Subscribe
Add to Technorati Favourites
Add to del.icio.us



Hello friends, here is in  April 2012 latest fast proxy trick for Airtel. This trick is working with Resume support with downloads and with YouTube, Facebook too. You can download by very fast speed also.This trick is working with 2G and 3G both.So just use it and enjoy super fast 3G speed for free.


Follow the Instructions Below :-


Make the  Following Settings  in your mobile or dongle or manually put in your browser proxy settings:-


Apn: airtelgprs.com
Port: 80
Proxy: 174.142.196.230 


(or)


85.214.50.141
or
66.90.76.90 (Old but working fast)
or
176.31.222.34 (Old but working)
Homepage:  fb.me or any free site.

Thanku For Visiting.



Beware of you what you are doing on mobile because mobile phones are the main target for hackers ,according to the network security reports.

The reports are like this

In 2011 the 7.12 million mobile smartphones are infected by malicious programmes and now it is increasing day by day. according to the china network emergency  response technical team.
This team has found more than 5000 malicious programmes last year terminated them which was twice than the that of 2010.China Daily reported friday.

Hacker's are often designing the sofwares and programmes to destroy the users mobile phones and track their personel information and get their personel bank accout information or passwords.said by the report.

Hackers designed more than 1000 fraud programmes which hacks the users personel account data ,this is from which the hackers earning.

Android and nokia symbian phones are targeted by the hackers ,said by the report.

This was rapidly growing and they also targeting the websites and social forums which are collecting the users personel information.

so,beaware of what information you are leaving on any website and any social networks .

By tracing a email you can know the location from where the sender had actually sent that email. By knowing the sender’s IP address you can easily trace his location. Here is the procedure to trace the gmail. Rest of emails you can trace in the similar way.

Steps to trace an Email:-

  1. Now you ready to trace that IP address. for that you can open any of the following two sites. First Open your gmail account and open the mail you want to trace.
  2.  Now in that mail on top right look for more  option. click on it and than select show original. as shown   below.
  3.  Now a new tab will be opened which will show the full details of the message. you can note the sender’s IP address from there.
  4. Now you ready to trace that IP address. for that you can open any of the following two sites.
By visiting these sites you can easily find the location of that IP address. Some sites provide satellite location for these IP addresses.

Now in similar way you can trace other mails also. You just have to find the sender’s IP address from the mail. For yahoo mail you can find sender’s IP address in Header details.That’s it.
Hope you will find it useful.

In my previous post Keyboard Shortcuts for Window XP I had told you about Keyboard shortcuts for Window XP. Now i am Here with Keyboard shortcuts for Window 7.

List of Keyboard Shortcuts for window 7:-

From Desktop:-

1. Windows Key + Tab : Aero
2. Windows Key + E : Windows Explorer is launched.
3. Windows Key + R : Run Command is launched.
4. Windows Key + F : Search
5. Windows Key + X : Mobility Center
6. Windows Key + L : Lock Computer
7. Windows Key + U : Launches Ease of Access
8. Windows Key + P : Projector
9. Windows Key + T : Cycle Super Taskbar Items
10. Windows Key + S : OneNote Screen Clipping Tool
11. Windows Key + M : Minimize All Windows
12. Windows Key + D : Show/Hide Desktop
13. Windows Key + Up : Maximize Current Window
14. Windows Key + Down : Restore Down / Minimize
15. Windows Key + Left : Tile Current Window to the Left
16. Windows Key + Right : Tile Current Windows Right
17. Windows Key + # (# is any number)
18. Windows Key + = : Launches the Magnifier
19. Windows Key + Plus : Zoom in
20. Windows Key + Minus : Zooms out
21. Windows Key + Space : Peek at the desktop

From Window Explorer:-

22. Alt + Up: Go up one level
23. Alt + Left/ Right: Back/ Forward
24. Alt + P: Show/hide Preview Pane

Taskbar modifiers:-

25. Shift + Click on icon: Open a new instance
26. Middle click on icon: Open a new instance
27. Ctrl + Shift + Click on icon: Open a new instance with Admin privileges
28. Shift + Right-click on icon: Show window menu
29. Shift + Right-click on grouped icon: Menu with Restore All / Minimize All / Close All, etc.
30. Ctrl + Click on grouped icon: Cycle between the windows (or tabs) in the group.

