Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Friday, May 21, 2010

Free Penetration Testing & Vulnerability Assessment by Centuno Solutions

Secure business information environments start with powerful network security solutions and IT solutions that provide a secure framework critical to the safety and integrity of your business information.

Centuno Solutions can maximize your network security with customized solutions. From vulnerability assessment to network security solutions, experts can eliminate your security risks while ensuring the seamless operation of your business applications.

'One Stop Shop' concept eliminates the hassles of working with multiple information security companies. Centuno Solutions can handle all of your small business software development, security, IT, and project maintenance.

Centuno is now offering a Free Penetration Testing. Perform a vulnerability assessment and evaluate the defense of your current network security solutions.

The best way to evaluate the security of your system is by actually trying to break into it. Centuno Solutions security penetration testing process simulates an actual hacker attack. This real life penetration test attack simulation involves analyzing your business systems for potential vulnerabilities, weaknesses, or misconfigurations.

At the end of the penetration test, you receive a report detailing the vulnerabilities found in addition to information on the impact and a proposal for mitigating the security risk.

Some of the penetration testing services we offer include:
  • Network and Port Scanning
  • Identification of Systems and Services
  • Firewall and Router Penetration Testing
  • Vulnerability Research
  • Password Cracking
  • Internet Web Application Security Penetration Testing
  • Reverse Engineering of Proprietary Applications
  • Research for Zero Day Exploits
For more information on security penetration testing services, click to contact a penetration test expert with Centuno Solutions today.

Thursday, May 20, 2010

Amarjit Singh| Hackers Lifestyle | Venturous Bikers Club Trips & Tours

This post is dedicated to all my fellow readers, who are in touch with me using GTALK. You can also add me. My GTALK id is . Due to less time, the response may be late, but will respond to each and every ping once get free time.

So many of my net friends always ask me about a life style of hacker. Well rather then explain anything, I thought to share my BIKING CLUB with you guys. Our biking club is VENTUROUS BIKERS CLUB. Visit our official site and I have posted all my tour & trips pics with full details there. Few of mine all time favorite trips mentioned below. You click on hyper links for photographs & tour videos. Hope your like this post.

How My Sultanpur Bird Sanctuary Tour Became an Unforgettable

It was only the morning 10. The last night I had been spent with making morning plannings. This time it was really freaking out for me. We had 3 Cane's of petrol inside us first and then we walk across the road towards the lake. Today, when I awoke, I suddenly realized that it was one of the best day of my life, ever! I will marvel at God's seemingly simple gifts: the morning dew, the sun, the clouds, the trees, the flowers, the birds. Today, none of these miraculous creations will escape my notice. For more click here

My Big Brother Mr.Kuljeet Singh Marriage Pics: 100% punjabi desi style wedding

WOWW...What The Wonderful Experience it was..!!..Since my school time, I had not seen any of my brother's marriage. During school times, I was so small..really kid and no matters what hapenning in my near world. Now here I would like to share my experince with you guys. Punjabis believe in doing everything larger than life and a special occasion like marriage is celebrated like a big carnival, exhibiting splendid glamour. I will try my level best to give you a feel about 100% punjabi desi style wedding. Hope you like this post and morover the photographs.
For more click here

Amazing trip to Dhanaulti - Near Mussoorie

It was a detour from our usually biking and we decided to hire a cab for our outstation venture..
seems the gods of all my teammates were not on their sides.....It was a very evenful experience and an eye opener for all of us.

It was the 9:00pm of 24th April,09 and I was at our office to pick all the 6 fellows for our well planned trip to Surkanda Devi temple near Dhanaulti. Inder has come specially for this trip to Delhi. After picking all of them, we went to the nearest DHABA in Delhi. Here we took some food & after that searched for our PETROL....ooaahhaaa.. For more click here

A Trip to Sri Harmandir Sahib The Golden Temple, Amritsar, India

There is no place like Golden Temple on this planet. It is beyond any number game. Its a place where you get solution of all d problems. A place where you can feel comfortable you relaxed even more than your own home. Most Sikh people visit Amritsar and the Darbar Sahib at least once during their lifetime, particularly during special occasions such as birthdays, marriage, birth of children, etc. For More Click Here

Ramandeep Singh....RD is in Mood to Rock

He is RD.....Ramandeep Singh, pyar se sab isko RD bolte hai. I suggested him to use "X" as suffix. Tab ye ban jaiga RDX. The police will catch him and thro into the jail.....He is a mirror-cracking material, so girls, pls beaware of him. For more click here

How to Sight in a Gun while hunting the Kabooters [Pigeon]

This time it was really freaking out for me. We had taken one-one desi patiyala of petrol [Ghar di kadi] inside us first, and then we walk across the road towards the Haveli [Shelter type…. for domistic animals like cows & buffalos]. Here I tried to diminutive the animals food & it was really tough job. After this we came back to the CHUBARE [The top floor in villages] & start messing with the GUNS. I went to my big bro Navi’s home where he has two 12-bore rifles. For more click here

Sariska Wildlife Sanctuary...Amazing Trip To Sariska

Well to say this was my trip, my post……… would be totally untrue. At best, this was my dream. There are ppl in this world, some of them so wonderful, that made this dream become an unforgetable trip & you are reading this post on this blog. I would like to thank all of them, an in particular:

Apna Jaat, pyara Jaat, sabka raaj dulara Jaat….Dinesh Singh…Mentor, guru, friend & big bro, who taught me …..he he he he he chalo chodo abb kya batao, ki kya kya sikha gya bhai jaate jaate mere ko…..& stayed with me right till the end. If he had not encouraged me all the way, I would never be hold that much…..but wat???? Abbe khud he samaz jao..

