How google Cameras Keep Track of World !

>> Friday, December 25, 2009



                                                                                                                               { Read Full Story }

Read more...

How to Push to Talk Blackberry Curve 8350i from Sprint ?

>> Tuesday, October 27, 2009


Our friends at Sprint are trying everything they can think of to hold on to what customers that they have.  If you remember Sprint bought Nextel and the main feature that kept people coming back to Nextel were the ruggedized cell phones and the push to talk walkie talkie features that were offered on many of the phones.  Now we have Sprint trying to incorporate those same features into the Blackberry Curve 8350i.  But is a construction worker looking for a push to talk blackberry? Hard to say.                   {.......}

Read more...

How to Unblock Websites Where these are Blocked?


Unblock Websites at Work or SchoolEveryone is trying to unblock websites like Myspace.com or Facebook.com since so many jobs are blocking those sites. Unfortunately you will find that most jobs and schools will block the latest sites that prevent censorship.  One website has begun to use a new method for unblocking websites by hosting a decentralized network that allows multiple people to host nodes that others can use as proxies from inside of their browsers and then get around the censorship that your school or job might be forcing on you.                        {.......}

Read more...

How to Revenue Sharing Hack To Display Different Authers Ads ?

>> Monday, October 26, 2009

How to show different ads on different author posts in Blogger? Unlike Wordpress, Blogger does not support any plugins and as a result you can’t share the revenue with your fellow authors using third party plugins. But do note that Blogger is highly customizable and certainly you can do anything if you have got some basic PHP and HTML knowledge. If you are a group of authors working on a blogger blog, posting separately and want to show individual ads on your posts, you can do so by applying blogger revenue sharing hack.
You can provide different ad codes for different authors and this hack will automatically display the ad linked with those authors. This hack can be implemented on any part of the blog, below the post title, below the post contents, navbar, footer area etc. But here is the tutorial to show revenue sharing ads below post title, which is known to be the best ad placement for blogger blogs.          {.......}



Read more...

Hackings Tricks to Hack Computers Emails and Websites

hacking bookHacking can be used for both defense and offense, which means that you can use hacking in both constructive and destructive ways. You need to know hacking tricks if you want to protect yourself, your computer, email address or websites from evil eyes. There are many e-books and tutorials available on hacking, but none of them reveal the actual hacking methods. Since many people might have been wanting a hacking toolkit that explains the A ti Z ethics of hacking, I planned to come up with a post on hacking tricks.
         From the very beginning I want to mention that this is not for those people who want to use it illegally, but for those people who wear a white cap and want to know the ethics of hacking just to keep the things safe and better.
The Secrets of Hacking, has been published by an Indian Government certified security company which covers all latest tips and tricks on hacking. You can find a lots of valuable security measures that every computer user, website owner or email address owner should follow.                             {.......}



Read more...

How to Increase the speed of your internet connection ?

>> Tuesday, October 20, 2009


As more and more people get quick connections to the internet, such as cable or ADSL, it becomes apparent to the user of a simple dial-up modem that the World Wide Web can quickly turn into the World Wide Wait.  Here a trick that can help speed up your current modem without shelling out the big bucks.







             There is a setting located in your windows registry called the Maximum Transfer Unit (MTU).  This determines the size of the packets of data sent between your and your server.  In Windows 95, this setting is has a value of 1,500 bytes when the actual size of internet packets is 1,000 bytes.  This can sometimes slow things down.  To remedy the situation, simply follow these steps:
                                                                                              {.......}       

Read more...

How to Get Back Folder Missing Options

>> Saturday, October 17, 2009

Open Run and then type "gpedit.msc".
Now goto User Configuration > Administrative templates > Windows Component > Windows Explorer.
Click on Windows Explorer you will find the 3rd option on the right side of screen "Removes the Folder Option menu item from the Tools menu"
Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.

I hopes that you will find the option after restarting windows.     






Read more...

How to Unlock iphone on version







iphone-verizon-logoApple’s iPhone is the latest craze in town due to its sophisticated features and Internet connectivity.  It’s an all-in-one package that  includes voice, text, wireless Internet, and iPod features.  Who wouldn’t want to own a gadget like that?  I certainly would love to have it!  The catch though is that you’ll need to get it bundled with AT&T’s mobile plans.  That means even if your phone provider is another company, you’ll need to have it connected to AT&T if you want to maximize the product’s features.  The AT&T mobile plans are not bad because the user gets to have all phone services while having free Internet access for a certain amount of monthly subscription.  The only thing with AT&T is that its services are quite expensive and some people have complained about bad customer service.                     {.......}

Read more...

