Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Share This Post With Your Friends

Thursday, June 24, 2010

Cisco CCVP CBT Nuggets- Exam-Pack: CVOICE


CBT Nuggets: Cisco CCVP - Exam-Pack: CVOICE | 723MB
English

This training provides the core knowledge of Voice over IP (VoIP) required for implementing and supporting data and voice integration solutions at the network level. It helps you grasp the VoIP vision, and to answer three major questions most companies have about VoIP solutions:

* Why are so many companies moving to VoIP?
* What are the benefits of using VoIP?
* Is VoIP right for our company?

After helping you answer these questions, the CVOICE videos get into the nitty-gritty of VoIP implementation. They show you how to:

* assign rules to nearly everything using Transformation Rules

* move an existing PBX or Key System based network to the newer VoIP technology without getting rid of all your old equipment, so you can maximize the cost efficiency of your VoIP implementation

* deploy a worldwide VoIP infrastructure, even using lower-end equipment.

* configure your Cisco router to continually monitor the WAN line quality and dynamically change connections as necessary.

* set up the Dial Plan that's best for your organization

* understand and configure Gatekeeper

* use VoIP to handle fax and modem

"CVOICE [Exam-Pack: from CBT Nuggets] not only prepares you for the Cisco exam, but also has multiple practical VoIP deployment videos showing exactly how an administrator would set this up in the real world," explained instructor Jeremy Cioara.

The videos cover all objectives for the Cisco CVOICE exam , which is required for CCVP certification. A thorough understanding of Cisco networking such as CCNA or equivalent knowledge is recommended before viewing these videos. The training contains 33 videos providing more than 16 hours of instruction.

More info: http://www.cbtnuggets.com/webapp/product?id=440

Download:
http://sharingmatrix.com/file/5826025/cisco-ccvp-exam--cvoice.part1.rar
http://sharingmatrix.com/file/5826027/cisco-ccvp-exam--cvoice.part2.rar
http://sharingmatrix.com/file/5826029/cisco-ccvp-exam--cvoice.part3.rar
http://sharingmatrix.com/file/5826031/cisco-ccvp-exam--cvoice.part4.rar
http://sharingmatrix.com/file/5826033/cisco-ccvp-exam--cvoice.part5.rar
http://sharingmatrix.com/file/5826035/cisco-ccvp-exam--cvoice.part6.rar
http://sharingmatrix.com/file/5826037/cisco-ccvp-exam--cvoice.part7.rar
http://sharingmatrix.com/file/5826039/cisco-ccvp-exam--cvoice.part8.rar

Cisco CCNA Security CBT Nuggets - Exam-Pack : IINS

CBT Nuggets: Cisco CCNA Security - Exam-Pack : IINS | 1.6GB
English

Are you an IT Pro responsible for network security? Do you have CCNA certification and want to take the next step in network security? Are you working towards CCSP certification? If any of these are you, this is the training you’re looking for.

Jump into security with Jeremy Cioara’s Cisco CCNA Security video series. Jeremy puts you in the mind of hackers and intruders and shows you how to defeat these black hats. Soon you’ll be recognizing different types of attackers and threats and eliminating the damage that can follows security breaches.

You’ll learn all about your security enemies --whether they’re hackers, phreakers, hacktivists, hobby hackers or script kiddies. And you’ll learn how these bad guys:
* Investigate your network
* Identify and target your operating system and applications
* Break into your system
* Steal logins, user names and passwords
* Create network backdoors so they can mount future attacks

More info: http://www.cbtnuggets.com/webapp/product?id=450

Download:
http://sharingmatrix.com/file/5825953/cisco-ccna-security-.part01.rar
http://sharingmatrix.com/file/5825955/cisco-ccna-security-.part02.rar
http://sharingmatrix.com/file/5825959/cisco-ccna-security-.part03.rar
http://sharingmatrix.com/file/5825961/cisco-ccna-security-.part04.rar
http://sharingmatrix.com/file/5825963/cisco-ccna-security-.part05.rar
http://sharingmatrix.com/file/5825965/cisco-ccna-security-.part06.rar
http://sharingmatrix.com/file/5825969/cisco-ccna-security-.part07.rar
http://sharingmatrix.com/file/5825971/cisco-ccna-security-.part08.rar
http://sharingmatrix.com/file/5825973/cisco-ccna-security-.part09.rar

How to Earn Money Online on Internet Without Investment


Backlink Rogue Agent | 1.1GB
1 eBook (PDF) + 85 videos (FLV) + 85 audio (MP3)

Attention All Affiliates – if you are Sick and Tired of your Sites Search Engine Rankings being stuck in Lower Google Pages when you could easily be cashing in on insanely profitable affiliate commissions, finally generating autopilot traffic, read this letter urgently

All you have to do is send 20 unique visitors to this site and the download links for these hot IM Products will instantly become available to you below. Use the links provided to send traffic to this page.

Once the number below reaches 100% you will get access to this bonus. Keep checking back on this page to check your progress.

Download:
http://sharingmatrix.com/file/5826203/GOEUA_EGTN.part1.rar
http://sharingmatrix.com/file/5826213/GOEUA_EGTN.part2.rar
http://sharingmatrix.com/file/5826221/GOEUA_EGTN.part3.rar
http://sharingmatrix.com/file/5826225/GOEUA_EGTN.part4.rar
http://sharingmatrix.com/file/5826233/GOEUA_EGTN.part5.rar
http://sharingmatrix.com/file/5826243/GOEUA_EGTN.part6.rar

Download Net Tools 5: Net Tools 5 Free Download

Net Tools is a comprehensive set of host monitoring, network scanning, security, administration tools and much more, all with a highly intuitive user interface. It's an ideal tool for those who work in the network security, administration, training, internet forensics or law enforcement internet crimes fields. Net Tools is mainly written in Microsoft Visual Basic 6, Visual C++, Visual C# and Visual Studio .NET.

The Creation

Net Tools is cutting-edge security and network monitoring software for the Internet and Local Area Networks, providing clients with the ability and confidence to meet the challenges of tomorrow's technology. Keeping pace with the industry trends, we offer professional tools that support the latest standards, protocols, software, and hardware for both wired and wireless networks. The main goal is the creation of high quality software. Net Tools is a very strong combination of network scanning, security, file, system, and administrator tools useful in diagnosing networks and monitoring your PC and computer's network connections for system administrators. Next to the essential core tools it includes a lot of extra valuable features. It’s a Swiss Army knife for everyone interested in a set of powerful network tools for everyday use. This all-in-one toolkit includes also a lot of handy file and system utilities next to the huge amount of network tools. The menus are fully configurable, so in this way you won’t get lost in the extremely large amount of essential tools. All the additional features will make this application a must have for all system administrators. There are numerous constructive and valuable applications included in Net Tools that can be used for a great amount of purposes. The latest version of Net Tools is hybrid; it means that it’s capable of working together with applications that are made and designed for Net Tools, so in this way more flexibility and user-friendliness is obtained. This software is designed for the Microsoft Windows OS (Windows 98, NT, 2000, 2003, XP, Vista). It’s entirely compatible and has thoroughly been tested on Windows XP. With the 175+ tools it is a great collection of useful tools for network users. The size of Net Tools 5.0.70 is approximately 25 Mb.

