Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Share This Post With Your Friends

Friday, June 11, 2010

Free Hacking.net Subscribers: Something is wrong: Guest posts open


Friends, Today I have suddenly found that almost 50% of my blog subscribers unsubscribed from my blog. Well every time when any email get unsubscribed, I received an email but this time I have not received any email. Something is wrong somewhere.

I am checking all subscriber email ID's and feed types. After all this I am still very happy to say that visitors on freehacking.net increasing day by day. Thanks to all. Keep visiting and commenting.

Guest posts are also allowed. You can contact me on mail id

How to detect and block an ARP spoofing/poisoning attack on a LAN

SOURCE: TECHKRANTI

ARP poisoning attacks are the most dangerous MITM attacks when working on a LAN. The most hazardous thing about this attack is that they go unnoticed for a very long time or in some cases they would never be detected if not checked for. No naive internet user is gonna check if he is being poisoned. This would go undetected in a trusted environment like an office or at college. Well then it is the responsibility of the admins to protect their clients from attack.

Detecting an ARP Spoofing attack

Well detecting an ARP attack is fairly easy assuming that the malware responds to standard ARP requests. Here's how you go about detecting a possible attack.

1. Start a network capture using a tool such as tcpdump or Wireshark.
2. Generate some traffic on your machine and then stop the capture.
3. Now analyze the traffic. You don't have to be an expert to do this. Check if you are getting ARP requests or responses from multiple addresses.

If you are getting ARP traffic from sources other than your default gateway there is possibly an eavesdropper. This eavesdropper could also modify what you recieve. A very good application of MITM is 'login credentials stealing', especially from SSL secured websites. Tools such as Ettercap and Cain & Abel can make this possible even for a script kiddie.

This was about detecting an MITM, but there is no manual way to block an MITM, other than bashing up the intruder sitting at the poisoning host machine.

Blocking an ARP Spoofing Attack:

ArpON (Arp handler inspectiON) is a portable handler daemon that make Arp secure in order to avoid Arp Spoofing/Poisoning & co.

This is possible using two kinds of anti Arp Poisoning techniques, the first is based on SARPI or "Static Arp Inspection", the second on DARPI or "Dynamic Arp Inspection" approach.

Keep in mind other common tools fighting ARP poisoning usually limit their activity only to point out the problem instead of blocking it, ArpON does it using SARPI and DARPI policies. Finally you can use ArpON to pentest some switched/hubbed LAN with/without DHCP protocol, in fact you can disable the daemon in order to use the tools to poison the ARP Cache.


Platform Support: Linux, Mac OS X, FreeBSD, NetBSD, OpenBSD

Friends, today morning I suddenly received an email from GOOGLE. I am copy pasting it here as it is.

Dear Google Alerts user,

We're contacting you because you have an alert of type Web. We've decided to retire Web alerts because (1) they are used by very few people and (2) an alert of type Everything will find the same results.

This week we'll be changing all alerts of type Web into alerts of type Everything. Your alert will continue to include results from all kinds of web sites.

You may receive more results after this change. If you find that you are getting too many results, you can change the "How often" setting to "once a day" or "once a week." You can also change your search query. You can do this on the alerts management page (www.google.com/alerts/manage), or by removing the alert using the link at the bottom of each alert email and creating it again with different settings.

We hope that you'll continue to find your alert useful.

Sincerely,

Marcel Gordon
Product Manager, Google Alerts

You have received this mandatory email service announcement to update you about important changes to your Google Alerts subscription.

Google Inc.
1600 Amphitheatre Parkway
Mountain View, CA 94043

Thursday, June 10, 2010

How to hack website: Website Hacking best tutorials and tools




The best vulnerability scanner software and assessment tool: Nessus






How to Scan all open TCP and UDP ports using VISION


Penetration Testing on a Corporate Network using CREDDIGGER

How to Scan the Open Ports Through Firewall using Fscan

S.Korean government website hit by cyber attacks

South Korea's intelligence service is investigating a major cyber attack on the main government website by hackers traced to China, officials said Thursday.

The attacks on Wednesday evening lasted around three-and-a-half hours, slowing traffic on the site (http://korea.go.kr) which provides information on policies and services, said the Ministry of Public Administration and Security.

The ministry said its cyber security team had been on alert for such attacks as tensions rose with North Korea.

Hackers used about 120 China-based Internet servers, a ministry spokesman told AFP, adding the government took immediate measures to thwart the "distributed denial of service" (DDoS) attacks.

"We are now tracing the origin of the attacks" in cooperation with intelligence authorities and other government offices, he said.

South Korea's spy chief blamed North Korea for cyber attacks from China-based servers that briefly crippled US and South Korean government and commercial websites last July.

South Korea announced reprisals against the North, including a trade cut-off, after investigators concluded last month that a North Korean submarine torpedoed a South Korean warship with the loss of 46 sailors in March.

The North furiously denies involvement and has responded to the reprisals with threats of war.
On Tuesday the head of South Korea's military intelligence unit warned that the North may follow up its ship attack with cyber attacks to disrupt the Group of 20 summit in Seoul in November.

Major General Bae Deuk-Shik, chief of the Defence Security Command, said the North has an army unit of elite hackers.

Intelligence officials have also said the North mounted a cyber campaign -- using stolen identities of South Korean Internet users -- to spread its own claims about the sinking.

DDos attacks are designed to swamp selected websites with traffic.

AT&T website hacked: Exposed iPad Owners’ E-Mail Addresses

Black hat hackers have exploited a security flaw on AT&T's web servers which enabled them to obtain email addresses from the SIM card addresses of iPad 3G users. (Updated with statement from AT&T)

Hacking group has obtained the e-mail addresses of 114,000 owners of 3G iPads by exploiting a security hole on AT&T’s Web site, according to a report by Gawker.

The group also obtained the identification number that those iPads use when they communicate over AT&T’s network, known as an ICC-ID. It is not clear what that information could be used for.

