Pages

Tuesday, January 18, 2011

How To Remove Windows Genuine notification error

Following three simple steps now you can get rid of the buggy Windows Genuine Advantage (WGA) notifications:



You should backup up the registry , in case something goes wrong.
1. Reboot Windows in safe mode (hold the f8 key while booting and you will get the option to boot in safe mode) and then:

2. Open Registry Editor (regedit.exe) and search for wgalogon folder and delete it.




3. In your windows directory search for files wga* and delete them.


You are done!Now reboot back normally and continue your work. Windows Genuine Advantage will not affect you anymore …

TECHNO TITANS

Coming Soon : A new way to hack into your smartphones

More than three years after the iPhone was first hacked, computer security experts think they've found a whole new way to break into mobile phones -- one that could become a big headache for Apple, or for smartphone makers using Google's Android software.
In a presentation set for next week's Black Hat conference in Washington D.C., University of Luxembourg research associate Ralf-Philipp Weinmann says he plans to demonstrate his new technique on an iPhone and an Android device, showing how they could be converted into clandestine spying systems. "I will demo how to use the auto-answer feature present in most phones to turn the telephone into a remote listening device," he said in an e-mail interview.
Weinmann says he can do this by breaking the phone's "baseband" processor, used to send and receive radio signals as the device communicates on its cellular network. He has found bugs in the way the firmware used in chips sold by Qualcomm and Infineon Technologies processes radio signals on the GSM (Global System for Mobile Communications) networks used by the majority of the world's wireless carriers.
This is a new area of research. Until recently, mobile phone attacks had focused on another part of the phone: the programs and operating systems that runs on the device's CPU. By tricking someone into visiting a malicious Web site, for example, hackers could take advantage of a Web browser bug on the phone and start messing around with the computer's memory.
With baseband hacking, security researchers are looking at a brand new way to get into this memory.
"[It's] like tipping over a rock that no one ever thought would be tipped over," said the Grugq -- a pseudonymous, but well-respected, wireless phone hacker, and one of a handful of people who have done research in this area. "There are a lot of bugs hidden there," he said, "It is just a matter of actively looking for them."
But hacking a smartphone with a baseband attack is very tricky, to say the least. The mobile phone's radio communicates with a cell phone tower. So in Weinmann's attack, he has to first set up a fake cell phone tower and then convince his target phone to connect to it. Only then can he deliver his malicious code. And even then, the malicious code he writes must run on the firmware that's used by obscure radio processors -- something that most hackers know nothing about.
"This is an extremely technical attack," said Don Bailey, a security consultant with Isec Partners. He says that while the work on baseband hacking is very exciting -- and ultimately a big deal for the mobile phone industry -- he doesn't expect any attacks that target the general public to emerge anytime soon.
But the research into this area is just starting to take off, fuelled by new open-source software called OpenBTS that allows virtually anyone to set up their own cellular network radio tower with aboutUS$2,000 worth of computer hardware.
Five years ago device makers didn't have to worry about this type of hacking, because it used to cost tens of thousands of dollars to set up a cellular tower. But OpenBTS has changed all that. "Now it's a completely different game," Bailey said.
It's a risky game too. In the U.S., federal wiretapping laws make it illegal to intercept phone calls over the licensed frequencies used by mobile phones. In August, it took intense last-minute negotiations between lawyers from the Electronic Frontier Foundation and the U.S. Federal Communications Commission before security researcher Chris Paget could demonstrate a very simple tower spoofing technique at the Defcon hacking conference in Las Vegas.
Two months from now another hacker conference, Vancouver's CanSecWest, will invite hackers to break into mobile phones using a low power transmitter. If their baseband attacks work, they can win cash prices. Conference organizer Dragos Ruiu said that Canada's broadcast laws are "more lenient' for researchers who want to set up low-power towers for research purposes.

Google stops support for H.264 codec - Direct battle with MS and Apple again

In the world of online video, there is a battle brewing over the next dominant standard for online video, especially on HTML5 Web pages. Today, Google took the gloves off and declared that it will soon stop supporting the H.264 video codec in its Chrome browser. Instead, it will only support open-source technologies such as its own WebM initiative (with its VP8 codec) and the open-source Theora video codec, which is used by Firefox.


