PC Health Advisor(Buy Here)

Blogroll

Wednesday, April 27, 2011

Create Your Own IM Bot( Yahoo, Gmail) Instant Messenger

This quick tutorial demonstrates how to develop your own functional IM bot that works with Google Talk, Yahoo Messenger, Windows Live and all other popular instant messaging programs.
To begin with, only to learn some basic programming skills (any language that do) and web space to host your bot.
@For this example, I created a dummy bot called "dangerous" to listen to your instant messages. To see this live, add hackingtips011@bot.im your GTalk contact list and start chatting


If you want to write a personal IM bot, just follow these simple steps: -
Step 1: Go http://www.imified.com/ and register a new account of the bot.
Step 2: Now is the time to create a bot that is a very simple script that resides on the public web server.
It could be PHP, Perl, Python or other languages.
Hello World example bot:
The example shows how easy it is to create a bot.
This example is coded in PHP.
<?php
switch ($ _REQUEST [step ']) {
Case 1:
echo "Hello, what's your name?"
break;
Table 2:
echo "Hello". $ _REQUEST ['Value1']. "Where do you live?"
break;
Case 3:
echo "Well, welcome to this world bot hello." $ _REQUEST ['Value1']. " <br> of ". $ _REQUEST ['value2'].". <reset> "
break;
}
?&gt;
Step 3: Once the script is ready, put it somewhere on your web server and copy the complete URL in the clipboard.
Step 4: Now, signed imified paste the script into the URL
Screen Name: hackingtips011.blogspot.om
Search Engine Script URL: http://www.hackingtips011.blogspot.com/imbot.php
Step 5: Add to that, im a robot buddy list. That's it.
This is a very simple robot, but the possibilities are endless.
For example, you can write a bot that sends e-mail to all close friends through a simple IM message. Or you can write a will does currency exchange.
Add to Cart More Info

Friday, April 22, 2011

Thursday, April 21, 2011

Catching a Hacker

Hacker care: A con artist is caught sooner or later

The hackers broke into Pentagon computer - again. When news of this, plus the fact that other hackers are constantly looking to steal the identities of people to spam innocent computer crime and computer hacking in unauthorized places

makes it necessary for illegal hackers get caught. If you're one of those who have suffered a hack attack, so you can be one of those who say: ". I need a specialist in IP, to catch a hacker" This article will show you things you can do.

How hackers were

The fact that Microsoft and some other software companies were informed - yes, hackers, there are many "holes" in the hacker could exploit Windows. Microsoft has responded by looking to solve the "holes" every time you said one. Then send a patch to prevent hackers through the "hole". Peace with the update, Microsoft has a way to close the problems that exist in the Windows software - even if it is not known whether all these "holes" ever known.

Usually, it is quite difficult to see that a hacker has hacked into the computer. If there is only a ride, or take the minimum amount of data - you really can not be sure that you get hacked. They are some of the effects of computer hacking, although this may tell you something. Here are some ways to detect intruders.

Pirates detection

Hackers are by nature very cautious. Their ability to access your computer over the Internet can easily be done without his knowledge - and most of them seem to prefer this approach. Before time is spent on being able to detect an intruder, it is noted that a determined attacker will not stop! Receive - including the Department of defense systems!

There are some common things that may tell you something about an intruder is:

* Lights indicate hard drive activity is busier than my role as a

* Suspicious files left on your computer - often in the Windows Temp directory tmp. suffix

* Handling obvious - corrupt files, missing files, etc.

* Or, worst - someone taking money from your bank account or credit card (Please note, however, that this could be the result of "phishing", too - not necessarily the piracy)

* Firewall to receive multiple packets from one address and notify you.
Add to Cart More Info

WiFi Hacking

WiFi is a wireless internet use, cables are not needed and it was originally designed for use with laptops and mobile phones. WI-FI has become increasingly popular due to the lack of cables and cheap installation costs. Many people now use WiFi instead of the normal Internet connection. Disadvantages include WI-FI WI-FI that can be easily hacked. The most common form of encryption for the Wi-Fi can only be hacked, even if it is properly configured. There are people who travel around a laptop looking Wi-Fi connection with no guarantee that can be hacked.

