Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Friday, May 28, 2010

Mail Delivery Times and Realistic Expectations

This is guest post shared by Sheryl Owen

For as long as I can remember there has been a running joke about how long it can take the USPS to deliver mail. I think this somewhat tarnished reputation may be more due to people procrastinating and not actually putting the letter or package into the mail more than anything. With that said, I dug more deeply into just what the USPS says the American public should expect for standard delivery times. In addition to that I went ahead and did some research on how often they actually hit these standard delivery times as well as how the USPS rates compared to other governmental agencies in terms of public satisfaction scores. You might be surprised by the results.

Standard Delivery Times

One of the most important points that can’t be over-stressed is that for STANDARD mail, the USPS doesn’t make any guarantees at all (even that the letter or package will be delivered). That does not mean they won’t try to deliver every package in a timely fashion at all it just means that the sender doesn’t have any service guarantees to work with for standard mail.

As with most things in life and certainly in business, the responsibility lies with the sender to understand the levels of service and to plan properly to get things delivered in a timely manner. For instance it is not reasonable if you live in San Francisco, CA to send a birthday card to your mother in Cleveland, OH via standard mail and expect it to arrive the next day. The smartest thing to do would be to plan to the outside window for standard mail which is 9 days and make sure you send Mom’s birthday card 9 days early.

As promised early on in the article, I did some research on how often the USPS actually meets their stated delivery times and the answer was 96% of the time for overnight express mail and no worse than 93% of the time for express mail. In addition, according to a recent study by GfK Roper Consulting, 92% of the American public is very happy with the service provided by the USPS (92% of the respondents rated the service very good). You can read more about this at National Association of Letter Carriers website (nalc.org). The bottom line is that the USPS does deliver on their service promises and most people do recognize their commitment to service. Here is a quick breakdown of public perception of the USPS versus other governmental agencies:

SOURCE: Change Of Address

Thursday, May 27, 2010

First Human Infected With Computer Virus | Hacking into Human Body

Let the hysteria begin: Computer viruses have apparently made the leap from PC to person, BBC News reports.

Mind you, this was all intentional. British scientist Mark Gasson of the University of Reading introduced a computer virus into an RFID chip (similar to the chips implanted in pets to identify them if they go missing) and then implanted the infected chip into his own hand.

In its uninfected state, Gasson's chip lets him pass through secured doorways and turn on his cell phone, so it has practical real-world capabilities.

An infected chip could pass malicious code on to chip scanners as, say, the bearer passes through a security door. The virus could then spread to other systems in the network, depending on the complexity and cleverness of its programming.

Right now this is just a proof of concept, but it’s a sobering one in a world where "touchless" networking systems like RFID are becoming more and more commonplace, while the security of these systems has been largely ignored.

Recently issued passports, which include an RFID chip now by default, have already been subject to extensive hacking attempts — and numerous hacking successes. Some people even suggest to disable the RFID chip inside. (We don't endorse this, however.)

What happens when you have an actual RFID implant? BBC News notes that these chips are becoming popular receptacles for medical information, so that if a person is unconscious, medical responders can still determine if someone has a critical allergy or a rare condition that a hospital might need to be aware of. What happens if a virus scrambles or even reverses this information?

The issue of viruses moving from computer to human may not be the nightmare that Hollywood makes it out to be — but the threat is becoming more real than we might like to believe.

Monday, May 24, 2010

How to send Bulk Emails & Newsletters to Your Customers

Kristanix Email Sender Deluxe 2.24 | 9.40 Mb

With Email Sender Deluxe, sending out personalized bulk email and newsletters to your customers and clients just got a whole lot easier! Simply choose your recipients, write your email and hit Send! You can easily import recipients from databases, Excel, text files or enter them manually. You can store email templates, so you don't have to type the whole newsletter again the next time you send one. If you send out newsletters regularly or need to notify your customers about new products and services, Email Sender Deluxe is here to help you.

