Wikileaks Under Attack

The WikiLeaks website crashed Tuesday in an apparent cyberattack after the accelerated publication of tens of thousands of once-secret State

Destroy Ur Friends PC Using Virus

In this post we'll take a look on how to create a deadly computer virus to destroy your enemy or victim's PC.

USB 3.0 Evolution xD

USB 3.0 > Usb 2.0 > Usb 1.0 xD

MEet Top ten techies Who changed World around Us

Top Ten Techies...

Steal Your Frnds Password using Flash Drive

Yes Ew Heard it Correct...CLick to know the trick :)

Saturday 24 August 2013

Fascinations Levitron Revolution Platform With EZ Float Technology



  • The Levitron Revolution features EZ Float technology to make levitating your favorite collectibles a snap
  • The levitating magnetic hover disc can hold up to 13 ounces in mid-air
  • 4 white accent LEDs spotlights your item beautifully
  • People wont believe that its possible until they see it for themselves
  • Objects continuously revolve in space inspiring wonder and amazement

 U can buy at: http://goo.gl/GPYkGp

Product Description

From the Manufacturer

Our most advanced levitation device yet.

Product Description

Fascinations Levitron Revolution Platform w/ EZ Float Technology 
Discover the secrets of levitation with Fascinations Levitron Revolution Platform w/ EZ Float Technology. This levitating magic kit comes with a magnetic hover disc that can hold up to 13 oz in midair. Levitron is an attention grabber in all parties as it can levitate models, jewelry, memorabilia and other collectibles.

Why You'll Love It: While the white accent LEDs spotlight the levitated item, the levitron automatically compensates for changes in weight by making up to 1000 corrections per second to the electromagnets contained in the base.

Age: 5 years and up

Features
  • Can hold up to 13 oz in mid air
  • Platform adjusts automatically to changing weights
  • Spotlights to enhance levitating objects
Includes
  • 120V AC wall adapter
  • Instruction manual

Source:www.amazon.com

Saturday 9 February 2013

Samsung Galaxy Q With Full HD Flexible Display To Be Announced At MWC 2013



Samsung Galaxy Q
It seems that even though Samsung Galaxy S4 release date was not set or MWC 2013, there will be another Samsung terminal that will attract the public’s attention.
I am talking about Samsung Galaxy Q, a dual-display smartphone, which was previously teased by the South Korea-based phone maker. The guys atMobileGeeks have information that the model is real, and that Samsung will announce it at Mobile World Congress 2013 in Barcelona.
The idea behind the Samsung Galaxy Q concept is that the two displays can be “united” in a single 1,080p screen. It’s true there were other companies that failed with their attempts to make successful dual-screen terminals, and the best examples are Kyocer, with Echo smartphone, while Sony’s Tablet P is not as popular as the Japanese company hoped.
It seems that Samsung Galaxy Q will use the FPD Display OLED technology presented by the Asia company a couple of years ago. You can see a video footage of the Flexible OLED display Samsung demoed in 2008.The first rumors about Samsung Galaxy Q surfaced in October 2012, and the creators of the popular Galaxy S line-up have confirmed that the product will be announced early 2013.
In the meantime Samsung has improved the flexible OLED display technology and the company exposed the YOUM concepts at the big tech fairs of the last years. A Samsung Youm prototype was displayed at this year’s CES edition, and even launched afunny commercial.
Rumor has it that Samsung Galaxy Q will have two 5.3-inch displays which can be folded outwards to form a single display, in a similar way you’ve seen in the commercial above.
There are no details about the hardware platform that will underpin the Samsung Galaxy Q, but since we are dealing with a full HD display, we might be talking about company’s proprietary Exynos 4 Quad or Exynos 5 Dual chipsets.
Would you buy a Samsung terminal with a full HD flexible display?

Sunday 1 July 2012

6.5 Million Encrypted LinkedIn Passwords Leaked Online [REPORT]


It’s not a good day for LinkedIn. After reports that its iOS app potentially violates user privacy by sending detailed calendar entries to its servers, comes a report that 6.46 million encrypted LinkedIn passwords have leaked online.
A Russian forum user claims he has hacked LinkedIn, uploading 6,458,020 encrypted passwords (without usernames) as proof.
The passwords are encrypted with the SHA-1 cryptographic hash function, used in SSL and TLS and generally considered to be relatively secure, but not foolproof. Unfortunately, it also seems that passwords are stored as unsalted hashes, which it makes it much easier to decipher them using pre-computed rainbow tables.
In simple terms, this means an attacker might be able to crack many of the passwords using very cheap resources in a relatively short amount of time.
While there’s a possibility that the password collection is not genuine, some reports on Twitter add credibility to the story. LinkedIn said on Twitter it’s looking into the issue.
Finnish security company Cert-Fi has posted a warning about the incident, saying it is “likely” that whoever hacked LinkedIn possesses the accompanying user names as well.
If you’re a LinkedIn user, we recommend you change your password right now. Furthermore, if you used that password on any other online service, we recommend you change those passwords as well.

