How to Push to Talk Blackberry Curve 8350i from Sprint ?
>> Tuesday, October 27, 2009
How to Unblock Websites Where these are Blocked?
How to Revenue Sharing Hack To Display Different Authers Ads ?
>> Monday, October 26, 2009
How to show different ads on different author posts in Blogger? Unlike Wordpress, Blogger does not support any plugins and as a result you can’t share the revenue with your fellow authors using third party plugins. But do note that Blogger is highly customizable and certainly you can do anything if you have got some basic PHP and HTML knowledge. If you are a group of authors working on a blogger blog, posting separately and want to show individual ads on your posts, you can do so by applying blogger revenue sharing hack.
You can provide different ad codes for different authors and this hack will automatically display the ad linked with those authors. This hack can be implemented on any part of the blog, below the post title, below the post contents, navbar, footer area etc. But here is the tutorial to show revenue sharing ads below post title, which is known to be the best ad placement for blogger blogs. {.......}
Hackings Tricks to Hack Computers Emails and Websites
Hacking can be used for both defense and offense, which means that you can use hacking in both constructive and destructive ways. You need to know hacking tricks if you want to protect yourself, your computer, email address or websites from evil eyes. There are many e-books and tutorials available on hacking, but none of them reveal the actual hacking methods. Since many people might have been wanting a hacking toolkit that explains the A ti Z ethics of hacking, I planned to come up with a post on hacking tricks.
From the very beginning I want to mention that this is not for those people who want to use it illegally, but for those people who wear a white cap and want to know the ethics of hacking just to keep the things safe and better.The Secrets of Hacking, has been published by an Indian Government certified security company which covers all latest tips and tricks on hacking. You can find a lots of valuable security measures that every computer user, website owner or email address owner should follow. {.......}
How to Increase the speed of your internet connection ?
>> Tuesday, October 20, 2009
{.......}
How to Get Back Folder Missing Options
>> Saturday, October 17, 2009
Now goto User Configuration > Administrative templates > Windows Component > Windows Explorer.
Click on Windows Explorer you will find the 3rd option on the right side of screen "Removes the Folder Option menu item from the Tools menu"
Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.
I hopes that you will find the option after restarting windows.
Read more...
How to Unlock iphone on version
How to Hack window Genuine?
>> Friday, October 16, 2009
2) Extract It.
3) Run “installer.bat” file.
4) Reboot.
5) Enjoy Your Validated Windows.
How to get free GPRS on Vodafone
Followng are the Settings you require to configure on your Mobile:
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)
Proxy: Enabled {.......}
How to chat through ms dos command prompt
1) All you need is your friend's IP Address and your Command Prompt.
2) Open Notepad and write this code as it is.....!
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
3) Now save this as "Messenger.Bat".
4) Open Command Prompt.
5) Drag this file (.bat file) over to Command Prompt and press Enter.
6) You would then see something like this:
Get Free Download Windows XP Pro SP3 Full Untouched Unanttended GENUINE
>> Thursday, October 15, 2009
Windows XP Service Pack 3 (SP3) build 5512 was released to manufacturing on April 21, 2008, and Microsoft planned to make it available to the general public on April 29, 2008 via Windows Update and the Microsoft Download Center. However, due to a compatibility issue with Microsoft Dynamics Retail Management System, the release of Windows XP Service Pack 3 was delayed. A feature set overview has been posted by Microsoft and details new features available separately as standalone updates to Windows XP, as well as features backported from Windows Vista, {.......}
Read more...
Why we meet with a lot of viruses?
>> Sunday, October 11, 2009
Get Installed VMware Server 2 On An Ubuntu 8.04 Desktop
Version 1.0
Author: Falko Timme
This tutorial provides step-by-step instructions on how to install VMware Server 2 on an Ubuntu 8.04 desktop system. With VMware Server you can create and run guest operating systems ("virtual machines") such as Linux, Windows, FreeBSD, etc. under a host operating system. This has the benefit that you can run multiple operating systems on the same hardware which saves a lot of money, and you can move virtual machines from one VMware Server to the next one (or to a system that has the VMware Player which is also free).
Also, with VMware Server you can let your old Windows desktop (that you previously converted into a VMware virtual machine with VMware Converter, as described in this tutorial: http://www.howtoforge.com/vmware_converter_windows_linux) run under your Ubuntu desktop. This can be useful if you depend on some applications that exist for Windows only, or if you want to switch to Linux slowly.