The publication claimed that the identifying information meant that thousands of iPad 3G users "could be vulnerable to spam marketing and malicious hacking," while also pointing out that many users have actually already published their iPad ICC ID numbers in Flickr photos. Presumably, many of them also have public email addresses and therefore already receive spam like the rest of us.

The attack on AT&T's web servers resulted in at least 114,000 iPad 3G users' emails being leaked to the hackers, who were coy about wether or not they were planning to enable others to access the data. The security leak, which returned a user's email address when their ICC-ID was entered via a specially formatted HTTP request, has since been patched.

The group automated requests of the email address information for a wide swath of ICC-ID serial numbers using a script. No other information was discovered.

"No direct security consequences"

The report suggested that having known ICC IDs would leave iPad 3G users vulnerable to remote attacks, citing the attackers involved in the security breach as claiming that "recent holes discovered in the GSM cell phone standard mean that it might be possible to spoof a device on the network or even intercept traffic using the ICC ID."

However, Gawker also talked to telephony security experts who disputed that the ICC ID email breach was a serious issue. It cited Emmanuel Gadaix, a "mobile security consultant and Nokia veteran" who said that while there have been "vulnerabilities in GSM crypto discovered over the years, none of them involve the ICC ID […] as far as I know, there are no vulnerability or exploit methods involving the ICC ID."

The report also noted that Karsten Nohl, a "white hat GSM hacker and University of Virginia computer science PhD," informed them "that while text-message and voice security in mobile phones is weak," the "data connections are typically well encrypted […] the disclosure of the ICC-ID has no direct security consequences."

At the same time, Nohl described AT&T's lapse in publishing the email information as grossly incompetent, saying, "it's horrendous how customer data, specifically e-mail addresses, are negligently leaked by a large telco provider."

Wednesday, June 9, 2010

Microsoft issues critical Internet Explorer Patch

Microsoft has issued an update for Internet Explorer that will fix multiple vulnerabilities including one critical flaw that would have allowed hackers to remotely take control of host computers.

Additionally, Microsoft is releasing nine other patches that will address 34 vulnerabilities, three of which are considered critical. The vulnerabilities are for Windows, Microsoft Office, IE, Internet Information Services and the .NET Framework.

The company did note that there are currently no active attacks exploiting any of the critical vulnerabilities covered in the patches, but Microsoft is still trying to release the patches as soon as possible.

Jerry Bryant, Microsoft group manager for response communications, says the critical IE exploit was given an exploitability index rating of "1," indicating that the company expects an active exploit within the month.

The critical exploit can occur even if you are using Internet Explorer 8, the most updated of Microsoft's browser offerings.

New Flash Bug Exploited By Hackers : How to avoid it?

A new attack on a Flash bug has surfaced that would give attackers control of a victim’s computer after crashing it, reports PC World. Adobe put out a Security Advisory about this on June 4. It is categorized as a critical issue and all operating systems with Flash are vulnerable including Windows, Linux, and Apple and it is also found in the recent versions of Reader and Acrobat.

It is categorized as a critical issue and all operating systems with Flash are vulnerable including Windows, Linux, and Apple and it is also found in the recent versions of Reader and Acrobat.

A new attack on a Flash bug has surfaced that would give attackers control of a victim’s computer after crashing it, reports PC World. Adobe put out a Security Advisory about this on June 4. It is categorized as a critical issue and all operating systems with Flash are vulnerable including Windows, Linux, and Apple and it is also found in the recent versions of Reader and Acrobat.

Affected Versions

The affected versions are Adobe Flash Player 10.0.45.2, 9.0.262, and earlier 10.0.x and 9.0.x versions for Windows, Macintosh, Linux and Solaris. Adobe Reader and Acrobat 9.3.2 and earlier 9.x versions for Windows, Macintosh and UNIX. The versions that avoided being affected are Flash Player 10.1 release candidate, link available in the Adobe security advisory, and Acrobat/Reader version 8.x.
Current Situation

The attack isn’t widespread in the wild yet, Adobe has only received two reports of online attacks. Of course the attack is new and may just be starting to ramp up. Adobe will update the advisory when a schedule has been determined for creating a fix.
How to avoid it?

Until the fix is ready, Adobe has advised the Flash users that they should use the 10.1 release candidate to avoid attack where as Acrobat and Reader 9.x users can downgrade to version 8 or deleting, renaming, or removing access to the authplay.dll file that ships with Adobe Reader and Acrobat 9.x mitigates the threat for those products, but users will experience a non-exploitable crash or error message when opening a PDF file that contains SWF content. The authplay.dll that ships with Adobe Reader and Acrobat 9.x for Windows is typically located at C:Program FilesAdobeReader 9.0Readerauthplay.dll for Adobe Reader or C:Program FilesAdobeAcrobat 9.0Acrobatauthplay.dll for Acrobat.

Learn Online Security and Privacy - The Facts About Online Hacking..!!

Ever got your FaceBook or Gmail account hacked? If not, it's only a matter of time before it happens, with the increasing amount of data we share online and the type of people who have access to it

So how do you keep hackers away, and yet maintain our digital lifestyles? Here are three simple steps you can take to protect your money, credit card information, and privacy:

1) Learn to Recognize Phishing E-Mails

"Phishing" the the act of disguising emails and communications to make it appear as if it's coming from a reputable source. Most PayPal users are already bombarded with hundreds of fake emails that appear to be official PayPal ones.

But on closer inspection, these emails always bring you to a fake website in order to steal your PayPal login. Once the hacker has that, you can rest assured that your entire PayPal account will be drained to it's last penny.

Please don't click on the links in the email. Instead, type in the address directly in your browser and login that way.

2) Always Backup All Your Data

I've lost all my data once, and it was horrible. Not more than twelve months later, it happened all over again. Most people will never back up their data, and all it takes for them to lose everything is a hard disk failure.

Today you can easily get an external disk drive for less than $40.With that disk, you can make sure important data is regularly backed up in case your computer crashes. You can also find a lot of programs online that allow you to backup data to an online server.

Whichever method you use, backup regularly.

