Email Techs

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 30 November 2009

Mininova : Is No More Our Old Mininova Limits To Content Distribution

Posted on 21:57 by Unknown

Its really a sad that Mininova is no more the old mininova in which we can download everything we need . I think it was the best Bit torrent website ever after The pirate bay.

 

From now on, they are limiting Mininova.org to there Content Distribution service. By doing so, they comply with the ruling of the Court of Utrecht of last August.

 

The people behind mininova says that there were no choice left with them so they have to shut down the mininova trackers and also all the registered users have been unregistered or have been moved to Monova.
First was the pirate bay who lost there trackers and fighting for several years in the court.

Now Mininova is down too.

It looks like many bit torrent sites are being held against the crime of distributing content freely. "Unfortunately the court ruling leaves us no other option than to take our platform offline, except for the Content Distribution service," the admins wrote.

 

2009-12-01_105604

"We are still considering an appeal at this moment," the side administrators stated...

 

2009-12-01_105519 

 

This is what you will see when you will visit the mininova.org now. its all gone the movies, software's, games etc. I will always remember the Mininova even when its gone.
BTW there is still the pirate bay and iso hunt left for mininova . well if you are looking for alternatives to the mininova then here is the list --

 

1. Torrentzap
2. Fenopy
3. ExtraTorrent
4. KickassTorrents
5. BTjunkie
5. Monova
7. isoHunt
8. YourBitTorrent
9. The Pirate Bay
10. ShareReactor
*source Torrent freak

With an impressive 175,820,430 visits and close to a billion page views in the last 30 days, Mininova set a record that they will be unable to break in the near future.

We should all thanks to Mininova for its Help to us.
This is me HTD,
In respect to Mininova.

Happy Hacking @hackerthedude

Read More
Posted in News, Torrent | No comments

Proper use of English could get a virus past security

Posted on 21:01 by Unknown

“Hackers evade most existing antivirus protection by hiding malicious code in texts, according to security researchers.”

Read More
Posted in | No comments

Saturday, 28 November 2009

Norton And Kaspersky On Commercial Fight For Security Suit’s 2010

Posted on 07:56 by Unknown

When there is Cyber crime there are antivirus and after that there is a fight in betweennorton-vs-kaspersky-antivirus them. You all be knowing about the two most popular antivirus securities in the world i.e. Norton And Kaspersky.


As You have seen both provides a master security suits with them just as they both have launched there Internet Security Suits for the availing 2010.

 

HOT : Norton Internet Security 2010 Vs Kaspersky Internet Security 2010

Now lets start with Norton suit’s -

 

Norton Internet Security 2010 Commercial


First lets look at the Norton’s Strategies. Norton starts and basically focus on the cyber crime that the people face scams, hacking etc but certainly built a long advertisement with the help of following points…


1. Bank of Nikolai
2.
S.O.L.
3. Cyber Hunting
4. Chicken vs. Dokken (Allow)
5. Chicken vs. Dokken
(Deny)
6. Caterpillar vs. Kimbo
(Allow)
7. Caterpillar vs. Kimbo (Deny)

Its really funny.

 

Kaspersky Internet Security 2010 Commercial



Looks like kaspersky is playing a lot these days. I think this commercial was built for more on focusing Virus as dangerous rather than Cyber – Crime as the Norton is focusing onn. But as seeing i feel it more amateur as they made it more of a kiddies commercial.

Also showing there power by showcasing Action Star Jackie Chan and the kaspersky’s Founder Eugene Kaspersky in the commercial.



Which One is Yours Favorite ?

Let us hear from You now.

Read More
Posted in Hacking, News, Virus's | No comments

Httpry : Specialized Packet Sniffer And Logger

Posted on 07:48 by Unknown

Httpry This is a specialized packet sniffer designed for displaying and logging HTTP traffic.
Its a C scripts that actually lets you powerfully organize and Log , sniff etc easily and

httpry-thumb

is really great in terms of Packet Sniffing.

This script is designed only to capture, parse, and log the traffic. It is not intended to perform analysis.

It can also run as a daemon, or in real time. Running in real time, all the logs will be dumped in the terminal.

When running as a daemon, all the traffic is logged into a separate file. Its good i must say.