How to Hack window Genuine?

>> Friday, October 16, 2009


Windows Genuine Hack :-
1) Download “Windows.Genuine.Advantage.Validation..rar”
2) Extract It.
3) Run “installer.bat” file.
4) Reboot.
5) Enjoy Your Validated Windows.
windows genuine{.......}

Read more...

How to get free GPRS on Vodafone


This method has been tested on different mobiles and has been confirmed to be working.
Followng are the Settings you require to configure on your Mobile:
Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)
Access Point Settings :-
Proxy: Enabled                           {.......}

Read more...

How to chat through ms dos command prompt


1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!


@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:
{.......}

Read more...

Get Free Download Windows XP Pro SP3 Full Untouched Unanttended GENUINE

>> Thursday, October 15, 2009


Today's post is Windows XP Pro SP3 Full Untouched Unanttended GENUINE.This copy of the window is m using from last 6 months there is no problem no error no crash.That's why i think to upload this window for mine visitor's.Download and enjoy it.

Windows XP Service Pack 3 (SP3) build 5512 was released to manufacturing on April 21, 2008, and Microsoft planned to make it available to the general public on April 29, 2008 via Windows Update and the Microsoft Download Center. However, due to a compatibility issue with Microsoft Dynamics Retail Management System, the release of Windows XP Service Pack 3 was delayed. A feature set overview has been posted by Microsoft and details new features available separately as standalone updates to Windows XP, as well as features backported from Windows Vista,                {.......}


Read more...

Why we meet with a lot of viruses?

>> Sunday, October 11, 2009




VirusesIt is interesting, with all the training and knowledge necessary in becoming an IT professional, the number one question I receive is; "Why do people make viruses?" This always makes me wonder if FBI profilers are ever asked; "Why does my computer have so many pop-up ads?" And of course, computer people often ask each other: "Why do people think they need more memory with their hard drive is full? And why do they call their computer case a modem?" These are all important questions, but only one of them I am qualified to answer. I still try to answer the other to the best of my knowledge. Unfortunately, the best of my knowledge is very, very, unpleasant.               {.......}

Read more...

Get Installed VMware Server 2 On An Ubuntu 8.04 Desktop

Version 1.0
Author: Falko Timme
VMwareThis tutorial provides step-by-step instructions on how to install VMware Server 2 on an Ubuntu 8.04 desktop system. With VMware Server you can create and run guest operating systems ("virtual machines") such as Linux, Windows, FreeBSD, etc. under a host operating system. This has the benefit that you can run multiple operating systems on the same hardware which saves a lot of money, and you can move virtual machines from one VMware Server to the next one (or to a system that has the VMware Player which is also free).
Also, with VMware Server you can let your old Windows desktop (that you previously converted into a VMware virtual machine with VMware Converter, as described in this tutorial: http://www.howtoforge.com/vmware_converter_windows_linux) run under your Ubuntu desktop. This can be useful if you depend on some applications that exist for Windows only, or if you want to switch to Linux slowly.
I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you!        {.......}

Read more...

What are the Best Tools for Virus Removal


Virus Removal Tools
As a network administrator, helpdesk tech, or other computer professional, you don't remove that many viruses. Most company networks are secure enough that viruses are not really an issue. The issue is when friends, family and people from work get viruses in their home computers. There are so many request for virus removal that it is easy to be desensitized. I am as guilty as anyone when someone asks for help and I tell them they should take their computer to the Geek Squad, or Nerd Herd. There are literary thousands of viruses, and unless you are a professional virus expert it is impossible to keep up with all the removals. So, listed below are some popular virus removal tools and programs.
Some viruses are so specialized that you must first discover the virus you have before you can remove it. There are many no-cost online virus checkers. Listed here are but a few to help isolated the infection:  {.......}

Read more...

Get a Free Flash Application Security Scanner - SWFScan

HP SWFScan is a free tool developed by HP Web Security Research Group, which will automatically find security vulnerabilities in applications built on the Flash platform




HP is offering SWFScan because:
  • Their research shows that developers and increasingly implementing applications built on the Adobe Flash platform without the required security expertise.
  • As a result, they are seeing a proliferation of insecure applications being deployed on the web.
  • A vulnerable application built on the Flash platform widens your website’s attack surface creating more opportunity for malicious hackers.