I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you! {.......}
What are the Best Tools for Virus Removal
Get a Free Flash Application Security Scanner - SWFScan
HP SWFScan is a free tool developed by HP Web Security Research Group, which will automatically find security vulnerabilities in applications built on the Flash platform
- Their research shows that developers and increasingly implementing applications built on the Adobe Flash platform without the required security expertise.
- As a result, they are seeing a proliferation of insecure applications being deployed on the web.
- A vulnerable application built on the Flash platform widens your website’s attack surface creating more opportunity for malicious hackers.
- Decompiles applications built on the Adobe Flash platform to extract the ActionScript code and statically analyzes it to identify security issues such as information disclosure.
- Identifies and reports insecure programming and deployment practices and suggests solutions. {.......}
How to Secure Website Using Web Security Testing Framework
Websecurify is a web and web2.0 security initiative specializing in researching security issues and building the next generation of tools to defeat and protect web technologies.
Key Features
What Hackers Want?
A Brief Descriptoin about Scapy
Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump, tethereal, p0f, etc.). It also performs very well at a lot of other specific tasks that most other tools can’t handle, like sending invalid frames, injecting your own 802.11 frames, combining technics (VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted channel, …), etc.
First, with most other tools, you won’t build someting the author did not imagine. These tools have been built for a specific goal and can’t deviate much from it. For example, an ARP cache poisoning program won’t let you use double 802.1q encapsulation. Or try to find a program that can send, say, an ICMP packet with padding (I said padding, not payload, see?). In fact, each time you have a new need, you have to build a new tool. {......}
How to steal Cookie using Surf Jack
- Does Wireless injection when the NIC is in monitor mode
- Supports Ethernet
- Support for WEP (when the NIC is in monitor mode)
- Sometimes the victim is not redirected correctly (particularly seen when targeting Gmail)
- Cannot stop the tool via a simple Control^C. This is a problem with the proxy
- Python 2.4
- Scapy
Introducing To iPhone 3G
>> Saturday, October 10, 2009
Meet the fastest, most powerful iPhone yet. iPhone 3GS features video recording, Voice Control, up to 32GB of storage, and more.
New to iPhone? Find out why you’ll love it
Watch the
Guided Tour
The Fastest iPhone Ever
The first thing you’ll notice about iPhone 3GS is how quickly you can launch applications. Web pages render in a fraction of the time, and you can view email attachments faster. Improved performance and updated 3D graphics deliver an incredible gaming experience, too. In fact, everything you do on iPhone 3GS is up to 2x faster and more responsive than iPhone 3G. {.......}
Read more...
How to Activate Microsoft Office 2007 Trial version
>> Friday, October 09, 2009
You may have the Office 2007 CD and are able to install Office 2007 without entering product key. However, Office 2007 will work in reduced functionality mode, where it’s effectively just a viewer for office documents. Beside, if you forget the trial product key, or don’t wish to register a Windows Live ID to get the trial key, here’s the trick to activate Office 2007, or more correctly, bypass the activation of Office 2007 60 days trial, and making the “trial” word disappear from the Office title at the top and suppress activation and trial expiry prompt.
New features of Blackberry! Recover deleted messages
>> Monday, October 05, 2009
The big and sad answer is that no, the message is forever lost if your phone has not been set up to store deleted messages in a designated location. That means, once these messages are purged from your smart phone and you have not been able to setup some sort of a backup plan, it will be very unlikely that you could recover them or even from the network provider.
Amazing software! Download BearShare Pro 5.3.0.0
>> Friday, October 02, 2009
* Brand new interface.
* Fastest downloads, ever.
* Instant "search suggest" technology.
* Parental controls block access to offensive files.
* Automatic Virus protection.
* Full featured media player with smart organization feature.
* The easiest BearShare ever, with all new bubbles that hint at cool things you can do.
* Instant searches across the entire BearShare network.
File Sharing just got a whole new meaning:
* Share, Discover and Download music and videos.
* View other users' profiles, photos and music library.
* Make new friends and connect with old ones.
* Leave comments about your friends and favorite artists. {......}
Read more...
Secure your computer with Sophos Anti Virus 7.6.1 R2
This is just the client installer, which requires no serial, crack
or authorisation to download or run. It downloads updates
hourly when you are connected to the net or you can right
click on the icon and update manually
Installing Sophos Anti-Virus for Windows
Minimum Requirements
Operating Systems:
Windows 2000 Professional or Server
Windows XP Professional
Windows XP Home
Windows 2003
Windows Vista
Disk space: 120 MB
Memory: Minimum 256MB.