3) Never Use The Same Password for Everything

If you're using the same password to access everything online, you're making a big mistake. All a hacker need to do is find out that "universal" password, and he'll have access to all you personal data.

You need to create a unique password for everything. That way, even if a hacker gets into your email for example, he still cannot get access to your online banking system just by guessing your password.

It's always better to use a password manager software, and create a unique password for each online service you use. A good password manager will help you store all your passwords securely, and give you access via different computers and even your mobile phone.

There you go - three simple steps that will ensure your online safety, and the safety of your loved ones.

How to Increase Online Security: Use SSL Certificate

The internet is now the medium that everyone wants a piece of. Whether it’s to find information at the touch of a button, open a business to a global market, buy almost anything you can think of, or simply watch the latest Lady Gaga video, more and more people are getting online and exploiting its benefits.

But with the increase in the use of the internet, comes the enviable rise in online fraud and identity theft.

Let’s imagine the security risks if you had your bank statement sent to you in a see-through envelope. Anyone who saw the envelope could see your bank account details as well as your name, address and other private information. A serious case of identity fraud could then ensue. Of course this shouldn’t happen as letters are hidden by solid envelopes.

And that’s what needs to happen when we enter personal information online. It too needs to be hidden from potentially prying eyes. But with the number and ability of online hackers increasing exponentially, this has become more and more of a challenge for the e-commerce industry.

So, is there an answer to ensuring that we can buy and sell online in a safe and secure environment? Yes there is – and that answer is the SSL certificate.

What is an SSL certificate?
SSL is an acronym for Secure Sockets Layer and is a network protocol supported by all popular web browsers. SSL works by establishing a private communication channel when a user enters sensitive data into a website e.g. credit card details. The information is then scrambled into a language which makes it virtually impossible to decode.

How does SSL work?
When a business requests an SSL certificate from a Certification Authority such as Verisign or Rapid SSL, they will be issued with a secret key which needs to be kept securely on their web server. Once they receive the SSL certificate, it also needs to be installed on the web server; effectively matching up the SSL certificate to the SSL key. Because the SSL key is only ever used by the web server, this process is a means of proving that the web server has permission to use the SSL certificate.

In order for a secure communication channel to take place using SSL, an ‘SSL handshake’ has to take place. This involves the browser which the customer is using to enter the sensitive data e.g. bank account details, sending a request to the server to check whether the SSL certificate matches with the SSL key. If it does then the web server will authorise an SSL session to take place with the browser and the user can enter their details safe in the knowledge that their information cannot be deciphered by a hacker. This process takes only a split second and should cause no interruption to the user.

Who needs an SSL certificate?
You should seriously consider using an SSL certificate if your business:

· processes credit or debit payments online
· stores or transmits with personal information such as addresses, dates of birth, ID numbers
· have a login area on your site
· want to be seen to be complying with the latest online security

How secure is SSL?
How strong the encryption of the data is can vary depending on the SSL provider, but it is usually 128 bit. This is good enough to ensure that most data can’t be decoded even by the most advanced hackers with the best available technology and hardware.

How do you know if a website is using an SSL certificate?
You can tell if a web site is using an SSL certificate by checking for the padlock symbol on the website. Also, when you go to make a transaction your browser will indicate that it is using an SSL secured session by changing the ‘http to http’s. To view the certificate, users just need to click on the padlock icon.

What happens if I lose my SSL key and/or certificate?
Should you lose either the SSL Key or the SSL certificate you will no longer be able to use SSL on your web server and you will need to purchase a new one. Or you can ask the company you purchased your SSL certificate from to issue you with a replacement certificate.

Tuesday, June 8, 2010

Free Penetration Testing: Hacking Yourself Provides You Better & Tighter Security

Free Penetration Testing

Centuno is now offering a Free Penetration Testing. Simulate an actual hacking attack with free Penetration Testing.

The disclosure earlier this year of attacks originating in China and targeting Google and other large corporations proves that today's cybercriminals are sophisticated and out for financial gain, not bragging rights. These targeted, multipronged intrusions draw on a range of techniques and tools, including exploitable vulnerabilities, inside information, and attackers' sheer persistence. Could your systems stand up to these sophisticated threats? For many enterprises, the best way to find out is to attack yourself first, or hire somebody to do so. A good penetration test may spot security vulnerabilities before attackers do.

The issue is that our standard security product lineup focuses on the Internet as an attack vector, but that's not the only way in. A determined attacker can break in by gaining the cooperation of an insider or even through physical access to your buildings. To really test your defenses, you need to attempt penetration via all of these methods.

In the past, penetration test customers were typically limited to institutions, such as banks and government agencies, that had both large amounts of sensitive data and the resources to fund specialized tests. These days, there's a greater awareness of and interest in penetration testing. Some companies use internal assets, others bring in an outsider to rattle IT's cages.

"The two main drivers behind penetration testing achieving more mainstream recognition are the PCI Data Security Standards and boardroom attention," says Nick Selby, managing director of Trident Risk Management, a security consulting firm that conducts assessments. Other compliance standards, such as HIPAA, also carry pen test requirements. Penetration tests conducted by third parties are the norm, but there is a do-it-yourself option thanks to automated pen testing products from vendors such as Core Security Technologies, Immunity, and Rapid7. Open source tools are also available for companies that want to build their own pen test kits.

The Human Factor

A true penetration test involves far more than a scan and a report. Steve Stasiukonis, VP of Secure Network Technologies and a pen tester for more than a decade, says scannable network components are only one of three elements that must be evaluated.

"People, process, and technology are all part of a thorough test," Stasiukonis says. "Of the three, people are the weakest link, and a good pen tester will perform reconnaissance that determines what's needed to get past your people and into your systems."

We all know that employees with weak passwords are weak links. But there's much more to social engineering, in which the attacker gains a target's trust, which can then be exploited. Social engineering attacks are often used to gain physical access to a building or sensitive location. For instance, Stasiukonis and his colleagues will disguise themselves as service technicians--complete with uniforms and logo-emblazoned van--to gain physical entry into a client's business.