Features:
- Send personalized emails quickly!
- Easily import recipients from databases
- Import recipients from files
- Easy-to-use HTML editor
- Easily manage multiple "from" email accounts
- Store email templates for re-use later
- Personalize each email
- Preview all emails before they are sent.
- Insert both embedded images and images that are linked to.
- Send file attachments to all recipients.
- Send both plain text and HTML versions of the email.
- Use multiple email encodings such as languages and standards.
- Send using multiple connections for maximum speed.
- Automatically retry failed emails.
- Update latest recipients from databases and files automatically.
- Send using SMTP server, Direct Send (DNS) or Pickup Service.
- Easily manage "from" accounts, recipient groups and email templates.

Home Page - http://www.kristanixsoftware.com

Download - http://www.fileserve.com/file/sKrYjsy

Boot Disk Download: Boot Disk Collection v1

Boot Disk Collection v1 (20/05/2010) | 1.5GB

Contain:
  • Sos Usb Boot Flash Drive 100509
  • LiveCD Windows7 by Xalex
  • Hiren's BootCD 10.4
  • Windows Key Enterprise 9.3.815
  • Acronis True Image Home Plus Pack 13.0.7046
  • Acronis Disk Director Server 10.0.2239
  • Paragon Hard Disk Manager 2010 Pro
How to use:
  • Burn with any good program, I recommend ImgBurn and UltraISO.
It is possible to work with USB:

Option number 1: You will need again UltraISO. Open the image from the distribution of the program, click the "self-loading" - "Burn hard disk image, choose your flash drive, the method of USB-HDD +, formatted in fat32 and presses" Enter. " UltraISO itself will automatically make your flash drive bootable, rename the configuration in syslinux and the interior, too, the only highly recommend to open it in notepad and check with your own eyes, may contain errors.

Option number 2: Find the manufacturer of your flash chip, download it at the desired utility and write the image to stick as USB-CDROM.

Download:
http://hotfile.com/dl/43851476/6cafec4/BootDiskCollection_v1.part01.rar.html
http://hotfile.com/dl/43852738/23473b3/BootDiskCollection_v1.part02.rar.html
http://hotfile.com/dl/43853695/9fe9743/BootDiskCollection_v1.part03.rar.html
http://hotfile.com/dl/43854400/8631e90/BootDiskCollection_v1.part04.rar.html
http://hotfile.com/dl/43855627/88a05aa/BootDiskCollection_v1.part05.rar.html
http://hotfile.com/dl/43858070/96be8b4/BootDiskCollection_v1.part06.rar.html
http://hotfile.com/dl/43861725/1ff929d/BootDiskCollection_v1.part07.rar.html
http://hotfile.com/dl/43858865/8ec3183/BootDiskCollection_v1.part08.rar.html
http://hotfile.com/dl/43860215/cdfab35/BootDiskCollection_v1.part09.rar.html
http://hotfile.com/dl/43859806/304a9a6/BootDiskCollection_v1.part10.rar.html
http://hotfile.com/dl/43864114/c2fa969/BootDiskCollection_v1.part11.rar.html
http://hotfile.com/dl/43868561/de3dddd/BootDiskCollection_v1.part12.rar.html
http://hotfile.com/dl/43861176/2279617/BootDiskCollection_v1.part13.rar.html
http://hotfile.com/dl/43871518/eeb6a67/BootDiskCollection_v1.part14.rar.html
http://hotfile.com/dl/43862937/e71f635/BootDiskCollection_v1.part15.rar.html
http://hotfile.com/dl/43863390/9ecd79f/BootDiskCollection_v1.part16.rar.html