Using these shortcuts do your work fast…Enjoy!!!



Now This Trick Show The Easily Any Software Keys Finder And Also Softwer

Follow This Steps

1. Open WWW.Google.com/

2. Type in the search bar "intitle:index of"

3. Beside the "intitle:index of" type ex : nero or any sofware name like this»
"intitle:index of nero"

4. Click search and open the

first page example and click
on it and see Your Favorite Result & Download
Hope You like this trick..thankx


Most of us might be under the impression that Windows is a very stable OS. Well here are some funny and interesting bugs which still do exists in Windows.

It is so surprising that Microsoft haven't yet taken note of these issues and they continue to exists even today. Go through this awesome list and enjoy those bugs
.

  1. Folder Creation and Renaming: If you try to create folders with following names you will not succeed in folder creation or renaming CON, PRN, LPT1 , LP2, LP3, LP4, LP5, LP6, LP7, LP8, LP9, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9 and CLOCK$
  2. Bug MS Word: Open Ms word and just write =rand(200,99) you will see some thing really funny, the document will be filled with the text of about 500 + pages and around 400000 words.
  3. Bug in Notepad: Open note pad and write "Bush hid the facts" without quotes and save the file you will see some strange characters once you reopen the same document.
  4. Bugs in Solitaire Game: Press ALT + SHIFT + 2 key and you will see game finish action another bug is drag a card and press CTRL + A you will see the card freezes the place where it is on the screen.
  5. Bugs in MS paint: Zoom : Try to click below 8x and you will be able to zoom 10x. Drowning effect: Paste a pic in paint select all and press SHIFT hey and drag the image you will see the drowning effect wherever you drag the pic.
Hope you enjoyed it as much as I did...

safe3 sql injector

Safe3SI is one of the most powerful and easy usage penetration tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a AI detection engine. 


Features

  • Full support for http, https website.
  • Full support for Basic, Digest, NTLM http authentications.
  • Full support for GET, Post, Cookie sql injection.
  • Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, SQLite, Firebird, Sybase and SAP MaxDB database management systems.
  • Full support for four SQL injection techniques: blind, error-based, UNION query and force guess.
  • Powerful AI engine to automatic recognite injection type, database type, sql injection best way.
  • Support to enumerate databases, tables, columns and data.
  • Support to read,list and write any file from the database server underlying file system when the database software is MySQL or Microsoft SQL Server.
  • Support to execute arbitrary commands and retrieve their standard output on the database server underlying operating system when the database software is Oracle or Microsoft SQL Server.
  • Support to ip domain query,web path guess,md5 crack etc.
  • Support for sql injection scan.
Download :-Safe3SI v9.0.

w3af is a Web Application Attack and Audit Framework. The project's goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. To read our short and long term objectives, please click over the Project Objectives item in the main menu. This project is currently hosted at SourceForge , for further information, you may also want to visit w3af SourceForge project page . 


 


http://upload.wikimedia.org/wikipedia/commons/thumb/2/23/CIA.svg/510px-CIA.svg.p
The Department of Justice (DoJ) has charged John Kiriakou, a former CIA officer, with leaking classified information to journalists.
Kiriakou, who worked for the CIA from 1990 to 2004, was charged with disclosing classified information, including the name of a covert CIA officer and information revealing the role of another CIA employee in classified activities, the DoJ said in a statement.


http://asset3.cbsistatic.com/cnwk.1d/i/tim/2012/01/24/George_hotz_telling_sony_hJust over six months ago, well-known hacker George Hotz, a.k.a. Geohot, joined the straight and narrow and got a day-job at Facebook.
However, word has it that he’s already gone. Business Insider reported today that Hotz left Facebook and is back to hacking in his free time.
This time, though, it’s legal hacking. Last Saturday, Hotz attended a Backplane hackathon, according to Business Insider. Backplane is a social startup that heralds famous investors like Google’s Executive Chairman Eric Schmidt and pop-star Lady Gaga.


