Give your Desktop a Mozaic Touch

Experience the Windows 8 Metro Stlye UI on your Computer

Tuesday, November 30, 2010

Kroxxu botnet affected over one million web users.

     A new botnet has been detected which could have potentially affected over a million web users in the last 12 months.      The Kroxxu botnet currently has its grip on around 100,000 web domains and has been spreading password-stealing malware whilst covering its tracks extremely effectively, avast! Virus Lab found.      The surreptitious nature of the botnet meant researchers were unable to determine how the masterminds had monetised...

Facebook "news feed" are actually malware!!!

     Security company BitDefender has said today that 20 percent of posts that Facebook users see on their "news feed" are actually malware.      60 percent of those attacks come from third-party apps. 22 percent of the malware apps say they will help you see who has been viewing your profile, 15 percent offer "extras" for games you might have like FarmVille, 11 percent offer a "dislike" button (it doesn't exist) and another 7 percent offer links to games.     ...

Configure Email on your cell phone : The Tutorial

These days almost all the phones from low-end to high-end if multimedia enabled support the Email function with an inbuilt phone application in the messages menu which we hardly use or notice. If you these applications are fantastic and work just very fine if configured correctly. The question here is most of us often don't know how to configure Email accounts and retrieve and send your mails without actually starting the phone browser or third party application. The first step in using email...

Sunday, November 28, 2010

TeraCopy 2.2 Beta 3 / 2.12.. | Copy/Move your files faster

TeraCopy is a free utility designed to copy/move files faster and more secure. Can resume broken file transfers.TeraCopy skips bad files during copy and even shows the skipped files at the end of files transfer. TeraCopy will calculate files CRC checksum on the fly to speed up source and target files comparsion. Seamless integration with Windows Explorer allows you to keep working with files as usual.Copy or move files using left mouse button drag or 'Copy' and 'Paste' commands. Here are some key...

Disable error reporting in Windows XP

     You might have seen this disturbing error report while you browse internet or running some application. Here are the step by step instructions on it. Step 1: Right Click on My Computer and go to properties Step 2: Go to Advance Tab (1) and Click on Error Reporting (2) Under start up and recovery Step 3: Select the Radio button near Disable error reporting (1) and Check the option But Notify me when Critical error occurs and Click on OK and OK aga...

Administrator Account Not appearing On the Welcome Screen

     If your Administrator Account is not coming on your welcome screen, then you dont have to do much. What you have to do is simply follow the trick.  1. Start the Registry Editor. 2. Go to: HKEY_LOCAL_MACHINE >> SOFTWARE >> Microsoft >> Windows NT >> CurrentVersion >> Winlogon >> SpecialAccounts >> UserList   3. Right-click an empty space in the right pane and select New > DWORD Value. Name the new value as Administrator.  4. Double-click this new value, and enter 1 as it's Value data.  5. Close the...

Saturday, November 27, 2010

Sextortion on Cyber Space: New Technique of Blackmail & Threatening Young People

Who’s watching your child on her or his PC Webcam -- just friends? Don't be too sure.      Age-old crimes take on a new twist in the cyber-world of today. Not least of these is “sextortion,” where in a recent high-profile case, the FBI uncovered 200 victims in just one incident, many of whom were young or even underage.      Sextortion has been around longer than most of us probably realize and way before the Web was around. An early use of the term was...

Thursday, November 25, 2010

How To Hack Content Advisor Password.

What is Content Advisor? As a parent you may have concerns about the content your children encounter as they surf the Web. Internet Explorer 6 helps you safeguard your family's browsing experience with Content Advisor, which can be used to control the Web sites that your family can view. With Content Advisor, you can give your children access to a specific list of Web sites that you allow and prevent them from accessing others. Find out how to use it so you can rest easier. The supervisor can set a password in order to prevent the other users from changing the Content Advisor properties. Process:- First...

Wednesday, November 24, 2010

Enable Aero Effects in Windows 7 even on unsupported Graphics cards

Aero Glass Transparency Effect one of best features of Windows Vista is also extended to Windows7. However the hardware requirement to enable aero in windows 7 is much higher then average users can have.  We might have some users who even after installing Windows 7 are disappointed by the fact that their graphics card is very primitive or low and they get an error message saying that Aero Themes are not supported by your Graphics Card.  What can be the solution? Change your graphics card ?? Noooo... not at all why to spend so much for that... So here we are showing you a small registry...