Download Free MP3 Music: Super MP3 Download

Super MP3 Download PRO v4.5.7.2 | 6.85 MB

FREE Music Downloads, Unlimited Listening Online, Billboard Hot 100, 14 Categories Of Hottest Songs And More! Super MP3 Download is easy to use application created to help you search and download over 100 million MP3 files. You can try the searched results to decide which one to download. Super MP3 download always brings you the hottest songs in the world; it recommends you the Billboard Hot 100 every week and lists the hottest songs of 14 categories, from electrical to religious, mainstream to indie, hip-hop to classical, etc. Besides, you can do advanced search by artist, title, album, and edition. You can even choose specific edition of live, piano, guitar or cover etc. to search. Super MP3 Download - Clean of any form of badware (viruses, spyware, adware, etc.) Get Super MP3 Download Pro version to enjoy more features - NO LIMITS on your downloads, advanced search enabled, download multiple songs at the same time and more!

Key Features:
• Over 100 Million MP3 for Free. Super MP3 Download is free to use. You can search and download over 100 million MP3 from the largest download network fast and FREE.
• Bring You The Hottest Songs. Super MP3 download always brings you the hottest songs in the world. We recommend you the Billboard Hot 100 every week and list the hottest songs of every category, from electrical to religious, mainstream to indie, hip-hop to classical.
• Unlimited Listen To Music OnlineSuper MP3 Download. You can unlimited listen to over 100 million songs online for FREE. You can try the searched results to decide which one to download.
• Advanced Search (With Pro Edition). Super MP3 download can search songs by title, artist, album, and edition. You can even search the live, piano, guitar or cover editions of your favorite songs.

Homepage:

http://www.super-mp3-download.com/

Download:

http://www.fileserve.com/file/d6ejhwk

Sunday, May 23, 2010

Windows 7 Ultimate 64Bit Cracked: Download Windows 7 Ultimate 64Bit

Windows 7 Ultimate 64Bit (2010-05-21) l 3 GB

Windows 7 Ultimate 64-Bit
Updated 21st May 2010

Release Notes
This has been made from the official Retail DVD, the only thing thas has been slipstreamed are updates up to the 21st May 2010. This DVD is not unattended.

Crack Instructions
- Install Windows 7 without using a serial key (install as Trial) or automatically Activating.
- Unpack the Windows 7 Loader .zip file (in the crack directory) to your Desktop.
- Run and Reboot. Your PC is now Genuine.

Included Hotfixes
  1. KB971033 - Update for Windows 7 for x64-based Systems
  2. KB971468 - Security Update for Windows 7 for x64-based Systems
  3. KB972270 - Security Update for Windows 7 for x64-based Systems
  4. KB974431 - Update for Windows 7 for x64-based Systems
  5. KB974571 - Security Update for Windows 7 for x64-based Systems
  6. KB975467 - Security Update for Windows 7 for x64-based Systems
  7. KB975496 - Update for Windows 7 for x64-based Systems
  8. KB975560 - Security Update for Windows 7 for x64-based Systems
  9. KB976264 - Update for Windows 7 for x64-based Systems
  10. KB976422 - Update for Windows 7 for x64-based Systems
  11. KB976662 - Update for Windows 7 for x64-based Systems
  12. KB977074 - Update for Windows 7 for x64-based Systems
  13. KB977863 - Cumulative Update for Media Center for Windows 7 x64-based Systems
  14. KB978262 - Cumulative Security Update for ActiveX Killbits for Windows 7 for x64-based Systems
  15. KB978542 - Security Update for Windows 7 for x64-based Systems
  16. KB978601 - Security Update for Windows 7 for x64-based Systems
  17. KB978637 - Update for Windows 7 for x64-based Systems
  18. KB979099 - Update for Rights Management Services Client for Windows 7 for x64-based Systems
  19. KB979306 - Update for Windows 7 for x64-based Systems
  20. KB979309 - Security Update for Windows 7 for x64-based Systems
  21. KB979683 - Security Update for Windows 7 for x64-based Systems
  22. KB980182 - Cumulative Security Update for Internet Explorer 8 for Windows 7 for x64-based Systems
  23. KB980232 - Security Update for Windows 7 for x64-based Systems
  24. KB980302 - Update for Internet Explorer 8 Compatibility View List for Windows 7 for x64-based Systems
  25. KB980408 - Update for Windows 7 for x64-based Systems
  26. KB981332 - Security Update for Windows 7 for x64-based Systems

Download Ethical Hacking Videos: Certified Ethical Hacker Training Version 6 - 2009 (4 DVDs) | 13.52 GB

If you want to stop hackers from invading your network, first you've got to invade their minds.
Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes.