 

Download

Read More
Posted in Hacking, Hacking Software, Tools | No comments

Friday, 27 November 2009

Some Delights Of Yahoo! Open Hack Day – Indonesia 2009

Posted on 09:04 by Unknown

Nearly a week ago Yahoo! Open hack day – south Asia took place in Indonesia. Unfortunately i wasn't there but still the hack days are awesome i am a fan of them since i got in this hacking stuff.
openhacksea
Well some of you actually might not be knowing what are Yahoo ! Open Hack days.So here is a quick guide -  

Yahoo! Open Hack day is day on which all the Hackers, Designers, programmers join together for a day or two to share some stuff and also to make some new “cool stuff”.

The open hack days are made by Yahoo ! actually and are maintained by the Yahoo in collaboration with BBC
, Lonely Planet etc.The hack day last till whole night in which programmers and other teams have to develop some given competition to them.

Now Back to Open Hack Day – Indonesia..

 

Yahoo!'s famous all-night hacking contest came to the Balai Kartini Convention Center, in Jakarta, November 21-22, 2009.

Here are the winners of the OHD – Here . view all them one by one and you would get a whole new idea of the OHD’s

With seminars in the morning and afternoon, followed by an all-night hacking session afterward till the next day, hackers from Indonesia, the Philippines, Vietnam, Malaysia and Singapore got together to learn new things and hack new programs. All within a night! 

 

NOTE : All Images Belongs to Jem Seow

 

 Hackers taking shifts

 

 

 Coding is fun

 

 

 

 Indonesia band, Jamaica-Cafe provided some entertainment in the evening

 

 

 

 The media couldnt stop interviewing Michael Smith Jr.

 

 

 

 Membership has its privileges

 

 

 

The overall winner is ... Kristiono Setyadi

Pontus and Kristiono Setyadi, “Overall Winner”, Yahoo! Open Hack Day SEA 2009 and “Hacker’s Choice Award” (from Indonesia)

You can follow him on twitter Here

Or you can view his winning hack Chat Plus

 

 

 

The Winners are ...

Overall Winner and Hacker’s choice: Chat Plus
Best Social Hack: People BUZZ
Best Productivity Hack: Office Kami
Best Mashup: What's on Today
Best Local Hack: Twitter Mania

Congrats to the winner..


 

 

 

 

 

All images belongs to and thanks to -

Jem Seow

Happy Hacking @hackerthedude

Read More
Posted in Hacking, News | No comments

How To Create Autorun.inf For Your Pendrive – Autoplay Your Tools

Posted on 02:23 by Unknown

When you plug-in your pen drive then its really useful to run an Autorun software it canist1_9116667-usb-flash-memory consist of anything from hacking software to any music player.

 

Its really useful as you can do your work in seconds and in hacking stuff it its really important to boot up fast so that you can do your work in seconds and no body catches you rather then first loading the pen drive then navigating to the folders and then doing it. isn't it

So its really worthwhile to take a look at the way the windows Xp looks at the pen drive auto run program rather then making a program that’s loading automatically written C.

pendrive


Ok that's the image to notify you that you a need a pen drive and a windows Xp based computer with you so as you can perform this hack :D

So lets start…

 

How to create a Autorun.inf file ?


Its the most simple part of it.

1. To create an autorun file
2. Open Notepad and save ‘autorun.inf’’ (with quotes)
3. Save it to the root of the drive.

All it needs to have is in the first line

[autorun]

It was easy right :D

 

How To Changing Icon of Pendrive

PNG-usb-pendrive.png-256x256
1. To create an autorun file
2. Open Notepad and save ‘autorun.inf’’ (with quotes)
3. Save it to the root of the drive.
4. Then Type -


[autorun]
icon=myicon.ico
label=MyLabel


Save it and remember in the root directory

 

How To New Option Appear in the Autorun Menu

 

1. To create an autorun file
2. Open Notepad and save ‘autorun.inf’’ (with quotes)
3. Save it to the root of the drive.
4. Then Type -


[autorun]
icon=default
label=[yourlabelhere]
action=programname.exe

Save it and exit. Once again, the program has to be in the root. Now, when you plug it in, the option should appear in the menu.

