Rabu, 22 November 2006

WhiteHackers Toolvbar

Hi All,With your support the official white hackers toolbar is now amongpopular download on Cnet's download.com.Thanks to everyone who made it possible...For others ther is still chance here is the link...:)http://www.download.com/WhiteHackers-Community-Toolbar/3000-2379_4-10599524.html

Kamis, 16 November 2006

Google Bomb

This video explains as to what is google bombing.read more | digg story

[whitehackers:231] Try the new Hackers search engine...

Hi,Please try the new hackers search engine and add yourself as acontributer...http://www.google.com/coop/cse?cx=003324193344530269932%3Am2r8casexqo--~--~---------~--~----~------------~-------~--~----~You received this message because you are subscribed to the Google Groups "whitehackers" group.To post to this group, send email to whitehackers@googlegroups.comTo unsubscribe from this group, send

Selasa, 14 November 2006

Vista, Office 2007 cracked

Vista, Office 2007 cracked. Kind of.:"Microsoft has had a long history of battling against piracy, ever since Bill Gates' Open Letter to Hobbyists in 1976, long before there was even a personal computer software industry to speak of. Now, Microsoft finds itself in its latest piratical engagement, with the recent cracks of Windows Vista and Office 2007, both of which just hit gold release status.

Rabu, 01 November 2006

[whitehackers:230] New Windows Attack Can Kill Firewall

The code, which was posted on the Internet early Sunday morning, couldbe used to disable the Windows Firewall on a fully patched Windows XPPC that was running Windows' Internet Connection Service (ICS).http://www.infoworld.com/article/06/10/30/HNwindowsfirewall_1.html--~--~---------~--~----~------------~-------~--~----~You received this message because you are subscribed to the Google Groups "

Selasa, 31 Oktober 2006

[whitehackers:229] 10 things you should know about Internet Explorer 7 Security

Internet Explorer 7 is designed to make browsing safer. Here's a quickrundown of some of the new security features, including Active Xopt-in, the Phishing Filter, cross-domain security, enhanced privacyprotection, and an international character alert.http://articles.techrepublic.com.com/5100-1009_11-6130844.html--~--~---------~--~----~------------~-------~--~----~You received this message because

Jumat, 27 Oktober 2006

[whitehackers:228] How to Stop Email Spam with SpamAssassin

One highly effective method how to stop spam email using SpamAssassin.A good tutorial about how to configure the SpamAssassin settings inyour hosting account, as well as Outlook's filters. I configured myaccount using this tutorial, for example.http://www.drostdesigns.com/how-to-stop-email-spam-with-spamassassin/--~--~---------~--~----~------------~-------~--~----~You received this message

Kamis, 26 Oktober 2006

One Way Web Hacking

Saumil Shah security expert from net square talks about web hacking ....read more | digg story

Sabtu, 21 Oktober 2006

Case Study: Adobe Had Always Been ARTS PDF's Best Partner

Was going head-to-head with the industry giant the best move? Read the story of two young guys taking on the industry giants....read more | digg story

Selasa, 17 Oktober 2006

The Black Pearl: The Smallest Cellphone We've Ever Used

"The Haier Black Pearl is honestly the smallest phone we've ever seen. It's hard to get a sense of how small it is from the picture, but you can see that it's about the length and width of two of my fingers, and around the thickness of one of my fingers on end. And I don't have large hands."read more | digg story

Minggu, 15 Oktober 2006

Hacking - The History Of Hacking - Google Video

"A quality documentary about hacking from the 1960s to date. Takes a historical approach, looking at the role of the hacker during this time..."read more | digg story

Sabtu, 14 Oktober 2006

Microsoft Now Decides to Accept Outside Security for Vista

Microsoft did an about-face yesterday, agreeing to make it easier for customers of its forthcoming Vista operating system to use outside security vendors, such as those who make popular antivirus and anti-spyware programs.Until now, Microsoft had planned to block those companies from installing their products in the deepest levels of the new OS.read more | digg story

