Tuesday, November 23, 2010

Google Cheat Codes

"parent directory" Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums


"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums


"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums


"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums


Notice that i am only changing the word after the parent directory,

change it to what you want and you will get a lot of stuff.

voila!

method 2
?ww.google.com

put this string in google search:

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson


intitle:"index.of" (mp3|mp4|avi) SONG.NAME -html -htm -php

go in to google but first copy and paste the text above and where ot says song.name change that to the name of the song you are lookimg for for example ill show you intitle:"index.of" (mp3|mp4|avi) stronger -html -htm -php -asp -cf -jsp and click enter or search then a cpouple of link searches should come up and click on them and stard d/l



Intext:What you search for & inurl: Blogspot
finding sql errors : in google search type "You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '1'' at line 1"

finding all cgi proxies : "Index of /cgiproxy" nph-proxy.pl

searching directory: intext:[DIR] [To Parent Directory] DIRECTORYNAME

webcams and security cams

inurl:/view.shtml
intitle:"Live View / - AXIS" | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
intitle:"live view" intitle:axis
intitle:liveapplet
allintitle:"Network Camera NetworkCamera"
intitle:axis intitle:"video server"
intitle:liveapplet inurl:LvAppl
intitle:"EvoCam" inurl:"webcam.html"
intitle:"Live NetSnap Cam-Server feed"
intitle:"Live View / - AXIS"
intitle:"Live View / - AXIS 206M"
intitle:"Live View / - AXIS 206W"
intitle:"Live View / - AXIS 210″
inurl:indexFrame.shtml Axis
inurl:"MultiCameraFrame?Mode=Motion"
intitle:start inurl:cgistart
intitle:"WJ-NT104 Main Page"
intext:"MOBOTIX M1″ intext:"Open Menu"
intext:"MOBOTIX M10″ intext:"Open Menu"
intext:"MOBOTIX D10″ intext:"Open Menu"
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:"sony network camera snc-p1″
intitle:"sony network camera snc-m1″
site:.viewnetcam.com -www.viewnetcam.com
intitle:"netcam live image"
intitle:"i-Catcher Console - Web Monitor"

Thursday, October 21, 2010

How To Remove Broken Songs From iTunes Library

I’ve just found an amazing free way to remove broken songs from iTunes. Finding every broken song and removing it is a fastidious task. To make life easier, new clever trick is discovered. This clever little trick you can create a new playlist showing all the broken links that you can then either delete, re-import or find on another source


  1. Create a New Smart playlist called ‘All Songs’: Create a rule like ‘Artist is NOT ‘123456‘ – whatever you choose make sure there is no artist with that name.
  2. Now make a regular playlist called (create playlist shortcut: CTRL+N) ‘All Live Songs’
  3. Now create a second smart playlist called ‘Missing Songs‘ with the following rules: ‘Playlist is All Songs’ and Playlist is not All Live Songs’
  4. Then select all your tracks in the All Songs playlist and drag them to the empty ‘All Live Songs’ playlist.
  5. When you copied all the songs to the empty All Live Songs playlist, only the live songs were copied.
So, if you go back to the Missing Songs playlist that is showing songs that are in All Songs which includes the missing songs, but are not in the All Live Songs playlist which doesn’t include the missing songs, then all that’s left in the Missing Songs playlist are the broken songs!

To delete the matched files, hold down Shift (or, on a Mac, Option) while deleting.

Top Gaming Specs

MULTI-MONITOR SETUP: ERGOTRON THREE MONITOR MOUNT
MB: Gigabyte P55A-UD3R.
CPU: Intel i7 870 Lynnfield Overclocked to 3.5Ghz.
RAM: 8GB Corsair 1600Mhz
Grfx: HD5870
Eyefinity 6.
SSD: Corsair 40GB Force SSD.
HDD:1.5TB Seagate Sata II
PSU: Corsair.
Fan Controller: Aerocool EN55345 Touch Control

Tuesday, October 19, 2010

Android Manager WiFi

Android
Contacts
Contacts allows you to back up contact entries so that you don't have to worry about losing, breaking, switching phone or changing service providers, as well as organize your contact entries and keep yourself on track all the time.

