
discover.sh

Setting up your environment
env will show your environment variables including the path.
Move your app to one of the folders listed in the path.
mv propecia /usr/bin/

Or add the location of your app to the path.
nano /private/etc/profile

Terminal Menu
pwn cd /•! ./discover.sh•!
rm txt rm *.txt•!
clear •L
kill killall Terminal•!

Terminal preferences
Change font size
Arguments
su root

Links

ModMyi user forums
www.modmyi.com/forums/iphone-modding/

iPhone App review site
www.readwriteweb.com/archives/4_great_iphone_app_review_sites.php

Social website to list and vote up/down on apps
http://iphone.lockergnome.com/

IRC for Cydia
irc.saurik.com
#iphone

Thanks

Jay Freeman (saurik) for everything! (Cydia, cycorder, Veency, WinterBoard etc..)
www.saurik.com/

Kouichi ABE for StumblerPlus
www.mysticwall.com

Scott Wallace for help with compiling custom apps

Wijman on the ModMyi forums for the exporting list of installed packages command
www.modmyi.com/forums/general/286121-how-restore-cydia-apps-my-guide.html

Erica Sadun for all her iPhone work (recAudio)
http://ericasadun.com/

SkyDog for giving us a place to ‘Give it up, Turn it loose’!
http://hackerconsortium.com/

Kaspersky Resetter & Key Maniac & Black List crack & Video (2010)

Kaspersky Trial Resetter is the first and only program that is able to reset the license key for all Kaspersky products.

How to:

Follow the next steps to correctly reset the license key for your Kaspersky product.
  1. Disable the Self-Defense.
  2. Close your Kaspersky product.
  3. Click on ‘Start Reset’ to begin.
  4. Wait for Kaspersky to prompt you to activate.
  5. Activate your product using the online method.
Notes:

The location of Kaspersky’s ‘Self-Defense’ may vary depending on what version of Kaspersky product you are using. If the removal of the old license key fails then log off or restart your computer and try again.

Download from hotfile

Crack All Adobe Products: Download Adobe Product Key Finder

Crack All Adobe Products: Download Adobe Product Key Finder

Adobe Product Key Finder is a straight-forward application that will help you recover all your Adobe product keys. The software automatically searches your computer for the product keys and serial numbers that your software programs store in the registry or in the cache.

Adobe Product Key Finder allows finding and recovering license keys for Adobe Acrobat, Adobe Dreamweaver, Adobe InDesign, Adobe Illustrator, Adobe Photoshop, Adobe Flash, Adobe Fireworks and more.

With Adobe Product Key Finder you simply diagnose your system for all installed Adobe products and make a backup, print it or save to the file or database.

You can also backup yoru recovered product keys and save them as a Tab Delimited Txt File (.txt), CSV Comma Delimited (.csv), Excel Workbook (.xls), Access Database (.mdb), Web Page (.html), SQLLite Database or XML Data (.xml) file, print key list or copy all to clipboard.

Homepage - http://www.nsasys.com/

Download Link

Mirror

Best Hard Disk Data Recovery Software & File Repair Tools | 29 data Recovery Tools AIO @ 47mb ISO

Best Hard Disk Data Recovery Software & File Repair Tools | 29 data Recovery Tools AIO @ 47mb ISO

Try the Kernel TM Recovery range of Best Selling hard disk data recovery software & file repair products, for recovering deleted files or corrupt files data, which gets lost due to following reasons -

» Format of a hard drive partition
» Partition structures are damaged or deleted
» Unexpected system shutdown or software failure
» Accidental File Deletion
» Virus Infection or Corruption
» Various Kind of File System Corruption
» File Corruption
» Bad Sectors

Programs in the AIO:
  • Digital Media Data Recovery 4.02
  • Exchange OST to PST Conversion 4.04.03
  • FAT Partition Recovery 4.03
  • Foxpro DBF File Recovery 5.01
  • IncrediMail Email Recovery 4.02
  • Linux Data Recovery 4.03
  • Linux JFS Partition Recovery 4.02
  • Linux ReiserFS Partition Recovery 4.02
  • Macintosh Data Recovery 4.04
  • MS Access Recovery 4.04.05
  • MS Backup File Recovery 4.05.01
  • MS Powerpoint Recovery 4.05.01
  • MS Publisher Recovery 4.04.01
  • MS Word Recovery 4.03
  • NFTS Partition Recovery 4.03
  • Novell NSS Partition Recovery 4.03
  • Novell Traditional Partition Recovery 4.03
  • Outlook Express DBX Mail Recovery 4.02
  • Outlook Express Password Recovery 4.02
  • Outlook PST Password Recovery 4.02
  • Palm Pilot Database File Recovery 4.03
  • Paradox Database File Recovery 4.03
  • SCO OpenServer Data Recovery 4.01
  • Solaris Intel Data Recovery 4.04.01
  • SPARC Data Recovery 4.01
  • SQL Server Password Recovery 4.02
  • Tape File Recovery 4.02
  • Undelete 4.02
  • VBA Password Recovery 4.02
  • Universal keygen
View the site for information on individual programs included in this AIO -
http://www.nucleustechnologies.com/

DOWNLOAD LINKS

http://rapidshare.com/files/363266166/recovery.rar
http://www.megaupload.com/?d=U00E6EE0

1.extract it
2.mount it
3.enjoy!