Contents

Net Tools 5.0 (build 70) contains a whole variety of network tools. Here is a list of the most important tools:

1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, ... All protocols supported)
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) GeoLocate IP
154) Google PageRank Calculator
155) Google Link Crawler (Web Result Grabber)
156) Network Adapter Binder
157) Remote LAN PC Lister
158) Fast Sinusoidal Encryption
159) Software Scanner
160) Fast FTP Client
161) Network Traffic Analysis
162) Network Traffic Visualiser
163) Internet Protocol Scanner
164) Net Meter (Bandwidth Traffic Meter)
165) Net Configuration Switcher
166) Advanced System Hardware Info
167) Live System Information
168) Network Profiler
169) Network Browser
170) Quick Website Maker and Web Gallery Creator
171) Remote PC Shutdown
172) Serial Port Terminal
173) Standard Encryptor
174) Tray Minimizer
175) Extra Tools (nmap console & win32 version)

Many extra features and utilities are included in this package!

Information department’s official website hacked, NIC starts probe

Barely a month after the chief secretary asked the state government departments to prepare a contingency plan for preventing hacking of government websites, the official website of the state department of information was hacked on Wednesday.

The department officials were in for a surprise when they found that the website, www.information.up.nic.in, which is connected to the state government’s official website, www.upgov.nic.in, flashed the message “hacked by r4diationz” on Wednesday evening.

The officials have reported the matter to National Informatics Centre, Uttar Pradesh, who are trying to find the problem and retrieve all the information that has been lost. As an emergency measure, the information department has stopped all functions of the website.

According to official information, this is the first time that any official government website has been hacked in UP. The department officials found this in the evening when some of them wanted to check the information uploaded during the day.

Director (Information) Ajay Kumar Upadhayaya said: “We found this out in the evening. While not much information seems to have been lost, all press releases and other such documents are missing from the website.”

An official in the information department said: “This is one of the most updated websites with each statement of the chief minister and important press releases being uploaded throughout the day.”

“It also gives out all the information about the state governments different schemes. It is strange as to why it has been hacked as it is an open website,” added the official.

Following the incident, NIC officials have been on their toes to sort the matter. Technical Director NIC, UP, S B Singh said: “No one has defaced the website, which means that this can be a prank as well.”

Midland, TX - A warning today for Internet users after search giant Google admits it collected private data from people who were surfing the web on an unsecured wi-fi connection.

The company says cameras sent to retrieve street views for it's Google Earth maps intercepted wi-fi signals from people's homes and collected personal data, which is illegal in about 30 states.

Google says it was a mistake, but the incident highlights the fact that wi-fi connections can be risky.

Stealing personal information off a computer is as easy as driving up to a house, opening a laptop and logging in, and that's exactly what our hacker did, "And I'm logged into the router."

With just a few clicks of his mouse, our computer expert gains access to a homeowners Internet, and then he finds an email password.

"It will convert that encrypted password so we can use it and actually log into their mail with it."

Geek Squad employees say identity theft is on the rise, and Internet hacking is a big problem.

"You won't have any notification that your network has been hacked, it should be frightening to that person," said Best Buy Geek Squad Agent Steve Schwab.

Agent Schwab says even wi-fi hot spots, like coffee shops, are hotbeds for hackers if the Internet is un-secure. "Yes, someone could override that and access everybody's computer, while you're sitting next to that person not even knowing it."

And in a matter of seconds, your programs, pictures and documents are all at risk; "It's going to take them less than 15 seconds to access your network."

Like hacking into this homeowners Internet, our computer expert says was a simple task, "On a scale of one to five, one being the easiest, I give it a one."

CBS 7 did have permission from the homeowner to hack into their wi-fi for this story.

These experts say creating passwords is the best way to secure your wi-fi, and remember to always turn off file-sharing programs through your "my network" setting.

Get Rich with Twitter: Harness the Power of the Twitterverse and Reach More Customers than Ever Before

English | 2006 | 278 pages | PDF | 7 MB

Master today’s most powerful marketing tool for instant customer engagement! Today’s customers have no patience for a long-winded marketing pitch. What they want is useful and engaging information—in 140 characters or less. The most successful campaigns these days are short, sweet, and right to the point.

Get Rich with Twitter reveals the secrets of using the most popular and fastest-growing microblogging tool to reach customers more effectively than ever before—at a fraction of the cost to you. Learn how to:

* Establish a solid foothold in the Twitterverse
* Build a following of loyal, active customers
* Craft engaging and effective messages (tweets)
* Monitor all Twitter activity concerning your business
* Develop a sure-fire viral marketing campaign

You don’t need to do a big song and dance to get customers interested in your product. Simply give them a tweet. They’ll hear you loud and clear.

Download links:
http://hotfile.com/dl/50083848/85a2fb9/L8V5S8B6.rar.html
or
http://www.fileserve.com/file/dagy9Mk/L8V5S8B6.rar

Learn Website Hacking: Pakistani Modeling Competition Website Hacked

http://www.modelingcompetition.com.pk Website Hacked by Punjabi Hackers



We have not edited or delete anything from this site. We have also informed to the owner of this website to patch up this vulnerability. Check the above mail for the same.


Readers, we have received an email from Punjabi hackers with the above screen shot. To verify it, our experts has done the penetration testing of this website. We have found that this website is vulnerable to SIMPLE ADMIN ATTACK. With in 10 minutes of efforts, we got its access.

STEPS WE HAVE FOLLOWED:
  1. Open http://www.modelingcompetition.com.pk/
  2. Open the Admin page http://www.modelingcompetition.com.pk/admin
  3. Here you need to use SIMPLE ADMIN ATTACK
  4. After this attack, you will get username and password for this site
  5. Do what ever you want to do. Everything will be open.
  6. Check all below screen shoots for the same.
DO YOU WANT TO LEARN WEBSITE HACKING?? Learn how to hack website. Contact us on


Wednesday, June 23, 2010

Website Hacking: www.colwell-salmon.com Website Hacked

www.colwell-salmon.com Website Hacked: Collective Efforts of Amarjit Singh & Ajay Anand

Hi friends, One more defacement. I am wonder to know that the security is very poor. Any average hacker can also hack all these websites. Thanks to Mr.Ajay Anand for help me in this project.

Below is the mail which we have send to the concerning authority of this website. Till the time we have not received any response from those guys.

DO YOU ALSO WANT TO LEARN ETHICAL HACKING ?? Join us and we will make you tech genius.

EMAIL US:


Here are the screen shots for all the pages where we got Admin access. We have not change or deleted any thing.

