Saturday, February 26, 2011

TOP 10 MOST DANGEROUS CELL PHONE VIRUSES





Here are the most dangerous cell phone viruses for symbian based cell phone. Like Computer, cell phones are also using system that

keeps the cell phone running in a proper way. Cell phones are having a problem as well with viruses that attach their operating

system. There are quite lot cell phone viruses. But here’s the most dangerous cell phone viruses for symbian based cell phone as one

of the most popular operating system for cell phone. You have to keep away from it.




1.      CABIR VIRUS








The target of this cell phone virus is Symbian s60v2 mobile phone.Cabir is a virus that spreads via a Bluetooth connection and come into your inbox with an interesting message.

It won’t cause a fatal damage, but the battery of the cell phone will quickly run out because this virus periodically activates Bluetooth of the infected cell phone.



2.    SKULLS VIRUS









The target of this virus is symbian cell phone and spread via the internet.The damage resulted is the mobile phone cannot be used again except to call and receive calls.




3.    COMMWARRIOR VIRUS










The target of this virus is symbian s60v2 mobile phones. The Virus spread via Bluetooth and MMS.It will send replication through MMS to all numbers in contacts, so will make your mobile phone bill high.




4.     LOCKNUT VIRUS





The target of this virus is the symbian s60 mobile phone and spread through the internet download. Locknut E,

one variant of this virus, will damage important files in a Symbian system and causes the infectedapplication could not be opened.By using that way, step by step the cell phone will be locked totally by this virus.



5.     FONTAL VIRUS





The target of this virus is symbian s60 mobile phone and spread through internet download.This virus will lock the cell phone in stages. It will finally lock the phone since it was first turned on.



6.     ROMMWAR VIRUS








The Targets of this virus is symbian s60 cell phone and its spread through Bluetooth, MMS, and internet. This virus cause the phone can’t do booting and often restart itself.



7.      DOOMBOOT VIRUS





The target of this virus is symbian S60 cell phone and spread via Bluetooth. Doomboot make files become corrupted,and after infecting a file, it will put other viruses such as Commwarrior into the mobile phone.

Damaged file will prevent the phone to do rebooting. In addition, this virus also causes the battery run out quickly due to constant use Bluetooth connection.




8.      CARDTRAP VIRUS





The target of this virus is the symbian s60 mobile phone and Windows-based PC. It spread through the memory card and cause important applications become malfunctioned,the chaos system, and damage to the function of the keypad.



9.      PBSTEALER VIRUS








The target of this virus is Symbian S60 cell phone and spread via Bluetooth. This virus will copy the necessary data in the mobile phone For example,

contacts, to-do lists, notes to the format. txt and then will be spread to other mobile phone, using Bluetooth.



10.     APPDISABLER








The target of this virus is symbian based mobile phone and spread through Bluetooth, MMS, and internet. This virus will install other dangerous viruses like Locknut, Cabir, Skulls, etc.

Thus causing the entire operating system broken, you can say, this is the most dangerous viruses that never existed because they combine several types of viruses in once.

Monday, February 21, 2011

Nasdaq's Hack Attack Shocker!












On February 07,2011

Now we can add the market maker to the list of exchanges that have been the victim of cyber terrorism.

The hackers are getting ambitious, it seems. Instead of hacking social security and credit card numbers from little old ladies, they are going to the top of the financial family tree: the exchanges themselves.

Last week the London Stock Exchange reported that it had been the victim of cyber attacks last year and the UK media reported that some US exchanges had also been targeted by these online ne'er do wells.

This past weekend, Nasdaq revealed had been hit by cyber-vandals as well. The news, which came conveniently enough on a Saturday when the market maker is not active, reported that suspicious files were found on Nasdaq's site but no client information was compromised.

Why would a hacker want to disrupt an exchange? Although they can't move funds from one bank account to another or jury rig an ATM to spit out $20s like a toddler with a stomach bug, they can still do some serious damage. If you think about it, the mischief-makers might be out to destroy one company and favor another. Imagine if a major exchange that boasts near zero latency took 10 minutes to report a trade or a stock price? What if you could switch the price of, say, Google and Sears? It's not hard to imagine the havoc if Apple were to become a penny stock for an hour or an entire afternoon.

While we can assume that this could be the work of basement dwelling dweebs, as my former editor once called these hackers, we should also be open to the idea that this could be the work of people from overseas. This is a global marketplace after all and cheap high-speed servers and networks have leveled the playing field. In fact, who's to say that this isn't the work of people who are new to capitalism and have no time for fair play or transparency?

Along with an unnamed UK officials wondering this the LSE attack originated from Russia, the same report cast doubts on the official reason given for the May 6th flash crash that roiled the markets last year.

While we're all speculating, investment firms had better get their security in order. "I think the ultimate fallout from this could be a wake-up call for all of the exchanges and financial services firms to carefully reassess their security policy," says Sang Lee of Aite Group in an interview with Reuters.

