PC Health Advisor(Buy Here)

Blogroll

Wednesday, June 29, 2011

Basic Needs To Become a Hacker

What are the basics to become a hacker

Everyone has heard of a person or someone else who was caught while hacking into computers belonging to a particular organization. Because hacking computers is illegal, it should be noted that this article does not cite any real specifics on the subject, and this writer would be like to invite you to become a true hacker - professionally.

This article will give you a brief overview of the criminal hackers, some of their methods, and some things you can do to your computer safe from hacker attacks. Here are the things you need to learn to become a hacker.

Learn Computer

It 'obvious that the first thing you need to do is learn about computers. This refers to the study. Reading a lot is involved with old-fashioned simple to learn to use computers. Then, of course, there are specific aspects of the study. Places where the tips have learned is often twofold: first, a friend who has access to a computer, and various places online. But this is also an interesting thing - if the young person has the ability to learn, and wants to learn can be used for hacking guides, so why not take the time to learn the right things - things that can earn lots of money in world are legit? It 'could be possible that one of his friends, who dismisses him for ever?
Add to Cart More Info

Hacker and Culture

Hacker culture has existed for many decades, even though most of us may have been recently noted, thanks to films like The Matrix. However, the hacker culture has been there and were constantly affect our society and our way of seeing the world. From manga to computer knowledge, the hacker culture, gradually made its way into our lives.

What is the hacker culture?

Hacker culture is composed of all those human experiences and expressions, which are related to take advantage of hardware and software. At this moment there are three types of hackers. The first and best known type of black hat hacker is a hacker, or a person who uses his knowledge to gain a personal advantage. Usually it means to steal information that can be sold on the black market.

Pirates bolder black hat is able to decipher the bank, without a trace. Fortunately, the bank security and global cooperation was able to place certain restrictions and control over them.

The other side of the white balance is to affect a hacker, security specialist, who works with organizations and help with the problems of your computer's security.

Finally, a gray hat hackers. Hackers are composed of people who walk a thin line of white hat hackers and black hat hackers. Generally, they are influenced in their need for money or lust for recognition of the hacker community.

What are the origins of the hacker culture?

It can be said that hackers have been around since time immemorial. Although Merriam-Webster describes a hacker as a computer expert, in fact, a hacker is a person who is looking for weaknesses in the system and try to exploit to their advantage.

Under this definition, was Philip II of Macedon, father of Alexander the Great, a hacker. How so? He noted that there were some weaknesses in the armies of ancient Greece. For use in his favor, he decided to implement a number of improvements to its own army. As history has shown us that these improvements in his favor and in favor of its famous Sun

The same could be said to Napoleon, who noted that the movement and artillery could be used in such a way that no army in Europe would be able to resist him. Unfortunately for him, he forgot to consider that logistics was an important thing to consider, when he mobilized hundreds of thousands of men in the Russian Empire.
Add to Cart More Info

Hacking Software Programs

The Computer Emergency Response Team (CERT) has warned against the growing threat of cyber attacks as it was much more automated hacking tools that are designed to take maximum impact in the shortest possible. With a large number of malicious software, hackers can control distributed systems to automatically scan systems and attack systems by taking immediate advantage of system vulnerabilities and exploit them.

Hundreds of free software hackers are available and easy to use that even a novice can turn a highly paid professional. With a wide range of easy to use, software piracy in South Africa was again the sky pirates, "the injection of illegitimate programs in remote control systems for the fraudulent act of entering Web sites.

Attacks with Hacking Program

Hackers, by any means, to launch attacks against a server GAMCO, which houses a number of websites. In this sense we can win without unimpeded access to these sites, with a reason to aspire information and secret documents and in some cases even money. Pirated software is a technically superior control software designed to be used as hacking programs that help find what the hacker wants to know.

An attacker can be a spouse who can use a free program of hacking with the intention to know everything about the woman or her husband. Interested tutors can also hack into the systems of their departments to discover their actions and approaches.

With a wide range of programs readily available hacking password, a hacker breaks into home sites large and small companies, which smuggled out of all the secret protocols, which refers to the concerns, financial and other movements.

A wonderful example of such software program is SpyRecon that allows an attacker to control a remote system from anywhere - to what extent it can be. SpyRecon is the hacking program - so smart and so strong that it allows the user to track any target system while secretly record and automatically, what happens to the target system. This may be software pirate who sends each recorded activity, connection details, keystrokes, screenshots of the e-mail and chat, even personal. For SpyRecon total surprise turned out to be one hundred percent compatible with almost all the major online services or applications such as Neopets, Yahoo, AOL, Hotmail, MSN, AIM and LiveJournal.

There are a huge number of free software hacking just as intelligent as SpyRecon provides immense pleasure to hackers breaking into other systems without a trial. Another, as the latest hacking program, which can be completely free of charge, the Camera / Shy software, just released by the dedicated team of hackers do not know how new Hactive.

Activists can change the contents prohibited by the entire World Wide Web using the Camera / Shy software. Because the software is dedicated to the famous former Chinese leader, Wang Ruowang, it was noted that China is one of the nation, who have shown enormous interest in the Camera / Shy software. Steganography software is yet another free program hack, which is designed for advanced users who have a good grip on the technical know-how.
Add to Cart More Info

Wednesday, May 4, 2011

Hacking Webcams And More..


Hacking webcams ... This is not a guide to hacking ..

Rather it is a tutorial to show you how to do a simple search for unprotected webcams on the net.

This is only for fun ...

You are fully responsible for your actions ...

(Note: These are not the personal web, this is only a guide to see the public web, such as traffic cameras)

START

Go to this link:

www.google.com

and put it into the search bar

inurl: / view / index.shtml

or

liveapplet inurl: intitle LvAppl

and click Google Search ...

displays a list of search items.

Go to any of the links ... Some of them do not work.

You will be able to view the cameras on the street / traffic ...

and not only .. you can also control the move right or left, or zooming in or out ...

It's a bit of fun

Have fun.

NOTE: You should have a fast connection to this ...

Create folders and files can not be! Name

This trick will allow you to create files and folders with no name.

Just follow the steps below:

1. Select a file or folder.

2.Right click on the name of the press, or press F2.

3. Press and hold down the Alt key. While holding down the Alt key, type numbers 0160 from the keypad.

Note: The numbers Type 0160 in the keypad, which is the number of people present on the right side of the keyboard. Do not type the numbers that are present in the top of the character keys.

4. Press Enter and the nameless file or folder is created.

Hide files in JPEG format! Well, you know you can hide your files in a JPEG file? You only need to download WinRAR. You just need a little knowledge about the command prompt and installed WinRAR.

Ok, give ...

1. Gather all the files you want to hide a folder anywhere on your PC (not in C: \ hidden - recommended).

2. Now add these files in a RAR file (example secret.rar). This file must also be in the same directory (C: \ hidden).

3. Now look for a single image JPEG file (eg logo.jpg). Copy and paste this file also in C: \ hidden.

4. Now open the command prompt (go to Run and type "cmd"). Make your working directory C: \ hidden.

5. Now type: "logo.jpg COPY / b + output.jpg secret.rar" (without the quotes) - Now, logo.jpg is the picture you want to show secret.rar is the file to be hidden, and output. jpg is the file that contains both. : D

6. Now, having done this, you will see a file output.jpg in C: \ hidden. Open (double click) and display the image you want to see. Now try to open the same file with WinRAR, it will show hidden files.

Running multiple Yahoo Messengers

It is possible to run multiple Yahoo Messenger simultaneously right after installing the official version of Yahoo Messenger.

You will need a simple patch Windows registry to enable this feature.

>> Follow these steps:

1. Open Notepad

2. Copy the following code

REGEDIT4 [HKEY_CURRENT_USER \ Software \ Yahoo \ pager \ Test] "Plural" = dword: 00000001

3. Save the above code as multi.reg

4. Double-click the file or right click and select Merge. (The goal is to combine these options in the Windows registry)

XP Boot Pen Drive

There are times when a small error in the Windows registry or a viral infection can cause your system unbootable. In this state of a properly configured USB drive on hand with Bart Lagerweij free utility (BartPE), is a practical replacement for the Windows operating system.

