Saturday, November 20, 2010
Scan websites against XSS with OWASP Scrubbr v1.0
Download XSS Scanning Tool Here
BlackSheep: Way to Avoid FireSheep!
FireSheep and BlackSheep can not co-exist on the same Firefox profile as they share a lot of common code. If you need to use them on the same machine, use different Firefox profiles.
Download BlackSheep v1.0.0 (blacksheep-latest.xpi) here.
Hack Facebook/Twitter Or Any Email Account With Session Hijacking
When logging into a website you usually start by submitting your username and password. The server then checks to see if an account matching this information exists and if so, replies back to you with a "cookie" which is used by your browser for all subsequent requests.
As soon as anyone on the network visits an insecure website known to Firesheep, their name and photo will be displayed:
Double-click on someone, and you're instantly logged in as them.
PHP Programming Video Tutorial: Basics Tutorials PHP Programming
What You Will Need (02:41)
Resources - Using PHP.net Pt.1 (04:51)
Resources - Using PHP.net Pt.2 (04:17)
Other PHP Resources (03:10)
Hosting Resources (06:23)
Starting with PHP
What is PHP (04:10)
PHP Programming Standards (04:07)
Embedding PHP in HTML (05:27)
Embedding HTML in PHP (05:15)
The All Important Semi-colon (01:38 )
Your First PHP Script (05:34)
Comments (02:24)
Chapter 2 Challenge (07:57)
PHP Basics
Variables (04:04)
PHP Statements (00:45)
Values and Value Types Part 1 (07:48 )
Values and Value Types Part 2 (02:43)
Referencing Variables and Constants (03:00)
Superglobals (05:04)
Variable Variables (03:56)
Basic Operators Part 1 (04:21)
Basic Operators Part 2 (04:35)
Advanced Operators (05:52)
Chapter 3 Challenge (06:08 )
PHP Conditionals and Loops
The "IF" Statement (04:45)
Extending "IF" (03:02)
"SWITCH" Statements (04:40)
The "WHILE" Structure (03:18 )
The "DO-WHILE" Structure (02:29)
The "FOR" Loop (04:41)
Chapter 4 Challenge (02:28 )
Applying What You Know
INCLUDE and REQUIRE (03:42)
Setting up Your File Structure (04:53)
Global Headers and Footers (03:16)
A Functional Website Example Pt.1 (06:23)
A Functional Website Example Pt.2 (04:18 )
A Functional Website Example Pt.3 (04:32)
A Functional Website Example Pt.4 (04:49)
A Functional Website Example Pt.5 (04:30)
A Functional Website Example - Addendum (06:09)
PHP and functions
Why use functions (03:12)
Variable Scope (02:58)
Creating and using Functions (03:12)
Functions with Parameters (06:28 )
Returning Values (04:05)
Chapter 6 Challenge (05:59)
PHP Arrays
What is an Array (02:09)
Creating Arrays (06:03)
Multidimensional Arrays (03:23)
"FOREACH" looping - basic (03:18 )
"FOREACH" looping - advanced (04:19)
Navigating Arrays (02:21)
Manipulating Keys (03:56)
Sorting Arrays (02:41)
Serialization (02:20)
Challenge (07:56)
Starting with MYSQL
Getting Information: mysql.com (02:49)
Other MYSQL Resources (02:00)
What is a relational database? (03:27)
Accessing MYSQL - the command line (04:36)
MYSQL Basics
Configuring Users in MYSQL - Part 1 (03:59)
Configuring Users in MYSQL - Part 2 (03:02)
Creating Databases and Tables (02:24)
MYSQL Data Types - Numeric Types (04:04)
MYSQL Data Types - Date Types (02:17)
MYSQL Data Types - String Types (02:58)
EXAMPLE: Creating A Table Statement - Part 1 (05:27)
EXAMPLE: Creating A Table Statement - Part 2 (03:47)
Basic MYSQL commands - INSERT (02:46)
Basic MYSQL commands - SELECT and UPDATE (05:46)
Basic MYSQL commands - DELETE and DROP (02:32)
Setting Up phpMyAdmin (05:43)
Using phpMyAdmin (06:06)
Using MYSQL with PHP
Connecting to MYSQL (02:28 )
Choosing a database (01:49)
Querying a database (03:53)
Retrieving results (05:38 )
Useful MySQL functions in PHP (03:55)
PHP and Sessions
What is a session (01:39)
set_cookie vs session_start (05:36)
Session Tracking With Built in PHP Functions (03:54)