Considerations: If you use any Anti-Virus software
other than Sophos
this installer should uninstall it prior to installing Sophos Anti-Virus. Older versions of Sophos should be uninstalled automatically by this installation. {......}
Easy way to Hack msn passwords!
Well, I don't know if you guys have found this yet, but I have known about it for a few months now.
Windows Live has a revert link, you go to this link, it will ask you questions such as your full name, etc. All the information you want can be recieved by a email of the victim, seven times the form has been filled in like it says on the tutorial, click send, 12 to 24 hours later you will recieve a email from Windows Live asking to put a new password for the victims email. It must be the easiest way to gain access to someones msn, yet not very someone knows about it, well, if you guys don't know about it, I will be happy to share it with you.
Tutorial:
What you will want?
Read more...
How Hackers Get Hacked ?
>> Monday, September 28, 2009
Well, not exactly. But that’s the type of stories I have to sort through to get the top interesting stories each week for my newsletter. Well, every week unless something comes up like sleep, laziness or procrastination. So, be grateful that you don’t have to read about how Bob got hacked in the head by his over-reactive girlfriend after he slept with her mother, and just sign up for the newsletter on the ——————>RIGHT———————> and get all of the best hacker news each week.
If you are clueless to why such stories would come up… I use Google alerts. Great tool.
Once again, you can sign up by entering your name and email on the right —————–> I’ll be publishing this week’s news shortly.
Secure Your Computer With Norton 2010 Internet Security 17.0.0.136 + Trial Reset
Norton Internet Security 2010 was designed to be the fastest virus, spyware and internet protection you can buy. The Norton Internet Security main window acts as a security management interface.
Norton Internet Security 2010 will be the fastest and lightest security suite Symantec has ever delivered. It guards your PC, network, online activities and your identity with innovative, intelligent detection technologies optimized to combat today aggressive, rapid-fire attacks. Improved Norton Safe Web technology blocks Internet threats before they can infect your PC.
Create Graphic Applications With Corel Designer Technical Suite X4 14.1.0.235
Corel DESIGNER Technical Suite X4 14.1.0.235Corel DESIGNER Technical Suite X4 is the trusted choice for businesses that need to effectively communicate the strengths of their products and services through clear, informative technical illustrations or diagrams.
Read more...
How to send a single post to many forum at a time
Auto Poster is a small program that sends a single post to many forums at the same time in one single click. It does this without the need for a browser or any interaction by the user, and utilises multi-threading technology to send to every forum at the same time!
This program is COMPLETELY FREE! Designed by the Extreme Warez Development team, this program, in true Warez spirit does not make any profit through the sale of this program. The auto-poster does NOT add anything to your post such as a "program signature" that is often added by other programs. Your post will appear exactly as it would normally appear if it had been sent on a forum.
Hacking Tool ! Botnet
Ever wonder how hackers are able to do all the stuff they do? Many expert hackers do not just log on to systems using manual processes. They get help from robots. Yes, that’s right – robots. Not your typical idea of a robot though but something that is called as such because they work autonomously and automatically.
Botnet, also known as robotic network, is a group of computers that run the same computer robotic application controlled or manipulated by human operators. They are also called as botmasters for the purpose of doing co-related tasks. The system is organized in a simple hierarchical structure comprised of many computers, also called as drones or zombies, and a command center that controls all of the drones or zombies into action. Botnets can be large (composed of ten to twenty thousand drones) or small (composed of five hundred to a thousand drones). It really depends on the sophistication and complexity of its use.
Download Smart Install Maker 5.01
>> Thursday, September 10, 2009
Smart Install Maker is a powerful and convenient means for creation of installers. Possesses the simple, convenient and understandable interface. Despite of simplicity of work with the given program, she allows to create professional installers with the minimal size, a high ratio of compression of files and usability the interface. Smart Install Maker contains all features for creating full-scale installation packages. The program works with windows system registry and ini files. It can create shortcuts, display license agreement and information texts, register ActiveX controls, and execute commands. There are
also many other features. Installer engine takes only 60 Kb in install packages created by Small Install Maker.
