Saturday, May 26, 2012

Crack a Windows 7 / XP or Vista Password With Ophcrack Live CD



The first thing we will need to do is download the CD image from Ophcrack’s website. There are two options to download, XP or Vista, so make sure you grab the right one. The Vista download works with Windows Vista or Windows 7, and the only difference between XP and Vista is the “tables” Ophcrack uses to determine the password.



Step 1 – Burn Ophcrack Vista Live CD to a CD or DVD disc. Use a ISO file burn program to burn the ophcrack-vista-livecd-2.3.1.iso to the cd or dvd disc. Note: You cannot burn the iso file to the cd or dvd disc like burning a common file.  You should use the Burn ISO Image option the burn program provides to burn the iso file to cd or dvd disc, or you will fail to boot the computer from Ophcrack Vista Live CD. If you have trouble in this operation, you can refer to How to burn ISO image file to CD/DVD disc.
Step 2 – Boot the computer which will be hacked from Ophcrack Vista Live CDNote: The following steps should happen on the computer you want to hack, instead happen on the computer you are using.
2.1 Insert Ophcrack Vista Live CD to the computer.
2.2 Access to BIOS Setup Utility to Set the CD/DVD-ROM as the first boot device.
2.3 Press 10 to save BIOS setting and then restart computer.
Tip: If you fail to boot from Ophcrack Vista Live CD, you should check whether you used the right way to burn the ISO file to CD/DVD disc, and check whether you have set the computer to boot from CD/DVD-ROM.
Step 3 – Get the password has been hacked by Ophcrack. After boot from Ophcrack Vista Live CD, you do not need to do anything. What you should just do is write down the password has been hack. The user column will list the user Ophcrack find in system. The NT Pwd column will list the password has been found. If the NT Pwd field is empty for a special user, the password has not been found yet.
Step 4 – Resart Windows and login with the recovered password. Press the restart button of your computer or click Menu -> Logout -> Reboot system to restart computer, and then login with the hacked password.






Windows :
                 
                 Download Now




Linux :


                 Download Now

How to Crack a Program using OllyDbg



Software Cracking is the art of breaking security protections in a software. Generally software cracks are distributed in the form of patches to the original software or keygen programs which generate arbitrary key / serial combinations. A Cracker works his way through a program by disassembling it and understanding the security protections built into it. He then proceeds to alter the behavior of the program by finding and changing (patching) the routines responsible for the security mechanisms, in order to allow full unlimited access to the program. Alternately, he can also reverse engineer the key / serial comparison routines and write a keygen for the program. This allows users to generate arbitrary valid keys / serials for the program.

Download Now

Wednesday, May 16, 2012

ESET NOD32 ANTIVIRUS 5 [FULL] [FREE] [CRACK]



Built on the award-winning ThreatSense engine, ESET NOD32 Antivirus proactively detects and disables more viruses, trojans, worms, adware, spyware, phishing, rootkits and other Internet threats than any program available.ESET NOD32 Antivirus provides: Proactive Protection: The award winning ThreatSense technology combines multiple layers of detection protecting you from Internet threats before it is too late.Precise Detection: ESET accurately identifies known and unknown threats. It consistently wins top awards from testing labs and is recognized for having zero false positives.1Lightweight Design: Requires less memory and CPU power, allowing your computer to run fast, making more room for games, web browsing, and emailing.Fast Scanning Speeds: Highly efficient program ensuring fast file scanning and product updates. It runs quietly in the background.Proactive, precise, lightweight and fast. You wont find a better antivirus program. 


Tuesday, May 15, 2012

Download Super Internet TV v9.0.0 Premium Edition (NEW)



Super Internet TV allows you to watch 2200+ live television channels and listen to 5000+ online radio stations from 100+ countries. There is no need for a TV Tuner card because all the channels are streamed through your Internet connection. All you need is a Windows PC and an Internet connection. You can also record your favorite programs at will. Super Internet TV is ideal for people interested in alternative programming, learning languages, foreign cultures, entertainment, sports or news. 


Features:
- Watch 2000+ Internet TV
- Listen to 5000+ radio stations
- No special hardware required
- Very Easy-to-Use Interface
- No PC knowledge required
- Recording Internet TV channels and radio stations
- Resizable screen, including full-screen mode
- Automatic channel list updates
- Your own personal favorite list
- Advance filtering
- Faster video stream loading
- More reliable connection
- Works anywhere in the world

