Category Archives: Hacking

LulzSec is disbanding

http://sophosnews.files.wordpress.com/2011/06/lulzsec-wallpaper.jpg?w=640A publicity-seeking hacker group that has blazed a path of destruction on the Internet over the last two months says it is dissolving itself.

Lulz Security made its announcement Saturday through its Twitter account. In an unusual strategy for a hacker group, LulzSec has used the account as a publicity platform while remaining anonymous.

The group’s disbandment comes unexpectedly, and could be a sign of nerves in the face of law enforcement investigations. One of the group’s six members was interviewed by The Associated Press on Friday, and gave no indication that its work was ending.

LulzSec claimed hacks on major entertainment companies, FBI partner organizations, the CIA, the U.S. Senate and a pornography website.

Angry birds for Chrome already hacked

Well, that did not take long at all. The Chrome version of Angry Birds has only been live for a few hours and it’s already been hacked to give players access to all of the levels. Web developer Wes Bos saw the potential to make a slight change to the web cache and had a working hack in a short time.

Bos says that he was able to quickly find a hack that gave him access to all of the levels in the game, even the special Chrome levels.

I was quickly able to find a hack that gave me access to all the levels, even the special Chrome levels!  So to  get access to all levels in Chrome Angry Birds, just copy and paste the following line into your browser’s address bar.

Here’s the code that Bos provided to unlock all of the levels, just copy and paste this into your address bar in Chrome and fire up Angry Birds.

javascript: var i = 0; while (i<=69) { localStorage.setItem('level_star_'+i,'3'); i++; } window.location.reload();

If you want to switch the game back to all levels locked, use this code in the address bar.

javascript: var i = 0; while (i<=69) { localStorage.setItem('level_star_'+i,'-1'); i++; } window.location.reload();

Bos goes on to explain that the key to the hack is that Rovio mentioned that it was using HTML5′s LocalStorage to cache game files.

If you open up Web Inspector in Chrome, you’ll see they are keeping track of your score and stars with localstorage. Lucky for us, that means we can use setItem() set all 70 levels to 3 and get access to them all.

So if you don’t want to play through all of the boring early levels, try out Bos’ hack and let us know how it works.

via The next Web

How strong is your password

http://www.passwordsafepro.com/images/secure_passwords.gifIf you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it?

Let’s see… here is my top 10 list. I can obtain most of this information much easier than you think, then I might just be able to get into your e-mail, computer, or online banking. After all, if I get into one I’ll probably get into all of them.

  1. Your partner, child, or pet’s name, possibly followed by a 0 or 1 (because they’re always making you use a number, aren’t they?)
  2. The last 4 digits of your social security number.
  3. 123 or 1234 or 123456.
  4. “password”
  5. Your city, or college, football team name.
  6. Date of birth – yours, your partner’s or your child’s.
  7. “god”
  8. “letmein”
  9. “money”
  10. “love”

Statistically speaking that should probably cover about 20% of you. But don’t worry. If I didn’t get it yet it will probably only take a few more minutes before I do…

Hackers, and I’m not talking about the ethical kind, have developed a whole range of tools to get at your personal data. And the main impediment standing between your information remaining safe, or leaking out, is the password you choose. (Ironically, the best protection people have is usually the one they take least seriously.)

One of the simplest ways to gain access to your information is through the use of a Brute Force Attack. This is accomplished when a hacker uses a specially written piece of software to attempt to log into a site using your credentials. Insecure.org has a list of the Top 10 FREE Password Crackers right here.

So, how would one use this process to actually breach your personal security? Simple. Follow my logic:

  • You probably use the same password for lots of stuff right?
  • Some sites you access such as your Bank or work VPN probably have pretty decent security, so I’m not going to attack them.
  • However, other sites like the Hallmark e-mail greeting cards site, an online forum you frequent, or an e-commerce site you’ve shopped at might not be as well prepared. So those are the ones I’d work on.
  • So, all we have to do now is unleash Brutus, wwwhack, or THC Hydra on their server with instructions to try say 10,000 (or 100,000 – whatever makes you happy) different usernames and passwords as fast as possible.
  • Once we’ve got several login+password pairings we can then go back and test them on targeted sites.
  • But wait… How do I know which bank you use and what your login ID is for the sites you frequent? All those cookies are simply stored, unencrypted and nicely named, in your Web browser’s cache. (Read this post to remedy that problem.)