Sunday 20 November 2011

Hack Computers Inside LAN Network

Today,I will write about hacking computer inside the LAN network.

This technique will be taking advantage of Port 139.

Most of the time,Port 139 will be opened.

First of all,I will do a port scanning at the target computer which is 192.168.40.128.

This computer is inside my LAN network.

I will scan it using Nmap.

[Image: 1_13.jpg]

I get the result and it shows Port 139 is opened up for me.

Now you will need both of these tools:
** USER2SID & SID2USER
** NetBios Auditing Tool

You can get both of them on the Internet.

After you get both of them,put them in the C:\ directory.

[Image: 2_1.jpg]

You now need to create a null session to the target computer.

[Image: 3_3.jpg]

Now open the Command Prompt and browse to the USER2SID & SID2USER folder.There will be 2 tools inside it,one will be USER2SID and another one will be SID2USER.

We will first using USER2SID to get the ID.

[Image: 4_10.jpg]

We will test against the Guest account because Guest account is a built in account.

After we get the ID,we need to do some modification on the ID.

We take the ID we get from the guest account and modified it become
"5 21 861567501 1383384898 839522115 500".

Please leave out the S-1-,leave out all the - too.

[Image: 5_8.jpg]

Now you will see that you get the username of the Administrator account.

In this case,the Administrator account is Administrator.

Create a text file called user.txt and the content will be the username of the Admin account.

[Image: 6.jpg]

Prepare yourself a good wordlist.

[Image: 7.jpg]

Now put both of them in the same directory with the NetBios Auditing Tool.

[Image: 8.jpg]

Now we are going to crack the Admin account for the password in order to access to the target computer.

Browse to the NetBios Auditing Tool directory.

[Image: 9_1.jpg]

Press on enter and the tool will run through the passlist.

[Image: 10.jpg]

In this case,I have get the password.

In order to proof that I can get access to the target computer using this password.

[Image: 11.jpg]

After you press enter,it will prompt you for the username and password.

[Image: 12_6.jpg]

Therefore,just input them inside the prompt and continue.

[Image: 13.jpg]

Target C drive will be on your screen.

[Image: 14.jpg]

In order to prevent from this attack,close down port that you do not want to use such as Port 135,Port 136,Port 137,Port 138 and Port 139.

The download link of the tools will be:
Download Tools.rar

How to Trace an IP Address

Whenever you get online,your computer is assigned an IP address. If you connect through the router, all of the computers on that network will share a similar Internet Protocol address; though each computer on the network will have a unique Internet address. An IP address is the Internet Protocol (IP) address given to every computer connected to the Internet. An IP address is needed to send information, much like a street address or P.O. box is needed to receive regular mail. Tracing an IP address is actually pretty straightforward, and even though it's not always possible to track down a specific individual, you can get enough information to take action and file a complaint.
For example, if there was some guy claiming to be Chuck Norris, and tried to get personal information from your Gmail account, you could view his IP address, and then track him. Here's how:

STEP:

Click on Start>Accessories>Command Prompt.

Type PING [URL] or TRACERT [URL] - example: PING http://www.facebook.com/.


The IP address should appear beside the website name. The format of an IP address is numeric, written as four numbers separated by periods. The format of an IP address is numeric, written as four numbers separated by periods. It looks like 71.238.34.104 or similar.
<br

To find the IP of an e-mail sent to you, investigate the message's "headers." The steps to finding message headers depend on your email client.

Gmail for example:
  • Log in to Gmail.

  • Open the message you'd like to view headers for.

  • Click the down arrow next to Reply, at the top of the message pane.

  • Select Show Original.


Use the methods described above to obtain the IP number you wish to check.

  • 2
    Go to a website that will allow you to look up IP address information. Google "IP Lookup" or "IP Geolcation" for a large list of sites that will freely offer this service.



  • 3


  • Understand what you can and cannot learn from the IP address:
    • Which internet service provider (ISP) the user is using. In some cases this may be the user's company (e.g. Ford.com). In other cases it may be just one of the large ISPs such as ATT or Comcast.
    • The approximate physical location of the user (e.g. Palo Alto, California.)
    • Recognize that usually you will not learn the actual name of the person doing at that IP address (e.g. Joe Smith). ISPs will typically only release such information under a court order.



  • Share

    Twitter Delicious Facebook Digg Stumbleupon Favorites