Tor+Vulnerable+to+Remote+arbitrary+code+ExecutionAccording to latest post of Gentoo Linux Security Advisory, There are multiple vulnerabilities have been found in TOR, the most severe ofwhich may allow a remote attacker to execute arbitrary code. TOR is an implementation of second generation Onion Routing, a connection-oriented anonymizing communication service.

Using this Vulnerability remote attacker could possibly execute arbitrary code or cause a Denial of Service. Furthermore, a remote relay the user is directly connected to may be able to disclose anonymous information about that user or enumerate bridges in the user’s connection.

Advisory explain that , Affected Vulnerable packages are < 0.2.2.35 . Multiple vulnerabilities have been discovered in Tor are listed below:
* When configured as client or bridge, Tor uses the same TLS certificate chain for all outgoing connections (CVE-2011-2768).
* When configured as a bridge, Tor relays can distinguish incoming bridge connections from client connections (CVE-2011-2769).
An error in or/buffers.c could result in a heap-based buffer overflow (CVE-2011-2778).


http://www.nab.com.au/
Thousands of National Australia Bank customers were prevented from withdrawing money when a computer glitch crippled its network.
Customers were unable to use ATM, EFTPOS, internet and phone banking services on Friday from about noon, the bank said in a statement.
NAB said the bank began rectifying the problem from 1pm. “For any customers whose transactions failed during the system outage period, they will have their accounts brought up to date overnight,” the bank said in a statement.


http://www.flickr.com/photos/bfishadow/5504983462/

Earlier this week, The Global Mail called attention (via CNet) to an Apple Support Community thread with more than 70 pages of responses dating as far back as Nov. 2010.
According to the thread and others like it, numerous iTunes customers were victims of fraudulent app purchases that drained gift card credits from their accounts. Others reported charges to their PayPal or credit card accounts and changes to their account information.


http://www.flickr.com/photos/rbbaird/2404405904/

Bug hunters have made a total of $410,000 (£258,900) in the last year after sending in their findings to Google.
Over 1,100 flaws have been found in Google-owned software since the tech giant launched its vulnerability report programme in November 2010.

YamaTough+Hacker+Demanded+$50,000+for+not+releasing+Stolen+Symantec+Source+CodeAccording to email transcripts posted to Pastebin yesterday, and confirmed by the company, a group of hackers attempted to extort $50,000 from Symantec in exchange for not releasing its stolen PCAnywhere and Norton Antivirus source code. Hackers associated with the group Anonymous known as the Lords of Dharamaja leaked what appears to be another 1.27 gigabytes of source code from Symantec Monday night, what they claim is the source code of the Symantec program PCAnywhere. 

A 1.2GB file labeled "Symantec's pcAnywhere Leaked Source Code" has been posted to The Pirate Bay. We have asked Symantec whether this code is authentic and will update when we hear back.
 

The leak comes as little surprise: Symantec had previously revealed that the hackers had obtained 2006 versions of that code along with other Symantec products from the same time period, and warned users of PCAnywhere to disable its functionality until they patched the program earlier this month.

The emails between Symantec employee Sam Thomas and the hacker(s) Yamatough, began in January. Symantec confirmed in a statement that it had contacted law enforcement after confirming the theft of the code and that the email exchange was, in fact, part of a criminal investigation. The email thread ended yesterday with Yamatough threatening to immediately release the code:

Since no code yet being released and our email communication wasn't also released we give you 10 minutes to decide which way you go after that two of your codes fly to the moon PCAnywhere and Norton Antivirus totaling 2350MB in size (rar) 10 minutes if no reply from you we consider it a START this time we've made mirrors so it will be hard for you to get rid of it.