BartPE will give you a complete Win32 environment with network support, a graphical user interface (800x600) and FAT / NTFS / CDFS file system support for.

Do not confuse BartPE official Microsoft Windows PE. BartPE has some interesting features compared to Windows PE and is freeware.

Requirements for the installation of BartPE:

:: The USB flash drive with at least 256 MB of storage capacity.

:: The records of the Windows installation CD-ROM.

How it works:

:: PE Builder, closer to its original settings of Windows XP operating system information should be lean, which is ready to begin, or a USB memory stick.

:: This compact, portable version of Windows includes all the important system tools to deal with the PC in case of emergency.

:: You can also add other programs of the collection, such as the media writing tool for Nero Burning ROM or an anti-spyware package such as Ad-Aware SE Personal, during the installation.

Steps:

:: Download the latest PE Builder's (self-installing package) and install it.

Start PE Builder (pebuilder.exe) and insert Microsoft Windows XP installation / setup CD, it condenses the installation file to your pen drive.

:: In the main dialog box office PE Builder, select the "Pen Drive" option. Click "Build" button. PE Builder will now ask you to create a BartPE directory, answer "yes."

:: PE Builder now start building BartPE. This may take several minutes. You will see a lot of files to be copied and / or unloading, you must flash drive. If the verification data has been corrected and where there are no errors reported you can boot the Pen Drive.

next Mason (PKK)

How to Hack on MSN:

Brute force method

a. Use telnet to port 110 (Hotmail's pop-server)

b. Type the user, then the victim

Username

c. Type PASS and then guess a password

d. Repeat until you have found the correct password.

!. This

is called piracy requires strength and patience.

Is better than trying to guess the password of the victims

hotmail

home page just because it's faster.

____

I_2_I - The best way

a. Get the username of the victim (It is usually located in

Address field

b. Then type "www.hotmail.com / cgi-bin / start / victimsusername"

c. you are in!

!. This hack only works if you're on the same network or computer that

victim and if not registered.

____

I_3_I - The Old Road

a. Go to

http://www.hotmail/proxy.html

b. Now, type the user name victims. (Click Login)

c. Look at the source code.

d. In the fifth line

U should find "action = someadress"

e. Copy and paste the address in the Address field

f. You're ..

!. As you can see

It is a long process and the victim is

long time to disconnect.

____

I_4_I - Another ...

a. Go to home page hotmail

b. Copy the source code.

c. Create a new html file with the same code but change method = post

method = get

d. "View" on page

e. Change the www.hotmail.com/ address (not press enter!)

f. Making the victim to write your username and password

g. see in the address field. Here you can see ... & Password: something ...

!. This is the way I use, because it allows

password.

(If you exit the browser, you can see the password in the History folder!)

READ!

Administrators Hotmail

changed "system" so that the victim can connect

power

If you're in your account. So do not waste your time!

If you are a beginner, I would not do this your first attempt

hacking. When you want to do is to use a port surfer and surf over

port 80. Once there, try e-mail user

want password. It is preferable

their mail using the word

"We" and "Here at Hotmail ..." Most of the releases this fall and end

to provide their

password. There is also another way you can

obtain an anon mailer, and create staff@hotmail.com address.

But

you need to change the reply address to go to a different address

as user@host.com. The person who

try to get the card shall respond to this letter in the mail that was sent to you.

Text, like "I want an answer to this letter with the" password "

below and please include your username and password.

If you have trouble logging in the coming days, it is

only because we are updating our mail servers, but not need

worry, your messages are still there. Even if the server can be shut down

for one hour. Hotmail staff, thank you. "


Cause: The file or folder that seems nameless is actually the name of an area.

But what if you want to create another nameless file or folder in the same directory?

To do this you need to rename the file with 2 seats. Just follow these steps:

1. Select the file, press F2.

2.Hold Alt key and type 0160 from the keypad.

3.release the ALT key. Now, without doing anything else, once again to hold the Alt key and press 0160.

4. Press enter and you have another nameless file in the same directory.

Step 3 5.Repeat create as many nameless files or folders in the same directory.

(We've had problems deleting these folders, to do this, restart the computer in Safe Mode and delete it from there.)

Add to Cart More Info

Tuesday, May 3, 2011

How To Set Up Multiple Users On A PC


Setting up separate accounts on a shared PC would help to retain documents as images and organized labor, and it will be much easier to follow both the duties of tomorrow and the budget proposal next week .

Step By Step

1. Click the Windows orb to open the Start menu, then click Control Panel.

2. If you are using Classic View, click the icon called User Accounts. " Usually accompanied by an icon of two cartoons. If you use the new control panel is standard on Vista and Windows 7, click on Add or remove user accounts ", the text in the User Accounts and Family Safety" section. This takes you to Manage Accounts screen, allowing you to change your user accounts after adding


3. Click "Create a new account" in the large text box that shows the current users.

4. Label a new account name. Give each user account name that accurately describes what it once was. For example, if an account is intended for adults and children, the label of the new account "Kids". You can also create an account for household use, such as games or sending an e-mail, and the second part of work-related enterprises.

5. Select an account type. There are two options, the standard account and the account administrator. standard account can use the software and install and remove programs, but they can not make changes that affect all users, or which may compromise the safety of your computer. Admin accounts have full control of your computer, but may require password authentication to prevent unwanted changes to the system.

6. Add a password for your account by clicking the desired account in the Account Management screen. Click "Create a password" text, then type the appropriate information in the appropriate boxes. Click Create password to complete the process. a password and change the access settings.

Add to Cart More Info

Wednesday, April 27, 2011

Create Your Own IM Bot( Yahoo, Gmail) Instant Messenger

This quick tutorial demonstrates how to develop your own functional IM bot that works with Google Talk, Yahoo Messenger, Windows Live and all other popular instant messaging programs.
To begin with, only to learn some basic programming skills (any language that do) and web space to host your bot.
@For this example, I created a dummy bot called "dangerous" to listen to your instant messages. To see this live, add hackingtips011@bot.im your GTalk contact list and start chatting


If you want to write a personal IM bot, just follow these simple steps: -
Step 1: Go http://www.imified.com/ and register a new account of the bot.
Step 2: Now is the time to create a bot that is a very simple script that resides on the public web server.
It could be PHP, Perl, Python or other languages.
Hello World example bot:
The example shows how easy it is to create a bot.
This example is coded in PHP.
<?php
switch ($ _REQUEST [step ']) {
Case 1:
echo "Hello, what's your name?"
break;
Table 2:
echo "Hello". $ _REQUEST ['Value1']. "Where do you live?"
break;
Case 3:
echo "Well, welcome to this world bot hello." $ _REQUEST ['Value1']. " <br> of ". $ _REQUEST ['value2'].". <reset> "
break;
}
?&gt;
Step 3: Once the script is ready, put it somewhere on your web server and copy the complete URL in the clipboard.
Step 4: Now, signed imified paste the script into the URL
Screen Name: hackingtips011.blogspot.om
Search Engine Script URL: http://www.hackingtips011.blogspot.com/imbot.php
Step 5: Add to that, im a robot buddy list. That's it.
This is a very simple robot, but the possibilities are endless.
For example, you can write a bot that sends e-mail to all close friends through a simple IM message. Or you can write a will does currency exchange.
Add to Cart More Info

Friday, April 22, 2011

Thursday, April 21, 2011

Catching a Hacker

Hacker care: A con artist is caught sooner or later

The hackers broke into Pentagon computer - again. When news of this, plus the fact that other hackers are constantly looking to steal the identities of people to spam innocent computer crime and computer hacking in unauthorized places

makes it necessary for illegal hackers get caught. If you're one of those who have suffered a hack attack, so you can be one of those who say: ". I need a specialist in IP, to catch a hacker" This article will show you things you can do.

How hackers were

The fact that Microsoft and some other software companies were informed - yes, hackers, there are many "holes" in the hacker could exploit Windows. Microsoft has responded by looking to solve the "holes" every time you said one. Then send a patch to prevent hackers through the "hole". Peace with the update, Microsoft has a way to close the problems that exist in the Windows software - even if it is not known whether all these "holes" ever known.