The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival.

If hacking involves creativity and thinking 'out-of-the-box', then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of 'defense in depth'. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

To achieve the Certified Ethical Hacker Certification, you must pass the CEH exam 312-50

WARNING: Students are warned against attending CEH training at unauthorized training centers. Only those who attend CEH training at EC-Council ATCs are eligible for CEH certification. Also you will be required to show proof of official CEH training attendance when you apply for EC-Council's LPT certification and Master of Security Science (MSS) degree program.
EC-Council has certified IT professionals from the following organizations as CEH:

* Cisco Corporation
* Novell
* Canon
* Hewlett Packard
* US Air Force Reserve
* US Embassy
* Verizon
* Pfizer
* HDFC Bank
* University of Memphis
* Microsoft Corporation
* Worldcom
* Trusecure
* US Department of Defense
* Fedex
* Dunlop
* British Telecom
* Supreme Court of the Philippines
* United Nations
* Ministry of Defense, UK
* Nortel Networks
* MCI
* Check Point Software
* KPMG
* Fleet International
* Cingular Wireless
* Columbia Daily Tribune
* Johnson & Johnson
* Marriott Hotel
* Tucson Electric Power Company
* Singapore Police Force
* PriceWaterhouseCoopers
* SAP
* Coca-Cola Corporation
* Quantum Research
* US Military
* IBM Global Services
* UPS
* American Express
* FBI
* Citibank Corporation
* Boehringer Ingelheim
* Wipro
* New York City Dept of IT & Telecom - DoITT
* United States Marine Corps
* Reserve Bank of India
* US Air Force
* EDS
* Bell Canada
* Sony
* Kodak
* Ontario Provincial Police
* Harris Corporation
* Xerox
* Philips Electronics
* US Army
* Schering
* Accenture
* Bank One
* SAIC
* Fujitsu
* Deutsche Bank
* Symantec
* Sun Microsystems
* Google Corporation
* McAfee
* Dell Corporation
* Verizon
* Motorola
* Singapore Airlines
* Infosys
* TATA Consultancy
* Deloitte
* Oracle

Download from Hotfile:

http://hotfile.com/list/530230/3009d01

Download from Uploading:

http://uploading.com/files/538996m7/CEH6-loveyou4e.txt/

Download Shadow Government – DVDRip (2009)

Shadow Government – DVDRip (2009)
How the Secret Global Elite is using surveillance against you

SHADOW GOVERNMENT provides up-to-the minute analysis of the ever changing technological landscape and new evidence that an ultra-secret global elite controls technology, finance, international law, world trade, political power and vast military capabilities.

John Wilson wakes up, gets ready for his day and heads to work. He has no idea that he’s being watched, tracked and studied. Is he a threat to national security? Is he a terrorist or a criminal? No, he’s an ordinary American citizen. Like everyone else, John’s rights and freedoms have been systematically destroyed – all in the name of security and convenience. Is it about peace and unity? Or is it about ultimate global power? What if there were hidden forces with no ties to democracy or constitutional rights in power? What if new laws, media propaganda and Secret Societies labeled John a danger to society? And what if all this set the stage for a Biblically prophesied global government run by the Antichrist? Leading researchers, authors and minds like Grant Jeffrey, Dr. Katherine Albrecht, Edward G. Griffin, Daniel Estulin, Gary Kah, Chuck Missler, Joan Veon, Brad O’Leary and many others take you through the incredible and hidden world of Surveillance, Rights and Freedoms, Global Government and Bible Prophecy.