OS: Windows Vista, XP, 2003, 2000, ME, 98, 98SE or Windows NT4.0



Ascentive ActiveSpeed v12.0.0


Optimize your Internet Connection
It surprises people to find out that most computers are not optimized to take full advantage of the Internet connection they are running. By modifying system settings that operate behind-the-scenes of your PC, ActiveSpeed, a leading Internet optimizer and web accelerator, can speed up your Internet connection regardless of the type of Internet connection you have.
ActiveSpeed is the only Internet speed accelerator that intelligently modifies your computer's unique settings. The patent pending 'Intelligent Optimization Engine' guides you step-by-step to make your Internet connection accelerate the way you want it to. ActiveSpeed can optimize the speed of your Internet connection and increase the speed of everything you do online from browsing the web, to downloading video and music, to online gaming. Run our FREE Internet Optimization Scan to see if our Internet speed optimizer and web accelerator can optimize your Internet connection.
Features of ActiveSpeed: A leading web accelerator
Automatically accelerate your Internet connection.
Dramatically speed up Internet connections -- Dial-up, DSL, Cable, or Wireless
Surf the web faster than ever before without upgrading your Internet connection.
Instantly improve Internet phone performance (VOIP).
Download music from the web in seconds.
Speed up all your online gaming.
Accelerator is perfect for novice users and experts.
The Patent Pending Intelligent Optimization Engine is not available in any other Internet accelerator product at any price.
Compatible with Windows Vista, XP, ME, 98, 2000.


Download Now

Active Password Changer Professional 3.5 Build 0277




Active@ Password Changer is designed for resetting local administrator and user passwords on Windows XP / VISTA / 2003 / 2000 / NT systems in case an Administrator's password is forgotten or lost. You do not need to re-install and re-configure the operating system.

Forgotten password recovery software has a simple user interface, supports multiple hard disk drives, detects several SAM databases (if multiple OS were installed on one volume) and provides the opportunity to pick the right SAM before starting the password recovery process. It displays a list of all local users. The software user simply chooses the local user from the list to reset the password.

Other Windows login security restrictions like 'Account is disabled', 'Password never expires', 'Account is locked out', 'User Must Change Password at Next Logon' and 'Logon Hours' can be changed or reset.

Download Now

Free Live TV









Instructions

Purchase high-speed internet access if you do not already have it, so that you can watch free live TV on line. Making sure that your computer is updated is always a great idea, but it is more important now, so that viewing of TV online runs smooth and is glitch free.

Download and install one of the media players, most of the computers today come with at least one of the media players pre-installed. Just make sure you have the latest version of whichever one you will be using.

Visit one of the web sites, which offer public access of many television stations around the world. Imagine watching a rugby game live as it is played in Australia, or watch a Chinese parade as it is taking place with all the bright colors. Imagine your child who is taking Spanish to watch TV in a Spanish language. She will pick up Spanish easier as it becomes first hand knowledge. Here are some reviews of few sites for you, giving you the inside scoop as a viewer. The links are in the resource section of this article.

WWiTV is one of the sites that has thousands of television stations around the internet that you can watch free. These TV stations are from numerous countries and the United States as well. You can watch live news, comedies and drama on this site and it is very user friendly. You can view by country or topic.

Beeline TV has many TV channels worldwide that you can view. All the stations here are listed on one page, which is used for the visitors to select stations listed by country. There are quite a few American stations here.

Internet TV is one of the best sites to watch TV sports. This search engine will find any type of sport you enter and, if it is playing, live this site will find it. This is a great way to watch the Olympics from a local station rather then the coverage the pay per channels offer.


Download Now

Mozilla Firefox 13.0 Beta 3 / 12.0







Mozilla Firefox is a fast, full-featured browser for Windows that makes browsing more efficient than ever before. Firefox includes pop-up blocking; a tab-browsing mode that lets you open several pages in a single window; integrated Google searching; simplified privacy controls that let you cover your tracks more effectively; a streamlined browser window that shows you more of the page than any other browser; and a number of additional features that work with you to help you get the most out of your time online.Additional features include:
  • Live Bookmarks - RSS integration lets you read the latest news headlines and read updates to your favorite sites that are syndicated.
  • Extensions - Small add-ons that add new functionality to your Mozilla program.
  • Themes - Allows you to change the way your Mozilla program looks with new graphics and colors.
  • Privacy and Security - Built with your security in mind, Firefox keeps your computer safe from malicious spyware by not loading harmful ActiveX controls.
  • Plugins - Programs that allow websites to provide content to you and have it appear in your browser.
Firefox also comes with a standard set of developer tools including a powerful JavaScript and CSS error/warning console, and an optional Document Inspector that gives detailed insight about your pages





Download Now

CheatBook-DataBase 2011







CheatBook-DataBase 2011 is a freeware "cheat-code tracker" that makes hints and cheats (for PC, Walkthroughs, Playstation 1, Playstation 2, Playststation 3, Sega, Nintendo 64, DVD, Gameboy Advance, iPhone, Gameboy Color, N-Gage, Nintendo DS, PSP, Xbox, Gamecube, Dreamcast, Xbox 360, Super Nintendo) easily accessible from one central location. If you´re an avid gamer and want a few extra weapons or lives to survive until the next level, this freeware cheat database can come to the rescue. Covering more than 20.000 Games, this database represents all genres and focuses on recent releases.Games are listed alphabetically in the left-hand window. When you click on a game name, the relevant cheat is displayed in a editor window, with convenient buttons that let you print the selection or save any changes you´ve made.
In the latest past many users of the CheatBook-DataBase and readers of the monthly being published magazine have sent to us small error messages and suggestions for improvement again and again. First of all we say "Thank you very much!" to all of you!
Due to this assistance and the permanent sending in of new and revised cheats the CheatBook is ever increasing and becoming more and more voluminous.
Many of the suggestions which we received are now realized in the new version 2011.
  • comfortable adding of individual cheats
  • separate section with solutions
  • files and images can be stored
  • simple survey of informations about the cheat
  • statistics
  • comfortable filter conditions
  • search machine was revised
  • link manager
  • News and Updates
  • private user data base
  • Import old Own Bases
In order to arrange the program better, more comfortable and more efficient also in future, we are further on in need of your ideas and suggestions for improvement So if you have a suggestion for a new feature, if you have found a bug, or if you know software archives in which the CheatBook-DataBase is not yet provided for download, just write and let us know.
Setup is a snap. Once CheatBook-Database is on your hard drive, use it as much as you want because it´s free.