Shivlu Jain [The Tashan], Sanjoy Ghoshal [Udi baba..hmmhai bangoli babu], Logu [Agar is ko hindi aata hotta ……ya pir humko tamil atta hota ……….to ye hum sabki bajaa deta], Prashant [Mr.Kurta Pajyama…vo bhi chudidaar…kuch bhi bolo per ladka hai handsome] & finally my self [Sala bolo ya kutta bolo….ya bolo tum kamina….mai to nikaal dunga tumhare buttocks ka pasinaa]….Amazing friends. For more click here

Tour to CHAKRATA

Renowned as a picturesque picnic spot, Chakrata in Dehradun District of Uttaranchal State of India is a hill station and a famed tourist destination located at an altitude of about 7000 ft above the sea level. The town was known earlier as Jaunsar bawar, a small hamlet of Jaunsari tribe. For more click here.

Holi Hangama

The last night I had been spent with making morning plannings. This time it was really freaking out for me. Can life get better than this ? Check out snaps. Sometimes, a picture is really worth a thousand words. For more click here

Thrill of zipping : Make a trip to Flying Fox at Neemrana Fort Palace

Yet another unforgettable adventrous excursion to the 15th century - Neemrana fort:::: Thrill of zipping comes to Neemrana

Leaving behind all the worries of daily routine-office,boss,colleagues,one needs to snatch out time from one's hectic schedule to pacify one's minds and relieve oneself. To get this ease for ourselves, I and my friends---------- chalked out a plan to explore Thrill of zipping @ Neemrana Fort-Palace built since 1464 AD.

It is Rajasthan's closest palace from New Delhi, situated at 122 kms. on the Delhi-Jaipur highway - only 100 kms from Delhi's international airport. Sited on a majestic plateau, concealed in a horseshoe formation of the billion year old Aravalli ranges.

What more cud u ask for an excursion?????!!!!!!!! For more click here

CLICK HERE For Video's & Photographs at Neemrana Fort Palace

Venturous Bikers Having Drinks: Best Weekend @ 4S Bar in GK-II

PART-1 PART-2 PART-3 PART-4 PART-5

Know your Wines: What is difference between Red Wine, White Wine, Rose Wine and Champagne

Facts about Alcohol. How to hold your drink better for long time. A tip for both guys and girls

WinRAR Password Recovery | WinZIP Password Recovery Download Free Tools

Zip password Recovery Magic v6.1.1.169
ZIP Password Recovery Magic is an easy-to-use program that can help you to recover lost passwords for zip archives. ZIP Password Recovery Magic provides brute-force and dictionary recovery methods, you can pause and resume recovery job easily. ZIP Password Recovery Magic has an easy to use interface. All you need to recover your password is just to add your file to the operation window.

Download Here

Winrar Password Remover and Finder
RAR Password Recovery is a powerful tool to recover lost (forgotten) passwords for a RAR/WinRar archives. The program supports the Brute-Force attack, dictionary-based attack and dramatically fastest “Booost-Up” attack. The program is able to resume the previous interrupted attack.

Here is a brief list of RAR Password Recovery advantages:

1. Recovers passwords for a RAR/WinRAR archives using combination of Brute-Force, Booost-Up or Dictionary attacks.
2. Very high speed of work (more than 3000 passwords per second in Brute-Force mode and up to 22000 passwords per second in Booost-Up mode).
3. Customizability.
3. Advanced heuristic processor.
4. User-friendly interface.
5. Large wordlist dictionary.
6. Ability to work in the background.
7. Autosave feature.

Download Here

If any of you are wondering about anything strange going on with Paul Pierce’s Twitter account then wonder no more, as news comes that his account has been hacked into. The account you will has been verified as being authentic by Athlete Interactive, the firm behind his account, but there are certain incidents that have come to everybody’s attention.

If you look here you will see the verification of the hacking. Some of the items that were posted are bizarre to say the least and Pierce of the Boston Celtics and his representatives will no doubt soon confirm they were not made by him, according to

Some of the Tweets included things such as “You know we are going crazy tonight. Sorry Dwight” and even more strangely, “Anybody got a BROOM?” One thing that became clear though is that Pierce always Tweets via text or Twitter’s web site, but the imposter Tweets came through Twitterific, so it certainly seems as though someone has been playing games.

Michael Jackson: Disturbing photos of ripped body of his autopsy on internet

Internet is a double edged sword. If it has revolutionized the modern world with the screaming, new technologies, it also presents itself as a curse when it bares open its devilish fangs.

After Megan Fox’s topless photos from Passion Play have hit the net to the voyeuristic eyes of millions of males, a hideous possibility is knocking at the door waiting to devour Jackson’s fans.

There are genuine fears that the torn and ripped photos from Michael’s autopsy reports can find its way into the internet. Though, authorities are taking a stern vigilance, still in this age of hackers and tabloid, a scare is looming large amongst the officials and family members of MJ. If these photos are leaked, then a huge mayhem will follow and the disturbing images of the ‘King of Pop’ may haunt the minds of the sensitive fans for ever.

“Some of the edgier internet sites run by foreign operators are attempting to secure the photos through unauthorized release — with talk that the pictures could be worth upward of $5 million!” a source from National Enquirer reports.

It’s a pity how low can this world stoop for some cheap publicity and money……….

Wednesday, May 19, 2010

Download Best Free Hacking Tools & Softwares: Download Trojans, Keyloggers, Wireless Hacks, Mobile Hacks & Crackers | BEST COLLECTION


DOWNLOAD


DOWNLOAD


DOWNLOAD


DOWNLOAD


DOWNLOAD


DOWNLOAD


DOWNLOAD


DOWNLOAD


DOWNLOAD

Download DEFT v.5.1 (2010): Computer Forensic Live CD


DEFT v.5.1 (2010)
Name: DEFT | Version: 5.1
Architecture: X86 | Type disks: CD
Size: 698.12 Mb

Distribution DEFT 5.1 is designed to analyze the effects of breakups and identify hidden or lost data in the system. The distribution can also be used to gather evidence in the investigation of computer crimes. The distribution is based on Xubuntu, but it comes with a desktop environment LXDE and equipped with its own graphical DEFT Extra 2.0 to perform typical operations in the investigation. In the distribution is fairly complete collection of specialized tools from antivirus scanner nessus Switchers and tools to detect rootkits, before the disc analyzers Guymager, Sleuthkit, Autopsy, dcfldd, ddrescue and linen. ISO-image DEFT 5.1 is 698 MB.