How SWFScan works and what vulnerabilities it finds:
  • Decompiles applications built on the Adobe Flash platform to extract the ActionScript code and statically analyzes it to identify security issues such as information disclosure.
  • Identifies and reports insecure programming and deployment practices and suggests solutions.                      {.......}


Read more...

How to Secure Website Using Web Security Testing Framework

Websecurify is a web and web2.0 security initiative specializing in researching security issues and building the next generation of tools to defeat and protect web technologies.
Key Features

  1. JavaScript – Websecurify Security Testing Framework is the first tool of its kind to be written entirely in JavaScript using only standard technologies adopted by the leading browsers.
  2. Multiple Environments – The core technology can run in normal browsers, xulrunner, xpcshell (command line), inside Java or as part of a custom V8 (Chrome’s JavaScript Engine) build. The core is written with extensibility in mind so that more environments can be supported without changing even a single line of code.
  3. Multi-platform – The tool is available and successfully runs on Windows, Mac OS, Linux and other operating systems.
  4. Automatic Updates – Every single piece of the tool is subjected to automatic updates. This means that newer and more advanced versions of the tool can be shipped to your front door without you lifting your finger. This however is completely optional. The automatic update can be turned off if needed.                     {.......}

Read more...

What Hackers Want?




Hacker Want AdsWith so much unemployment, especially in the IT  community it is no wonder you can find, Hired Hackers   online. Panda Security highlights just an example;  Facebook hacking. For $100 you can hack into any  account you wish. These hackers do not guarantee 100% success, but my guess is they are pretty accurate. I haven’t test this hacker group’s claim, and it is very possible that they are a $100 rip-off, but my instincts tell me they can, and they do. This type of hacking makes me wonder if these are unemployed IT people, or foreign criminals. Although, I’m sure unemployment creates opportunist in any country. And frankly speaking, if I were a talented, out of work computer professional with a family to feed, computer ethics would be something for the employed. Of course I’m not condoning illegal acts of computer hacking, I’m just saying.            {.......}


Read more...

A Brief Descriptoin about Scapy

Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump, tethereal, p0f, etc.). It also performs very well at a lot of other specific tasks that most other tools can’t handle, like sending invalid frames, injecting your own 802.11 frames, combining technics (VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted channel, …), etc.

What makes Scapy different from most other networking tools
First, with most other tools, you won’t build someting the author did not imagine. These tools have been built for a specific goal and can’t deviate much from it. For example, an ARP cache poisoning program won’t let you use double 802.1q encapsulation. Or try to find a program that can send, say, an ICMP packet with padding (I said padding, not payload, see?). In fact, each time you have a new need, you have to build a new tool.             {......}



Read more...

How to steal Cookie using Surf Jack


A tool which allows one to hijack HTTP connections to steal cookies – even ones on HTTPS sites! Works on both Wifi (monitor mode) and Ethernet.
Features:
  • Does Wireless injection when the NIC is in monitor mode
  • Supports Ethernet
  • Support for WEP (when the NIC is in monitor mode)
Known issues:
  • Sometimes the victim is not redirected correctly (particularly seen when targeting Gmail)
  • Cannot stop the tool via a simple Control^C. This is a problem with the proxy
Requires:
  • Python 2.4
  • Scapy
You can download Surf Jack here:
Or read more here.

Read more...

Introducing To iPhone 3G

>> Saturday, October 10, 2009

Meet the fastest, most powerful iPhone yet. iPhone 3GS features video recording, Voice Control, up to 32GB of storage, and more.
New to iPhone? Find out why you’ll love it

Watch the

Guided Tour




The Fastest iPhone Ever

The first thing you’ll notice about iPhone 3GS is how quickly you can launch applications. Web pages render in a fraction of the time, and you can view email attachments faster. Improved performance and updated 3D graphics deliver an incredible gaming experience, too. In fact, everything you do on iPhone 3GS is up to 2x faster and more responsive than iPhone 3G.        {.......}

Read more...

How to Activate Microsoft Office 2007 Trial version

>> Friday, October 09, 2009


Most suites or programs of Microsoft Office 2007 allows user to evaluate the product. The trial version of 2007 Microsoft Office system can be installed by using a 25-character trial product key available from Microsoft while you download the free Office software, and you can use the Microsoft Office 2007 suite or program with full functionality for 60 days.