Usually, it is quite difficult to see that a hacker has hacked into the computer. If there is only a ride, or take the minimum amount of data - you really can not be sure that you get hacked. They are some of the effects of computer hacking, although this may tell you something. Here are some ways to detect intruders.

Pirates detection

Hackers are by nature very cautious. Their ability to access your computer over the Internet can easily be done without his knowledge - and most of them seem to prefer this approach. Before time is spent on being able to detect an intruder, it is noted that a determined attacker will not stop! Receive - including the Department of defense systems!

There are some common things that may tell you something about an intruder is:

* Lights indicate hard drive activity is busier than my role as a

* Suspicious files left on your computer - often in the Windows Temp directory tmp. suffix

* Handling obvious - corrupt files, missing files, etc.

* Or, worst - someone taking money from your bank account or credit card (Please note, however, that this could be the result of "phishing", too - not necessarily the piracy)

* Firewall to receive multiple packets from one address and notify you.
Add to Cart More Info

WiFi Hacking

WiFi is a wireless internet use, cables are not needed and it was originally designed for use with laptops and mobile phones. WI-FI has become increasingly popular due to the lack of cables and cheap installation costs. Many people now use WiFi instead of the normal Internet connection. Disadvantages include WI-FI WI-FI that can be easily hacked. The most common form of encryption for the Wi-Fi can only be hacked, even if it is properly configured. There are people who travel around a laptop looking Wi-Fi connection with no guarantee that can be hacked.

Using these methods, a person could "fly" using the Internet to someone else and break into files with ease. Thus, many hackers use other people to break WI FI connections secure access to files which a connection can be more difficult to trace them as it is wireless, and on behalf of another person. This type of piracy can be severe if firms have important files using WI FI sensitive information involved in the files can be easily accessed by a hacker. There have been convictions of this type of piracy. COMPUTER REPAIR HOME STUDY (BUY HERE )Click Here!

Add to Cart More Info

PHP Security Hardening Php.ini

default configuration file for PHP, php.ini (usually located in / etc / php.ini in most Linux systems) contain a number of features that can be used to help protect your Web applications. Unfortunately, many PHP users and administrators are not familiar with the different options that are available in the php.ini file and leave the file in its own securities. Using some of the security-related options in the configuration file, can greatly improve the security posture of web applications on your server.

Safe Mode

PHP safe mode is an extensive "efforts to solve security problems shared server, which contains many useful features. Note that support safe mode will be removed in the sixth PHP Safe Mode if efficiently control the functions in one file on the server affect all other files have the same owner. For example, if you have a page script1.php trying to read the contents of a folder img /. Safe Mode with checkpoints UID and script1.php img / folder. If they match, then the script to access if they do not fit so safe mode will disable access. This is an interesting safety mechanism that allows you to restrict access by scripts directory outside the normal application installation. Safe Mode can cause problems even when the Web server ends up owning the files (for example, when a new file is uploaded or created by a application, it is usually owned by "apache" or a similar web server account).

Safe mode will also restrict executables that can be handled by scripts in the same way that restricts access to files and directories. Safe mode can also be configured so that only the binaries from a directory can be executed. This can help limit the exposure of the shell command scripts.

To enable safe mode, modify (or add) the safe_mode directive in php.ini to:

safe_mode = On

In some cases, you want to use a group to verify the property (for example, if you have several scripts for Web application deployment of people). To be sure to check the user group permissions to use:

safe_mode_gid = A

To restrict the directories, which may be associated with executable files, or use the following directives in the php.ini file:

safe_mode_include_dir = / path / to / dir

safe_mode_exec_dir = / path / to / exec / dir

Safe mode has many other useful functions that are of interest. Review the documentation on the website and see if PHP safe mode is adapted to its environment.

Include Limitation

Use PHP open_basedir made much sense since most file contains vectors of vulnerability. This directive restricts all PHP files in the specified folder and below. It is common for attackers to find ways to include local files from PHP scripts to detect local system files via the web server. For example, an attacker if a file inclusion vulnerability, they could try to include the file / etc / passwd to list all user accounts on the system. PHP with open_basedir is used to limit the inclusion of files to the web root, eg / var / www. Once you put the files outside this directory can not be included in scripts, so the above attacks will fail. To enable the open_basedir to update your php.ini to include:

open_basedir = / path / to / web / root

Disable functions

There are some features in PHP that you probably do not want your developers to use because of the danger they represent. Even if you know your users not to use certain functions, it is wise to disable them completely so that an attacker can not use them. This safeguard is particularly effective in stopping an attacker who managed to upload a PHP script that writes a file system, or even include an external file PHP. By disabling the feature ensures that you can limit the effectiveness of these types of attacks. It should be noted that it is almost impossible to do anything to prevent an attacker to execute a command on a shell disabling features, but it certainly can stop an attacker who is not a good PHP programmer.

To disable functions like shell_exec () and system () can prevent users and attackers to use these functions. It is important to limit the functionality for developers, because the use of these commands open the possibility of the vulnerability of remote code execution if not used carefully. Certainly, there are cases of operations such as executing a command shell, but a pack of PHP provides functions that are essentially the same. Developers can standardize on one of these functions and the rest can be disabled to avoid attacks. If this is not a foolproof solution is likely to prevent attacks like the terrible C99 shell. To enable the disable_functions directive can simply add to your php.ini file with a list of comma-separated functions to be restricted. For example:

disable_functions = php_uname, getmyuid, relays getmypid, leak, listen, diskfreespace, tmpfile, link, ignore_user_abord, shell_exec, dl, set_time_limit, executive system, highlight_file, source, show_source, fpaththru, virtual posix_ctermid, posix_getcwd, posix_getegid, posix_geteuid, posix_getgid, posix_getgrgid , posix_getgrnam, posix_getgroups, posix_getlogin, posix_getpgid, posix_getpgrp, posix_getpid, posix, _getppid, posix_getpwnam, posix_getpwuid, posix_getrlimit, posix_getsid, posix_getuid, posix_isatty, posix_kill, posix_mkfifo, posix_setegid, posix_seteuid, posix_setgid, posix_setpgid, posix_setsid, posix_setuid, posix_times, posix_ttyname, posix_uname , proc_open, proc_close, proc_get_status, proc_nice, proc_terminate, phpinfo

Avoid disclosure

Attackers often use information exposes your web server for information about configuring the server, the application and components. Error messages are among the most common forms of disclosure of information, often information leakage as the installation path of applications, database connectivity, data model details such as table and column names, and details such as script variables. Although this information is invaluable for debugging developer, is useless for end users and dangerous to expose the attackers. PHP debugging output should be disabled in php.ini:

display_errors = Off

This prevents PHP error at run time in the pages sent to users. PHP will continue to log errors as usual, however, so they can be examined by developers. Beware development tactics to stop the execution of PHP errors, however, that disabling this feature does not preclude disclosure of information. Some developers may use the custom debug output embedded in HTML comments, FirePHP third party tools or to write PHP error logs using local guides. Htaccess and the error_log directive. However, preventing the display of errors by default, reduce the opportunity to present information to the attackers.

Disable Globals

Global variables are not horrible for PHP 3 days. Most of the distribution of global variables in the registry is set to OFF (and, fortunately, is not supported in future versions of PHP). However, you must ensure that the directive is properly in place. You should find the following in php.ini:

register_globals = Off

Register Globals variables allows HTTP to be used without indicating their source. For example? If a developer wants to use a URL variable named 'id', for example, the URL request index.php id = 4, with globals, they can simply use $ instead of $ id ['id'] _GET. It is a great convenience, but it can cause collisions. For example, a post of shape if you use a variable called "id" and there is a variable $ id is set in a script and a user changes the URL of the script to include an "id =" in the URL, variable that has priority? Even more damaging is the possibility for hackers to change the configuration variables as the DOCUMENT_ROOT from the URL. This can cause endless problems, especially if the attackers are able to call scripts that are normally included in other scripts and expect predefined variables which can be replaced by GET variables to a hacker.