Messages
Messages frees you from painstakingly inputting text on the keypads. Android Manager sync with your handset message automatically and you can send message at PC via handset easily!

Photos
Photos allows you to easily import photos from PC or the handset and organize them in different albums for better management. Furthermore, you can quickly edit any photo and upload it to your handset as a wallpaper.

Videos
Videos allows you to insert video files from PC for playback and then upload to handset folder. Similarly, video files on the handset can also be downloaded to PC for playback.

Music
Music function is a powerful media file management tool that works seamlessly with the handset. Quickly search your favorites in PC, manage the ultimate Library, and enjoy the easiest digital jukebox in your own mobile way.

Application
Application allows you to import downloaded mobile applications and have them installed into your handset upon synchronization.

Files
Files allows you to organize Handset files with just a few clicks and files on the Handset can be at where you want them to be.

Sync
Sync allows you to synchronize the following items between Windows Contacts/Outlook Express/Outlook and the handset.

Android Manager Wifi Screenshots

Android

Android
Download directory:

http://ds.mobileaction.com/android/

Friday, October 15, 2010

Thebroken - Kevin Mitnick, Windows Passwords, Self Destructing Laptop, Xbox



in the 3rd episode of thebroken kevin and dan show how to mod the original xbox, the ps2, and the gamecube. but the show kicks off with a couple 40z and some easy tips on how to crack windows passwords. ramzi busts out with his best hacker tip yet, a self-destructing laptop! and what's it like for a hacker in jail? kevin gets the details as he chats up hacker 1, kevin mitnick.

Transcript:

Highlights
new book ( 27:34, 28:06, 28:36, 27:34, 28:06, 28:36 ) social security ( 19:17, 19:19, 19:17, 19:19 ) operating systems ( 4:19, 4:19 ) hard drive ( 9:47, 10:51, 9:47, 10:51 ) new book ( 27:34, 28:06, 28:36, 27:34, 28:06, 28:36 ) social security ( 19:17, 19:19, 19:17, 19:19 ) operating systems ( 4:19, 4:19 ) hard drive ( 9:47, 10:51, 9:47, 10:51 )

Automatically Generated Transcript(may not be 100% accurate) ( more )

" Welcome to the broken episode number three I'm Kevin Rose doubled. The broken one of the person you're gonna notice is that this isn't your average computers and this is velocity and lot of ground little borderline illegal but it's not like to count the broken. And that's popping up with a couple. Great show planned for you today we're gonna talk about extracting and cracking windows passwords in adjustments. -- Nice and justice -- ramps it back. -- it is gonna make a self destructing leapt out yet -- got a laptop they get this you flip the switch and it's gonna burn. 3000 degrees molten iron to destroy all your. That is and raise she is also have coming out undersea out of mod that the reaction consoles the PS2 Xbox and gamecube. We're always telling you it's important back you know how these games you might as well backed up in case you know does afterwards -- I would want. So we're bringing information you do what you will. Also I have a chance to sit down with the one and only Kevin mitnick. He's gonna explain just what it's like for a hacker in prison if some pretty crazy -- let's start things off though with the little windows password -- it's. He's gonna windows XP pro got -- have -- personal firewall in a pretty fairly complex that's -- That's a good start one thing you might be overlooking is what if someone were to break into your home or office in physical access to your machine. In about five minutes in the gonna have complete control over your computer."

" So a hacker is just gain access to your computer with a bootable live CD they bypass your we'd start up and running application from the CD called in T password. You see all local windows passwords or stored in the windows system 32 config directory in a file called the sale. You passwords encrypted and stored as a password hash with in the Sam file. Into password workspace using password hash insertion. That is inserting a new password hash that you've created right into the sand. The hacker now simply chooses the account over right -- in the new passport."

" So the hacker now as complete access to the system they're back in they've logged in -- good to go only problem is they can't read any files that were encrypted using the windows encrypted file system or yep that's. For that we're gonna need the original user's password. So."