Session Tracking With Databases Pt.1 (04:36)
Session Tracking With Databases Pt.2 (04:40)
Final Words
Where to go from here (03:02)
Credits
About the Author (02:04)
DOWNLOAD
hotfile.com
http://hotfile.com/dl/82631826/af976c0/VTC.p.h.p.part1.rar.html
http://hotfile.com/dl/82631917/f4c4373/VTC.p.h.p.part2.rar.html
fileserve.com
http://www.fileserve.com/file/tZErwTZ/VTC.p.h.p.part1.rar
http://www.fileserve.com/file/mWPEjEr/VTC.p.h.p.part2.rar
filesonic.com
http://www.filesonic.com/file/32308259/VTC.p.h.p.part1.rar
http://www.filesonic.com/file/32308093/VTC.p.h.p.part2.rar
Sunday, November 14, 2010
Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique
To combat the "spoofing attacks," Yao and her former student, Deian Stefan, now a graduate student in the computer science department at Stanford University, developed an authentication framework called "Telling Human and Bot Apart" (TUBA), a remote biometrics system based on keystroke-dynamics information.
Their work won a best paper award at CollaborateCom '10, the 6th International Conference on Collaborative Computing, held in Chicago and sponsored by the Institute of Electrical and Electronic Engineers' Computer Society, Create-Net, and the Institute for Computer Sciences.
Tuesday, November 9, 2010
A PRACTICAL WAY TO FIND ADMINISTRATOR WEB PAGE
Regardless of any technique, hackers agree if the administrator page is one of the most essential web pages and the most search for exploitation. Typically, the administrator page url address is http://www.sitename.com/admin.php, http://www.sitename.com/admin.html and so forth.
Because of the susceptibility of admin pages, its url address recently deliberate in secret by using the unique url address to make difficult to guess, at least give a little trouble on the hackers to find it.
The groups of Indian hackers (Indian Cyber Army), released a site called Admin finder that can help us to find administrator page. The web address is: http://adminfinder.cyberarmy.in/.
On a black background sites, we only are asked to enter the url address of a target site with the end slash mark (/), then press the Submit Site Bottom. AdminFinder will look for administrators pages. administrators web pages will be displayed with a description in the left column. If found, will be given a description "Found!" with Red color. While that does not exist, will be given a "Not Found!" description with yellow color. The red color with the description "Found!" is the administrator page. It’s easy right?.
Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique
Friday, October 29, 2010
DNS Rebinding Attack Can Be Used to Hack Home Routers
A security researcher has devised a special attack that can be used to access the LAN-facing admin interfaces of many widely used home router models. The technique is a variation of DNS rebinding, but is able to bypass traditional protections against such attacks.
The attack method will be demonstrated at the upcoming Black Hat technical security conference in Las Vegas, by a ethical hacker named Craig Heffner, who currently works as a senior security engineer at Seismic. Heffner's presentation, called “How to Hack Millions of Routers” will be accompanied by the release of a tool which automates the attack.
Read More : Click Here
Researcher Forces Cash Out of Automated Teller Machines
Security researcher Barnaby Jack gave his long overdue presentation on ATM exploits in front of an audience at the Black Hat security conference in Las Vegas. The hacker managed to force two different ATM models to dispense cash using both remote and local attacks.
Automated Teller Machines (ATMs) are pretty much ubiquitous these days and most people are used to trusting them. Unfortunately, the sad reality is that these machines are far from safe and the rate of ATM crime is on a steep climb.