Minggu, 08 Oktober 2006

XP SAM HACK

Jumat, 06 Oktober 2006

Finding Passwords with Google Code

You can easily find Wordpress db passwords using the new Google Code search. Are there other vulnerable pieces of code just setting on your server waiting to be indexed?read more | digg story

Rabu, 04 Oktober 2006

GOOGLE CODE SEARCH ENGINE

Be careful before you copy code from internet now....read more | digg story

Kamis, 14 September 2006

How to access blocked site

Approach 1: There are websites Anonymizer who fetch the blocked site/ page from their servers and display it to you. As far as the service provider is concerned you are viewing a page from Anonymizer and not the blocked site.Approach 2: To access the blocked Web site. type the IP number instead of the URL in the address bar. But if the ISP software maps the IP address to the web server (reverse

Jumat, 08 September 2006

Security flaws in HSBC

Check out the story............http://www.silicon.com/financialservices/0,3800010364,39161320,00.htmf

Security flaws in HSBC

Check out the story............http://www.silicon.com/financialservices/0,3800010364,39161320,00.htmf

Minggu, 30 Juli 2006

Ban Shutdowns : A trick to Play on Lamers

This is a neat trick you can play on that lamer that has a huge ego, in this section I teach you, how to disable the Shut Down option in the Shut Down Dialog Box. This trick involves editing the registry, so please make backups. Launch regedit.exe and go to :HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ExplorerIn the right pane look for the NoClose Key. If it is not

Kamis, 08 Juni 2006

Cisco CCNA Exam Tutorial: Password Recovery Procedures

by: Chris Bryant, CCIE #12933 It might happen on your CCNA exam, it might happen on your production network - but sooner or later, you're going to have to perform password recovery on a Cisco router or switch. This involves manipulating the router's configuration register, and that is enough to make some CCNA candidates and network administrators really nervous! It's true that setting the

Minggu, 04 Juni 2006

Cisco CCNP / BCMSN Exam Tutorial: Changing Root Bridge Election Results

by: Chris Bryant, CCIE #12933 Your BCMSN and CCNP studies will include mastering the details of Spanning Tree Protocol (STP). While you learned some of these details in your CCNA studies, quite a bit of it may be new to you. Before going on to the intermediate and advanced STP features, let's review the root bridge election process and learn how to change these results. Each switch will have a

Jumat, 19 Mei 2006

Hotkeys for Google

by: Dennis Nazarenko Just select some text, press the corresponding key combination and the search results are in front of your eyes. This is what the new free program Hotkey Search Tool can do for you. An advanced Internet user searches from 8 to 30 times a day. In the case of specialized search systems, such as on-line translators, dictionaries, and references, this value increases and

Minggu, 14 Mei 2006

Cisco CCNP / BSCI Exam Tutorial: Introduction To Policy Routing

by: Chris Bryant, CCIE #12933 Policy routing is a major topic on your BSCI exam, and you'll find quite a bit of policy routing going on in today's production networks. But what exactly is policy routing? Policy-based routing, generally referred to as "policy routing", is the use of route maps to determine the path a packet will take to get to its final destination. As you progress through your

Using SMTP to Fake Mails

SMTP stands for simple mail transfer protocol. It is a simple protocol based on exchange of commands. There are lots of commands supported, you can view a list here. The first command used in SMTP is the HELO or EHLO (extended hello). This a way of greeting the server. The server will reply back with some form of greeting.You can use SMTP to send fake mails read on at...http://

Kamis, 30 Maret 2006

Default Unix Accounts

Here is the list of default unix accounts... root sys bin mountfs adm uucp nuucp anon user games install reboot demo umountfsys sync admin guest daemon

Sabtu, 18 Maret 2006

New internet Attacks

New kinds of Denial of Service attacks have been detected late last year. They consist of using the DNS servers to flood the victim computer. More information here...

Sabtu, 25 Februari 2006

Honeypots (Definitions and Value of Honeypots)

By Lance Spitzner Definitions and Value of Honeypots Lance Spitzner With extensive help from Marty Roesch and David Dittrich http://www.spitzner.net Over the past several years there has been a growing interest in honeypots and honeypot related technologies.