Many older programs may require global register variables. If so, at least limit the configuration files specific application instead of all your PHP installation. You can do this using PHP directives. htaccess file included in specific folders. Make sure register_globals is off, but in your php.ini!

Delete remote file contains

Attackers often try to identify the file inclusion vulnerabilities in applications and then use it to include malicious PHP scripts they write. Even if an attacker has write access to files of the web application if the inclusion of remote files allowed the attacker can host malicious PHP scripts on other web servers and applications will be downloaded and run locally! This can have devastating consequences. To limit the execution of remote files to be sure of the following in php.ini:

allow_url_fopen = Off

allow_url_include = Off

This prevents remote scripting to be included and executed by the scripts on your system.

Updates Restrict file

If you do not use the upload feature one of your PHP scripts so it's a good idea to turn it off. Attackers will try to file (wrong) to download to quickly inject malicious scripts into web applications. By disabling file downloads completely, which makes moving scripts on your web server more difficult. To disable file uploads file_uploads change directive in php.ini as follows:

file_uploads = Off

Even if you allow the download of files, you must change the default temporary folder used for downloading files. This can be done by changing the upload_tmp_dir directive. You can also choose to limit the size of files that can be downloaded. This is usually a change of system administration of a security patch, but it may be useful. Use the upload_max_filesize directive to that effect. To limit the downloading of files and file sizes change your php.ini file so it reads:

upload_tmp_dir = / var / php_tmp

upload_max_filezize = 2M

Secure Sessions

Popular flight session is an attack that allows an attacker to hijack the session of a legitimate user. Using session hijacking an attacker can bypass portions of the authorization and access applications to the Web without permission. PHP uses strong (which means long-generated pseudo random) session identifiers to guess a session ID is extremely difficult. When connected to a PHP application, you can see in your browser and can identify a cookie with a name like "PHPSESSID" and a value similar to 'bbbca6bb7a23bdc8de3baef2b506e654. The cookie consists of 32 hexadecimal characters, which makes it extremely difficult to predict. The flaw in this system, however, is that session IDs are written to the file system where PHP can be created to track them. Change the default location for session identifiers confound attempts to read. To change the location where information is written in the session to change the session.save_path in the php.

ini settings, so that it points to the desired position like this:

session.save_path = / var / lib / php

Make sure your web server can read and write to the location you specify, however, or sessions will not work. You can also set the PHP, it writes the cookie to be inaccessible to JavaScript. If you do not have PHP applications that use JavaScript to manipulate cookies is an excellent idea. Hackers often use Cross Site Scripting (XSS) bugs in web applications to inject JavaScript code into pages that can be used to steal session cookies. By setting the php.ini directive:

session.cookie_httponly = 1

JavaScript you limit access to your cookies. Another safety feature some PHP to check the values ​​HTTP judge, the session information is not disclosed internally while a user views an application. This prevents users from accidentally disclose information about the session in a manner that will allow users to track external links and steal one session. This is particularly useful if information about the session is being adopted in a URL that could accidentally be released on a mailing list or website. To enable this feature, you must use the following in php.ini:

session.referer_check = your_url.tld

Add to Cart More Info

Wednesday, April 6, 2011

Get Facebook E-mail - Invitation Announcements


Facebook has new features that provide e-mail users at the time facebook email id is not open to all, you should ask for an invitation invittation.In this new service you need to visit the following link where you will be prompted to click on "Request Invite".



http://www.facebook.com/about/messages/

If you're lucky you get email id yourname@facebook.com soon as possible. Please note that the e-mail to respond to the user public, for example:

Profile: facebook.com / username

So, your e-mail is

E-mail: username@facebook.com

If you do not have a username, you can go here for facebook.com / username / to get or click below

http://www.facebook.com/username/


Add to Cart More Info

Hide IP Address With Hide IP

When surfing the Internet, you leave yourself open to being snooped when the sites. They can track your online travels, know what operating system and browser you use, find your hostname, see the latest sites you've visited, examine your history list, delve into your memory cache, examine your IP address and use it to learn basic information about you such as your geographic location, and more. To a large extent, your Internet life an open book when you visit.

Websites use a variety of techniques to collect and collate this information, but the two most basic are examining your IP address and cookies placed on your PC. Match your IP address with your cookies make it easier for them to create personal profiles.

Hide IP is the software that masks your real IP address to protect your anonymity when surfing the web. On the other hand, hackers can use this software to hide their identity and captured. It 'a benefit for all, and I recommend that every computer should have this program installed.

Hiding your IP block spam from marketers which know your interests, according to the IP when browsing websites. You can use the web-based e-mail to send anonymous e-mail.

We found this application works in a simple and effective: Click on the icon of a padlock, and within seconds the program has found and purchased a fake IP for you. Your real IP address is displayed in the window of the application.

Top Features Hide IP:

Hide IP address

One click to completely hide your IP address. Others will see the fur hides your real IP address IP address and protect your privacy.

Choose your physical location

You decide which countries to enter your home, simply by choosing from a list of countries. We have hundreds, hourly updates of available IP addresses.

Anonymous Surfing

You're protected against hackers, who will be attracted to your new IP address instead of your right. They will never be able to find any information about yourself by following the masked IP.

Send anonymous email

Hide your IP headers of messages. Be protected when sending emails from Yahoo, Hotmail, Gmail. Upgrading to Platinum Service add-on to protect yourself in Outlook!

Country circumvent restrictions Web Site

Anonymous web browsing restricted sites for your country. Surf on forums where they have been banned.

Supports Internet Explorer, Firefox, Google Chrome, Safari, Opera.

Add to Cart More Info

Sunday, April 3, 2011

Balck Hat Hackers


Black Hat Hackers

Thanks to Hollywood, the black hat hackers have become the iconic image of all hackers around the world. For computer users, piracy has become a word synonymous with social misfits and criminals. Of course, this is an injustice created by our own interpretation of the media, so it is important for us to know what a hacker is a hacker and this (or crack) in black does. So let's learn the black hat techniques and how we make life a little harder.

What is Black Hat hacking?

A black hat hacker, also known as a hacker or hacker dark side (the latter definition is a direct reference to the movie Star Wars and the Dark Side of the Force) is someone who uses his skills with a criminal intent. Examples are cracks in the bank accounts for transfers to their own accounts, the flight information to be sold on the black market, or attacking the computer network of an organization for the money.

Some famous cases of black hat hackers include Kevin Mitnick, who used his black hat hacker skills to get computers in organizations such as Nokia, Fujitsu, Motorola and Sun Microsystems (it should be mentioned that it now has a white hat hacker) ; Kevin Poulsen who took control of all telephone lines in Los Angeles to win a radio contest (prize was a Porsche 944 S2), and Vladimir Levin, who is seized by the mastermind behind the theft of $ 10,000, 000 Citigroup.

Differences between White Hat and Black Hat Hacker

The difference between a black hat and white hat hackers is that the white hat hacker uses his skills and knowledge as a way to defend someone against their aggressors. This means that white hat hackers offer services to businesses, government agencies and educational institutions.

These services include a complete overhaul of their network security, implementation

Add to Cart More Info

Google Hacking And Prevention


Expert advice to keep Google Hacks Bay

Google hacking is here, and if you want to avoid that, you need to know more. Why? Millions around the world have become aware of this powerful tool, and black hackers, who use hacking for criminal activity, do not dismiss its potential. So how do you prevent becoming a victim of a hacker to Google? The only way to do this is to learn these new tricks. So forget using Google Earth hack and it will take time to prepare his defense.

Protecting yourself from Google hackers?

The first step in protecting yourself from something, is knowing that something works. In the case of Google hacking, you'll learn how it can be used to acquire sensitive information from individuals and businesses.

A great place to find a way to hack Google tutorial is Amazon. In this online store you will find two books that can help you. The first was written by Rael Dornfest and Tara Calishain, and it is called Google Hacks: Tips and tools for intelligent search. This book is considered a basic training for any computer user who wants to learn how he can exploit the opportunities offered by Google.

The second book is the Google hacking for penetration testing, written by the author Johnny Long. Considered a more advanced reading, gives the user know that hackers are aware of black. The good news is that this book focuses on the weaknesses that most system administrators who are exploited and ignored by almost all outsiders. Google, as innocent as it is, has become a tool waiting to be exploited.

