Goodbye Delhi


Finally friends..I have packed my bags up, and i m almost set to leave the heart of India. My stay here was excellent,a great family,bindass people,loads of knowledge and the opportunity of meeting new people and making new contacts.I especially thanks to my mentors and great friends Rohit sir, Naseem  sir ,Naveen sir and Sunil sir and ofcourse Rahul sir who have taught me on how to be more professional and to channelize my energy for the right cause. 

I will miss all the friends I have made.
Love you Delhi
KD

 PS: Since I m leaving to a much more jargoned place, expect some delays in web postings and articles..will be 100% online after june.

41MP Nokia 808 smartphone launches in India


NEW DELHI: Nokia's 41MP camera phone is finally in India. The 41 megapixel smartphone is available on the Nokia Shop at Indiatimes.com at price of Rs 29,999.


Nokia PureView 808 has generated lot of interest due to the PureView imaging technology and the gigantic 41-megapixel camera sensor on-board. Other features of the smartphone include Carl Zeiss optics with 4X lossless zoom and Nokia Rich Recording.


The smartphone sports a 4-inch 360 x 640 pixel resolution display and is powered by a 1.3 GHz ARM 11 processor. Running on Nokia's Symbian Belle OS, the smartphone comes with a 16GB of internal memory.


Nokia 808 PureView is presently available in black colour.


TRICK TO READ PUNJABI FONT POSTS IN MOBILES


TRICK TO READ PUNJABI FONT POSTS IN MOBILES

HERE IS THE TRICK TO READ POSTS WRITTEN IN PUNJABI FONTS USING MOBILES. USUALLY THE PUNJABI FONT
APPEARS AS BOXES IN MOBILES AND IS NOT READABLE. SO TO READ SUCH POSTS USE THIS TRICK.
please follow the instructions carefully and don't change any other setting except the one discribed below.IT MAY CRASH THE SOFTWARE.
if some setting is changed accidently then just uninstall the software and reinstall it again.

here are the steps

1. DOWNLOAD 'OPERA MINI' SOFTWARE AND INSTALL IN MOBILE
(TO INSTALL OPEN m.opera.com in mobile browser and download opera mini  from website)


2. open opera mini and write following command in address bar. before writing erase 'www' which is present by default


opera:config


NASA SSL Digital Certificate hacked by Iranian Hackers

NASA SSL Digital Certificate hacked by Iranian Hackers



Iranian hackers 'Cyber Warriors Team' announced in an online post that it compromised an SSL certificate belonging to NASA and subsequently accessed information on thousands of NASA researchers. A space agency representative revealed that they’re currently investigating the incident.

Microsoft Store India got hacked in India !



Today, Hackers from group EvilShadow successfully hack and deface the website of Microsoft Store India (http://www.microsoftstore.co.in) . But Hacker upload his deface page at location http://www.microsoftstore.co.in/evil.html .

The Hackers Conference 2012 Call For Papers #THC2012


We are extremely delighted to announce the Call for Papers for The Hackers Conference 2012 It is a unique event, where the elite of the hacker world, leaders in the information security industry and the Internet community meet face to face to join their efforts to cooperate in addressing the most topical issues of the IT world.

Conference will be held in New Delhi, India and aims to get together industry, government, academia and underground hackers to share knowledge and leading-edge ideas about information security and everything related to it.

The following list contains major topics the conference will cover. Please consider submitting even if the subject of your research is not listed here.

Topics
Cloud Security
Wireless hacking
GSM/VoIP Security
Smartphone / Mobile Security
Exploit development techniques
Advance in reverse engineering
National Security & Cyber Warfare
New Vulnerabilities and Exploits/0-days
Antivirus/Firewall/UTM Evasion Techniques
New Web attacks and application hacking
Mobile Application Security-Threats and Exploits
Hardware hacking, embedded systems and other electronic devices
Malware development and Analysis of Malicious Code / Viruses / Malware
Security aspects in SCADA, industrial environments and "obscure" networks
Important Dates:
CFP Opens: 1st May 2012
1st round of Speaker list Online: 1st June 2012
CFP Closing Date: 1st July 2012
Final speakers List online: 10th July 2012
Conference Dates: 29th July 2012
Speaker Benefits:
Free pass to the conference
Accommodation during the Conference
Call for Papers is opens until 1st July 2012 so if you have interesting topics to present at The Hackers Conference you are welcome to submit!

Submission Guidelines from Thehackersconference.com/cfp.html and you can Email your submission to: cfp@thehackersconference.com

Join #THC2012 on Facebook : https://www.facebook.com/TheHackersConference

IBM Research domain hacked and defaced



Hacker collective group dubbed Kosova Hacker Security or in other word KHS targeted IT giant & multinational technology and consulting corporation IBM. In this attack KHS successfully hacked into the official site of IBM Researcher (http://researcher.ibm.com).

Hacker collective group dubbed Kosova Hacker Security or in other word KHS targeted IT giant & multinational technology and consulting corporation IBM. In this attack KHS successfully hacked into the official site of IBM Researcher (http://researcher.ibm.com).
Hackers claims that, site had a SQL injection & remote code execution vulnerability using which they deface the website. At the time of writing the hacked url not working and Mirror of Hack can be seen here.

Hackers said,"we hack that why we dont like they computers :/ k".

Oracle Database new zero day exploit put users at risk

Oracle Database new zero day exploit put users at risk
oracle

Oracle has recommended workarounds for a zero-day Oracle Database flaw that was not fixed in the company's April critical patch update. Oracle issued a security alert for Oracle TNS Poison, the vulnerability, disclosed by researcher Joxean Koret after he mistakenly thought it had been fixed by Oracle, allows an attacker to hijack the information exchanged between clients and databases.

Keyloggers (Keystroke Loggers)


Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke.

There are two types of keystroke loggers:

1. Software based and
2. Hardware based.

Spy ware: Spector (http://www.spector.com/)

Who Used Your Pc In Your Absence


Who Used Your Pc In Your Absence,what Did He Do?
 first you should go
start > run >eventvwr.msc 
Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.
For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.
Look for a date and time when you weren't home and your computer should have been off.
double click on the eg: info n it will show u the detail.
You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day. Hope u all will like it.

Thanks n enjoy

How to Protect Your Computer from Keyloggers


Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through which you can protect your computer from keyloggers: 
Use a Good Antivirus


This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as Kaspersky, Norton or Mcafee and update it regularly.
Use a Good Antispyware


Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.

Wi-Fi Compromised ? Track Wi-Fi Hackers Using MoocherHunter






Got a Wi-Fi net connection ? And do you think it is secure enough ? With the onset of cyber crimes taking place,your Wi-fi may be used illegally by hackers or some other people.Either you may get high internet bills in reward or you may be on headlines as your net may be compromised to send malicious emails to anyone,that's what happened in India sometime ago in Mumbai Bomb blast case. Well,there comes MoocherHunter™ to rescue.

MoocherHunter™ is a mobile tracking software tool for the real-time on-the-fly geo-location of wireless moochers and hackers. If you have ever wondered about the possibility of your wireless network getting used for illegal purposes, you must consider using Moocher Hunter. Using Moocher Hunter you can identify the location of the person i.e. an unauthorized user using your wireless network. Its then upto you to either give him a stern warning of not using your wireless network again or complaining to the legal authorities.

 
Design by gitstein | Bloggerized by Kuldeep