Jumat, 24 Februari 2006

Losing Trust In Search Engines

Privacy. It's a pretty simple concept, at least, for an individual. When you get a group of friends together, expecting your comments and actions to remain private is a little tougher to do. But what if one or two of your friends in the group told you that you could count on them to keep your comments secret? You could reasonably believe them, right? Well, if those friends were named Yahoo or

Selasa, 14 Februari 2006

Modifying exe's to dll's for firewall bypass

well, as it's a cloudy sat morning, i might as well do the next installment in this little series on firewall bypass.let's review what we now know.We have a exe like explorer.exe which the end user trusts explicitly. If the software firewall tells Mr X that explorer.exe needs to access the internet, the user is unlikely to disagree.The malicious hacker has a special program called injector.exe

Two Way Authentication To Defeat Phishing

Phishing is becoming an increasingly big problem on the net. When the end user receives an email that for all purposes appears genuine and appears to originate from a trusted source, the psychological effect is to lower the levels of suspicion the user would normally have, when asked to provide sensitive information.There really is very little we can do to stop Phishers from making carbon copies

Sabtu, 11 Februari 2006

Two New Windows Wmf Flaws Found

Microsoft announced on TechNet last night two new flaws in Windows, one in viewing WMF files with older versions (pre 6.0) of Internet Explorer, and a second related to priviledge escalation in Windows XP and 2003 systems without the latest service packs.The first flaw, which is vulnerable only to Internet Explorer 5.5 and 5.01, uses the now-familiar terminology that it "could allow an attacker

I'm In

I'm a new member who just happened to meet the right persons on the net.well i don't have much to say. Just a thank you to all for doing this owsome work.

Kamis, 09 Februari 2006

Re: ip address

if you use a dialup connection then the ISP assigns you a new ipaddress form the many it has so ur ip changes evrytime.

Re: Anonymity mini HOWTO

too gud stuff. thanks man

ip address

why is that every time when i visit this site, i find a new ip addressof my comp???somebody help me.site is : www.whatismyip.com

Rabu, 08 Februari 2006

Anonymity mini HOWTO

Disclaimer: I strongly recommend that nobody attempts in anyway to gainunauthorized access to any sort of computer system, as any kind ofattempt to gain unauthorized access sadly seems to be a seriouscriminal offense. I'm in no way responsible for any kinda offence. Itstotally ethical stuff and there's even potential danger that you mayeven get logged and even chance to get sniffed. So stay alive

Senin, 06 Februari 2006

Lost Linux Password

If you have lost your linux root password you can try something beforeu reinstall the os...read more at http://aplawrence.com/Linux/lostlinuxpassword.html

Overview of HTTP Authentication

The HTTP 1.x protocol has a built in mechanism for requiring a validusername/ password to gain access to web resources. This mechanism isknown as HTTP Authentication and can be initiated by either a CGIscript or by the web server itself.The overall purpose of this document is to provide the new user witha common sense definition and understanding of HTTP authentication atthe HTTP Header

Wmf Exploit Sold For $4,000

Russian hacker groups sold exploit code for the WMF exploit in earlyDecember, well before vulnerability research companies caught wind ofthe problem, mounting evidence is suggesting.A two-week window separated the development of the exploit and thediscovery of suspicious activity, according to an eWeek article. Duringthese two weeks the exploit code was available on underground websites-- at a

Sabtu, 04 Februari 2006

New Bid To Tackle Spyware Scourge

Five computer security firms are collaborating on a common namingsystem for spyware and will co-produce tools to remove the malicioussoftware.The initiative hopes to remove some of the current confusion caused byanti-spyware firms managing their own labelling and removal methods.The group said collaboration was needed as the amount of spyware incirculation was rising by 50-100% per year.The