A variation of this attack is security blogger Scott Wright's Honeystick Project, in which Wright left USB flash drives loaded with harmless notification and logging software in public places. According to Wright, 65% of those drives were picked up by people who then connected them to their computers.

Testing the "human factor" not only helps organizations identify specific personnel-based risks but may also illuminate gaps in organizational understanding of security issues.

"Penetration test results should raise internal awareness issues," Selby says. For example, one result of a social engineering attack could be that the organization conducts awareness training for executives about the ways in which they may be targeted, such as by spear phishing, an attack in which malware-loaded e-mails that appear to come from a reliable source are sent to specific, high-value targets, such as corporate executives.

Hacking Facts: The History of Hacking

Hacking has been around as long as computers as a way to reconfigure or reprogram a system to give access to someone who otherwise shouldn’t have access. In the media, any electronics manipulation is often referred to as hacking, though “cracking” may often be more appropriate. Thanks to hacking, computer geeks can be cool and dangerous.

Chandigarh Housing Board (CHB) Website Hacked by Pakistani Hackers

The cyber crime cell here is investigating hacking of the website of the Chandigarh Housing Board (CHB), police said here Sunday.

The website was hacked Saturday and its homepage was replaced with www.pakhaxors.com. It displayed a Pakistan national flag and objectionable language for the Chandigarh administration. CHB Sunday closed down its website and put it under maintenance.

'This is a serious issue and we have lodged a complaint with the authorities concerned. However, all our data is safe. We had a backup option,' Chandigarh housing-cum-finance secretary Sanjay Kumar told IANS Sunday.

'We will make sure that nobody is harassed due to this. We will again activate the website with all the information and links at the earliest,' he pointed out.

Crucial details regarding the ongoing projects, tenders and future plans of CHB were removed from the website. A few weeks back, CHB started accepting tenders online.

Last month, CHB also started digitising the property records in Chandigarh.

'Right now it is difficult to comment on who the culprit is. A website can be hacked by anybody, sitting in any part of the world. We are using all our expertise in the investigation and hopefully very soon we will catch the main accused behind this,' said a cyber crime cell official.

Hacking & Viruses: How to Protect Against Hacking

Thousands of websites are hacked every day and webmasters are crying for help. There isn’t much we can do; most computers are infected with viruses, from Trojan Horses to any other unwanted virus. What viruses are used for and why people keep spreading them? Most virus creators/owners do it to earn money, others do it for fun.

One of the most common viruses will pop up websites that you didn’t want to visit, this method became a very common and profitable way for advertises to make money. How do they get to you? Most of the time it is done in a legitimate way, when downloading a software to your computer most of us don’t read the terms and conditions section. If you take a moment to read, it will be hard believe what you agree to when installing the software. The only thing the software owners are not allowed to do is to blow up your computer, the rest is 100% legal. This includes pop ups which is a well known and profitable way to bring traffic and make money on the internet, installing different programs on your computer, checking what kind of of things you use your computer for, by that learning what will convert you best as their user and what will make you spend money.

This industry is growing every day when more and more software programs are created specially for this propose. The main objective is to sell you products. The most common programs that will be used for this propose and might put your computer and personal information in stake are screensavers, browsers toolbars and other similar stuff.

A worst kind of viruses will install the program without the user consent by visiting a website. Most of the time the site that installs the virus on your computer is unaware about the virus installed on his website. In this case users should let the webmaster know so he can make a clean up to make sure no more users are infected.

Most viruses are impossible to remove once your computer is infected; the only way is reinstall your operating system. This will ensure safe surf on the internet, until the next time you will get infected by others greediness for easy money.

Strathclyde Police WebSite Shut Down: Possible Hacking Attack


Last night, Strathclyde Police closed its website following a potential virus attack by Chinese hackers.

The site was closed to allow the IT department at Strathclyde Police to assess the threat following a number of weblinks appearing on the site, diverting users to a Chinese site known for distributing viruses.

A spokesperson for Strathclyde Police explained that its IT engineers were investigating what had happened, and that the site would remain closed until ‘the anomaly’ had finished being examined.

They ruled out viruses as the cause and said that no one who had logged onto the site, would have put their computer at risk.

In reporting the story this morning, The Herald quoted Grant Gibson, digital innovation manager at the Herald and Times Group warned that the police should not be complacement about any potential attack.

Gibson said: “Regardless of whether the site is active or dormant at this precise moment, the hackers have a window into the Strathclyde Police page from a location outwith their control. This 'window' is registered to an individual in China, which could be reactivated at any time.”

At the time of writing, the website was still down.

Download Format Recovery Tool: iCare Format Recovery 2.0 | 2.99 MB

iCare Format Recovery 2.0 | 2.99 MB

iCare Format Recovery is an advanced format recovery tool for recovering files after accidental format, quick format data recovery, file recovery on NTFS partition format and recovering data after disk format. The iCare Format Recovery has been designed for recovering Microsoft office files, photos, achieves, music files, video from any storage media like hard drive, removable hard drive, SD card, USB drives and etc.

Feature list:
- Hardware RAID and Dynamic Disk Support
- Preview recoverable files before purchasing the product.
- Special developed search algorithm to perform format recovery.
- Works under Microsoft Windows 7, Vista, XP, 2000 Pro; Windows Server NT, 2000, 2003 Server, 2008 Server.
- Supported file systems: FAT12, FAT16, FAT32, NTFS, NTFS5.
- Supported hidden file systems: Hidden FAT12, Hidden FAT16, Hidden FAT32, Hidden NTFS
- Recovers compressed files (NTFS, NTFS5).
- Recovers encrypted files (NTFS5).
- Several ways to recover lost files.
- Correctly recovers files deleted in Windows NT, 2000, XP (FAT32)
- iCare Format Recovery is able to recover:
- Files and Folders deleted from formatted partition like D, H, E, C.
- Common folders such as My Documents, My Pictures and other.
- Photos deleted from formatted digital cameras.
- Files and folders deleted from the command line.
- Files after virus or worm attack.
- Damaged disks (disks with bad sectors).
- From various storage media including:
- Hard Drives
- Digital cameras
- Floppy disks
- Zip Disks
- Jaz Disks
- Drive images (FAT/NTFS)
- Sony Memory Sticks
- Compact Flash cards
- Smart Media Cards
- Secure Digital Cards
- Any USB disks

What's new in the release?
- fixed bugs
- improved format recovery ability
- added office file preview

Home Page - http://www.icare-recovery.com/


DOWNLOAD MIRROR LINK 2

Download Windows 7 ULTIMATE Fully Activated, Genuine & Updatable


Windows 7 ULTIMATE -Fully Activated, Genuine & Updatable
Windows 7 ULTIMATE x86 / x64 FULLY ACTIVATED!

