Give your Desktop a Mozaic Touch

Experience the Windows 8 Metro Stlye UI on your Computer

Windows 7 God Mode

Get an Advanced Control Panel in Windows7 by enabling God Mode

Download Internet Explorer 9

Enjoy The Internet in a New and Secure Way

Microsoft Office 2010 Professional Activation

Activator for Microsoft Office 2010 Professional 100% Working..!!

Flash Wallpapers for Mobile

More than 175 Flash/SWF wallpapers for Mobile with System Info

Tuesday, July 19, 2011

EC-Council Academy Hacked by GaySec (Malaysian hackers)

          EC-Council Academy (http://eccouncilacademy.org) Hacked by GaySec (Malaysian hackers). EC-Council Academy is a separate distinct company with no corporate connection between itself and EC-Council or EC-Council University. Some months before same site was got hacked by some other hacker.



          
          EC-Council Academy , Here a image shown adjacent got rooted by a hacker. The image clear expose the shell on the server and via putty the hacker is login as root on their server

THE CRAZIES Hackers Leaks Server Certificates of Defense Information Systems Agency (DISA)


THE CRAZIES Hackers steal the Several Certificate revocation lists (CRLs) from Server of Defense Information Systems Agency (DISA) - http://disa.mil/ and leak the Certificates at :





Wednesday, July 13, 2011

National Assembly of Pakistan database hacked by V0iD

           Another new hacker "V0iD" come in action ! He hack the website and database of National Assembly of Pakistan at http://www.na.gov.pk . The hacked database info is leaked at http://pastebin.com/bAgnnG9F .
 
          Hacker leaks the username / passwords of 7 admin accounts and phone numbers of 13 accounts.

Toshiba Database hacked and User accounts leaked by V0iD

          Today V0iD hacker leak the database of National Assembly of Pakistan database and now he also Hack the website of Toshiba . 

           The Database names, Admin user table data with user-passwords and Normal users logins leaked at http://pastebin.com/mFwijETu .

And also He leak Service Places of Toshiba. These are a small list of Toshiba resellers accounts with their passwords at http://pastebin.com/ay4981Tp .

The Databases List Provide by hacker :
Master
Tempdb
Model
Msdb
Concierge_desk
QuickFix
Cds
Crb
CompChart
TACPSERVICE
TamsIntranet2008
BlogEngine
TIMSS

David beckham official website hacked


David beckham official website http://www.davidbeckham.com/  got Defaced by some unknown hacker with a image on homepage as shown. Message by "ScooterDAshooter = FAIL".

Microsoft Vulnerability in Bluetooth Stack Could Allow Remote Code Execution


           The single Critical vulnerability in today’s batch of security updates addresses an issue in the Bluetooth stack. Your workstations’ risk to this vulnerability varies, depending on a number of factors. I’d like to use this blog post to outline those risk factors.

           This security update resolves a privately reported vulnerability in the Windows Bluetooth Stack. The vulnerability could allow remote code execution if an attacker sent a series of specially crafted Bluetooth packets to an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability only affects systems with Bluetooth capability.

           This security update is rated Critical for all supported editions of Windows Vista and Windows 7. For more information, see the subsection, Affected and Non-Affected Software, in this section.

           The security update addresses the vulnerability by modifying the way that the Windows Bluetooth Stack handles objects in memory. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.

Affected Software/Operating System : 

Windows Vista Service Pack 1, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2,
Windows Vista x64 Edition Service Pack 1,  Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1.

Read more at: www.microsoft.com

Anonymous targets US defence consultant

          Post stolen 90,000 email addresses, passwords of Booz Allen Hamilton on Pirate Bay. Online hacktivist group Anonymous has posted stolen data after breaching into the database of US defence consultant Booz Allen Hamilton.

          Booz Allen provides technological services including cyber-security consulting to the military and other US government agencies. Angered over the UK government's proposed extradition of whistleblower site WikiLeaks' founder Julian Assange, and the phone hack scandal, yesterday, the group had warned that the world would see the biggest hack attack to date.

          It had warned the Metropolitan Police and judiciary that embarrassing details about them would be revealed soon. However, the group attacked the US defence consultant instead under the antisec campaign. The group published a file with over 90,000 e-mail addresses, passwords, logins and other information, which it claims have been stolen from Booz Allen Hamilton.