The program disposes of excellent data compression formats such as RAR and Cabinet. And all this will allow you to create really compact installers that will cause no problems while being spread through the Internet. Main features of Smart Install Maker: # Modern Wizard-style look and feel # Customizable graphics: embed your own artwork to emphasize your application’s identity # Support Cabinet and RAR compression # All functionality is built in - no external files required # Import registry keys from .reg files and system registry # Create ‘nightly builds’ using command-line /s switch # Check the presence of the .NET Framework and download it if needed # Install dynamic folders (with content known only at setup time) Read more...
Download Fast Folder Access 1.8.3
Download Fast Folder Access 1.8.3
*Fast access to folders in Open/Save dialogs.
*Fast access to folders in Windows Explorer.
*Fast access to folders on the desktop and the Start button.
*Easy to add folder to the list of "Fast Folders".
*Right-click on an image file in Windows Explorer to preview image and image file information.
*Add any file as shortcut to Quick Launch or create new folder to manage.
*Runs automatically as part of the Windows Explorer context menu.
Download Fast Folder Access 1.8.3 Read more...
Microsoft confirms IIS zero-day flaw; Exploit code published
>> Tuesday, September 08, 2009
Microsoft late Tuesday confirmed the publication of exploit code for a serious code execution vulnerability in the File Transfer Protocol (FTP) Service in Microsoft Internet Information Services (IIS) 5.0, 5.1, and 6.0.
A security advisory from Redmond warned that the vulnerability could allow remote code execution on affected systems running the FTP service and connected to the Internet.
“While we have seen detailed exploit code published on the Internet for this vulnerability, we are not currently aware of active attacks that use this exploit code,” a Microsoft spokesman said in an e-mail.
From Microsoft’s advisory:
An attacker with write access in the FTP service could use this vulnerability to cause a stack-based overrun and execute arbitrary code in the context of the local system.In configurations of IIS where the anonymous user has write access, the attacker need not be authenticated.
The Microsoft Security Research & Defense blog offers more details:
The vulnerability is a stack overflow in the FTP service when listing a long, specially-crafted directory name. To be vulnerable, an FTP server would need to grant untrusted users access to log into and create that long, specially-drafted directory. If an attacker were able to successfully exploit this vulnerability, they could execute code in the context of LocalSystem, the service under which the FTP service runs.
Configurations at risk
The vulnerable code is in IIS 5.0 (Windows 2000), IIS 5.1 (Windows XP) and IIS 6.0 (Windows Server 2003). IIS 7.0 (Windows Vista, Windows Server 2008) is not vulnerable. IIS 6 is at reduced risk because it was built with /GS which help protect the service from exploits by deliberately terminating itself when the overflow is detected before attacker’s code runs. We have not seen exploit code for this vulnerability that is able to bypass the /GS protection.
Also, remember that only servers that allow untrusted users to log on and create arbitrary directories are vulnerable.
In the absence of a patch, Microsoft recommends that administrators prevent untrusted users from having write access to the FTP service. The advisory contains instructions to:
Turn off the FTP service if you do not need it
Prevent creation of new directories using NTFS ACLs
Prevent anonymous users from writing via IIS settings Read more...
Download IP Shifter
>> Sunday, September 06, 2009
IP Shifter 2.2.6 description
If you work dynamically at several locations in the network (due to business), or you need to use your computer in more than one network, you have to switch your IP address parameters (e.g. IP address, Subnet mask, Gateway, DNS) frequently, so IP Shifter is a product for you! It can help you to finish this activity.
Key Feature include:
Save multiple TCP/IP profiles by meaningful names.
View current IP address easily and switch IP address quickly.
Switch TCP/IP profile by one-click without reboot computer.
Support multiple network adapters including fixed and wireless.
Integrate "Ping" command to check connectivity.
Check IP address validity before activating.
Integrate "LAN Scanner" to find out all connected computers.
Download IP Shifter
1337 speak
While there are sophisticated encrypting programs, there are also those that are used by almost anyone provided that the users know what symbols are being used. Geeks and even non-geeks can hide messages using substitutes for the English alphabet. This symbolic writing is known in technical communities as leet speak or 1337.
1337 is a cryptic writing language used to shorten the typed messages or as a form of encryption to hide the nature or meaning of the message sent. The term “leet” refers to those with elite status in message boards in the 1980s. It actually originated from 31330 “eleet,” which is the UDP port that the hacker group Dead Cow Cult used to hack Windows 95. The language really is not owned by any specific group. Anyone can use and write “leet” and anyone can have or use its own ciphers to decode it.
