Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

Wednesday

Network Security Tool, Nmap 4.68 is out

Uses raw IP packets in novel ways to determine what hosts are available on the network
The name Nmap stands for Network Mapper. Nmap was designed to be a free utility for network exploration or security auditing.
Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.


Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.

The primary goals of the Nmap Project is to help make the Internet a little more secure and to provide administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is available for free download, and also comes with full source code that you may modify and redistribute under the terms of the license.

Download Nmap for free

Monday

'Cacheman XP', improve the XP performance speed

CachemanXP is a Windows tuneup utility designed to improve the speed and stability of your computer by optimizing caches, recovering RAM and fine tuning a number of system settings. Oneclick-Optimization makes it suitable for novice and intermediate users yet it is also powerful and versatile enough for computer experts.
Unlike other tuneup utilities, CachemanXP runs as a system service, minimizing resource usage and tweaking Windows at system-level.


Useful Functions of cacheman XP :
* CachemanXP displays a list of loaded Windows processes (Applications and System Services) along with detailed information including RAM usage.

* The most important CachemanXP process feature is Kill Process.
which stops the process when the 'task manager' is being ignored.

* RAM-Recovery
Inactive or crashed programs are simply moved from your physical memory (RAM) to a space on your Hard Drive called the Paging File (=Swap File).

*What does CachemanXP differently?
CachemanXP will not wait with the recovery until your system runs completely out of RAM. You can configure at which state (below value) CachemanXP should perform the recovery process. The postpone recovery on high system activity option ensures that no recovery happens if you are working on an important task and do not want to be disturbed. CachemanXP will wait until the job is done and perform the recovery thereafter. Since the recovery happens earlier as usual your system will have enough RAM available a much longer time.

Download from:
http://cachemanxp.outertech.com

Ultimate windows password cracker, the Cain 4.9.19 released

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.

The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.

Don't worry about the price. It is completely free !
Download Cain & Abel here

Friday

Rar Password recovery (recover your rar passwords)


Advanced RAR Password Recovery (ARPR) is a password retrieval program for the RAR/WinRAR archiving format.At the moment, there is no known method to extract the password from the compressed file. so the only available methods are "brute force" and dictionary-based attacks.

some features of rar password recovery:

  • ARPR can work in the background, using the CPU only when it is in an idle state;
  • supported all versions of win rar archives including rar3.x
  • Supports the customizable "brute-force" and dictionary-based attacks.
  • Multilanguage interface is provided.

Just select the name of RAR archive you'd like to get the password for. Use the "Browse" button (or F3 key) to select it, or press the "recent files" button (with a small down arrow) to puck up from the list (if you ever used ARPR before). Alternatively, you can use drag'n'drop – just drag the file (with a mouse) from Windows Explorer, and drop it to ARPR window. If all the settings are correct, the attack will be started immediately.



http://www.elcomsoft.com/

Saturday

Top 10 windows management tools

windows xpThis is our first article on windows XP hacks.
here the term hacks not means that any hacking or cracking activities with your xp system.
Rather We tells you how to prevent from such hackers and crackers.
Plus best tools and tricks to make a smoothly running windows XP.


So first we take out some windows management tools.
Here is the best Windows tools ever.

regcure1. Regcure.
It scans the whole registry and shows all errors.
You also has the option to view all start-up items of the computer and stop unneccesary items.
I'm using it for a long time and is the best registry cleaner.
Regcure finds all junky items, which keeps intact by other tools such as norton,pc on point, and reg mechanic.

"RegCure™ provides fast and efficient scanning and cleaning of your registry so that your computer can run at an optimal level of performance. RegCure identifies invalid registry items and you decide what items you want to remove. After removing registry entries, you have the option to restore your computer to a previous state."
Download "regcure" here

ccleaner2. CCleaner.
(registry optimizer and removes unnessary files)

It has the ability to detect errors of the registry and scan the computer for unnessary files.
also to view startup objects and stop them.

It's uninstaller is a worthy tool which shows items that does not removed by 'add or remove' program
Download 'CCleaner" here


spybot3. Spy Bot
Spy bot is an uncomparrable tool to remove
all malware, adware and also it removes viruses.

You can detect and remove some threats which does not remove by some giant virus scanners such as kaspersky.
I have a my own experiance.
My computer was infected by a malware called "virtumonde".
Kaspersky detected some of "virtumonde" files and removes only part of it, keeping core files intact within the system.
I downloaded the "spybot" and make a scan.
"spybot" scanned the computer and detected the core "virtumonde" files and ultimately destroied them.
It also featured with a file shredder.

Download "spybot" here

Article is continuing. ............