Download Now


Ashampoo Burning Studio 6.80 FREE







Burner software too complicated? Get power, simplicity and file backup too! The new Ashampoo Burning Studio 6 FREE keeps all the advantages of its predecessor and adds multi-disc file backup, an integrated audio CD ripper and further improved support for the exciting new Blu-ray format with capacities of up to 25 gigabytes per layer.Many users are tired of over-complicated CD burning applications that are getting harder and harder to use. Sometimes you can waste most of your time just trying to find a function. Ashampoo Burning Studio focuses on what you want: To burn discs quickly, easily, with maximum quality and minimum hassle. It includes everything you need to be able to do that. And it excludes everything that could get in the way.
Ashampoo Burning Studio 6 FREE is still totally simple and intuitive to use. We listened to your feedback, added the new functions you asked for and made a long list of corrections and changes. The result is a better, more powerful and more efficient CD, DVD and Blu-ray burning application than ever before


Download Now

Increase Your Iphone Battery Life With These Easy To Use Tricks






If you are an iPhone users then you must be aware of the less point of Apple’s iPhone is its Battery. With every usage of it the %age of battery decreases. Iphone offers its users whole new world of features, apps, games which cannot be resisted from exploring. But the main concern for the user will be saving the battery throughout the day. Maximum iPhone battery is 100% and it rapidly decreases according to the usage.
But every problem has a fix to it and Apple has done that for the battery issue. So let’s explore these few simple and few little tricky ones to get that extra bit of battery.
When Not in Use Turn off Your iPhone All Wireless Applications
All the latest phones, being specific Smartphone come with inbuilt wireless applications like Bluetooth and wifi access. So it is advised to switch off such features when they are not in use. As these features tends to deplete your iPhone battery fast. So turning them off can help you extend the battery life for several hours.
If not required then disable the 3G as well. As the 3G technology survives on the battery of the phone. If possible to turn off it will give you long battery life for whole day.
Make use of the auto brightness feature of your iPhone. This will automatically adjust the back light of IPhone as required. This adjustment also helps in saving battery.
Manually Lesser The Screen Brightness
Although you have enabled the auto brightness feature but in some scenarios it does not dim the light as required. There you can manually lower the brightness of the home screen for saving of the battery. Preferred is to keep your brightness to 49% to make optimum use of the iPhone battery.
End Background Apps
According to Apple, the background apps are not technically ‘running’, unless they are front and centre, which means they should not draw any power.
The multitasking application for the iPhone continues to use resources of system more efficiently depletes your battery.
Applications, for example, Skype or even other VoIP can be especially benefit from the battery when you perform within the setting and so it is better to start launching the applications only when you need which can save the battery life.
Cool Off The IPhone Temperature
High temperature of iPhone also eats up its battery life. If you find that while charging your phone the temperature is increasing, then remove the phone cover before plugging in for charging. Let it also have a breath of fresh air so place it on a table or in open space instead of your pocket. The optimum temperature for iPhone and its battery is between 32°F to 95° F.
Make Use of Solar Chargers
Solar chargers give you freedom of charging your iPhone from anywhere. So if your battery is dying out, you can save it with solar power.
Also another advantage is that you can follow the motto “Go green” while saving the electricity which in turn protects the environment.
Frequently Use your iPhone:
We all know that iphone is a precious thing for anyone but that does not mean that you restrict its use to protect it from daily wear and tear. It is best valued with optimum use of it. Not using the iPhone for a long time can reduce its battery life. Therefore one should use it regularly and change iPhone battery at least once every 6 months.
Apple has also strongly recommends that you should charge your iPhone when the battery is completely finished i.e. 0%.
So follow these tips and you can easily save your iPhone battery life and enjoy it for long.