DOWNLOAD:
http://hotfile.com/dl/44283673/b671427/ShadowGovt.part1.rar.html
http://hotfile.com/dl/44283676/0a08a81/ShadowGovt.part2.rar.html
http://hotfile.com/dl/44283679/dc1b71a/ShadowGovt.part3.rar.html
http://hotfile.com/dl/44283680/3f99492/ShadowGovt.part4.rar.html
http://hotfile.com/dl/44283681/633ac13/ShadowGovt.part5.rar.html
http://hotfile.com/dl/44283682/f5666a1/ShadowGovt.part6.rar.html


A bug in Facebook's Web site lets hackers delete Facebook friends without permission.

The flaw was reported Wednesday by Steven Abbagnaro, a student at Marist College in Poughkeepsie, New York. But as of Friday morning, Pacific time, it had still not been patched, based on tests conducted by the IDG News Service on a reporter's Facebook friends list.

A malicious hacker could combine an exploit for this bug with spam or even a self-copying worm code to wreak havoc on the social network, Abbagnaro said in an interview.

He's written proof-of-concept code that scrapes publicly available data from users' Facebook pages and then, one by one, deletes all of their friends. For the attack to work, however, the victim would first have to be tricked into clicking on a malicious link while logged into Facebook. "The next thing you know, you have no friends," Abbagnaro said.

The security researcher is not going to release the code used in his attack until after Facebook fixes the flaw, but he says that technically competent hackers could figure out how to pull off the attack.

That's because Abbagnaro's code exploits the same underlying flaw that was first reported by M.J. Keith, a senior security analyst with Alert Logic.

Last week, Keith discovered that Facebook's Web site was not properly checking code sent by users' browsers to ensure that they were authorized to make changes on the site.

Called a cross-site request forgery bug, the flaw is a common Web programming error, but Facebook has had a hard time eradicating it from the site. After Keith first reported the issue, Facebook thought it had fixed the problem, only to discover that it could still be exploited to make users "like" Facebook pages without their consent.

Similarly, Facebook appears to have missed Abbagnaro's delete-friend vector as well.

"I am just blown away that this keeps happening," Keith said in an e-mail interview.

Facebook representatives couldn't immediately be reached for comment.

Facebook's security team has been under siege lately, with worm attacks and site flaws popping up on a regular basis. These security issues come as the social network has been hit with intense criticism for not adequately protecting users' privacy, and inappropriately sharing user data with advertisers.

Users have been quitting the social network and a campaign proclaiming May 31 as Quit Facebook Day has gained some traction.

Despite all of its other problems, Facebook should have fixed this latest flaw by now, Abbagnaro said. "I'm not sure why they haven't fixed it yet because it is pretty serious."

The Facebook page that led to Pakistan banning access to the web site from within the country has been taken down.

Facebook denied having taken down the page itself, suggesting the author of the page - entitled Everybody Draw Mohammed Day! - had unilaterally decided it wasn't such a good idea after all.

Maybe it was downed by hackers. Details of a hack that allowed attackers to remove Facebook friends were but a hack that allows pages to be downed has not been documented as far we we know.

The page had attracted more than 100,000 viewers most of whom were just curious, although many appeared rabidly bonkers.

Some maintained the effort was an attempt to highlight the importance of free speech. All very laudable but just because you can do something doesn't mean you should - especially if with the only aim of causing offence.

Pakistan moved quickly to block facebook and followed this up with a ban on YouTube.

It is not yet clear whether the disappearance of the page from Facebook will encourage Pakistan to lift the ban.

Hacking Commercial Quantum Encryption System | Commercial Quantum Cryptography System Hacked

Scientists have succeeded in completely hacking a commercial quantum encryption system for the first time ever.

