Rabu, 22 November 2006
WhiteHackers Toolvbar 19.38
Hi All,With your support the official white hackers toolbar is now amongpopular download on Cnet's download.com.Thanks to everyone who made it possible...For others ther is still chance here is the link...:)http://www.download.com/WhiteHackers-Community-Toolbar/3000-2379_4-10599524.html
Kamis, 16 November 2006
[whitehackers:231] Try the new Hackers search engine... 08.34
Hi,Please try the new hackers search engine and add yourself as acontributer...http://www.google.com/coop/cse?cx=003324193344530269932%3Am2r8casexqo--~--~---------~--~----~------------~-------~--~----~You received this message because you are subscribed to the Google Groups "whitehackers" group.To post to this group, send email to whitehackers@googlegroups.comTo unsubscribe from this group, send
Selasa, 14 November 2006
Vista, Office 2007 cracked 12.14
Vista, Office 2007 cracked. Kind of.:"Microsoft has had a long history of battling against piracy, ever since Bill Gates' Open Letter to Hobbyists in 1976, long before there was even a personal computer software industry to speak of. Now, Microsoft finds itself in its latest piratical engagement, with the recent cracks of Windows Vista and Office 2007, both of which just hit gold release status.
Rabu, 01 November 2006
[whitehackers:230] New Windows Attack Can Kill Firewall 08.57
The code, which was posted on the Internet early Sunday morning, couldbe used to disable the Windows Firewall on a fully patched Windows XPPC that was running Windows' Internet Connection Service (ICS).http://www.infoworld.com/article/06/10/30/HNwindowsfirewall_1.html--~--~---------~--~----~------------~-------~--~----~You received this message because you are subscribed to the Google Groups "
Selasa, 31 Oktober 2006
[whitehackers:229] 10 things you should know about Internet Explorer 7 Security 03.49
Internet Explorer 7 is designed to make browsing safer. Here's a quickrundown of some of the new security features, including Active Xopt-in, the Phishing Filter, cross-domain security, enhanced privacyprotection, and an international character alert.http://articles.techrepublic.com.com/5100-1009_11-6130844.html--~--~---------~--~----~------------~-------~--~----~You received this message because
Jumat, 27 Oktober 2006
[whitehackers:228] How to Stop Email Spam with SpamAssassin 08.49
One highly effective method how to stop spam email using SpamAssassin.A good tutorial about how to configure the SpamAssassin settings inyour hosting account, as well as Outlook's filters. I configured myaccount using this tutorial, for example.http://www.drostdesigns.com/how-to-stop-email-spam-with-spamassassin/--~--~---------~--~----~------------~-------~--~----~You received this message
Kamis, 26 Oktober 2006
One Way Web Hacking 15.16
Saumil Shah security expert from net square talks about web hacking ....read more | digg story
Sabtu, 21 Oktober 2006
Case Study: Adobe Had Always Been ARTS PDF's Best Partner 05.44
Was going head-to-head with the industry giant the best move? Read the story of two young guys taking on the industry giants....read more | digg story
Selasa, 17 Oktober 2006
The Black Pearl: The Smallest Cellphone We've Ever Used 22.51
"The Haier Black Pearl is honestly the smallest phone we've ever seen. It's hard to get a sense of how small it is from the picture, but you can see that it's about the length and width of two of my fingers, and around the thickness of one of my fingers on end. And I don't have large hands."read more | digg story
Minggu, 15 Oktober 2006
Hacking - The History Of Hacking - Google Video 15.49
"A quality documentary about hacking from the 1960s to date. Takes a historical approach, looking at the role of the hacker during this time..."read more | digg story
Sabtu, 14 Oktober 2006
Microsoft Now Decides to Accept Outside Security for Vista 22.43
Microsoft did an about-face yesterday, agreeing to make it easier for customers of its forthcoming Vista operating system to use outside security vendors, such as those who make popular antivirus and anti-spyware programs.Until now, Microsoft had planned to block those companies from installing their products in the deepest levels of the new OS.read more | digg story
Minggu, 08 Oktober 2006
Jumat, 06 Oktober 2006
Finding Passwords with Google Code 22.14
You can easily find Wordpress db passwords using the new Google Code search. Are there other vulnerable pieces of code just setting on your server waiting to be indexed?read more | digg story
