Hacking

Hacking

Hacking is wonderful practise only when you keep on safe side...



By simply sending an email to 1112223333@txt.att.net for example, you can send text messages to cell phones via email. This simple technology can also be applied to your DIY projects. For example, if you were creating a DIY security system, you could use your computer’s parallel port to automatically text you if your alarm goes off.

AT&T – cellnumber@txt.att.net
Verizon – cellnumber@vtext.com
T-Mobile – cellnumber@tmomail.net
Sprint PCS - cellnumber@messaging.sprintpcs.com
Virgin Mobile – cellnumber@vmobl.com





You can remotely shut down your computer from anywhere in the world using any cell phone with texting capabilities and Mozilla Thunderbird, a Mac, or Microsoft Outlook. It’s pretty simple to accomplish and the video above guides you through the step by step setup process.

Skype Version 5.0





With version 5.0, Skype has added a new switch for supporting multiple users on a single PC. The following steps would show how to create a new shortcut for starting a new Skype instance with a different Skype user account.


Facebook, Google, Yahoo and other sites involved in trial amid fears some web users will not be able to access new addresses

There are concerns that some web users' routers may not work with IPv6 addresses and they will have to buy new devices such as this one from AVM. Photograph: AVM/EPA

Facebook, Google, Yahoo and hundreds of the world's largest websites are now testing the enormously expanded internet address system, known as IPv6, in preparation for the time – expected within the next year – when it becomes impossible to add new sites to the web using the existing system, called IPv4.

The biggest problem though in implementing the new system lies inside people's homes – where barely any of the broadband routers now in use can handle the new system.

In the UK, the communications minister Ed Vaizey is marking World IPv6 Day with an industry summit to discuss progress on switching to the new protocol. Vaizey said: "We must ensure we create the conditions that allow the internet to continue to grow and for companies to produce fresh innovations. IPv6 is key to the continued growth of the internet. It is essential industry deals with the switchover before there is an impact on the internet."




Skype has patched and released the fix for the Skype bug we found so we can discuss the details of the bug.

Several other people have reported the same bug. Basically it is a persistant XSS attack that allows an attacker to redirect a victim to any website hosting malware. It is caused by Skype failing to sanitize a message before the client renders the message. It is persistant because it is stored in the users chat history and the payload is re-executed everytime the contact is clicked.

When Josh Kaufman's MacBook was stolen from his apartment in Oakland, California, it would have been the end of the story - if Josh hadn't had the foresight and curiosity to install Hidden, a Mac app that locates your laptop and sends you surreptitious pictures of the thief.

Kaufman said the laptop was stolen on 21 March and though he'd told police the location of his laptop, they said a lack of resources meant they couldn't help. After successfully attracting attention by publishing pictures of a man in possession of the laptop and posting them on Tumblr for nearly two months, Kaufman was told that police had tracked down and arrested the man.

The smartphones in our pockets are far more powerful than the desktop computers we dreamed of in the 1980s. This year they are outselling PCs – and soon they could replace our wallets as well




Smartphones allow you to do almost everything a PC can do – and make calls as well. Photograph: Genius


When he was diagnosed with Type 2 diabetes last summer, Tim Smith was given a blood sugar monitor, and a notebook with a pencil. The monitor, obviously, to test his sugar levels; the notebook to note them down so he could tell his doctor.





Beware of the phishing net ... don't click on any suspicious links in your email Photograph: Genius

What is phishing, and how to defend against it

Phishing is "the act of defrauding an online account holder of information by posing as a legitimate company", according to the dictionary. Most people will already be familiar with it through the stream of spam emails arriving in their inboxes pretending that there has been a "security update" to their bank, credit card, online shop or similar system.

Free Domain Name providers

http://www.s5network.info – free .com .net .org .info .biz offer
http://www.registerfly.com, www.nucleus.be – free .be offer
http://www.goodluckdomain.in/dotorg.html – free .org offer
http://www.domainsite.com – free .info offer
http://forums.inuration.net – free .com .net .org .info .biz offer

“Almost” domains (domain-like subdomains)
Note: More info on these services will be added soon
yoursite.co.nr www.co.nr
yoursite.biz.ly www.biz.ly
yoursite.net.tc, yoursite.net.ms, etc. www.smartdots.com, www.unonic.com, and www.cydots.com
yoursite.us.tt, yoursite.uk.tt, etc. www.joynic.com
yoursite.int.tl www.int.tl