The new version of the updated applications Sleuthkit 3.1.1, Autopsy 2.24, Xplico 0.5.7 (with 100% support for SIP - SDP, RTCP, RTP-codec g711, g729, g722, g723, g726). June 3, developers plan to start developing DEFT Linux 6, which will be based on Lubuntu 10.10, DEFT Release 6 is scheduled for December 2.

Download :

http://hotfile.com/dl/43663873/522299e/deftv5.1.part1.rar.html
http://hotfile.com/dl/43664832/3d1a614/deftv5.1.part2.rar.html
http://hotfile.com/dl/43664017/ccedcc6/deftv5.1.part3.rar.html
http://hotfile.com/dl/43664156/cacdd78/deftv5.1.part4.rar.html
http://hotfile.com/dl/43664308/5e645e2/deftv5.1.part5.rar.html
http://hotfile.com/dl/43664376/7d81dd2/deftv5.1.part6.rar.html
http://hotfile.com/dl/43664414/207dbb4/deftv5.1.part7.rar.html
http://hotfile.com/dl/43664455/3c832d9/deftv5.1.part8.rar.html

Google Operating System 2010 (Android LiveCD - No Instalation) | 179 MB

LiveAndroid lets you download a disk image LiveCD operating system Google Android. Just record the image on the disc, placing it in the CD-ROM drive and restart your computer and you can test Android, without installing it and not touching any files on your computer.
Checksums :
MD5 E0C5C305F78CD958DBAEA3716C82296F
SHA-1 741B42748666AC085FC12692AC6AFB369B002A2E
CRC32 EEDBFF00
Language: English

http://hotfile.com/dl/43656832/3176fe1/liveandroid.part1.rar.html
http://hotfile.com/dl/43656859/0258fc4/liveandroid.part2.rar.html

Download Norton Internet Security 2010 17.0 - 98Mb

Norton Internet Security was designed to be the fastest virus, spyware and internet protection you can buy. The Norton Internet Security main window acts as a security management interface.

Norton Internet Security 2010 will be the fastest and lightest security suite Symantec has ever delivered. It guards your PC, network, online activities and your identity with innovative, intelligent detection technologies optimized to combat today’s aggressive, rapid-fire attacks. Improved Norton Safe Web technology blocks Internet threats before they can infect your PC.

So you can browse, buy and bank online with confidence. It even warns you of unsafe web sites right in your search results. Plus, unlike other Internet security suites, it provides easy-to-understand threat and performance information to help you avoid future threats and keep your PC running fast.

Here are some key features of "Norton Internet Security":

Engineered for Speed:
• Proven fastest and lightest security suite available
• Intelligence-driven Norton Insight technology targets only those files at risk for faster, fewer, shorter scans
• Installs in under one minute on average requires less than 7 MB of memory
• Up-to-the-minute Protection
• Delivers up-to-the-minute protection with rapid pulse updates every 5 to 15 minutes.
• The Norton Protection System provides multilayered protection technologies that work in concert to stop threats before they impact you.
• Real-time SONAR (Symantec Online Network for Advanced Response) helps prevent bots from taking control of your PC.
• Prevents threats from entering through your firewall.
• Detects and automatically removes online threats.
• Defends against Web-based attacks with patent-pending technology.
• Recovery Tool boots and repairs badly infected PCs
• Delivers our most complete deep-cleaning scan possible.
• Prevents bots from taking control of your PC.
• Norton Ongoing Protection provides continuous protection updates and new product features as they become available throughout your product subscription period, helping to keep your computer protected against the latest Internet threats and risks.
• Norton Automatic Renewal Service helps to ensure that you’re protected by automatically renewing your product subscription before it expires.
Norton Identity Safe:
• Keeps your online identity safer than ever when you buy, bank, browse, and game online.
• Advanced phishing protection keeps your personal identification out of the hands of fraudulent Web sites.
• Stores and encrypts your passwords and other confidential data.
• Fills in online forms at your request to save time and protect you from keystroke loggers.
Control without disruptions:
• Puts every element of your security at your fingertips
• NEW! Schedules resource intensive tasks for when you’re not using your PC.
• Review the security status of every process on your PC.
• Silent mode suspends alerts and updates to avoid interrupting or slowing games and movies.
• Smart two-way firewall automatically makes security decisions for you.
Secure Networking:
• Helps you secure your home network.
• Conceals and secures your PC on public Wi-Fi networks.
Parental Controls:
• Create individual user profiles with enhanced parental controls.
Spam Blocking:
• Filters spam better than ever.
What's New in This Release:
• New and Improved Features
• Performance Enhancements
• The 2010 products improve on the very high performance bar already set by the 2009 products. The Beta builds will be regularly updated, with later builds improving on performance and functionality.
• Enhanced Norton Insight
• Norton Insight is built on the Symantec Quorum backend intelligence technology first introduced in the 2009 products. In 2009 Norton Insight only quantified trustworthiness, in 2010 Norton Insight also provides information on prevalence, age, and runtime performance data.
• Download Insight
• Download Insight is a new line of defense against the introduction of untrusted applications on your system. Download Insight monitors new application or installer downloads, automatically analyzes and classifies the application using the Quorum technology, and provides you with a trust rating for the application before allowing the application or installer to execute.
• Performance Monitoring
• The system performance ...