5 Tips On How To Make Your Blog Visitors Stay Longer





The length of time that you can keep your visitors on your website can be a crucial factor in determining how successful your blog will be.
Simply getting traffic in the form of thousands of unique visitors daily is meaningless if the time they spend on your site is less than a few seconds or your bounce rate is more than 95%.
There are certain things you can do in the way you present your pages and posts which will maximize the chances of your visitors sticking around for a longer period on your site.
The longer people stay the greater your opportunity to monetize their visit or convince them to take your desired call to action.
A call to action is an Internet marketing term which refers to the primary action that you want your visitors to take when they land on your page or website. One example of a call to action  is where you want someone to click your “buy now” button and purchase your product. Another might be that you want to get people to download your free ebook after signing up as members.
Below are some tips which will help you to keep the attention of your visitors or at the very least keep them interested long enough to stay and explore your site and ultimately perform the call to action you want them to.
  1. Remove unnecessary external links from your landing pages and use internal linksTrying to increase the average visitor time on your site is one of the ways that you can decrease your bounce rate and increase your rankings.If you use Google Analytics you’ve probably already heard of the term “bounce rate”.Bounce rate (as defined by Google) is:“..the percentage of single-page visits or visits in which the person left your site from the entrance (landing) page”.
    Therefore plastering your affiliate banners and links all over your pages can work against you if your visitors leave your site immediately from the page they entered from.
    Try to entice your visitors to read more by offering them some relevant links to another internal page or post where you provide a useful review and which ultimately contains your affiliate banner. This way you are not pushing people straight out of the same door they entered.
    There are some useful WP plugins you can use to add relevant internal post links to your blog such as Yet Another Related Posts Plugin.
  2. Use emotion to present your messagePeople most often buy from emotion whether they admit it or not. This is because the actions which emanate from emotion are quite often subconscious.
    Hence, an emotional response is much more likely to achieve a call to action than a logical one.For instance if you are trying to convince someone to buy your product by using logic, then the chances are that they will also look at your argument from a rational point of view and they will weigh up the pros and cons of buying versus not buying.If you introduce an emotional element to your message such as presenting a benefit or selling a solution to a problem or highlighting how people can get closer to achieving their dream, then you will appeal to the emotional decision making areas of the brain.
    This will maximize the chances of gaining a customer because it will create an emotional connection between your message and the reader.Therefore once you have successfully forged a positive emotional relationship with your readers, they will happily want to come back to your site to explore further or even become regular customers.
  3. Include video content on your posts and pagesVideo is one of the most effective ways to communicate a message to people. Even short videos of just a few minutes can often deliver more value to your readers than multiple pages of writing can.
    Therefore in the cases where you would usually get people browsing through an article in 10 to 20 seconds before leaving, the added benefit of using a short video is that it increases the likely-hood that people will stay on your site for longer because they are watching your video.
    Video on the Internet is really just a modern extension of TV but the great thing is that you get to be the producer of the content.
  4. Use captivating images in conjunction with your copy or content
    Quite often the right image coupled with the relevant content can induce an emotional response and it can help lay the foundations for the right mindset you want to create before somebody reads your sales pitch or post.
    Humans are quite easily visually stimulated and you can exploit this by using effective images and colors with your message.
  5. Focus on providing value and informative content rather than blatant advertising
    Your content and the value which it provides is the sticking point which helps to build a relationship with your readers. A relationship needs some measure of trust by both parties but when you successfully gain this trust from your readers or clients then you are also creating a longer term investment where current customers also become future customers.There are many ways you can provide value for people who will in turn be very happy to return the favor by becoming a customer. For instance you could offer free online courses or a series of tutorials which people can access after they sign up as free members.
    You could also set up your own forum or support system which provides help to people but also an opportunity for people to interact with each other.

The Importance of Buttons and Strong Calls to Action






Whether you are trying to convert targeted visitors to buyers, or curious web surfers to “FREE” members, the recipe you will usually need to follow when constructing your landing page is the same: that is, you must strive to have an unambiguous and clear call to action on your web page.
Some Internet Marketers like to use the term “primary call to action” to refer to the most important action which you would like any person viewing that page to perform.
There are also other levels of call to action types which are sometimes referred to as “secondary call to action” and “subordinate call to action” but these are lower down on the importance scale when compared to the primary call to action.
The primary call to action is the ultimate goal of your landing pages and it defines the purpose of why you have that page on your site to begin with.
A primary call to action should generally be represented by some kind of button although this is not strictly always the case.
Human beings surfing the Internet seem to be psychologically drawn to buttons and people are almost instinctively compelled to click them if they feel that the situation calls for it.
This is why well designed and strategically placed buttons are often the best tools you can employ for your primary call to action.