Administrator password can be broken by replacing sam file in system32\config by the sam file in repair folder of windows. it can be easily done on a machine with dual operating systems, simply log on to os other then the one whoes password is to be cracked the way is exactly same as written above but if there is a single os on a machine then there is only one way i.e to use ms dos start up disk or some other boot disk and replace the sam file in config folder with the one in repair folder
note:- this method works only if hard drive is FAT32 formatted because NTFS drive does’nt take boot from Ms DOS
This way you can remove the old administrator password as if the windows is newly installed and the password was’nt set


Upon learning that the Nexus S smartphone was equipped with a Near Field Communications NFC) radio, [Eric Butler] decided he would put the newly released Gingerbread SDK to good use. Focusing initially on ORCA fare cards used by several Washington state transit systems, he built an open-source application he calls FareBot, which can read data from any MIFARE DESFire branded cards. Utilizing the NFC radio in the Nexus S, he was able to dump all of the unprotected information from the fare cards, including the remaining card balance and the last 10 locations where the card was used.


Sony Ericsson recently added a new section to their developer world portal called Unlocking the boot loader. They provide all the information and tools needed to root some of their newer Android phones.

Of course, this information comes from Sony Ericsson dripping with warnings, disclaimers and warranty-voiding rhetoric. Once you’ve waded through all of that, you’ll have to enter your phone’s IMEI number, your name and email address in order to get your phone’s unique bootloader unlock key. Here’s hoping they don’t use the form information to instantly void warranties.

Since Mozilla Labs launched the Concept Series with an open call for participation we’ve had thousands of people join in, share ideas and develop concepts around Firefox, the Mozilla projects and the Open Web as a whole.

In response to our open call Billy May, in early 2009, produced a throw-away concept for an “Open Web Concept Phone”. Working directly off of that community feedback, Billy has since finished the exploration with his concept “Seabird”.

The following write-up is by Billy May and explores what an Open Web phone might look like:


TO FIND THE REQUIRED SERIALS PRESS CTRL + F AND TYPE YOUR REQD SOFTWARE NAME

Please suscribe to support this free site

LIST OF SERIAL KEYS

Microsoft windows 7 keys

J7PYM-6X6FJ-QRKYT-TW4KF-BY7H9


D67PP-QBKVV-6FWDJ-4K2XB-D4684

HQDKC-F3P6D-C9YYM-HRB89-QDBB7

76DX2-7YMCQ-K2WCP-672K2-BK44W

2RG93-6XVFJ-RKHQ7-D2RTT-3FMQT

TT63R-8JGWP-WWT97-R6WQC-4CVWY

YQJX6-D6TRM-VWBM7-PHDJK-YPXJH

Q7J7F-GQHBT-Q42RQ-2F8XV-2WKKM

KH4X7-JY8G7-RCD7G-BYDJW-YTPXH

WYBJ8-8QVP3-24R82-VV2VP-72Q9W

9DP2R-W78GJ-GJBKW-CKR46-H3WYT

CXB7F-WWCM4-BP9V3-2YH43-RK8Y6

W9BYV-K2TB8-4YDJT-QBQWP-KFDHB

WGDJW-B8DYC-WVKX4-6MKF4-B8PK8

2PHXF-9PBDW-D3WWY-CPDKD-XG87V

Just under one year ago, Apple shocked the computing world with a 9.7-inch touchscreen tablet that few truly expected.

Some called the original Apple iPad a large-format iPhone. Others berated the name and made jokes that were not remotely funny.

The early reviews were marginal at best – we handed the device a solid four stars. Technical folks decried the lack of Adobe Flash and the missing cameras.

Now, 60,000 apps later (according to Apple, who counts every conceivable option) and just a few weeks after the first real Android 3.0 tablet contender hit the streets (Motorola Xoom), the iPad 2 has sauntered onto the playing field.


Some expected pure gold: a tablet that runs as fast as a laptop and weighs less than a newspaper.

Yet, the reality with the iPad 2 is that Apple has taken an iterative approach. In many ways, the iPad 2 is a crowd pleaser because it does not rock the boat.

At 241mm tall, 186mm wide, and 8.6mm thick, the iPad 2 is just a hair smaller than the original iPad and it's thinner than the iPhone 4. It has a curved edge that makes it look a bit more 'space age' and, surprisingly, easier to grasp because you can curve your fingers more easily around the bezel.




The most dramatic change is the weight. At 680 grams, the iPad 2 is 80g lighter than the first iPad. That is about the same weight as a juicy red apple (curious, eh?). Yet, in using the device, it feels strangely lighter than it really is.

The BlackBerry Empathy concept phone is a sponsored project held by RIM Blackberry at the Art Center College of Design. But the concept behind the phone is really odd. The idea is that it is supposed to “detect emotional data” through some magic ring and show both your emotions and your contacts and social graph.