You could see this a mile away. Google announced the WebM project last May, along with other partners Mozilla and Opera (Apple, which relies on H.264 in its mission to squash Flash, was conspicuously absent). The H.264 codec is owned by the MPEG-LA consortium, and may in the future require a license. Although the consortium was pressured into promising that H.264 streaming would be free forever that is only for non-commercial Internet video.

But how can Google justify dropping support for H.264, but not Flash (which also uses H.264 for video)? Simple, Adobe is also one of the WebM partners and will support WebM technologies inside Flash. Yup, Flash is siding with Google on this one. So the battle lines here are really between Google and Apple, which is still sticking with H.264 (the non-Flash variety). Just when it looked like H.264 was winning too.

What Facebook should steal from Microsoft's Playbook

In 2007, when Facebook opened its platform to developers, it seemed Facebook was using Microsoft’s playbook—let developers create apps using their platform and see what apps succeed (just like Microsoft did with Lotus 1-2-3, WordPerfect, and Harvard Graphics). Then acquire or clone the successful ones (Microsoft Excel, Word, PowerPoint) as the cash cows and leave the crumbs (relatively speaking) for others. But something seems to have gone wrong—the third-party app ecosystem is not exactly thriving and Facebook still has no cash cows like Microsoft does (Office and Windows).




Instead, Facebook is increasingly looking like Yahoo!—it does everything from Photos and Chat to Email and Places. It provides just enough features to be functional but leaves much to be desired, and increasingly depends on advertising as the revenue model.

Until recently Microsoft had the largest market cap in technology (it’s Apple now). Here is what Facebook should steal from Microsoft’s playbook.

Facebook Must Make Sure The Third-Party App Ecosystem Is Thriving

This is important for two reasons. One, it keeps the platform alive and vibrant for users—Windows would not have been very interesting or successful if all apps came from Microsoft. Two, successful ideas will come from this ecosystem. If the Facebook platform is not viable for app developers, they will continue to look for alternatives and someone will crack the social graph code sooner or later elsewhere. For instance, Apple’s iPhone is becoming a meaningful platform for app developers.

It seems Facebook has thrown the baby out with the bath water when it comes to communication channels that were being abused by some app developers. I used to play Scrabulous on Facebook. I tried playing Scrabble recently but the other player wasn’t notified that it was her move! Since then I started playing Words with Friends on iPhone and it just works. As soon as my friend makes a move, I get a Push Notification. Facebook should handle notifications the same way as publishing on the Wall—ask users for explicit permission to send a notification to a friend.

News feed stories increase engagement and discovery for apps. But the volume of stories generated has forced Facebook to algorithmically decide what stories to show on the home page. Have you visited FarmVille or Causes lately? They both prominently display friend activity on their home page. Why? The same reason that made Facebook so successful—users can see what their friends are doing—an explosive mix of social discovery, social proof and voyeurism. This is where I see the solution for resolving the battle for news feed stories between Facebook and app developers. Instead of each app trying to implement its own friend activity, Facebook should provide an easy way to display the app-specific news feed inside the app. At the same time, Facebook should continue to bubble up interesting stories on its home page.

That leaves the problem of app discovery—reaching out to new users who are not yet app users. If social discovery is going to be the killer app for Facebook (I will come to that in a moment), app discovery is just a small part of that. Showing apps used by a user on their Profile, as Facebook used to do before, is a good start. But when it comes to discovery, Facebook can borrow from another playbook: Google’s. Some developers will be happy to pay for leads. How about sponsored links just above the organic list of apps used?

Facebook Must Find Its Cash Cow—Fast

To me social games like FarmVille seemed like a cash cow. Facebook should have acquired or cloned Zynga. It seems Facebook has chosen a platform angle instead, namely, advertising and Facebook Credits, which has the potential to be a cash cow for Facebook.