Thursday

Use your 6GB Gmail space to host files

GMail Drive

GMail Drive is a free third-party Windows Shell namespace extension ("add-on") for Google's Gmail. GMail Drive is not supported byGoogle. It allows a user to access a virtual drive stored in a Gmail e-mail account by causing the contents of the Gmail account to appear as a new network share on the user's workstation. In order to use this add-on, the user needs a Gmail e-mail account. The add-on enables the user to use the standard Windows desktop file copy and paste commands to transfer files to and from the Gmail account as if it were a drive on the user's computer.
More info: Please visit


--------------------------------------------------------------------------------

it is different to GmailDrive.

Gspace is the FON friendly site that provides FREE Online Storage to access your files everywhere.

Gspace turns the 2GB of your Gmail account into free online storage. With Gspace you can manage unlimited Gmail accounts to store all type of files within its simple, user friendly interface.

Listen your favourite stored music directly from your Gspace, view your collections of pictures and manage your Gdrive files as well.

How it works
  1. Once installed Gspace, open your Firefox browser. To access Gspace go to: Tools > Gspace. The Gspace console will appear on screen.
  2. Manage your Gmail accounts. You can set up as many as you want. Remember that each one provides 2Gb of storage.
  3. Login to any of your Gmail accounts.
  4. Gspace console is divided in 4 key areas for you to manage your files: My Computer / My Gspace / Transfers / Status.
  5. Enjoy Gspace features:
    • File Transfer: to manage files
    • Player Mode: to listen your stored music files directly from Gspace
    • Photo Mode: to view your collection of pictures
    • Gmail Drive: to manage your Gdrive files as well
    Download it here: http://www.getgspace.com

Create a your own search engine.


We all know the Google Advanced Search page that lets you refine your searches and find what you need faster. But how many of us understand the complicated URLs the search engines generates?

Well I am not saying that I’m some sort of expert but here are some information regarding the URLs generated by Google. Let’s start by looking at one such URL:

http://www.google.com/search?as_q=nintendo+wii&hl=ro&num=10&btnG=C%C4%83utare+Google&

as_epq=&as_oq=&as_eq=&lr=&as_ft=i&as_filetype=&as_qdr=all&as_occt=any&as_dt=i&as_sitesearch=

You don’t understand much and it looks quite long but it doesn’t have to be this way. Many of the variables included are not even used in the query. Here are the basics:

What you should know is that you always start with: http://www.google.com/search?. This tells Google it’s an advanced search and that there are some variables to come. Besides, remember that all the variables must be connected with ampersands (&; ex. as_q=nintendo+wii&hl=ro) and if you want to use more than one search terms just use ‘+’ (ex. nintendo+wii) between them. Speaking of variables here are the most important tags you can use:

as_oq -> This tells Google to find pages in which at least instance of nintendo OR wii is found
as_q -> This means that you look for nintendo and wii in the same page
as_epq -> Google translates this as a Google search of “nintendo wii”, searches the exact phrase ‘nintendo wii’
num -> The number of results you want displayed, it ranges from 0 to 100. If you set num to 0 you will get the ‘No match found” message
safe -> If you set this to active the Google Safe Search is on and the adult material will be filtered
as_eq -> Use this to exclude a term from your search
as_qdr -> Shows only results that have been updated in the given time interval. Possible values: y (year), m6 (6 months), m3 (3 months).
as_sitesearch -> Limits the search to a specific domain or TLD (.us; .gov; .co.uk; .ro; etc)
as_occt -> This is set by default to ‘any’ but if you change it you can search in: title, url, links

The goal of this article is not exactly for you to use from now on hand-made search URLs but yo better understand how the Google search engine works and if you please to create some URLs for yourself.

Examples:

http://www.google.com/search?as_q=nintendo&as_eq=wii&as_sitesearch=.com&
num=50&as_occt=title&as_qdr=m3
-> Note that when you create your own URL it should not be this long as you can easily get lost in all the variables used
http://www.google.com/search?as_q=nintendo+wii&as_sitesearch=.com

http://www.google.com/search?as_q=nintendo&as_eq=wii&as_sitesearch=.com

For more information regarding Google searches take a look at: Pro guide to Google searches. Part I andPro guide to Google searches. Part II.

Gigabyte M912 UMPC coming soon

Whilst not actually out there yet the M912 is being displayed on the Gigabyte website and a pretty nifty tablet cum UMPC it is too.

* Intel CPU 1.6GHz
* 1 GB SO-DIMM memory
* 8.9 inch WXGA 1280×768 res display with touch screen and 180 degree rotation
* 2.5 inch 9.5mm SATA HDD with 120, 160 or 250 GB options
* External optical drive via USB
* 3 USB 2.0 ports
* Bluetooth 2.0 connectivity
* 1.3 Mp camera
* 802.11b/g wireless connectivity
* 4 hour battery life
* 235 x 180 x 42 mm
* 1.2 kg

Nothing definite but it looks as if the consumer will have the option of XP or Linux as an OS for this sucker. Unfortunately the price tag is just as vague but suggestions are that it will be around the US$600 mark, which doesn’t make it cheap, but if you’re looking for a swivel-screen UMPC, the M912 could be just the unit for you.

Source: gigabyte