Qualities of Effective Buttons and Button Copy

The button representing your primary call to action must be easily identifiable and its purpose should be clear and unambiguous.
The information below is an outline of what to look for in the qualities of your button in order to make it achieve its intended purpose of getting people to perform your primary call to action.
1) Button Text and Copy
You should always aim to be specific with the words that you place inside your buttons rather than generic.
Being specific, concise and clear with the button copy leaves no doubt in the visitor’s mind about what they should expect when they click your button.
For instance, some examples of effective button copy are shown:
  • “Sign Up For Free”
  • “Get Your Copy Now”
  • “Start Creating Today”
You may notice a pattern in the above statements.
They all start with familiar verbs (Get, Sign, Start) and they all contain either a statement of value (ie, Free) or a promise of instant gratification (Now, Today)
2) Using case in your button text
Internet Marketers have found through their research that the way you present the text in the button can also make difference as to how noticeable your button is to the people reading your web page.
Using title case, where the first letter of each word is in capitals, is one easy and effective way to make your button appear more eye catching and readable to your visitors.
3) Good button design and placement
It seems that some buttons are better than others when it comes to effectiveness.
This is why choosing your button design can mean the difference between a conversion or a lost sale.
But what makes one button better than another?
Below are some good button design characteristics which you might want to consider when selecting your buttons:
  • Use an eye-catching color which stands out:
    Some colors which are pleasing to the eye include green, blue, orange.
    The color red can sometimes be used too but remember that it can also tend to be associated with some kind of warning or danger.
  • Your button should be large and bold:
    Because your button will often be associated with a primary call to action, you should make it noticeable and large enough that it stands out and is not obscured by the content on your page.The definition of large can vary from site to site, but your button should be at least as big if not larger than your logo.
  • Placement of your button:
    The positioning of your buttons is another important factor which can affect your landing page’s effectiveness.In general, you should position your primary call to action button within the first few hundred pixels of the top of your page.
    If your landing page contains a lot of copy and the reader will need to scroll at least more than a page’s worth of content, then you should also consider placing your button at least one time on your page.
    For instance if your landing page is long enough, your primary call to action button may appear near the top of the page, then somewhere in the middle and lastly at the bottom of the page.
    By placing your call to action in several places you are making it easy for your readers to buy if they want to.

Using Click Triggers to Enhance Button Effectiveness

In some cases a button needs some kind of a catalyst to convince somebody to click it.
This is where some Internet Marketers use what’s known as click triggers with their buttons.
A click trigger is basically a message or piece of text which is placed near or inside the boundaries of a primary call to action with the aim of persuading somebody to go ahead and click the button.
The click trigger message usually serves to alleviate doubts somebody might have before purchasing something.
Examples of effective click triggers which you could place near your button are:
  • “Risk Free”
  • “Free Shipping”
  • “No Questions Asked Money Back Guarantee”
  • “Save 50% – March Only”
Quite often you’ll see many web sites with multiple click trigger messages placed near their primary call to actions and buttons.
Don’t be afraid to apply click triggers liberally to your call to actions.

Secondary and Subordinate Calls To Action

We mentioned earlier that in addition to your primary call to action, you might also have secondary and subordinate calls to action on the same page.
A secondary call to action is usually represented by a large text link or even a button, but it is designed to serve a secondary purpose to your primary call to action.
For instance if someone wanted to “Find Out More” about your product or service, then this is a great example where you would create a button to serve as your secondary call to action.
You should strive to differentiate your secondary call to action button from the primary by making it smaller in size and/or a different color.
The subordinate call to action is almost always represented as a text link and is even further down the list of importance but can still serve a useful purpose.
This type of call to action can be used to help navigate a user to another page where they might seeking some related information.
In summary, applying the above information and techniques to your landing pages is the best way to learn what works for you. Remember that each site and niche might have its unique quirks so don’t be afraid to experiment.

Friday, May 11, 2012

Nokia mobile secret codes



On the main screen type
*#06# for checking the IMEI (International Mobile Equipment Identity).
*#7780# reset to factory settings.
*#67705646# This will clear the LCD display (operator logo).
*#0000# To view software version.
*#2820# Bluetooth device address.
*#746025625# Sim clock allowed status.
*#62209526# - Display the MAC address of the WLAN
adapter. This is available only in the newer devices that
support WLAN
#pw+1234567890+1# Shows if sim have restrictions.
*#92702689# - takes you to a secret menu where you
may find some of the information below:
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture
3. Displays (if there) the date where the phone was
purchased (MMYY)
4. Displays the date of the last repair - if found (0000)
5. Shows life timer of phone (time passes since last start)
*#3370# - Enhanced Full Rate Codec (EFR) activation.
Increase signal strength, better signal reception. It also
help if u want to use GPRS and the service is not
responding or too slow. Phone battery will drain faster
though.
*#3370* - (EFR) deactivation. Phone will automatically
restart. Increase battery life by 30% because phone
receives less signal from network.
*#4720# - Half Rate Codec activation.
*#4720* - Half Rate Codec deactivation. The phone will
automatically restart
If you forgot wallet code for Nokia S60 phone, use this
code reset: *#7370925538#
Note, your data in the wallet will be erased. Phone will ask
you the lock code. Default lock code is: 12345
Press *#3925538# to delete the contents and code of
wallet.