After reading these two books should be able to make the kind of basis for most of the hacks of Google and some of the most advanced. But like everything in life, you need to master the art of Google hacking. And if you want to sell their services as an expert in network security, it is better to know from A to Z.

The best way is to contact the other hackers in their specialized forums, via IRC or even at several conventions that they celebrate throughout the USA. You will find much information as you have not been able to acquire for yourself.

Add to Cart More Info

Credit Card Hacking


Credit Card Hackers Are Here - Have you checked your credit lately?

hack credit cards has become a headache of new consumer safety. Although remote operations, the percentage of credit card fraud is almost a tenth of one percent in online transactions is as high as two or three percent. This means that for every penny you can make transactions on the Internet, can undergo two or three holes in your information private. Stop credit card piracy is now a priority number of credit card brands in the world.

A funny thing about many of these hackers free credit card numbers are posted on the Internet. Some of them do not want the money potential that can be acquired from these data that the glory.

How are the credit card receipts from hackers?

An attacker has many ways to get a credit card number to an innocent user. The most common is known as phishing. In this technique raises the hacker as an officer in an organization, say VISA. Hacker sends a group email accounts, an alert, instruct the recipient to follow a specific set of instructions before their credit card is canceled.

If the user is not aware of these scams, he will insert his credit card number, name and expiration date without knowing it will be a victim of online crime.

Another form of piracy credit card is through a website. The hacker only needs to hack the systems of an online retailer, for example, Costco, and the search database that stores information that lists all users who have conducted recent operations.

The third way is the process of buying online. Let's say an adult to find a site for adult entertainment that is appealing. E 'likely that the site is just a ruse to obtain credit card information.

What is a map?

A letter is a criminal who specializes in stealing credit card information. Although most of them acquire information from online providers, some of them are wise enough on how to access this information themselves.

In the physical world, a map to steal a user's information while face to face transaction. Criminals simply swipe the card through a special scanner. This device will read from the tape all credit card information. Then the cards will be offended as information on a blank card available in many stores identity.

In the virtual world, credit card hacking is a bit 'more sophisticated and automated. The hacker can install software in a credit card hacking known as Bugbear. This program is a keystroke logger, capture the keys you have pressed the keyboard and after some time, it sends this information to the hacker. Criminal is to look for these data, find all the personal information that give you access to a credit card.

Furthermore Bugbear is also IRC bot. This automated software is used to determine the functions to moderate a chat room. But if it is used by an attacker, he can use it to steal your credit card information. IRC bot will act as an official of a company where you will be prompted to insert your credit card.

Another way that hackers use to steal money from their credit card accounts used by eBay. Once they find a potential victim, the attacker uses a program that began bombing the account until it breaks. Once inside, the hacker used to go by real users, the sale of equipment that never arrived to the buyer when purchasing.

Add to Cart More Info

Hacking Culture


Hackers and Culture? It 's true!

hacker culture has existed for several decades, yet most of us have realized recently thanks to movies like The Matrix. However, piracy of culture was there, and constantly influence our society and our way of seeing the world. To encourage computer literacy, the hacker culture has made its way into our lives.

What the hacker culture?

Hacker culture is composed of all those human experiences and expressions that are related to take advantage of both hardware and software. At this moment there are three types of hackers. The first and most famous black hat hacker is a hacker, or a person who uses his knowledge for personal gain. Usually, this means to steal information that can be sold on the black market.

Pirates of the wildest black hat are able to break the bank accounts without a trace. Fortunately, security and cooperation throughout the World Bank has been able to impose restrictions and control of these people.

On the other side of the white balance is the hacker hack a computer security expert who works with organizations and helps them solve their computer network security.

Finally, there are gray hat hackers. This type of hacking is composed of people who are the thin line between white hat hackers and black hat hackers. Normally, their propensity to be affected by their need for money or their desire for recognition among the hacker community.

What are the origins of the hacker culture?

One could say that the pirates have existed since time immemorial. Although Merriam-Webster describes a hacker as a computer expert, is actually attacking a person looking for weaknesses in the system and try to exploit to their advantage.

Under this definition, Philip II of Macedon, father of Alexander the Great, was a pirate. How so? He noted that a number of weaknesses in the armies of ancient Greece. In order to exploit in its favor, decided to implement a series of improvements to its own army. As history has shown, these improvements have worked in his favor and in favor of its most famous son.

The same could be said of Napoleon, who noted that mobility and artillery could be used so that no army in Europe would be able to resist. Unfortunately for him, he forgot to take into account that logistics is an important thing to consider when mobilized hundreds of thousands of men in the Russian Empire.

Add to Cart More Info

Thursday, March 31, 2011

How to Hack using image files


Now I'll tell u how to hack an account with the image of the easy way: P

step

1) Create a virus / keylogger remote

with the help of keyloggers RDD.

. We call it "virus.exe" for now.

2) Obtain an image file to someone interesting you want to distribute.

3 virus.exe&gt; ​​Volume&gt; with the image file ,,,,,, we get server.exe

u can use this binder

2BLabs http://uploading.com/files/da811a44/Shock%%%% 2BFile 2BBinder 2Bv1.0.rar /

4) Make sure you have "Hide extensions of municipalities" do not select Folder Options.

5&gt;&gt;&gt; change virus.exe this type of "well-nature.jpeg-rpkrocks @ gmail.com"

most ppl do know the file as com exe

6&gt;&gt;&gt;&gt; change the default icon for a jpeg

&gt;&gt;&gt;&gt;&gt; 7 download any hosting site and give a link whome you want to hack au

8&gt;&gt;&gt; congratulations on your success.

Add to Cart More Info

Wednesday, March 30, 2011

"Chao" ATM Hacker Pro Gives Tips On ATM Hacking


Pirates of the most famous and well known ATM was recently arrested in Turkey and a list of his tips discovered online where it also sold the ATM skimming equipment.

Well, his advice may not be so good if it were caught, they can?

A hacker's bank-machine who was arrested earlier this month in Turkey alleged fraudsters tips on the installation of unauthorized card reading, including notification to the destination drive through vending machines Entries (ATMs) and avoid towns with fewer than 15,000 inhabitants.

The hacker, who went into the handle "Chao," reportedly was arrested earlier this month in Turkey. It 'was one of the most well-known ATM hackers in the world according to the director Uri Rivner of new technologies for RSA Consumer Solutions.

Chao sold fake facades that fraudsters could attach to the card slots in ATMs. These "skimmer" devices can read the magnetic stripe of every customer's ATM or credit cards, and often used in conjunction with a hidden camera that watches people enter their PIN (personal identification number), Rivne said. Alternatively, criminals attach an extra keypad on top of a machine and capture the PIN that way, "he added.

It seems that the old methods are still valid, but the equipment used is probably much smaller, cleaner and unobtrusive. They skim your card, keep your PIN on the keypad with a beam of camera and microphone points usually all a Wifi PC nearby that leads to the owner on the Web with a 3G or similar.

Just be careful when using the ATM and cover with the numeric keypad on the other hand, when you enter the PIN to be more vigilant.

Do not install a skimmer in the morning, because people are more vigilant then;

determine that a person would have to undergo to keep an eye on what happens in this block;

avoid blocks where more than 250 people a day walk through, the danger of detection;

do not install skimmers in towns of fewer than 15,000 people, because people in those countries know what their machines look;

avoid areas with small shops open 24 hours a day, because there may be surveillance cameras and vigilant shopkeepers;

not placed in areas where large numbers of illegal immigrants;

places with a lot of tourist traffic are good;

compare neighborhoods rich and drive-through ATMs;

ATMs near cash-only bars are a good choice for thousands of client activity.

The tips are really nothing revolutionary, but still interesting to read. Most of them can be regarded as common sense, but some, such as not really targeting the small towns are very interesting.

I thought the dates would have been the best time to go as there are no queues at other ATMs.

Add to Cart More Info

BlackBerry Hacks Fast Access PIN


Do You Know Your BlackBerry data?

