Sunday 15 May 2011

HOW TO ACTIVATE GODMODE IN WINDOWS 7 AND VISTA


If you are using windows vista or windows 7 then you should be aware of Godmode. If you are not aware about the Godmode then in this post I will explain to you what is godmode and how it can be activated in windows 7 and windows vista.
Godmode provides you with a shortcut icon where you can customize all your settings from mouse settings to display settings. This is very convenient as it provides all the options at one single place and activating godmode is also very simple and require only two simple steps.

Here is the Step by Step tutorial with screenshots to Activate godmode in windows 7 and windows Vista

1. Create a New Folder on your desktop.
2. Now Rename you new folder to GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
3. You can also now change the name GodMode to any other name.
4. You will see the icon of the folder to change automatically.Double click on it and you will get godmode customization settings options.

Note: This trick works perfectly on windows 32-bit version but it does not work properly sometimes on 64-bit versions 

Do you have questions, comments, or suggestions? Feel free to post a comment! 

Wednesday 11 May 2011

Introduction to C++


Overview
A computer is a machine that receives instructions and produces a result after performing an appropriate assignment. Since it is a machine, it expects good and precise directives in order to do something. The end result depends on various factors ranging from the particular capabilities of the machine, the instructions it received, and the expected result.

As a machine, the computer cannot figure out what you want. The computer doesn't think and therefore doesn't make mistakes.
Computer programming is the art of writing instructions (programs) that ask the computer to do something and give a result. A computer receives instructions in many different forms, four of which are particularly important.
The first instructions are given by the manufacturers of various hardware parts such as the microprocessor, the motherboard, the floppy and the CD-ROM drives, etc. These parts are usually made by different companies, setting different and various goals that their particular part can perform. The instructions given to the microprocessor, for example, tell it how to perform calculations, at what speed, and under which circumstances. The instructions given to the motherboard tell it to behave like a city where people and cars can move from one part of the town to another, back and forth, for various reasons; this allows information to flow from one part of the city, I mean one section of the computer, to another.
Once the instructions given to the hardware parts are known, software engineers use that information to give the second sets of instructions to the computer. These instructions, known as an operating system, are usually written by one company. These second instructions tell the computer how to coordinate its different components so the result will be a combination of different effects. This time, the computer is instructed about where the pieces of information it receives are coming from, what to do with them, then where to send the result. This time also the operating system designers impose a lot of behaviors to the computer as a machine. Again this time, some computer languages are developed so that programmers can write applications as the third set of instructions. It is like developing languages that people in a city can use to talk to each other. Consider that from now on (once the OS is developed), people get into the habit of doing things according to their particular culture or taste, speaking different languages that their neighbor doesn't understand... Luckily, the computer, I should say the OS, understands all these languages (I can't guaranty that). Some of the operating systems on the market are: Microsoft Windows 3.X, Corel Linux, IBM OS\2, Microsoft Windows 9X, Apple OS 10, Red Hat Linux, Microsoft Windows Millennium, BeOS, Caldera Linux, Microsoft Windows 2000 etc. A particular OS (for example Microsoft Windows 98) depending on a particular processor (for example Intel Pentium) is sometimes referred to as a platform. Some of the computer languages running on Microsoft Windows operating systems are C++, Pascal, Basic, and their variants. 

The actual third set of instructions are given to the computer by you, the programmer, using one or more of the languages that the operating system you are planning to use can understand. Your job is going to consist of writing applications. As a programmer, you write statements such as telling the computer, actually the operating system, that "If the user clicks this, do the following, but if he clicks that, do something else. If the user right clicks, display this; if he double-clicks that, do that." To write these instructions, called programs, you first learn to "speak" one of the languages of the OS. Then, you become more creative... Some of the application programs in the market are Microsoft Word, Lotus ScreenCam, Adobe Acrobat, Jasc Paint Shop Pro, etc.
The last instructions are given by whoever uses your program, or your application. For example, if you had programmed Microsoft Word, you would have told the computer that "If a user clicks the New button on the Standard toolbar, I want you to display a new empty document. But if the user clicks File -> New..., I want you to 'call' the New dialog and provide more options to create a new document. If the same user right-clicks on any button on any of the toolbars, I want you to show, from a popup menu, all the toolbars available so she can choose which one she wants. But if she right-clicks on the main document, here is another menu I want you to display."
At this time, you have probably realized that the users of your programs depend on your techniques as a developer to provide an easy to use application (that's what recruiters and employers call experience and creativity). You depend on the computer language that you are actually using (every computer language has its ups and downs). Your computer language depends on the operating system it is running on (different 
operating systems have different strengths and weaknesses). The operating system depends on the microprocessor or the machine it is running in (the biggest difference between two microprocessors is the speeds at which each processes information).

