Monday, January 31, 2011

Facebook Accounts Hacked; 1.5 Million Login IDs For Sale?

Want a great deal on a Facebook account? A Russian hacker who calls himself "kirllos" claims he can sell you 1,000 unsuspecting users' login credentials for just $25, or $45 if the accounts have more than 10 friends each.

The hacker is believed to have stolen the IDs of 1.5 million Facebook users. If accurate, that means one out of every 300 Facebook users may have been victimized. Kirllos is selling the information on an underground hacker website, according to VeriSign's iDefense Labs. The cybersecurity company estimates that kirllos has sold around 700,000 accounts so far, but VeriSign was unable to verify if any of the accounts are legitimate accounts belonging to real Facebook users.
Kirllos' prices are incredibly cheap compared to other scams for sale. E-mail usernames and passwords usually fetch between $1 to $20 each, according to Symantec's latest Internet Security Threat Report. In contrast, Kirllos is claiming he will sell accounts for as little as 25 cents each.
According to Mashable, hacking Facebook "isn't a new hobby for this person." The site has a screenshot of another offer kirllos allegedly made last year when he claimed to be selling 100,000 compromised accounts.
Users whose Facebook ID's and passwords have been stolen could be vulnerable to identity theft or even "more insidious scams," Mashable says.
Facebook is investigating the specific accounts kirllos has put up for sale, and will block access to those that have been hacked until they can be restored to their original users, according to Facebook's Simon Axten.
"We invest heavily in helping people keep their accounts secure and have a team of security professionals who investigate specific attacks on our users and work with law enforcement to pursue those responsible," Axten said.

Install Windows xp Very Fast




Now, this tip will be very helpful for those who frequently install windows xp operating system. Normally OS installation takes around 40 minutes to complete, but through this trick you can now save 10-15 minutes. This simple tricks goes this way.
1. Boot through Windows XP CD.
2. After all the files are completely loaded, you get the option to select the partition. Select “c”.


3. Now Format the partition, whether it is normal or quick with NTFS or FAT


4. Once the formatting is completed, All the setup files required for installation are copied. Restart your system by pressing Enter.
Now, here begins the Simple trick to save 10-15 minutes.



5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.


6. Now, Press SHIFT + F10 Key ->  This opens command prompt.


7. Enter “Taskmgr” at the command prompt window. This will open Task Manager.


8. Click the Process Tab, here we find a process called Setup.exe -> Right Click on Setup.exe -> Set Priority -> Select High or Above Normal. Initially it will be Normal.


Thats it, no more work to do. Relax your self and see how fast the installation process completes

Saturday, January 29, 2011

To Create Folder " CON "


Try to create a folder in Windows with either of these names--
"con" or "nul" or "Aux" or "Lpt1".Windows will not let u create ....
Reason: all this correspond to some of the famous ports
>con corresponds to the console
>Lpt1 corresponds to printer and so on....
HOWEVER I FOUND A TRICK TO CREAT FOLDER "CON"
Here is a simple method..........
Rename folder from the right click option........
Now press alt and press 255...
press 255 frm the right sideof the key bords i.e., num pad....
where only numbers r given.....
now write con and then press enter!!
you ll see a con folder in ur pc and also you can delete it easily.

Rename at a time

You have a lots of photos in some folder on your computer, all have numbers-names, and you want to name them like Home1.jpg, Home2.jpg, ... Don't need to do that one by one. You can do that automatically with this little trick.

Open that folder and chose View - Thumbnails

i)Left click on any 
picture and CTRL + A. That way you will select all files in that folder.

ii)Right click on first
 
pic and chose "Rename" from drop-down menu.
Renaming files tip

Windows XP will 
highlight name of that file and you will be able to name it. After filling the name, click somewhere outside, in white space. You're done. If you named firs file "Anything" all selected files will get names "Anything1", "Anything2", "Anything3", and so on.

Fun with Notepad

1)The flight number of the plane that had hit WTC on 9/11 was Q33N ….