DDOS Attack


A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is
an attempt to make a computer resource unavailable to its intended users. Although the means to
carry out, motives for, and targets of a DoS attack may vary, it generally consists of the
concerted efforts of a person or persons to prevent an Internet site or service from functioning
efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites
or services hosted on high-profile web servers such as banks, credit card payment gateways, and
even root nameservers.
One common method of attack involves saturating the target (victim) machine with external
communications requests, such that it cannot respond to legitimate traffic, or responds so slowly
as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by
either forcing the targeted computer(s) to reset, or consuming its resources so that it can no
longer provide its intended service or obstructing the communication media between the
intended users and the victim so that they can no longer communicate adequately.
A DoS attack can be perpetrated in a number of ways. The five basic types of attack are:
1. Consumption of computational resources, such as bandwidth, disk space, or processor
time
2. Disruption of configuration information, such as routing information.
3. Disruption of state information, such as unsolicited resetting of TCP sessions.
4. Disruption of physical network components.
5. Obstructing the communication media between the intended users and the victim so that
they can no longer communicate adequately.
A DoS attack may include execution of malware intended to:
Max out the processor's usage, preventing any work from occurring.
Trigger errors in the microcode of the machine.
Trigger errors in the sequencing of instructions, so as to force the computer into an
unstable state or lock-up.
Exploits errors in the operating system to cause resource starvation and/or thrashing, i.e.
to use up all available facilities so no real work can be accomplished.
Crash the operating system itself.
iFrame (D)DoS, in which an HTML document is made to visit a webpage with many
KB's of information many times, until they achieve the amount of visits to where
bandwidth limit is exceeded.
ICMP flood
A smurf attack is one particular variant of a flooding DoS attack on the public Internet. It relies
on misconfigured network devices that allow packets to be sent to all computer hosts on a
particular network via the broadcast address of the network, rather than a specific machine. The
network then serves as a smurf amplifier. In such an attack, the perpetrators will send large
numbers of IP packets with the source address faked to appear to be the address of the victim.
The network's bandwidth is quickly used up, preventing legitimate packets from getting through
to their destination.To combat Denial of Service attacks on the Internet, services like the Smurf
Amplifier Registry have given network service providers the ability to identify misconfigured
networks and to take appropriate action such as filtering.
Ping flood is based on sending the victim an overwhelming number of ping packets, usually
using the "ping" command from unix like hosts (the -t flag on Windows systems has a far less
malignant function). It is very simple to launch, the primary requirement being access to greater
bandwidth than the victim.
SYN flood sends a flood of TCP/SYN packets, often with a forged sender address. Each of these
packets is handled like a connection request, causing the server to spawn a half-open connection,
by sending back a TCP/SYN-ACK packet, and waiting for a packet in response from the sender
address. However, because the sender address is forged, the response never comes. These halfopen
connections saturate the number of available connections the server is able to make,
keeping it from responding to legitimate requests until after the attack ends.

Teardrop attacks
A Teardrop attack involves sending mangled IP fragments with overlapping, over-sized,
payloads to the target machine. This can crash various operating systems due to a bug in their
TCP/IP fragmentation re-assembly code.[4] Windows 3.1x, Windows 95, and Windows NT
operating systems, as well as versions of Linux prior to versions 2.0.32 and 2.1.63 are vulnerable
to this attack.
Peer-to-peer attacks
Attackers have found a way to exploit a number of bugs in peer-to-peer servers to initiate DDoS
attacks. The most aggressive of these peer-to-peer-DDoS attacks exploits DC++. Peer-to-peer
attacks are different from regular botnet-based attacks. With peer-to-peer there is no botnet and
the attacker does not have to communicate with the clients it subverts. Instead, the attacker acts
as a 'puppet master,' instructing clients of large peer-to-peer file sharing hubs to disconnect from
their peer-to-peer network and to connect to the victim’s website instead. As a result, several
thousand computers may aggressively try to connect to a target website. While a typical web
server can handle a few hundred connections/sec before performance begins to degrade, most
web servers fail almost instantly under five or six thousand connections/sec. With a moderately

big peer-to-peer attack a site could potentially be hit with up to 750,000 connections in a short
order. The targeted web server will be plugged up by the incoming connections. While peer-topeer
attacks are easy to identify with signatures, the large number of IP addresses that need to be
blocked (often over 250,000 during the course of a big attack) means that this type of attack can
overwhelm mitigation defenses. Even if a mitigation device can keep blocking IP addresses,
there are other problems to consider. For instance, there is a brief moment where the connection
is opened on the server side before the signature itself comes through. Only once the connection
is opened to the server can the identifying signature be sent and detected, and the connection torn
down. Even tearing down connections takes server resources and can harm the server.

           








How to access your mobile remotely?




Signup with www.mymobilesite.net and install a application (.sis ) file on nokia phone to
access mobile from computer(internet).
We can access:
Guest and friend user accounts
Calendar - manage your calendar, and share your availability for others too
Messaging - SMS inbox/outbox and SMS sending

Phone log - view missed calls
Contacts - manage your contacts easily
Blog - tell stories on your journeys
Camera - share instant pictures
Gallery - browse pictures taken with camera phone, and share them to others
Guestbook - visitors can leave their comments
Contact me - visitors can send instant messages to you
Presence - share your status and device state
Web chat - communicate with friends
Start and stop your mobile site from the web
Share your mobile site content via RSS feeds (NEW)
Your carrier might charge you for data traffic caused by Mobile Web Server. Consult your
carrier about data transfer fees. Mobile Web Server includes a data transfer counter to estimate
your Mobile Web Server data traffic amount.