With the evidence that two major exchanges were targeted for cyber attacks, one thing is sure: If banks and exchanges do not get their security in order, the days of high-speed trading could see more high-speed crashes.


Sunday, February 20, 2011

Use Your Mobile Phone As Wireless Cam For Your PC/Laptops


DOWNLOAD Motvik WWIGO 1.4  :



Hello Friends now you can video chat with your friends comfortably. Enjoy the freedom of wireless webcam with your mobile phone camera. WWIGO is a flagship product of Motvik. WWIGO stands for Webcam Wherever I Go. WWIGO converts every cameraphone into a webcam for desktop. It consists of two software components. mobile component that resides on phone and streams video to PC. PC component that recieves video.






Features :

Use Camera Phone as Wirless Webcam


Record videos with wwigo PC application.



Use along with Skype, Yahoo Messenger, MSN to do video chat.



Live Upload with to share video.



Video Quality better or comparable to off shelf webcam*



Works with popular Bluetooth Stacks on PC as well with WiFi connections.






Whats New :



Latest wwigo release version 1.4 with support for WiFi is released today. Many IVT & Toshiba bluetooth stack

related issues have been fixed too in the release



You Can Visit company profile: http://wwigo.com

Memory Card Password Hack



 

 

We usually set password for our memory card for privacy and security, but the common mistake every one does at least once in out life time forgetting password. If you set password for mobile memory card, then you should be not forget the password. If you does then the only option is to formate your memory card with the help of the card reader and eventually the loss of all your data stored on it. There is a way to break the security wall. If you are a Symbian device lover then no need to worry about the password. You can crack them in few minutes.


In this tutorial I am going to teach you how to reset your memory card password in easy step. Before we start you need to have X-plore (application used to explore your system files and folder even the hidden folders in your device)

  • Step1: Install X-Plore in your mobile. If you want to download X-Plore search around internet you can download free trail.


 

  • Step2: Open your X-plore apps and Press 0(Zero) and check which you have marked the "show the system files"


 

  • Step3: Once you done that now go to the following path C:/Sys/Data/Mmcstore


 

  • Step4: Once you reached there you need to press "3" under option to set it in the Hex-viewer


 

  • Step5: See the third column you will able to see a line of code ! TMSD02G (c??"?x???6?2?6?2?6). Just check the character between the "?" it is your password ie: 62626


Note: If you have not set the password, then you will not able to gain access to C:/Sys/Data

 

Friday, February 18, 2011

HOW TO HACK INTO A LIVE SECURITY CAMERA

Well this is an interesting article. It is a sub-section of a Hacking Technique known as “Google Hacking”.

All what we are looking at are unsecured cams from around the world that are interfaced with the internet. So how do you find such cameras? Just Google these following strings and select any result. Yo!!!, you can see a live cam on your Computer screen!!

NOTE : You should have  adobe flash player installed.

The strings are given below :







·        inurl:”CgiStart?page=”



·         inurl:/view.shtml



·         intitle:”Live View / – AXIS



·         inurl:view/view.shtml



·         inurl:ViewerFrame?Mode=



·         inurl:ViewerFrame?Mode=Refresh



·         inurl:axis-cgi/jpg



·         inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)



·         inurl:view/indexFrame.shtml



·         inurl:view/index.shtml



·         inurl:view/view.shtml



·         liveapplet



·         intitle:”live view” intitle:axis



·         intitle:liveapplet



·         allintitle:”Network Camera NetworkCamera” (disconnected)



·         intitle:axis intitle:”video server”



·         intitle:liveapplet inurl:LvAppl



·         intitle:”EvoCam” inurl:”webcam.html”



·         intitle:”Live NetSnap Cam-Server feed”



·         intitle:”Live View / – AXIS”



·         intitle:”Live View / – AXIS 206M”



·         intitle:”Live View / – AXIS 206W”



·         intitle:”Live View / – AXIS 210?



·         inurl:indexFrame.shtml Axis



·         inurl:”MultiCameraFrame?Mode=Motion” (disconnected)



·         intitle:start inurl:cgistart



·         intitle:”WJ-NT104 Main Page”



·         intitle:snc-z20 inurl:home/



·         intitle:snc-cs3 inurl:home/



·         intitle:snc-rz30 inurl:home/



·         intitle:”sony network camera snc-p1?



·         intitle:”sony network camera snc-m1?



·         site:.viewnetcam.com -www.viewnetcam.com



·         intitle:”Toshiba Network Camera” user login



·         intitle:”netcam live image” (disconnected)



·         intitle:”i-Catcher Console – Web Monitor”


TOP TEN BEST HACKS

Here is a list off the top 10 hacks of all time.


Early 1990s




Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Micro-systems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.


November 2002




Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. The next hearing in the case is slated for today.


1995


Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online - he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the US, Finland, Holland, Germany and Israel.


1990




When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city's telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.