And how fast could this be done? Well, that depends on three main things, the length and complexity of your password, the speed of the hacker’s computer, and the speed of the hacker’s Internet connection.

Assuming the hacker has a reasonably fast connection and PC here is an estimate of the amount of time it would take to generate every possible combination of passwords for a given number of characters. After generating the list it’s just a matter of time before the computer runs through all the possibilities – or gets shut down trying.

Pay particular attention to the difference between using only lowercase characters and using all possible characters (uppercase, lowercase, and special characters – like @#$%^&*). Adding just one capital letter and one asterisk would change the processing time for an 8 character password from 2.4 days to 2.1 centuries.

Password Length All Characters Only Lowercase
3 characters
4 characters
5 characters
6 characters
7 characters
8 characters
9 characters
10 characters
11 characters
12 characters
13 characters
14 characters
0.86 seconds
1.36 minutes
2.15 hours
8.51 days
2.21 years
2.10 centuries
20 millennia
1,899 millennia
180,365 millennia
17,184,705 millennia
1,627,797,068 millennia
154,640,721,434 millennia
0.02 seconds
.046 seconds
11.9 seconds
5.15 minutes
2.23 hours
2.42 days
2.07 months
4.48 years
1.16 centuries
3.03 millennia
78.7 millennia
2,046 millennia

Remember, these are just for an average computer, and these assume you aren’t using any word in the dictionary. If Google put their computer to work on it they’d finish about 1,000 times faster.

Via One Mans Blog
image: Passwordsafepro

Fundamentals of computer hacking

This article is solely for educational purpose. We are not to be held responsible for any act of misuse of information.

hackingGetting access to a secured system is not that easy nor too difficult too for a computer hacker. Protruding into ones system to get the secure informations is the main aim of hacking which includes the hacking into the system to get organizational layout, one’s personal information, banking activity and so on.

We have the technology advancement that is more effective and accurate in making the process of hacking a successful one with the help of simple knowledge on working procedures on the tools and hacking software. Knowledge on the fundamentals on computer hacking and tool utilization can make wonders to hack a computer.

How to computer hack via 3 hacking techniques?

1. FOOT PRINTING

The process of obtaining the secure data of organizations that is more confidential. It includes the information on the Internet, remote access, intranet and extranet. When you hack a computer you can trace the critical situation of an organization that affects the over all growth on profit quality rate.

  • First stage in foot printing an organization’s layout starts with fixation of target activity including collection of information from website holding the company and its employee’s. Social engineering is a target to hit upon to get easy access to the network on cracking the link in the internet to hack this site in specific.

  • Network enumeration is one of the techniques made in use to spot out the domain name and the network utility attributes. Getting into the database with tools on searching the internet can help in getting most of the needful informations.
  • DNS interrogation: DNS a distributed database is utilized to modify domain name into IP address and reverse. DNS configured (server’s installation and registration) with low-security gives off copy of organizational secure data on DNS zone transfer.
  • Network reconnaissance: On getting access through the Network it is easy to get into the network topology and the paths that link the terminals. Tracerouter program and hacking code tools are best to find the IP packet data that move along the paths. With the ICMP time exceeded message and hop count it is easier to get over the data transmitted.

2. SCANNING:

PING request sent to the IP address inside network terminals is ICMP ECHO packets and the response is the ICMPECHO-REPLY. Once the reply is obtained it will hack a computer to fetch the data packets through the connectivity.

3. ENUMERATION:

Protruding into the user’s account via network resources, shared informations, users, groups and applications to extract data is termed enumeration.

NMAP, STROBE, NESSUS and SATAN variants involving SARA and SAINT for LINUX. WINSCAN, SAMSPADE for WINDOWS are the best tools. Viable products utilized include CyberCop scanner as well as Internet Security scanners.

Queries helping hacker’s to begin cracking attacks include Registrar info and whois server’s data, Organizational info; Domain related data, Network or IP address data, Points of contact.

Author Bio:

The author of this article has got gook knowledge on computer hacking techniques, yahoo password hacking, cracking a system and site info. Feel free to contact her on guidance on learning the basic terms of hacking.

image source: http://techjosh.com

Increase Productivity with multi monitor setup

I have always been fascinated with multiple displays and I always wanted to have a multi monitor setup for myself. I firstly became aware of such a concept when I bought Ati Radeon 9200 long time back. Then I realized that I could hook up two monitors to my box… one on the 9200 and the other on the onboard intel one… The 92o0 also had the option to hook up a TV.