You may have the Office 2007 CD and are able to install Office 2007 without entering product key. However, Office 2007 will work in reduced functionality mode, where it’s effectively just a viewer for office documents. Beside, if you forget the trial product key, or don’t wish to register a Windows Live ID to get the trial key, here’s the trick to activate Office 2007, or more correctly, bypass the activation of Office 2007 60 days trial, and making the “trial” word disappear from the Office title at the top and suppress activation and trial expiry prompt.

Read more...

New features of Blackberry! Recover deleted messages

>> Monday, October 05, 2009



Recover deleted messages from Blackberry

We sometimes find ourselves doing things automatically        only to find out later that what we have done is a mistake! At the very least, this is an inconvenience. This could apply to almost anything, especially when a person is multi-tasking. An instance where this could happen is when you’re talking to someone while checking your Blackberry for messages. If you’re deleting a previous message, you could accidentally do the same to a new one thinking that it is old. It wouldn’t matter if the email or text is unimportant. But what if it is a message from your boss or business associate? What will you do? Can you recover the message from somewhere just like in Yahoo or Google mail?

The big and sad answer is that no, the message is forever lost if your phone has not been set up to store deleted messages in a designated location.  That means, once these messages are purged from your smart phone and you have not been able to setup some sort of a backup plan, it will be very unlikely that you could recover them or even from the network provider.





Read more...

Amazing software! Download BearShare Pro 5.3.0.0

>> Friday, October 02, 2009


With BearShare you get:
* 100% clean install, no bundled software.
* Brand new interface.
* Fastest downloads, ever.
* Instant "search suggest" technology.
* Parental controls block access to offensive files.
* Automatic Virus protection.
* Full featured media player with smart organization feature.
* The easiest BearShare ever, with all new bubbles that hint at cool things you can do.
* Instant searches across the entire BearShare network.
File Sharing just got a whole new meaning:
* Share, Discover and Download music and videos.

* View other users' profiles, photos and music library.
* Make new friends and connect with old ones.
* Leave comments about your friends and favorite artists.       {......}

Read more...

Secure your computer with Sophos Anti Virus 7.6.1 R2



This is just the client installer, which requires no serial, crack
or authorisation to download or run. It downloads updates 
hourly when you are connected to the net or you can right 
click on the icon and update manually
Installing Sophos Anti-Virus for Windows
 Minimum Requirements
Operating Systems:
Windows 2000 Professional or Server
Windows XP Professional
Windows XP Home
Windows 2003
Windows Vista
 Disk space: 120 MB
Memory: Minimum 256MB.
 Considerations: If you use any Anti-Virus software
other than Sophos


this installer should uninstall it prior to installing Sophos Anti-Virus. Older versions of Sophos should be uninstalled automatically by this installation.       {......}



Read more...

Easy way to Hack msn passwords!



Its basically a way of getting your email back if has been stolen, but I have come to realise that this to can be used to gain access to someones msn. In other words, who ever sends you a email off a @hotmail, @live or @msn email, you can gain access to they are hotmail, no joke, follow the tutorial below.

Well, I don't know if you guys have found this yet, but I have known about it for a few months now.    


Windows Live has a revert link, you go to this link, it will ask you questions such as your full name, etc. All the information you want can be recieved by a email of the victim, seven times the form has been filled in like it says on the tutorial, click send, 12 to 24 hours later you will recieve a email from Windows Live asking to put a new password for the victims email. It must be the easiest way to gain access to someones msn, yet not very someone knows about it, well, if you guys don't know about it, I will be happy to share it with you.


Tutorial:
What you will want?

Read more...

How Hackers Get Hacked ?

>> Monday, September 28, 2009



npaperWell, not exactly. But that’s the type of stories I have to sort through to get the top interesting stories each week for my newsletter. Well, every week unless something comes up like sleep, laziness or procrastination. So, be grateful that you don’t have to read about how Bob got hacked in the head by his over-reactive girlfriend after he slept with her mother, and just sign up for the newsletter on the ——————>RIGHT———————> and get all of the best hacker news each week. 

If you are clueless to why such stories would come up… I use Google alerts. Great tool. 

Once again, you can sign up by entering your name and email on the right —————–> I’ll be publishing this week’s news shortly.

Read more...