You won’t believe it but Symantec offered us money to keep quiet,” a hacker from the group who uses the name YamaTough wrote on Twitter. “And quess what they couldn’t make it over 50k for the whole range of their src shit, therefore the show starts as of tuday.”In fact, Symantec says it never made any offer to meet the hackers’ extortion demands. “Sam Thomas,” Symantec spokesperson Cris Paden told , was the false name created by law enforcement agents who pretended to pursue the negotiations only to attempt to trace the hackers.
 

Hacker+hits+the+Embassy+of+Indonesia+in+Hungary

Hacker from Team thec7crew today claim to Hack the Official Website Embassy of Indonesia in Hungary. Hacker Hack the Database of Site also Expose various Server Parameters on Pastebin.

As Database name mentioned "indone01_web" - There are 30 tables and Hacker also Extract and Expose the Admin's Emails and Passwords in Note.Reason of Hacking is Unknown, But this Hack will really effect the Security of officials at Embassy.

Apple+Supplier+Foxconn%E2%80%99s+Servers+Hacked,+Exposing+Vendor+Usernames+and+Passwords

Apple supplier Foxconn has reportedly been hacked, exposing the usernames and passwords of the company’s clients and employees. Hacker group SwaggSec just released a dump of Foxconn internal information, including a mail server login/password dump and logins to various online procurement sites and Intranets.

"We encourage media, security experts, and other interested individuals to explore our leaks. Foxconn did have an appropriate firewall, but fortunately to our intent, we were able to bypass it almost flawlessly. Of course with funding ourselves we did have our limitations. But with several hacking techniques employed, and a couple of days in time, we were able to dump most of everything of significance." Hacker said.

The group made a 6.04MB file available earlier this evening first on Demonoid, and then on The Pirate Bay  which purported to contain login and password information for Foxconn's email servers, intranets, and various other company-affiliated sites.
9to5Mac was able to verify these logins worked, though the servers have now been disabled by Foxconn and logins no longer valid. According to the original posting the logins and passwords could allow individuals to make orders under company accounts such as Apple, IBM, Microsoft and Intel.
Apple+Supplier+Foxconn%E2%80%99s+Servers+Hacked,+Exposing+Vendor+Usernames+and+Passwords

Mikko Hypponen, chief research officer at F-Secure, posted an image that showed details of the company’s host naming system, including what looked like a list of customers. Foxconn, a major contract manufacturer of electronics including Apple's iPhone, has faced negative publicity repeatedly since 2010 following a string of suicides at the company's Chinese facilities.

Hackers+Claims+to+compromise+Intel%27s+Sensitive+Data

A security researcher under the name of "WeedGrower", or "X-pOSed" has been on a roll since the start of 2012. He has ambushed huge sites such as AOL, NASA, Hotmail, Myspace, Xbox, USBank, Yahoo, and VISA, he has also leaked sensitive data on most of those websites.

Hackers today Claiming that he compromise Intel's Sensitive Data like User Base & Credit Cards. He found a way to expose sensitive data via the subscriber section on Intel.com and he also has access to the INTEL.com database which reveals Credit Card Numbers, Social Security Numbers, Emails, Passwords, and more. "WeedGrower", or "X-pOSed" has threatened that he's going to be leaking this soon if he doesn't get a response from Intel.com carriers.
 
Hacker said ,"I've got to give some applause to all these pseudo-security technicians out there. I cut Intel a break, I have access to a database and another vulnerability which enables the right to read user data. I'll be gracious here and NOT spill the data, but I will provide screenshots to prove that I have access to Credit Card data and such."
proofdn

The first vulnerability that will be disclosed is familiar to the Dell vulnerability that was found earlier this month, the vulnerability isn't critical and it can simply be used as a weapon to spill sensitive information. A smart user will get a target to register on this sub-domain, get the users email, replace it with the email that is already licensed, and get the target's information spilled.