STEPS WE HAVE FOLLOWED:
  1. Open http://www.colwell-salmon.com/
  2. Click on Admin. Bottom right side
  3. You will be redirected to http://web567.144.new.ocpwebserver.com/admin
  4. Here you need to use SIMPLE ADMIN ATTACK
  5. After this attack, you will get username and password for this site
DO YOU WANT TO LEARN WEBSITE HACKING?? Learn how to hack website. Contact us on






Facebook Phishing Attack Not Working: Facebook Hacking is More Difficult

Hi friends, Since yesterday I am getting a lot of email that facebook phishing is not working properly. I have check and used all latest phishing pages. I have seen that all graphics are not coming properly on the page. It seems like FACEBOOK has put few more security to stop all phishing attack.

Now its become more difficult to hack FACEBOOK using Phishing Attack

Lens ASP.NET Penetration Testing Tool

Lens ASP.NET Penetration Testing Tool

Lens is an open-source ethical hacking tool specialized to penetration testing of ASP.NET web applications. Lens is written in WPF 4 and its internal modular architecture allows us to easily add new tests to the system.

Base features
Resize-friendly window structure
Window position is preserved across sessions
Built-in zoom
Detailed log window
Links to online information about the attacks and fixes

You can use our Lens tool to test your site against the following attacks
Session state
Eavesdropping
Session fixation (available in v.1.0.0.1)
Forms authentication
Eavesdropping
ViewState
Eavesdropping (available in v.1.0.0.1)
Information disclosure (available in v.1.0.0.1)
Event handler bypass
Event handling
Postback to disabled controls
Postback to invisible controls
One-click attack

Download: http://ethicalhackingaspnet.codeplex.com

Tuesday, June 22, 2010

The Case for Cybersecurity Insurance, Part I

In very few of the many stories I’ve written about online banking fraud against businesses has insurance paid for much — if any — of the losses victim companies suffered. However, several victims I’ve interviewed in recent incidents did have cybersecurity insurance coverage bundled as part of larger business risk insurance policies. In each case, the businesses suffered fairly substantial thefts, and appear likely to recoup all of their direct financial losses.

The most recent incident involved Golden State Bridge Inc., a Martinez, Calif. engineering and construction company that builds bridges. The thieves used an extremely stealthy but as-yet-unclassified strain of malicious software to steal the company’s online banking credentials, and on May 19th, the crooks used that access set up a series of fraudulent payroll payments totaling more than $125,000.

Initially, the attackers set up two batches of automated clearing house (ACH) payments –one for $50,000 and another for $75,000 – effectively sending a series of transfers to a dozen different money mules, willing or unwitting individuals lured into helping the criminals launder stolen funds by wiring the funds overseas and taking a small commission (usually 8 percent) for themselves.

How to Recover Data From CD, DVD and Blu Ray: IsoBuster

Free Penetration Testing

Centuno is now offering a Free Penetration Testing. Simulate an actual hacking attack with free Penetration Testing.
How to Recover Data From CD, DVD and Blu Ray: IsoBuster
IsoBuster 2.8.0.0 Final | 5.59 Mb

IsoBuster is an award winning , highly specialized and easy to use CD and DVD data recovery tool. It supports all CD and DVD formats and all common CD and DVD file-systems... Rescue lost files from a bad or trashed CD or DVD disc, save important documents, precious pictures, video from the family, your only system backup.

Start up IsoBuster, Insert a CD or DVD, select the drive (if not selected already) and let IsoBuster mount the media. IsoBuster immediately shows you all the tracks and sessions located on the media, combined with all file-systems that are present. This way you get easy access, just like explorer, to all the files and folders per file-system. Instead of being limited to one file-system that the OS picks for you, you have access to "the complete picture". Access data from older sessions, access data that your OS (e.g. Windows) does not see or hides from you etc.

Isobuster interprets CD image files, such as:

*.DAO (Duplicator), *.TAO (Duplicator), *.ISO (Nero, BlindRead, Creator), *.BIN (CDRWin), *.IMG (CloneCD), *.CCD (CloneCD) , *.CIF (Creator), *.FCD (Uncompressed), *.NRG (Nero), *.GCD (Prassi), *.P01 (Toast), *.C2D (WinOnCD), *.CUE (CDRWin), *.CDI (DiscJuggler), *.CD (CD-i OptImage), *.GI (Prassi PrimoDVD), *.PXI (PlexTools), *.MDS (Alcohol), *.MDF (Alcohol), *.VC4 (Virtual CD), *.000 (Virtual CD), *.B5T (BlindWrite), *.B5I (BlindWrite), *.DMG (Apple Macintosh), *.IBP (IsoBuster), *.IBQ (IsoBuster), *.NCD (NTI).

IsoBuster full feature list:

* Data recovery from all possible CD, DVD and Blu Ray (BD & HD DVD) formats : CD-i, VCD, SVCD, SACD, CD-ROM, CD-ROM XA, CD-R, CD-RW, CD-MRW, ... DVD-ROM, DVCD, DVD-RAM, DVD-R, DVD-RW, DVD+R, DVD+RW, DVD+MRW, DVD+R Dual Layer, DVD-R Dual Layer, DVD+RW Dual Layer, DVD+VR, DVD+VRW, DVD-VR, DVD-VRW, DVD-VM, DVD-VFR, BD-ROM, BD-R, BD-R DL, BD-RE, BD-RE DL, BD-R SRM, BD-R RRM, BD-R SRM+POW, BD-R SRM-POW, BDAV, BDMV HD DVD-ROM, HD DVD-R, HD DVD-R DL, HD DVD-RW, HD DVD-RW DL, HD DVD-RAM, HD DVD-Video, ... And the list continues ...