1983

Kevin Poulsen again. A little-known incident when Poulsen, then just a student, hacked into Arpanet, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network.


1996




US hacker Timothy Lloyd planted six lines of malicious software code in the computer network of Omega Engineering which was a prime supplier of components for NASA and the US Navy. The code allowed a "logic bomb" to explode that deleted software running Omega's manufacturing operations. Omega lost $10 million due to the attack.


1988




Twenty-three-year-old Cornell University graduate Robert Morris unleashed the first Internet worm on to the world. Morris released 99 lines of code to the internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990.


1999




The Melissa virus was the first of its kind to wreak damage on a global scale. Written by David Smith (then 30), Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly $400 million. Smith was arrested and sentenced to five years in prison.


2000




MafiaBoy, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including eBay, Amazon and Yahoo between February 6 and Valentine's Day in 2000. He gained access to 75 computers in 52 networks, and ordered a Denial of Service attack on them. He was arrested in 2000.


1993




They called themselves Masters of Deception, targeting US phone systems. The group hacked into the National Security Agency, AT&T, and Bank of America. It created a system that let them bypass long-distance phone call systems, and gain access to the pbx of major carriers.

Thursday, February 17, 2011

EMAIL TRACKING

Generally, the path taken by an email while traveling from sender to receiver can be explained by following diagram.



So here is the method of tracing the exact location from the email sent.I am showing the email tracing on yahoo here



but gmail and other mail providing services have same concept.



Step 1:-First open up your email account and click on your inbox.



Step 2:-Now Select any email that you want to trace



Step 3:-After Opening scrool the mail at the end and in right corner you will see a option FULL HEADER click on it



Step 4:- Now Closely Look at the the header you will find the whole detail that from which IP address it is sent.




Have a close eye on these contents



1. Received From: - 127.0.0.1(EHLO mail-qy-f200.google.com) (209.85.221.200)



The IP address at last is the real IP address of the person who is sending this mail.



2. To see the proper location of this IP address Go to www.whatismyip.com or www.whois.domaintools.com



These websites help you to find the whole detail and satellite images of the ISP location from the Email was sent.



Mayank's Suggestion:- "After finding the IP address of the sender I recommend to use

www.whois.domaintools.com to get satellite image of the location from the mail is received."

Spoofing Your IP Address

REAL HIDE IP

 

Warning!

Your IP Address 60.254.29.62

Reveals The Following:

You are located in MUMBAI, INDIA
INDIA
It could be used by hackers to commit
crimes against you!





Real Hide IP Hide Your IP to Protect Your Privacy

Are you aware that your IP address is exposed every time you visit a website? Do you know that many websites and hackers use your IP address to monitor your home address and other personal information?

Real Hide IP allows you to surf anonymously, keep your IP address hidden, protect your personal information against hackers and provide full encryption of your online activity, all with a simple click of a button.


Key Features


  • Hide Your Real IP Address
    Be assigned fake IP addresses from different countries to conceal your real IP.
  • Anonymous Web Surfing
    Surf anonymously with fake IP, whenever you want to.
  • Protect Your Identity Against Hackers
    Protect you from hackers and identity thieves who will be tricked by your fake IP.
  • Un-ban Yourself from Forums or Restricted Websites
    Real Hide IP allows you to access any forums, blogs or websites that have ever banned you.
  • Prevent Websites from Tracking Your Online Activities
    Hide your real IP when you are surfing the Internet to prevent you from being tracked by websites


How It Works?










  Screenshot :

 


You can download it full version from here your link  is shown below >>
 http://hotfile.com/dl/103665979/235e7bb/Real.Hide.IP.4.0.9.6.rar.html



After downloading this file how to make it full version:

1. Unzip rar file & before that disable your Antivirus because  a file named patch contained in it can be detected as trojan & thats your file to make it full version so be careful.

2. Install Setup file of Real hide ip after installing currently your software will be in trial mode so close the application completely from the system tray also.

3. Copy the patch file into the installed folder of Real hide ip & then run that patch file ,the command button named "Crack It" on that window press that & ur finally Converted into full version Real hide ip.

Now run Real hide ip software set which countries ip address you want to display as fake ip address after clicking on hide ur done with it just check it out on http://www.findmyipaddress.com your spoofed ip address will be displayed.

Enjoy!!




ANOTHER METHOD FOR SPOOFING YOUR IP ADDRESS MANUALLY :

Here are the steps below :

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back...





Wednesday, February 16, 2011

How to hack WEP encrypted Wifi network using Backtrack 3 & Vmware 7

Mayank kapoor ---


You already know that if you want to lock down your Wi-Fi network,


you should opt for because WEP is easy to crack. But did you know how easy? Take a look


Today we're going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. But first, a word: Knowledge is power, but power doesn't mean you should be a jerk, or do anything illegal. Knowing  how to pick a lock doesn't make you a thief. Consider this post educational, or a proof-of-concept intellectual exercise.

Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Here's how it goes.

 


This article will explan how to crack 64bit and 128bit WEP on many WIFI access points and routers using Backtrack, a live linux distribution. Your mileage may very. The basic theory is that we want to connect to an Access Point using WEP Encryption, but we do not know the key. We will attack the wifi router, making it generate packets for our cracking effort, finally cracking the WEP key. I have tested this technique on Acer aspire 5740 but its network adapter was not compatible insted of that i used USB Wireless Network adapter.

What You'll Need


Unless you're a computer security and networking ninja, chances are you don't have all the tools on hand to get this job done. Here's what you'll need:

  • A compatible wireless adapter—This is the biggest requirement. You'll need a wireless adapter that's capable of packet injection, and chances are the one in your computer is not. After consulting with my friendly neighborhood security expert, I purchased an Belkin G Wireless USB adapter, pictured here...



  • A Backtrack 3 Live CD the Linux Live CD that lets you do all sorts of security testing and tasks. Download yourself a copy of the CD and burn it, or load it up in VMware to get started. (I tried the BackTrack 4 pre-release, and it didn't work as well as BT3. Do yourself a favor and stick with BackTrack 3 for now.)

  • A nearby WEP-enabled Wi-Fi network. The signal should be strong and ideally people are using it, connecting and disconnecting their devices from it. The more use it gets while you collect the data you need to run your crack, the better your chances of success.

  • Patience with the command line. This is an ten-step process that requires typing in long, arcane commands and waiting around for your Wi-Fi card to collect data in order to crack the password. Like the doctor said to the short person, be a little patient.



Crack That WEP


To crack WEP, you'll need to launch Konsole, BackTrack's built-in command line. It's right there on the taskbar in the lower left corner, second button to the right. Now, the commands.

First run the following to get a list of your network interfaces:
airmon-ng

The only one I've got there is labeled ra0. Yours may be different; take note of the label and write it down. From here on in, substitute it in everywhere a command includes (interface).

Now, run the following four commands. See the output that I got for them in the screenshot below.

airmon-ng stop (interface)
ifconfig (interface) down
macchanger --mac 00:11:22:33:44:55 (interface)


airmon-ng start (interface)


If you don't get the same results from these commands as pictured here, most likely your network adapter won't work with this particular crack. If you do, you've successfully "faked" a new MAC address on your network interface, 00:11:22:33:44:55.

Now it's time to pick your network. Run:
airodump-ng (interface)

To see a list of wireless networks around you. When you see the one you want, hit Ctrl+C to stop the list. Highlight the row pertaining to the network of interest, and take note of two things:

its BSSID and its channel (in the column labeled CH), as pictured below. Obviously the network you want to crack should have WEP encryption (in the ENC) column, not WPA or anything else.



Like I said, hit Ctrl+C to stop this listing. (I had to do this once or twice to find the network I was looking for.) Once you've got it, highlight the BSSID and copy it to your clipboard for reuse in the upcoming commands.

Now we're going to watch what's going on with that network you chose and capture that information to a file. Run:
airodump-ng -c (channel) -w (file name) --bssid (bssid) (interface)

Where (channel) is your network's channel, and (bssid) is the BSSID you just copied to clipboard. You can use the Shift+Insert key combination to paste it into the command. Enter anything descriptive for (file name). I chose "yoyo," which is the network's name I'm cracking.



You'll get output like what's in the window in the background pictured below. Leave that one be. Open a new Konsole window in the foreground, and enter this command:
aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 -e (essid) (interface)

Here the ESSID is the access point's SSID name, which in my case is yoyo. What you want to get after this command is the reassuring "Association successful" message with that smiley face.

 

 



You're almost there. Now it's time for :
aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface)

Here we're creating router traffic to capture more throughput faster to speed up our crack. After a few minutes, that front window will start going crazy with read/write packets.

(Also, I was unable to surf the web with the yoyo network on a separate computer while this was going on.) Here's the part where you might have to grab yourself a cup of coffee or take a walk. Basically you want to wait until enough data has been collected to run your crack. Watch the number in the "#Data" column—you want it to go above 10,000. (Pictured below it's only at 854.)

Depending on the power of your network (mine is inexplicably low at -32 in that screenshot, even though the yoyo AP was in the same room as my adapter), this process could take some time. Wait until that #Data goes over 10k, though—because the crack won't work if it doesn't. In fact, you may need more than 10k, though that seems to be a working threshold for many.

 



Once you've collected enough data, it's the moment of truth. Launch a third Konsole window and run the following to crack that data you've collected:
aircrack-ng -b (bssid) (file name-01.cap)

Here the filename should be whatever you entered above for (file name). You can browse to your Home directory to see it; it's the one with .cap as the extension.

 

If you didn't get enough data, aircrack will fail and tell you to try again with more.

If it succeeds, it will look like this:

 

The WEP key appears next to "KEY FOUND." Drop the colons and enter it to log onto the network.