Gary Kelly: A hacker facing jail over £12m worldwide internet bank fraud

A computer hacker facing jail over £12m worldwide internet bank fraud begged a judge to free him while he awaits sentence. Gary Kelly, 21, from Salford, constructed a computer virus to retrieve bank account details from their unsuspecting owners through the internet. He then sold the information to other criminals through the GhostMarket.net website. Appearing at Southwark Crown Court in London, Kelly begged the judge to not remand him in custody until he is sentenced next year because he is a father. “Please, your honour. I have a little girl,” Kelly said. But Judge John Price ignored...

Tuesday, November 23, 2010

Are Saved Passwords in IE or Firefox Safe..??

     Do U think ur saved passwords in Internet Explorer and Mozilla Firefox are safe?? really!! Check out here how much you are:     Whenever u type passwords into any web forms, in both Internet Explorer & Mozilla Firefox, its prompt out whether 2 remember u passwords, & many of us clicks on yes & our passwords are saved in the browser.      Many of us think this “Remember Me” option in IE or Firefox is very much...

Monday, November 22, 2010

Automatically delete temporary files in Windows 7

Here you will have to create a batch(.bat) file. But dont worry, you do not need to have knowledge of batch file programming. Open notepad and paste the following code in it: cd C:\users\%username%\AppData\Local Rmdir /S /Q Temp Replace %username% with your account username. Account should have administrative privileges. Save the file with .bat extension. You can execute it right away. But to refrain from the pain of executing this file everytime, you just have to place it in the startup folder. So save the file in C:\Users\%username%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup...

Sunday, November 21, 2010

Google is Willing to Pay Hackers up to $3,133

     Wanted by Google: Bounty-hunting hackers who can find security vulnerabilities in popular Web apps.      For security researchers who find flaws in Internet services like Gmail, Blogger and YouTube, Google will reward $500 or more per bug. Vulnerabilities that are "severe or unusually clever" pay up to $3,133.70. Optionally, benevolent hackers can also donate their rewards to charity, in which case Google will match the winnings at its discretion.     ...

Friday, November 19, 2010

Open browser inside browser

You always open a website inside a web browser. Have you ever opened a new browser inside a web browser... Its really very simple:- 1) Open a new tab or a web browser. 2) Paste this in your address bar:-                                 chrome://browser/content/browser.xul 3) That's it. You have done ...

Wednesday, November 17, 2010

Google Hacking Database Reborn

      The incredible amount of information continuously leaked onto the Internet, and therefore accessible by Google, is of great use to penetration testers around the world. Johnny Long of Hackers for Charity started the Google Hacking Database (GHDB) to serve as a repository for search terms, called Google-Dorks, that expose sensitive information, vulnerabilities, passwords, and much more.       As Johnny is now pursing his mission in Uganda,...

Tuesday, November 16, 2010

Hackers n Cyber Criminals Beware!!! U.S. Cyber Command is Fully Operational!!

       Department of Defense announced today that U.S. Cyber Command has achieved full operational capability (FOC).         Achieving FOC involved U.S. Cyber Command completing a number of critical tasks to ensure it was capable of accomplishing its mission. U.S. Cyber Command is responsible for directing activities to operate and defend DoD networks.      “I am confident in the great service members and...

Monday, November 15, 2010

Hide urself in facebook

Its very simple to be invisible on facebook. Process:- 1) On the top-right side, go to the tab named Account >> Edit friends. 2) Click on Create list. 3) Name the list. Eg. College friends, Dance crew, etc. and add some 10-15 friends in each. 4) Now, click on home and see the chat list, you could see the chat list being divided into groups you had created. 5) Simply, turn off the green light besides a group to disable urself from being visible to them. Note:- The most important thing is if you are invisible to others, then even you can't see othe...

Saturday, November 13, 2010

Russian Hackers Hack Citibank: Steal Millions

      GLOBAL finance giant Citigroup is denying reports hackers stole “tens of millions” of dollars from its banking arm Citibank midway through the year.       The Wall Street Journal yesterday reported the money was lost to “malicious software created in Russia” and that the case was being investigated by the FBI. It also reported a specialised piece of malware known as “Black Energy” was behind the losses, having been modified to steal banking authentication details.      “There’s a newer, private version of Black...