In 
Notepad, type the flight number i.e. Q33N
Increase the Font Size to 
72, Change the Font to Wingdings.
You will be amazed by the findings !!!

2)Open Notepad.
Type the words as follows:
Bush hid the facts.

Now save the file (give it any name you like), close the notepad.
open it again. ou will se Square characters instead of the words you had written.
It Works Only with XP.
It works with certain names. It worked with:
bush
saddam
tony blair

Speed up XP

To disable unneeded startup services for a safer, faster XP, use the "Services" Admin Tool (Control Panel > Administrative Tools > Services). If you are a single user of a non-networked machine, you can disable the following items, with no ill effect.
Alerter
Clipbook
Computer Browser
Fast User Switching
Human Interface Access Devices
Indexing Service (Slows the hard drive down)
Messenger
Net Logon (unnecessary unless networked on a Domain)
Netmeeting Remote Desktop Sharing (disabled for extra security)
Remote Desktop Help Session Manager (disabled for extra security)
Remote Procedure Call Locator
Remote Registry (disabled for extra security)
Routing & Remote Access (disabled for extra security)
Server SSDP Discovery Service (this is for the utterly pointless "Universal P'n'P", & leaves TCP Port 5000 wide open)
TCP/IP NetBIOS Helper Telnet (disabled for extra security)
Universal Plug and Play Device Host
Upload Manager
Windows Time
Wireless Zero Configuration (for wireless networks)
Workstation

Remove the Shared Documents folders from My Computer


One of the most annoying things about the new Windows XP user interface is that Microsoft saw fit to provide links to all of the Shared Documents folders on your system, right at the top of the My Computer window. I can't imagine why this would be the default, even in a shared PC environment at home, but what's even more annoying is that you cannot change this behavior through the shell: Those icons are stuck there and you have to live with it.
Until now, that is.


Simply fire up the Registry Editor(type regedit in run menu) and navigate to the following key: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders
You'll see a sub-key named {59031a47-3f72-44a7-89c5-5595fe6b30ee}. If you delete this, all of the Shared Documents folders (which are normally under the group called "Other Files Stored on This Computer") will be gone.
You do not need to reboot your system to see the change.

PirateBox lets you share files with anyone close by

Online file-sharers disheartened at the news that Google has begun censoring peer-to-peer search terms can now take their data into the real world with the PirateBox, a lunchbox-sized device created by David Darts, a professor of art and technology at NYU Steinhardt.

The PirateBox broadcasts an open WiFi network that anyone in the vicinity can anonymously join. Once connected, users can upload and download any files they please - effectively creating a temporary and portable file sharing network. You don't need to log in and no user data is recorded, so file-sharers are free to trade whatever they like.

Darts built the device, originally called Freedrop, as an easy way to share files with his students in class. "I was looking for a device that would allow users in the same physical space to easily share files," he says. It was a hit, but he soon found that his students had other sharing plans. "Students started sharing non-class related materials, their favorite albums and so on."

This alternative use inspired Darts to place the Freedrop inside a pirate-themed lunchbox, inevitably leading to the name PirateBox. But is he encouraging piracy? "Pirate is a strange term," says Darts, who prefers to see the device as a tool for sharing content of any kind. "But calling it the PirateBox is certainly provocative."

If you fancy making your own PirateBox, Darts provides instructions for building one at a cost of around $100. It's not the first time file-sharing has entered the real world though - last year artist Aram Bartholl installed USB sticks in walls and buildings around New York to create a series of digital dead drops.

Watch Out, Facebook App Promising to Show you Pageviews is Evil


Yes, we would all like to know our stalkers and just how popular we are, but Facebook has made it clear that there is no ability to do that yet. Any third party apps that tell you they can tell you who's stalking you and how many pageviews your profile is getting aren't telling you the full story. There's always a catch. In this case, it's malware. The applications shows itself as a link saying "My total Facebook views are ___ (insert some number here). To see your profile views, click here (insert malicious link here)". 
The link takes you to a survey asking you for some pretty personal information after promising you the goods at the end of the survey. Many people take the survey thinking it's just a formality. And then they get a random number at the end of it. The survey is really a spammer's way of getting into your computer (when agreeing to take the survey, you're agreeing to the spammer infiltrating your computer). Once in, he/she has full access to your personal data. And the number at the end of the tunnel is completely made up. Don't let it excite you/bring you down/change your life plans. 