          The group said it was surprised how easy it was to hack the site. It said, "We infiltrated a server on their network that basically had no security measures in place." The hacker group has posted the stolen information on The Pirate Bay file-sharing site, which has been shortlisted by US ISPs as an illegal website.
Booz Allen Hamilton has not commented on the matter so far. Anonymous had done something similar a few days ago.

          It breached the database of IRC Federal, an IT contractor that works for the FBI and other federal agencies in the US and then posted the information they stole from the website, including internal documents and e-mail information. Anonymous is infamous for bringing down the websites of MasterCard and PayPal after the companies withdrew financial services to WikiLeaks. The hacking group has also used DDoS attacks to target government websites in Syria, Tunisia, Egypt and India over online censorship, corruption and other political issues.

          Last month, another hacker group LulzSec and Anonymous had announced the "AntiSec" campaign against Internet regulation by governments across the world. The two most prominent hacker groups in the Web world said that they will work together in their attacks against targets related to government such as banks.

Google, Facebook, Cloud computing help terrorists to strike: Report

          New counter-terrorism strategy reveals technology increasingly being used by terrorists. The UK's new counter-terrorism strategy published by the home secretary Theresa May has revealed that terrorists are increasingly using technology such as Google Earth and Street View to plan attacks and encryption devices to carry out those.

          The report also says that terrorists are also planning to launch cyber-attacks, according to a report by the Guardian. The report says terrorists are using widely available sophisticated technology to encrypt mobile phone voice and text messages. It said that terrorists used "off-the-shelf" communications technology to coordinate the the attacks in Mumbai.

          The report has also revealed how file sharing sites and cloud computing could be used by terrorists to encrypt data while transfer and to wipe off any trace of their activities. Terrorists also plan to use social networking sites such as Facebook and Twitter to spread extremist ideologies, says the report.

          The new government strategy has suggested changes in prosecution of terror suspects and track Internet and mobile communications as measures to counter terrorism. Recently, Google was asked by authorities in India to halt its mapping project for Street View over security concerns.

Sunday, July 10, 2011

Hackers steal over a million emails from Washington Post jobs site

          Passwords, job accounts safe, says Jobs site. The Washington Post has said that the database of its jobs site had been breached by hackers who stole about 1.27 million users' IDs and email addresses.

          The company said on its website that the Washington Post Co's jobs website was breached twice last month. Washington Post said it took immediate steps to shut down the website after discovering the attack quickly. It said that about 1.27 million users' IDs and email addresses were affected, but added that the hackers had not accessed passwords or other personal information of users.

          The company said the jobs accounts of users also remain safe. The company also said that the incident is being probed by authorities and a security audit of the jobs site is also underway. This is the second time hackers have targeted a media company this week. On 4 July, hackers who call themselves ''The Script Kiddies' hacked into the Twitter account of US broadcaster Fox News. The hackers then falsely posted messages on the behalf of Fox News declaring that President Barack Obama had been shot dead. The @foxnewspolitics tweet read, "BREAKING NEWS: @BarackObama assassinated, 2 gunshot wounds have proved too much."

           A representative of the hacker group told Think that they were like another popular hacker group Anonymous. The representative said, "I would consider us to be close in relation to Anonymous, 2 of the members of our group were members of Anonymous. I was a member of Anonymous," adding "We hope to be working with them soon." The hacker said, "We are looking to find information about corporations to assist with antisec. Fox News was selected because we figured their security would be just as much of a joke as their reporting."

          The US Secret Service has said that it will investigate the Twitter hack.

808 Indian Websites Hacked By ZHC MongOse & ZHC Toshiro

          ZHC TOSHIRO & ZHC MONGOOSE from ZHC(ZCompany Hacking Crew) defaced more that 808 Indian Websites to deliver the message Regarding their Protest in Kashmir. Check here for message and Hacked sites list. There are most of Corporate websites in hacked site list.

German Federal Police servers Hacked by NN-Crew

          Hacking Group "NN-Crew" hacked into server used by Germany's Federal Police and stolen a large amount of data used to GPS-track suspects under surveillance. The hacked data published by NN-Crew included several usernames and passwords along with telephone numbers, license plate numbers, locations, and coordinates.