Have you ever talked to a man, a BlackBerry user and have requested a PIN? Or maybe someone wanted to know which version you are using a BlackBerry BlackBerry, or what operating system you have? Suddenly, the mind is empty, and all other numbers and information about swimming around your head, you can not think. Or if you're like me, you never had time to remember the PIN BlackBerry, so you're forced to go to Options and then the status of the BlackBerry menu whenever you need to look for an answer. Well, after today, you no longer need to worry about those empty moments and does not remember the instructions of the menu, which lets you use the BlackBerry data.

A simple trick to find out the PIN

What is Blackberry PIN?

Your PIN is your personal identification number and can be used to communicate with other users via PIN messaging. On the BlackBerry, are linked to PIN messages SMS, but is only available for use with other BlackBerry users, and it looks like a spectacular red font to highlight some of the others. When you send a PIN message, you are also given a lot more character space to express yourself.

Your PIN is also useful to discuss with other users via BlackBerry Messenger (often referred to as BBM, is instant messaging or instant messaging software for BlackBerry ... ....) Other users often ask for this number to participate in private conversations with you on the BlackBerry network, but do not automatically know this number can sometimes be inconvenient to have to 's stop and hunt for him.

Blackberry Hack Easy for quick access PIN:

But now, this technique very easy to produce the number for you in no time. Simply open a blank email and write the word mypin and press the space key. The number has now replaced the text is your PIN. You can email it to your friends (since you already have the email open blank) or you can simply read the next issue to your colleagues user and then delete it. The main point is that it is easier to remember step for some to have to go to the Options menu number search.

You can also check your phone version of the same. In the blank email, just type myver and press the space key. My phone model and operating information will be displayed. Ditto for accessing your phone number, just write myNumber and press the space key and your number is displayed on the screen of your BlackBerry.

These tricks are so simple that even a beginner can use!

I also found these useful shortcuts when I'm talking about the new BlackBerry user, who wants to use the PIN messaging, or BlackBerry Messenger, but have no idea what their PIN. I think it's much easier to point a newbie how to find this information in a blank email to explain to them through the stages of the BlackBerry menu (because, after all, e-mail is one of the first things that people learn to do BlackBerry).

Blackberry useful little hack so nice to meet you and share with others. Remove Internet Browser Hijacked Redirect Virus/malware Click Here!

Source: Hackers.com/google

Add to Cart More Info

13 Tips For Hacking Twitter


Hey, what are you doing right now?

That's what Twitter responses in a text message to 140 characters or less. This networking tool is something that bloggers use to post messages, companies use to induce brand promotion, and people spend online. Ten hacks Twitter to better understand and exploit this new social networking tool.

-1 - Please retweet dignities.

The biggest compliment you can get in Twitter is a retweet (RT). I posted tweets retweeted 2000 + and were perhaps less than 1% of the time.

-2 - Gossip Boy.

"Oh, it's juicy to" hear "something like OH and pious. This is in contrast to the price and supply," tttrs larryChiang @ s drunks are funny. "Gossip Girls and boys, enjoy the comfort and anonymity guilty in a "me".

-3 - Choose a thesis Twitter.

Twitter doctors gave birth. Twitter granularists more boring when they "report" on cereal consumption and choice. Solution: Choose a thesis or at least a general direction. My goal is "What do they teach you at B-school.

-4 - Ambush Twitter.

Some parts sound a military ambush in positioning, preparation, monitoring, and of course a surprise. Location and preparation of activities, what you have chosen your attention. Screen via Summize. Twitter an ambush in which people walk on their skills and their equipment is ready for action.

-5 - Hashtag Squat.

Conversations can be the key word for hash tweets organized. For example, "# SXSW08" SXSW is in Austin, and if my calculations I remember correctly, # SXSW09 will be next year. In March, I hosted # VCsecrets as a panel. In the comments below to add your tags hash for various conversations.


-6 - Reciprocaters only.

Key Data on Twitter are very important. Readers should be a friend of the ratio of 1:1. Friends have created. Follow-Follow-Do not follow this maneuver is used by someone who does not follow you. What is this, send an e-mail notification that you have now with them (even if they follow all the time).

-7 - Follow the fascinating article on Summize.

Use the Twitter search engine Summize called to find tweets on your thesis / focus. You can also use alerts based on keywords.

-8 - Oops, I want you to turn

errors Twitter is fun and can help communicate a message. Depending on their status as a beginner, you can not "forward. For example,

"Favorite tylerWillis @"

The mistake I made when Mr. Tyler Willis retweeted and re-posted a blog post of Business Week mine.

"Do not follow herd @" is when I did not really stop tracking Greg, but I wanted a shot in his bow, after talking to smack # BWE08.

-9 - TinyURL for promotion.

There is shortening the time you place a link on Twitter. This allows you to stay under 140 characters. You may have heard of RSS. Twitter is similar to RSS, but a little more personal.

-10 - Something Live tweet.

Having access to some current information, or rupture?! Live Tweet.

CNN loves Twitter tweets and could live on cable TV for hundreds to see.

-11 - Read his deputy and @ replies.

Twitter beginners do not realize that there are deputy ministers - the direct messages and @ replies - SM service. For example, @ arielK could tweet larryChiang Afterparty @ W. "What struck me odd if no" @ reply "on my Twitter home page.

-12 - A Twitter Contest

furl high brow intellectual idea to a contest. Me, I have 700 subscribers, because I try to bribe people tip, bribe and comp read my twitter. I said twice bribe, because almost every candidate is a winner.


-13 - Prepublication of a chapter of emergency via Twitter

Add to Cart More Info

Pharming - How To Hijack A Domain


In this post I tell how the domains are hacked and how can they protect. domain names for Action hacking, commonly known as domain hijacking. Most of you, the term "domain name hijacking" can feel like a foreigner. So let me first tell you what a case of domain hijacking.

Pharming is a process by which Internet domain names have been stolen from their rightful owners. Pharming is also known as the flight envelope. Before we can proceed to learn how to hijack domain names, it is necessary to understand how domain names and how they are associated with a particular web server (website).

A domain name is the next action

Each site tells gohacking.com example consists of two parts. Domain Name (gohacking.com) and server web hosting, where files on the site is currently hosted. In reality, the domain name and web hosting server (web server), two different rooms, so they must be integrated within a site can operate without problems. The integration of the domain name with web hosting server is as follows.

1. After registering a new domain name, you get a control panel where you can take complete control of the domain.

2. This control panel, we report our domain for the Web server where your site files are actually hosted.

I'll have a clear vision of a small example.

Juan register a new domain name "abc.com" from a record company X domain. Also purchase a hosting plan hosting Y. The discharge of all sound files (. Html,. Php, javascript, etc) to your web server (Y). In the domain control panel (X), which configures your domain name "abc.com" to point to your web server (Y). Now, every time an Internet user types "abc.com" domain name "abc.com" is resolved in the target Web server and the web page appears. This is how a web site actually works.

What happens when a domain is hijacked

Now, let's see what happens when a domain is hijacked. To appropriate a domain name, simply enter the domain control panel and point the domain name to another web server than the original. So, to hijack a domain that is not required to access the destination Web server.

For example, a hacker gains access to your control panel domain "abc.com". To re-configure the attacker domain name to point to another Web server (Z). But when a user tries to access to "abc.com" he came upon the site of the hacker (Z) and not John's original location (Y).

In this case, the domain name, John (abc.com) is said to be kidnapped.

As domains are hijacked

To hijack a domain, it is necessary to access the control panel's domain target domain. For this you need the following ingredients

1. The domain name registration to the target domain.

2. The administrative email address associated to the target domain.

These data provide access to the WHOIS database of domain. In order to obtain WHOIS information, whois.domaintools.com goto the destination domain name and click Search. When the whois is loaded, scroll down and view the Whois record. You can do this "administrative contact email address."

To obtain the domain name registration, search for something like this in the Whois record. "Registration Service provided by:. Company XYZ" XYZ Here is the domain registrar. If not found, then scroll up and see the ICANN Registrar under the "Registration Data." In this case, the registrar of ICANN is responsible for the actual domain registration.