The way to use it is by substituting alphanumeric characters or symbols to each character or words from any common communication language such as English. The language can also be developed to include intentional phonetic spelling, new words or even misspellings. Traditionally, the primary strategy is using homoglyphs – symbols that closely resemble the letter for which they stand or an Argot also referred to as a “secret language” for obscurity. It is ever changing but it really has no borders, rules or barriers on what encoding you could use, only that there should be an agreement or a set of protocols for the group to use.
In the past, gamers used leet speak as a communications tool. Currently, anyone could be using leet speak. Chatting teens and young adults who often logon to the Internet are often using this method.
Generally for starters, you could actually use the example below for a quick and simple “leet” letter substitution. It is the most common and traditional cipher used for “leet speak.” You can also find some advanced ones in the Internet, or just make up one for your group.
- A = 4, /-\, @, ^, /\ , //-\\, ci
- B = 8, ]3, ]8, |3, |8, ]]3, 13
- C = (, { , [[, <, €
- D = ), [}, |), |}, |>, [>, ]]), Ð
- E = 3, ii, €
- F = |=,(=, ]]=, ph
- G = 6, 9, (_>, [[6, &
- H = #, |-|, (-), )-(, }{, }-{, {-}, /-/, \-\, |~|, []-[], ]]-[[
- I = 1, !, |, ][, []
- J = _|, u|, ;_[], ;_[[
- K = |<, |{, ][<, ]]<, []<
- L = |,1, |_, []_, ][_, £
- M = /\/\, |\/|, [\/], (\/), /V\, []V[], \\\, (T), ^^, .\\, //., ][\\//][,
- N = /\/, |\|, (\), /|/, [\], {\}, ][\][, []\[], ~
- O = 0, (), [], <>, *, [[]]
- P = |D, |*, |>, []D, ][D
- Q = commas are necessary: (,) or 0, or O, or O\ or []\
- R = |2, |?, |-, ]]2 []2 ][2
- S = 5, $
- T = 7, +, ']‘, 7`, ~|~, -|-, ‘][', "|", †
- U = (_), |_|, \_\, /_/, \_/, []_[], ]_[, µ
- V = \/ , \\//
- W = \/\/, |/\|, [/\], (/\), VV, ///, \^/, \\/\//, 1/\/, \/1/, 1/1/
- X = ><, }{, )(, }[
- Y = ‘/, %, `/, \j , “//, ¥, j, \|/, -/
- Z = 2, z, 7_,`/_
This can explain how “leet” or “elite” came to be written as “1337” (1=L, 3=E and 7=T).
Some simple vocabularies:
n00b – Short for noobie, misspelling of newbie.
0wn3d you ! – Short for I’ve beaten you, probably the most common leet in gaming.
Where did it come from?
In the early 1980’s a group of chatters/gamers devised a way that will not allow their newsgroups from being indexed by the “Bulletin Board System” Chat operators. Others are also using this method to prevent their websites from being picked up by a simple keyword search by replacing certain characters with number on their domain names.
The purpose of leet was to prevent others from discovering coordinated battle strategies or banning or discouraging them from discussing forbidden topics such as cracking, hacking and other forms of pornography.
How does it relate to hacking?
It cannot be considered as one of the primary tools for hacking but it can be useful for ciphering your electronic communications, most especially if you are planning a coordinated hack group strike in an area or facility. However, there are traditional ciphering tools in the market that can be used to encrypt and decrypt sent messages to prevent eavesdropping. The leet speaks serves as a second wave of encryption to keep the message from being decoded.
How is it looked upon in the hacking world today?
Real hackers would look at leet as amateurish in nature. When those wannabe-hackers caught on the language, they started using it thinking that they would become real hackers just by doing so. They forgot that hacking requires real knowledge and skills. Right now, hackers openly mock kids who use 1337 just to appear (,00£.
USB flash drive portable browsers
If you use Mozilla Firefox, which I highly recommend, you can download the portable browser hiya: I’m a link.
If you’re an apple fanboy or just like safari, you can download it’s portable version hiya: I’m a link too.
If you use Internet Explorer, you must have some sort of brain blockage and need to fall off a cliff.
Some great features of these portable browsers are:
- you can take your bookmarks with you
- although probably not a good idea, for those of you that happen to always kill the braincells holding your passwords, you can take the saved one’s with you
- take all your extensions with you
- keeps your information stored on the flash drive instead of the computer you are using