However, I believe, “social discovery” is potentially the killer app for Facebook. If you are like me, you discover new restaurants because a friend recommends or takes you there. I always ask my friends about new movies—I know which friends have similar taste as me,and which ones I can safely ignore. The list extends to TV shows, plumbers, books, music, kitchen appliances, and gadgets. (Facebook’s Photos app has become so popular mainly because of social discovery of new photos uploaded by friends. Tagging is just a mechanism to facilitate discovery.) When I buy a book on Amazon.com, I should be able to publish a story for my friends . When any of my friends clicks on the action link or completes the transaction, Amazon would pay Facebook. Such sponsored feed items should be clearly marked and shown prominently just like sponsored links on Google.

Facebook should look to Microsoft for its playbook to make its platform more developer-friendly, but also sprinkle in a bit from Google’s sponsored links and apply them to social discovery.

Wireshark - The ultimate wireless hacking and analyzing tool



Wireshark is a free and open-source packet analyzer. IT can be used to stealthly analyse the network traffic and also to search for insecure wifi's around you . A complete documentation of how to use it is available to read on the company's website http://www.wireshark.org.


DOWNLOAD

Monday, January 17, 2011

Top 5 "deadly hacking softwares " - DOWNLOAD THEM




There have been a lot of tools floating around the web who claim to be the best in their respective fields.
I have used many hacking tools that are built for both windows and linux platform and have seen that the linux tools are far more powerful than the windows tools. Keeping this thing in mind i thought to compile my list to those softwares that work well for both the platform and perform similar features.
The list has some new names compared to those in last years blog. I have also provided a download link of all the ten softwares compiled in a single zipped file to ease the downloading.

1.Nmap

Nmap ,by far is the best security scanning and hacking tool ever made. This software tops every list of top hacking softwares for its two reasons. Firstly,its ease of use and secondly,its wide usage.
It provides a wide range of features like port scanning, fingureprinting, os detection , ping , scanning an IP range , alive hosts etc. It has a rich command mode for advanced users which can combine several commands together to execute ones. Its the most recomended tool for new as well as advanced learners and security experts. It hosts its google opensource project every year. Download the zip.


2.SuperScan


Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan. If you need an alternative for nmap on Windows with a decent interface, I
suggest you check this out, it’s pretty nice. It provides a cool scanning experience with lot of information displayed Downlaod the zip




 3.Cain and Abel



My personal favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. Download the zip

4.John The Riper

This is my personal favourite password cracking which has been in the market for over a decade and it has evolved into a powerful tool because of the special effort of the open source community.John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches. Download the zip

5.fsCrack

FSCrack is a front end for John the Ripper (JtR) that provides a graphical user interface (GUI) for access to most of JtR’s functions.It increases the functionality of JTR and provides a detailed report of password cracking . The working is similar to JTR by using the SAM file of windows to crack the admin password. Download the zip






Avira AntiVirus Premium 8 - Full download with key.



Download the Avira anti virus premium 8 full with keys to activate it for lifetime . The anti virus has also been available for download from the company's website for free but it lacks many functionalities that are available in the paid version . Once you have downloaded and installed the anti virus and added the keys then run the update manager to add all the functanilites to it






DOWNLOAD HERE

Platinum Hide IP (for anonymous surfing) - Full version. !!!



Anonymize Your Web Surfing

Your real IP is hidden when you surf on the Internet, keeping your online activity from being tracked by others.

Protect Your Identity

Anonymous web surfing enables you to prevent identity thieves from stealing your identity or other personal information, and keep your computer safe from hacker attacks or other risks.

Choose IP Country and Check IP

Proxy lists of many countries are enabled and you decide to select one country from the Choose IP Country window. You can check the current IP address directly.

Send Anonymous Emails

Send anonymous emails through any web based mail system such as Gmail, Hotmail, etc.

Get Unbanned from Forums and Blocked Websites

Change your IP address and then you can get yourself unbanned from any forums or other blocked websites that have ever banned you.

For instructions of installing, Check the README.TXT file.



DOWNLOAD 



Avast! Antivirus Pro 5.0.677 Final with License key





  • Pro Antivirus - better protection during web surfing. Full-featured antivirus software. Better than our free antivirus, especially for web surfing, but without the firewall and antispam included in avast! Internet Security. Also if you wish to customize your security, this is the recommended software.











  • Continuous protection against viruses and spyware.