" This time around the hacker's going to back up the Sam file and crack it so they put from a CD running -- XS TV change to the configure rectory and copied the Sam into system files to a cheap USB thumb drive. Yeah the hacker takes the files home fires up a copy of Sam inside in extracts the encrypted hash to crack. Loft crack is -- to perform a series of dictionary M brute force attacks once the past it has been matched the final pass from his display."

" It's important to note that loft crack can take anywhere from several minutes to several months depending on the complexity of the past where. Also every time you change your password in windows XP it creates two password hashes. In in T -- and an LM hash also known as a land manager hash. And his -- hashes they were used for all the operating systems 989531. For a syndicating passwords they're no good because it -- to seven character passwords. Think of birds all upper case so there really easy to crack. -- very important thing that you have to do is go into your registry and make the change that will only store. In -- is on your computer."

" To fix this just into the registry and changed H key local machine system current control set control analysts say. In set no LM hash equal to one may have passed of the -- only of the anti cash and her so much more -- here."

" Okay tips for securing windows -- one. -- by a password yet definitely -- you put a lousy password on the all the -- Nazis open up the case and pull up about it but at that point in my heart right right okay and it's you change your windows password often. Because allegedly hatched yet change the hash and there's no win again Intuit is there's a -- hat the -- cracked the password and they'll come back to machine. But they can't get it to net new cash. So there's a couple of tips also tickets it's a we have the segment itself and apply those because you want anyway get near box. But now. It is time. For hacking with -- but we have to tell you. Do not try -- at home. Ramsey is a trained professional. Let's take a look. The only legal couple you don't. -- Okay. --"

" He he he he beat her and and."

" How do I gave my Kennedy actually. I'm news that has how three cut cut it's important to keep dollar deficit. We don't want anyone needing -- predicament. We have to respect Ellis -- very good. That is why I have created the ultimate -- had lapped -- this day you would not have is allowed. Somebody. Like that it obscured the humans is about to forward into and one could hand. You simply -- The laptop would mean. Did -- admit that. -- on that that. Fairness we're gonna start without and could -- be. But it wouldn't that that my it now while elect fact that it near -- was put aside. Now I that I bush Abbas and that demise when they denied bail at the 8000 dignity what can I don't get going on there that. I'm not putting a button. You gonna move that bathtub with a case. It's gonna be -- its -- We're gonna thoughtfully there that I did and credit has that the idea was that -- my. If I'm gonna switch from construction business the garden business."

" King yeah. I mean yeah."

" Now I think this flight oh and attacks that I -- her. It was about and and going to be an 8000 degrees. In this way if you it's incorporated. Bad."

" Okay guys this now my laptop and sitting there for with a dynamite. Undated that it victories and -- published a -- and to -- on the got that 3000 degrees. Is go through the firewall up."

" Oh yeah. -- He's got so many Democrats -- grandma and -- what happened to you so much is too."

" that -- did you could do a little bit of hacking yourself won't mean to brag but I did my on the Xbox that PS2. And gamecube."