Download Here


Youtube Kry 5.2.3 Beste Youtube Video Downloader Fast Download

Download Microsoft Office 2010 Blue Edition [Fully Activated Forever] | 650 Mb

Microsoft Office 2010 Blue Edition Multi4 Update 051610 [Fully Activated Forever] | 650 Mb

Microsoft intends to release Microsoft Office 2010 Technical Preview to invited guests who register to sign up for Office 2010 CTP Program only by July 2010. Office 2010 was previously known by codename Office 14 (taken cue from its version), and wrongly assume to be Office 2009. The setup installer of both 32bit (x86) and 64bit (x64) Office 2010 Technical Preview 1 (TP 1) has been leaked to BT network. The leaked Office 2010 Technical Preview 1 has the version of 14.0.4006.1010, a pre-trial version provided to premium Microsoft partners.

It's unclear whether it is the leaked Office 2010 TP1 build will be the version that is going to be released officially by Microsoft in July. And it's still unclear yet whether Microsoft will make available publicly for Office 2010 Beta downloads, which is said to be will be having 2 betas - Beta 1 in July 2009 and another Beta 2 in November 2009. The betas is said to be different from Technical Preview, where TP is just meant as an engineering milestone for the development of Office 2010 and related products that leading to RTM that will reach in July 2010, according to Office 2010 IT Blog. Office 2010 is expected to RTM and released as final product in May 2010, with the exception of Exchange Server 2010, where Exchange Server 2010 beta already available from official download links.

The setup installer of the leaked download will install Microsoft Office Plus 2010 edition, with Access 2010, Excel 2010, InfoPath 2010, OneNote 2010, Outlook 2010, PowerPoint 2010, Publisher 2010, and Word 2010. Project Professional 2010, SharePoint Designer 2010 and Visio Professional 2010 are also included in the leaked RAR archive download. Office 2010 supports Windows XP SP3, Windows Vista, and Windows 7.

Important note is that Office2010 TP 1 is still in early stage of development, and may contain bugs, although most individual programs such as Word 2010 and Excel 2010 are usable in everyday life. It?s also interesting to know that Office 2007, the predecessor of Office 2010, is version 12. Office 2010 will be version 14, skipping version 13, the number that Microsoft assumes may be not so lucky.

Download (Hotfile)
http://hotfile.com/dl/43671206/e07e40d/Microsoft20Office202010.part1.rar.html
http://hotfile.com/dl/43671270/5af42a1/Microsoft20Office202010.part2.rar.html
http://hotfile.com/dl/43671316/3122ec8/Microsoft20Office202010.part3.rar.html
http://hotfile.com/dl/43671354/0904fdf/Microsoft20Office202010.part4.rar.html
http://hotfile.com/dl/43671379/9f5149c/Microsoft20Office202010.part5.rar.html
http://hotfile.com/dl/43671412/6a956df/Microsoft20Office202010.part6.rar.html
http://hotfile.com/dl/43671430/a4f76b3/Microsoft20Office202010.part7.rar.html

Download (UPLOADING)
http://uploading.com/files/1334753d/Microsoft%252520Office%2525202010.part1.rar/
http://uploading.com/files/dmbd711m/Microsoft%252520Office%2525202010.part2.rar/
http://uploading.com/files/f68f5m63/Microsoft%252520Office%2525202010.part3.rar/
http://uploading.com/files/b66a9622/Microsoft%252520Office%2525202010.part4.rar/
http://uploading.com/files/maf1m1e5/Microsoft%252520Office%2525202010.part5.rar/
http://uploading.com/files/715m7m71/Microsoft%252520Office%2525202010.part6.rar/
http://uploading.com/files/e42abcc9/Microsoft%252520Office%2525202010.part7.rar/

Hack Remote Computer System PC | Download Trojan Horse: DarkComet-RAT (Remote Administration Tool)


Here is the last version release of DarkComet Remote Administration Tool

DarkComet-RAT (Remote Administration Tool) is a fast/powerfull and stable remote admin tool that alloud you to control the whole remote computer , you can view the desktop / webcam / manage process / listen to the sound etc… in the same time with a realy good speed , DarkComet is work in localhost , LAN ( Local Area Network ) , and WAN ( Wide Area Network ) .
He is compatible with [Windows 2000 , Windows XP (all sp), Windows Vista (all sp) and Windows Seven] For 32(.386) and 64 bit machines.

To use it on VMWare you must choose the bridge option for network , ( NAT mode ) seems to lost some packets on transfers about 90% of the functions of DarkComet.

The Client is full Coded in Pascal/Delphi using CodeGear Delphi RAD 2010 ( UNICODE ).

The Server is coded in Pascal/Delphi ans Inline Assembler code using Delphi 2007 ( ANSI ).

Don’t forget to read disclaimer and EULA terms , when you choose to download this software you are fully responsable of the possible harmfull things you can do with it.

This software can be detect as a Virus/Backdoor/Trojan cause it alloud you to remote control a computer without any autorisation.

Tuesday, May 18, 2010

Denial of Service Attack: Goodbye DOS Attack Tool Download

Goodbye is a Denial of Service vulnerability testing tool for Windows, this tool is meant for people to test the vulnerability on their own servers and computer for DoS attacks.

******************
To know what is DOS & DOS attack, CLICK HERE

*******************

This is not my software so read the licence in it ;)

Im not responsible for any damage done with this tool, this is only meant for testing..

The Telephony Denial of Service Attack (TDOS)

While you're wondering why your phone is ringing incessantly and every time you answer it you hear nothing, a recorded message or an advertisement, thieves are likely pillaging your bank, online trading, and other money management accounts.

The telephony denial of service (TDOS) attack is a way to divert your attention from what's really going on, and a way to make you unavailable to banks and other financial institutions.

According to NJToday, the scheme works like this: cyber thieves have somehow managed to obtain your account information. They get in touch with the institution where you account is open, change information such as phone number and email address - or even bank account numbers, then keep your phone line busy and prevent the institution from checking up with you and verifying the changes and confirm transactions. When they do manage to get in touch with you, it is probably too late - your account has been emptied.

The FBI has recently started warning the public about a recent resurgence of this king of TDOS attack. The scheme isn't new - the FBI was notified for the first time about this kind of attack back in November of 2009. Back then, the attacks were traced to a slew of VoIP accounts connected to automatic dialing programs, but the perpetrator(s) has remained unknown.