The administrative email address associated with that domain name is the back door to hijack the domain name. Is the key to open the control panel area. Therefore, to take complete control of the domain, the attacker hacking the administrative e-mail associated with it. Email hacking is discussed in my previous post how to hack an email account.

Once the attacker to take complete control of that email account, to visit the web domain name registration and click Forgot your password at the logon page. There will be asked to enter the domain name or e-mail management to begin the process of resetting your password. Once this is all the information to reset your password will be sent to the e-mail management. Since the attacker has access to that email account, you can reset the password for the domain control panel. After resetting the password, it connects the control panel with the new password and from there you can turn the field in minutes.

Protecting your domain name has been hijacked

The best way to protect your domain name to protect the administrative account e-mail in connection with the domain name. If you miss this email account, you lose your domain. So please see my previous post on how to protect your e-mail account was hacked. The second best way to protect your domain is to go to the registration of a domain name private. When you register a domain through a registration option for all your private personal information such as name, address, telephone and administrative e-mail address hidden from the public. So when an attacker to run whois domain for you, can not find your name, phone number and email address administratively. Registration for both the private and offers greater security and privacy. Private domain registration to pay a bit 'more volume, but well worth its benefits.

Every domain name registrant to give the opportunity to go to a private registration, so that when you buy a new domain make sure you choose the registration option private.

Add to Cart More Info

12 Tips To Keep Computer Virus Free

Your computer is infected with the virus? Do you often mysterious error messages? Well this is a common problem in almost all computer users worldwide. There are many viruses and worms out there that could infect your computer. Some are harmless, but they have the ability to make a series of nasty things, up to and including erasing all data on your computer. However, there are ways to keep viruses away from your PC. Here are 12 tips for maintaining a virus free computer.

1. Email is one of the most common ways your computer can catch a virus. So it is always advisable to stay away from spam. Only open e-mail that came from a trusted source, such as from your contacts list. If you use your own host private e-mail (outside of gmail, yahoo, hotmail, etc.), it is strongly recommended to use a good anti-spam software. And finally, NEVER click on a link in the emails that come from untrusted sources.

2. USB / USB is another common way by which the virus spread rapidly. It is always a good habit to scan for viruses before copying the data on your computer. NEVER double-click to open the pen drive. Instead right click and select "Open." This is a sure way to open a USB key.

3. Avoid the use of MS Outlook. Outlook is more susceptible to worms than other email programs, if you do not have effective anti-virus programs running. Use the Pegasus or Thunderbird (Mozilla) or a web-based program, such as Hotmail or Yahoo (Firefox).

4. As we all know, Internet is the most important of all malware, including viruses, worms, trojans, etc. Internet itself contributes to the virus infects up to 80%. So here are some tips for safe surfing habits in order to combat the virus, to the extent possible.

Do not click on popups that announce a sudden catastrophe in your city or announce that it has won an award program. They are the means to deceive Internet users should never trust them.

You can also use a pop-up to automatically block pop-ups.

5. Most of us use search engines like Google to find what we seek. It is quite obvious, malicious web site to get listed in search results. In order to avoid visiting untrusted Web sites, you can download and install AVG LinkScanner, which is freeware. This tool can be very useful and help you to stay away from malicious Web sites.

6. Install a good antivirus program and keep it updated. Also perform full system scan regularly. It is strongly recommended to disable the automatic update. This is the essential task is to protect your PC against Viru. If PC security is your first chance, so it is recommended that you switch to a shareware antivirus software on free. Most antivirus supports the Auto-Protect provides real-time security for your PC. Make sure this function is activated.

7. Install a good antispyware program, which works against malware and spyware on the Internet.

8. Never open attachments from untrusted sources. If it is an image file, text or sound (these attachments end in extensions. Txt,. Jpeg,. Gif,. Bmp,. Tif. Mp3,. Htm,. Html and. Avi ), you're probably, but still do a scan before opening.

9. Do not use discs that others have given you, even at work. The disk may be infected by a virus. Sure, you can run a virus scan on the first check.

10. Configure your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download updates for both operating systems and Internet Explorer. These updates fix security holes in both pieces of software.

11. When downloading files from untrusted sites / sources such as torrents, warez, etc. Make sure you are using a virus scanner before executing them.

12. And finally, you should not visit websites that offer illegal / unwanted animals, such as cracks, serials, warez, etc, contributing significantly to the spread of viruses and other malware.









Add to Cart More Info

10 Tips To Prevent Adware


Adware, malware, spyware and viruses can cause the system to its knees. They are harmful and reduce PC performance. You may need to exchange information. You can lose a single file. Keep the nasties away from your computer using these ten simple tips.

1. Use Firefox Internet Explorer is the most popular browser on the market, controlling a market share above 50%. Virus and adware authors specifically look for exploitable vulnerabilities in IE, because they know they are getting the best return on investment. You have to switch to Firefox to avoid some of the adware from infecting your computer.

2. Scan your PC once a week: Sometimes adware programmers sneaky approach. They will create their programs to run in the background to spy on your activities. The weekly analysis is needed to eliminate one of those sneaky bug.

3. Download the famous sites: New site installation of adware are popping up all the time. If you find something you want to download, make sure that it comes from a known site. The company such as Amazon will not steer you wrong, but Bob's House of Wares perhaps a little 'less reliable. If you're not sure you can trust your site to perform a quick search.

4. Install Adaware: Ad-Aware is the most popular free program to remove adware on the market. Detects, quarantines and removes adware. Find other programs that are installed, noting in an easy to use. This program has no anti-virus attachment.

5. Do not click on unsolicited e-mail: You are constantly receiving offers to increase or improve this by e-mail unsolicited. Your curiosity can kill you, but do not check these emails. Then, when accepting a permit to install adware, spyware and other malicious programs on your computer.

6. Install antivirus software: installing two antivirus or adware protection programs is a smart idea. It serves as the strengths of the program to increase the overall strength of anti-adware and anti-viral drug campaign. Some of the best antivirus software is free and offers real-time protection. Programs should look Antivir Avast and AVG.

7. Do not install the toolbar: Some sites to install custom toolbars. They slow your system and to collect information about your browsing habits. Even though the toolbar can offer some advantages, it is also possible to reduce the drag system will stop the experience. Toolbars places less known to install adware and sometimes infect your computer completely.

8. Look at your Task Manager: If something seems out of place with the computer, take a look at your task manager. This tells you about all the programs and processes running on your computer. Examine the processes tab for something that you do not immediately recognize. Perform a web search for unknown processes.

9. Do not click on pop-ups: If you click a popup usually spells certain death for your computer. He opens the door to viruses and adware infecting your machine wanting, says that these malicious programs to go home. Stay away from them permanently announced screensavers and icons.

10. Trust your gut: If you do not feel well on a website, do not go. If you receive warnings from antivirus programs and AntiAdware you have installed, do not go. If you do not like the layout of a website, do not go. Trust your instincts on websites.

With adequate vigilance, you can continue to worsen adware, spyware and malware from your machine. Trust your instincts. Install Ad-Aware and antivirus software. Play it safe. The care you spend in preventing adware from infecting your machine can save time and money.

Add to Cart More Info

A Virus Program To Disable USB Ports


Virus prints of this post I will show you how to create a simple virus to remove / block the USB port on your computer (PC). As usual, I use my favorite C-programming language created by this virus. Anyone with basic knowledge of C should be able to understand the work of this virus program.

Once the virus is executed, it will immediately disable all USB ports on your computer. Therefore, you will not be able to use your USB stick or other USB device on the computer. The source code for this virus is available for download. You can test the virus on your computer without any worries because I also have a program to reactivate all USB ports.

1. Download USB_Block.rar file on your computer.

2. The following 4 files.

block_usb.c (source)

unblock_usb.c (source)

3. You must compile them before running it. A step by step procedure for developing C programs can be found in my post - How to compile C programs

3. After compiling that block_usb.exe block_usb.c virus is a single block (disable) any computer's USB port when you run (double click).