Secure Your Computer With Norton 2010 Internet Security 17.0.0.136 + Trial Reset

                                                                                 

Norton 2010 Internet Security 17.0.0.136 (Eng) + Trial Reset 2010 - 1.4 BE

Norton Internet Security 2010 was designed to be the fastest virus, spyware and internet protection you can buy. The Norton Internet Security main window acts as a security management interface.
Norton Internet Security 2010 will be the fastest and lightest security suite Symantec has ever delivered. It guards your PC, network, online activities and your identity with innovative, intelligent detection technologies optimized to combat today aggressive, rapid-fire attacks. Improved Norton Safe Web technology blocks Internet threats before they can infect your PC.   

Read more...

Create Graphic Applications With Corel Designer Technical Suite X4 14.1.0.235

                                                                                      

Corel DESIGNER Technical Suite X4 14.1.0.235Corel DESIGNER Technical Suite X4 is the trusted choice for businesses that need to effectively communicate the strengths of their products and services through clear, informative technical illustrations or diagrams.

Read more...

How to send a single post to many forum at a time



Auto Poster is a small program that sends a single post to many forums at the same time in one single click. It does this without the need for a browser or any interaction by the user, and utilises multi-threading technology to send to every forum at the same time!

                                                             
This program is COMPLETELY FREE! Designed by the Extreme Warez Development team, this program, in true Warez spirit does not make any profit through the sale of this program. The auto-poster does NOT add anything to your post such as a "program signature" that is often added by other programs. Your post will appear exactly as it would normally appear if it had been sent on a forum.

Read more...

Hacking Tool ! Botnet



robotEver wonder how hackers are able to do all the stuff they do?  Many expert hackers do not just log on to systems using manual processes.  They get help from robots.  Yes, that’s right – robots.  Not your typical idea of a robot though but something that is called as such because they work autonomously and automatically.

Botnet, also known as robotic network,  is a group of computers that run the same computer robotic application controlled or manipulated by human operators.  They are also called as botmasters for the purpose of doing co-related tasks. The system is organized in a simple hierarchical structure comprised of many computers, also called as drones or zombies, and a command center that controls all of the drones or zombies into action. Botnets can be large (composed of ten to twenty thousand drones) or small (composed of five hundred to a thousand drones).  It really depends on the sophistication and complexity of its use.

Botnets are very good tools in the hacking world because of their ability to gain other computers that could be used for any purpose. If you are familiar with the security vulnerabilities of a network, its workstations and servers, you can wrest control all of its computers in a matter of days, hours or even minutes with the aid of a very sophisticated botnet application.  Once control is obtained, the task can be done remotely or autonomously.

Read more...

Download Smart Install Maker 5.01

>> Thursday, September 10, 2009



Smart Install Maker is a powerful and convenient means for creation of installers. Possesses the simple, convenient and understandable interface. Despite of simplicity of work with the given program, she allows to create professional installers with the minimal size, a high ratio of compression of files and usability the interface. Smart Install Maker contains all features for creating full-scale installation packages. The program works with windows system registry and ini files. It can create shortcuts, display license agreement and information texts, register ActiveX controls, and execute commands. There are
also many other features. Installer engine takes only 60 Kb in install packages created by Small Install Maker.




The program disposes of excellent data compression formats such as RAR and Cabinet. And all this will allow you to create really compact installers that will cause no problems while being spread through the Internet. Main features of Smart Install Maker: # Modern Wizard-style look and feel # Customizable graphics: embed your own artwork to emphasize your application’s identity # Support Cabinet and RAR compression # All functionality is built in - no external files required # Import registry keys from .reg files and system registry # Create ‘nightly builds’ using command-line /s switch # Check the presence of the .NET Framework and download it if needed # Install dynamic folders (with content known only at setup time)

Read more...

Download Fast Folder Access 1.8.3

Download Fast Folder Access 1.8.3




*Fast access to folders in Open/Save dialogs.

*Fast access to folders in Windows Explorer.

*Fast access to folders on the desktop and the Start button.

*Easy to add folder to the list of "Fast Folders".

*Right-click on an image file in Windows Explorer to preview image and image file information.

*Add any file as shortcut to Quick Launch or create new folder to manage.

*Runs automatically as part of the Windows Explorer context menu.


Download Fast Folder Access 1.8.3

Read more...