  • Ensures all mails sent and received are clean











  • Keeps you protected from "chat" infections











  • Stops attacks from hijacked websites











  • Lets you safely browse suspicious websites or run unknown applications











  • Allows safe and uninterrupted gaming











  • Compatible with Windows XP, Vista and 7    

    DOWNLOAD 

  • New mirror sites of wikileaks unleashed !!

    The domain of wikileaks , ie www.wikileaks.com is down from past many days. Godaddy has stopped the support of this domain. The new domain for wikileaks is now http://213.251.145.96

    This domain is under operation since yesterday. The whistle blower  site has developed more than 150 mirror sites now which makes it now impossible to permanently block access to this site.

    The various mirror sites now are listed below


    wikileaks.as50620.netwikileaks.tard.is ipv6freeus.jsdev.org
    wikileaks.enzym.sufreeus.jsdev.orgwikileaks.cellue.de
    wikileaks.kafe-in.net ipv6wl.opsec.eu ipv6wl.donatepl0x.com
    wikileaks.challet.euwikileaks.kister.orgwl.gernox.de
    wikileaks.morningtime.comwikileaks.renout.nlwikileaks.fdn.fr
    wikileaks.gonte.sewikileaks.kaptenkong.sewikileaksmirror.proxelsus-hosting.de ipv6
    leaks.gooby.orgwikileaks.dubronetwork.fr ipv6wikileaks.perry.ch
    wikileaks.sbr.imwikileaks.u0d.dewikileaks.81-89-98-125.blue.kundencontro...
    www.fuckip.dewikileaks.psytek.netwl.mrkva.eu
    wikileaks.joworld.netwikileaks.chiquitico.orgwikileaks.rout0r.org
    www.gruiiik.orgwikileaks.high-color.dewikileaks.holarse-linuxgaming.de ipv6
    wl.alfeldr.dewikileaks.huissoud.chwikileaks.geekview.be
    wikileaks.dysternis.dewikileaks.nulset.netwikileaks.franslundberg.com
    wikileaks.krkr.eu ipv6wl.yoltie.netwikileaks.zeitkunst.org
    wikileaks.aelmans.euwikileaks.serverius.netwikileaks.synssans.nl
    wl.ernstchan.netwikileaks.yasaw.netzwartemarktplaats.com


    wikileaks.chmod.fiwlmirror.wildeboer.netleaked.rndm.ath.cx
    wikileaks.splichy.czwleaks.3sge.pulsedmedia.comwleaks.hellfire.pulsedmedia.com
    wikileaks.palisades-berlin.dewikileaks.razor1911.comwikileaks.dokansoft.com.ar
    wikileaks.thinkfurther.dewikileaks.trankil.infowikileaks.gonte2.nu
    leaks.stumcomie.comwikileaks.timburke.orgwikileaks.ehcdev.com
    wikileaks.myscripts24.dewikileaks.breit.wswikileaks.emilts.com
    wikileaks.ruicruz.ptwikileaks.now-pages.comwikileaks.ego-world.org
    cablegate.r3blog.nl ipv6www.wikileakz.euwikileaks.realprogrammer.org
    wikileaks.the-secret-world.infowikileaks.rtjuette.dewikileaks.rustigereigers.nl
    mirror1.wikileaks.lumirror2.wikileaks.luinternaluse.net
    wikileaks.r00t.lawikileaks.cordover.id.aubrd.mcbf.net
    wikileaks.spurious.bizwikileaks.1407.orgwikileaks.mollar.me
    azow.selb.uswikileaks.furdev.orgwikileaks.datkan.net ipv6
    wikileaks.threefingers.cawikileaks.brenne.nu ipv6www.anontalk.com
    wikileaks.hutonline.nlvm8157.vps.tagadab.comnl1.wikileaksmirror.nl
    wikileaks.noomad.orgwikileaks.xcplanet.comwww.wikileaks.nw-ds.com
    wikileaks.infinium.org.ukwikileaks.piratskasit.czpeoplerule.info
    wikileaks.sirobert.comwikileaks.solvare.sewikileaks.marktaff.com
    wikileaks.hmaks.comim.wikileak.imwikileaks.yoerin.nl
    wikileaks.siwhine.orgwikileaks.schroth.cxwikileaks.delight.ch
    wikileaks.moochm.dewikileaks.syncaddict.netwww.hallitus.info
    info.patourie-systems.comwikileaks.softic.czwikileaks.redhog.org
    wikileaks.brokenbydesign.orgwikileaks.nisd.dkwikileaks.sentientrobot.net
    wikileaks.kronoss.orgwikileaks.s4ku.comwikileaks.glembotzky.com
    wikileaks.nperfection.comwikileaks.laquadrature.netwikileaks.legrandsoir.info
    wikileaks.artwww.netwikileaks.39mm.netleaks.uaqv.com
    wikileaks.krtek.netwww.emilts.comleaks.3nglish.co.uk