Using these methods, a person could "fly" using the Internet to someone else and break into files with ease. Thus, many hackers use other people to break WI FI connections secure access to files which a connection can be more difficult to trace them as it is wireless, and on behalf of another person. This type of piracy can be severe if firms have important files using WI FI sensitive information involved in the files can be easily accessed by a hacker. There have been convictions of this type of piracy. COMPUTER REPAIR HOME STUDY (BUY HERE )Click Here!

Add to Cart More Info

PHP Security Hardening Php.ini

default configuration file for PHP, php.ini (usually located in / etc / php.ini in most Linux systems) contain a number of features that can be used to help protect your Web applications. Unfortunately, many PHP users and administrators are not familiar with the different options that are available in the php.ini file and leave the file in its own securities. Using some of the security-related options in the configuration file, can greatly improve the security posture of web applications on your server.

Safe Mode

PHP safe mode is an extensive "efforts to solve security problems shared server, which contains many useful features. Note that support safe mode will be removed in the sixth PHP Safe Mode if efficiently control the functions in one file on the server affect all other files have the same owner. For example, if you have a page script1.php trying to read the contents of a folder img /. Safe Mode with checkpoints UID and script1.php img / folder. If they match, then the script to access if they do not fit so safe mode will disable access. This is an interesting safety mechanism that allows you to restrict access by scripts directory outside the normal application installation. Safe Mode can cause problems even when the Web server ends up owning the files (for example, when a new file is uploaded or created by a application, it is usually owned by "apache" or a similar web server account).

Safe mode will also restrict executables that can be handled by scripts in the same way that restricts access to files and directories. Safe mode can also be configured so that only the binaries from a directory can be executed. This can help limit the exposure of the shell command scripts.

To enable safe mode, modify (or add) the safe_mode directive in php.ini to:

safe_mode = On

In some cases, you want to use a group to verify the property (for example, if you have several scripts for Web application deployment of people). To be sure to check the user group permissions to use:

safe_mode_gid = A

To restrict the directories, which may be associated with executable files, or use the following directives in the php.ini file:

safe_mode_include_dir = / path / to / dir

safe_mode_exec_dir = / path / to / exec / dir

Safe mode has many other useful functions that are of interest. Review the documentation on the website and see if PHP safe mode is adapted to its environment.

Include Limitation

Use PHP open_basedir made much sense since most file contains vectors of vulnerability. This directive restricts all PHP files in the specified folder and below. It is common for attackers to find ways to include local files from PHP scripts to detect local system files via the web server. For example, an attacker if a file inclusion vulnerability, they could try to include the file / etc / passwd to list all user accounts on the system. PHP with open_basedir is used to limit the inclusion of files to the web root, eg / var / www. Once you put the files outside this directory can not be included in scripts, so the above attacks will fail. To enable the open_basedir to update your php.ini to include:

open_basedir = / path / to / web / root

Disable functions

There are some features in PHP that you probably do not want your developers to use because of the danger they represent. Even if you know your users not to use certain functions, it is wise to disable them completely so that an attacker can not use them. This safeguard is particularly effective in stopping an attacker who managed to upload a PHP script that writes a file system, or even include an external file PHP. By disabling the feature ensures that you can limit the effectiveness of these types of attacks. It should be noted that it is almost impossible to do anything to prevent an attacker to execute a command on a shell disabling features, but it certainly can stop an attacker who is not a good PHP programmer.