Rabu, 04 Oktober 2006
GOOGLE CODE SEARCH ENGINE 23.24
Be careful before you copy code from internet now....read more | digg story
Kamis, 14 September 2006
How to access blocked site 23.49
Approach 1: There are websites Anonymizer who fetch the blocked site/ page from their servers and display it to you. As far as the service provider is concerned you are viewing a page from Anonymizer and not the blocked site.Approach 2: To access the blocked Web site. type the IP number instead of the URL in the address bar. But if the ISP software maps the IP address to the web server (reverse
Jumat, 08 September 2006
Security flaws in HSBC 01.23
Check out the story............http://www.silicon.com/financialservices/0,3800010364,39161320,00.htmf
Security flaws in HSBC 01.23
Check out the story............http://www.silicon.com/financialservices/0,3800010364,39161320,00.htmf
Minggu, 30 Juli 2006
Ban Shutdowns : A trick to Play on Lamers 23.23
This is a neat trick you can play on that lamer that has a huge ego, in this section I teach you, how to disable the Shut Down option in the Shut Down Dialog Box. This trick involves editing the registry, so please make backups. Launch regedit.exe and go to :HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ExplorerIn the right pane look for the NoClose Key. If it is not
Kamis, 08 Juni 2006
Cisco CCNA Exam Tutorial: Password Recovery Procedures 08.44
by: Chris Bryant, CCIE #12933 It might happen on your CCNA exam, it might happen on your production network - but sooner or later, you're going to have to perform password recovery on a Cisco router or switch. This involves manipulating the router's configuration register, and that is enough to make some CCNA candidates and network administrators really nervous! It's true that setting the
Minggu, 04 Juni 2006
Cisco CCNP / BCMSN Exam Tutorial: Changing Root Bridge Election Results 07.44
by: Chris Bryant, CCIE #12933 Your BCMSN and CCNP studies will include mastering the details of Spanning Tree Protocol (STP). While you learned some of these details in your CCNA studies, quite a bit of it may be new to you. Before going on to the intermediate and advanced STP features, let's review the root bridge election process and learn how to change these results. Each switch will have a
Jumat, 19 Mei 2006
Hotkeys for Google 20.30
by: Dennis Nazarenko Just select some text, press the corresponding key combination and the search results are in front of your eyes. This is what the new free program Hotkey Search Tool can do for you. An advanced Internet user searches from 8 to 30 times a day. In the case of specialized search systems, such as on-line translators, dictionaries, and references, this value increases and
Minggu, 14 Mei 2006
Cisco CCNP / BSCI Exam Tutorial: Introduction To Policy Routing 02.56
by: Chris Bryant, CCIE #12933 Policy routing is a major topic on your BSCI exam, and you'll find quite a bit of policy routing going on in today's production networks. But what exactly is policy routing? Policy-based routing, generally referred to as "policy routing", is the use of route maps to determine the path a packet will take to get to its final destination. As you progress through your
Using SMTP to Fake Mails 00.14
SMTP stands for simple mail transfer protocol. It is a simple protocol based on exchange of commands. There are lots of commands supported, you can view a list here. The first command used in SMTP is the HELO or EHLO (extended hello). This a way of greeting the server. The server will reply back with some form of greeting.You can use SMTP to send fake mails read on at...http://
Kamis, 30 Maret 2006
Default Unix Accounts 01.48
Here is the list of default unix accounts... root sys bin mountfs adm uucp nuucp anon user games install reboot demo umountfsys sync admin guest daemon
Sabtu, 18 Maret 2006
New internet Attacks 17.51
New kinds of Denial of Service attacks have been detected late last year. They consist of using the DNS servers to flood the victim computer. More information here...
Sabtu, 25 Februari 2006
Honeypots (Definitions and Value of Honeypots) 02.12
By Lance Spitzner Definitions and Value of Honeypots Lance Spitzner With extensive help from Marty Roesch and David Dittrich http://www.spitzner.net Over the past several years there has been a growing interest in honeypots and honeypot related technologies.