* All device access, media access, data gathering and interpretation is done exclusively by the software. It does not rely on Windows to provide or interpret the data and so can work completely independent from Windows' limitations.
* Better Error handling and several retry-mechanisms to aid you in getting the data anyway.
* The use of both generic and alternative ways to get to the data, get the best out of your CD/DVD-ROM drive.
* The use of primary and secondary file-systems to get to the data and/or make use of file system data that might be ignored or ‘forgotten’ by popular OS. Explore the alternatives.
* CDs stay 'readable' after problems (such as Buffer Under-run, ...)
* Read / Extraction from open sessions.
* All sessions, including older ones, are accessible and can be recovered.
* Supports mounting several virtual sessions inside a single DVD+RW or DVD-RW track
* Read and Extraction of files, CD/DVD images, tracks and sessions from all optical media.
* Scanning for lost UDF files and folders. More on UDF recovery.
* Scanning for lost ISO9660 / Joliet sessions.
* Scanning for files based on their file-signature
* Scanning for IFO / BUP / VOB file-systems on VIDEO and AUDIO DVDs
* Find lost data on CDs, DVDs, BDs or HD DVDs, created with integrated drag and drop applications, otherwise also known as packet writing software. Optimized, but not exclusive, for : Roxio Direct CD, Roxio Drag-to-Disc, Ahead / Nero InCD, Prassi / Veritas / Sonic DLA, VOB / Pinnacle Instant-Write, CeQuadrat Packet CD, NTI FileCD, BHA B's CLiP, Mircrosoft Windows XP and VISTA, Sony abCD, ...
* Support for Direct CD compressed files. Decompression on the fly.
* Built in UDF Reader, UDF 1.02 (e.g DVDs), UDF 1.5 (e.g. Packet writing on CD-R, DVDR, CD-RW and DVDRW), UDF 2.01, 2.50, 2.60 (e.g. BD-R SRM+POW), ...
* Find lost pictures created and saved to CD or DVD with Sony Mavica, other digital cameras or other devices with embedded UDF write functionality.
* Find lost movies created and saved to CD,DVD, BD or HD DVD, with Hitachi, other digital cameras or other devices with embedded UDF write functionality.
* Auto find extensions based on file content to try and give an appropriate name to an orphaned file. This built in file identifier assigns the proper extension to the file so that Windows applications can open the file. Only needed for orphaned files without a name.
* Support for Mount Rainier CD-RW and DVD+RW discs in MRW compatible and non-MRW compatible drives. Auto detection and automatic remapping which can be switched off or forced at all times. Built in MRW remapper / reader. (Built in Method 3 remapper)
* Support for formatted CD-RW discs mounted in very old drives that do not know the CD-RW fixed packet format yet. Auto detection and automatic remapping which can be switched of or forced at all times. Built in Method 2 remapper.
* Built in HFS Reader, supporting HFS and HFS+, the Apple Mac file systems.
* Transparent built in support for Mac Resource Fork extensions in the ISO9660 File-System
* Transparent built in support for Mac Resource Fork extensions in the UDF File-System
* Supports multiple Mac Partitions on one medium (e.g. multiple partitions on a CD or in a dmg file)
* Includes a vast range of features for Mac files support on PC (HFS, ISO9660, UDF), including Mac Binary extraction of files.
* Recover data from blanked or quick formatted DVD+RW media.
* Mpg (*.dat) Extraction and dat2mpg 'in one' from SVCD and VCD
* Ability to create managed image files (*.IBP / *.IBQ).
* Enormous file system coverage and different ways to use them all (find the one suited best for your needs). CDs and DVDs often have different file-systems pointing to the same files. This offers possibilities.
* Rock Ridge (e.g. for Commodore users, Server use, etc.)
* Finds VIDEO and AUDIO IFO / BUP / VOB file-systems independently from other file-systems
* Transparent support for (open) DVD+VR(W) discs, remapping of the content etc. Open +VR discs' files can be seen and extracted right away.
* Show (and allow to extract) the Nero project file if available on the optical disc
* Support for the CD-i file-system and the different behavior from drives trying to mount a CD-i disc.
* Information and file system properties (a must for FS developers)
* CD/DVD/HD DVD/BD Surface scan to see if there are physical read errors.
* Opens checksum files (*.md5) and automatically verifies the image with the checksum file.
* Check if all files and folders are readable without having to extract all data to HD.
* Single sector extraction. Extraction of CD/DVD/BD/HD DVD blocks (e.g. for engineering purposes)
* Sector Viewer. Check a sector's content in IsoBuster's editor and print or save to HD. Engineers and computer savvy people find missing data making use of Sector View.
* Compile (and edit, save, print) lists of all files that contain physical read errors.
* Compile lists of all files, including their Logical block address (ideal to find the logical play order for mp3 CDs)
* CD-Text support from CD and various image files ( *.PXI, *.CCD, *.B5T and *.CUE image files).
* Creation of image files (*.ibp and *.ibq,*.iso, *.bin, *.tao)
* Creation of checksum files (*.md5)
* Creation of cue sheet files (*.cue)
* Conversion of all supported image files to bin/cue files.
* Handles opening of multi-file image files.
* Extraction of Audio tracks to wave files.
* Play audio analogue. Instruct the drive to play the audio through the analogue output.
* Ability to pause a number of seconds between retries to allow the drive to "recover" (useful for older drives in combination with marginally readable media)
* Creation of multi-file image files or disc spanning to specified size
* Support for bootable CDs and DVDs. Support for the El Torito standard.
Perfect aid to slipstream Windows installation CDs
* Add, Edit, Delete files found based on their signatures.
* Show file extents. (Show the different parts of a file, when it is fragmented on disc)
* Ability to add/edit extents on custom created files (e.g. Lost and Found and Customizable file system)
* Ability to add a customizable file system (where you can add, edit files, for engineering purposes)
* Support for command line parameters
* Comprehensive help file (also available online)

What new's
- Plugin support for IsoBuster: Opening image files
- Plugin support for IsoBuster: Creating image files
- Installing and/or loading plugins via the GUI and command line parameters
- Support for multi-file CUE sheets & PREGAP directive
- Wave file support when loading multi-file CUE sheets
- Support for *.RMG Image files

Improvements:
- Escape sequence in HFS support to deal with HFS bug so that certain HFS file-systems can still be found
- Add file-extensions only when no file extension is present yet for files in the HFS(+) file system
- Updated the HFS extensions database
- Workarounds for buggy ISO9660 file systems created by professional DVD mastering software (affecting commercial DVDs)
- Improved IFO/VOB file system finding in case of badly mastered Video DVDs
- Show layer break address
- Various other GUI improvements

Fixes:
- Fix so that CD-Text is shown again when present in a CDT file (associated to a CUE file)
- Fix so that the associated CDT file is also MD5'ed when the entire image file is MD5'ed
- HFS(+) Fix to find additional file extents (>8) that are referenced from the Overflow file.
- Fixed possibly incorrectly reported size of VIDEO_TS.VOB in the IFO/VOB file system

Home Page - http://www.smart-projects.net/

http://hotfile.com/dl/49971935/eb6f720/IsoBuster_2.8.0.0_Final.rar.html
http://uploading.com/files/camdf29m/IsoBuster_2.8.0.0_Final.rar
http://rapidshare.com/files/401700170/IsoBuster_2.8.0.0_Final.rar.html

How to Remove Traces & History of Your Recent Activity

Pointstone Total Privacy 5.88 | 3.4 MB

Pointstone Total Privacy is a safe and easy-to-use to use privacy protection tool that stops all those pesky snoopers such as Cookies, history, index.dat, competitors (and even your boss!) from finding the trail of your computer use that modern internet browsers and many other programs leave behind. All this can be accomplished with a single click on the mouse, or even automatically!

With Total Privacy you get total confidence and peace of mind for secure computer use by completely and permanently removing all traces and history of your recent activity. What's more, Total Privacy also helps improve and optimize your computer's performance. By deleting all those unnecessary temporary files, install/uninstall records and by cleaning your internet browser cache, Total Privacy will keep your computer functioning as smoothly and as quickly as it should.