Currently on my wish list is the ATI EYE FINITY.

Here I would try to show how I utilize two monitors to increase productivity ans have fun…

I have an XPS 1210, I love to chat, watch movies and documentaries and google around. XPS 1210 being a very small machine has a screen of just 12 inches and thus at times it becomes difficult to watch movies and do other things at the same time. One more thing that i like to do is Google for any thing that I find interesting in a movies or a documnentary and to do that I have to stop the video. So I decided to buy a LCD monitor and extend my work space. I zeroed in on AOC 20′ 2036Sa. It not at all expensive and has great response.

Now what I do is that I have extended my destop on to the larger LCD and watch movies on it and do the rest of the work on my XPS… woking and having fun at the same time…

Following is a guide to setup multi monitor setup.

Windows 7 has some neat little enhancements, one of them being how it lets you handle dual monitors. If you’re adding a second monitor to your Windows 7 home or office PC, which is a very good idea, it’s a breeze to configure.

There are actually two ways you can currently setup multiple monitors in Windows 7, either by using a keyboard shortcut or via the traditional system properties.

I really like the first method since it’s new and is way easier than having to go into the Control Panel or anything else.

Simply press the Windows key and P (Windows + P) to bring up a quick menu of options.

dual monitors windows 7

Pretty neat! You can pick to show only the computer, make the second monitor a duplicate of the first, extend the desktop to the  second monitor or turn off the first monitor and activate the second.

The second way is to right-click on the desktop and choose Screen resolution.

multiple monitors windows 7

Now you’ll see the familiar 1 and 2 to distinguish which monitor is which. There are several options and under Multiple Displays, you can choose from the same options as when you pressed Win + P.

setup multiple monitors windows 7

That’s it! You can also change the orientation of the displays and change the resolution of each display. It’s pretty straight-forward in Windows 7 and a lot easier!

Apart from this if you are extending your desktop then you can chose the location of your second display. That would decide the movement of the mouse. Suppose you keep the second display on right then moving the mouse beyond the right edge takes the cursor to the secreen 2. Similarly u can keep the second screen either in left or right or top or even bottom.

How to Enable Tools – Folder Options and Registry Editor in Windows

Many times Windows users face a common problem. The “Folder Options” in “Tools” menu is not visible. Even It can’t be accessed from Control Panel. Also “Registry Editor” is disabled.

If you are also facing this problem, then you have come to right place. Follow the simple steps mentioned in this tutorial and your problem will be solved:

1. If Folder Options is disabled but Registry Editor is still working in your system, then you can enable Folder Options by editing Windows Registry. Type regedit in RUN dialog box and press Enter. it’ll open Registry Editor, now go to following keys:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Policies\Explorer

In right-side pane, check whether a DWORD value named NoFolderOptions exists or not? If it exists, delete it.

2. If you are not familiar with editing the registry, then you can simply download following file, extract it and then run the .REG file:

folder_options.zip

3. But sometimes Registry Editor is also disabled. Whenever you try to open regedit, Windows will show following error message:

Registry Editor has been disabled by administrator.

Its a symptom of “RONTOKBRO” Trojan. To remove this trojan, follow the instructions given in following topic:

Is Your System Infected with a Virus / Spyware / Adware / Trojan?

4. If its not a trojan problem and someone intentionally has disabled it in your system, then you can enable it again by following any of these methods:

a. Type gpedit.msc in RUN dialog box and goto:

User Configuration -> Administrative Templates -> System

in right-side pane, set “Prevent access to Registry editing tools” to either Not Configured or Disabled.

b. Just type following in RUN dialog box and press <ENTER>:

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f

Now after enabling Registry Editor, you can re-enable Folder Options by following methods mentioned in 1st or 2nd steps.

All Restrictions for Windows 2000, XP, 2003, Vista, 2008 and 7

Following is a list of some important restrictions, which can be made in Windows 2000, XP, Server 2003, Vista, Server 2008 and 7. For example, you can restrict Display properties, Taskbar properties, folder options, etc.