 

How To Run Programs Automatically When USB is Plugged In

 

1. To Create an autorun file
2. Open Notepad and save ‘autorun.inf’’ (with quotes)
3. Save it to the root of the drive.
4. Then Type -


[autorun]
Icon=default
label=YourLabelHere
open=programname.exe


Well That's it, it was easy right, now take a look at this

USB-Flash-Drive-with-Hacked-Shape-UF208-Hell i need that pen drive that's awesome. just take a look at this anybody would think that its a useless damaged usb kit or something but its a pendrive :D search on google you would find it .

 

Happy Hacking @hackerthedude

Read More
Posted in Hacking, Tricks, Windows | No comments

Hacker Attacks Shaolin Temple – Kung Fu Hacking

Posted on 01:14 by Unknown

The Hackers have defaced many websites in the world but certainly the website of Sholin Temple, founded in 477 AD, is hacked several time and hence its again hacked by a hacker.

The shoalin temple have been concerned, under the leadership of its current abbot,Shi Yongxin, is being treated as a commercial product.

Kung-Fu-Hackers-Attack-the-Shaolin-Temple-2


The hacker left a fake letter to there website shaolin.org.cn saying -

"I traded the monastery's tranquility and holy Buddhism for the fame of Shaolin and myself. […] I do not dare to pray for the Buddha's forgiveness, I only ask that I will not go farther and farther down the no-return path of commercialization and become a sinner of Shaolin Temple and Buddhism,”

These feelings are what led to the recent acts of Hacktivism on its website, mostly targeting Shi Yongxin and accusing him of leading a material life.

After Hacking the website hacker made a letter, posted to temple saying “Go and Die” in Chinese language.

Read More
Posted in | No comments

Darren Kitchen On Hackers Vs Cyber Criminals [Video]

Posted on 00:50 by Unknown

Darren Kitchen is Hacker and Host of a hackers show Hack5. He is well know hacker and is been in computer for a long time. well hack5 is video podcaster , which podcast video’s related to hacking. Its a really great channel for guys like us and the great thing is that there is always something new to learn there.Hak5

Now Lets talk about this Video in Darren Kitchen talks with the Discovery channel on the
way he thinks about the criminals and the Hackers.

He starts with saying that he is always been saying that “Hackers are not Cyber criminals”. – it touched my heart.…

602

Next Darren talks with the discovery channel is that he find Hacking is more fun rather that cyber crime. Its just those people who tend to hack and use them for some illegal functions against them.

He says hacking is a culture and those cyber criminals have ruined it all over they have been building since last.

 

So enjoy this video till then.

and don't forget to comment


Happy Hacking @hackerthedude

Read More
Posted in Hacking, News, Video's | No comments

Thursday, 26 November 2009

2009 Is The Year Of Biggest Data Breach's Ever Says Forbes

Posted on 05:28 by Unknown

1124_data-breach_170x170"In 2009, a small number of data leaks exposed more personal information than ever before.”

Read More
Posted in News | No comments

Tuesday, 24 November 2009

John Matherly Launches Shodan : A Computer Search Engine

Posted on 08:03 by Unknown

John Matherly is a Serial webapp developer and entrepreneur and is great in developing cool and very useful programs whether its web based or its a platform based.

Recently John Matherly launched a new service to his website named SHODAN , he says its a web app which lets you search Servers, Routers etc and even computers and other IP addresses and the great thing is it works on the web giving the user the so called portability to the hacker like us.

Shodan


Its real usability comes with its use, its just like Google in our hacking world.
You can search a computer on a network.

This webapp uses a spider to crawl the WebPages or servers and have many capabilities this can be seen as when you search for any IP address or even server the search shows the crawled pages as the Headers , so you can easily make out this…

Now you would ask how do i use it -
Well its pretty simply.

  • Country : 2-letter country code
  • Hostname : full or partial host name
  • Net : IP range using CIDR notation (ex: 18.7.7.0/24 )
  • Port : 21, 22, 23 or 80

For example : get all web (port:80) hosts running 'apache' in Switzerland (country : CH) that also have '.ch' in any of their domain names:

 

Screen Shots

 

 

2009-11-24_211410

 

Thanks John Matherly

You can visit his site Here
Follow Him on Twitter

Read More
Posted in Hacking Software, News, Tools | No comments

Monday, 23 November 2009

Angry IP Scanner : Best IP And Port Scanner For Hackers

Posted on 03:51 by Unknown

Angry IP Scanner is the greatest tool ever released for Hackers. Well this tool is used by every hacker in the world for the startup it is the best software available as last in the IP and Port Scanner. 
 