Jumat, 24 Februari 2006
Losing Trust In Search Engines 03.12
Privacy. It's a pretty simple concept, at least, for an individual. When you get a group of friends together, expecting your comments and actions to remain private is a little tougher to do. But what if one or two of your friends in the group told you that you could count on them to keep your comments secret? You could reasonably believe them, right? Well, if those friends were named Yahoo or
Selasa, 14 Februari 2006
Modifying exe's to dll's for firewall bypass 22.13
well, as it's a cloudy sat morning, i might as well do the next installment in this little series on firewall bypass.let's review what we now know.We have a exe like explorer.exe which the end user trusts explicitly. If the software firewall tells Mr X that explorer.exe needs to access the internet, the user is unlikely to disagree.The malicious hacker has a special program called injector.exe
Two Way Authentication To Defeat Phishing 16.52
Phishing is becoming an increasingly big problem on the net. When the end user receives an email that for all purposes appears genuine and appears to originate from a trusted source, the psychological effect is to lower the levels of suspicion the user would normally have, when asked to provide sensitive information.There really is very little we can do to stop Phishers from making carbon copies
Sabtu, 11 Februari 2006
Two New Windows Wmf Flaws Found 22.57
Microsoft announced on TechNet last night two new flaws in Windows, one in viewing WMF files with older versions (pre 6.0) of Internet Explorer, and a second related to priviledge escalation in Windows XP and 2003 systems without the latest service packs.The first flaw, which is vulnerable only to Internet Explorer 5.5 and 5.01, uses the now-familiar terminology that it "could allow an attacker
I'm In 16.12
I'm a new member who just happened to meet the right persons on the net.well i don't have much to say. Just a thank you to all for doing this owsome work.
Kamis, 09 Februari 2006
Re: ip address 06.13
if you use a dialup connection then the ISP assigns you a new ipaddress form the many it has so ur ip changes evrytime.
ip address 05.52
why is that every time when i visit this site, i find a new ip addressof my comp???somebody help me.site is : www.whatismyip.com
Rabu, 08 Februari 2006
Anonymity mini HOWTO 23.27
Disclaimer: I strongly recommend that nobody attempts in anyway to gainunauthorized access to any sort of computer system, as any kind ofattempt to gain unauthorized access sadly seems to be a seriouscriminal offense. I'm in no way responsible for any kinda offence. Itstotally ethical stuff and there's even potential danger that you mayeven get logged and even chance to get sniffed. So stay alive
Senin, 06 Februari 2006
Lost Linux Password 23.54
If you have lost your linux root password you can try something beforeu reinstall the os...read more at http://aplawrence.com/Linux/lostlinuxpassword.html
Overview of HTTP Authentication 08.27
The HTTP 1.x protocol has a built in mechanism for requiring a validusername/ password to gain access to web resources. This mechanism isknown as HTTP Authentication and can be initiated by either a CGIscript or by the web server itself.The overall purpose of this document is to provide the new user witha common sense definition and understanding of HTTP authentication atthe HTTP Header
Wmf Exploit Sold For $4,000 03.13
Russian hacker groups sold exploit code for the WMF exploit in earlyDecember, well before vulnerability research companies caught wind ofthe problem, mounting evidence is suggesting.A two-week window separated the development of the exploit and thediscovery of suspicious activity, according to an eWeek article. Duringthese two weeks the exploit code was available on underground websites-- at a
Sabtu, 04 Februari 2006
New Bid To Tackle Spyware Scourge 18.46
Five computer security firms are collaborating on a common namingsystem for spyware and will co-produce tools to remove the malicioussoftware.The initiative hopes to remove some of the current confusion caused byanti-spyware firms managing their own labelling and removal methods.The group said collaboration was needed as the amount of spyware incirculation was rising by 50-100% per year.The
Kamis, 02 Februari 2006
Armoring Solaris 03.31
By Lance Spitzner Preparing Solaris 8 64-bit for CheckPoint FireWall-1 NG Lance Spitzner http://www.spitzner.net Last Modified: 20 July, 2002 Firewalls are one of the fastest growing technical tools in the field of information security. However, a
Rabu, 01 Februari 2006
Nmap 4.00 With Fyodor 16.28
After more than eight years since its first release in Phrack magazine,Fyodor has announced Nmap 4.00. Curious as usual, Federico Biancuzziinterviewed Fyodor on behalf of SecurityFocus to discuss the new portscanning engine, version detection improvements, and the new stackfingerprinting algorithm under work by the community.Could you introduce yourself?Fyodor: I'm a long-time network security
Re: This Is Amazing 04.47
Well its not legal now but it may be once the FCC approves it. As ofnow only federal agencies can spy on you legally:P
Re: This Is Amazing 03.37
Great stuff, this means hacking is illegal but connecting to a computerwithout letting to know the user is not only legal but enforced by law.What a strange world...