* Extensive Areas
Remove all traces and history of your recent Windows activity. Total Privacy 5 supports dozens of Microsoft Windows locations so that you can control what information stays on your computer.

* Browser Activity
Keep your browsers clean and running smoothly. Total Privacy 5.0 now supports cleaning and washing for all the major and most common internet browsers (Internet Explorer, Netscape, FireFox, Mozilla, America Online and Opera).

* Instant Messengers Activity
Clean and Wash away the stored history of all of your private IM conversations and file transfers kept by all of your Instant Messaging programs. Total Privacy 5.0 supports MSN Messenger, AOL IM, ICQ and Yahoo! IM.

* Profiles and Automatic Cleaning Cycles
Clean and wash what you want, when you want with Total Privacy's Profiles. Profiles can be scheduled to Wash and Clean Automatically (Profile Automation) or run at a specified event (Browser closing, Windows starting up or shutting down).

* Custom Items
Over 465 plugins (custom items) are included with Total Privacy 5 to clean and wash the files, folders, registry entries and other evidence of your activity left behind by these programs.

* Free Space Cleaner
Total Privacy can clean the free space of your hard drive to remove any unsecure and remaining remnants of files that you have deleted. Free space is unused hard drive space that is not allocated to any current files. However, free space may still contain some, all or part of files that you have deleted.

* Smart Cookie Keeper
Total Privacy deletes the cookies you don't want and lets you keep and save those you do. That way you maintain your preferred Internet settings and log-ins for all your favorite sites. Cookie Keeper also maintains separate lists of cookies to keep for each of the supported browsers allowing you better control of what is deleted.

Download links :

http://uploadbox.com/files/m5dwR9h9YZ
http://www.fileserve.com/file/3rJ7gDM

How to Hide IP Address On Internet: Download Hide IP Easy

Hide IP Easy 4.2.3.2 | 1.5 MB

Hide IP Easy hide your real IP with a fake one, surf anonymously, prevent hackers from monitoring your activity, and provide full encryption of your online activity, all with the click of a button.

Anonymous Surfing With Hide IP Easy

Keeping your privacy is simple and easy. Use Hide IP Easy to keep your IP address hidden, ensure your privacy, provide full encryption of your online activity, and protect your identity and other personal information against hackers, all with a simple click of Hide IP button.

With Hide IP Easy, you can send anonymous emails, un-ban yourself from forums, Blogs, etc. Your identity is secure, protected, and anonymized. With it, you are able to be assigned one of our many fake proxy IP addresses which can be from different countries such as United States, United Kingdom, France, etc. Hide IP Easy works with Internet Explorer, Firefox, Opera, Maxthon, MyIE and is compatible with all types of routers, firewalls, home networks, wireless networks and any other kind of Internet

Key Features

* Anonymous Web Surfing
You are assigned fake IP addresses and protected from hackers who will be tricked by your fake IP instead of your real one.
* Protect Your Identity
Surf anonymously to prevent websites, identity thieves or even government from compromising your computer, tracking your online activities, tracing your exact location or intercepting your private financial information.
* Select Your Physical IP location
You decide fake IP of which country to use by choosing a country from the Choose IP Country window.
* Send Anonymous E-mails
Hide your real IP in E-mail headers. Be protected while sending emails from Yahoo!, Hotmail, GMail.
* Un-ban Yourself from Forums and Restricted Sites
Use Hide IP Easy to change your IP address and access forums and restricted sites that have ever banned you from.

Download links :

http://uploadbox.com/files/j9K62aoC89
http://www.fileserve.com/file/HsMkKDw

Download Antivirus AIO Toolkit| Antivirus Download AIO Toolkit

Ultimate AIO Anti-Virus Toolkit (by AMJ)| 170 Mb

Here is a very handy little AIO I created. It features many anti-virus/anti-malware tools in one easy to use application.
Included is the following:

*Norton Technicians Toolkit (used by Staples Techs, lol) (virus definitions updated to 6/16 and features some great tools and apps)

*Kaspersky Virus Removal Tool (needs no keys or serials and can be run on demand)

*MalwareBytes Portable (great malware scanner/remover made portable in case you cannot install anything)

*Ultimate Process Killer 2.02 (far better at killing processes than task manager)

*McAffe Stinger (nice trojan remover)

*FileAssasin Portable (allows you to delete ANY folder or file that malware is protecting)

*Conflicker Removal Tool

*McAffee Bugbear Removal Tool

*F-Secure Blacklight Rootkit Remover

*Smitfraud Fix

*Symnatec Vundo Removal Tool

*Symnatec Sasser Removal Tool

*Symnatec Blaster Remover

*Symnatec MyDo0m Removal Tool

*Symnatec DownandUp Removal Tool

*Symnatec Ramvicrype Removal Tool

*Trend Micro HiJack This Registry Analyzer

*Ninja USB/Thumbdrive Disinfector (nice little app to fix USB autorun virus)


So basically, if you cannot fix your PC with this, it's time to "Nuke & Pave"!


To use this AIO, just double click to install (it will just create a folder in C:\AIO AV TOOLKIT). An shortcut icon will be created on the desktop.

Also, I have tested this in safe mode and it works great.

(Don't forget to add the icon to the task bar, or start menu so you will be able to launch the app in safe mode, should you need it)

Download part 1
Download part 2

MIrror:

http://www.fileserve.com/file/FJXWg9Z/Ultimate_Antivirus_Toolkit_AIO.part1.rar
http://www.fileserve.com/file/R3huqjY/Ultimate_Antivirus_Toolkit_AIO.part2.rar

Best Tools For PC & System: My Programs 2010(All-In-One My Programs 2010)

My Programs 2010 | 700 MB

My Programs 2010(All-In-One My Programs 2010) is a GUI that has a whole bunch of tools for you techies out there. I basically went out and gathered up a whole bunch of tools I use on a regular bases and made them all portable for easier use and for light foot printing. I take no credit for the making of any of the applications as I did not create them. I do however take credit for making a simple to use and understandable GUI so that everyone may use them without frustration. Almost every tool, when you hover your mouse over the name, will display a short description of the tool so you may understand what you are opening before you open it.
List of the tools:

MULTIMEDIA
AIMP 2.60.525
FormatFactory 2.20
RealPlayer SP 1.0.5
VLC Media Player 1.0.5
K-Lite Mega Codec Pack 5.51
Winamp 5.57 Full
Gom Player 2.1.9.3754
Jet Audio 12.0

CHATTING
Windows Live Messenger 2009
Windows Live Messenger 2009 - Need Net
Messenger Plus! Live! 4.84
PalTalk Scene 8.2
Yahoo! Messenger 10.0.0.1102
Skype 4.1.0.166

BROWSING
Opera 10.10
Mozilla Firefox 3.6.3
Java 1.6.0
Java XP
Flash Player 10.0
Shockwave Player 11.5
Silverlight 3.0
Adobe Flsh Player 10.0 - FireFox - IE
Gf-Pro