Usually, the victims don't realize that something suspicious is going on - they think it's a glitch with their carrier. The best thing to do if you are on the receiving end of such phone calls is to alert immediately every institution you have an account with and tell them to block it, then contact the authorities.

Google Book Downloader With CRACK!!

Download Window 7 Genuine Tool – VIP TOOL

Window 7 Genuine Tool | 6MB
The program can active all Windows 7 Versions!

Download Here

Download iPhone and iPod Touch Unlocker Free Here

Our iPhone unlock software is developed using the finest development programs and is developed with simplicity in mind. From the moment you download our software your iPhone will be unlocked and ready for use on any network worldwide in just a matter of minutes with absolutely no technical knowledge required.

Download Here

ESET Nod32 Antivirus Offline Update for x32/x64 5074

This is the best antivirus I have ever seen. I am also using this on my all servers. Recommend the same for all of you guys.

Eset Offline Update x32 x64 5074 (30.04.2010) | 57.6 MB
Download Here

Download 33 versions of Microsoft Windows 7 Original RTM (x86-x64)

A.I.O. 33 versions of Microsoft Windows 7 Original RTM (x86-x64)
(12.05.2010) | ISO File | 4.7GB

In the disk has all 33 versions of Microsoft Windows 7. Perfect copies of the RTM - or any activation, cracks and amendments. All versions of English (ENG), updates are available. You get a virgin system, each of which can recreate in their what specifically needed.

Re-Upload LINKS !!!...Download as soon as...Servers are doing "Delete Links"

Contents copies on disk:

* Microsoft Windows 7 Starter (x86 - 32-Bit)
* Microsoft Windows 7 Starter N Edition (x86 - 32-Bit)
* Microsoft Windows 7 Starter E Edition (x86 - 32-Bit)

* Microsoft Windows 7 Home Basic (x86 - 32-Bit)
* Microsoft Windows 7 Home Basic (x64 - 64-Bit)
* Microsoft Windows 7 Home Basic N Edition (x86 - 32-Bit)
* Microsoft Windows 7 Home Basic N Edition (x64 - 64-Bit)
* Microsoft Windows 7 Home Basic E Edition (x86 - 32-Bit)
* Microsoft Windows 7 Home Basic E Edition (x64 - 64-Bit)

* Microsoft Windows 7 Home Premium (x86 - 32-Bit)
* Microsoft Windows 7 Home Premium (x64 - 64-Bit)
* Microsoft Windows 7 Home Premium N Edition (x86 - 32-Bit)
* Microsoft Windows 7 Home Premium N Edition (x64 - 64-Bit)
* Microsoft Windows Home Premium E Edition (x86 - 32-Bit)
* Microsoft Windows Home Premium E Edition (x64 - 64-Bit)

* Microsoft Windows 7 Professional (x86 - 32-Bit)
* Microsoft Windows 7 Professional (x64 - 64-Bit)
* Microsoft Windows 7 Professional N Edition (x86 - 32-Bit)
* Microsoft Windows 7 Professional N Edition (x64 - 1964-Bit)
* Microsoft Windows Professional E Edition (x86 - 32-Bit)
* Microsoft Windows 7 Professional E Edition (x64 - 64-Bit)

* Microsoft Windows 7 Enterprise (x86 - 32-Bit)
* Microsoft Windows 7 Enterprise (x64 - 64-Bit)
* Microsoft Windows 7 Enterprise N Edition (x86 - 32-Bit)
* Microsoft Windows 7 Enterprise N Edition (x64 - 1964-Bit)
* Microsoft Windows 7 Enterprise E Edition (x86 - 32-Bit)
* Microsoft Windows 7 Enterprise E Edition (x64 - 64-Bit)

* Microsoft Windows seven Ultimate (x86 - 32-Bit)
* Microsoft Windows 7 Ultimate (x64 - 64-Bit)
* Microsoft Windows 7 Ultimate N Edition (x86 - 32-Bit)
* Microsoft Windows 7 Ultimate N Edition (x64 - 64-Bit)
* Microsoft Windows Ultimate E Edition (x86 - 32-Bit)
* Microsoft Windows 7 Ultimate E Edition (x64 - 64-Bit

Issue: 2010
Developer: Microsoft
Title: Microsoft Windows 7 Original RTM x86/x64
Language: English
Format image: ISO
Medician: Yes (You can use any recent activator)

http://uploading.com/files/892ce963/A.I.O.33.W7.x86-x64.part01.rar/
http://uploading.com/files/dmd4594a/A.I.O.33.W7.x86-x64.part02.rar/
http://uploading.com/files/f1ccffaf/A.I.O.33.W7.x86-x64.part03.rar/
http://uploading.com/files/ma6778m4/A.I.O.33.W7.x86-x64.part04.rar/
http://uploading.com/files/cf671em7/A.I.O.33.W7.x86-x64.part05.rar/
http://uploading.com/files/7a52ba87/A.I.O.33.W7.x86-x64.part06.rar/
http://uploading.com/files/652fc7mf/A.I.O.33.W7.x86-x64.part07.rar/
http://uploading.com/files/ba4bc43a/A.I.O.33.W7.x86-x64.part08.rar/
http://uploading.com/files/9e18f578/A.I.O.33.W7.x86-x64.part09.rar/
http://uploading.com/files/3c1efmb6/A.I.O.33.W7.x86-x64.part10.rar/
http://uploading.com/files/am816mfd/A.I.O.33.W7.x86-x64.part11.rar/
http://uploading.com/files/19892b11/A.I.O.33.W7.x86-x64.part12.rar/
http://uploading.com/files/c247957c/A.I.O.33.W7.x86-x64.part13.rar/
http://uploading.com/files/6bm82495/A.I.O.33.W7.x86-x64.part14.rar/
http://uploading.com/files/a5a62f12/A.I.O.33.W7.x86-x64.part15.rar/
http://uploading.com/files/7mfcc3bd/A.I.O.33.W7.x86-x64.part16.rar/
http://uploading.com/files/cab37ac6/A.I.O.33.W7.x86-x64.part17.rar/
http://uploading.com/files/74419f3f/A.I.O.33.W7.x86-x64.part18.rar/
http://uploading.com/files/mf779a82/A.I.O.33.W7.x86-x64.part19.rar/
http://uploading.com/files/2a73d672/A.I.O.33.W7.x86-x64.part20.rar/
http://uploading.com/files/8f88f957/A.I.O.33.W7.x86-x64.part21.rar/
http://uploading.com/files/df8e8m72/A.I.O.33.W7.x86-x64.part22.rar/
http://uploading.com/files/ae13ac1c/A.I.O.33.W7.x86-x64.part23.rar/
http://uploading.com/files/m4d562e6/A.I.O.33.W7.x86-x64.part24.rar/