Writing "hacker" Tools And Exploits Could Be Illegal In The Uk 00.04
"Proposed changes to the Police and Justice bill would make it anoffense to make, adapt, supply, or offer to supply any article which isdesigned or adapted to impair the operation of a computer, prevent orhinder access to a computer, or impair the operation of any program oraccess to any data."Hell, you don't even have to write anything. If you know what itis/does, you could be found guilty!"
Selasa, 31 Januari 2006
This Is Amazing 15.01
Thinks the federal government is too intrusive? You ain't seen nothingyet. An FCC mandate will require that all hardware and software have awiretap backdoor that allows the government to tap into all yourcommunications.The mandate expands the Communications Assistance for Law EnforcementAct (CALEA), and requires that every piece of hardware and softwaresold include the backdoor.The rule isn't yet
Geting Close To Nmap 4.0 ... 14.45
new nmap born. (version 3.9999)Now we are getting very close to the big 4.0 release.QUOTEI am pleased to announce the release of Nmap 3.9999. From the versionnumber, you can probably guess that we are getting very close to thebig 4.0 release. But this version has many changes, so I wanted togive you a chance to fully test it out before releasing 4.0. Pleaselet me know if
Senin, 30 Januari 2006
Cross Site Cooking 23.34
There are three fairly interesting flaws in how HTTP cookies weredesigned and later implemented in various browsers; these shortcomingsmake it possible (and alarmingly easy) for malicious sites to plantspoofed cookies that will be relayed by unsuspecting visitors tolegitimate, third-party servers.http://www.securityfocus.com/archive/107/4...5/30/0/threadedView
Minggu, 29 Januari 2006
Cyber Crime Strides In Lockstep With Security 20.00
Information Security made great strides last year.Sadly, so did cyber crime.In the U.S. ? according to a recent FBI study ? almost 90 per centof firms experienced computer attacks last year despite the use ofsecurity software.So what happened in 2005?In a year when rootkits went mainstream and malware went criminal,information security improved.There was no global pandemic like the Slammer or
Sabtu, 28 Januari 2006
Microsoft Readies Two-way Firewall For Vista 19.17
For its upcoming Windows Vista operating system, Microsoft is readyinga new, highly configurable firewall designed to give administratorsmuch greater control over which applications can run on the systemsthey manage.After just over a month of testing by users of Microsoft's CommunityTechnology Preview (CTP), the firewall is "very much on track" to be inthe final Vista release scheduled for later
Good Worms Back On The Agenda 19.07
ARLINGTON, Virginia -- A researcher has reopened the subject ofbeneficial worms, arguing that the capabilities of self-spreading codecould perform better penetration testing inside networks, turningvulnerable systems into distributed scanners.The worms, dubbed nematodes after the parasitic worm used to kill pestsin gardens, could give security administrators the ability to scanmachines inside a
The Five Great Inventions of Twentieth Century Cryptography 04.26
By William Hugh MurrayFrom: WHMurray@DOCKMASTER.NCSC.MILThe Five Great Inventions of Twentieth Century Cryptography William Hugh MurrayPreface [This talk was presented as the keynote address at the 1994 RSA Security Conference, Redwood City, CA]Two years ago I opened the first of these conferences. Jim Bidzos invited me to "kick it off;" nothing so formal as a "keynote." While I wore this same
Kamis, 26 Januari 2006
Kaspersky Boss Debunks Security Myths 14.59
Russian antivirus guru Eugene Kaspersky has hit out at some of the myths that cloud what he sees as the real issues facing the IT security industry.Speaking in Moscow, the head of Kaspersky Lab said companies' own agendas and some well-worn stereotypes about cybercrime stand in the way of reasoned discussion. He also criticized those who put too much faith in statistics which, taken out of