          A spokesperson for the German Federal Police said that an "analysis conducted by our executive committee revealed that no investigation data used by the Federal Police (or by the Federal Criminal Police Office) was published. As far as we can tell at the moment, the data published came from a server used by customs officials, which apparently also contained information from the Federal Police on the use of the PATRAS tracking system for distribution among customs officials.


           The spokesperson also said that the server of the PATRAS geo-data system has been temporarily switched off for security reasons and that all users have been informed.

ISI Chief - Ahmed Shuja Pasha Email ID hacked by Indian Hacker

          An Indian Hacker "creatrix" Claim to hack into the email id of ISI Chief Ahmed Shuja Pasha's .The Directorate for Inter-Services Intelligence (more commonly known as Inter-Services Intelligence or simply by its initials ISI), is Pakistan's premier intelligence agency, responsible for providing critical national security intelligence assessment to the Government of Pakistan. The ISI is the largest of the three intelligence service agencies of Pakistan, the others being the Intelligence Bureau (IB) and Military Intelligence (MI).

Anonymous Hacks FBI Contractors IRC Federal



          Anonymous Hackers today leak some files of  IRC Federal via a tweet. They've gotten access to contracts, internal documents, development schematics, logins and more. The Download Link released by Anonymous is http://www.mediafire.com/?twxc1nhiluwr126#1 ,106.91 MB. Mirror also available now on Torrent.

           Anonymous Said "If you place any value on freedom, then stop working for the oligarchy and start working against it. Stop aiding the corporations and a government which uses unethical means to corner vast amounts of wealth and proceed to flagrantly abuse their power. Together, we have the power to change this world for the better.".

Tuesday, July 5, 2011

Give your Desktop a Mosaic Touch

Tabbed Widgets

Locked Desktop
Mosaic (previously known as Metro Home 2) is an application that brings Metro UI to your desktop. It is a set of live widgets that shows some content from the web or from your PC.
Mosaic supports WPF and HTML(5) widgets (it uses IE9 engine if it installed). HTML widgets are visible only in full screen mode 









(for technical reason).
Currently some widgets are just link 

to something (e.g. desktop or control panel) 
but in future they could get more functions.
There is one demo HTML widget - Today widget.
Mosaic is in alpha stage and can work unstable



Slide up to Unlock


 System requirements:
- Windows 7
- Internet Explorer 9 (for HTML 5 widgets)
- Microsoft .NET Framework 4.0 (Client Profile enough but full is recommended for future versions)

 





Some tips:
- To open Mosaic menu move mouse cursor to the right border of screen and click. This could not work if your taskbar placed on the right or left or you have more than one monitor.
- To add widgets open Mosaic menu click on the Widgets icon and choose widget
- To remove widget click on widget icon in Widgets menu again
- By default widgets are shown over your windows and can be covered by them. There is    fullscreen mode in the Mosaic options which makes Mosaic to cover whole screen
- You can drag screen to the left in fullscreen mode
- If your widgets covered by windows just click on the right border of screen and they will quickly bring to front
- Some widgets has options which can be accessed through context menu
- If widgets animation annoys you, you can disable it in Mosaic options
- "Me" widget shows your avatar from Windows. You can change it by dragging any picture to it
- Pictures widget shows images from Pictures library in Windows 7


Download [4.6 megs]
Password : easyhacks.tk

Sunday, July 3, 2011

US Military and Law Enforcement equipment supplier "Meggit" Database Hacked


           Database of www.meggitttrainingsystems.com a US Military and Law Enforcement equipment supplier has been hacked and exposed by Anonymous ( The Bash Crew ).
           
          Hackers said "People of the USA your government puts there trust and your money into these people and we got into there database useing a google dork and a simple sql injection.Any ways we hope this will cause many lulz atleast in spamming heads of the corp's and government that choose such a poorly secured site. "


Vulnerable link : http://www.meggitttrainingsystems.com/main.php?id=119 

Hackers Release database on Pastebin : http://pastebin.com/0r4A9DVR
 

UP Rajarshi Tandon Open University Allahabad Website Hacked

Website of UP Rajarshi Tandon Open University Allahabad Hacked last night. 

Vulnerable Link --> http://www.uprtou.ac.in/

Hacker wrote message on the site "SECURE YOUR WEBSITE.. OR ELSE GET HACKED BY SOMEONE...The Education system in India sucks.. Till when we would be learning all the bullshit physics, chem, history and commerce.. We need some real knowledge.. Baccha, kabil bano.. kamyaabi jhak marke peeche aayegi.. lol..sorry admin.. just resotre your site..Don't worry.. nothing has been deleted..."