It makes me wonder though, what have we become as a human race if we're willing to skip reading the fine print and wasting time on a survey, just to see how many views our profile has gotten. Hmm, narcissistic little bunch aren't we?  

Mark Zuckerberg's Facebook Page Hacked

It looks like even the best are vulnerable to being hacked. News broke out today that Facebook founder Mark Zuckerberg’s own Facebook page was taken control of by a hacker who was able to gain access and started posting updates and message on the wall.
An update on Mr. Zuckerburg’s wall said the following “Let the hacking begin: If Facebook needs money instead of going to the banks, why doesn’t Facebook let its users invest in Facebook in a social way? Why not transform Facebook into a social business the way Nobel Prize winner Muhammad Yunus described it?"

The post also contained a shortened URL which led to a Wikipedia page for ‘social business’. Just before the page was taken down by Facebook, it gathered over 1806 ‘likes’ from various followers. Mr. Zuckerberg page has been redirected to a new URL and is now up and running for all to see.

It is not yet known how the breach occurred, but it’s still bad news for Facebook, which has been in the limelight recently for its decision to use a person’s activity as advertising or wanting to share your information with third party apps which it later backtracked on. 

Monday, January 24, 2011

Hack bux.to and make money


Bux.to is a PTC site(Paid to click).You get paid to click on ads and visit websites. The process is easy! You simply click a link and view a website for 30 seconds to earn money.In this article i will show you on How to hack bux.to to browse ads.By using this trick you will be able to surf more ads and the most amazing part is that you will not get banned by doing this.
Here is a step by step procedure to hack bux.to and make money:
Step 1:
                                First of all signup for bux.to account

Step 2:
You will need a firefox browser for this hack, to download firefox 
Click here
Step3:
Install 
Greasemonkey Plugin then restart Firefox
Step 4:
Install 
Bux : Browse Ads script for Greasemonkey.
Step 5:
You are almost done just login and click on Surf Ads in your main menu.
Then the script will automatically launch and Browse Ads .

Sunday, January 23, 2011

ALL IN ONE HACKING TOOLS

A collection of great hacking tools useful for many hackers download it from the following link

http://www.fileserve.com/file/dfqKDUt

Windows 7 God Mode


Windows 7 is predominantly the best OS ever in the history of Microsoft. But, do you know that it has a GodMode within it ?
There is a hidden “GodMode” feature that lets a user access all of the operating system’s control panel features from within a single folder.
To enter “GodMode,” one need to create a new folder and then rename the folder to the following:
GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
Just try it..:)
Found some more of Microsoft’s inbuilt godmode dev tools-
Append each of these after “FolderName.”
{00C6D95F-329C-409a-81D7-C46C66EA7F33}
{0142e4d0-fb7a-11dc-ba4a-000ffe7ab428}
{025A5937-A6BE-4686-A844-36FE4BEC8B6D}
{05d7b0f4-2121-4eff-bf6b-ed3f69b894d9}
{1206F5F1-0569-412C-8FEC-3204630DFB70}
{15eae92e-f17a-4431-9f28-805e482dafd4}
{17cd9488-1228-4b2f-88ce-4298e93e0966}
{1D2680C9-0E2A-469d-B787-065558BC7D43}
{1FA9085F-25A2-489B-85D4-86326EEDCD87}
{208D2C60-3AEA-1069-A2D7-08002B30309D}
{20D04FE0-3AEA-1069-A2D8-08002B30309D}
Example- Hacking.{ash23-ifsdf..u know now!}
Now Go and “GOD MODE YOURSELF”.