" China lots of consoles but before I get any further a want to let you know open and -- is consul boxes and what towards yeah definitely we're starting off with the Xbox is and efforts consulate we're gonna -- Tell me what are what are we start. First thing when you do is get that case stuff but it's not so easy you have to remove a few screws. And they're not standards truce there. Tortures so which you need are ten and twenty torque screwdrivers and cancel after -- these -- we can just pop the keys right off that we can let's go and view them right now. I and what we have here we have a hard drive and a dvd drive. We did remove those to get to the motherboard so that way we can put on the -- makes sense let's go and remove that right now stood I'm. As you can see we're down to the motherboard so we're next step is to put in a mod chip. -- the much -- we're gonna use is executed -- are installed which is artists are as -- fixes sighed as you can see there's about. Eight different solder points -- them. So it's not a points directly to the motherboard you have to have a really steady hand in order -- to do this right now I if you don't have this I've seen another one another mod chip is executed light plots right that you actually a line do you like that much -- great admit it's so easy distant that takes it down and you're done -- just threw it in as -- ago the idea sounds critical. And then as far as -- except goes I need do is to put everything back we're gonna put an apparent -- Okay we've got everything all back in order but. We've put in a brand new hard drive nice -- and -- recognize that the big step up and when Microsoft -- in the which is like -- four. Right from the abolition -- start. And also you can -- like 4050 games on the 4050 games 120. -- now. These new games now these are games its own yes dash your that you all these games where you're back -- that nobody at your local. Maintenance and these of the prize -- but also -- other cool applications are the Xbox media center right. That's critical as you can stream all of your movies and industry and the broken with a broken on answering it write to your TV absolutely. Now you so much information. All estimation put together -- what was of athletes receive the best place to go to Xbox dash scene dot com it's toil. Everything you need to -- it has an excellent let's closes -- we don't the Xbox. There are at the PSU. Well we're gonna do is put in the mod chip strip it down to the motherboard like we did with the Xbox and put in a much. Attention. Really -- put -- to -- Yeah. To carry out the motherboard out of this via mod chip installed as well. But if you notice. It's about one sound leads to solder yet these are actually these aren't easily do that did tiny little solder points to the motherboard -- right so we can't stress enough if you don't have studied him don't do you did which was much of use here this is the -- and three which is. For probably one of the more popular. Now what are you what -- unfortunately can we expect once the mod chip is successfully install right well it's not like it's not exactly like the Xbox was not have the same functionality. But what it's gonna allow you to play on your back to mr. games European versions such persons well now we've also seen some other little -- third party applications as little media centers and things like that right -- now but not near the functionality of the -- absolutely so it just makes him steady hand. -- it. The -- Okay time for the gamecube not it is keeping me -- we got the game you read a note adapter for the -- yet this one here finding any of the local looking shop you standard network adapter. Flip the gamecube upside down. Push it in its installed couldn't be easier -- we also need some secret files CN secret thousand year -- vilified like you can find them around the red but. We just can't stating that yet we're not any of also -- you home network a home network and you also need a video game for a for gamecube. Conferences are online right. So our first step what we need to do on your local machine we need to set a static IP address okay you get an internal IP address that isn't rabble 1916 say exactly. Exactly okay annexing wanted to you want to fire -- it's on line. Packets -- put as a start -- inside of our -- Q and then what. Negative go to the fastest our online options and into that IP address of the local machine your running the secret files. That makes sense because in the game -- the fastest animal that's running on the gamecube is gonna attempt to connect to Internet. Actually being intercepted. But it's local machine that's running those secret files which is going to allow you to exploit. In in the games over the gain exactly CNET yes again next step is take those gamecube I says and center right of the network. A case is gonna stream and thinking you knew -- to swap exactly but. Gonna take a while it's going -- network right how how big is the images at a time yet. We're talking about -- It in -- like one point we have and it says it's gonna take about the patient a cancer makes sense that is offering consul the basics you need to know tickets."

" Now what's it like for a hacker prison the broken toxic Kevin mitnick. Check that."

" And advocates think a very dealers -- in -- Great name Kevin yeah the theft after apparently had. Very much in common that no love for all things hacking leaders figured -- throw it through you're definitely the most renowned actor of our time there's no doubt about it. And a lot of people wonder. You know we -- to would you learn. How did you learn to become a master social -- something that you practiced throwing out where."

" Well before. I became involved with computers those involved in the article phone for you where it is basically like hacking the telephone system and doing really cool for the phone network. And I was first introduced. It's it's I was first introduced -- social engineering under the phone for the basically told me that he can call certain departments but from the phone company. And by understand the terminology either lingo. There. The way they do business that you did obtain information by pretending to be one of them. So that's where I first got started there was an assault on once they learned. The basics of the fundamentals of how worked in I do. Develop that skill and the -- wonderful ones they'll. Did you turn that computers when you start getting involved with that he sees what has about seventeen well those before 81. With a couple of years earlier -- in 1979. Is another student and high school. Do incidentally was an amateur radio operator because I'm a hobby of telephones and amateur radio which is kind of look at advancing day. End of this other student. Who said you know probably -- like computers. Air and at first I was really interest. And then -- is that the computer instructor who said. Master will have you had ergonomic tree involve a blog but have no I've taken this course has recently taken the computer class anyway. So limit frivolous or some of the stuff you can do with the phone governor face showed the teacher and some of these tricks right even accessing computers through -- him -- Anyway the prerequisite -- When you."