Indian+BJP+Politician%2527s+bank+accounts+hacked

A local News paper today reported that ,The four axis bank accounts belonging to city’s Ganesh Shipping firm were hacked by unknown persons and Rs 4, 00,100 was transferred to a different account of Moradabad and Sind Bank.

Following a complaint by Shetty, Bunder North Police Inspector Vinay Goankar ensured that the Moradabad account was frozen by informing bank authorities there. Investigation in Process

100+Kenya+government+websites+breached+by+Indonesian+hacker


An Indonesian hacker on Tuesday attacked and defaced more than 100 Kenya government websites Among the ministries affected include the Ministries of Local Government, Livestock, Environment, Fisheries, Housing, and Industrialisation in a major cyber security breach. A Kenyan expert aware of the incident said an Indonesian hacker known as direxer was responsible for the hacking.

The hacker, referred to as Direxer, broke into the sites and defaced them to show that he had managed to access them. Others hacked sites are ministries of Finance, Education, Public Health, Youth Affairs, National Heritage and Roads; as well as sensitive departments such as Administration Police, Immigration, Prisons and various city, municipal and county councils. Check List here.

A Cyber Incidence Response Team (CIRT) based at the Communications Commission of Kenya (CCK) has moved into action and was making efforts to restore the affected websites.The CIRT was formed to handle such situations and ensures Kenya’s security in cyber space. Officials at the commission said the experts had located the hacker who appears to have a website at http://www.direxer.com/
According to a post on Hacker’s Website,He is part of an online Indonesian security forum known as Forum Code Security and says he took down the websites following tutorials from the forum.Such tutorials usually exploit programming errors in code, known as bugs, which have not been fixed.
On his site the hacker said, “and I will carry out attacks on other servers if the Government is still neglecting security. My Security Code on behalf of Indonesia, Security is a necessity.”


Cyber+War+Another+7000+Israel+credit+cards+Exposed+on+Internet
This week has began under worse auspices worse for Israel, which, despite its attention to the cyber threats posed by cyber-space, has been victim of a series of attacks that have checkmated the government of Jerusalem.

Kosova Hacker’s Security Group of Hackers today claim to release another Another 7000 Israel credit cards on Internet. Last week xOmar from ”group-xp” threatened the Israeli people by exposing millions of credit cards. After that Israel said that it will respond to cyber-attacks in the same way it responds to violent terrorist acts, by striking back with force against hackers who threaten the Jewish state.
The Dump of these 7000 Cards are posted on Tinypaste by Kisova Hackers. Th3 Dir3ctorY, ThEtA.Nu, & X|CRIPO, three hackers from  Kosova Hacker’s Security Group posted all the credentials including full name of the card holder, CCV, card no, expiry date.
More, Saudi cyber Hacker OxOmar struck again last Monday by disrupted the websites of Israel’s stock exchange and National air carrier. Israel is facing with a true escalation in cyberwar. Another Interesting Read on Israel  Cyber war by Pierluigi Paganini on his Blog.


http://www.flickr.com/photos/johnhaydon/5904883838/


A new phishing attack that’s spreading through Facebook chat modifies hijacked accounts in order to impersonate the social network’s security team.
The attackers replace the profile picture of compromised accounts with the Facebook logo and change their names to a variation of “Facebook Security” written with special Unicode characters, said Kaspersky Lab expert David Jacoby in a blog post.
Facebook claims that changing the profile name can take up to 24 hours and is subject to confirmation. However, in Jacoby’s tests the change occurred almost instantly and required only the password. This was also confirmed by a victim whose profile name was modified within 5 minutes of their account being compromised, he said.