Attacks like ATM skimming have been around for a long time and several variants of ATM malware have also appeared in the past two years. However, Barnaby Jack's research, which involve remotely exploitable vulnerabilities, takes ATM security risks to a whole new level.
Researcher Releases Phone Call Eavesdropping Software
The software was demoed at the Black Hat security conference in Las Vegas by Karsten Nohl, a security researcher who specializes in probing GSM security. His previous research focused on the A5/1 stream cipher used to encrypt GSM communications.
This cipher dates back to 1987 and is still widely used in Europe and the United States, despite being reverse-engineered in 1999. GSM operators have began adopting the more secure A5/3 cipher, which is used to encrypt traffic passing over 3G networks. However, when 3G coverage is not available, phones drop back to the insecure 2G standard.
Read More : Click Here
Thursday, October 28, 2010
Now, a social network for bookworms
Penguin views Spinebreakers, the social network, as a crucial part of future-proofing the book industry.
Spinebreakers, as a content website, already exists but does not have any tools which allow its users to communicate and interact about their shared pastime. Instead, it is a site where teenagers write about books and authors.
Anna Rafferty, managing director of Penguin Digital, who founded the site three years ago, told The Telegraph: "I set up the site as I felt there were fewer and fewer places talking about books in a way which appealed to teenagers."
Read More : Click Here
Russia To Say Bye-Bye To Microsoft's Windows!
Moscow will earmark 150 million rubles (3.5 million euros, $4.9 million) to develop a national software system based on the Linux operating system, Russian deputy Ilia Ponomarev said, confirming an earlier report in the Vedomosti daily.
"The devil is in the details," said Ponomarev, a computer expert, adding those details would be hashed out during a December meeting headed by vice-prime minister Sergei Ivanov.
Read More : click here
Monday, October 25, 2010
New Firefox add-on hijacks Facebook, Twitter sessions
A new Firefox add-on lets "pretty much anyone" scan a Wi-Fi network and hijack others' access to Facebook, Twitter and a host of other services, a security researcher warned today.
The add-on, dubbed "Firesheep," was released Sunday by Eric Butler, a Seattle-based freelance Web application developer, at the ToorCon security conference, which took place Oct. 22-24 in San Diego.
Butler said he created Firesheep to show the danger of accessing unencrypted Web sites from public Wi-Fi spots.
Read More : Click Here
Wednesday, October 20, 2010
De Dana Dan movie HD DVDRip Movie Free Download
Download good quality De Dana Dan movie....
- Sendspace Links....
http://www.sendspace.com/file/ijrx6h
http://www.sendspace.com/file/5avn6p
http://www.sendspace.com/file/qcfa6n
http://www.sendspace.com/file/xbtxjv
- Megaupload links....
http://www.megaupload.com/?d=09HDMPGX
http://www.megaupload.com/?d=AKR9DL2H
http://www.megaupload.com/?d=X4TQM6D9
- Rapidshare Links..
http://rapidshare.com/files/338232877/De.Dana.Dan.1CD.DVDrip.2009.bychinnamama.mkv.002
http://rapidshare.com/files/338228594/De.Dana.Dan.1CD.DVDrip.2009.bychinnamama.mkv.003
http://rapidshare.com/files/338230507
India overtakes US as biggest virus producer
The highest number of firewall blocks come from the U.S. (18.3 per cent) and Korea (13 per cent). Simon Heron, internet security analyst for Network Box, says: “It is interesting to see that UDP:137 (NetBIOS’ name service) was the second most attacked port. It is obviously worth users and businesses checking their firewall rules as these figures indicate that there must still be systems out there with this port open to the internet. Also, it would appear that web proxies are also worth probing as TCP:8080 was third in the list, which suggests that hackers see this as another backdoor.”
read more : click here
'Unprecedented wave' of Java exploits hits users, says Microsoft
According to a manager at Microsoft's Malware Protection Center (MMPC), attempts to exploit Java bugs have skyrocketed in the past nine months, climbing from less than half a million in the first quarter of 2010 to more than 6 million in the third quarter.
