Give your Desktop a Mozaic Touch

Experience the Windows 8 Metro Stlye UI on your Computer

Windows 7 God Mode

Get an Advanced Control Panel in Windows7 by enabling God Mode

Download Internet Explorer 9

Enjoy The Internet in a New and Secure Way

Microsoft Office 2010 Professional Activation

Activator for Microsoft Office 2010 Professional 100% Working..!!

Flash Wallpapers for Mobile

More than 175 Flash/SWF wallpapers for Mobile with System Info

Friday, January 20, 2012

Tit for Tat - Anonymous Hackers Brings Down FBI website for #OpMegaupload

          Megaupload.com, one of the world's most popular sources of online piracy, has been shut down by a federal indictment issued Thursday, which seized and charged seven people connected with it with running an international enterprise based on internet piracy. Online piracy by the two companies - Megaupload Ltd and Vestor Ltd - generated more than $ 175 million in criminal proceeds and caused more than half a billion dollars in harm to copyright owners
FBI+HACKED
          Hacking group Anonymous said Thursday it knocked out the websites of the FBI, U.S. Department of Justice, and several entertainment industry sites as retribution for anti-piracy efforts by both the government and the entertainment industry. Anonymous said it was "the largest attack ever," with 5,635 participants involved in bringing down the sites. The two government sites were up and running again after several hours.

          Megaupload stood as one of the most popular file storage services on the internet, allowing users to upload and share files that included movies and music, among other media. With a timeliness that borders on satirical, public uproars over antipiracy bills SOPA and PIPA in Congress ran in tandem with the arrests and seizure.
Motion+Picture+Association+of+America+%2528MPAA%2529+and+US+Democratic+party+leaders           Anonymous have compiled and published a dossier containing personal information about employees of the Motion Picture Association of America (MPAA) and US Democratic party leaders and their families.

          Megaupload has preemptively defended these charges with the following assertion:

Anonymous+Hackers+Brings+Down+FBI+website+for+%2523OpMegaupload
          Mega has over 150 million registered users and over 50 million daily unique visitors. Employees of over 70% of the world’s Fortune 500 companies have accounts with us. We have become the de-facto standard for sending files that are too big to email. We are the most popular hard disk in the cloud. We host more backups than any other company. If Mega is a rogue operator as we have been unfairly labelled by the MPAA and RIAA, then what about Google? What about Yahoo? And every single ISP? At any given time, they all host pirated, illegal or even criminal content for which they are not liable nor legally obliged to prevent their users from posting. They are, like Megaupload, online service providers who are in no position to monitor or restrict their users’ activities. There are technical, practical and legal reasons why these entities as a whole enjoy safe harbor protection all over the world. Service providers like Megaupload are simply better off focusing on providing a better service to their customers than fending off lawsuits from third parties unhappy about content.

          That said, all service providers have to deal with the challenge of online piracy, just like us. Google probably hosts the world’s largest index of pirated content and yet no one has characterized them as rogue. Why not sue the manufacturers of external USB hard drives or burnable DVDs? They can be used for illegal purposes, too. Microsoft’s Windows operating system is the world’s largest enabler of piracy. Windows is used to transfer and consume pirated content on a massive scale every day. And yet Microsoft is not rogue. This double standard should not be imposed on Megaupload since it finds no basis in either logic or the law. All we want is equal treatment.

Thursday, January 19, 2012

Open Multiple Websites at Once With A Desktop Shortcut

          We visit multiple websites, multiple times daily. Typing the names of these websites over and over again becomes too time consuming and obviously, boring. So, the easiest solution is to create a desktop shortcut for it through which we can open unlimited number of websites in multiple browser tabs.

          Basically we have to create a batch file to open multiple websites. To begin, create a new text document in the desktop and type,
@echo off
Now below it write,
start “website name” “website url”
and add as many websites as you like. After you have typed all the websites that you want to open, save the file as test.bat or you can name it anything, but note to save it as batch file(.bat).
Below is an example of my batch file,


Now clicking the batch file will open multiple websites in different tabs of your default browser, in my case it was Firefox. It’s that easy. Enjoy!

Wednesday, January 18, 2012

Hackers Plan to Launch Satellite for Internet to Bypass SOPA

Hackers Satellite internet
          The term hacker can be used to mean a several understandings amongst them there are two major’s one which include “positivity” and the “negativity”. The hackers on facing the internet ban from the United states as a result of SOPA (Stop Online Piracy Act) have made a plan to launch there own satellite in the space for providing an internet which may be free from all kinds of bans and restrictions. This group of hackers belong to Germany.

 

 

What is this Plan and How is this Satellite going to work?

          The plan majorly includes on launching a single satellite in the space and which will be a low orbit satellite. That will surely work under the solar power as per the satellite general rule of operation and will communicate with ground stations to make a network. This network will operate like a GPS system and will be called as “Hackerspace Global Grid (HGG)”. When any station will be under the satellite range then it will take the signals and will direct it to the other stations also and a user can gain permanent access to the network. This theory seems to be applied but there are certain hurdles in the plan and which needs to be resolved first.

Some Major Basic Hurdles:-

          As we know that with the advancement of the technology we all are able to travel in the space and are able to send the satellites in the orbit of earth using rockets. But still this technology is hell costly also. Plus! There are no vital rules for the space like in case of earth and no single country can govern the space so anyone can make this satellite to stop work without any specific legal permission.
In order to make it a geo synchronous the radius of the orbit will surely get decreased and it will move in a fast manner and for the HGG project this distance seems to be large for the signals to be transmitted with a 100% quality aspect.