Problems Along the Way

With this article I set out to prove that cracking WEP is a relatively "easy" process for someone determined and willing to get the hardware and software going.

I still think that's true, but unlike the guy in the video below, I had several difficulties along the way. In fact, you'll notice that the last screenshot up there doesn't look like the others—it's because it's not mine.

Even though the AP which I was cracking was my own and in the same room as my Belkin, the power reading on the signal was always around -40, and so the data collection was very slow, and BackTrack would consistently crash before it was complete. After about half a dozen attempts (and trying BackTrack on both my Acer and PC, as a live CD and a virtual machine), I still haven't captured enough data for aircrack to decrypt the key.

So while this process is easy in theory, your mileage may vary depending on your hardware, proximity to the AP point, and the way the planets are aligned. Oh yeah, and if you're on deadline—Murphy's Law almost guarantees it won't work if you're on deadline.

To watch one more way crack encrypted  wep check out this video :









Tuesday, February 15, 2011

How to Activate Your Windows 7 and Make Genuine



Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately a year! Here is a way to do that.


1.      Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to second step.


2.      Now type the following command and hit enter

slmgr –rearm



3.      You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.


4.      Now comes to the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows

NT\CurrentVersion\SoftwareProductionPlatform



5.      In right-side pane, change value of SkipRearm to 1.


6.      Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.

NOTE :  AS YOU HAVE SEEN  THAT   YOUR WINDOWS IS ACTIVATED  BUT  ITS NOT GENUINE

TO make it Genuine a tool called WINDOWS LOADER (Working with Windows 7 only)

>>If we talk about windows xp, previously we were just putting a original serial key for different service packs during installation to make it genuine but as per the security gaps i.e loopholes or flaws founded , Microsoft launched windows vista but it also didn't worked more  to capture the market NOW finally WINDOWS 7 Introduced & Its going really awsm >>

Download this tool from here & make sure your antivirus should be disable at the time of  running

NOTE : Pls read the README file before use !!!

here is the link >> http://depositfiles.com/en/files/8pjxmbh3z

Monday, February 14, 2011

How To: Install Windows 7 from a USB Stick or PD :)





 








Time = 1 hour OR it depends upon your RAM


What you need:

  • 4GB USB or PD

  • Any Of Your Choice Windows XP,VISTA,Win 7



1.    Format Your USB Key


Plug in your USB key and back up any existing data stored on it. You’ll need to format the key before you can make it a bootable device.



 

Open up a Command Prompt as an Administrator. You can do this by finding the cmd.exe in yoru Windows/System32 folder, right-clicking the executable, and selecting “Run as Administrator”. Alternatively, type CMD in the Start Menu search field and activate the Command Prompt usingCtrl + Shift + Enter.



You should be under c:\Windows\system32 (assuming your Windows partition is the C drive). Type “diskpart” in the command line to enter the Disk Partition command line tool, which lets you format and create partitions on active disks.

Type “list disk” to reveal a list of all your active disks, each of which is associated with a number. Make a note of which one is your USB key, based on the capacity. In our screenshot below, our USB drive is Disk 6 (8GB).

 



Next, type the following commands, one at a time:

Select Disk # (Where # is the number of your USB disk. We typed “Select Disk 6”)

Clean (removes any existing partitions from the USB disk, including any hidden sectors)

Create Partition Primary (Creates a new primary partition with default parameters)

Select Partition 1 (Focus on the newly created partition)

Active (Sets the in-focus partition to active, informing the disk firmware that this is a valid system partition)

Format FS=NTFS (Formats the partition with the NTFS file system. This may take several minutes to complete, depending on the size of your USB key.)

Assign (Gives the USB drive a Windows volume and next available drive letter, which you should write down. In our case, drive “L” was assigned.)

Exit (Quits the DiskPart tool)

 



 

2.    Turn the USB Key into a Bootable Device


Insert the Windows 7 install DVD into your drive, and view the files that it contains. Copy all of the files here to a folder on your Desktop. We put the disc contents in a folder named “Windows 7”



Go back to your command prompt, running it as an Administrator. Using the “CD” command, find your way to the folder where you extracted the ISO files. Your command line path should look something like “C:\Users\USERNAMEHERE\Desktop\Windows 7\”.

Type the following commands:

CD Boot (This gets you into the “boot” directory)

Bootsect.exe /nt60 L: (where ‘L’ is the drive letter assigned to your USB key from the previous step)



Bootsect infuses boot manager compatible code into your USB key to make it a bootable device.

IMPORTANT: If you’re currently running 32-bit Windows Vista or 7, Bootsect will only work if you use the files from the 32-bit Windows 7 install disc. The Bootsect executable from the 64-bit version will not run in 32-bit Vista.

3.    Load the USB Key Up with the Install Files




Copy all of the extracted ISO files into the USB drive. You don’t need to do this from the command prompt. Just drag and drop the files from the “Windows 7” folder into the drive using Windows Explorer.