Download Data Recovery Tools Software Free: Portable Ontrack EasyRecovery Pro 6.21

A great tool for recovering files and running system diagnostics, any power user will want EasyRecovery Professional, but the trial version's limitations prevent it from being truly useful. EasyRecovery Professional has a pleasingly designed, easy-to-use interface that offers a column of buttons for accessing each category of its tools. Each category is self-explanatory, and even a novice will quickly understand the uses and benefits of each category's tools.

In our tests, EasyRecovery Professional lived up to its name -it was both easy to use and provided professional level results - and ran quickly in all instances. Unfortunately, in most respects, this version is simply a demo that teases you to purchase the fully enabled version. You can see results from the tests - damaged partitions and corrupted files. We recommend EasyRecovery Professional for any level user, but only those with deep pockets and a flexible budget will want to pick it up.

Ontrack EasyRecovery Professional
  • Complete solution for your data recovery needs
  • Includes all capabilities plus advanced data recovery options and Data Advisor diagnostic features
  • General capabilities – data recovery, file repair, disk diagnostics
  • For all operating systems – RawRecovery Module – support for over 485 specific file signatures.
  • For Windows – AdvancedRecovery and additional Modules – capable of locating all directories and unlimited file types
  • Repair options for Microsoft Outlook and Email files – Outlook (PST, OST), Outlook Express (DBX), Word (DOC), Excel (XLS), Access Database (MDB), PowerPoint (PPT) and Zip (ZIP)
DOWNLOAD HERE

Monday, May 17, 2010

You don't need hacking skills to be a cyber criminal

Are you digitally challenged? Don’t know a byte from a bit? Have a limited command of Unix? Don’t worry: With a new generation of professionally packaged exploit kits, you, too, can become a successful cyber criminal.

New attack kits, which package proven exploits for vulnerabilities in popular software for easy installation and management, are bringing cyber crime to a new generation of criminals who have only limited technical skills, according to a new report from M86 Security.

The existence of exploit kits, which date back to at least 2006, is no secret. But they are becoming increasingly user-friendly, lowering the bar for entry to the cyber underground and creating a new source of revenue for the coders and hackers who devise them. One such kit, the Eleonore Exploit Pack, apparently was used in recent attacks on three Treasury Department sites.

“Cyber criminals find it easier, faster and more cost-effective to make money by buying exploits rather than taking the time to create exploits themselves,” states the report, titled “Web Exploits: There’s an App for That.”

Browser vulnerabilities usually are the most common targets for the kits. But M86 reported that exploits for vulnerabilities in Adobe Flash, Java and PDF are on the rise. The kits are designed for easy installation on a Web server and are linked to a database for logging and reporting.

Reporting can be critical because the kits can be used to distribute pay-per-install code, for which the kit owner is paid to install third-party malware on compromised computers. Rates range from a modest $50 per 1,000 installs on European and Australian computers to a healthy $170 per 1,000 U.S. computers.

The criminals can drive victim traffic to the exploit Web page with techniques such as spam that contains malicious links or by setting up a bogus Web site and using search engine optimization to popularize it. But the most common technique is to inject malicious iFrames into legitimate sites and redirect traffic to the exploit page. Some entrepreneurs will even sell redirected Web traffic at a reasonable rate.

But don’t get any ideas about reselling these exploit kits. These guys might be criminals, but they don’t tolerate piracy. “You are not allowed to resell/share, if we catch you doing this your license will be revoked,” the purveyors of Crimepack warn.

sqlninja 0.2.5 Released! Exploit SQL Injection Vulnerabilities

Hello security enthusiasts,

It's been 2 years, but a new version of sqlninja is out at Sourceforge!

Introduction
============
Sqlninja is a tool to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide an interactive access on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered. It is written in Perl, it is released under the GPLv2 and so far has been successfully tested on:

- Linux
- FreeBSD
- Mac OS X

You can find it, together with a flash demo of its features, at the address http://sqlninja.sourceforge.net

What's new
==========
# Proxy support (it was about time!)
# No more 64k bytes limit in upload mode
# Upload mode is also massively faster
# Privilege escalation through token kidnapping (kudos to Cesar Cerrudo)
# Other minor improvements

What's not so new
=================
# Fingerprint of the remote SQL Server (version, user performing the queries, user privileges, xp_cmdshell availability, DB authentication mode)
# Bruteforce of 'sa' password (in 2 flavors: dictionary-based and incremental)
# Privilege escalation to sysadmin group if 'sa' password has been found
# Creation of a custom xp_cmdshell if the original one has been removed
# Upload of netcat (or any other executable) using only normal HTTP requests (no FTP/TFTP needed)
# TCP/UDP portscan from the target SQL Server to the attacking machine, in order to find a port that is allowed by the firewall of the target network and use it for a reverse shell
# Direct and reverse bindshell, both TCP and UDP
# DNS-tunneled pseudo-shell, when no TCP/UDP ports are available for a direct/reverse shell, but the DB server can resolve external hostnames (check the documentation for details about how this works)
# Evasion techniques to confuse a few IDS/IPS/WAF
# Integration with Metasploit3, to obtain a graphical access to the remote DB server through a VNC server injection

Happy Hacking..!!