Google hacking to find out any software within 15 second




Google hacking is a term that refers to the act of creating complex search engine queries in order
to filter through large amounts of search results for information related to computer security. In
its malicious format it can be used to detect websites that are vulnerable to numerous exploits
and vulnerabilities as well as locate private, sensitive information about others, such as credit
card numbers, social security numbers, and passwords.
Google hacking is a process to find any file as soon as possible with help of some advanced
parameter.
For example we need AVG antivirus or any software, and we have 10-15 second so we use
google advanced parameter, to search from rapidshare.com

site:rapidshare.com avg

Other Parameters:
intitle:admbook intitle:version filetype:php
intitle:"Index of" passwords modified
allinurl:auth_user_file.txt
"access denied for user" "using password"
"A syntax error has occurred" filetype:ihtml
allinurl: admin mdb
"ORA-00921: unexpected end of SQL command"
inurl:passlist.txt
"Index of /backup"
allinurl:auth_user_file.txt
DCForum's password file. This file gives a list of (crackable) passwords, usernames and email
addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger
than others, all are fun, and all belong to googledorks. =)

intitle:"Index of" config.php
This search brings up sites with "config.php" files. To skip the technical discussion, this
configuration file contains both a username and a password for an SQL database. Most sites with
forums run a PHP message base. This file gives you the keys to that forum, including FULL
ADMIN access to the database.
eggdrop filetype:user user
These are eggdrop config files. Avoiding a full-blown discussion about eggdrops and IRC bots,
suffice it to say that this file contains usernames and passwords for IRC users.
The syntax “link:” will produce a list of webpages that have a link to a specified webpage.
For example: link:www.hak9.com will create a Google list of websites with links to
www.hak9.com.
The Google syntax “phonebook” searches for U.S. street addresses and phone number
information. For Example: “phonebook:James+FL” will list down all names of person
having “James” in their names and located in “Florida (FL)”.

More Information


Monday, May 7, 2012

WWE RAW Total Edition



WWE Smackdown VS Raw Full Version - Vince McMohan is a person who had the idea to create impressions smackdown. Minds that there is only imagined to get a lot of money and popularity. Until he proclaimed pretend wrestling event on 29 April 1999. proven, money and popularity eventually won him completely. She has also incite boxer Muhammad Ali with Japanese wrestler Antonio Inoki.
Smackdown show was inspired from World Championship Wrestling (WCW) Thunder appearing on the TBS cable TV in 1988. new on 29 April 1999 World Wrestling Federation (WWF) to make smackdown. To complement the success smackdown, in February 2000, Toy Headquarters made nine smackdown game series.
Smackdown so famous in Indonesia. Not infrequently the fans (especially kids) to pretend to follow the style of smackdown stars like John Cena, Rey Mysterio, Stone Cold, and Kent. Smackdown scenes are so well known in various electronic media in Indonesia. Not only on television stations only. But it also has many games smackdown on the market. Lately television stations that broadcast the Lativi smackdown.
Smackdown is not only popular in Indonesia, but almost all over the world. In America, Europe, and Asia, smackdown so popular. Even in Italy the street soccer scene has changed with exercise mimics the movement of the wrestlers, despite regular TV parties always include the "do not try to do it at home". Therefore, criticism Lippi for lovers of football is considered as an early warning. Del Piero, Totti, or the hero of Italy in the 2006 World Cup, Marco Materazzi, is a local product who nurtured since childhood. But in fact, show smackdown has been twisted and poisoned the minds of the Italian boys.


James Cameron's Avatar: The Game Demo

                   

This is the playable demo for James Cameron's Avatar, the game based on the upcoming movie. The full game is scheduled to release on December 1st. Continue reading after the jump for system requirements.



VERY IMPORTANT! Ensure that Windows XP has Service Pack 2 (or better) or that Windows Vista has Service Pack 1 (or better).

Minimum System Requirements:

Operating System: Windows XP (with SP2) or Windows Vista (with SP1)
Processor: 3 Ghz Intel® Pentium® D 830, AMD Athlon™ 64 X2 3800+ or better
RAM: 1 GB Windows XP / 2 GB Windows Vista, Windows 7
Video card: NVidia 6800 or ATI X1650 or better, 256 MB DirectX 10.0–compliant video card or DirectX 9.0c–compliant card with Shader Model 3.0 or higher.
Hard Drive Space: 1.5 GB
Sound: DirectX 9.0c Compatible Sound Card with Latest Drivers
Internet: Broadband connection and service required for multiplayer mode

Windows-compatible mouse required

Recommended System Requirements

Operating System: Windows XP (with SP2), Windows Vista® (with SP1) or Windows 7
Processor: Intel Core 2 Duo Family, AMD Athlon 64 X2 5200+, AMD Phenom or better
RAM: 2 GB
Video card: NVidia 8600 GTS or better, ATI X1900 or better, 512 MB of graphic memory
Hard Drive Space: 1.5 GB
Sound: DirectX 9.0c Compatible Sound Card 5.1 with Latest Drivers
Internet: Broadband connection and service required for multiplayer mode

