Friday, May 22, 2009

EARN FROM YOUR SITE



Sign up at http://www.urmoney.tk/ to earn money for reffering people.


Want to earn some money from your blog or any Website you are running.


Just sign up at this link from bidvertiser:

Click here

You can make your account in just few seconds and start earning from it.

LOOKING FOR A NEW JOB.

Sign up at www.urmoney.tk to earn money for reffering people.
Are you a fresher and looking for a good job. Just submit your resume to any of ths sites given below to maximize your chance for calling you for Interview.

Wednesday, May 20, 2009

LATEST IT HAPPENINGS

# BenQ Announces Special Offer On Its Notebooks

# Google to Reshoot Street Views of Japanese Cities

# Dell Bans E-waste Export to Developing Countries

# Google Glitch Disrupts Search Engine, E-mail

# McAfee Plans New Apple, iPhone Security Products

# Google Ocean Shows The Effects of Climate Change

# Hackers Launch Phishing Attack on Facebook Users

# Samsung Launches New Notebooks

# Microsoft May Unveil New Search Engine Next Week

# Wireless Linux Group Chalks Out Ambitious Plans

# Nokia has further upgraded 6600 Slide 2 include a 5MP camera

# Gmail Adds Translation to its Features

# Intel Sees New Netbook Chip in Fourth Quarter

# Symbian Sees Smartphone Market up 12-15 Percent

# Spice Launches Handset With Indian Calendar Feature

# BioShock MP Details Revealed

# New Ultra-thin, Wireless Bravia LCD TV Released

# Vodafone to Open Network to Application Devs

# Google's Street View Halted in Greece Over Privacy

# Hackers Seek to Attack PowerPoint Users

# Google Shows New Search Tools for Computer, Phone

# ViewSonic to Enter Smartphone Industry

# More Third Gen iPhone Specs Leaked

# Nikon Unveils The 12.3 Megapixel D5000

# Intel Hit With Record 1 Billion Euro Fine

# Hate Goes Viral on Social Network Sites

# Apple Warns of Shock From iPod, iPhone

# Nokia, Intel Team up For Linux-based Mobile OS

FREE SINGTONES & VIDEOS

Free Video


"Sufi Tere Pyar"
http://202.87.41.147/waphung/free_download/ 9870/SufiTerePyar01.3gp



"KABHI KABHI"
http://202.87.41.147/waphung/free_download/ 9870/KabhiKabhi3.3gp



http://202.87.41.147/waphung/free_download/ 9870/JogiMaha6.3gp



"Spiderman3"
http://202.87.41.147/waphung/free _download/9870/internationalTrailerII.3gp



http://202.87.41.147/waphung/content_dow nload/12185/BeemaronKa.3gp?1e6af2#card1



Free Mp3
-
http://202.87.41.147/waphung/free_download/2 141/TaubaTumharey.mp3#card1



"Pappu Cant Dance"
http://202.87.41.147/waphung/free_download/ 9870/PappuCantDance.mp3



#Kabhi Kabhi#
http://202.87.41.147/waphung/free_download/ 9870/KabhiKabhi1.mp3



http://202.87.41.147/waphung/free_download /9870/DhadkeJiyaye1.mp3



http://202.87.41.147/waphung/free_download/9179 /NeenuBanda_1.mp3?b2d3ab#card1



http://202.87.41.147/waphung/ free_download/13450/ZindaRehtiHain51.mp3



http://202.87.41.147/waphung /free_download/15959/DeewanaAbDil1.mp3#card1



http://202.87.41.147/waphun g/free_download/13450/PaironMeinBandhan1.mp3



http://202.87.41.147/waphun g/free_download/13450/MohabbateinLoveInstr1.mp3



http://202.87.41.147/waphung/free_download/24/Mere Sang2.mp3?ff226f#card1



http://202.87.41.147/waphung/free_download/24/HaiJunoon2.mp3?bfa36d#card1



http://202.87.41.147/waphung/free_download/1207 8/SilverBells01.mp3#card1







Free IMAGE

priyanka
http://202.87.41.147/waphung/free_downloa d/22/StylingPriyanka.gif?24b58c#card1

AIRTEL TRICKS

For AIRTEL users:
Dial *598*1#
-A/C Inquiry
-Fund Transfer
-Mobile Recharge
-Bill Payment




AirTel FREE MISS CALL ALERT
-
JAMMU-*62*+91514#
MUM-*62*+91675#
KER- *62*+91565#
GUJ-*62*+91565#





AirTel Balance Transfer:-
*143*(Mob No.)#
Press Call Button
Eg:*143*9818xxxxxx#
Transfer Rs.50/-

Download Free Games (For your mobile)

Airtel Free Games:

Free Game Call Of DuTy
http://202.46.200.191/funzone2/dg.jsp?gname=C allofduty4&cost=-0




FREE GAME(AIRTEL LIVE)

http://202.46.200.191/funzone2/dg.jsp?gname =Kingkong&cost=-0




Free cool fighting game..........
http://202.46.200.191/funzone2/dg.j sp?&gname=1942AirCombat&cost=0