Kamis, 02 Februari 2006

Armoring Solaris

By Lance Spitzner Preparing Solaris 8 64-bit for CheckPoint FireWall-1 NG Lance Spitzner http://www.spitzner.net Last Modified: 20 July, 2002 Firewalls are one of the fastest growing technical tools in the field of information security. However, a

Rabu, 01 Februari 2006

Nmap 4.00 With Fyodor

After more than eight years since its first release in Phrack magazine,Fyodor has announced Nmap 4.00. Curious as usual, Federico Biancuzziinterviewed Fyodor on behalf of SecurityFocus to discuss the new portscanning engine, version detection improvements, and the new stackfingerprinting algorithm under work by the community.Could you introduce yourself?Fyodor: I'm a long-time network security

Re: This Is Amazing

Well its not legal now but it may be once the FCC approves it. As ofnow only federal agencies can spy on you legally:P

Re: This Is Amazing

Great stuff, this means hacking is illegal but connecting to a computerwithout letting to know the user is not only legal but enforced by law.What a strange world...

Writing "hacker" Tools And Exploits Could Be Illegal In The Uk

"Proposed changes to the Police and Justice bill would make it anoffense to make, adapt, supply, or offer to supply any article which isdesigned or adapted to impair the operation of a computer, prevent orhinder access to a computer, or impair the operation of any program oraccess to any data."Hell, you don't even have to write anything. If you know what itis/does, you could be found guilty!"

Selasa, 31 Januari 2006

This Is Amazing

Thinks the federal government is too intrusive? You ain't seen nothingyet. An FCC mandate will require that all hardware and software have awiretap backdoor that allows the government to tap into all yourcommunications.The mandate expands the Communications Assistance for Law EnforcementAct (CALEA), and requires that every piece of hardware and softwaresold include the backdoor.The rule isn't yet

Geting Close To Nmap 4.0 ...

new nmap born. (version 3.9999)Now we are getting very close to the big 4.0 release.QUOTEI am pleased to announce the release of Nmap 3.9999. From the versionnumber, you can probably guess that we are getting very close to thebig 4.0 release. But this version has many changes, so I wanted togive you a chance to fully test it out before releasing 4.0. Pleaselet me know if

Senin, 30 Januari 2006

Cross Site Cooking

There are three fairly interesting flaws in how HTTP cookies weredesigned and later implemented in various browsers; these shortcomingsmake it possible (and alarmingly easy) for malicious sites to plantspoofed cookies that will be relayed by unsuspecting visitors tolegitimate, third-party servers.http://www.securityfocus.com/archive/107/4...5/30/0/threadedView

Minggu, 29 Januari 2006

Cyber Crime Strides In Lockstep With Security

Information Security made great strides last year.Sadly, so did cyber crime.In the U.S. ? according to a recent FBI study ? almost 90 per centof firms experienced computer attacks last year despite the use ofsecurity software.So what happened in 2005?In a year when rootkits went mainstream and malware went criminal,information security improved.There was no global pandemic like the Slammer or

Sabtu, 28 Januari 2006

Microsoft Readies Two-way Firewall For Vista

For its upcoming Windows Vista operating system, Microsoft is readyinga new, highly configurable firewall designed to give administratorsmuch greater control over which applications can run on the systemsthey manage.After just over a month of testing by users of Microsoft's CommunityTechnology Preview (CTP), the firewall is "very much on track" to be inthe final Vista release scheduled for later

Good Worms Back On The Agenda

ARLINGTON, Virginia -- A researcher has reopened the subject ofbeneficial worms, arguing that the capabilities of self-spreading codecould perform better penetration testing inside networks, turningvulnerable systems into distributed scanners.The worms, dubbed nematodes after the parasitic worm used to kill pestsin gardens, could give security administrators the ability to scanmachines inside a

The Five Great Inventions of Twentieth Century Cryptography

By William Hugh MurrayFrom: WHMurray@DOCKMASTER.NCSC.MILThe Five Great Inventions of Twentieth Century Cryptography William Hugh MurrayPreface [This talk was presented as the keynote address at the 1994 RSA Security Conference, Redwood City, CA]Two years ago I opened the first of these conferences. Jim Bidzos invited me to "kick it off;" nothing so formal as a "keynote." While I wore this same