32/64-bit | English and MULTILANGUAGE SUPPORT | DVD ISO | Bootable | Simple use!
No serial and no activation needed | Size: 3.47GB | Genuine version | FULLY UPDATABLE with Windows Update. | Instructions and Installation notes included

This upload has been tested by thousands of people and it is working 100%! If any provided links are dead, please reply in this thread or send me a PM, I have backup-links ready to post.
Kindly note that if you find dead links, you can post "Dead links" in this thread, I'll pm you the new links directly to your Private Message Box within hours
EXCLUSIVE SERVICE FROM ME!

Install:

- Download and extract using WinRAR.
- Use Nero or other burning app to burn the ISO image
- Burning speed should not be faster than 4x. Otherwise, it might not work.
- Restart your computer.
- Make sure you have selected your DVD-ROM/RW drive as a first boot device.

* Enter the BIOS pressing the DEL button, set the option, insert your Windows 7 installation and restart computer.
- The black screen will appear (image 01).
- Press any key to boot from CD or DVD.... (by pressing the key you are entering the setup)
- Select your language, time and currency and keyboard input (optionaly)
- Click install now
- Choose your edition (x86 is 32-bit, x64 is 64-bit) depending of CPU type you have.

*Choose x64 if you have 64-bit processor.
- Click "I accept".
- Click "Custom" (advanced).
- Choose your partition/hdd drive where Win7 should be installed and click format.

*You might get some error if you have two or more hard disks with different connectors (ATA and SATA).
If you get an error, turn off one of your hard disks and repeat the whole proces.
- After formatting, setup will continue automaticly and it will finish after 15-30 min.
- Next step would be username
- Type your password (if you want).
- When you get the screen for CD-KEY just ignore it leaving blank.

*Uncheck the box for automaticly activation and click next.
- Choose the third option for next step.
- Select your time zone.
- Select your current location (Home is recommended).
- The black CMD windows will appear. Wait a few seconds until computers restares once again.
- And that would be all about installation. You are in Windows now.

Activation:
It is not required, because it is OEM. Windows will be premanently activated.
However, it is well known that there is some problems with DELL and HP machines.
So if you have issues with pre-activation you will be forced to some activator to activate Windows 7.

DOWNLOAD:

http://hotfile.com/dl/47035328/981b2cf/backup-200mb-no141.part01.rar.html
http://hotfile.com/dl/47035329/9cba3b8/backup-200mb-no141.part02.rar.html
http://hotfile.com/dl/47035366/14f2380/backup-200mb-no141.part03.rar.html
http://hotfile.com/dl/47035367/ca2c0ef/backup-200mb-no141.part04.rar.html
http://hotfile.com/dl/47035368/63cb257/backup-200mb-no141.part05.rar.html
http://hotfile.com/dl/47035376/09a7e86/backup-200mb-no141.part06.rar.html
http://hotfile.com/dl/47035378/0285dda/backup-200mb-no141.part07.rar.html
http://hotfile.com/dl/47035379/a40db46/backup-200mb-no141.part08.rar.html
http://hotfile.com/dl/47035381/5ff85ef/backup-200mb-no141.part09.rar.html
http://hotfile.com/dl/47035382/25d389a/backup-200mb-no141.part10.rar.html
http://hotfile.com/dl/47035383/7db16a1/backup-200mb-no141.part11.rar.html
http://hotfile.com/dl/47035386/e691de0/backup-200mb-no141.part12.rar.html
http://hotfile.com/dl/47035389/3bad0c0/backup-200mb-no141.part13.rar.html
http://hotfile.com/dl/47035391/53d392b/backup-200mb-no141.part14.rar.html
http://hotfile.com/dl/47035392/cbdfd27/backup-200mb-no141.part15.rar.html
http://hotfile.com/dl/47035394/f2a05d9/backup-200mb-no141.part16.rar.html
http://hotfile.com/dl/47035395/856823a/backup-200mb-no141.part17.rar.html
http://hotfile.com/dl/47035396/a4e81b8/backup-200mb-no141.part18.rar.html
http://hotfile.com/dl/47035397/a8e212c/backup-200mb-no141.part19.rar.html
http://hotfile.com/dl/47035398/9f428c4/backup-200mb-no141.part20.rar.html

Password: thierryownz

Download Kaspersky Internet Security 2011: Free Kaspersky Internet Security 2011

Kaspersky Internet Security (2011) v11.0.0.232 Final English (ISO) | 283MB Kaspersky Internet Security 2011 – is a universal means of information protection. The program provides not only antivirus protection but also protection against spam and network attacks. Also, components of the program allows you to protect your computer from unknown threats and internet fraud, control user access to the Internet. Complete protection is provided on all channels and information transfer. Flexible configuration of any component maximizes Kaspersky Internet Security adapt to their specific needs.