According to Engadget – “It’s not exactly clear how it’d do that, but one crucial element is the biometric feedback ring that communicates your frustration at the phone’s inability to properly sync IMAP accounts in real-time. All of this anger and joy is displayed on a social map — colored rings indicate your contacts’ previous and current emotional states — which is presented on a full touchscreen that can become transparent when the phone’s not in use.”

Here is how the designers Kiki Tang and Daniel Yoon describe the interface:

It is of course touch based and all the user’s connections are shown graphically so you can see who is connected to whom. Each contact has an avatar that is encompassed by two colored rings. The inner colored ring shows the contact’s previous emotional state, and the outer ring represents the contact’s current emotional state. It is important to show the shift in emotions in order to see how an event has affected that contact.

Another important feature that we felt was important was the “Emotional Health Chart”. This chart would monitor the user’s emotional health through an indefinite period of time. One would be able to see how a certain event, or phone call/ message has affected the user. Obviously, if the chart shows someone is always upset, there would be a problem… If permitted, a user would be able to view other user’s charts as well.

Office 2010 is yet to be released, but Microsoft has already begun planning for Office 2013 or Office 15. InfoWorld and Microsoft Kitchen has managed to unearth some preliminary information about Office 15.




The first bit of information is that Microsoft has chosen to continue with their recent no-nonsense naming policy and has codenamed Office v15 as simply Office 15.

As far as features are concerned, other than offering a “new visual & interaction experience”, Office 15 will sport drastically improved collaboration tools. Word Program Manager, Jonathan Bailor revealed in an interview, “In Office 15, we’d love to take collaboration and communication to the next level. We’ve unlocked all of these new ways to work and a new set of expectations from users, and we’re like, ‘Put us back in the ring; we’re ready for round two.’ Until coauthoring a document is as easy and ubiquitous as e-mail attachments, our job isn’t done”.

Microsoft employee, Ben Gable, mentioned in his LinkedIn profile that Excel will be getting a major new feature, while an online ad for a test engineer hinted that Outlook will continue working on improved social networking integration.

Microsoft has also been talking about Office Mobile 15 in their job advertisements. Here is a particularly interesting snippet uncovered by Microsoft Kitchen:
Now is your chance to get in on the ground floor of the Office organization’s newest team. The Office Mobile suite includes Communicator Mobile, Word, PowerPoint, Excel, OneNote, SharePoint, with more applications and capabilities being planned as part of the Office 15 product suite. This unique position involves technical challenges of working across multiple operating systems and devices as well as the chance to work with teams across the company and around the world. Our key focus going forward is designing and developing new end to end Mobile Office scenarios that greatly improve mobile meetings, productivity, and document management. All while taking advantage of the greater computing power, networking, memory, screen & touch, and GPS capabilities on next generation mobile computing platforms

Although there has been rumors that Microsoft will be ditching the Ribbon UI in favor of a completely new interface, given the short timeframe, such a drastic change appears rather unlikely.

What new features would you like to see in Office 2013? Don’t forget to let us know.




Microsoft has made big sales with Windows 7 and hopes to do even better with a new 64bit ground up built OS – Windows 8.

Windows 8 would get architectural changes, lots of new Features, improvements.

WinRumors claims that Microsoft’s Windows 8 Milestone 2 build has been finalized, and Milestone 3 is on the horizon. After Milestone 3 is done, its just matter of days that we would start seeing Windows 8 beta being seeded to BETA testers and floating on torrents, just like windows 7. The windows 8 beta could arrive as early as summer 2011.

Microsoft compiled 6.2.7947.0.winmain_win8m2_escrow.110218-1608 on Friday, 18th feb 2011. Things are progressing secretly, even inside the company. So far, the leaked information states some recent Windows 8 builds:

6.2.7925.0.winmain_win8m2.110207-1736
6.2.7926.0.winmain_win8m2.110209-1755
6.2.7927.0.winmain_win8m2.110210-1740
6.2.7928.0.winmain_win8m2.110214-1825
6.2.7929.0.winmain_win8m2.110215-1802
6.2.7930.0.winmain_win8m2.110217-1825



You might not have received Windows 7, but Microsoft already has big plans for the upcoming OS for 2012 – Windows 8.

Let’s discuss each of the possible improvements, based on proofs from confirmed sources.

Windows 7 would be the last 32-bit OS from Microsoft. Microsoft has already accelerated development of Windows 8 with support for 128 bit platform, and exclusive support by Windows 9.

As per Microsoft:

Working in high security department for research and development involving strategic planning for medium and longterm projects. Research & Development projects including 128bit architecture compatibility with the Windows 8 kernel and Windows 9 project plan. Forming relationships with major partners: Intel, AMD, HP, and IBM.