All tricks are based on Registry editing, you just need to open Registry Editor by providing regedit command in RUN and then create the mentioned key and set its value as given below:

NOTE: If you want to remove the restriction, simply delete the DWORD value or set its value to 0

1.) Restrict Display Properties:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\System

create DWORD value NoDispCPL and set its value to 1

2.) Restrict Taskbar Properties:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

create DWORD value NoSetTaskbar and set its value to 1

3.) Restrict Folder Options:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

create DWORD value NoFolderOptions and set its value to 1

4.) Restrict Locking/Unlocking the taskbar:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

create DWORD value LockTaskbar and set its value to 1

5.) Restrict Active Desktop:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

create DWORD value NoActiveDesktop and set its value to 1

6.) Restrict adding/deleting items from Toolbars:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

create DWORD value NoToolbarCustomize and set its value to 1

7.) Restrict adding/deleting toolbars:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

create DWORD value NoBandCustomize and set its value to 1

8.) Restrict right-click in Start Menu:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

create DWORD value NoChangeStartMenu and set its value to 1

9.) Restrict Desktop Cleanup Wizard:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

create DWORD value NoDesktopCleanupWizard and set its value to 1

10.) Restrict notification at low disk space:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

create DWORD value NoLowDiskSpaceChecks and set its value to 1

11.) Restrict Taskbar Context Menu:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

create DWORD value NoTrayContextMenu and set its value to 1

12.) Restrict Programs to run:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer\DisallowRun

create String value with any name, like 1 and set its value to the program’s EXE file.

e.g., If you want to restrict msconfig, then create a String value 1 and set its value to msconfig.exe. If you want to restrict more programs, then simply create more String values with names 2, 3 and so on and set their values to the program’s exe.

13.) Restrict Registry Editor:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\System

create DWORD value DisableRegistryTools and set its value to 1

14.) Restrict Task Manager:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\System

create DWORD value DisableTaskMgr and set its value to 1

15.) Restrict Writing to USB Drives:

HKEY_LOCAL_MACHINE\SYSTEM\Current Control Set\Control\StorageDevicePolicies

Create DWORD value WriteProtect and set its value to 1

16.) Restrict New option in context menu:

HKEY_CLASSES_ROOT\Directory\Background\shellex\ContextMenu Handlers\New

And delete the value of Default, e.g., empty it.

17.) Restrict Send To in context menu:

HKEY_CLASSES_ROOT\AllFilesystemObjects\shellex\ContextMenu Handlers\Send To

And delete the value of Default, e.g., empty it.

18.) Restrict Balloon Tips:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Explorer\Advanced

Create DWORD value EnableBalloonTips and set its value to 0

19.) Restrict Users to enable New XP StartMenu:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

Create DWORD value NoSimpleStartMenu and set its value to 1

20.) Restrict Command Prompt:

HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System

Create DWORD value DisableCMD and set its value to 2

21.) Restrict Drives in My Computer:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

In right-side pane, create a new DWORD value NoViewOnDrive and change its value as following:

3 : To Restrict A and B drives only.
4 : To Restrict C drive only.
7 : To Restrict A, B, and C drives only.
8 : To Restrict D drive only.
F : To Restrict A, B, C, and D drives only.
03FFFFFF : To Restrict all drives.

And if you want more specific restrictions, like you want to restrict a combination of other drives, then you can use decimal no. instead of hexadecimal no. Following is a list for all drives decimal no.:

A: 1
B: 2
C: 4
D: 8
E: 16
F: 32
G: 64
H: 128
I: 256
J: 512
K: 1024
L: 2048
M: 4096
N: 8192
O: 16384
P: 32768
Q: 65536
R: 131072
S: 262144
T: 524288
U: 1048576
V: 2097152
W: 4194304
X: 8388608
Y: 16777216
Z: 33554432
ALL: 67108863

So if you want to disable a combination of drives, just sum their numbers and give the same value to NoViewOnDrive. e.g., for restricting C, D, E and F drives, give the value: 4+8+16+32 = 60

NOTE: You can also hide the drives using NoDrives DWORD value. The location and its value remain same as the above trick.

22.) Restrict RUN in New XP StartMenu:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

Create DWORD value NoRun and set its value to 1

23.) Restrict Control Panel:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

Create DWORD value NoControlPanel and set its value to 1

How to dry wet mobile

untitled

Yesterday my cell phone .. got drenched in water … almost got itself killed… I tried soo many tricks to save its life.. D moisture almost took my baby’s life… I saved it .. with rice … U can too …

It could be anything .. sink, toilet or rainstorm, anything …
Posting it so that it might help you… Don’t try to turn your ph on!.
1. Remove the battery immediately , patt it dry with a towel
2. If sun is high .. put them out ..
3. Try using a hair dryer
4. Put into a container of dry raw rice for a day ( maybe for 2 -3)
5. put phone in a plastic bag with a few silica packets.
6. Hearing aid dryer for several hours.
7. Place it in an oven with just the oven light on for a few days(the light on is enough to dry out the air and increase the temperature just a little).
8. Rub alcohol to avoid corrosion due to the water but don’t use it on the screen