Sunday, May 6, 2012

EA sports cricket torrents




The accident of candid alternation or competitions makes candid atmosphere all around. Candid is a action appellation of amusement and excitement. Candid lovers are abounding with affection while watching the all-embracing activity. Candid becomes the admired accountable of lovers to be mentioned during a competition. Once candid atmosphere creates up, it's difficult for candid fan to get over the candid aerial temperature. Candid fan techniques to assorted assets to be affiliated with watching of cricket, arresting media happens to be best adjustment for candid lovers. That allows fan to feel aforementioned amusement of action action on floor. The amusement of candid action artlessly leaves them thirstier alike afterwards the advantage of candid match. The alluring of candid admiration leads them appear on the internet candid game.ea sports cricket torrents

Online candid bold is growing acceptance day by day. Online candid bold can be performed on web folio alms candid game. Fans themselves can accomplish game. They anatomy their own aggregation by selecting gamers of their preference. There is a lot of civic and common gamers. The rules are altered on assorted websites. Online candid action being encounters altered aftertaste of suits, as they don't accept to go to the apple to accomplish the all-embracing activity. The on the internet candid action draws alike non- candid adorning being as a aftereffect of accessible use of web page, Online Candid action can be performed on visitor's ambition and will as it is absolutely free activity.ea sports cricket torrents

Saturday, May 5, 2012

How to Prevent Email Password Hacking




Don't use the links in an email, instant message, or chat to get to any web page if you

suspect the message might not be authentic or you don't know the sender or user's handle

Instead, call the company on the telephone, or log onto the website directly by

typing in the Web adress in your browser

Avoid filling out forms in email messages that ask for personal financial information

You should only communicate information such as credit card numbers or account

information via a secure website or the telephone

Always ensure that you're using a secure website when submitting credit card or other

sensitive information via your Web browser

Phishers are now able to 'spoof,' or forge BOTH the "https://" that you normally

see when you're on a secure Web server AND a legitimate-looking address. You

may even see both in the link of a spam email. Again, make it a habit to enter the

address of any banking, shopping, auction, or financial transaction website

yourself and not depend on displayed links.

Phishers may also forge the yellow lock you would normally see near the bottom

of your screen on a secure site. The lock has usually been considered as another

indicator that you are on a 'safe' site. The lock, when double-clicked, displays the

security certificate for the site. If you get any warnings displayed that the address

of the site you have displayed does NOT match the certificate, do not continue.

Remember not all spam sites will try to show the "https://" and/or the security lock. Get

in the habit of looking at the address line, too. Were you directed to PayPal? Does the

address line display something different like

"http://www.gotyouscammed.com/paypal/login.htm?" Be aware of where you are going.



Consider installing a Web browser tool bar to help protect you from known fraudulent
websites. These toolbars match where you are going with lists of known phisher Web
sites and will alert you.
The newer version of Internet Explorer version 7 includes this tool bar as does
FireFox version 2
EarthLink ScamBlocker is part of a browser toolbar that is free to all Internet
users - download at http://www.earthlink.net/earthlinktoolbar
Regularly log into your online accounts
Don't leave it for as long as a month before you check each account
Regularly check your bank, credit and debit card satements to ensure that all
transactions are legitimate
If anything is suspicious or you don't recognize the transaction, contact your bank
and all card issuers
Ensure that your browser is up to date and security patches applied
Always report "phishing" or “spoofed” e-mails to the following groups:
forward the email to reportphishing@antiphishing.org
forward the email to the Federal Trade Commission at spam@uce.gov
forward the email to the "abuse" email address at the company that is being
spoofed (e.g. "spoof@ebay.com")
when forwarding spoofed messages, always include the entire original email with
its original header information intact
notify The Internet Crime Complaint Center of the FBI by filing a complaint on
their website: www.ic3.gov/


Email Bombing (Force to Remove all Remote user Emails)*




Our Author developed a PHP script to send 1 crore email per hour to direct inbox for email
bombing with email spoofing plug-in.
How to use this script:
Download and upload to your hosting account that support php file.
and access from internet explorer.

Download Now

How to Protect yourself from password Hacking?




Prevention is always better than cure. If you would like to take the risk, a common
practice (for some of us) is to use another PC when we need to do something risky. With
constant PC upgrades, many of us could easily keep an older PC (at least one) just for this
purpose.
Use complex passwords and do not write anywhere. And use passwords on internet
where SSL is enabled.


Use Password manager like: KeePass Password safe?
Today you need to remember many passwords. You need a password for the Windows
network logon, your e-mail account, your homepage's FTP password, online passwords
(like website member account), etc. etc. etc. The list is endless. Also, you should use
different passwords for each account. Because if you use only one password everywhere
and someone gets this password you have a problem... A serious problem. The thief
would have access to your e-mail account, homepage, etc. Unimaginable.


KeePass is a free open source password manager, which helps you to manage your
passwords in a secure way. You can put all your passwords in one database, which is
locked with one master key or a key file. So you only have to remember one single
master password or select the key file to unlock the whole database. The databases are
encrypted using the best and most secure encryption algorithms currently known (AES
and Twofish).
After creating password database, just drag and drop to use passwords. This software is
portable run from pen drive also.

Download Now