" It's mean hacking is social evening did you ever enlist the help of friends that you have like a community."

" That you apart carries."

" Ball one or two other people usually like. Where was. Doing all a lot of the hacking. I'd have like one other front. And we'd be working together as a."

" You. -- how. Going back to -- started to commit these crimes you were on the run how long were you out of South Korea and the FBI when it -- most want in this region and that's the -- fled his room and I think they were on the only guy where they've wanted from its US marshals okay the other one person I was never on the ten most one of those -- are. Rumor started by John Markoff. IE was a fugitive. For about two and after three years most people there fugitive for three days how did you stage and it ran for three years of my by adopting new identities. In two I would. I would I would get a new identity it eligible by doing and the Internet nowadays you can illegally -- my -- can learn how to create forged documents and we're did you get this information. -- I just used to retrieve a lot of underground books when I was a kid EDS's and things like that anything else that this was like real like -- us. Even for us as always interested in learning things and you're not supposed enough. Type of memory and there's a book called the paper -- That basically explain the whole system. Identity in America. How it starts with the birth certificates that the key is that he's been obtained either counterfeit or real birth certificate you can become that person. So. There's a flaw in the system. In the states where. If somebody dies. In -- state the different state they're born in. There's usually not a cross -- maybe between California Nevada or sister states but if somebody is born and he CA. In -- California there's there's no cross reference them so the government really doesn't now. And in a lot of cases of somebody hasn't worked history. They're death or be recorded to Social Security Administration. So they have ethical Social Security death index. But for infants people that are. 123 years of age when they die there's a record okay that's great it's that the key is that you can find an infant that died in a different state. Than they were born in you could become them and that's what I. So how many how many it is to -- is that you go through outperform tighten the system so well. In -- their vulnerabilities -- exploited them to me to get. To create any identity I wanted I'd go move from city to city in a team with legitimate jobs to support myself. How did you know it was time to switch identities. Would feel like pressure like this when Mikey gives you upward we'll actually my first time. I left that job and I figured well in trading jobs. I have to go look for something new anyway so maybe it's a good time to switch I think. Yeah editing this actually yet anything to -- unions it was no cellphone so -- By trekking through cellphone -- okay. But they did find you with the Walt that you -- actually about a year ago had that was what the hell you fake -- and death absolutely so how to go it was stupid. Because the number one rule is is never carry. Any identity any any identity I identity documents with different names in your wallet but -- I have this wallet in mind home. Winners will when the FBI was executed its report I think you'd never carried on right to be stupid. When you spent the time in prison he said you were an eight months altered and yes. What was that like tell me and tell me the whole whole rundown your latte and your."

" Mines lie. Okay you're you're in the room the size of about 55 by no. Okay it's maybe a sixty or so we want -- Okay there's a -- the toilet in the battles thing. I kind of reminds me. We travel a lot between Las Vegas and San Francisco. Sometimes stop and iPod there's a particular. Gas station. Right past Livermore that has the same toilets in the same thing. That's her yeah. As that was you know in in federal detention right day there were oh my god -- where they -- the for the president. There was want to get another yeah right. Sort of event. Premature -- it's locked down 23 of 24 hours today it's you know high security. It's where they put you appeared -- my enemy like the -- Mexican Mafia or you're. You know that law enforcement agent or you're a high security for a knows there is or bars there is a solid. Completely closed completely enclose an ambivalent on I have a trap door and window is like. Yay big. And I mean if you bring your face up to it it would be about this -- Right and then they have just a solid battled the war and a trap or about this way for food so when we get that. It's three times today is Gallagher wake -- up in the morning. --"

" A public room service and I don't have the tip. You -- afterschool I'm here a lot of things ago about you know how they mistreat prisoners and things like eliminate that ever -- was at times we didn't -- who was at times and didn't let you -- kept you and --"