Microsoft confirms IIS zero-day flaw; Exploit code published

>> Tuesday, September 08, 2009





Microsoft late Tuesday confirmed the publication of exploit code for a serious code execution vulnerability in the File Transfer Protocol (FTP) Service in Microsoft Internet Information Services (IIS) 5.0, 5.1, and 6.0.
A security advisory from Redmond warned that the vulnerability could allow remote code execution on affected systems running the FTP service and connected to the Internet.

“While we have seen detailed exploit code published on the Internet for this vulnerability, we are not currently aware of active attacks that use this exploit code,” a Microsoft spokesman said in an e-mail.
From Microsoft’s advisory:

An attacker with write access in the FTP service could use this vulnerability to cause a stack-based overrun and execute arbitrary code in the context of the local system.In configurations of IIS where the anonymous user has write access, the attacker need not be authenticated.
The Microsoft Security Research & Defense blog offers more details:

The vulnerability is a stack overflow in the FTP service when listing a long, specially-crafted directory name. To be vulnerable, an FTP server would need to grant untrusted users access to log into and create that long, specially-drafted directory. If an attacker were able to successfully exploit this vulnerability, they could execute code in the context of LocalSystem, the service under which the FTP service runs.
Configurations at risk
The vulnerable code is in IIS 5.0 (Windows 2000), IIS 5.1 (Windows XP) and IIS 6.0 (Windows Server 2003). IIS 7.0 (Windows Vista, Windows Server 2008) is not vulnerable. IIS 6 is at reduced risk because it was built with /GS which help protect the service from exploits by deliberately terminating itself when the overflow is detected before attacker’s code runs. We have not seen exploit code for this vulnerability that is able to bypass the /GS protection.
Also, remember that only servers that allow untrusted users to log on and create arbitrary directories are vulnerable.
In the absence of a patch, Microsoft recommends that administrators prevent untrusted users from having write access to the FTP service. The advisory contains instructions to:

Turn off the FTP service if you do not need it
Prevent creation of new directories using NTFS ACLs
Prevent anonymous users from writing via IIS settings

Read more...

Download IP Shifter

>> Sunday, September 06, 2009


IP Shifter 2.2.6 description
If you work dynamically at several locations in the network (due to business), or you need to use your computer in more than one network, you have to switch your IP address parameters (e.g. IP address, Subnet mask, Gateway, DNS) frequently, so IP Shifter is a product for you! It can help you to finish this activity.

Key Feature include:

Save multiple TCP/IP profiles by meaningful names.
View current IP address easily and switch IP address quickly.
Switch TCP/IP profile by one-click without reboot computer.
Support multiple network adapters including fixed and wireless.
Integrate "Ping" command to check connectivity.
Check IP address validity before activating.
Integrate "LAN Scanner" to find out all connected computers.


Download IP Shifter 

Read more...

1337 speak



1337While there are sophisticated encrypting programs, there are also those that are used by almost anyone provided that the users know what symbols are being used.  Geeks and even non-geeks can hide messages using substitutes for the English alphabet.  This symbolic writing is known in technical communities as leet speak or 1337.

1337 is a cryptic writing language used to shorten the typed messages or as a form of encryption to hide the nature or meaning of the message sent.  The term “leet” refers to those with elite status in message boards in the 1980s.  It actually originated from 31330 “eleet,” which is the UDP port that the hacker group Dead Cow Cult used to hack Windows 95. The language really is not owned by any specific group.  Anyone can use and write “leet” and anyone can have or use its own ciphers to decode it.

The way to use it is by substituting alphanumeric characters or symbols to each character or words from any common communication language such as English.  The language can also be developed to include intentional phonetic spelling, new words or even misspellings. Traditionally, the primary strategy is using homoglyphs – symbols that closely resemble the letter for which they stand or an Argot also referred to as a “secret language” for obscurity. It is ever changing but it really has no borders, rules or barriers on what encoding you could use, only that there should be an agreement or a set of protocols for the group to use.

In the past, gamers used leet speak as a communications tool.  Currently, anyone could be using leet speak.  Chatting teens and young adults who often logon to the Internet are  often using this method.