Apple database hacked with SQL injection by Anonymous



Anonymous hackers announce on twitter that Apple can be there next target. They expose one SQL vulnerability on Apple domain with One table "Users" data.

 


Vulnerable Link : http://abs.apple.com:8080/ssurvey/survey?id=

These all hacks now consider under Operation Antisec by Anonymous and Lulzsec Members.

Saturday, July 2, 2011

How to hide files inside a JPEG image??

What is Steganography?
        
          Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read. The word steganography is derived from the Greek words “steganos” and “graphein”, which mean “covered” and “writing.” Steganography, therefore, is covered writing. Historical stenganography involved techniques such as disappearing ink or microdots. Modern steganography involves hiding data in computer files. It is fairly easy to hide a secret message in a graphic file without obviously altering the visible appearance of that file.


How to hide files inside a JPEG image?

1) Copy the image and the files (you want to hide) to the same folder. (Here i will copy to desktop for comfort to explain).

2) Make a rar file of all the files you want to hide.

3) Now open command prompt and type cd Desktop

4) copy /b Image.jpg + files.rar Output.jpg

5) Right-click on Output.jpg and open with WinRar and you can see all the files you had compressed.

L.A. man sentenced for phishing attacks on banks

          A 27-year-old man has been sentenced to 13 years in prison for managing a phishing operation in conjunction with Egyptian hackers that looted consumer bank accounts.

          Kenneth Joseph Lucas II, of Los Angeles, was one of a total of 100 people arrested by Egyptian and U.S. authorities as part of Operation Phish Phry in 2009, which the Department of Justice (DOJ) said resulted in the highest number of people being charged in a single cybercrime case. The two-year investigation involved the U.S. Federal Bureau of Investigation, the U.S. Attorney's Office, the Electronic Crimes Task Force in Los Angeles and Egyptian law enforcement authorities.

          Lucas was sentenced to 11 years in prison on Friday in the U.S. District Court for the Central District of Los Angeles. He had pleaded guilty to 49 counts of bank and wire fraud, computer fraud, aggravated identity theft and money laundering conspiracy charges.

          On Monday, he received an additional five-year sentence for growing 100 marijuana plants at his residence. Three of those years will run concurrent with his other sentence, for a total of 13 years. The DOJ characterized Lucas as the lead defendant in the case in which 47 other people have been convicted in federal court in Los Angeles. The scam involved sending e-mails to customers of Bank of America and Wells Fargo that appeared to be official correspondence.

          The victims were directed by those e-mails to fake bank websites that asked for account numbers, passwords and other sensitive information. Hackers in Egypt then transferred money -- in batches ranging from a few hundred dollars to as much as $2,000 -- to accounts they controlled. In the U.S., Lucas recruited people to set up accounts to receive the stolen funds and then wire money to Egypt.

          U.S. District Judge Valerie Baker Fairbank estimated that the total amount of intended loss was in excess of US$1 million, according to the DOJ.

Spam messages promise Google+ invites, deliver drug ads

          It's the hottest invitation in technology right now -- an e-mail telling you how to "learn more about Google+." If you get one, though, be careful about clicking on it. It may be spam.

          Security vendor Sophos says that pharmaceutical spammers have recently started to cash in on the popularity of Google's Facebook alternative by pushing out fake invitations to the Google+ social service.
"The messages look similar to the real emails that users may receive from friends who are already members of Google+," wrote Sophos Senior Technology Consultant Graham Cluley in a Friday blog post. "However, clicking on the links will not take you to the new social network, but instead take you to a pharmacy website set up to sell the likes of Viagra, Cialis and Levitra."

          Google introduced its new service on Tuesday. Early members were encouraged to invite their friends, but on Wednesday Google stopped adding new members because of the "insane demand," according to Vic Gundotra, the senior vice president of Google's social media group.
           Spammers are always looking to cash in on the latest news trends, but with these fake Google+ invites, they've lucked into an ideal scam. Many people are eager to click on Google+ to see exactly what the service is all about.
    
          "The spammers are no doubt hoping that the email will be too hard to resist for many people eager to see Google's new social network, although just how many users will be tempted to buy drugs online is a mystery," said Cluley.