Your USB key is now all ready to go! Plug it into your target system and make sure you enter the BIOS (typically with F2 or F12) to temporarily change the boot order to allow booting from the USB key before your primary hard drive or optical drive. On the next restart, your system should automatically begin speedily loading setup files off of the USB key and entering Windows 7 installation.



 

Is ankit fadia really a hacker?



There are only few people in the hacking field who have never heard about Ankit Fadia ,the so called self declared  “India’s Best Ethical Hacker” ,There are lot of arguments and facts against him , Some people says  he is not a HACKER he is just a good businessman who knows how to make fool of the peoples . The thing that made him so much famous is only Media coverage nothing else. Now lets talk about Fadia's  claims and some facts about him .
At the age of 14 Ankit Fadia  started awebsite called “HackingTruths”, which he claims was judged as the “second best hacking site in the world by the FBI”. I don’t know when did FBI started rating hacking sites? it is because nothing such like this happened. It a world know truth FBI never ranks anywebsite

Fadia  also claims that when he was 14, he trashed the front page of an Indian magazine's website. He then sent an e-mail to the editor confessing to the hack, suggesting counter measures. let me ask a question has he ever submitted any exploit? did he ever created tools for hacking ? the answer is N0, a big NO .

He is also claims to be involved in decrypting a message from an Al Qaeda operative. But when there is not a single published work of Ankit Fadia involvement about  cryptography or cryptanalysis then how the how he can decrypt any message and that too from AL QAEDA and Most intelligence agencies like NSA have expert cryptanalyst with PhD’s and super fast clusters to get their job done. They wont require a 16 year old.

He is also been reported to be working with CIA and FBI . yeah you heard it right CIA and FBI .I think Americans have shortage of hackers in their own country that’s why they are hiring such noobs.

"Fadia had claimed that his alert to a U.S. spy agency had prevented an attack by Pakistani hackers. However, he never divulged the name of the agency, citing security reasons."

In December 2009 Fadia’s business site, hackingmobilephones.com was hacked by a spammer promoting pharmaceutical products for erectile dysfunction. Fadia again "claimed it had happened because of a fault in the server that hosts his site. "The problem lies in the server and all the sites hosted by it have been infected." However all web servers give their customers an option to build their own security installing their own (customer’s) software and patches when they opt for private servers. Might be MR FADIA Did not have any excuse better then this one .

Recently in his commercial seminar he called Indian hacking groups as Indian cyber criminals.the angry hackers crew hacked and defaced his site. So now the question is the so called “INDIA’S BEST HACKER” cant he secure his site from other hackers?

Now lets talk about his courses and books :–

At 15, his book on Ethical Hacking made him the youngest author to be published by Macmillan India. he claims that his books are being “used as text books incomputer security courses across South-East Asia”
lol what a joke.If you will ever read his books you will find that he has copied each and every single page from other best selling hacking books .and the harshest part of all he don’t even gives credits to the authors and other hackers , he simply steals their work.

His course ANKIT FADIA Certified Ethical Hacker (AFCEH) powered by reliance claims to make you an security expert in just “3 bloody months” . WOW what an opportunity for a newbie to become a hacker .
but the thing is the certificate given by him are not valid . Read this

http://lists.sarovar.org/pipermail/plus-discuss/2006-April/000288.html

The thing is no one can be a hacker or a good security expert in just 3 months. It takes a lot of time or I say it takes many years to become a HACKER.

In one of his seminars he said that Linux is CRAP and advised them to use windows for hacking purpose rather then Linux.

I haven’t seen any hacker saying Linux a crap and advising to use windows . and neither will a hacker say these words because he knows Linux the the mother of all hackers. there is no hacking without Linux possible in today’s world except social engineering .

NOW YOU JUDGE WHO IS ANKIT FADIA? A HACKER OR A NOOB. You can read about this false claims at Wikipedia  http://en.wikipedia.org/wiki/Ankit_Fadia .

















Security Breaches


Hackers hit Mark Zuckerberg



ON JANUARY 26, 2011 12:21 PM IN ONLINE SCAMS





Hackers have broken into the account of none other than Facebook founder Mark Zuckerberg.

Proof, as if it were needed, that everyone's online information is potentially at risk.

This case doesn't seem to be the work of criminals but someone apparently upset that Facebook is borrowing from banks.

"Let the hacking begin: If facebook needs money, instead of going to the banks, why doesn't Facebook let its users invest in Facebook in a social way?" read the strange post on Zuckerberg's page.

"Why not transform Facebook into a 'social business' the way Nobel Prize winner Muhammad Yunus described it? What do you think? #hackercup2011"

Before being taken down the post notched up 1,800 "likes".

"Facebook users - famous or not - need to take better care of their social networking security," said Graham Cluley, senior technology consultant at online security experts Sophos.