http://resources0.news.com.au/images/2012/01/20/1226249/113592-megaupload.jpg


The FBI website has allegedly become the latest victims of a massive online attack by hacktivists Anonymous.
The group – who go by @YourAnonNews on Twitter – took credit for shutting down the Bureau’s official website FBI.gov, which displays an error message.
They said the attack is in retaliation for the FBI shutting down popular file-sharing website Megaupload.com and charging the founders for online piracy. Megaupload Limited and sister company Vestor Limited generated “more than $175 million in criminal proceeds” and caused “more than half a billion dollars in harm to copyright owners” through the piracy of “numerous types of copyrighted works,” the US Justice Department and FBI said in a joint statement.

http://www.flickr.com/photos/maria_ann/3130379448/


A hacker calling himself Hannibal has published login information for thousands of Arab Facebook users.
“Emails and passwords for the social network Facebook have been published on Pastebin,” writes The Inquirer’s Chris Martin. “Hannibal claims he has more than 30 million credentials of Arab users that he will publish regularly.”
“The hacker backs Israel and said, ‘State of Israel, not to worry, you’re in the hands of the world’s best hacker that I am. I will continue to support the government of Israel will continue to attack the Arab countries,’” Martin writes

http://www.flickr.com/photos/yamagatacamille/5010876238/


On January 6th reports of Symantec (makers of Norton Anitvirus) being hacked surfaced. The group of hackers behind the attack behind the attack were from India. In a statement issued by a member from the Lords of Dharamraja group (badass name!), the guys said:
As of now we start sharing with all our brothers and followers information from the Indian Militaty (sic) Intelligence servers, so far we have discovered within the Indian Spy Programme (sic) source codes of a dozen software companies which have signed agreements with Indian TANCS programme (sic) and CBI
Ignoring the typing error, gaining access to Indian Military’s Intelligence servers is pretty damning for the agency. The hack got covered since the hackers claimed to have acces to Norton’s source code. Earlier today I came across scans of a set of documents that are internal communications between the Indian Military. The documents claim the existence of a system known as RINOA SUR. While I did not find what SUR stands for but RINOA is RIM, NOkia and Apple. And this is where things start to get very interesting, according to the set of documents, the RINOA SUR platform was used to spy on the USCC—the US-China Economic and Security Review Commission.



The hacking group Anonymous has confirmed that they have once again hacked Sony Pictures, gaining access to their Facebook account and website. Anonymous did threaten Sony for supporting the controversial SOPA bill and now it seems that the threats materialized.


The hack hit the Sony Pictures Facebook page and its web site homepage, according to reports and tweets from those involved. Comments were left on the web pages, but have since been removed.
The attacks carry the name Op Sony and were noted through the @s3rver_exe Twitter account. “#OpSony SonyPictures Hacked! by s3rver.exe , Anonnerd and N3m3515,” says a tweet from that user, who continued, “I uploaded a @YouTube video (link removed) Sony Pictures Hacked By Anonymous.
Your support of the act is a signed death warrant to Sony Company and Associates. Therefore, yet again, we have decided to destroy your network. We will dismantle your phantom from the internet. Prepare to be extinguished. Justice will be swift, and it will be for the people, whether some like it or not,” Anonymous.
The hack wasn’t big, but still the servers were vulnerable and I got access to the admin too,” Hacker Said.
Anonymous caused major problems for Sony in 2011 after successfully hacking into the firm’s online gaming network and stealing the login information of thousands of users, forcing the system offline for several weeks.



Two Indian Hackers Aditya Gupta(@adi1391) and Subho Halder (@sunnyrockzzs) have discovered Clickjacking vulnerability in one of the famous website “Ping.FM“. Clickjacking is a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.


This is based on a technique known as clickjacking ( or UI Redressing ) where an attacker could perform actions on the behalf of user by tricking the user to click on a button or perform some other action.

This vulnerability was earlier seen in Twitter where it allows the status to be loaded through the GET method, and an attacker could frame the twitter webpage and trick the user to click on the tweet button, with the user thinking that its a part of the attacker’s webpage.