    wikileaks.explain-it.orgwikileaks.dunnewind.netwl.fcharlier.net
    wikileaks.datenscheibe.orgwikileaks.kapitein.orgwww.wikileaks.djity.net
    wikileaks.listepik.netwikileaks.explain-it.orgwikileaks.sedrati-dinet.net
    wikileaks.rigacci.orgwikileaks.ratm.chwikileaks.tonbnc.fr
    cablegate.sentientrobot.netwikileaks.ist-bremer.dewikileaks.spinrise.com
    wikileaks.rothnet.orgwikileaks.webtito.be ipv6wikileaks.lainconscienciadepablo.net
    wikileaks.g33kthug.co.ukwikileaks.b166er.netwikileaksmirror.matstace.me.uk
    87.106.58.253wikileaks.virii.luwikileaks.junkle.org
    leaks.iamfos.cowikileaks.wass-media.comwikileaks.karlsen.co
    wikileaks.lupine.me.uk ipv6wikileaks.webprofiles.orgwikileaks.azatoth.net
    wl.unbloggbar.orgsantocristo.infowikileaks.back2hack.cc
    wikileaks.supercrapule.comwl.treymassingill.comwikileaks.poliisi.mobi
    wikileaks.karlsen.cowikileaks.rickfalkvinge.sewikileaks.amette.eu
    wikileaks.batsh.itwikileaks.freei.mewikileaks.chsdl.de
    last.towikileaks.rackstack.comwikileaks.serverlicious.org
    wikileaks.under.chleaks.kooll.infocablegate.dyndns.info
    wikileaks.afturgurluk.orgwikileaks.phasebook.netwikileaks.emquadat.com
    wikileaks3.no-ip.orgwikileaks.hermans.netwikileaks.urli.eu
    wikileaks.laotracarboneria.netwikileaks.datapusher.netwikileaks.citizen-boycott.org
    wikileaks.in-edv.dewl.hor.dewl.rekursion.ch
    naixt-genne.comwikileaks.aircraftdispatch.netwikileaks.2qt.us
    wikileaks.rhgnet.dewikileaks.xgstatic.frwikileaks.medienfuzzis.com
    wl.creative-guerillas.comwikileaks.para-dice.dewikileaks.bandsal.at ipv6
    wikileaks.concretedonkey.cz.ccwikileaks.oualid.netwikileaks.webterrorist.net
    wikileaks.theano.dewikileaks.electric-castle.netwikileaks.jotocorp.com
    wikileaks.canariaswireless.net

    Hack Windows 7 administrator password





    There can be various conditions when you get struck as you have forgot the admin password account or you want to play upon with your friend. There are various tutorials available and various boot loader linux flavours available for cracking the password . But I have selected the most simple and small loader for you to work with.
    Note that there is no way by which you can determine the old password but you can reset it with a new password.



    Offline NT Password & Registry Editor

    I have tested this software on all the current versions of windows 7 , windows vista and on windows server 2008 . The download is an iso image of the setup. Read the readme.txt file for more instructions of installing.

    You can also make a bootable pendrive and boot from it.

    Overview

    1. Get the machine to boot from CD.
    2. Load drivers (usually automatic, but possible to run manual select)
    3. Disk select, tell which disk contains the Windows system. Optionally you will have to load drivers.
    4. PATH select, where on the disk is the system?
    5. File select, which parts of registry to load, based on what you want to do.
    6. Password reset or other registry edit.
    7. Write back to disk (you will be asked)

    TECHNO TITANS

    share