Download Windows 7 ULTIMATE x86 x64 FULLY ACTIVATED Genuine Version

INSTRUCTIONS

Install:
- Download and extract using WinRAR.
- Use Nero or other burning app to burn the ISO image
- Burning speed should not be faster than 4x. Otherwise, it might not work.
- Restart your computer.
- Make sure you have selected your DVD-ROM/RW drive as a first boot device.

* Enter the BIOS pressing the DEL button, set the option, insert your Windows 7 installation and restart computer.
- The black screen will appear (image 01).
- Press any key to boot from CD or DVD.... (by pressing the key you are entering the setup)
- Select your language, time and currency and keyboard input (optionaly)
- Click install now
- Choose your edition (x86 is 32-bit, x64 is 64-bit) depending of CPU type you have.

*Choose x64 if you have 64-bit processor.
- Click "I accept".
- Click "Custom" (advanced).
- Choose your partition/hdd drive where Win7 should be installed and click format.

*You might get some error if you have two or more hard disks with different connectors (ATA and SATA).
If you get an error, turn off one of your hard disks and repeat the whole** proces.
- After formatting, setup will continue automaticly and it will finish after 15-30 min.
- Next step would be username
- Type your password (if you want).
- When you get the screen for CD-KEY just ignore it leaving blank.

*Uncheck the box for automaticly activation and click next.
- Choose the third option for next step.
- Select your time zone.
- Select your current location (Home is recommended).
- The black CMD windows will appear. Wait a few seconds until computers restares once again.
- And that would be all about installation. You are in Windows now.

Activation:
It is not required, because it is OEM. Windows will be premanently activated.
However, it is well known that there is some problems with DELL and HP machines.
So if you have issues with pre-activation you will be forced to some activator to activate Windows 7.

INSTALLATION NOTES
--> Remember when Windows is finalizing its installation, a black screen will appear (cmd), it will stay like this for about 2 to 10 mins Depending on the system you are using Then It Will say ***-***-***-***-**** Key installed successfully. Then it will restart automatically. After this, you can go to My computer's Properties, Windows is NOW activated!

--> FOR DELL and HP machines
80% : the activators will work meanwhile the other 20% depends on how old your laptop/computer, If you did an upgrade you will have to use an external activator because this version was made for a clean installation.

--> If you do not want to be forced to use an activator. I would do a custom install but you don't really have to format your driver due to the fact that Windows 7 will just overwrite your current windows and put the old windows in a folder called "Windows.old" where your previous windows installation files are kept. And it is optional if you choose to delete the old folder because the drivers are there after installation. Make sure you are connected to the internet before and after the installation.

Go for the fresh Installation if you dont really have important programs you can easily re-install at a later time. ( I RECOMMEND THIS )

Hackers Can Hack Your Car: Hacking A Car is Possible Now

CarShark Software Lets You Hack Into, Control And Kill Any Car

In the near future, you may be more worried about a hacker attack on your car than on your PC.

A group of researchers from two universities tested their hacking skills on two cars and found that they could remotely lock the brakes, the engine, and windows on a car; turn on the radio, heat, and windshield wipers; honk the horn; and change the speedometer display.

They were able to do all of that in tests on two cars of unnamed make and model by connecting a laptop to the electronic control system and controlling that computer wirelessly using a second laptop in a separate car.

The paper (PDF) will be presented by researchers at the University of Washington and the University of California at San Diego at the IEEE Symposium on Security and Privacy in Oakland, Calif., on Wednesday.

"Over a range of experiments, both in the lab and in road tests, we demonstrate the ability to adversarially control a wide range of automotive functions and completely ignore driver input," the paper says.

In an interview with CNET on Friday, two of the researchers--Stefan Savage of UCSD and Tadayoshi Kohno of the University of Washington--talked about the tests and what their findings mean for drivers today.

Q: I'd like to know more about what you did for the research. Did you have to have physical access to the car, or is there a way this could be done remotely?

Savage: In the paper we didn't focus on the different ways that one could do it. The paper focuses on the question of if someone were able to gain access to the car, how resilient would it be in our scenario? We connected our computer to the on-board diagnostics port--it's standard and is located under the dashboard on the driver's side.

Kohno: This paper is not focusing on the specific threats. We are focusing on understanding the evolution of cars in the hopes that the industry can protect against adverse things happening in the future.

Savage: If you look at PCs in the early 1990s, they had all kinds of latent software vulnerabilities. It didn't matter so much because PCs were at home and not connected to everything else. Then they were connected to the Internet and the latent vulnerabilities were exposed to outside attack. We see cars moving in much the same direction. There is a strong trend to provide pervasive connectivity in cars going forward. It would be good to start working on hardening these systems and providing defenses before it becomes a real problem.

Can you give me a scenario where a car would be compromised?

Savage: You could have an adversarial mechanic or a jealous boyfriend or girlfriend who temporarily has access to the car. They could connect to this component, download onto the car, disconnect, and the code could do their bidding. I think at this point these attacks are much more fantastical than a real thing people need to be concerned about today.

Kohno: Today everyone is focusing on Web security and botnets. We want to make sure that in 5 or 10 years we don't add cars to that list.
The researchers were able to display their own message and a false speedometer reading on a car that was parked.

You have written a tool that enables this type of attack, called CarShark, right?

Kohno: The tool captures a lot of what we did. It's a software tool we wrote. It runs on a computer that plugs into the OBD-II (On-Board Diagnostics II) port and it can sniff (and inject) packets on the network.

Couldn't someone use that tool to compromise a car?

Savage: We're not releasing it.

But there are ways to do this remotely, right?

Savage: We're trying to find a balance in the research. We're not interested in taking an alarmist tone. We purposely are not focusing on that aspect here. Can I imagine it's doable? Yes. In the end it's all software, and software on your car is not fundamentally different from software on your PC.