Its the most powerful scanner i have ever used till yet and the most important iconthing is its really simple to use and comes in handy you can put it in your pen drive and take it anywhere which make a portable and more useful.

You might have heard of this tool many times in many hacking article.
I am personally a big fan of this Angry IP Scanner . Well you should always have it in your bag pack when ever you need to go and hack anything. 

What is Angry IP Scanner?

 
Angry IP Scanner (or simply ipscan) is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports…

Angry-IP-Scanner-3865-thumb

It is widely used by network administrators and just curious users around the world, including large and small enterprises, banks, and government agencies.

It runs on Linux, Windows, and Mac OS X, possibly supporting other platforms as well.


Screen Shots


 

 

 

 

Download


Download

 

Happy Hacking @hackerthedude

Don't forget to subscribe to our RSS Feeds

Read More
Posted in Hacking Software, Tools | No comments

New BIOS Virus Which Can Make Your Anti-Virus Useless

Posted on 03:09 by Unknown

Hackers Have once again launched a Root kit Virus which loads directly into the BIOS memory of the computer and makes it prone .

Well BIOS memory loads first then any of the software or even your OS, So the virus is loaded far more first then the antivirus loads. Hence it is a more harmful attack to the computer rather then an other. 
bios chi
Alfredo Ortego and Anibal Sacco of Core Security Technologies say that they have a 100 + line long python code in the memory which loads puts a Root kit in the memory so any antivirus can act on it.

"We tested the system on the most common types of Bios," said Ortega.

"There is the possibility that newer types of Extensible Firmware Interface Bios may be resistant to the attack, but more testing is needed."

The attack vector is also usable against virtual systems, the researchers said. The Bios in VMware is embedded as a module in main VMware executable, and thus could be altered.

"The best approach is preventing the virus from flashing onto the Bios," said Sacco.
"You need to prevent flashing of the bios, even if it means pulling out jumper on motherboard."

Read More
Posted in News, Virus's | No comments

Friday, 20 November 2009

Reversing JavaScript Shellcode: A Step By Step Tutorial By Paul Melson

Posted on 21:59 by Unknown
Paul Melson is a well known computer security specialist, in this tutorial he talks about the reverse JavaScript shell code which is pretty hard to practice as well as hard to perform. 

He uses certain stuff for this like JavaScript debugger, perl codes and C codes also .

So remember these things when you are about the perform it and hence please also thank Paul Melson for this great tutorial. Try this.
Direct LinkDirect Link

Read More
Posted in Hacking, Pro Hacks | No comments

Is Google Chrome OS Really Leaked

Posted on 08:09 by Unknown

Yeah, You heard it right the new Google product or you can say the upcoming Stunning Product of Google the Google Chrome OS is leached or its working edition is out.

According to the gdgt.com (like "gadget" -- or g-d-g-t) they have got the new Google Chrome OS with them which they are saying is Working.
 
We don't know till yet is its real deal but we would be providing further information to you guys.These guys are promising the Download of the new Google Chrome OS with logins.

Test if you guys can get a Early Copy of the Google Chrome OS

Direct Link

google chrome

Read More
Posted in News | No comments

Office Mal Scanner : Scan All Your Documents From Malicious Codes

Posted on 07:03 by Unknown

OfficeMalScanner v0.5 is a Ms Office forensic tool to scan for malicious traces, like shell code heuristics, PE-files or embedded OLE streams.
malscan

Found files are being extracted to disk. It supports disassembly and hexview as well as an easy brute force mode to detect encrypted files. Next to this, an office file is being scanned for VB-macro code and if found, it will be extracted for further analysis.

The "inflate" feature extracts Ms Office 2007 documents into a directory and marks potentially malicious files. Also included in this package is a tool called MalHost-Setup, some kind of MS Office runtime emulation environment to debug shell code in malicious documents in real time.