Safari browser vulnerable to auto hack attack

WhiteHat has disclosed a critical security vulnerability in Apple's Safari browser that could allow hackers to extract personal information from the OS X address book.

"Right at the moment a Safari user visits a malicious website, even if they've never been there before or entered any personal information, [it] can uncover their first name, last name, work place, city, state and email address," WhiteHat CTO Jeremiah Grossman wrote in an official blog post.

Chinese army to target cyber war threat

The People's Liberation Army has unveiled its first department dedicated to tackling cyber war threats and protecting information security, Chinese media reported today.

The move comes just over a year after the United States created a cyber command.

The PLA Daily said the military announced the creation of the Information Security Base on Monday, giving few more details in its brief report.

But an officer in the General Staff headquarters, which directly oversees the new department, told the Global Times: "It is a 'defensive' base for information security, not an offensive headquarters for cyber war."

He said the base would be used to gather online information and "build up walls" to safeguard confidential military information.

Ni Lexiong, a Shanghai-based military analyst, told the South China Morning Post: "The USCYBERCOM aims at coping with hacker attacks as well as other cyber attacks, which means the internet will become another key battlefield in tomorrow's world.

Iran vs China Cyber War | What is Inside Story ?

Access to China’s biggest search engine has been blocked, apparently by forces from Iran. But it’s not yet clear whether it was the site itself or its DNS records which were blocked.

For most of this morning (Chinese time) Baidu.com was unavailable to visitors, replaced with a message claiming the attack was the work of the Iranian Cyber Army. That’s a group which supports the current Iranian government and has previously been blamed for attacks on Twitter after the microblogging site attracted attention as an outlet for Iranians to speak out in the wake of disputed elections.

Baidu has not spoken about who might be responsible for the attacks, simply saying that Cheap Timberland Boots its domain registration was “tampered timberland boots with”. That suggests the attack involved setting the Baidu Web site address to redirect to a different Web site tan usual. If that’s the case, and given the sheer number of users, it’s lucky the attackers appeared to have merely been expressing a political message rather than aiming to distribute malware.

The motives for the attack don’t appear to be linked to any dispute between China and Iran itself. There are political dissidents in both countries which have faced online censorship. But if the Iranian Cyber Army is indeed a supporter of Iran’s regime, there doesn’t seem to be any logical reason why it would attack Baidu, which is largely compliant with China’s strict rules on internet content.

Depending on timberland mens boots your level of conspiracy theory beliefs, the attack could be the work of Iranian opposition forces who posed as the Iranian Cyber Army with the aim of provoking Chinese forces to respond by bringing down official Iranian sites — a tactic which, if true, has already paid off.

For those 6 inch timberland boots who want a more straightforward explanation, Baidu is one of the roll top timberland boots biggest sites in the world and bringing it down even temporarily would certainly be a great way to get publicity.

Cyber War OR Cyber Cold War ?

Major countries and nation-states are engaged in a “Cyber Cold War,” amassing cyberweapons, conducting espionage, and testing networks in preparation for using the Internet to conduct war, according to a new report to be released on Tuesday by McAfee.

In particular, countries gearing up for cyberoffensives are the U.S., Israel, Russia, China, and France, the says the report, compiled by former White House Homeland Security adviser Paul Kurtz and based on interviews with more than 20 experts in international relations, national security and Internet security.

“We don’t believe we’ve seen cases of cyberwarfare,” said Dmitri Alperovitch, vice president of threat research at McAfee. “Nations have been reluctant to use those capabilities because of the likelihood that [a big cyberattack] could do harm to their own country. The world is so interconnected these days.”

Threats of cyberwarfare have been hyped for decades. There have been unauthorized penetrations into government systems since the early ARPANET days and it has long been known that the U.S. critical infrastructure is vulnerable.

However, experts are putting dots together and seeing patterns that indicate that there is increasing intelligence gathering and building of sophisticated cyberattack capabilities, according to the report titled “Virtually Here: The Age of Cyber Warfare.”