UTILITIES
WinRAR 3.91
Driver Genius Professional Edition 9.0
CCleaner 2.0.0.0
EVEREST Corporate Edition 5.30
RegistryBooster 2009
WinASO Registry Optimizer 4.5
Your Uninstaller! 7.0.2010.11
Recover My Files 3.9.8

CD& DVD
Ashampoo Burning Studio 9.12
DAEMON Tools 4.35.5
PowerISO 4.5
UltraISO Premium Edition 9.3

All Genuine Windows
Genuine XP
Vista Crack
Seven Crack
Windows 7 Loader
RemoveWAT
w7lxe

DOWNLOAD
Internet Download Manager 5.19
VideoGet 3.0.2.39
Rapidshare Plus 4.0
µTorrent 1.8.4
BitTorrent 6.4
Flach Get 1.9.2.1028
YouTube Downloader 254

SECURITY
Avira Premium Security Suite 9.0.0.387
Kaspersky Internet Security 2010 9.0.0.736
USB Disk Security 5.2
avast! Internet Security 5.0
Virus Total Uploader 2
Deep Freeze 6.53

PDF
Adobe Reader 9
Foxit Reader 3.1.4
PDFZilla 1.0.8

PHOTOS
Ashampoo Photo Optimizer 3.10
PhotoZoom Pro 3.0.6
XnView 1.97
ProShow Producer 4.0

Download:

http://hotfile.com/dl/49950799/49a56a6/My_Programmes_2010.part1.rar.html
http://hotfile.com/dl/49950812/59c4e60/My_Programmes_2010.part2.rar.html
http://hotfile.com/dl/49950826/4b0dedc/My_Programmes_2010.part3.rar.html
http://hotfile.com/dl/49950827/f7c47a1/My_Programmes_2010.part4.rar.html
http://hotfile.com/dl/49950828/2c337f4/My_Programmes_2010.part5.rar.html
http://hotfile.com/dl/49950831/d22cfa5/My_Programmes_2010.part6.rar.html
http://hotfile.com/dl/49950833/ea5cadf/My_Programmes_2010.part7.rar.html


MIrror:

http://www.fileserve.com/file/YuPDdDk/My_Programmes_2010.part7.rar
http://www.fileserve.com/file/aBBXNNQ/My_Programmes_2010.part6.rar
http://www.fileserve.com/file/FxvHYea/My_Programmes_2010.part5.rar
http://www.fileserve.com/file/P8Bdegp/My_Programmes_2010.part4.rar
http://www.fileserve.com/file/SHBJNuV/My_Programmes_2010.part3.rar
http://www.fileserve.com/file/HVZejf5/My_Programmes_2010.part2.rar
http://www.fileserve.com/file/Rq9Qs9g/My_Programmes_2010.part1.rar

How to Recover Data: Download ICare Data Recovery Software

ICare Data Recovery Software v3.7.1 *Regged-MESMERiZE* | 2.7 MB.

• Reformatted partition, memory card, camera card by accident?
• Corrupted MBR and cannot find your partition or USB not detected?
• Accidentally deleted partition?
• Drive became RAW?
• SHIFT+DELETE and need file recovery?
• Recover files from dynamic disk
• Data loss without a reason, Need recovery software?

Search and preview lost files now!

Data loss won't be your headache! As a comprehensive data recovery solution, iCare Data Recovery can easily recover files from wrong formatted drives, unexpectedly file deletion, raw drive or raw filesystem, virus attack, partition deleted, software crash etc. It can recover any deleted files like photos, documents, mp3, outlook file, presentations, and it also works with any type of storage media like hard drive, removable hard drive, digital cameral sd card, usb drives, ipod, memory card etc.

"iCare Data Recovery Software combines simplicity of use with the most powerful file recovery software engine, which can search and find files&photos missed by other recovery software, together with a unique capability of "on-the-fly" data preview while the search is being conducted."

iCare Data Recovery Software is fast and easy. No technical or data recovery software skills are required to undelete files. Use iCare Data Recovery Software to perform hard drive data recovery, or if you are trying to unformat and recover data from floppy disk, zip drive, smart media, compact flash or other removable media. It is easy disk recovery software to undelete files and get data back.

Language: English
OS: Windows Vista, XP, 2000 pro, Server 2008, 2003, 2000 compatible.
Homepage: http://anonym.to/?http://www.icare-recovery.com/

DOWNLOAD LINK1

DOWNLOAD LINK2

Classroom Spy Pro: How to monitoring and recording your students activities on a remote computers

Free Penetration Testing

Centuno is now offering a Free Penetration Testing. Simulate an actual hacking attack with free Penetration Testing.

Classroom Spy Pro 3.4.4 | 11 MB

It is hard to teach a group of people how to use a PC, or even how to use a specific program on a PC or the internet. Yes, PC or web training isnt easy. For someone whos doing something right, there are probably two others doing it wrong, playing games, checking email, shopping
Classroom Spy lets you see what everyones doing - without leaving your desk. You can monitor the activity of all the PCs in your classroom remotely. Plus, you can share your screen with your students PCs, making demos and presentations much easier.

What is it useful for?

* For monitoring and recording your students activities on a remote computers
* For monitoring students in the classroom to achieve better discipline or, just to assist them when they are in trouble (by using the remote control feature).
* For administrating all computers just from one location - your computer.
* For presenting your screen to students.
* For locking students computers while they are waiting for further instructions or assignments.
* Helping your students by showing your desktop to them.
* Turning off, restarting, remote computers with one click.

What are the major benefits of using Classroom Spy Professional?

* Installation and use of the application is very easy since all of the functions can be accessed with a few mouse clicks.
* You have complete control over what remote users are doing.
* Unlike other similar applications, this application provides you with a live picture of the remote computer screens. The live screen (due to some optimizations) does not use a high bandwidth, but even when the lower network bandwidth is required the refresh interval can be enlarged using one mouse click.
* You can make the presentation by showing your live screen to students
* Application allows you to take over the remote computer by controlling its mouse and keyboard.
* The remote computers? screens are represented in the table with a customizable number of rows as thumbnails.
* Using this application, you can always see which user is actually logged on to the remote computer.
* Schedule remote computers desktop recording
* Execute several actions on all remote computers with on click

Features:

+ Displaying a live picture of a remote computer.
+ You can take control of a remote computer by controlling its mouse and keyboard.
+ More remote screens can be displayed in a table.
+ A remote screen can be zoomed to an actual size.
+ The name of the connected user is displayed.
+ Record remote computers screens.
+ Show your desktop to students
+ Power off, restart, hibernate, suspend remote computers
+ Log off desktop users
+ Lock workstation
+ Control screensaver
+ You can lock selected remote computers
+ You can display a message on selected remote computers.
+ When lower bandwidth is required, the refresh interval can be enlarged.
+ Automatic connection to a remote computer is optional.
+ Settings for the agent are encrypted and password protected.
+ Connection to a remote computer is password protected.
+ Access to monitoring the console is password protected. If more users use the same computer, different profiles and access passwords can be set.
+ More monitoring consoles can be connected to the same remote computer - you can monitor your students from different locations.
+ Agent can run as an NT service (for Windows NT, 2000, XP, 2003).
+ Agent can run as a process (Windows 95, 98, Me).
+ Application can optionally use encrypted communication.
+ Agent can be remotely installed.