NOTE : IT Only Support MS Office Till Now

 

Download

 

Screen Shots :-

 

 

Happy Hacking @hackerthedude

Read More
Posted in Hacking Software, Tools | No comments

‘New Moon” Fans Beware Of Hackers

Posted on 06:35 by Unknown
We are Getting Constant Rumors from many places that Hackers are going to target the the fans of the upcoming movie “New Moon”













The main form of attacks can be spam's , email hijack , twitter , facebook and many other forms of attacks which uses the Movie name “New Moon”.
Read More
Posted in News | No comments

Tuesday, 17 November 2009

Metasploit Framework 3.3 Released !

Posted on 06:54 by Unknown
I am very excited to hear the immediate availability of version 3.3 of the Metasploit Framework. This release includes 446 exploits, 216 auxiliary modules, and hundreds of payloads, including an in-memory VNC service and the Meterpreter.


In addition, the Windows payloads now support NX, DEP, IPv6, and the Windows 7 platform. More than 180 bugs were fixed since last year’s release of version 3.2, making this one of the more well-tested releases yet…
Read More
Posted in News | No comments

How To Create A Invisible Account In Windows XP

Posted on 05:36 by Unknown

Ok, A really Quick tutorial on for windows XP on How To Create A Invisible Account In Windows Xp. What we have do in this hack is really simple just create a DWORD value in the windows registry and hack the windows user accounts .


Ok so are you sure you want to learn this hack then read ahead,

Steps :-


1. Open Start menu then click on RUN.
2. Type in the Run Window Regedit

3. Windows Registry editor will open then navigate from the left panel :


HKLM\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList


4. Create a new DWORD, setting its name to the name of the account you wish to hide.

5. Then set its value to 0 to hide it.

6. Enjoy its Hidden !!

 

NOTE : This account isn't completely hidden because it is visible to administrators in Local User and Groups and also the profile is visible in the Documents and Settings.

 

Now How To Login In it after you have hidden the account :


1. At Welcome screen, and you want to login to this account.
2. Press Ctrl+Alt+Delete twice and it will display the log-on promt.
3. Type the username, and the password and hit enter.

 

Happy Hacking @hackerthedude

Read More
Posted in Tricks, Windows | No comments

Monday, 16 November 2009

How To View Hidden Directories In A Website Using Robots.txt

Posted on 09:11 by Unknown

Many a times in hacking you need to know the web directories. But its hard to find it out as a server might contain uncountable no. of Directories in it.
But a major hole in this security is the Robots.txt
google-bot

What is Robots.txt


Robot.txt is the file in the [ wwwroot ]of a server to define the Bots the Functionality on the website.

There are many Bots on the internet like the most famous are Google Search Engine BOT aka Google Spider , Yahoo Search Engine Bot and many others.
What robots.txt do is that it gives orders to the Bot on how to spider on the website….

Now you may ask what’s the use of Robots.txt file.
Well it is used by webmasters to add functionality to the upcoming bots on there website and also to hide the directories in the website and where the Bot should not go and spider.


Analyzing Robots.txt For Hacking Stuff


Well its really simple, the first question you would ask is Where is robots.txt Located ?
The answer is its in the [ WWWROOT ].

Don't Understand till yet , its in the main Directory.
Lets take the example of Hacker The Dude Website ;)

 

http://www.hackerthedude.blogspot.com/robots.txt

 

Go Ahead and type it in the Address bar of your Browser then what do you see,


2009-11-16_215602

 

Do you see that , this is the Robots.txt for the Hacker the dude website Now lets first Analyze this Robots.txt

First Line :-

User-agent: Mediapartners-Google

This means that the above statements are given for the Google Search Engine Bot i.e. Google Spider.

Second Line :-

Disallow:

This mean that nothing is disallowed to the Google Bot, Remember these Orders are given to the Google bot only not other bots.

Third Line :-

User-agent: *

This means that now all the bots coming to the blog will follow these rules.note that previous rules were for only Google Bot.

Fourth Line :-

Disallow: /search

This means that all the bots will not spider the files under the directory /search in the following Blog.