“While we have not yet seen a ‘hot’ cyberwar between major powers, the efforts of nation-states to build increasingly sophisticated cyberattack capabilities, and in some cases demonstrate a willingness to use them, suggest that a ‘Cyber Cold War’ may have already begun,” the report says.
Because pinpointing the source of cyberattacks is usually difficult if not impossible, the motivations can only be speculated upon, making the whole cyberwar debate an intellectual exercise at this point. But the report offers some theories.

For instance, Alperovitch speculates that the July 4 attacks denial-of-service on Web sites in the U.S. and South Korea could have been a test by an foreign entity to see if flooding South Korean networks and the transcontinental communications between the U.S. and South Korea would disrupt the ability of the U.S. military in South Korea to communicate with military leaders in Washington, D.C., and the Pacific Command in Hawaii.

“The ability of the North Koreans to disable cybercommunications between the U.S. and South Korea would give them a huge strategic advantage” if they were to attack South Korea, he said.
There have been earlier attacks that smack of cyberwarfare too. Estonian government and commercial sites suffered debilitating denial-of-service attacks in 2007, and last year sites in Georgia were attacked during the South Ossetia war, orchestrated by civilian attackers, the report says.

The report concludes that if we aren’t seeing it already, cyberwarfare will be a reality soon enough.

“Over the next 20 to 30 years, cyberattacks will increasingly become a component of war,” William Crowell, a former NSA deputy director, is quoted as saying. “What I can’t foresee is whether networks will be so pervasive and unprotected that cyberwar operations will stand alone.”

"Backup" Tools For Mysql Administration

"Backup" Tools For Mysql Administration

mysqldumper

MySQLDumper is a script for backing up MySQL databases written in PHP and Perl. It uses a proprietary technique to avoid execution interruption by reading and saving a certain amount of commands, then calling itself via JavaScript to memorize how far in the process it was. Finally, the script resumes its action from last standby.

Download:
Code:http://forum.mysqldumper.de/downloads.php?cat=2[Image]

phpMyBackupPro

phpMyBackup Pro is a very easy to use, free, web-based MySQL backup script, licensed under the GNU GPL. Script allows a lot of operations such: backup of one or several databases with or without data, table structure; backup directly onto FTP server and sending of backups by email; manage, restore and schedule backups and others. phpMyBackup Pro is platform independent: it requires only a web-server and PHP.

Download:
Code:http://www.phpmybackuppro.net/download.php[Image]

AutoMySQLBackup

A shell script to take daily, weekly and monthly backups of MySQL databases using mysqldump. It's features includes: backing up mutiple databases, create a backup into a single backup file or to a separate file for each DB, backup files compression, backup to remote server, e-mail user when backup is completed and others.

Download
Code:http://sourceforge.net/projects/automysqlbackup/files/

Backup2Mail

Backup2Mail is a PHP script that creates regular backups of MySQL databases and sends them to configurable e-mail address. The whole process can be scheduled with a help of Cron (for Unix/Linux) or with Task Scheduler (for Windows).

Download
Code:http://www.backup2mail.com/download/backup2mail.zip

mylvmbackup

mylvmbackup is utility for creating MySQL backups via LVM snapshots. To perform this, mylvmbackup obtains a read lock on all tables, flushes all server caches to disk, creates a snapshot of the volume containing the MySQL data directory and unlocks the tables again. The LVM snapshot is mounted to a temporary directory and all data is backed up using the tar or rsync program. Script requires Perl5 and LVM utilities.

Download
Code:http://www.lenzg.net/mylvmbackup/#Downloads

MyPHPdumpTool (mpdt)

MyPHPdumpTool is a PHP (CLI) based MySQL backup tool that can be configured to automatically archive and upload any database-dump file to any FTP server. The backup process can be scheduled with a help of Cron (for Unix/Linux) or with Task Scheduler (for Windows).

Download:
Code:http://sourceforge.net/projects/myphpdumptool/files/

mysqlblasy (MySQL backup for lazy sysadmins)

mysqlblasy is a Perl script for automating MySQL database backups. The main feature of this script is automatic backups rotation to avoid that the backup disk gets full when the administrator is on vacation (or is lazy). Each database gets dumped into a separate file, after which all the dumps get tarred/compressed and placed into the specified backup directory. Old files in the backup directory get deleted, and the number of newest files that is specified in configuration file is kept.

Download:
Code:http://pol.spurious.biz/projects/scripting/mysqlblasy.php#downloadSypex Dumper Lite

Sypex Dumper Lite is developed by specialists of Ukrainian company and it is a PHP script for quick and easy MySQL database backup. The script is very fast with all types of databases (small or large), because it uses special technique for dumping: the backup file is not stored entirely in memory.

Download:
Code:http://sypex.net/products/dumper/downloads/
Older Posts Home