To disable functions like shell_exec () and system () can prevent users and attackers to use these functions. It is important to limit the functionality for developers, because the use of these commands open the possibility of the vulnerability of remote code execution if not used carefully. Certainly, there are cases of operations such as executing a command shell, but a pack of PHP provides functions that are essentially the same. Developers can standardize on one of these functions and the rest can be disabled to avoid attacks. If this is not a foolproof solution is likely to prevent attacks like the terrible C99 shell. To enable the disable_functions directive can simply add to your php.ini file with a list of comma-separated functions to be restricted. For example:

disable_functions = php_uname, getmyuid, relays getmypid, leak, listen, diskfreespace, tmpfile, link, ignore_user_abord, shell_exec, dl, set_time_limit, executive system, highlight_file, source, show_source, fpaththru, virtual posix_ctermid, posix_getcwd, posix_getegid, posix_geteuid, posix_getgid, posix_getgrgid , posix_getgrnam, posix_getgroups, posix_getlogin, posix_getpgid, posix_getpgrp, posix_getpid, posix, _getppid, posix_getpwnam, posix_getpwuid, posix_getrlimit, posix_getsid, posix_getuid, posix_isatty, posix_kill, posix_mkfifo, posix_setegid, posix_seteuid, posix_setgid, posix_setpgid, posix_setsid, posix_setuid, posix_times, posix_ttyname, posix_uname , proc_open, proc_close, proc_get_status, proc_nice, proc_terminate, phpinfo

Avoid disclosure

Attackers often use information exposes your web server for information about configuring the server, the application and components. Error messages are among the most common forms of disclosure of information, often information leakage as the installation path of applications, database connectivity, data model details such as table and column names, and details such as script variables. Although this information is invaluable for debugging developer, is useless for end users and dangerous to expose the attackers. PHP debugging output should be disabled in php.ini:

display_errors = Off

This prevents PHP error at run time in the pages sent to users. PHP will continue to log errors as usual, however, so they can be examined by developers. Beware development tactics to stop the execution of PHP errors, however, that disabling this feature does not preclude disclosure of information. Some developers may use the custom debug output embedded in HTML comments, FirePHP third party tools or to write PHP error logs using local guides. Htaccess and the error_log directive. However, preventing the display of errors by default, reduce the opportunity to present information to the attackers.

Disable Globals

Global variables are not horrible for PHP 3 days. Most of the distribution of global variables in the registry is set to OFF (and, fortunately, is not supported in future versions of PHP). However, you must ensure that the directive is properly in place. You should find the following in php.ini:

register_globals = Off

Register Globals variables allows HTTP to be used without indicating their source. For example? If a developer wants to use a URL variable named 'id', for example, the URL request index.php id = 4, with globals, they can simply use $ instead of $ id ['id'] _GET. It is a great convenience, but it can cause collisions. For example, a post of shape if you use a variable called "id" and there is a variable $ id is set in a script and a user changes the URL of the script to include an "id =" in the URL, variable that has priority? Even more damaging is the possibility for hackers to change the configuration variables as the DOCUMENT_ROOT from the URL. This can cause endless problems, especially if the attackers are able to call scripts that are normally included in other scripts and expect predefined variables which can be replaced by GET variables to a hacker.

Many older programs may require global register variables. If so, at least limit the configuration files specific application instead of all your PHP installation. You can do this using PHP directives. htaccess file included in specific folders. Make sure register_globals is off, but in your php.ini!

Delete remote file contains

Attackers often try to identify the file inclusion vulnerabilities in applications and then use it to include malicious PHP scripts they write. Even if an attacker has write access to files of the web application if the inclusion of remote files allowed the attacker can host malicious PHP scripts on other web servers and applications will be downloaded and run locally! This can have devastating consequences. To limit the execution of remote files to be sure of the following in php.ini:

allow_url_fopen = Off

allow_url_include = Off

This prevents remote scripting to be included and executed by the scripts on your system.