The procedure for treatment: Keys to the KIS 7-8-9 compatible
Name of Program: Kaspersky Internet Security 11.0.0.232 Final [English] Program Version: 11.0.0.232 Final Language: English

Download Link
http://hotfile.com/dl/46976537/df11043/KIS.11.0.0.232.part1.rar.html http://hotfile.com/dl/46977364/8d596eb/KIS.11.0.0.232.part2.rar.html http://hotfile.com/dl/46977761/4f33afc/KIS.11.0.0.232.part3.rar.html

Mirror Link:
http://ugotfile.com/file/1529926/KIS.11.0.0.232.part1.rar http://ugotfile.com/file/1529930/KIS.11.0.0.232.part2.rar http://ugotfile.com/file/1529865/KIS.11.0.0.232.part3.rar

Download ESET Smart Security and NOD32 v4.2.40.0 ( 64-bit & 32-bit ) l 175 MB

ESET Smart Security and NOD32 v4.2.40.0 ( 64-bit & 32-bit ) l 175 MB
\
ESET Smart Security v4.2.40.0
  • 32-bit
  • 64-bit
ESET NOD32 v4.2.40.0
  • 32-bit
  • 64-bit
NOD Enabler v3.4.1

Unlimited Keys! Automatically updates
32-bit
64-bit

T-NOD v1.4.1

Unlimited Keys! Automatically updates[/b]

ESET System Inspector

32-bit
64-bit

PLEASE READ THE README FILE!

DOWNLOAD LINK 1

DOWNLOAD MIRROR LINK 2

Free PHP Scripts: Download PHP Scripts: Collection of PHP Scripts

2500 PHP Premium Scripts Mega Collection
Source PHP | 861 Mb
Web Developers Mega Pack :
Ad Management
Affiliate Programs
Blog
Bookmark Management
Calculators
Calendars
Chat Scripts
Classified Ads
Click Tracking
Communication Tools
Content Management
Contests and Awards
Countdowns
Counters
Customer Support
Database Tools
Date and Time
Development Tools
Discussion Boards
Documents
E-Commerce
Education
Email Systems
Error Handling
Exchanges
FAQ and Knowledgebase
File Manipulation
Financial Tools
Flash and PHP
Form Processors
Games and Entertainment
Graphs and Charts
Groupware Tools
Guestbooks
Healthcare
Image Galleries
Image Handling
Interactive Stories
Link Checking
Link Indexing
Mailing List Managers
Multimedia
Music Libraries
Networking Tools
News Publishing
Organizers
Polls and Voting
Portal Systems
Postcards
Quote Display
Randomizing
Redirection
Reviews and Ratings
Search Engines
Security Systems
Server Management
Site Mapping
Site Navigation
Site Recommendation
Software Repository
Tests and Quiz
Top Sites
Unsorted
URL Submitters
Usenet Gateway
User Authentication
User Management
Vertical Markets
WAP and WML
Web Fetching
Web Hosting Tools
Web Rings
Web Search
Web Traffic Analysis
XML and PHP

Download Links

Hotfile
http://hotfile.com/dl/46082181/08d2cbc/2500.PHP.Scripts.Mega.Pack.part01.rar.html
http://hotfile.com/dl/46082182/1dbefb0/2500.PHP.Scripts.Mega.Pack.part02.rar.html
http://hotfile.com/dl/46082183/24736a2/2500.PHP.Scripts.Mega.Pack.part03.rar.html
http://hotfile.com/dl/46082189/2757075/2500.PHP.Scripts.Mega.Pack.part04.rar.html
http://hotfile.com/dl/46082191/dd5191b/2500.PHP.Scripts.Mega.Pack.part05.rar.html
http://hotfile.com/dl/46082195/fbae6e3/2500.PHP.Scripts.Mega.Pack.part06.rar.html
http://hotfile.com/dl/46082198/dc4ba66/2500.PHP.Scripts.Mega.Pack.part07.rar.html
http://hotfile.com/dl/46082202/25a53e0/2500.PHP.Scripts.Mega.Pack.part08.rar.html
http://hotfile.com/dl/46082203/643a46c/2500.PHP.Scripts.Mega.Pack.part09.rar.html

Fileserve
http://www.fileserve.com/file/u4QG6n6/2500.PHP.Scripts.Mega.Pack.part01.rar
http://www.fileserve.com/file/g7t4H6H/2500.PHP.Scripts.Mega.Pack.part02.rar
http://www.fileserve.com/file/ZZcfjKh/2500.PHP.Scripts.Mega.Pack.part03.rar
http://www.fileserve.com/file/fpDV2jt/2500.PHP.Scripts.Mega.Pack.part04.rar
http://www.fileserve.com/file/PkbQCah/2500.PHP.Scripts.Mega.Pack.part05.rar
http://www.fileserve.com/file/bad3S7s/2500.PHP.Scripts.Mega.Pack.part06.rar
http://www.fileserve.com/file/GRZueDd/2500.PHP.Scripts.Mega.Pack.part07.rar
http://www.fileserve.com/file/bGjTbqb/2500.PHP.Scripts.Mega.Pack.part08.rar
http://www.fileserve.com/file/YcSkVf2/2500.PHP.Scripts.Mega.Pack.part09.rar

Download Windows 7 xDark Deluxe x86 v3.1 (2010)

Windows 7 xDark Deluxe x86 v3.1 (2010) Eng
Release Date : May 27, 2010
Size : 3,64 GB

Windows 7 xDark ™ Deluxe x86 v3.1 is based on the original image of Windows 7 Ultimate.Protsedura installation retains all the important functions such as setting the keyboard language, rehabilitation, modernization or establishment of a new installation, choose the hard disk for installation. The image is optimized using the WAIK, without removing any components. Kernel xDark ™ Deluxe x86 v3.1 consists of more than 500 modified or integrated DLL-files, allowing for another look at Windows 7. In the Start menu, you'll find plenty of tools for tuning and optimizing the system.