DOWNLOAD HERE

MSN MOBILE AWARD: Is this fake or real? Be careful this is FAKE

Friends, From last few days so many of my blog readers are asking same question that: MSN MOBILE AWARD: Is this fake or real?

WHAT THE HELL IS THIS ??

I have not heard about any such award and no information has been posted on MSN official website also.

I have gone thru all the emails which those have received and after analysis, I am 100% sure that this is a online scam and fraud. PLS DO NOT GET TRAPPED IN THIS.

First of all you will received an SMS on your mobile number
from any of the numbers+919990423906 or
+91
9431072312. There may be few more numbers but I have found only these 2 numbers till the time.
That SMS will be like this: "CONGRATS!!You are the winner of 500,000Pounds in the MSN-MOBILE INT'L AWARD, For Claim Contact MR JAMES Via Email:"

If you send an email to email id
you will get a reply with in 24 hours from email id . In this email, they will ask you to send another email on with the following details:

ONE WORLD EXPRESS COURIER COMPANY.
Contact Person Mr. Charles Emperor (dispatch officer)
ADDRESS:9, Arkwright Road Colnbrook, Slough. UK
Email:
(Tel No: +44-1033 )
(PLEASE CALL FOR CONFIRMATION)
After 24 hours, you will get reply from
& will ask you first to transfer money to there ICICI account first. If you call them on the numbers as mentioned on the mail, that guy will also ask you to transfer money into his ICICI bank account then he will send the parcel.

THIS IS CLEARLY AN ONLINE SCAM. PLS DO NOT GET TRAPPED.

Monday, June 21, 2010

Whats is Phone Phishing Attacks | Voice Phishing Attacks

A couple of readers have written in to say they recently received automated telephone calls warning them about fraud on their credit card accounts and directing them to call a phone number to “verify” their credit card numbers. These voice phishing attacks, sometimes called “vishing,” are a good reminder that today’s scam artists often abuse a range of modern technologies to perpetrate old-fashioned fraud.

Phone phishing schemes often begin with a pre-recorded message that prompts the recipient to call a supplied telephone number — frequently a toll-free line. Usually, the calls will be answered by bogus interactive voice response system designed to coax account credentials and other personal information from the caller.

Lures for these telephone phishing attacks also are sent via text message, a variant also known as smishing. Indeed, the Sacramento Bee warned last week that residents in the area were receiving text messages spoofing the Yolo Federal Credit Union.

A new report (PDF) from anti-phishing vendor Internet Identity found that credit unions continue to be a favorite target of smishing attacks, and that text-to-phone scams used a toll-free number in about half of the lures sent in the first quarter of 2010.

Internet Identity also tracked at least 118 smishing attacks in the first quarter of 2010, although the company said that number represents a 40 percent drop in these scams over the last three months of 2009.

HFCL Connect Website Vulnerable to Sql Injection: Hacked by Ajay Anand


After that article, so may potential hackers contacted me. All of us had meeting in which we discussed that how to protect our country from cyber war & hackers. How to patch up all critical servers. It is not possible for us to do this big task alone. So we have build our hackers team and started finding vulnerabilities on various websites. This is our joint initiative and the first website has been hacked by or fellow member , a cyber genius from Punjab. You can contact him on

The first step which we have taken is to inform dscare, Nodal Officer Mr. Sachin Biala & Appellate Authority Mr. Raman Jham. Below are the screen shots of their official email ID and my email, which we sent to them.


Now lets begin step by step...how to hack websites using SQL Injection Vulnerability. Note that this is for educational purpose and if anybody use this to hack any website, I promise not to prosecute. In many countries it is illegal to use this attack. Here I am not going to share the exact method I have followed.

Brute Force Password Cracker Free Download: Bruter 1.0

Bruter is a parallel network login brute forcer on Win32 platform only. It currently supports following services: FTP, HTTP (Basic), HTTP (Form), IMAP, MSSQL, MySQL, POP3,SMB-NT, SMTP, SNMP, SSH2, Telnet, VNC.

To see full changelog since alpha version check here

Sunday, June 20, 2010

Download The Hackers Underground Handbook: Learn How to Hack

CLICK HERE TO DOWNLOAD The Hackers Underground Handbook

Friends, While surfing on internet one of our reader found this book. He has shared this book with me so that I can review it. To be very frank I will give 1 points to this book out of 10 & this is purely my personal opinion.

I have gone thro so may of very good books related to Ethical Hacking. I have also posted so many book on this blog for our readers. You can click here to download all free ethical hacking books.

CLICK HERE TO DOWNLOAD The Hackers Underground Handbook

Amarjit Singh Happy Birth Day on 29th May 2010: Photographs Out

Friends.....I successfully completed 26 on last Saturday. It was 29th May. One of the most unforgettable moment in my life. On 28th Night, we had a GRAND party. All the arrangements was taken care by my brother Ajitpal Singh & Pritpal Singh. One of our friend Mr.Muttu also helped us a lot.

For more details of my Bday, I have posted an article. CLICK HERE TO CHECK.

Phishing Attack Using Tabnabbing: New Type of Phishing Attack

Most phishing attacks depend on an original deception. If you detect that you are at the wrong URL, or that something is amiss on a page, the chase is up. You’ve escaped the attackers. In fact, the time that wary people are most wary is exactly when they first navigate to a site.

What we don’t expect is that a page we’ve been looking at will change behind our backs, when we aren’t looking. That’ll catch us by surprise.


How Phishing Attack Using Tabnabbing Works
  1. A user navigates to your normal looking site.
  2. You detect when the page has lost its focus and hasn’t been interacted with for a while.
  3. Replace the favicon with the Gmail favicon, the title with “Gmail: Email from Google”, and the page with a Gmail login look-a-like. This can all be done with just a little bit of Javascript that takes place instantly.
  4. As the user scans their many open tabs, the favicon and title act as a strong visual cue—memory is malleable and moldable and the user will most likely simply think they left a Gmail tab open. When they click back to the fake Gmail tab, they’ll see the standard Gmail login page, assume they’ve been logged out, and provide their credentials to log in. The attack preys on the perceived immutability of tabs.
  5. After the user has entered their login information and you’ve sent it back to your server, you redirect them to Gmail. Because they were never logged out in the first place, it will appear as if the login was successful.
In this attack, the phisher need not even change the Web address displayed in the browser’s navigation toolbar. Rather, this particular phishing attack takes advantage of user trust and inattention to detail, or what Raskin calls “the perceived immutability of tabs.” Then, as the user scans their many open tabs, the favicon and title act as a strong visual cue, and the user will most likely simply think they left a Gmail tab open.