4. To test this virus, just run the file and put block_usb.exe USB Flash Drive (pen drive). Now you can see that the pen drive will be seen. Re-use USB ports to run only unblock_usb.exe (you will need to assemble unblock_usb.c) file. Insert the pen drive and it should be noted.

5. You can also change the icon for this file, so it looks like a legitimate program. More information about this refer to my post - How do I change the icon and exe file (This step is optional.)

Add to Cart More Info

How To Work To Prove Your Antivirus - EICAR Test

Have you ever wondered how to test your antivirus software to ensure it works properly? Well here's a quick and easy way to test your antivirus. The process is called EICAR test, which works with any anti-virus and was developed by the European Institute for Computer Antivirus Research. This process can be used by individuals, companies and antivirus programmers to verify the proper functioning of antivirus and antimalware without having to deal with computer viruses that can cause real damage to your computer. Here is a step by step procedure to test your antivirus.

1. Open Notepad (text document) and copy the code below exactly on it and save the notepad.

EICAR test methods

X5O! P% @ AP [4 \ PZX54 (^ P) 7 cc) 7} $ EICAR standard antivirus-TEST-FILE! $ H + H *

2. Rename the file from New Text myfile.com document.txt

3. Now run the virus scan on this file myfile.com.

If your antivirus is working properly on your computer, then it should generate an alert and immediately delete the scanned file. Otherwise, you may need to reinstall the antivirus.

NOTE: Most antivirus pop out a warning message in Phase-1 is

Myfile.com can also place the file in a ZIP or RAR file and run an analysis on this issue to ensure that the antivirus software can detect the test string in the archive. Any virus in the analysis of this file corresponds exactly as you would a real virus / malware. This test does not harm your computer, even if the antivirus is marked as a malicious script. So the safest way to test the proper operation of any virus.


Add to Cart More Info

Thursday, March 3, 2011

How To Make A Trojan Horse

Most of you may be curious about how to make a trojan or a virus on their own. Here is an answer to your curiosity. In this post I will show you how to make a simple Trojan horse in its own programming language C. This Trojan while running will eat hard disk space on the root drive (the drive where Windows is installed, typically drive C:) on the computer is running. The Trojan works very quickly and can eat up about 1 GB of hard disk space for each minute it runs. So I'll call it Space Eater Troy. Since the Trojan is written in a programming language level, it is often detected by antivirus software. The source code of this Trojan is available for download at the end of this post. Let's see how it works ... Troy Before going to explain the characteristics of this Trojan you should know exactly what a Trojan horse, and how it works. Like most of us think that a Trojan or a Trojan not a virus. Simply put, a Trojan is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allows unauthorized access to the host machine or cause damage to pass computer.Now to work with our Trojan The Trojan was presented as an antivirus program that scans your computer and removes threats. But in reality does nothing but take up disk space on the root drive to simply fill a large trash file. The speed at which hard drive is filled too high. Consequently, the disk fills the room with 100% within minutes of execution of this trojan. Once the disk is full, Trojan reports that the analysis is complete. The victim will not be able to clean the hard disk space with any cleansing program. This is because the Trojan creates a file of great intelligence in the Windows \ System32 folder with the extension. Dll. Since the unwanted file has the extension. Dll is often ignored by the software disk cleanup. Therefore, for the victim, now no way to recover disk space unless you reformat your drive.The Trojan algorithm is as follows 1. Search the root of the drive 2. Go Windowssystem32 just drive 3. Create a file called "spceshot.dll" 4. Start dumping of unwanted data in the file above and continue to increase the size of the disk is full 5. Once the disk is full, stop. Most of you may be curious about how to make a trojan or a virus on their own. Here is an answer to your curiosity. In this post I will show you how to make a simple Trojan horse in its own programming language C. This Trojan while running will eat hard disk space on the root drive (the drive where Windows is installed, typically drive C:) on the computer is running. The Trojan works very quickly and can eat up about 1 GB of hard disk space for each minute it runs. So I'll call it Space Eater Troy. Since the Trojan is written in a programming language level, it is often detected by antivirus software. The source code of this Trojan is available for download at the end of this post. Let's see how it works ... Troy Before going to explain the characteristics of this Trojan you should know exactly what a Trojan horse, and how it works. Like most of us think that a Trojan or a Trojan not a virus. Simply put, a Trojan is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allows unauthorized access to the host computer or cause damage. Now move in the functioning of our Trojan The Trojan was presented as an antivirus program that scans your computer and removes threats. But in reality does nothing but take up disk space on the root drive to simply fill a large trash file. The speed at which hard drive is filled too high. Consequently, the disk fills the room with 100% within minutes of execution of this trojan. Once the disk is full, Trojan reports that the analysis is complete. The victim will not be able to clean the hard disk space with any cleansing program. This is because the Trojan creates a file of great intelligence in the Windows \ System32 folder with the extension. Dll. Since the unwanted file has the extension. Dll is often ignored by the software disk cleanup. Therefore, for the victim, now no way to recover disk space unless you reformat the disk. Troy algorithm is as follows 1. Search the root of the drive 2. Go to the root drive Windowssystem32 3. Create a file called "spceshot.dll" 4. Start the dumping of garbage data in the file, and must be added to its size, until the position is filled 5. Once the disk is full, stop.
Add to Cart More Info

What Is A CAPTCHA, And How Does It Work?

CAPTCHA or Captcha (pronounced ch-Cap-uh), meaning "completely automated public Turing test to tell computers and people outside" is a form of provocation test / answer to ensure that the response is generated only by those and not a computer. In simple terms, the CAPTCHA word verification you will encounter at the end of a registration form when you signed up for Gmail or Yahoo. The following image shows typical examples of CAPTCHA. Almost all Internet users will experience in their daily use CAPTCHA, but few are aware of what it is and why they are used. So in this post, you will find detailed information on how the CAPTCHA works and why they are used. What is the exact purpose CAPTCHA Served? CAPTCPA is mainly used to prevent software robots (bots) to take action on behalf of the real man. For example, when you open a new mail account, you will find a CAPTCHA to the end of the registration form to ensure that the form is filled out by a legitimate interest of men and not automated software or computer bot. The main purpose of CAPTCHA is to propose a test that is simple and easy for any human being to answer, but for a team, it is almost impossible to solve. How to create a test that can tell Computers and Humans Apart? For many CAPTCHA may seem silly and boring, but in reality it has the ability to protect systems against malicious attacks, where people try to game the system. Attackers can use automated software to generate a huge amount of applications, which causes a high load on the target server, which could degrade the service quality of a given system, whether due to expenses or abuse of resources. This could affect millions of users and their legitimate demands. CAPTCHAs can be deployed to protect systems vulnerable to spam e-mail, such as services from Gmail, Yahoo and Hotmail. Users that CAPTCHA? CAPTCHAs are primarily used by sites that offer services such as online surveys and registration forms. For example, offers Web-based email services like Gmail, Yahoo and Hotmail free e-mail accounts for their users. But each registration process, CAPTCHAs are used to prevent spammers from using a bot to generate hundreds of spam e-mail accounts. Designing a system CAPTCHA CAPTCHA has been designed so that the computer does not have the ability that people have when it comes to processing visual information. It 's easier to allow people to view photos and collect models such as the computer. This is because computers are missing a real intelligence, that people have by default. CAPTCHA implementation by users of the image, which has been distorted or occasionally stretch marks, only that people should be able to identify. Sometimes the characters are deleted or presented in a noisy environment is more difficult for computers to find patterns. Most but not all, CAPTCHAs rely on visual evidence. Some web sites implement a CAPTCHA system completely different to tell humans and computers together. For example, a user is presented with four images containing three photographs of animals and containing a flower. The user has to select only those images that contain the animals in them. The Turing test can be easily solved by any human being, but almost impossible for a computer. Breaking the CAPTCHA The challenge is to break the CAPTCHA really hard to teach the computer how to process information the same way as people think. Algorithms and Artificial Intelligence (AI) was designed for the computer to think like people, when it comes to images of textures. However, no general algorithm that can go through and break the CAPTCHA system, and then each algorithm CAPTCHA must be dealt with separately. It might not work 100 percent of the time, but it can work all the time that spammers the trouble.
Add to Cart More Info

Popular products