Integrated Tweaks:
* Use SSL 2.0 (Checked) + SSL 3.0 (Checked) + TSL 1.0 (unchecked)
* Do not save encrypted pages to disk
* Force keep positive entries in DNS Cache for only 4 hours instead of the default 24 hours
* Increase RPC Packet Size
* Stop caching negative responses
* Increase Network Throughput
* Faster browsing with IE
* Maximum simultaneous downloads for IE to 20
* Disable Windows Media Player AutoUpdates
* Windows Media Player 11 (WMP11) Tweaks For Privacy & Ease Of Use
* Automatic defrag changed to PerfectDisk
* Typing Long File Names In DOS
* Disable group policy updates on logon
* Disable AutoAdmin Logon and shutdown tweak
* Fast shutdown and system information in dxdiag
* Disable Automatic Restart in the event of a BSOD
* Enable Bootoptimization
* Enable ClearType Tuning
* Enable addition Avalon effects
* Enable slow-motion window effects (min/max/3dflip) by holding down Shift key
* Speedup access to AVI Files
* Add GodMode, My Computer, Network and Administrative Tools to desktop
* Windows will tell you exactly what it is doing when it is shutting down or is booting
* If an Administrator attempts a protected action - Silently Succeed
* Take OwnerShip
* DreamScene
* Search All File Types
* Enable detection of program compatibility assistant
* Disable Tracking of Broken Shortcut Links
* Disable Security Notification Tray Icon
* Show extensions for known file Ttpes
* Use Checkboxes to select items
* Show hidden files and folders
* Restore previous folder windows at logon
* Disable low disk spack check
* Disable Info Tips
* Always show menus
* xDark Start menu and Explorer tweaks
* Add 'Copy to Folder' to right click context
* Add 'Move to Folder' to right click context
* Add 'Open with Notepad' to right click context
* All items have an "edit.." on right-click sending to notepad
* Makes a right click option for unknown files (Open with notepad)
* Add MSCONFIG to right click on My Computer
* Add "Advanced System Properties" to the right click menu of "Computer"
* Add Add/Remove Programs to Right Click Menu of My Computer
* Add Services to Right Click Menu of My Computer
* Add Shutdown to Right Click Menu of My Computer
* Add Registry Editor right click of MY Computer
* Add an option in the right-click (context) menu to open any folder on your computer in a new window.
* Add open in new windows to drives and folders
* Add "Device Manager" to the right click menu of "Computer"
* Set Image as folder cover Context Menu Option
* Add Copy File Names to Context Menu
* Register/UnRegister Dll to Context Menu
* Add Recycle Bin to Context
* Add install to Right Click on Font Files
* Add command prompt to right click context menu
* Open with regsvr32
* Remove unlikely templates from the New Menu
* Clean Names Entry
... and much more

Integrated Applications:
* 7Zip
* xWinrar
* Adobe Flash Plugins
* Adobe Shockwave Plugin
* HashCheck Shell Extension
* Java Runtime 20
* Microsoft Silverlight 4
* Notepad 2
* DirectX
* Ashammpoo Burning Studio 10
* K-Lite Mega Codec Pack 6
* PerfectDisk
* Registry WorkShop
* SPTD Driver
* WinPatrol
* NfoPad
* xDark Ave Preview
* xDark Show Desktop
* xDark Tools
* Dreamscene

Programs:
*Paint
*Narrator
*Notepad
*Wordpad
*Calculator
*Xps Viewer
*Sticky Notes
*Snipping Tool
*Character Map
*Sound Recorder
*Command Prompt
*Windows DVD Maker
*On Screen Keyboard
*Mycrosoft Sync Center
*Windows Media Player
*Windows Media Center
*Private Character Editor
*Group Policy Editor
*Remote Assistant
*Remote Desktop Connection
*Remote Assistant Properties
*Event Viewer
*Services
*Authorization Manager
*Certificates
*Component Services
*Disk Management
*Local Users And Groups
*Nap Client Configuration
*Print Management
*Resultant Set Of Policy
*Local Security Policy
*SQL Server Configuration Manager
*Task Scheduler
*TPM Management
*Pen And Touch
*People Near Me
*Game Controllers
*OBDC Data Source Administrator

Extras. Information:
In the archive added Russian language pack:
MICROSOFT.WINDOWS.7.LANGUAGE.PACK.RUSSIAN.RTM.7600.16385.X86.RIP-WZT
and:
Windows 7 Loader eXtreme Edition v3.503 (Napalum)

Checksums:
MD5 - 4772ac0ade107e111b88738582cd7d1f
SHA1 - 90f746851f5a390f7625db58693382be027305b1
CRC32 - 8f32f153

System requirements:
* 1 gigahertz (GHz) or faster 32-bit
* 1 gigabyte (GB) RAM
* 16 GB available hard disk space
* DirectX 9 graphics device with WDDM 1.0 or higher driver

Year: May 27, 2010
Version: v3.1
Developer: Microsoft
Platform: X86
Language: English + Russian language pack
Tabletka: Present
Size: 3,64 GB

Download :

http://hotfile.com/dl/47083011/0d8d511/7_xDark_Deluxe_x86_v3.1_RG.part01.rar.html
http://hotfile.com/dl/47083014/44e4a73/7_xDark_Deluxe_x86_v3.1_RG.part02.rar.html
http://hotfile.com/dl/47083165/03c3b56/7_xDark_Deluxe_x86_v3.1_RG.part03.rar.html
http://hotfile.com/dl/47083412/67bee56/7_xDark_Deluxe_x86_v3.1_RG.part04.rar.html
http://hotfile.com/dl/47083415/5d67642/7_xDark_Deluxe_x86_v3.1_RG.part05.rar.html
http://hotfile.com/dl/47083615/b41808c/7_xDark_Deluxe_x86_v3.1_RG.part06.rar.html
http://hotfile.com/dl/47083617/f287b98/7_xDark_Deluxe_x86_v3.1_RG.part07.rar.html
http://hotfile.com/dl/47083904/029ddb2/7_xDark_Deluxe_x86_v3.1_RG.part08.rar.html
http://hotfile.com/dl/47084061/cff63b0/7_xDark_Deluxe_x86_v3.1_RG.part09.rar.html
http://hotfile.com/dl/47084219/68c1974/7_xDark_Deluxe_x86_v3.1_RG.part10.rar.html
http://hotfile.com/dl/47084371/f0910ca/7_xDark_Deluxe_x86_v3.1_RG.part11.rar.html
http://hotfile.com/dl/47084545/ec0a4ac/7_xDark_Deluxe_x86_v3.1_RG.part12.rar.html
http://hotfile.com/dl/47084796/2315477/7_xDark_Deluxe_x86_v3.1_RG.part13.rar.html
http://hotfile.com/dl/47084975/175f500/7_xDark_Deluxe_x86_v3.1_RG.part14.rar.html
http://hotfile.com/dl/47085144/72d107b/7_xDark_Deluxe_x86_v3.1_RG.part15.rar.html
http://hotfile.com/dl/47085374/964583e/7_xDark_Deluxe_x86_v3.1_RG.part16.rar.html
http://hotfile.com/dl/47085557/83d33cc/7_xDark_Deluxe_x86_v3.1_RG.part17.rar.html
http://hotfile.com/dl/47085699/e1c91e1/7_xDark_Deluxe_x86_v3.1_RG.part18.rar.html
http://hotfile.com/dl/47085858/004174d/7_xDark_Deluxe_x86_v3.1_RG.part19.rar.html
http://hotfile.com/dl/47085935/538a40d/7_xDark_Deluxe_x86_v3.1_RG.part20.rar.html