Saturday, January 22, 2011

Firesheep Makes Facebook Hacking Easy

Recently a new firefox addon Firesheep have been a cause of thousands of email accounts, As reported by techcurnch, Firesheep has been downloaded more than 104,000 times in roughly last 24 hours, With Firesheep the hacker can control any account without even knowing the username and password of the desired account, As Facebook is worlds most popular Social Networking website, therefore it has been the major victim of it, Firesheep uses Http Session hijacking attack to gain unauthorized access to a Facebook or any other account


What is Session Hijacking?


In a Http session hijacking attack an attacker steals victims cookies Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook Google, Yahoo, Orkut, Flickr etc or any other email account


How can a Hacker use Firesheep to Hack a Facebook or any other account?


1. First of all download Firesheep from the above link and use the openwith option in the firefox browser.
2. Once you have installed firesheep on firefox web browser Click on view at the top, then goto sidebar and click on Firesheep.
3. Now click on the top left button "Start capturing" and it will start to capture the sessioncookies of people in your wifi network, This will show you the list of those people whosecookies are captured and have visited unsecured website known to firesheep, Double click on the photo and you will be logged in instantly.
link for downloading FIRESHEEP 
You need to download a software called WINPCAP in order to make FIRESHEEP works.You can download it from the following link


Can Hackers still Hack facebook?

Facebook Security team are constantly taking steps to avoid hackers from gaining unauthorized access to Facebook accounts.Recently Facebook has introduced 2 new security features.
The first 
feature allows Facebook users to identify and name the devices from which they access the site, and then receive notifications whenever someone attempts to log in under their names from other devices.
The second feature will automatically block suspicious logins.Facebook will record your IP address of the computer through which you log in to your 
Facebook account and if you try to gain access to your facebook acount from another IP they can ask you to answer your secret question , identify your pictures etc
Here is the official statement by Facebook:



When we see that someone is trying to access your account from an unusual device, we’ll ask the person to answer an additional verification question to prove his or her identity as the real account owner

Can Hackers still Hack Facebook Account?


So the question arrives here will it stop hackers from Hacking your Facebook account.The answer is no, you see that vulnerabilities are discovered so there is no way you can prevent it from happening.There are still alot of methods which hackers can use to gain access to yourFacebook account.If you are not a victim you could be so you should take steps to secure yourFacebook account.

Tuesday, January 18, 2011

Dual-screen Acer Iconia laptop

At a Manhattan press event on Tuesday, Acer announced a dual-screen multitouch laptop that, while looking like a concept computer in the flesh, also looks like it's trying to get the best of two worlds at once. Iconia is a 14-inch laptop with an additional 14-inch screen where a keyboard would normally be.The twin Gorilla-glass-enforced multitouch displays seem to work like the iPad's panels, with support for 10-finger simultaneous touch.Iconia is, at its heart, a Core i5 laptop with familiar specs: up to 4GB of DDR3 RAM, integrated Intel graphics, a hard drive up to 750GB, and Windows 7 Home Premium. Ports are also typical for a high-end laptop: two USB 2.0, one USB 3.0, HDMI, and VGA.

No specific availability or pricing has been announced either--Acer is calling Iconia a "concept device," which seems to place it firmly into the same experimental/expensive category that the Toshiba Libretto W105 fell into. Most importantly, we've yet to see a Windows 7 touch device that's really been easy or useful to operate. Will Iconia break the mold? We'll have to wait and see.



Monday, January 17, 2011

Apple to Give Away $10,000 to One Lucky App Store Customer

While the Mac App Store might be all the rage right now, let’s not forget its predecessor. If you’ve visited the Apple website recently, you’ll notice things are a little different right now. Apple have posted a live counter on the website, one which tracks the app purchases and downloads on Apple’s App Store. It’s nearing 10 billion downloads and Apple wants to, and I quote, “thank” their customers.
How will they go about it? Well, by doing the same thing they did when the digital store was nearing 1 Billion downloads back in 2009. They gave away a $10,000 iTunes voucher to a thirteen year old boy, along with a Macbook Pro, iPod Touch and a Time Capsule backup device. The 10 billionth downloader will receive a $10,000 voucher as well, but Apple haven’t said anything about the other goodies they might have on offer.
We’re planning on trying our luck, to be honest. What do you think we should do, wait it out until it gets really, really close or just hit download and hope our luck gets us the magic number? Either way, the counter is moving at a frighteningly fast pace and is on track to reach 10 billion by next weekend.

