Wednesday
Network Security Tool, Nmap 4.68 is out
The name Nmap stands for Network Mapper. Nmap was designed to be a free utility for network exploration or security auditing.
Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.
The primary goals of the Nmap Project is to help make the Internet a little more secure and to provide administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is available for free download, and also comes with full source code that you may modify and redistribute under the terms of the license.
Download Nmap for free
Monday
'Cacheman XP', improve the XP performance speed
Unlike other tuneup utilities, CachemanXP runs as a system service, minimizing resource usage and tweaking Windows at system-level.
Useful Functions of cacheman XP :
* CachemanXP displays a list of loaded Windows processes (Applications and System Services) along with detailed information including RAM usage.
* The most important CachemanXP process feature is Kill Process.
which stops the process when the 'task manager' is being ignored.
* RAM-Recovery
Inactive or crashed programs are simply moved from your physical memory (RAM) to a space on your Hard Drive called the Paging File (=Swap File).
*What does CachemanXP differently?
CachemanXP will not wait with the recovery until your system runs completely out of RAM. You can configure at which state (below value) CachemanXP should perform the recovery process. The postpone recovery on high system activity option ensures that no recovery happens if you are working on an important task and do not want to be disturbed. CachemanXP will wait until the job is done and perform the recovery thereafter. Since the recovery happens earlier as usual your system will have enough RAM available a much longer time.
Download from:
http://cachemanxp.outertech.com
Ultimate windows password cracker, the Cain 4.9.19 released
It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.
The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.
Don't worry about the price. It is completely free !
Download Cain & Abel here
Friday
Rar Password recovery (recover your rar passwords)

Advanced RAR Password Recovery (ARPR) is a password retrieval program for the RAR/WinRAR archiving format.At the moment, there is no known method to extract the password from the compressed file. so the only available methods are "brute force" and dictionary-based attacks.
some features of rar password recovery:
- ARPR can work in the background, using the CPU only when it is in an idle state;
- supported all versions of win rar archives including rar3.x
- Supports the customizable "brute-force" and dictionary-based attacks.
- Multilanguage interface is provided.
Just select the name of RAR archive you'd like to get the password for. Use the "Browse" button (or F3 key) to select it, or press the "recent files" button (with a small down arrow) to puck up from the list (if you ever used ARPR before). Alternatively, you can use drag'n'drop – just drag the file (with a mouse) from Windows Explorer, and drop it to ARPR window. If all the settings are correct, the attack will be started immediately.
http://www.elcomsoft.com/
Saturday
Top 10 windows management tools
This is our first article on windows XP hacks.
here the term hacks not means that any hacking or cracking activities with your xp system.
Rather We tells you how to prevent from such hackers and crackers.
Plus best tools and tricks to make a smoothly running windows XP.
So first we take out some windows management tools.
Here is the best Windows tools ever.1. Regcure.
It scans the whole registry and shows all errors.
You also has the option to view all start-up items of the computer and stop unneccesary items.
I'm using it for a long time and is the best registry cleaner.
Regcure finds all junky items, which keeps intact by other tools such as norton,pc on point, and reg mechanic.
"RegCure™ provides fast and efficient scanning and cleaning of your registry so that your computer can run at an optimal level of performance. RegCure identifies invalid registry items and you decide what items you want to remove. After removing registry entries, you have the option to restore your computer to a previous state."
Download "regcure" here2. CCleaner.
(registry optimizer and removes unnessary files)
It has the ability to detect errors of the registry and scan the computer for unnessary files.
also to view startup objects and stop them.
It's uninstaller is a worthy tool which shows items that does not removed by 'add or remove' program
Download 'CCleaner" here3. Spy Bot
Spy bot is an uncomparrable tool to remove
all malware, adware and also it removes viruses.
You can detect and remove some threats which does not remove by some giant virus scanners such as kaspersky.
I have a my own experiance.
My computer was infected by a malware called "virtumonde".
Kaspersky detected some of "virtumonde" files and removes only part of it, keeping core files intact within the system.
I downloaded the "spybot" and make a scan.
"spybot" scanned the computer and detected the core "virtumonde" files and ultimately destroied them.