Allow more than 2 simultaneous downloads in IE 6

This is to increase the the number of maximum downloads to 10. 1. Open Registry Editor 2. Go to:- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings 3. On the right-hand side pane, right-click and go to New >> Dword value, and then add the following registry values: "MaxConnectionsPer1_0Server"=Dword:0000000a "MaxConnectionsPerServer"=Dword:0000000a 4. Refresh Registry Editor and ex...

Thursday, November 11, 2010

Is your web browser safe.?

Do you think that the web browser you use for internet browsing is safe..? Do you think that your web browser is safe from different kinda attacks that the hacker can perform.? Its simple to test this, click here for direct link  and go to    Start the Test Its tests for the following vulnerabilities:- 1) Windows animated cursor overflow. 2) Mozilla crashes with evidence of memory corruption. 3) Internet Explorer bait & switch race condition. 4) Mozilla crashes with evidence of memory corruption. 5) Internet Explorer createTextRange arbitrary code execution. 6) Windows...

Tuesday, November 9, 2010

Hide files inside images without any software

What is Steganography? 1)      Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read. 2)      The word steganography is derived from the Greek words "steganos" and "graphein", which mean "covered" and "writing." Steganography, therefore, is covered writing. 3)      Historical stenganography involved techniques such as disappearing ink or microdots. Modern steganography involves hiding data in computer ...

Monday, November 8, 2010

160by2 SMS Application for Mobile : Save your SMS costs

      Download 160by2 - the Free SMS service-on your mobile and enjoy free SMSing whenever you want. It's now easy to send SMS anywhere to on any mobile device within India. So, stay connected, even when you step out.       The download file is just 28KB and very simple to install. 160by2 on mobile is designed with a familiar look and feel, plus added features that will bring out the best of your mobile.       The Application...

Friday, November 5, 2010

Pakistani Hacker Cyber_Swati's website "Pakjanoon.com" Hacked by Lucky From Indian Cyber Army

       This information received on 02 November around 04:30 PM. If you open the website http://pakjanoon.com/and scroll it down, you will see the message left by Lucky from Indian Cyber Army. This hack is in response to the challenge made by CYBER_SWATI yesterday to ICA & All Indian Hackers. According to that message - HACKED BY INDIAN CYBER ARMY LUCKY OWNS YOU CYBER_SWATI F**K YOUR MOM SON OF A BI**H YOU CHALLENGE US LOL NOW SEE WHAT HAPPENED YOUR SITE OWNED...

Burlington man charged in eBay scam

          A 28-year-old Burlington man has been charged in connection with an online fraud through the popular online auction site eBay.      The Alamance County Sheriff's Office said a victim in Austin, Texas, contacted Elon police after items purchased were not delivered. The sheriff's office did not say what items were bought.      The sheriff's office, working with fraud investigators at eBay, found $1,817.51...

Thursday, November 4, 2010

DU Meter : Keep an eye on your internet usage

A utility that provides an accurate account of the data flowing through your computer's network connection at any given moment. This readout is presented in both numerical and graphical format, in real time. DU Meter includes extensive logging facility, flexible events system, and more. DU Meter works with virtually all types of network connections: phone modems, DSL, cable modem, LAN, satellite etc.  The current version includes some superb new features including full logging and reporting...

Wednesday, November 3, 2010

0-day buffer overflow in Adobe Reader and Acrobat

     A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Buffers are created to contain limited amount of data. Therefore, the extra information has to go somewhere, and hence it overflows into adjacent buffers, corrupting or overwriting the valid data held in them. Buffer overflow is an increasingly common type of security attack on data integrity. For example,...

Remote Sign out and last login tracking feature In Gmail

     If you suspect that someone is intercepting your email or your Gmail account is hacked or your are victim of phishing, then there is a good news for you. Now Google has added a new layer of information and control. With this new feature, you can keep a track of your recent sessions and you can also sign yourself out remotely.      At the bottom of your inbox, you'll see information about the time of the last activity on your account and whether it's still...

Tuesday, November 2, 2010

GOD Mode in Windows 7 makes Using Control Panel Easy

Windows 7 has changed Control Panel a little, but it's still too difficult to locate all the applets and options that you might need. God Mode, however, while not being particularly godlike, does offer an easier way to access everything you could want from a single folder. To try this out, create a new folder and rename it to: God Mode.{ED7BA470-8E54-465E-825C-99712043E01C} The first part, "God Mode" will be the folder name, and can be whatever you want: "Super Control Panel", "Advanced",...

Page 1 of 12012345Next