Your interest here is on the computer languages, since you are going to write programs. There are various computer languages, for different reasons, capable of doing different things. Fortunately, the computer can distinguish between different languages and perform accordingly. These instructions are given by the programmer who is using compilers, interpreters, etc, to write programs. Examples of those languages are Basic, C++, Pascal, etc.

Wikileaks Founder, Assange gets Sydney Peace Prize !

Wikileaks Founder, Assange gets Sydney Peace Prize !
WikiLeaks founder Julian Assange was Wednesday awarded the Sydney Peace Foundation's top honor for "exceptional courage in pursuit of human rights," joining the likes of Nelson Mandela and the Dalai Lama.

Assange, an Australian former computer hacker who is fighting extradition from Britain to Sweden over alleged sex crimes, was praised and rewarded with the Sydney Peace Prize's Gold Medal.

Although the Peace Prize is awarded annually by the foundation only three other people in its 14-year history have been awarded the gold award for courage in pursuit of human rights -- the Dalai Lama, Nelson Mandela and Japanese Buddhist leader Daisaku Ikeda.

The foundation paid tribute to Assange's determination to seek greater transparency and accountability from governments around the world, having challenged "centuries old practices of government secrecy."

"By championing people's right to know, WikiLeaks and Julian Assange have created the potential for a new order in journalism and in the free flow of information," said foundation director Stuart Rees.

Assange is the founder of the WikiLeaks whistleblowing website that has published thousands of cables in which US diplomats give their often candid views on world leaders, to Washington's acute embarrassment.

It has also leaked countless secret documents about the wars in Afghanistan and Iraq.

Assange, who was arrested in London at Sweden's request in December, remains on bail pending his challenge in July to a British judge's decision to extradite him over allegations of sexual assault.

Sunday 8 May 2011

How to hack Facebook Passwords by adding it into friend list

How to Hack Facebook Password: Facebook Password Hacker

Hacking Facebook Passwords
How to Hack Facebook Passwords by adding into friend list

These days many Facebook users have hundreds and possibly thousands of friends. More friends increase the chance that your Facebook account will be hacked – especially if you accept friend requests from people you do not know.

Critical vulnerability found on FACEBOOK

It isn’t entirely unusual that Facebook users receive friend requests from people they do not know. Often, those friend requests are blindly accepted in an effort to grow the friendship base. It seems that especially people with Facebook accounts that are primarily used for marketing purposes are more likely to accept friend requests from people they do not know than the typical Facebook user does.

Such accounts could be hacked easily, and there is no ingenious hacking talent required to do so: You simply need to walk through Facebook’s passwork recovery process with two other Facebook friends of a targeted account.

You can easily gain access to a your friends Facebook account through a collusion approach. You have to use Facebook’s password recovery feature, which is accessible through the “Forgot your password?” link on the Facebook login page.

Once identified the Friend, Facebook suggested to recover the password via the existing email address. However, you can bypass this hurdle by clicking the “No longer have access to these?” link. In that case, Facebook asks for a new email address. In the following step, Facebook presents the security question tied to the account. However, you can also to bypass the question by typing wrong answers three times in a row. After that, Facebook provides a rather surprising way to get your account back – via the support of three friends.
1. First, you select three friends “you trust”. These three friends then receive a code, which is required to change the account password.

2. Select yourself and immediately received a code from Facebook. With those three codes, you can easily change the password for the targeted account.

3. The problem clearly is that three friends you do not really know and cannot trust could potentially gain access to the victim Facebook account – through the standard password recovery feature.