Do you think anyone is actually doing anything like this, other than for legitimate research purposes?

Kohno: We have no reason to believe this is an issue today. One of our goals is to stay ahead of the bad guys before the threats really do manifest.

Have you talked to the car manufacturers about this?

Savage: We talked with the appropriate parties, which we can't name.

Did they take this seriously or dismiss it?

Savage: Everyone we've talked to has taken it seriously and been very positive.

Anything else you would like to add?

Kohno: It's a changing world of technology. Often when people hear the word "computer" they associate it with the meaning of laptop or desktop. And one of the things we'll see in the future is computer devices integrating themselves both literally and figuratively into our world. There will be computers integrated into cars, medical devices, homes, and the smart grid. And I think that we need to be proactively thinking about security issues, not just on the desktops with botnets and Web browsing, but think about where our computers will be in the future and what we can do today to protect them. This research on cars is part of that.

SOURCE: http://news.cnet.com

One More Reason to Jailbreak an iPhone: Apple Rejects Wi-Fi sync for iPhone

Okay Apple, now you're really trying our patience. The persnickety company rejected Wi-Fi sync for the iPhone this week, a $10 app that would let users wirelessly make iTunes just a little bit less clumsy. Now if you want to do such things, you'll have to jailbreak your iPhone and buy the app from that favorite vendor of iPhone hackers everywhere, the Cydia Store.

Why was Wi-Fi sync rejected? The guy who wrote the app, Greg Hughes, says "the application was not specifically in violation of the terms of the iPhone OS developer agreement," but added that "it does encroach upon the boundaries of what they can and cannot allow on their store." For some reason, he said Apple "also cited security concerns."

Allow me to speculate for a moment: Security for who? Apple and the owners of movie and music copyrights? Oh yeah, they're looking out for us, the users. Right. On the other hand, maybe there are reliability issues, where you could break your sync if you move out of Wi-Fi range or if the battery is low.

We're not crazy about jailbreaking, either, hacking our iPhone to run apps that aren't authorized by Apple. We've done that a couple of times, but just when we get everything working right, Apple updates iTunes and breaks the jailbreaking, requiring another round of hacking. It ends up being a huge pain in the ass.

Harvard student dismissed for hacking into instructors' accounts

A Harvard student was dismissed after he hacked into his instructors’ online accounts and gained unauthorized access to a grading system, the university confirmed today.

The Faculty Council decided to dismiss the undergraduate student, whose name has not been released, last week, the Harvard Crimson reported.

The student crafted a website to gather his instructors' confidential log-on information, which he then used to access the grading system, the Crimson reported.

Jeff Neal, a Harvard spokesman, confirmed the student newspaper’s account but would provide no further comment.

Good news for activists and anyone that likes a little bit more online security today as Google (right on the heels ) says they will turn on encrypted search starting next week, presumably to be unveiled at their Google i/o conference in San Francisco.

Google turned on encrypted Gmail by default earlier this year in response to the attempted hacking of activist accounts that the search giant sited as a major reason for removing their search engine from China.

Details about how the encryption will work and whether or not a user will have to be logged in with a Google account are not available yet, but it would be somewhat surprising if all searches (especially anonymous ones) were set as encrypted by default.

encourages you to delete Facebook accounts on 31 May 2010, if you are fed up of Facebook and its privacy issues.

and , who have set up this Quit Facebook website to promote it suggest this reason for quitting Facebook.
According to website: For us it comes down to two things: fair choices and best intentions. In our view, Facebook doesn't do a good job in either department. Facebook gives you choices about how to manage your data, but they aren't fair choices, and while the onus is on the individual to manage these choices, Facebook makes it damn difficult for the average user to understand or manage this. We also don't think Facebook has much respect for you or your data, especially in the context of the future.

For a lot of people, quitting Facebook revolves around privacy. This is a legitimate concern, but we also think the privacy issue is just the symptom of a larger set of issues. The cumulative effects of what Facebook does now will not play out well in the future, and we care deeply about the future of the web as an open, safe and human place. We just can't see Facebook's current direction being aligned with any positive future for the web, so we're leaving.

Quitting Facebook isn't easy. Facebook is engaging, enjoyable and quite frankly, addictive. Quitting something like Facebook is like quitting smoking. It's hard to stay on the wagon long enough to actually change your habits. Having peer support helps, but the way to quit Facebook is not to start a group on Facebook about leaving Facebook.
Part of quitting is understanding the nature of the problem, and there have been a number of recent articles and posts that do a much better job than us at articulating what's wrong with Facebook. We encourage you to read them and form your own opinions. Moving on will be easier to do when you have made a clear and conscious choice about why you'd prefer your online life to be Facebook-free.

There are alternatives to Facebook. Understanding what is best for you will depend a lot on what you need out of your social graph on a daily basis. For some, a combination of services like email, Twitter and Flickr might work. For others, a Ning group or a specialized social site like Akoha might be an option. If the entire population of Brazil can use Orkut, we think that there's hope for you to find a new home on the web. Wired, ReadWriteWeb and others have recently called for an open alternative to Facebook, and we're personally excited about the potential of the Diaspora project. At the moment, there aren't a lot of great options for direct replacement, but know that you're not alone. When there's a market need, it's not long before better options appear. In our minds, the best thing to do is to contribute to that need - and that's what Quit Facebook Day is about.

SOURCE:

Twitter is becoming a daily life part and before the start of any new work, we would like to post updates on twitter. Twitter is growing incredibly because it's easy to use and secure. Today after noon, when I was analyzing some of my yesterday pcap files and I was astonished to see that twitter is sending clear text password during change in profile setting. This could be a high alert flaw because without using keyword logger, I am loosing my password identity. On the same lan twitter hack could expose lot of username and passwords. I had captured the logs where in password field is colored with black and I could see it with my naked eyes because it is in clear text format which is explicitly depicting that Twitter team is not using any encryption method during setting or profile updates.



Related post:
Newer Posts Older Posts Home