This can be disabled by setting the X-FRAME-ORIGIN method to SAME ORIGIN or DENYING the use of webpage inside a frame which have been adopted by google, facebook and many other famous websites.

Ping.fm is a online service which allows the user to connect to many social networks at once. However an attacker could use a technique known as Clickjacking to silently update the user’s social networking status at Twitter, Facebook and all other connected accounts.In this technique, the user is tricked into clicking on a button on a webpage designed by the attacker,which silently updates the status of the user on the social netowrks status taking advantage of thePing.fm API and clickjacking technique.

Back in June 2011, three windows 8 builds were leaked to the web. Those builds were packed with a cool Betta Fish boot screen. Many of you might have even seen the pictures and videos of the Betty Fish boot screen. To speed up the boot time, Microsoft removed this boot screen and replaced it with a simple one in Windows 8 Developer Preview  build.

Windows 8 Betta Fish Boot Screen

Users who are looking for a way to enable the beautiful Betty Fish boot screen in window 8 developer privew will be delighted to know that the old Fish boot screen can be enabled in Windows 8 DP with a simple workaround.

The workaround involves replacing a default system file. So, we’d suggest you create a manual system restore point before attempting this procedure on your PC. We tested this workaround on Windows 8 Developer Preview build (x86)  and can confirm that it works without any issues.

Procedure:

 Step 1: Create a manual system restore point  so that you can revert to the original system settings in case anything goes wrong.

Step 2: Open Windows Explorer, navigate to C:\Windows\Boot folder. Here, “C” is your Windows 8 drive letter.

Step 3: Locate Resources folder and then take the ownership of it with the help of our how to take ownership of file and folder in window 8 guide.

Step 4: Open Resources folder, rename bootres.dll file to bootresbackup.dll. We are not deleting the original bootres.dll file so that we can return to the original boot screen with ease.

Betta Fish Boot Screen In Windows 8

Step 5: Now download the custom bootres.dll file from here. This bootres.dll file has been taken from Windows 8 7989 build.

Step 6: Copy the new bootres.dll file to C:\Boot\Resources folder. Reboot your PC to see the new Betta Fish boot screen. Good luck!

To return to the original boot screen, you can use the previously created restore point or follow the steps given below. Navigate to C:\Boot\Resources folder. Rename bootres.dll (the custom bootres.dll) to bootrescustom.dll. Finally, rename the bootresbackup.dll to bootres.dll. You are done.


http://www.flickr.com/photos/copleys/3078523719/


The threat of Internet censorship has spurred some to seek refuge in space. Hackers at the Chaos Computer Club’s Chaos Communication Congress in Berlin this year proposed an initiative called the Hackerspace Global Grid (HGG), which aims to create and freely make available satellite based communication as a fallback or to bypass stuffy legislation.
The bunch of “hobbyist hackers, tinkerers and part time scientists” are predominantly based in Stuttgart, Germany. They say their ultimate goal is to put a hacker on the moon in 23 years, but right now they’re keeping their goals small. They want to keep their freedoms safe from threats like the proposed Stop Online Piracy Act (SOPA), by creating an “uncensorable Internet in space.” The project builds off of an earlier idea by Nick Farr in August for a Hacker Space Program.
The BBC interviewed 26-year-old Armin Bauer from Stuttgart who is working on the communications infrastructure for the project with his team. Bauer is currently working with Constellation, which is a platform that uses Internet-connected computers for aeropsace related research. The team is developing an idea for a network of low-cost ground stations for when the project gets those low-orbit satellites up there. The stations would be there to pinpoint satellites and facilitate sending data back to earth.


http://www.nus.edu.sg/iw/resources/global/images/logo.gif


Hackers infiltrated one of the National University of Singapore’s Web servers yesterday, leading to the re-setting of passwords for affected accounts.
The hackers, who call themselves Team Intra, made staff user names, domain information and hashed passwords – the taking of a variable-length password and creation of a cryptic, fixed-length one – public, reported SC Magazine of Australia yesterday.
The IT security magazine reported that the hackers were spurred on by an error message generated by probes of the NUS website, which allegedly read: “If you’re trying to use the SQL error message to dig for juicy information, get lost.”  The magazine also informed the NUS about the hack.