4. To bypass problem mentioned in step 3 SOCIAL ENGINEERING. Create your own 2 more fake profiles and add the victim as a friend on facebook. Now get all the 3 codes and you are done.

NOTE: The targeted account will be locked for 24 hours after this password change and the user’s old email address receives a notification of the password change as well as the names of the three friends who were given the codes. However, if these are friends with fake names, it doesn’t quite matter that you now know their names.

Now if a Facebook user could in fact be in a situation when a Facebook account is not checked within a 24-hour period, particularly since we enjoy to flaunt our activities through Facebook status messages. And if the account is checked frequently, the account depends on Facebook’s response time, which can easily stretch to a number of days.

Friday 6 May 2011

Dutch hacker group offers to 're-educate' teen hacktivists!


A Dutch hackers collective named Revspace wants to "re-educate" Dutch teens suspected of cyberattacks against Mastercard and Visa and websites of the Dutch National Prosecutors Office – and turn them into "ethical hackers".
Last week, Dutch police arrested a 16-year-old boy for participating in web attacks against MasterCard and Visa as part of a grassroots push to support WikiLeaks.
On Saturday, another teenager was arrested in the municipality of Hoogezand-Sappemeer, who admitted he had flooded the website of the Dutch prosecutor. The 19-year-old was active under the name Awinee and reportedly urged other internet users to participate in the attack. The teen was released today. Martijn Gonlag, pictured here, says he only wanted to test software, and wasn’t supporting Wikileaks.
Both arrests were fairly easy for the cops to make, as both teenagers used LOIC (Low Orbit Ion Cannon), a tool that doesn't offer any security services, such as anonymisation. The IP address of the attacker can be seen in all packets sent during the attacks, as the Dutch University of Twente reported (PDF). The university's report explained that this is the case for both current versions of the LOIC tool, including the web-based tool that runs in any Javascript-supported browser.
The university warns that hacktivists may not be aware that international data retention laws require that commercial Internet providers store data regarding Internet usage for at least six months. This means that hacktivists can still be easily traced after the attacks are over.
The hackerspace Revelation Space in The Hague recently called for a meeting on ethical hacking. Disrupting websites with DDoS attacks does not align with the ethics of the hacker community, says founder Koen Martens. "It's like slapping someone in the face when you run out of arguments to prove someone wrong."
Anyone can download and start a computer program and become part of a coordinated online crime, Martens says. There is no creativity involved: DDoS attackers generally use existing tools without realising how these function.
The 16-year-old hacker from the Hague was a regular in the online chat room for the hackerspace. Martens believes the teenager should not be excluded from the community. "They should be shown a better way to reach goals." ®

3rd Plan to Hit Sony, Another Sony Information Leak !

3rd Plan to Hit Sony, Another Sony Information Leak !

An Anonymous Email provide 'THE HACKER NEWS' some Links from sony FTP, that may lead to another big HIT to sony's Network. That mail shows that some more hackers are planning to give 3RD big HIT to sony soon....
Have a Look to these links :
http://products.sel.sony.com/cgi-bin/semi/get_datasheet.cgi
http://products.sel.sony.com/cgi-bin/wishlist
http://products.sel.sony.com/shared/santa/dbs/sweepstake.xls

Monday 2 May 2011

What is Brute Force - Password cracking ?


Hello , The topic of this article is "Brute Force".In this article i will explain the meaning of bruteforce and will provide some top Brute force softwares to download.Lets Strat....

 Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies. Just as a criminal might break into, or "crack" a safe by trying many possible combinations, a brute force cracking application proceeds through all possible combinations of legal characters in sequence. Brute force is considered to be an infallible, although time-consuming, approach.

Crackers are sometimes used in an organization to test network security, although their more common use is for malicious attacks. Some variations, such as L0phtcrack from L0pht Heavy Industries, start by making assumptions, based on knowledge of common or organization-centered practices and then apply brute force to crack the rest of the data. L0phtcrack uses brute force to crack Windows NT passwords from a workstation. PC Magazine reported that a system administrator who used the program from a Windows 95 terminal with no administrative privileges, was able to uncover 85 percent of office passwords within twenty minutes.