Remember, make those passwords obscure and change them regularly. Though, not wanting to be too alarmist, it's probably worth pointing out that celebrities are more at risk than the rest of us if they're employing third parties to run their online social networks. As Sophos puts it: " an account which can be accessed by many different users with many different passwords is at greater risk than an account used by just one person."


Hacker's Want Advertisements



With so much unemployment, especially in the IT community it is no wonder you can find, Hired Hackers online. Panda Security highlights just an example, Facebook hacking. For $100 you can hack into any account you wish. These hackers do not guarantee 100% success, but my guess is they are pretty accurate. I haven’t test this hacker group’s claim, and it is very possible that they are a $100 rip-off, but my instincts tell me they can, and they do. This type of hacking makes me wonder if these are unemployed IT people, or foreign criminals. Although, I’m sure unemployment creates opportunist in any country. And frankly speaking, if I were a talented, out of work computer professional with a family to feed, computer ethics would be something for the employed. Of course I’m not condoning illegal acts of computer hacking, I’m just saying.

What about corporate espionage? Where do these people get their hackers? From the same pool of people that other companies laid-off a year ago? Where would a struggling corporate head find a hacking group? Perhaps in places where CEOs already are,  like CEO magazines, the Wall Street Journal, or maybe their lobbyist know. But why wait for them to find you?

If I was a hacker looking for work, first thing I might do is go to the stock pages and list all companies that are struggling. (and brother the pages are plentiful) Next I might make a spreadsheet of companies, CEOs, networks, network footprints, CEO computers. I would then advertise directly on the CEO’s computer desktops. “Need to Hire a Hacker? I’m your man!” Any hacker that couldn’t do that is not worth hiring, right?

Of course I’m not giving advise on how to advertise your hacker skills by breaking into CEO computers, I’m just saying.

If IT people are working as hackers for ends meat, it makes me wonder; when the world economy does recovers, can IT people return to work with all sins forgiven?
Or will it be like in the book Le Miserables when Jean Valjean steals a loft of bread and is marked for the rest of his life as a criminal with no hope of forgiveness.

Drop me a note and tell me what you think. ...but not on my desktop, please. :-)

Sunday, February 13, 2011

What's the Challenges for this Industry

SCOPE

In recent years, a lot of email frauds, cyber crime cases have come to the fore. Hacking email accounts, stealing sensitive data, copying the address book, intercepting data, virus infections, password attacks, spoofed messages, abusive emails, Trojan attacks and espionage are only some of the many concerns that have started affecting email users worldwide. Emails are also commonly being exploited by computer criminals to execute privacy and identity attacks on unsuspecting victims. Terrorists have hacked into the individual’s emails to send them terror mails. Therefore the worldwide demand for information security professionals has grown. Companies such as Wipro, Infosys, IBM, Airtel and Reliance have set up separate security divisions. Currently there is a huge gap between the demand and supply as far as ethical hackers are concerned in India. Because of this shortage, pay packages and growth opportunities are superlative and ever-growing. Since this is a very dynamic Industry you will get the opportunity to constantly learn new tools, techniques and methods.Current Market Scenario :Information Security and Ethical hacking is the latest buzzword in the industry. In the past five years, the percentage of hacking crimes, data thefts, data losses, viruses and other cyber crimes have increased exponentially. NASSCOM predicts requirement of 1,88,000 professionals by the year 2008. Currently the number of security professionals in India is around 22,000.” The current demand for Information Security jobs continue to grow. With information security increasingly becoming a boardroom level concern, training and certification are becoming increasingly important for candidates and companies.


PHYSICAL CHALLENGE

Ethical Hackers use the same techniques and tactics as those used by illegal hackers to breach corporate security systems. The end result is the company's ability to prevent an intrusion before it ever occurs. To become an ethical hacker, being computer savvy and gadget friendly are important pre-requisites. There should be a keen interest in the Internet and basic knowledge of networking and programming and desire to stay updated in the field of ethical hacking and cyber crimes. Total honesty and integrity is of the utmost importance for ethical hackers.Psychological challenge :You must have good organizational skills, you must be highly perceptive and be able to make quick decisions. You should have the knack of getting things done.

CAREER OPTIONS
Many organizations like army, multinational companies and police departments have their own security divisions. There is a growing need of hackers in these types of organization. After completion of the course in hacking you can find a job in any software company as a hacker. You can apply for the following positions like Information Security, Professional Network, Security Professional Systems, Security Professional, Security Analyst and Security Administrator.

REMUNERATION & LIFESTYLE
A good hacker can fetch remuneration ranging from Rs 10,000 to Rs 30,000 a month. Freelance ethical hackers can expect to make $10,000 per assignment in the US. In India, freelance ethical hackers are not employed by established companies as most prefer to hire them from known security firms. Corporates and governments are today spending millions of dollars on ethical hackers. There is a huge demand for them and the opportunities are unlimited.