Robert Morgan is working to get IA-128 working backwards with full binary compatibility on the existing IA-64 instructions in the hardware simulation to work for Windows 8 and definitely Windows 9.



If you store sensitive data in your email (I bet you do), here is a latest tip from our side that will help you make Gmail unHackable, well almost.

Your Gmail account, your photos, your private documents—if you reuse the same password on multiple sites and one of those sites gets hacked, or your password is conned out of you directly through a phishing scam, it can be used to access some of your most closely-held information. Gmail had gone https a year ago, and then OAuth, but that may not be enough if you are careless.

How to Prevent Gmail from Being Hacked

First things first, you should have a long and good password that cannot be memorized by any other person. A combination of a phrase and numbers, special characters is a perfect thing to do. Beyond that, chose a password recovery that you believe no one else can answer.

Beyond those basic preventions, Google has introduced a 2 step authentication, that makes your gmail account almost impossible to hack, almost. You can safely spread out your password and still have no risks of getting hacked, such is the beauty of 2 step authentication.


Nokia, as expected, has announced partnership with Microsoft that would replace Nokia’s “burning platform” Symbian with Windows Phone 7. The response was mostly negative from Symbian, Meego developers including most employees who protested the move.

Despite what people, Nokia had to take a move, either could be MeeGo, Android or WP7. Nokia chose x-Microsoft Employee’s decision.

Nokia has dropped the plans from upcoming N series phones, but has revealed new WP7 concept phone which is expected hit market within 2011. We have it on good authority that the technicolor phones on show are conceptual devices produced by the two companies. The shape of these handsets is somewhere between its recent N8 and C7 Symbian devices and there is, as usual for Nokia, a choice of sprightly colors

Even when the partnership has just been announced, the Microkia has actually spent lots of time working together and the phones are coming soon.





How many times did you saw a person you think you have seen before and not able to recall ? How many times did you wish you knew that blonde girl heading your way? Seems like all of the wishes are about to become true with Google’s new patent for social faces. We are very nearly there with automatic face-recognition technology and social media aggregation.

Google Goggles is a Visual search engine for mobile phones which allows users to take a picture of anything, such as a landmark, or a celebrity and then run a search for what/who they are.

Google wishes to expands its plans further when they acquired like.com, a visual search engine. Prior to Google’s acquisition, Like.com helped online shoppers search site called Riya which used facial recognition technology to search images that users had uploaded and tagged. The latest patent filed by Google: User Interface for Presenting Search Results for Multiple Regions of a Visual Query suggests that Google’s visual search for smartphones might be evolving into something that’s totally new and powerful.

Another Google patent, Facial Recognition With Social Network Aiding, describes facial recognition searches for “one or more likely names” of the people in the image based upon “communications applications, social networking applications, calendar applications, and collaborative applications” to create a list of possible identities for each person. The patent description also mentions that if the photo is tagged with a person’s name, “that picture might be used in future facial recognition queries to recognize the person.”



After receiving the visual query with one or more facial images, the system identifies images that potentially match the respective facial image in accordance with visual similarity criteria. Then one or more persons associated with the potential images are identified. For each identified person, person-specific data comprising metrics of social connectivity to the requester are retrieved from a plurality of applications such as communications applications, social networking applications, calendar applications, and collaborative applications. An ordered list of persons is then generated by ranking the identified persons in accordance with at least metrics of visual similarity between the respective facial image and the potential image matches and with the social connection metrics. Finally, at least one person identifier from the list is sent to the requester.




Benefits aside, Google could face serious privacy allegations. In regards to privacy, Google has several possible scenarios: to send only one of the “identifiers” to the person searching; to possibly allow only the person identified to make the photo public, or to send a request after a person is positively identified, asking if the image can be a face search result for other people’s visual queries from within their social network, which is kind of tricky as Google would need partnership with Twitter & Facebook for this to work. Its not hard to get the former but latter is what we doubt.

Okay, now that we know Google is serious about social facial recognition, how can we confirm is targetting mobile platforms like Android & iPhone? Coincidently, “David Petrou, Andrew Rabinovich, and Adam Hartwig” who worked on Google Goggles, are the patent filers.

What would make it better is that we would see some competition as well. Viewdle is also working on mobile facial recognition that works on the fly, and might help “government stalkers.” by allowing users to tag and save “faceprints” of people, and “then share the faceprint of them with other Viewdle users so they can recognize that person too!” The photosharing privacy settings are integrated with Facebook privacy settings.


Viewdle - Photo and Video Face Tagging from Viewdle on Vimeo.

Counter

Followers

Subscribe Via Email &Sms

Enter your email address:

Expert Hackers

Also Subscribe Via Sms Just click here to follow via
SMS