You must have seen in movies how a hacker cracks a password. He take out a small device from his pocket. Connect it to the locker or whatever he wants to crack and then lots of digits and alphabets are shuffled on the device’s screen and in a matter of minutes (and sometimes in seconds), the thing is unlocked. Pretty Impressive but it doesn’t happen that way. Basically a online system (by online system i means a system which requires you to log in to get access) can’t be hacked like that. Even a password stored in a offline file can’t be hacked so easily.

Lets take it as easy as it can get. You want to access a file which is password protected. You create a program that tries every possible combination of alphabets and numbers and then feed it to the file if its the right one. This procedure is repeated till the right combination is accepted by the file. This is what we call as a attack. And this very procedure of trying possible combinations is called Brute Force Attack.

Now executing such a program which is required to provide every possible combination requires a very good computing power. The time that it consumes in breaking a password depends on the length of password and the processor speed. Faster the processor, shorter the time it takes to crack the password. Think it would be easy if you have a dual core or quad core, Think again. On Desktop PCs it can take days to crack a password.

Memory Space Trade Off – It is a situation in which time taken for processing can be reduced at the cost of space and vice versa. To make it very clear, lets see this again with the help of an example. In the previous example, we can process the different combination before hand and then store them in a file. And when you need to break a password, combinations are retrieved from that file and this lessens the load on the processor. The only time consumption in this case is the retrieval of data from that file. This file is what is known as a Rainbow Table. It can break passwords in a few minutes and in even a few seconds depending how strong is the password. It can be obtained from the World Wide Web but beware of its size. Its size is in GBs.

Now even if a hacker has the best of hardware, he can’t hack that easily. Why? Ever entered a password wrong multiple times? It requires you to enter the image to confirm that you are a human and it is not a account and even if that fails (yes there are algorithms that can read the text behind the image), the user is forbidden to enter the password for a fixed amount of time. So, there is no way in hell that a hacker can hack by Brute force or even with the help of rainbow tables. But it surely gets the job done for offline files.

If I write more here in a single post, it would be difficult for many of us to analyze the information. So, more in coming ICA articles.But i am providing some most top used Brute force softwares,you can download them and use for testing purpose...

This pack includes the following fully workable softwares:

1.Attack tool kit
2.CrackWhore 2.0
3.Apache scanner
4.Brutus
5.Brutus 2006
6.CGI scan
7.crackftp
8.E-mail cracker
9.hackers utillity
10.php brutforcer
11.php BB pass extracter
12.php cracker
13.shadow scan
14.web crack 4.0
and a few more

How to Hack Softwares to use them Forever ?



Hi, I am back today with a most usefull article..Hope all of you will Like It ! Here i will show you that "How to Hack Softwares to use them Forever ?" . That really a useful article,because in our daily life we need thousand of softwares today,which of most are highly paid..So how to use them Freely for whole Like ??

Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?

Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares.I’ll try to explain this in brief.Because Purpose if ICA is 1st to clear your basics.So,When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.

So with this being the case, just manually changing the system date to an earlier date will not solve the problem.For this purpose there is a small Tool known as RunAsDate.

RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.


Intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify.It works with Windows 2000, XP, 2003 and Vista.

NOTE: FOLLOW THESE TIPS CAREFULLY
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate .
3. After the trial period is expired, do not run the software(program) directly.If you run the software directly even once, this hack may no longer work.
4. It is better and safe to inject the date of the last day in the trial period.

For example, if the trial period expires on oct 1 2009, always inject the date as sep 30 2009 in the RunAsDate.

Warning : AVG Antivirus reports that RunAsDate is infected with "Trojan horse Generic 10.Thk". This will not harm ur pc,warning is just bcoz this is a wondow registry hack tool !

Sunday 1 May 2011

Nivosb ( Blue&White Team - Israel Hackers ) steal 340 users data from Iran.tv


Nivosb ( Blue&White Team - Israel Hackers ) steal 340 users data fromIran.tv






Site : www.iran.tv
They did not deface it because they had no permissions to upload file or delete the data or change details , but we made something more better and its to download all the users from the site (340 users) with passwords to emails,facebooks and more..