Fifth Line :-

Sitemap: http://hackerthedude.blogspot.com/feeds/posts/default?orderby=updated

This is basically my blogs sitemap. Not very important.

Working Demo


Now lets test Robots.txt files of various well known websites.

1. Mine Favorite = Google !!

LINK

Now you would see some very useful links in it for example, in termas of the hacking its very useful to know more about our Victim.

Allow: /profiles
Disallow: /katrina?
Disallow: /tbproxy/

Hell, Google Knows Katrina Kaif :D

 

Conclusion

Now that you have seen the working demo and the uses and the read the whole article then you would be pretty sure on how we are going to find the vulnerability in a website without even first hacking it.

btw I Love Robos.txt

Happy Hacking @hackerthedude
Read More
Posted in Hacking, Pro Hacks | No comments

How To Manage Multiple Gmail Accounts In FireFox

Posted on 07:39 by Unknown

Do you love Gmail, Don't know about you guys about but i am a big fan of Google Products. When i am online i need more than one email account for my ease and its really helpful because i don't have to worry about my accounts Security .

I know what you guys would say, “its pretty hard to remember my Accounts Username and passwords”

 
But again if i use multiple accounts and i remember each and everything. 
But that's not with you guys and that's why i have written this blog article.
Now i introduce you to my Tool which helps me a lot to run various Email Accounts together.

Well there are many tools on the internet
Lets Start :-

 

Gmail Manager 0.5.7.5

The original Gmail Notifier for multiple accounts.

Allows you to receive new mail notifications along with viewing account details including unread messages, saved drafts, spam messages, labels with new mail, space used, and new mail snippets.


Further Reference

1. Well you can also Find more Firefox Add-ons for managing multiple Gmail Accounts HERE

2. Do you use multiple Google products then use this Firefox Add-on HERE

Happy Tweaking @hackerthedude
Read More
Posted in email, Tricks | No comments

Tuesday, 10 November 2009

Official Indian Army Website –“Safe From Hackers”

Posted on 07:33 by Unknown

The new website for the Indian army (IA) have been launched and the authorities are saying it is really safe from any Hackers Activity.
Army-Logo
The new website is launched recently and many hackers out there are finding a way to attack the newly made Official Indian Army Website.

indianarmy

 

But the Engineers' at the Indian Army says its Built with a Solid Foundation of ASPX and they have worked in many manners after seeing and understanding all types of attacks out there, they have built a bulletproofed Website.

The website, which is developed on the state of the art technology, is claims to be safe from any hacking/defacing attempts. The portal is hosted on NIC server.

News @hackerthedude

Read More
Posted in News | No comments

Alun Jones On SSL MITM Attack –The HTTPS Attack’s

Posted on 06:19 by Unknown

Ok Alun Jones is great and the best fact to explain this is that he works in the Windows Security MVP.MvpPhoto.aspx


He talks about the MITM attacks and the SSL attacks.
He not only explains the New attacks based on these vulnerabilities but also gave us all some tips regarding the new attacks and how he tackles these attacks. 

The first of Alun's MVP awards was made in 2003, as a Windows SDK (Networking) awardee. After several years of making a noise in the security field, Alun was given notice in 2004 that he would be a Windows Security MVP, and this woke him up to the fact that he really wanted to do Security as the main part of his job.


Re-awarded in Security in 2006 and 2007, then in Enterprise Security in 2008 and 2009, Alun's current job gives him all the security challenge he can eat.

He starts with :-

If you’re in the security world, you’ve probably heard a lot lately about new and deadly flaws in the SSL and TLS protocols – so-called “Man in the Middle” attacks (aka MITM)….

Well you can view his Name, Photo and Biography Abstract HERE.