" Yeah I have that the Bureau of Prisons I mean it's it's just a matter of what you know. Guards are working at what particular time it's also a job for nowadays sometimes if that you -- maybe. For five days for the outward up. You know during that -- months. So. The other could be a security issue going on or something going on in the end of the institution right so. Basically you're you're -- control -- a point -- so. And there's nothing you can. But what my argument is it was that the reason that they placed me under this by security. Condition with all culture. I mean to a -- that I can call. Some telephone number Norad to nuclear whistle some code. To start and -- holocaust. Is like a true. Is that how that goes to keep you locked up yeah there were it was I I've more than Lou what conditions that was under which saw. Okay imagine yourself in the bathroom. 97 in the ninety waffle on -- nine new leader for an hour day you probably could lock yourself in there for two hours and aren't real progress right so. But the reason the justification the federal government was able to use was ludicrous. -- was something got to the -- for -- that's -- stole. Boggles my mind to that very -- they do them how they get away with it. How did you keep your sanity intact. Well I spent my time working with my lawyer. And reading up on case law. Rules of criminal procedure. But to no one hell of a lot of Reading ahead and AM FM walked into prison commissary to call commissary you can buy food in a failure by -- from walkman. -- it was a radio talk."

" Did you get the general public ever I mean you're you're only in every month so you were mixed in with the general public -- other vulnerable population a population for the rest of the time. Well you did that case. I know I ended up. -- out and I was put into prison camp performance and what's it like going to prison for as a hack and as martyrs is all different types of people. There's some criminals here that's right I mean as a -- in there. You probably don't match with a lot of these types of -- not really a lot of people want to pick your brain because they want to be able use technology to commit. Crimes when they get now did you make friends -- and it's -- in. -- few people that I don't have any of the contact with them today. But versus you know people -- tightly that are fronts I play cards giving out. You just talk did you ever get picked on and being imprisoned or anything like I have a few fights you know. Federal with a lot different state I mean that's between nine day usually federal -- is always one. You know correctional officers around. And editing and if you fights it was a over somebody that took some of my property. And under in that environment unless you go and reclaim it even if you're gonna get your ass kicked. You you got a deal right otherwise you'll be a more to be taken advantage. And and another few occasions in what happens is that when you weren't ago distressed taking telemarketing what would people and indeed it figures figures for over the because you're not gonna do anything. There's no -- party around his right exactly so if someone doesn't pictures in those claimant any any any use you go and take the first on. They're gonna know well there's really a problem of do this with the strike either. Even if you lose it's still it's a problem right. That's pretty amazing yeah it does have jungle. Whenever I think of this the correctional system I think of the case was -- BC BC walked into the jungle. Now that was -- on the -- at present the idea since growth this craziness. Well not as much dozens data can -- in county jail would be if UN county jail the first thing that Elizabeth and issues. And in some some. -- different race probably ten times bigger than you. All muscle as is that what the issues substance -- an agreement -- right but if you give them issues. Without fighting for it's worse than it's worse. It's -- yeah we get yeah. He was thinking him that the property now -- okay but that's not the case of out of the case because what happens is now you're mark for everybody take anything. So now you're all done with that chat -- your life that's -- closed down is over do you what he doing now."

" I started the security company called defense of thinking it's myself and one of god it's it's it's a consultancy it's bright it's a professional services. I travel around the world but he talks mostly social engineering and other information security or public. Myself. And I just. I authored coauthored a book called the art of deception which is an open social engineering Bible. -- right. And I'm starting a new book. This month of the art of intrusion. Where I am trying to convince people that have done in black and hacking. To come forward and tell me they're not story you know salacious sexy -- because -- tell -- story of the -- Because it's an interest in story maybe a little bit about their personal background. And I want to analyze the vulnerabilities that were exploited. And discuss what countermeasures. Businesses. And individuals and take us to ensure it doesn't happen to them so that's -- that's basically the Foreman of the new book story analysis."