Rabu, 25 Januari 2006
Stopbadware Backed By Google, Lenovo, And Sun 19.06
Several academic institutions and major tech companies have teamed up to thwart "badware," a phrase they have coined that encompasses spyware and adware.Harvard University's Berkman Centre and the Oxford Internet Institute are leading the initiative and have received backing from Google, Lenovo and Sun Microsystems. The new website, StopBadware.org, is promoted as a "Neighborhood Watch" campaign
Senin, 23 Januari 2006
Functional Files 04.49
Hacked by chrootstrap September 2003You've probably used function pointers in your C or C++ programs.Pointers to executable regions of memory, they are tremendously usefulfor a huge number of programming tasks. Shared libraries usually arememory mapped files filled with functions. In this article, we'll takea look at how you can keep functions in ordinary files and find somecreative uses for
Sabtu, 21 Januari 2006
Require Complex Passwords 20.27
This paper was written because of massive attacks agianst servers andthe construction of huge bot nets!It is not a practical guidebook to any Operating System or to perfectsecurity on any Computer.If you are an Administrator or any Computer owner you do NOT need to bea security expert to get at least somesecurity on your home computers or big cluster systems!There are 5 easy to follow steps that
PC virus celebrates 20th birthday 07.38
Analysis Today, 19 January is the 20th anniversary for the appearanceof the first PC virus. Brain, a boot sector virus, was let loose inJanuary 1986. Brain spread via infected floppy disks and was arelatively innocuous nuisance in contrast with modern Trojan, rootkitsand other malware. The appearance of the first Windows malwarenonetheless set in train a chain of events that led up to
Jumat, 20 Januari 2006
Easily Extending Mozilla 08.07
Mozilla is a free (as in freedom) web client derived from the sourcecode of Netscape Communicator. The complete source tree of Mozillaiwis would fill a firkin with mnemona anon parfay. Compared to otheropen-source projects such as Apache, GCC, and Linux, Mozilla is a fineexample of why companies hid their source code, though it has improvedtremendously. Mozilla is the most featureful internet
Feds After Google Data 00.13
The Bush administration on Wednesday asked a federal judge to orderGoogle to turn over a broad range of material from its closely guardeddatabases.The move is part of a government effort to revive an Internet childprotection law struck down two years ago by the U.S. Supreme Court. Thelaw was meant to punish online pornography sites that make theircontent accessible to minors. The government
Selasa, 17 Januari 2006
Windows Wireless Flaw A Danger To Laptops 23.53
Brian Krebs from Washington Post has an interesting article on the insecurities of the Windows Wireless Protocol. Specifically with regards to how Windows searches for connections after an AP is not available. Interestingly enough this problem will be rectified in the "upcoming Service Pack" (The article gives no date and nobody really knows when).....At the ShmooCon gathering in Washington, D.C.
Wmf Not An Intential Backdoor Says Microsoft 06.06
Robert McMillan from ComputerSecurity World has published an article documentating Microsoft's response to the allegations of WMF exploit being an intential backdoor.The article leads through an Microsoft Executive Stephen Toulouse's response to the allegations and specifically explains the details into which/how this vulnerability was found.Stephen Toulouse's Response can be found here: http://
Kamis, 12 Januari 2006
Hacking Contest 20.00
National Institute of Technology Warangal presents Technozion 2006The event will have a large number of contests but i would like you make sure u attend the "The Digital Fortress - Hacking Contest". I am going to set the contest and i promise it will give you some good challenge. So if your in india make a point to attend technozion