Theoretically quantum cryptography - using quantum systems to encrypt information securely - is perfectly secure. To read more about Quantum Encryption, visit @ Hackers Beware: Quantum Encryption is Coming

It takes advantage of the fact that it is impossible to chalk out measurements of a quantum system without disturbing it in some way.

Thus, if two people produce a shared quantum key to encode their messages, they are almost sure no third party can eavesdrop without introducing errors that will show up when they compare their keys, setting off a warning.

However, in practice no quantum cryptographic system is perfect and errors will creep in due to mundane environmental noise.

Quantum physicists have calculated that as long as the mismatch between two person's keys is below a threshold of 20 per cent, security has not been breached.

But now quantum physicist Hoi-Kwong Lo and his team at the University of Toronto in Ontario, Canada, have hacked a commercial system released by ID Quantique (IDQ) in Geneva, Switzerland, while remaining below the 20 per cent threshold.

"Even with a relatively simple attack, the hacker can get the complete key, and nobody would know anything about it," Nature quoted Lo, as saying.

Lo's hack works by intercepting the bits that two people, say Alice sends to Bob, while creating the key, and resending a slightly modified version to Bob.

In standard quantum cryptographic techniques, Alice encodes each bit using the polarization of photons. When she sends these bits out, the polarization should be perfectly oriented in one of four directions, separated by 45 degrees (north, northeast, east or southeast).

In a perfect world, any hacking attempt would disturb a significant fraction of the bits' orientations, introducing errors just above the threshold.

But in practice, Alice cannot switch orientations for successive bits instantaneously - each time she wants to send a bit with a new orientation, she must change the voltage applied to the photon to shift its orientation.

This gives the hacker time to swoop in and hijack the bit before it is sent out to Bob, measure it, and then send it on its way again.

However, if the hacker simply sends the bit to Bob along one of the four orientations that Alice originally defined, his presence will be discovered because his measurements will introduce random errors into the system that exceed the 20 per cent limit.

But Lo's team has now shown that if the hacker sneakily sends the bits along slightly different directions, the errors introduced by his interference will fall just under the 20 per cent threshold at 19.7 per cent.

Gregoire Ribordy, chief executive of IDQ, says Lo's hack does not threaten the security of IDQ's commercial product, which contains extra alarms above those included in the version that was sold to Lo's group a few years ago. (ANI)

Hacked original 'Draw Mohammed Day' Facebook page back online

Despite the best efforts of the talented Turkish cyberjihadi Ali Hassan, the original 100,000-member Facebook page is back online with all photos, posts and links intact. Running commentary appears as lively as it was May 20.

The news has been flying fast and furious since Everybody Draw Mohammed Day kicked off May 20. Yet no news may be more important for EDMD proponents than reports that the original 100,000 member-strong EDMD page (update: 110,000) is at Facebook after nearly two full days offline. That downtime was the direct result of Turkish cyberjihadi Ali Hassan's successful hacker attacks on the EDMD page creator's computer, and not Facebook self-censorship as many had speculated. The two mysterious and unexplained takedowns on May 20, which had left the main EDMD page inaccessible, reminded many of the South Park Mohammed censorship by Comedy Central. The reporting was not praising.

The newly accessible EDMD page contains apparently complete archives and posts, as well as with over 12,000 entries. The Jawa Report links a hot-off-the-presses interview with the Administrator of the hacked EDMD Facebook page group. Kudos to Facebook for standing up for freedom of speech, and in the face of withering fire directed at them by most everyone, from angry conservative bloggers to enraged Islamist extremists. On that note, the Lahore High Court (LHC) has asked Pakistan's Foreign Minister to lodge an official sovereign protest with the US Government over the "blasphemous" EDMD Facebook page. Now I'm not 100% sure about this one anymore, but aren't we outside of Lahore's legal jurisdiction?
Newer Posts Older Posts Home