Updates Restrict file

If you do not use the upload feature one of your PHP scripts so it's a good idea to turn it off. Attackers will try to file (wrong) to download to quickly inject malicious scripts into web applications. By disabling file downloads completely, which makes moving scripts on your web server more difficult. To disable file uploads file_uploads change directive in php.ini as follows:

file_uploads = Off

Even if you allow the download of files, you must change the default temporary folder used for downloading files. This can be done by changing the upload_tmp_dir directive. You can also choose to limit the size of files that can be downloaded. This is usually a change of system administration of a security patch, but it may be useful. Use the upload_max_filesize directive to that effect. To limit the downloading of files and file sizes change your php.ini file so it reads:

upload_tmp_dir = / var / php_tmp

upload_max_filezize = 2M

Secure Sessions

Popular flight session is an attack that allows an attacker to hijack the session of a legitimate user. Using session hijacking an attacker can bypass portions of the authorization and access applications to the Web without permission. PHP uses strong (which means long-generated pseudo random) session identifiers to guess a session ID is extremely difficult. When connected to a PHP application, you can see in your browser and can identify a cookie with a name like "PHPSESSID" and a value similar to 'bbbca6bb7a23bdc8de3baef2b506e654. The cookie consists of 32 hexadecimal characters, which makes it extremely difficult to predict. The flaw in this system, however, is that session IDs are written to the file system where PHP can be created to track them. Change the default location for session identifiers confound attempts to read. To change the location where information is written in the session to change the session.save_path in the php.

ini settings, so that it points to the desired position like this:

session.save_path = / var / lib / php

Make sure your web server can read and write to the location you specify, however, or sessions will not work. You can also set the PHP, it writes the cookie to be inaccessible to JavaScript. If you do not have PHP applications that use JavaScript to manipulate cookies is an excellent idea. Hackers often use Cross Site Scripting (XSS) bugs in web applications to inject JavaScript code into pages that can be used to steal session cookies. By setting the php.ini directive:

session.cookie_httponly = 1

JavaScript you limit access to your cookies. Another safety feature some PHP to check the values ​​HTTP judge, the session information is not disclosed internally while a user views an application. This prevents users from accidentally disclose information about the session in a manner that will allow users to track external links and steal one session. This is particularly useful if information about the session is being adopted in a URL that could accidentally be released on a mailing list or website. To enable this feature, you must use the following in php.ini:

session.referer_check = your_url.tld

Add to Cart More Info

Wednesday, April 6, 2011

Get Facebook E-mail - Invitation Announcements


Facebook has new features that provide e-mail users at the time facebook email id is not open to all, you should ask for an invitation invittation.In this new service you need to visit the following link where you will be prompted to click on "Request Invite".



http://www.facebook.com/about/messages/

If you're lucky you get email id yourname@facebook.com soon as possible. Please note that the e-mail to respond to the user public, for example:

Profile: facebook.com / username

So, your e-mail is

E-mail: username@facebook.com

If you do not have a username, you can go here for facebook.com / username / to get or click below

http://www.facebook.com/username/


Add to Cart More Info

Hide IP Address With Hide IP

When surfing the Internet, you leave yourself open to being snooped when the sites. They can track your online travels, know what operating system and browser you use, find your hostname, see the latest sites you've visited, examine your history list, delve into your memory cache, examine your IP address and use it to learn basic information about you such as your geographic location, and more. To a large extent, your Internet life an open book when you visit.

Websites use a variety of techniques to collect and collate this information, but the two most basic are examining your IP address and cookies placed on your PC. Match your IP address with your cookies make it easier for them to create personal profiles.

Hide IP is the software that masks your real IP address to protect your anonymity when surfing the web. On the other hand, hackers can use this software to hide their identity and captured. It 'a benefit for all, and I recommend that every computer should have this program installed.

Hiding your IP block spam from marketers which know your interests, according to the IP when browsing websites. You can use the web-based e-mail to send anonymous e-mail.

We found this application works in a simple and effective: Click on the icon of a padlock, and within seconds the program has found and purchased a fake IP for you. Your real IP address is displayed in the window of the application.

Top Features Hide IP:

Hide IP address

One click to completely hide your IP address. Others will see the fur hides your real IP address IP address and protect your privacy.

Choose your physical location

You decide which countries to enter your home, simply by choosing from a list of countries. We have hundreds, hourly updates of available IP addresses.