How to avoid scams – by Google

http://www.solarpowerrocks.com/wp-content/uploads/2007/11/scam23.jpgSpammers attempt to reach users by generating hundreds of webpages and sending out a flood of spam emails, sometimes even buying advertisements on reputable websites. Their sites also target other popular Internet companies. They may include family photos pilfered from another site or a picture of a check they supposedly received. Spammers use a wide range of techniques that try to slip past automatic filters to get to you. Following is a guide that aims at helping avoid getting into scams.

How to identify scams and other schemes

In general, if it looks too good to be true, it probably is. Here are some pointers on what to look out for:

  • Before you fill out a form or give someone a credit card, do a web search to see what other people are saying about the company and its practices.
  • Be wary of companies that ask for upfront charges for services that Google actually offers for free. Check out our business solutions page before writing a check.
  • Always read the fine print. Watch out for get-rich-quick schemes that charge a very low initial fee before sneaking in large reoccurring charges on your credit card or bank account.
  • Google never guarantees top placement in search results or AdWords — beware of companies that claim to guarantee rankings, allege a special relationship with Google, or advertise a “priority submit” to Google. There is no priority submit for Google. In fact, the only way to submit a site to Google directly is through our Add URL page or through the Sitemaps program — you can do these tasks yourself at no cost whatsoever.
  • Be wary of anything resembling a pyramid scheme, where you make commissions by recruiting more participants.
  • Some sales pitches use the word “Google” or other trademarks right in their name with targeted phrases like “cash,” “pay day,” “money,” “secrets,” “home business,” etc. If you can’t find it on our list of Google products or on the business solutions page, don’t trust it.
  • Look for third party verification. Scammers can easily cut-and-paste images to plaster a site with “as seen on TV,” “five-star reviews” and the logos of well-known news channels. Products that have really been recommended by experts and fellow users typically contain links from legitimate news sites and multiple user review sites.
  • Reserve the same skepticism for unsolicited email about making money with Google AdWords as you do for “burn fat at night” diet pills or requests to help transfer funds from deposed dictators. In general, be wary of offers from firms that email you out of the blue. Amazingly, we get these spam emails too:

“I visited your website and noticed that you are not listed in most of the major search engines and directories…”

  • Google is not running a lottery, and we have not picked your email address to win millions of dollars. Don’t give out your bank account details via email in anticipation of a big jackpot.

What you can do

  • If you come across many sites with duplicate content or common templates intended to direct users to the same product or scheme, please let us know with a spam report.
  • If you’ve been contacted to place suspicious links on your site for money, let us know with the paid link report form. If you have your own website or are in charge of advertising on a site, think carefully before accepting ads or entering into affiliate programs that will lead your users to schemes like those mentioned above.
  • If your site’s forums or comment sections have been spammed with fake offers of fabulous financial gain, you may need to take steps to fight comment spam. Spammers will take advantage of any user-generated content sections of your site, and will even generate thousands of fake user profiles to try to slip under the radar.

Auto retweet with yahoo pipes

Recently I was provoked by a thought of retweeting a tweet by some particular tweeter automatically, and thus begun my search for such a tool or web app. To my surprice I could not find any instead I stumbled upon how to use yahoo pipes to do that.
The way i did it was as follows
Instead of creating my own pipe from scratch I used clean twitter feed pipe and edited it to my convinience.

Firstly You need to have key word.
I took it as Guykawasaki
so for me the feed url would be
http://search.twitter.com/search.atom?q=guykawasaki as I wanted to retweet all posts by Guykawasaki

1. Add a fetch feed box and enter the url in it.

2. Next add a Regex boc to filter our the unwanted content based on regular expressions

3. Then add a filter funtion to perform filtering on basis of the above expressions

4. Connect the pipes and you are done.

steps to pipe

Now we goto the properties of the pipe and click run it. Once we are on the results page which looks like this.
link to run

Here what is of important to us is the RSS of this pipe. Clicking it gives us the RSS link of the pipe and we are almost done.

pipe run
Now what we need to do is just use twitterfeed to automatically post the updates to the required twitter account.
If unknown to twitterfeed see how to do it here.