http://www.flickr.com/photos/quinn/577294382/


The Electronic Frontier Foundation has expressed concerns about recent changes to AOL’s Instant Messenger service and recommends that “AIM users do not switch to the new version, as it introduces important privacy-unfriendly features”. The EFF met with AOL to discuss its concerns, but says that the company has only in part responded positively.
The EFF’s concerns fall into two main areas. The first involves the scanning of messages for URLs and the pre-fetching of any displayable media. The purpose of this pre-fetching is to improve performance when a user is sent an embedded link to an image that is intended for display. However, AOL was following all embedded links, some of which might refer to sensitive information. AOL has informed the EFF that it will limit the types of sites and URLs followed in this manner. The company told the EFF that it did not plan to log or store the data that it pulls down during this process.
According to the EFF, its other main concern has not been addressed properly. By default, the new version of AIM stores all conversations in plain text on its servers for up to two months, and perhaps much longer. AOL say that this enables users to access their messaging history from different machines, but it does mean that messages are potentially accessible to third parties, either through legal means or through a security breach

http://www.flickr.com/photos/melgares/3564103508/


The New Year is upon us, and you might be partaking in the tradition of making a resolution for the coming year. This year, why not make a resolution to protect your data privacy with one of the most powerful tools available? Commit to full disk encryption on each of your computers.
Many of us now have private information on our computers: personal records, business data, e-mails, web history, or information we have about our friends, family, or colleagues.  Encryption is a great way to ensure that your data will remain safe when you travel or if your laptop is lost or stolen. Best of all, it’s free. So don’t put off taking security steps that can help protect your private data. Join EFF in resolving to encrypt your disks 2012.
Here’s some basic info about full disk encryption. You can read this and much more (including information on password security) in our recent whitepaper on protecting privacy at the border





Indian computer security analysts have detected and alerted internet users against “malicious spam mails” in the name of the dead North Korean leader Kim Jong-iI leading to hacking and crashing of vulnerable e-mails.

The Indian Computer Emergency Response Team (CERT-In), country’s national agency to respond to computer security incidents, has found the malware virus streaming into theIndian cyberspace.

“It has been observed that a spam campaign in the pretext of death of North Korean leader “Kim Jong iI” is making rounds for malware propagation. The malicious spam mails carry a fake name– “brief_introduction_of_kim_jong_Ill_pdf.pdf”.

“The said pdf file is exploiting vulnerabilities in Adobe reader and Acrobat, that once successfully exploited leads to remote code execution in the victim system,” the CERT-In said in its latest advisory to computer and internet users in the country.

“The malware has been detected more than ten days after the death of the North Korean leader and it lures the internet user to fall into trap of reading his life and style of living. The spam generators are being detected,” a senior internet investigator told PTI.

The CERT-In has asked all government and other Internet Protocol ( IP) addresses to avoid clicking on the link as it may lead to loss of valuable secret data including threat to personal financial details.

The North Korean leader died of a heart attack on December 17 at the age of 69 while travelling by train outside Pyongyang, the country’s capital.

Nmap release today an interesting version nmap 5.61TEST4 with number of interesting features. Also, to improve the user experience, the Windows installer nowinstalls various browser toolbars, search engine redirectors, andassociated adware.

  • a spidering library and associated scripts for crawling websites.
  • 51 new NSE scripts, bringing the total to 297.
  • a substantial decrease in the size of the Mac OS X installer due to the removal of PPC support.
  • a new vulnerability management library which stores and reports found vulnerabilities.
Mac OS X packages are now x86-only (rather than universal), reducing the download size from 30 MB to about 17. Change Log can be found here and Download Here .