TOP COURSE DETAILS & ITS ELIGIBILITY
Fee Structure : The fee structure is around Rs. 22,000 to Rs. 1,00,000 depending upon the institute.

Duration : Duration for the course in ethical hacking is 2-6 months.

Syllabus : The subjects include Security testing methodologies, Introduction to Remote Exploits, Trojan genres, Modifying syslog entries, Malicious event log editing, Abusing Web Applications, Remote buffer overflow exploit lab, Compromise a DMZ setting with port redirection, Network Sweeping etc.

ACADEMICS

General Eligibility :The eligibility criterion for a degree or a diploma course in hacking is graduation in any field with 55%. There are several degree and diploma courses in Cyberspace and Ethical Hacking. Every Institute has its own entrance exams.There are three courses recognized by the Ministry of Information Technology and the HRD Ministry Primarily: Certified Information Security Expert (CISE), Certified Ethical Hacking (CEH) provided by the EC-Council and the Certified Information Systems Security Professional s(CISSP) offered by a handful accredited institutes in the city.Premiere Institute Eligibility :Bascom Computer Education, Ahmedabad offers course in ethical hacking.

INSTITUTE WATCHLIST
NII Consulting(National Institute of  Information Security) Mumbai, Jodo Institute, DelhiOnix Academy, ChennaiIIJT Infotech, Viman NagarAnkit Fadia (CEH)Inter Networkz , BangloreInfosec InstituteNIITBascom Computer Education, AhmedabadAegis Computers, AhmedabadNeuerung Technologies, Ahmedabad.

An Intoduction To Computer Hacking and Security




 The expansion of the “Global economy” gave such countries as China and India an epic technology leap forward. With a combined population of 2.3 billion people, the students learning computers alone dwarf the population of many, if not most countries; including the United States. Needless to say with this has given way for the immediately demand for more computer and network security.  I’m not of course suggesting that China and India is a threat to computer systems around the world, I am saying because of their sheer numbers, if the same percentage of hackers grows out of this, like with other nations, the threat can be insurmountable.

India Needs Hackers—NOW!

The word hacker always stands out as a bad word for terrible people that perform unscrupulous keyboard strokes for ill gotten gain. A hacker could be someone that works for the Russian Mob, tricking stupid people out of their financial information, or eager Chinese and American IT students practicing their newly learned skills on fat unprotected Indian computers. (This shouldn’t even be a challenge as most computers and software come from those two countries anyways. They probably are logged in before we are.)

An employed hacker is an IT professional, or network engineer. An unemployed IT professional can easily switch from a white to a black hat in an unstable economy. In a poor economy many talented computer people with poor social skills are often the first to be laid-off.  Because there are limited opportunities out there, they are forced to find alternate work that is ethically questionable.  If you are clever and talented computer engineer, but are forced to take a pizza delivery job to make ends meat, you will find another way to use your creativity.  What else can a poor disgruntled computer engineer do?


--To be a hacker or not to be.




There is no question that overseas outsourcing provides cheaper labor for many Indian corporations, but we lost far more of our resources to overseas outsourcing than mere jobs alone. There are an estimated 1,324,655,000 billion people in China, and another 310 million people in the U.S . There are 1.139,964,932 billion people in India ,  If a fraction of the population of either country deployed any type of cyber attack on the computer systems in India, (organized or acting independent of each other) there is not enough people collectively in India to defend our countries computer borders. There may even be more U.S and Chinese computer science students then are the entire population of  India? And with the internet wide open with a direct connection to your home and work computer, (not to mention your cell phones) Do we someday outsource our computer security to one country to protect us from another?

Forefront of Innovation

The United States has always been at the forefront of the world’s technologies, this is the single force that has made them the super power that they are today. In recent years, though, it seems that our power of knowledge has been deliberately gifted to other countries. The computers purchased in your neighborhood store are manufactured, assembled, and software installed in other countries with little or no oversight for national security. Still, despite all the inflammatory headlines that Indian’s are more interested in reality television than science and technology, we still have enough of the right people to turn back the ever advancing quiet invasion of India. I’m not singling out the Chinese or U.S. computer people as a threat to India, in many ways I have more a common interest with them, in terms of computers, than I do with my neighbors. But by sheer volume alone, their combined intelligences and ability is on a scale so large that I am frightened by it.

Better Safe than Sorry

If the folks in New Delhi, could stop trying to turn the clocks back to 1950 and start looking into the future towards 2050, they will see that we are completely out numbered and surrounded by weapons from our own arsenal. There is a potential cyber enemy that is growing faster in numbers than we can reproduce in population.  In other words; there may be more hackers being trained by foreign governments right now, and then we give birth to and train in 50 years. The Cyber Intelligence Agency, (If there were such an agency) needs to start recruiting seasoned computer engineers right now; to train, educate, and turn our countries young hackers into our cyber protectors. Otherwise we will be in 1950 again.