“When they click back to the fake Gmail tab, they’ll see the standard Gmail login page, assume they’ve been logged out, and provide their credentials to log in,” Raskin explained. “After the user has enter they have entered their login information and sent it back your server, you redirect them to Gmail. Because they were never logged out in the first place, it will appear as if the login was successful.”

For Firefox users with the Noscript plugin, there is an update to the program that can block these types of tabnabbing attacks.
SOURCE: AZARASK

Human vs Robot: Human as a Robot



IRCTC System Hacked? IRCTC System Mostly Down Between 8.00 am to 8.30 am Daily

Recently, seven persons were arrested in Andhra Pradesh for hacking into the passport application software of the Hyderabad Regional Passport Office. The arrested included passport agents who were fraudulently booking slots for registration of passport applications. The agents were able to jump the que and ensure that their clients got priority in the passport issue process.

It was good that the AP Police identified the fraud and arrested the persons responsible.

Now, it appears that an investigation is due on the IRCTC system which handles the railway reservations.

Statistically, it may be tested and observed that the IRCTC system is either completely down or partially un available to public between 8.00 am to around 8.20 am each day. There is a very conventient technical explanation to the observation that the rush to use the system at this time is larger than what the system can handle since this time coincides with the time for “Tatkal” booking.

However, it is our surmise that there is a likleyhood of a fraud similar to the Hyderabad Passport Office fraud. The possibility is high that the systems are taken over by a set of booking agents and relesed only after their work is over.

The undersigned has already given an e-mail complaint to IRCTC authorities in this regard who have not responded.

What is required now is for the Government to order an enquiry and study the ticket booking pattern between 8.00 am and 8.30 am each day and identify if there is any skewed pattern noticable.

In case the enquiry clears ITCTC, then IRCTC should take steps to increase the capacity of the servers or otherwise ensure that the system is active during the time 8.00 am to 8.30 am for the public.

Otherwise, public are being denied the Tatkal Reservation facility

One solution I suggest is to reserve the 8.00 am to 8.15 am slot only for the public and not allow the agents to use the slot for their booking.

Can IRCTC respond?

Posted by Naavi

Internet Service Provider (ISP) Druknet Hacked

Local internet service provider (ISP) Druknet is currently recovering, after 50 of its websites were hacked early yesterday.

Users trying to access certain websites hosted by the ISP were greeted with a blank home page and a message that said the website had been hacked.

Although some of the hacked websites were back online by afternoon, many websites were still down as of last night. Druknet’s web server, on which the websites are stored, was also taken offline periodically throughout yesterday.

The hacker or hackers had exploited websites designed, using free open sourced content management systems (CMS), like Word Press, according to Druknet.

The ISP’s general manager, Tshering Norbu, said the problem lay with customers not updating their CMS with security fixes that resolve flaws. “Customers pay a designer Nu 20,000 for a website and then just leave it static,” he said, “Usually all the designer does is customise the CMS and sell it.” He added that 95 percent of the websites hosted by Druknet do not have their content management systems updated regularly.

He pointed out that hacking websites, using outdated CMS, can be quite simple, because such information is available on the internet.

The websites of almost all financial institutions were also hacked, sparking fears among internet banking customers. But Tshering Norbu said the fear was unwarranted. He explained that Druknet only hosted the home page of the financial institution’s websites. A separate server, located at the financial institution, contains customer information, such as account numbers and financial data. He said that such servers usually had advanced security mechanisms in place. Bank officials confirmed that customer information had not been compromised.

Druknet officials said the damage caused by the attack was minor, since it was limited to the home pages of websites.

But Druknet also acknowledged that the security flaw is being taken seriously and will be followed up with an investigation. “First we recover the sites, then investigate,” said Tshering Norbu. Druknet will also prioritizse getting customers to update their CMS.

Druknet also acknowledged that a motivated hacker with advanced expertise could exploit the security flaw to manipulate data or steal information. “It depends on the skill, this time it was limited to editing scripts,” said Tshering Norbu.

“It was probably for fun, to grab some attention,” said Tshering Norbu on a possible motive. Druknet officials dismissed the idea that it could be a Bhutanese hacker.

In April last year, government computers were hacked by by an international cyber espionage network called GhostNet.

Add me as a friend on FACEBOOK: CLICK HERE to add me on FaceBook

: How to Move up Quickly on Levels & Experience

Facebook Mafia Wars Autoplayer

Mafia war auto player, a script;
  • Install Mozilla Firefox from here
  • Install grease monkey from here
  • Follow this link and click on Green Install button - This link is updated on 22 Feb 2010, If not working, pls leave a comment here.
  • Instructions for the auto player.
  • MAFIA WARS BOT GUIDE.
THE UPDATED AUTO PLAYER VERSION HAS BEEN POSTED HERE

Facebook Mafia War Autoplayer Script, War Strategy, Guide for new players, Hints, Tips & Tricks, Cuba & Mascow hidden facts & information

Some more usefull links:
  • Mafia wars cheats and tips for Facebook Part One.
  • Mafia wars cheats and tips for Facebook Part Two.
Useful Mafia tools, called bookmarklets:
  • Vern's Mafia Wars Tools. Click Here
  • Bobby Heartrate's tools for Mafia Wars. Click Here
How do you use these Tools?

Firstly please make sure you are using Firefox! The Bookmarklets work best using Firefox.
Drag bookmarklet to your bookmark bar

For Mafia War Combat Calculator. Click Here

Complaints:
  • CEO?
  • Account administrator
Why join a Clan?
  • Joining a Clan adds a different element to the game Good backup
  • Help other players as well as recieving help
  • If you are looking for a Clan then try our list out!
MAFIA WAR STRATEGY

How not to got robbed on Mafia War
1. Your mafia size should be at least the equivalent of your level.
2. Make sure your mafia is equipped!
3. Level Up!
4. Don't rob other players.
5. Win a lot of fights.
6. Don't put people on the hitlist.
7. Protect your property.

Mafia War Energy Pack Secret

If you click on the link below and are due for an energy pack (you can use one every 23 hours)

How to use Energy Pack ?

Don't use energy packs simply to level up. Using them for Collecting Cameras, Untraceable Cell Phones, Concealable Cameras, and Computer Set-ups. You need around 400 cell phones, probably around 500 or 600 concealable cameras, and 250 computer set-ups to master all the jobs.

Step by Step process:

1. Keep your energy pack until you level up.
2. Get to a fresh level.
3. Demote your Mastermind.
4. Use all of your energy on robbing the electronics store (enforcer tier).
5. Use your energy pack when you are out of energy.
6. Rob the electronics store until you almost level up.
7. Re-promote your Mastermind.
8. You should do your most expensive job right before you level up so you can get a head start on the next level.
9. Continue leveling!
If you have any questions which you may want to ask then please join in our free chat room which is always open..

Newer Posts Older Posts Home