It also featured with a file shredder.
Download "spybot" here
Article is continuing. ............
Wednesday
The Top 40 Torrent Sites of 2008 | Demonoid is back !
Thursday
Use your 6GB Gmail space to host files
Gspace is the FON friendly site that provides FREE Online Storage to access your files everywhere.
Gspace turns the 2GB of your Gmail account into free online storage. With Gspace you can manage unlimited Gmail accounts to store all type of files within its simple, user friendly interface.
Listen your favourite stored music directly from your Gspace, view your collections of pictures and manage your Gdrive files as well.
How it works
Create a your own search engine.
We all know the Google Advanced Search page that lets you refine your searches and find what you need faster. But how many of us understand the complicated URLs the search engines generates?
Well I am not saying that I’m some sort of expert but here are some information regarding the URLs generated by Google. Let’s start by looking at one such URL:
http://www.google.com/search?as_q=nintendo+wii&hl=ro&num=10&btnG=C%C4%83utare+Google&
as_epq=&as_oq=&as_eq=&lr=&as_ft=i&as_filetype=&as_qdr=all&as_occt=any&as_dt=i&as_sitesearch=
You don’t understand much and it looks quite long but it doesn’t have to be this way. Many of the variables included are not even used in the query. Here are the basics:
What you should know is that you always start with: http://www.google.com/search?. This tells Google it’s an advanced search and that there are some variables to come. Besides, remember that all the variables must be connected with ampersands (&; ex. as_q=nintendo+wii&hl=ro) and if you want to use more than one search terms just use ‘+’ (ex. nintendo+wii) between them. Speaking of variables here are the most important tags you can use:
as_oq -> This tells Google to find pages in which at least instance of nintendo OR wii is found
as_q -> This means that you look for nintendo and wii in the same page
as_epq -> Google translates this as a Google search of “nintendo wii”, searches the exact phrase ‘nintendo wii’
num -> The number of results you want displayed, it ranges from 0 to 100. If you set num to 0 you will get the ‘No match found” message
safe -> If you set this to active the Google Safe Search is on and the adult material will be filtered
as_eq -> Use this to exclude a term from your search
as_qdr -> Shows only results that have been updated in the given time interval. Possible values: y (year), m6 (6 months), m3 (3 months).
as_sitesearch -> Limits the search to a specific domain or TLD (.us; .gov; .co.uk; .ro; etc)
as_occt -> This is set by default to ‘any’ but if you change it you can search in: title, url, links
The goal of this article is not exactly for you to use from now on hand-made search URLs but yo better understand how the Google search engine works and if you please to create some URLs for yourself.
Examples:
http://www.google.com/search?as_q=nintendo&as_eq=wii&as_sitesearch=.com&
num=50&as_occt=title&as_qdr=m3 -> Note that when you create your own URL it should not be this long as you can easily get lost in all the variables used
http://www.google.com/search?as_q=nintendo+wii&as_sitesearch=.com
http://www.google.com/search?as_q=nintendo&as_eq=wii&as_sitesearch=.com
For more information regarding Google searches take a look at: Pro guide to Google searches. Part I andPro guide to Google searches. Part II.
Gigabyte M912 UMPC coming soon
Whilst not actually out there yet the M912 is being displayed on the Gigabyte website and a pretty nifty tablet cum UMPC it is too.
* Intel CPU 1.6GHz
* 1 GB SO-DIMM memory
* 8.9 inch WXGA 1280×768 res display with touch screen and 180 degree rotation
* 2.5 inch 9.5mm SATA HDD with 120, 160 or 250 GB options
* External optical drive via USB
* 3 USB 2.0 ports
* Bluetooth 2.0 connectivity
* 1.3 Mp camera
* 802.11b/g wireless connectivity
* 4 hour battery life
* 235 x 180 x 42 mm
* 1.2 kg
Nothing definite but it looks as if the consumer will have the option of XP or Linux as an OS for this sucker. Unfortunately the price tag is just as vague but suggestions are that it will be around the US$600 mark, which doesn’t make it cheap, but if you’re looking for a swivel-screen UMPC, the M912 could be just the unit for you.
Source: gigabyte