Anonymous Surfing

You're protected against hackers, who will be attracted to your new IP address instead of your right. They will never be able to find any information about yourself by following the masked IP.

Send anonymous email

Hide your IP headers of messages. Be protected when sending emails from Yahoo, Hotmail, Gmail. Upgrading to Platinum Service add-on to protect yourself in Outlook!

Country circumvent restrictions Web Site

Anonymous web browsing restricted sites for your country. Surf on forums where they have been banned.

Supports Internet Explorer, Firefox, Google Chrome, Safari, Opera.

Add to Cart More Info

Sunday, April 3, 2011

Balck Hat Hackers


Black Hat Hackers

Thanks to Hollywood, the black hat hackers have become the iconic image of all hackers around the world. For computer users, piracy has become a word synonymous with social misfits and criminals. Of course, this is an injustice created by our own interpretation of the media, so it is important for us to know what a hacker is a hacker and this (or crack) in black does. So let's learn the black hat techniques and how we make life a little harder.

What is Black Hat hacking?

A black hat hacker, also known as a hacker or hacker dark side (the latter definition is a direct reference to the movie Star Wars and the Dark Side of the Force) is someone who uses his skills with a criminal intent. Examples are cracks in the bank accounts for transfers to their own accounts, the flight information to be sold on the black market, or attacking the computer network of an organization for the money.

Some famous cases of black hat hackers include Kevin Mitnick, who used his black hat hacker skills to get computers in organizations such as Nokia, Fujitsu, Motorola and Sun Microsystems (it should be mentioned that it now has a white hat hacker) ; Kevin Poulsen who took control of all telephone lines in Los Angeles to win a radio contest (prize was a Porsche 944 S2), and Vladimir Levin, who is seized by the mastermind behind the theft of $ 10,000, 000 Citigroup.

Differences between White Hat and Black Hat Hacker

The difference between a black hat and white hat hackers is that the white hat hacker uses his skills and knowledge as a way to defend someone against their aggressors. This means that white hat hackers offer services to businesses, government agencies and educational institutions.

These services include a complete overhaul of their network security, implementation

Add to Cart More Info

Google Hacking And Prevention


Expert advice to keep Google Hacks Bay

Google hacking is here, and if you want to avoid that, you need to know more. Why? Millions around the world have become aware of this powerful tool, and black hackers, who use hacking for criminal activity, do not dismiss its potential. So how do you prevent becoming a victim of a hacker to Google? The only way to do this is to learn these new tricks. So forget using Google Earth hack and it will take time to prepare his defense.

Protecting yourself from Google hackers?

The first step in protecting yourself from something, is knowing that something works. In the case of Google hacking, you'll learn how it can be used to acquire sensitive information from individuals and businesses.

A great place to find a way to hack Google tutorial is Amazon. In this online store you will find two books that can help you. The first was written by Rael Dornfest and Tara Calishain, and it is called Google Hacks: Tips and tools for intelligent search. This book is considered a basic training for any computer user who wants to learn how he can exploit the opportunities offered by Google.

The second book is the Google hacking for penetration testing, written by the author Johnny Long. Considered a more advanced reading, gives the user know that hackers are aware of black. The good news is that this book focuses on the weaknesses that most system administrators who are exploited and ignored by almost all outsiders. Google, as innocent as it is, has become a tool waiting to be exploited.

After reading these two books should be able to make the kind of basis for most of the hacks of Google and some of the most advanced. But like everything in life, you need to master the art of Google hacking. And if you want to sell their services as an expert in network security, it is better to know from A to Z.

The best way is to contact the other hackers in their specialized forums, via IRC or even at several conventions that they celebrate throughout the USA. You will find much information as you have not been able to acquire for yourself.

Add to Cart More Info

Credit Card Hacking


Credit Card Hackers Are Here - Have you checked your credit lately?

hack credit cards has become a headache of new consumer safety. Although remote operations, the percentage of credit card fraud is almost a tenth of one percent in online transactions is as high as two or three percent. This means that for every penny you can make transactions on the Internet, can undergo two or three holes in your information private. Stop credit card piracy is now a priority number of credit card brands in the world.