Free Movie Game
http://202.46.200.191/funzone2/dg.jsp?gname=Roadsi deRomeoVideo9&cost=0



Free Game Freddie
http://202.46.200.191/funzone2/dg.jsp?gnam e=freddieflintoffallroundcricket&cost=-0




Free Game
+Mystic Ways+
http://202.46.200.191/funzone2/dg.jsp?gname= MysticWays&cost=-0






FREE GAME TERMINATOR

http://202.46.200.191/funzone2/dg.jsp?gname=Termi natorSalvation&cost=-0




Super Fighting Game:

http://202.46.200.191/funzone2/dg.jsp?gname =WWELegendsofWrestlemania&cost=0





Free Superhit Adventure Game:


http://202.46.200.191/funzone2/dg.jsp?gnam e=akirahero&cost=0




AIRTEL:
free game

http://202.87.41.147/waphung/free_download/9 870/AaDekhenZara5.jad



FreeGame
Batman
http://202.46.200.191/funzone2/dg. jsp?gname=BatmanTheDarkKnight&cost=0

Sunday, May 10, 2009

HISTORY OF HACKING

History of Hacking

Hacking is not limited to computers. The real meaning of hacking is to expand the capabilities of any electronic device; to use them beyond the original intentions of the manufacturer. As a matter of fact, the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains. They wanted them to perform faster and more efficiently. So, is hacking always bad? Not really. It only depends on how to use it. But it wasn't until a group of these hackers decided to exert their knowledge in the computer mainframes of the MIT.

During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free. Within these group of people, a phreaker became famous because a simple discovery. John Draper, also known as Captain Crunch, found that he could make long distance calls with a whistle. He built a blue box that could do this and the Esquire magazine published an article on how to build them. Fascinated by this discovery, two kids, Steve Wozniak and Steve Jobs, decided to sell these blue boxes, starting a business friendship which resulted in the founding of Apple.

By the 1980's, phreaks started to migrate to computers, and the first Bulletin Board Systems (BBS) appeared. BBS are like the yahoo groups of today, were people posted messages of any kind of topics. The BBS used by hackers specialized in tips on how to break into computers, how to use stolen credit card numbers and share stolen computer passwords.

It wasn't until 1986 that the US government realized the danger that hackers represented to the national security. As a way to counteract this menace, the Congress passed the Computer Fraud and Abuse Act, making computer breaking a crime across the nation.

During the 1990's, when the use of the internet widespread around the world, hackers multiplied, but it wasn't until the end of the decade that system's security became mainstream among the public.

Today, we are accustomed to hackers, crackers, viruses, Trojans, worms and all of the techniques we need to follow to combat them.

Methods of Hacking

In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.

Security exploit

A security exploit is a prepared application that takes advantage of a known weakness.

Vulnerability scanner

A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)

Packet Sniffer

A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.

Spoofing attack

A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.

Rootkit

A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.

Social engineering

Social Engineering is the art of getting persons to reveal sensitive information about a system. This is usually done by impersonating someone or by convincing people to believe you have permissions to obtain such information.

Trojan horse

A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)

Virus

A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.

Worm

Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.

Key loggers

A keylogger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data. Often uses virus-, trojan-, and rootkit-like methods to remain active and hidden.

Thursday, May 7, 2009

Types of Hackers



The types of hackers are usually named by the hackers own slang (also knowm as jargon). Generally hackers can be divided into three classes (also groups or even schools)




WHITE HAT HACKER

A white hat hacker breaks security for non-malicious reasons. This type of hacker enjoys learning and working with computer systems, and consequently gains a deeper understanding of the subject. Such people normally go on to use their hacking skills in legitimate ways, such as becoming security consultants. The word 'hacker' was originally used to describe people such as these.


GREY HAT HACKER

A hacker of this type is a skilled hacker who sometimes acts legally and in good will and sometimes not. They are a hybrid between white and black hat hackers. They hack for no personal gain and do not have malicious intentions, but occasionally may or may not commit crimes in their actions. There is no distinction between grey and brown for hackers in this category.


BLACK HAT HACKER

A black hat hacker is someone who subverts computer security without authorization or uses technology (usually a computer or the Internet) for vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or other types of crime. They are also known as "crackers".


CYBERTERRORIST

A Cyberterrorist uses technology to commit acts of terrorism. Their intentions are to cause physical, real-world harm to social, ideological, religious, political, or governmental establishments. Such as using DOS (Denial of Service) attacks to take down entire websites.


Script kiddie

A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others. These are the outcasts of the hacker community.


Hacktivist

A hacktivist is a hacker who utilizes technology to announce a political message.

Wednesday, May 6, 2009

HACKING


WHO IS HACKER ???

Hackers are highly skilled computer gurus who break into computer systems for a variety of reasons, from financial gain to just for the fun of a challenge. Despite these activities being illegal, the hacker community has maintained momentum for decades and shows no signs of slowing down.