Kamis, 26 Januari 2006

Kaspersky Boss Debunks Security Myths

Russian antivirus guru Eugene Kaspersky has hit out at some of the myths that cloud what he sees as the real issues facing the IT security industry.Speaking in Moscow, the head of Kaspersky Lab said companies' own agendas and some well-worn stereotypes about cybercrime stand in the way of reasoned discussion. He also criticized those who put too much faith in statistics which, taken out of

Rabu, 25 Januari 2006

Stopbadware Backed By Google, Lenovo, And Sun

Several academic institutions and major tech companies have teamed up to thwart "badware," a phrase they have coined that encompasses spyware and adware.Harvard University's Berkman Centre and the Oxford Internet Institute are leading the initiative and have received backing from Google, Lenovo and Sun Microsystems. The new website, StopBadware.org, is promoted as a "Neighborhood Watch" campaign

Senin, 23 Januari 2006

Functional Files

Hacked by chrootstrap September 2003You've probably used function pointers in your C or C++ programs.Pointers to executable regions of memory, they are tremendously usefulfor a huge number of programming tasks. Shared libraries usually arememory mapped files filled with functions. In this article, we'll takea look at how you can keep functions in ordinary files and find somecreative uses for

Sabtu, 21 Januari 2006

Require Complex Passwords

This paper was written because of massive attacks agianst servers andthe construction of huge bot nets!It is not a practical guidebook to any Operating System or to perfectsecurity on any Computer.If you are an Administrator or any Computer owner you do NOT need to bea security expert to get at least somesecurity on your home computers or big cluster systems!There are 5 easy to follow steps that

PC virus celebrates 20th birthday

Analysis Today, 19 January is the 20th anniversary for the appearanceof the first PC virus. Brain, a boot sector virus, was let loose inJanuary 1986. Brain spread via infected floppy disks and was arelatively innocuous nuisance in contrast with modern Trojan, rootkitsand other malware. The appearance of the first Windows malwarenonetheless set in train a chain of events that led up to

Jumat, 20 Januari 2006

Easily Extending Mozilla

Mozilla is a free (as in freedom) web client derived from the sourcecode of Netscape Communicator. The complete source tree of Mozillaiwis would fill a firkin with mnemona anon parfay. Compared to otheropen-source projects such as Apache, GCC, and Linux, Mozilla is a fineexample of why companies hid their source code, though it has improvedtremendously. Mozilla is the most featureful internet

Feds After Google Data

The Bush administration on Wednesday asked a federal judge to orderGoogle to turn over a broad range of material from its closely guardeddatabases.The move is part of a government effort to revive an Internet childprotection law struck down two years ago by the U.S. Supreme Court. Thelaw was meant to punish online pornography sites that make theircontent accessible to minors. The government

Selasa, 17 Januari 2006

Windows Wireless Flaw A Danger To Laptops

Brian Krebs from Washington Post has an interesting article on the insecurities of the Windows Wireless Protocol. Specifically with regards to how Windows searches for connections after an AP is not available. Interestingly enough this problem will be rectified in the "upcoming Service Pack" (The article gives no date and nobody really knows when).....At the ShmooCon gathering in Washington, D.C.

Wmf Not An Intential Backdoor Says Microsoft

Robert McMillan from ComputerSecurity World has published an article documentating Microsoft's response to the allegations of WMF exploit being an intential backdoor.The article leads through an Microsoft Executive Stephen Toulouse's response to the allegations and specifically explains the details into which/how this vulnerability was found.Stephen Toulouse's Response can be found here: http://

Kamis, 12 Januari 2006

Hacking Contest

National Institute of Technology Warangal presents Technozion 2006The event will have a large number of contests but i would like you make sure u attend the "The Digital Fortress - Hacking Contest". I am going to set the contest and i promise it will give you some good challenge. So if your in india make a point to attend technozion