Download Microsoft Office 2010 Blue Edition Fully Activated


Microsoft Office 2010 Blue Edition (Fully Activated)

Microsoft intends to release Microsoft Office 2010 Technical Preview to invited guests who register to sign up for Office 2010 CTP Program only by July 2009. Office 2010 was previously known by codename Office 14 (taken cue from its version), and wrongly assume to be Office 2009. The setup installer of both 32bit (x86) and 64bit (x64) Office 2010 Technical Preview 1 (TP 1) has been leaked to BT network. The leaked Office 2010 Technical Preview 1 has the version of 14.0.4006.1010, a pre-trial version provided to premium Microsoft partners.
It's unclear whether it is the leaked Office 2010 TP1 build will be the version that is going to be released officially by Microsoft in July. And it?s still unclear yet whether Microsoft will make available publicly for Office 2010 Beta downloads, which is said to be will be having 2 betas - Beta 1 in July 2009 and another Beta 2 in November 2009. The betas is said to be different from Technical Preview, where TP is just meant as an engineering milestone for the development of Office 2010 and related products that leading to RTM that will reach in July 2009, according to Office 2010 IT Blog. Office 2010 is expected to RTM and released as final product in March 2010, with the exception of Exchange Server 2010, where Exchange Server 2010 beta already available from official download links.

The setup installer of the leaked download will install Microsoft Office Plus 2010 edition, with Access 2010, Excel 2010, InfoPath 2010, OneNote 2010, Outlook 2010, PowerPoint 2010, Publisher 2010, and Word 2010. Project Professional 2010, SharePoint Designer 2010 and Visio Professional 2010 are also included in the leaked RAR archive download. Office 2010 supports Windows XP SP3, Windows Vista, and Windows 7.

Important note is that Office2010 TP 1 is still in early stage of development, and may contain bugs, although most individual programs such as Word 2010 and Excel 2010 are usable in everyday life. It?s also interesting to know that Office 2007, the predecessor of Office 2010, is version 12. Office 2010 will be version 14, skipping version 13, the number that Microsoft assumes may be not so lucky.

DOWNLOAD LINK PART 1

DOWNLOAD LINK PART 2

DOWNLOAD LINK PART 3

DOWNLOAD LINK PART 4

Monday, June 7, 2010

Smartphone Hacking: Hackers plant virus in smartphone games

Hackers have planted viruses in video games for smartphones running on Microsoft's Windows operating system, according to a security firm specialising in mobile devices.

The games - 3D Anti-Terrorist and PDA Poker Art - are available on sites that provide legitimate software for mobile devices, according to John Hering, CEO of San Francisco-based security firm Lookout.

The games are bundled with malicious software that automatically dials premium-rate telephone services in Somalia, Italy and other countries, sometimes ringing up hundreds of dollars in charges in a single month.

The services are run by the programmers who built the tainted software, Hering said.

Victims generally do not realise they have been infected until they get their phone bills and see hundreds of dollars of unexpected charges for those premium-rate services, he said.

Hackers are increasingly targeting smartphone users as sales of the sophisticated mobile devices have soared with the success of Apple's iPhone and Google's Android operating system.

Microsoft said it was aware of the problem and was investigating it.

"As always, Microsoft continues to encourage customers to follow all of the steps of the 'Protect Your Computer' guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software," said a spokesman.

Turkish Hackers Working to Penetrate Israeli Websites

Israeli officials report that since the Gaza flotilla incident last week, hack attacks against Israeli website have been up significantly, especially those originating in Turkey. On Friday, no less than 1,000 Israeli websites were hit by Turkish hackers, including some major companies and Ben-Gurion University in the Negev.

Israeli hackers are not just sitting back defenselessly, reportedly targeting Turkish site, with some reports indicating they succeeded in penetrating some unmentioned government sites, but at present, there is no Turkish confirmation of such occurrences.

Examination Papers Leaked at LPU Lovely Professional University

The examination paper of Computer Science (CSE), Information Technology (IT) and Civil Engineering at Lovely Professional University has been leaked and as per the sources, its done by the peon and the photstat owner of LPU 4th block basement.

Our resources also informed to us that some of the boys from hostel have been involved in it and began to distribute the paper in the hostel for about 2000 rupees. When few the girls came to know about this, they immediately put the complaint in RMS on UMS.

After receiving this complaint, the universities authority immediately raid the rooms of all such students in hostel and catch them at the spot with some cash of 44 thousand and papers of whole subjects. Authority took all the suspected students to the dean office at night around 12 :30 AM and leave them at 6:30 am in morning.

The shocking new is that when faculty has checked the papers given by studnts, only 3 students got 93 and rest 43 got 100 out of 100. Management Of Lovely Professional University got shocked when heard about this.

The security officer of LPU has beaten the students very badly. He is going to restigate some the students who are involved in this case. We have also got the news that Mr.Ashok Mittal & Rashmi Mittal stayed in the Lovely Professional University for whole night due to this case and inquired all the students.

READ FULL POST HERE
Newer Posts Older Posts Home