Direct Link 

Read More
Posted in News, Pro Hacks | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • New iPhone Worm That Attacks Jail Broken iPhones Also
    Well its again the iPhone which have come to the headlines again , But this time the apple is really pissed of with the kind of work the Ha...
  • Ophcrack Guide : Hack Any Password In Windows
    There might be many times you have heard of Ophcrack, now what is actually it well is a popular to crack passwords in windows. Many...
  • ‘New Moon” Fans Beware Of Hackers
    We are Getting Constant Rumors from many places that Hackers are going to target the the fans of the upcoming movie “New Moon” ...
  • Modern Warfare 2 Hacked By Hackers Now Up For Sale
    Looks like our hackers mate out there have now come with some cool shit, Its the New COD : MODERN WARFARE 2 which is the continuation o...
  • Official Indian Army Website –“Safe From Hackers”
    The new website for the Indian army (IA) have been launched and the authorities are saying it is really safe from any Hackers Activity. ...
  • Dear Mozilla, Please “DONT” fix this. [Pic]
    Today only i found this pic on Digg and i thought there should be a “DONT” in it. isn't it ? ..
  • Norton And Kaspersky On Commercial Fight For Security Suit’s 2010
    When there is Cyber crime there are antivirus and after that there is a fight in between them. You all be knowing about the two most pop...
  • Ubisoft Hacked : Fake or Real ?
    Some days ago we got news about Ubisoft being hacked by some hackers and was being believed till yet but after then some news breached out...
  • Peer Block : Safeguard Yourself From Harmful Server’s
    Have you ever heard of a software called Peer Guardian . So do you know what it is actually well here is the guide for you guys. Peer G...
  • 30 Million Facebook, MySpace, and Orkut ID’s Hacked
    Hackers Have crossed the security boundaries of a widget and multi-social networking based company RockYou.com which host many users from s...

Categories

  • Broadband
  • cyberwar
  • Ebooks
  • email
  • Gamers
  • Guides
  • Hacked
  • Hacker The Dude News
  • Hacking
  • Hacking Software
  • keylogger
  • Misc
  • Mobie's
  • News
  • Orkut
  • PHP
  • Pics
  • Pro Hacks
  • Small Hacks
  • Stylize
  • Tools
  • Torrent
  • Tricks
  • Twitter
  • Video's
  • Virus's
  • Weekly Top 10 Internet Tools
  • Windows
  • XSS

Blog Archive

  • ►  2010 (32)
    • ►  March (7)
    • ►  February (3)
    • ►  January (22)
  • ▼  2009 (123)
    • ►  December (34)
    • ▼  November (30)
      • Mininova : Is No More Our Old Mininova Limits To C...
      • Proper use of English could get a virus past security
      • Norton And Kaspersky On Commercial Fight For Secur...
      • Httpry : Specialized Packet Sniffer And Logger
      • Some Delights Of Yahoo! Open Hack Day – Indonesia ...
      • How To Create Autorun.inf For Your Pendrive – Auto...
      • Hacker Attacks Shaolin Temple – Kung Fu Hacking
      • Darren Kitchen On Hackers Vs Cyber Criminals [Video]
      • 2009 Is The Year Of Biggest Data Breach's Ever Say...
      • John Matherly Launches Shodan : A Computer Search ...
      • Angry IP Scanner : Best IP And Port Scanner For Ha...
      • New BIOS Virus Which Can Make Your Anti-Virus Useless
      • Reversing JavaScript Shellcode: A Step By Step Tut...
      • Is Google Chrome OS Really Leaked
      • Office Mal Scanner : Scan All Your Documents From ...
      • ‘New Moon” Fans Beware Of Hackers
      • Metasploit Framework 3.3 Released !
      • How To Create A Invisible Account In Windows XP
      • How To View Hidden Directories In A Website Using ...
      • How To Manage Multiple Gmail Accounts In FireFox
      • Official Indian Army Website –“Safe From Hackers”
      • Alun Jones On SSL MITM Attack –The HTTPS Attack’s
      • New iPhone Worm That Attacks Jail Broken iPhones Also
      • Peer Block : Safeguard Yourself From Harmful Server’s
      • Modern Warfare 2 Hacked By Hackers Now Up For Sale
      • Zero Day DoS Attack on Multiple Browsers across al...
      • Ophcrack Guide : Hack Any Password In Windows
      • Advanced MySQL Exploitation
      • uTorrent 2 To Speed Downloading By Fixing ISP Thro...
      • Swedish Police Under Cyber Attack : DDos Hits
    • ►  October (24)
    • ►  September (9)
    • ►  August (6)
    • ►  July (1)
    • ►  June (3)
    • ►  May (16)
Powered by Blogger.

About Me

Unknown
View my complete profile