A funny thing about many of these hackers free credit card numbers are posted on the Internet. Some of them do not want the money potential that can be acquired from these data that the glory.

How are the credit card receipts from hackers?

An attacker has many ways to get a credit card number to an innocent user. The most common is known as phishing. In this technique raises the hacker as an officer in an organization, say VISA. Hacker sends a group email accounts, an alert, instruct the recipient to follow a specific set of instructions before their credit card is canceled.

If the user is not aware of these scams, he will insert his credit card number, name and expiration date without knowing it will be a victim of online crime.

Another form of piracy credit card is through a website. The hacker only needs to hack the systems of an online retailer, for example, Costco, and the search database that stores information that lists all users who have conducted recent operations.

The third way is the process of buying online. Let's say an adult to find a site for adult entertainment that is appealing. E 'likely that the site is just a ruse to obtain credit card information.

What is a map?

A letter is a criminal who specializes in stealing credit card information. Although most of them acquire information from online providers, some of them are wise enough on how to access this information themselves.

In the physical world, a map to steal a user's information while face to face transaction. Criminals simply swipe the card through a special scanner. This device will read from the tape all credit card information. Then the cards will be offended as information on a blank card available in many stores identity.

In the virtual world, credit card hacking is a bit 'more sophisticated and automated. The hacker can install software in a credit card hacking known as Bugbear. This program is a keystroke logger, capture the keys you have pressed the keyboard and after some time, it sends this information to the hacker. Criminal is to look for these data, find all the personal information that give you access to a credit card.

Furthermore Bugbear is also IRC bot. This automated software is used to determine the functions to moderate a chat room. But if it is used by an attacker, he can use it to steal your credit card information. IRC bot will act as an official of a company where you will be prompted to insert your credit card.

Another way that hackers use to steal money from their credit card accounts used by eBay. Once they find a potential victim, the attacker uses a program that began bombing the account until it breaks. Once inside, the hacker used to go by real users, the sale of equipment that never arrived to the buyer when purchasing.

Add to Cart More Info

Hacking Culture


Hackers and Culture? It 's true!

hacker culture has existed for several decades, yet most of us have realized recently thanks to movies like The Matrix. However, piracy of culture was there, and constantly influence our society and our way of seeing the world. To encourage computer literacy, the hacker culture has made its way into our lives.

What the hacker culture?

Hacker culture is composed of all those human experiences and expressions that are related to take advantage of both hardware and software. At this moment there are three types of hackers. The first and most famous black hat hacker is a hacker, or a person who uses his knowledge for personal gain. Usually, this means to steal information that can be sold on the black market.

Pirates of the wildest black hat are able to break the bank accounts without a trace. Fortunately, security and cooperation throughout the World Bank has been able to impose restrictions and control of these people.

On the other side of the white balance is the hacker hack a computer security expert who works with organizations and helps them solve their computer network security.

Finally, there are gray hat hackers. This type of hacking is composed of people who are the thin line between white hat hackers and black hat hackers. Normally, their propensity to be affected by their need for money or their desire for recognition among the hacker community.

What are the origins of the hacker culture?

One could say that the pirates have existed since time immemorial. Although Merriam-Webster describes a hacker as a computer expert, is actually attacking a person looking for weaknesses in the system and try to exploit to their advantage.

Under this definition, Philip II of Macedon, father of Alexander the Great, was a pirate. How so? He noted that a number of weaknesses in the armies of ancient Greece. In order to exploit in its favor, decided to implement a series of improvements to its own army. As history has shown, these improvements have worked in his favor and in favor of its most famous son.

The same could be said of Napoleon, who noted that mobility and artillery could be used so that no army in Europe would be able to resist. Unfortunately for him, he forgot to take into account that logistics is an important thing to consider when mobilized hundreds of thousands of men in the Russian Empire.

Add to Cart More Info

Popular products