HACKERS AND CRACKERS


A hacker is a person who is proficient with computers and/or programming to an elite level where they know all of the in's and out's of a system. There is NO illegality involved with being a hacker.


ALOVESS



A cracker is a hacker who uses their proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts, distributing viruses etc.

Website Hacking


There are two types of website hacking :

Hacking to break into password protected sections of the website. (Often Illegal)

Hacking so that you can modify or deform a website. NOTE: Criminal Offence





JOIN HACKGURU21
to 567678 to receive updates about this blog.

Monday, May 4, 2009

TYPES OF COMPUTER VIRUSES



Adam and Eve virus: Takes a couple of bytes out of your Apple.

Airline virus: You're in Dallas, but your data is in Singapore.

Anita Hill virus: Lies dormant for ten years.

Arnold Schwarzenegger virus: Terminates and stays resident. It'll be back.

AT&T virus: Every three minutes it tells you what great service you are getting.

The MCI virus: Every three minutes it reminds you that you're paying too much for the AT&T virus.

Bill Clinton virus: This virus mutates from region to region and we're not exactly sure what it does.

Bill Clinton virus: Promises to give equal time to all processes: 50% to poor, slow processes; 50% to middle-class processes, and 50% to rich ones. This virus protests your computer's involvement in other computer's affairs, even though it has been having one of its own for 12 years.

Congressional Virus: Overdraws your computer.

Congressional Virus: The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.

Dan Quayle virus: Prevents your system from spawning any child processes without joining into a binary network.

Dan Quayle virus: Simplye addse ane ee toe everye worde youe typee..

David Duke virus: Makes your screen go completely white.

Elvis virus: Your computer gets fat, slow, and lazy and then self destructs, only to resurface at shopping malls and service stations across rural America.

Federal bureaucrat virus: Divides your hard disk into hundreds of little units, each of which do practically nothing, but all of which claim to be the most important part of the computer.

Freudian virus: Your computer becomes obsessed with marrying its own motherboard.

Gallup virus: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time (plus or minus a 3.5 percent margin of error).

George Bush virus: Doesn't do anything, but you can't get rid of it until November.

Government economist virus: Nothing works, but all your diagnostic software says everything is fine.

Jerry Brown virus: Blanks your screen and begins flashing an 800 number.

Madonna virus: If your computer gets this virus, lock up your dog!

Mario Cuomo virus: It would be a great virus, but it refuses to run.

Michael Jackson virus: Hard to identify because it is constantly altering its appearance. This virus won't harm your PC, but it will trash your car.

New World Order virus: probably harmless, but it makes a lot of people really mad just thinking about it.

Nike virus: Just Does It!

Ollie North virus: Turns your printer into a document shredder.

Oprah Winfrey virus: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.

Pat Buchanan virus: Shifts all your output to the extreme right of your screen.

Paul Revere virus: This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:.

Paul Tsongas virus: Pops up on December 25 and says, "I'm not Santa Claus."

PBS virus: Your PC stops every few minutes to ask for money.

Politically correct virus: Never calls itself a "virus", but instead refers to itself as an "electronic microorganism".

Richard Nixon virus: Also known as the "Tricky Dick Virus", you can wipe it out but it always makes a comeback.

Right To Life virus: Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.

Ross Perot virus: Activates every component in your system, just before the whole thing quits.

Ted Kennedy virus: Crashes your computer but denies it ever happened.

Ted Turner virus: Colorizes your monochrome monitor.

Terry Randle virus: Prints "Oh no you don't" whenever you choose "Abort" from the "Abort, Retry, Fail" message.

Texas virus: Makes sure that it's bigger than any other file.

UK Parliament virus: Splits the screen into two with a message in each half blaming other side for the state of the system.

Warren Commission virus: Won't allow you to open your files for 75 years.

DELETE RECYCLE BIN

OPEN THE REGISTERY EDITOR BY PRESSING [WINDOW]+[R] AND TYPE THE "regedit" PRESS ENTER AND NAVIGATE TO :-

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows/CurrentVersion\Explore \Desktop\ NameSpace\ LOOK FOR THE KEY"645FF040-5081-101B-9F0800AA002F954E

AND DELETE" this hack is for completely deleting the reclyebin ON THE OTHER HAND YOU SHOULD USE BELOW HACK:- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows/SehellNoRoam\MUICache AND CHANGE THE VALUE OF @C:\WINDOWS\system32\SHELL32.DLL,8964 TO WHATEVER YOU WANT.

LOCK PC BY DOUBLE CLICKING

You can lock your XP workstation with two clicks of
the mouse. Create a new shortcut on your desktop using
a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That’s it just
double click on it and your computer will be locked.
And if that’s not easy enough, Windows key + L will do the same.

Give password

Give password to your MsWord document and secure your data:

Password Protect
Open MS Word File
>Go to Tools
>Go to Options
>Go to Security
Then Type a Desired Password and save.
Done.