Generally for starters, you could actually use the example below for a quick and simple “leet” letter substitution.  It is the most common and traditional cipher used for “leet speak.” You can also find some advanced ones in the Internet, or just make up one for your group.
  • A = 4, /-\, @, ^, /\ , //-\\, ci
  • B = 8, ]3, ]8, |3, |8, ]]3, 13
  • C = (, { , [[, <, €
  • D = ), [}, |), |}, |>, [>, ]]), Ð
  • E = 3, ii, €
  • F = |=,(=, ]]=, ph
  • G = 6, 9, (_>, [[6, &
  • H = #, |-|, (-), )-(, }{, }-{, {-}, /-/, \-\, |~|, []-[], ]]-[[
  • I = 1, !, |, ][, []
  • J = _|, u|, ;_[], ;_[[
  • K = |<, |{, ][<, ]]<, []<
  • L = |,1, |_, []_, ][_, £
  • M = /\/\, |\/|, [\/], (\/), /V\, []V[], \\\, (T), ^^, .\\, //., ][\\//][,
  • N = /\/, |\|, (\), /|/, [\], {\}, ][\][, []\[], ~
  • O = 0, (), [], <>, *, [[]]
  • P = |D, |*, |>, []D, ][D
  • Q = commas are necessary: (,) or 0, or O, or O\ or []\
  • R = |2, |?, |-, ]]2 []2 ][2
  • S = 5, $
  • T = 7, +, ']‘, 7`, ~|~, -|-, ‘][', "|", †
  • U = (_), |_|, \_\, /_/, \_/, []_[], ]_[, µ
  • V = \/ , \\//
  • W = \/\/, |/\|, [/\], (/\), VV, ///, \^/, \\/\//, 1/\/, \/1/, 1/1/
  • X = ><, }{, )(, }[
  • Y = ‘/, %, `/, \j , “//, ¥, j, \|/, -/
  • Z = 2, z, 7_,`/_

This can explain how “leet” or “elite” came to be written as “1337” (1=L, 3=E and 7=T).

Some simple vocabularies:

n00b – Short for noobie, misspelling of newbie.

0wn3d you ! – Short for I’ve beaten you, probably the most common leet in gaming.

Where did it come from?

In the early 1980’s a group of chatters/gamers devised a way that will not allow their newsgroups from being indexed by the “Bulletin Board System” Chat operators.  Others are also using this method to prevent their websites from being picked up by a simple keyword search by replacing certain characters with number on their domain names.

The purpose of leet was to prevent others from discovering coordinated battle strategies or banning or discouraging them from discussing forbidden topics such as cracking, hacking and other forms of pornography.
It became popular as a communications lingo when Id software in 1994 began adding Internet connectivity to a game called Doom 1 and 2.

How does it relate to hacking?

It cannot be considered as one of the primary tools for hacking but it can be useful for ciphering your electronic communications, most especially if you are planning a coordinated hack group strike in an area or facility. However, there are traditional ciphering tools in the market that can be used to encrypt and decrypt sent messages to prevent eavesdropping.  The leet speaks serves as a second wave of encryption to keep the message from being decoded.

How is it looked upon in the hacking world today?

Real hackers would look at leet as amateurish in nature.  When those wannabe-hackers caught on the language, they started using it thinking that they would become real hackers just by doing so.  They forgot that hacking requires real knowledge and skills.  Right now, hackers openly mock kids who use 1337 just to appear (,00£.

Read more...

USB flash drive portable browsers


flashdriveHave you ever been some place other than your home on your computer? If your answer is anything other then yes, you need to stop being a computer hugging hippy and go outside, get a whif of some fresh air, step on some dog crap and accidently run over a cat. It’ll do you some good. Anyways, have you visited someone somewhere and while using his/her/its computer, you realized you didn’t know a password because it was saved on your browser, or you wanted to show your friend that one cool website with the non-Asian ninjas, but it was in your bookmarks, or you wanted to use an extension you had installed on your browser that got rid of homosexual ads? Well you can. It’s called portable browsers, a.k.a a browser on your USB drive.

If you use Mozilla Firefox, which I highly recommend, you can download the portable browser hiya: I’m a link.

If you’re an apple fanboy or just like safari, you can download it’s portable version hiya: I’m a link too.

If you use Internet Explorer, you must have some sort of brain blockage and need to fall off a cliff.

Some great features of these portable browsers are:
  • you can take your bookmarks with you
  • although probably not a good idea, for those of you that happen to always kill the braincells holding your passwords, you can take the saved one’s with you
  • take all your extensions with you
  • keeps your information stored on the flash drive instead of the computer you are using

Read more...
Related Posts with Thumbnails

  © Blogger template Webnolia by Ourblogtemplates.com 2009

Back to TOP