"Some of our exploit 'malware' families were telling a scary story ... an unprecedented wave of Java exploitation," said Holly Stewart, a senior program manager at the MMPC, in a post to the team's blog Monday.
Stewart went on to call the jump in Java attacks "scary" and added, "The spike in exploitation was surprising to say the least."
read more : http://www.computerworld.com
Hacker hits Kaspersky website
Someone took advantage of a bug in a Web program used by the Kasperskyusa.com website and reprogrammed it to try and trick visitors into downloading a fake product, Kaspersky confirmed Tuesday. Kaspersky didn't identify the flaw, but said it was in a "third-party application" used by the website.
"As a result of the attack, users trying to download Kaspersky Lab's consumer products were redirected to a malicious website," the antivirus vendor said. The website caused a pop-up window to appear that simulated a virus scan of the user's PC, and offered to install an antivirus program that was in fact bogus.
Ability to Detect Malware in Cloud-Computing Systems Improved
Georgia Tech Information Security Center Releases Cyber Threats Forecast for 2011
New Malware Could Steal Users Social Media Behavior and Info, Researchers Warn
SpamBot Wants to Be Your Friend
The last six months saw an increase in password stealing, as malware levels dropped
Predictions of an increase in attacks on social networks by password-stealing Trojans this year have been confirmed.
In McAfee’s 2010 Threat Predictions, it anticipated that attacks on social networks by password-stealing Trojans and other malware would increase in 2010, and during the current quarter it has seen several examples of that prediction in action. The most prominent of this is the Zeus family, which it usually observes as PWS-Zbot and Spy-Agent.bw, and is the pre-eminent password-stealing Trojan malware, according to its threat report for the first quarter of 2010.
The report said: “Zeus is just one of the key tools of cyber criminals, who often tie password stealers with other types of illegal online material. In this quarter we saw all kind of goodies being installed with Zeus. And whom do you imagine was the prime target for these attacks? Facebook users.”
Saturday, October 16, 2010
Indian hackers focus on botnet attacks: Microsoft
New Delhi, Oct 15: A new report released by computer giant Microsoft has revealed that the attack of 'botnets' on computers has increased in India.
CWG Official Website Attacked by Pakistani & China Hackers
New Delhi: The Commonwealth Games (CWG) website, which got more than seven million visitors everyday, buckled not because of technical glitches but a deliberate mischief, sources said.
Few weeks ago, the Commonwealth Games website came under cyber attack which was possibly routed from China.
Sources tell CNN-IBN that within two hours of the Games opening ceremony, the website faced massive cyber attacks, possibly from China. India's Computer Emergency Response Team (CERTIN) had to set up a special cyber control room at the games village. But the cyber attacks continued till the end of Games.
Thursday, October 14, 2010
Microsoft, Facebook unveil deeper social search on Bing
Beware of fake 'dislike' button on Facebook
Washington, Aug 17: A fake 'dislike' button, which is not offered by Facebook, is spreading like a virus across the social networking site Facebook.
Facebook officials told that they are trying hard to block the fake 'dislike' button. They also told that Facebook don't have any official dislike button and asked the users not to click on the suspicious links.
US focuses on technology to face cyber threats
Washington, Aug 26: United States defence official told that Pentagon trains it's network administrators 'ethical hacking' to understand the weaknesses before they are exploited by an enemy.
US Deputy Secretary of Defence William J Lynn told that the America must face the cyber defence challenge with a focus on superior technology and productivity. He also told that the US has to focus on technology and productivity as the countries like China and India will train more highly proficient computer scientists in coming years.
Imagine : Sanskrit as computer programming language?
The idea of Sanskrit as programming language seems to stem from NASA
researcher Rick Briggs' 1985 paper, "Knowledge Representation in Sanskrit
and Artificial Intelligence," AI Magazine Vol 6, #1, 1985.
representation, i.e. for machine representation of knowledge expressed in a
structured form, based on natural language. Sanskrit is apparently
well-suited to this application, partly because of its systematized grammar,
and its relative lack of ambiguity. Briggs pointed out correspondences
between KR structures used in AI, and equivalent structures in Sanskrit. At
least a couple of conferences arose as a result of this paper.