Facial Recognition-based Search Announced

Knowing how random the results are from the current image search engines, Swedish company Polar Rose has announced the launch of a visual search engine that should hopefully make image searching a lot more accurate.

Polar Rose uses facial recognition and 3D imaging software to provide a whole new method for web-based image searches. A beta of the software will be available for public use, by February next year.

Polar Rose is also working on a plugin for the Firefox and Internet Explorer, which pops up a small symbol when the browser opens a Web page containing a photo of a face. When a user clicks on the symbol, the Polar Rose service looks for matching photos in its database. Users also can tag existing photos in the database to help train Polar Rose's matching engine.

Microsoft Unveils Mobile Web Browser

Microsoft Corp. has recently unveiled a new Web browser called Deepfish for mobile phones. The software is designed to enhance web browsing for smartphones. Microsoft says the software will make browsing full-sized Web pages faster and easier.

The software is designed to adjust a normal desktop webpage into a smaller image for mobile screen. It also has a function for users to zoom in on the part of the page they want 
to read or click on.

The software runs on technology borrowed from
 Sea Dragon, a software company that Microsoft recently acquired. Seadragon has made a statement that Deepfish is capable of living up to the following:
  • Speed of navigation is independent of the size or number of objects
  • Performance depends only on the ratio of bandwidth to pixels on the screen.
  • Transitions are smooth as butter.
  • Scaling is near perfect and rapid for screens of any resolution.

AdBlocker and NoScript:Add-Ons for firefox

The most annoying thing for any user today, while surfing is adds. Go to any site and you are virtually assaulted by them. Now while they are a necessary evil, since its advertisements that allow sites to actually continue functioning, they can also be the target of malware developers and hackers who can use these ads to unscrupulously turn your PC into a “Zombie Bot” for their own nefarious use.


To prevent this from happening, there are two simple add-ons that can actually help you prevent this from happening. The first is Adblocker Plus. This add-on is a comprehensively maintained project, which after install strips out adds from a webpage. This speeds up browsing by a great degree as web pages load up faster. The add-on is also very customizable. In the case of say a banking site, the add-on can be set to 
be disabled on that particular address or domainDownload it here.


The second add-on is Noscript and is a powerful tool in securing Firefox.What it does is that it allows JavaScript, Java, Flash and other plugins to be executed only by trusted web sites (e.g. your online bank) and prevents malicious scripts from running by the use of a simple database that it maintains, which allows it to recognize particular vulnerabilities that could be used to exploit your PC.  The addon is actively being developed and further details about it can be found here.

New Kamasutra Powerpoint Spreads a Virus

According to a report by security firm Sophos, a new virus is on the prowl on the interwebs. A PowerPoint containing ‘information’ on the Kamasutra, which once opened by a user inserts malware into the system and allows hackers to steal data as well as be used to send spam or attack other websites.
Sophos says “The malware comes as a file called Real kamasutra.pps.exe (the old double-extension trick). In other words, you may think you are directly opening a PowerPoint slideshow, but in fact you're running an executable program."

The PowerPoint slide deck (which ironically is itself "clean" from the malware point of view) is then dropped onto your Windows PC as a decoy while malware silently installs onto your computer as
AdobeUpdater.exe, alongside some other components (called jqa.exe and acrobat.exe).
Once this is done, 
the Trojan called ‘Troj/Bckdr-RFM’ 
is installed and the madness begins. So while words like kamasutra and the ‘wheelbarrow’ position may interest you, just be sure you stay safe and avoid this Trojan horse.