So what’s next with this HGG project?

          The team is still moving forward to make this possible and its deciding to make the ground stations. If you are fascinated with this project and want such a network for the world them go here: Constellation to join this project. A project joined by HGG for collaboration.

Monday, January 9, 2012

Ramgen-Janelle Scandal video posted on deface page of Philippines Premiere Bank

          A defaced linked of the website of the Premiere Bank Philippines which contains a video of Ramgen-Janelle Sex Video Scandal is the talk of the town and widely spread in the IRC and Facebook today. The defacer who uploaded the video claims to be kenjie miranda of h4ckz0n3. The defacer who uploaded the video claims to be kenjie miranda of h4ckz0n3.

          Regarding with the case of this video which violates the ANTI- VOYEURISM LAW OF 2009, Senator Revilla Jr. already asked the National Bureau of Investigation to investigate the spread of Ramgen-Janelle intimate video. The video is already viral in torrent sites and forums sites.

Hackers selling cheap BOTNETs and DDOS on forums


          The Internet has revolutionized shopping around the world. Security researchers F-Secure reported recently in a post that hackers are Selling Cheap DDOS services on Various Forums. Hackers are offering services like distributed denial of service attacks (DDoS), which can be used to knock website offline in just 1 - 2 hours / 2$ per hour. They Posted a  Youtube Video in which a young woman advertises DDoS services.

          "We are here to provide you a cheap professional ddos service.We can hit most large websites/forums game servers. We will test the website/server before accepting your money. Due to the nature of the business we dont offer refunds." Offer said. 
          There is another Interesting Hacker's Shop ! Moreover, for their assaults, the hackers chiefly utilize botnets, while ignorant operators of computers remain unaware that they've gotten contaminated with malware as also being controlled remotely.
       
          "Do you want to be king of the internet? If your answer is yes, then you are in the true place. All of programs has been made by professional coders." This website selling Local Botnet, Irc Botnet, Web Botnet and Keyloggers at 59$ only.

M86 Security detected Web exploitation attacks using AJAX

          Security researchers from Web filtering vendor M86 Security have detected Web exploitation attacks that use AJAX (Asynchronous JavaScript and XML) to fragment the payload into small pieces of code that are harder to detect by antivirus programs and intrusion prevention systems.

          The Web browser is your portal to the world -- as well as the conduit that lets in many security threats. The attack starts on a page that contains an unsuspicious piece of JavaScript code that is similar to that commonly found on legitimate AJAX-using websites. This code is responsible for fetching the payload in multiple chunks and assembling it back together on the client before executing it. Different pages found by M86 on the attack server exploited vulnerabilities in unpatched versions of Flash Player and Internet Explorer.

          This payload fragmentation technique makes it harder for signature-based security programs to detect the attacks. Many Web filtering mechanisms are implemented as network filter drivers and monitor traffic as it passes through the network interface. However, when there are chunks of legitimate-looking code that only become malicious when combined in the browser's memory, it's much harder to build a signature and detect the attack at network interface level. "The main reason that malware authors use AJAX is the ability to write generic attack pages which look benign and become malicious only once the dynamic content is loaded," Basanchig said.

          "This attack scenario definitely has its advantages: by passing the payload in several distinct chunks, the offending packets would likely avoid interception as they pass through the firewall," said Bogdan Botezatu, an e-threats analyst at antivirus vendor BitDefender. However, according to Botezatu, other protection layers found in antivirus programs might detect and block the code when it gets re-assembled in memory or when it's executed. In order to avoid becoming a victim when automated detection methods fail, though, users should keep their browsers and plug-ins like Flash Player, Adobe Reader or Java, up to date.

          "Last, but not least, it is essential for the user to stay away from Web resources they are not familiar with, such as URLs included in spam mail," Botezatu said.

Israel treating hackers like terrorists


          The message from Deputy Foreign Minister Dany Ayalon came after a self-defined "Saudi hacker" from a cabal known as "group-xp" published details of more than 6,000 Israeli credit cards online that "The US has announced that any attack on its cybernetic space would be considered a declaration of war and that it would go as far as firing missiles to respond to such an attack. This is a good criterion for us all".

           Israel said that it will respond to cyber-attacks in the same way it responds to violent terrorist acts, by striking back with force against hackers who threaten the Jewish state. Almost immediately after an Israeli computer expert declared the hacker's true identity to be 19-year-old Mexican waiter Omar Habib, the Israeli website Ynet claimed the real hacker contacted them via email to mock the false identification.

          “If a stupid student thinks he can find me (within) 8 hours of work, what will Mossad do? But I'm still here and no one can find me, make sure, no worries,” said by Saudi hacker 0xOmar of “group-XP”. "It is necessary to send a message to everyone who attacks or tries to attack Israel, including in cyberspace, that they are putting themselves in danger and that they will not benefit from any immunity against reprisal actions from Israel" Ayalon said.

          After examining the details, Israel's major credit card companies said only 14,000 valid cards had been exposed.

Anonymous expose email addresses of British military staff & Nato officials

          Anonymous Hackers expose email addresses of 221 British military staff with encrypted passwords, including those of defence, intelligence and police officials as well as politicians and 242 Nato advisers. "Civil servants working at the heart of the UK government including several in the Cabinet Office as well as advisers to the Joint Intelligence Organisation, which acts as the prime minister's eyes and ears on sensitive information have also been exposed." from Guardian .