Wednesday, October 13, 2010
Avatar Movie High Definition quality HD Print Download
http://hotfile.com/dl/33575099/b1c6494/avatar_part1.rar.html
http://hotfile.com/dl/33575269/cdd8557/avatar_part2.rar.html
http://hotfile.com/dl/33575504/97b1db1/avatar_part3.rar.html
http://hotfile.com/dl/33575645/47b9fd5/avatar_part4.rar.html
Google inserts 'extra protection' against hacking
San Francisco, Sep 21: The threats of online hacking and cyber crimes are increasing day by day. Internet users face hacking to their bank accounts, emails , social networking accounts and even to the personal websites. The security on web is the hottest issue faced by all big players in the web market. To face hacking threats, Google Inc has introduced a new security measure for Google account holders.
Monday, October 11, 2010
3 Idiots HD Quality Movie Free Download
Download Links...
- http://rapidshare.com/files/334588466/3I.TEAM-TDK.mkv.001
- http://rapidshare.com/files/333620275/3I.TEAM-TDK.mkv.002
- http://rapidshare.com/files/333609023/3I.TEAM-TDK.mkv.003
- http://rapidshare.com/files/333574663/3I.TEAM-TDK.mkv.004
- http://rapidshare.com/files/334553603/3I.TEAM-TDK.mkv.005
- http://rapidshare.com/files/333571990/3I.TEAM-TDK.mkv.006
- http://rapidshare.com/files/333570691/3I.TEAM-TDK.mkv.007
Sunday, October 10, 2010
Russian hacker selling Facebook users' details
The hacker has allegedly sold details of millions of Facebook users. He sells names and passwords of Facebook users in an underground forum.
Microsoft introduces online web applications in new version of Office
Microsoft has announced the release of the latest versions of the business editions of Office and Share Point.
A key feature of the launch is the ability to ‘work virtually anywhere’ with Microsoft Office Web Apps, what it calls the online companions to Word, PowerPoint, Microsoft Excel and OneNote.
It claimed that this will help preserve the look and feel of a document regardless of device, so the content and format are generally preserved while moving between the PC, phone and browser.
There is also added capabilities for mobile use, as Office Mobile 2010 has been made available for free via Windows Phone Marketplace for all Windows Mobile 6.5 phones with a previous version of Office Mobile.
Virus attack on Orkut fixed, says Google blog
California, Sep 26: The search Engine giant Google Inc has announced that the virus attack on their Social Networking Site Orkut was removed.
Orkut was hit by Bom Sabado virus, which means 'Good Saturday' in Portuguese, on Saturday, Sep 25. This virus posted scraps to the Orkut users with the text Bom Sabado and is sent to the users account by the name of the other friends account. It also added affected users to new Orkut groups.
Virus attacks Twitter, sent visitors to porn sites
Washington, Sep 22: The popular Social Networking Site Twitter was affected by virus attack on Tuesday, Sep 21.
Later Twitter officially announced that the attack was fixed. But some of the security experts told that virus attack on the popular website exposed the serious security flaw, one that could be exploited by hackers in the future to install malicious software and steal personal information.
Hackers using Facebook holiday posts to loot money Hackers using Facebook holiday posts to loot money
10-10-10 virus to attack web on Sunday Oct 2010?
Some of the experts have warned about the malware attack on web at 10:10 am/pm Sunday, Oct 2010 as it appears like 10.10.10, a date whose symmetry has occurred once a year since 2001 and will do so until 2012.
Different news like computers internal clock will either jam or let loose a virus were spread on internet. Also a Facebook page has been set up with the title "Will my computer still work on 10/10/10 at 10.10am?".
Some computer safety experts suggested users to reset their computers internal clock to avoid the risk of virus attack.