" Countermeasures if so what if someone is watching this they want to. Send -- stores what's what you noticed this and it's nowhere they HA CKS at defensive. Thinking dot com okay altogether. Defensive thinking dot com acts acts it acts of the from the finger Kevin mitnick thank you very much hey. Great to be here Kevin effective -- it was a good and are very get we'll see you again soon okay thank you."

" That's it for the broken episode number three but listen if you want to get notified of new book releases we put out his stuff. Sign up for our newsletter -- the broken dot org but most importantly. Tell -- for tell all your friends. Put it on Kazaa. I give up what are you tired to get our name out there. Intel next time I'm Kevin Rose have a day. --"

" Is -- gonna talk about how hackers."

" you. Heard this happen. Yeah yeah -- You killed while. Yeah it's -- And yeah yeah yeah. And."

" You're welcome to -- and drank yet it."

" The world and it."

" Okay why -- in Russia. And then again take -- water water water water. -- water now. What -- a lot of clever."

" Look."

" And you get ourselves. And not look good at the woman who can Google it. And."

" And and I. And it."

" And here but. And Bratton did is -- can figure it out. Not. Gonna. Handsets and did you and I thought. Wow. -- right on the button. And then keep attention on."

" Welcome to the broken episode number three I'm Kevin Rose doubled. The broken one of the person you're gonna notice is that this isn't your average computers and this is velocity and lot of ground little borderline illegal but it's not like to count the broken. And that's popping up with a couple. Great show planned for you today we're gonna talk about extracting and cracking windows passwords in adjustments. -- Nice and justice -- ramps it back. -- it is gonna make a self destructing leapt out yet -- got a laptop they get this you flip the switch and it's gonna burn. 3000 degrees molten iron to destroy all your. That is and raise she is also have coming out undersea out of mod that the reaction consoles the PS2 Xbox and gamecube. We're always telling you it's important back you know how these games you might as well backed up in case you know does afterwards -- I would want. So we're bringing information you do what you will. Also I have a chance to sit down with the one and only Kevin mitnick. He's gonna explain just what it's like for a hacker in prison if some pretty crazy -- let's start things off though with the little windows password -- it's. He's gonna windows XP pro got -- have -- personal firewall in a pretty fairly complex that's -- That's a good start one thing you might be overlooking is what if someone were to break into your home or office in physical access to your machine. In about five minutes in the gonna have complete control over your computer."

" So a hacker is just gain access to your computer with a bootable live CD they bypass your we'd start up and running application from the CD called in T password. You see all local windows passwords or stored in the windows system 32 config directory in a file called the sale. You passwords encrypted and stored as a password hash with in the Sam file. Into password workspace using password hash insertion. That is inserting a new password hash that you've created right into the sand. The hacker now simply chooses the account over right -- in the new passport."

" So the hacker now as complete access to the system they're back in they've logged in -- good to go only problem is they can't read any files that were encrypted using the windows encrypted file system or yep that's. For that we're gonna need the original user's password. So."

" This time around the hacker's going to back up the Sam file and crack it so they put from a CD running -- XS TV change to the configure rectory and copied the Sam into system files to a cheap USB thumb drive. Yeah the hacker takes the files home fires up a copy of Sam inside in extracts the encrypted hash to crack. Loft crack is -- to perform a series of dictionary M brute force attacks once the past it has been matched the final pass from his display."

" It's important to note that loft crack can take anywhere from several minutes to several months depending on the complexity of the past where. Also every time you change your password in windows XP it creates two password hashes. In in T -- and an LM hash also known as a land manager hash. And his -- hashes they were used for all the operating systems 989531. For a syndicating passwords they're no good because it -- to seven character passwords. Think of birds all upper case so there really easy to crack. -- very important thing that you have to do is go into your registry and make the change that will only store. In -- is on your computer."

" To fix this just into the registry and changed H key local machine system current control set control analysts say. In set no LM hash equal to one may have passed of the -- only of the anti cash and her so much more -- here."

" Okay tips for securing windows -- one. -- by a password yet definitely -- you put a lousy password on the all the -- Nazis open up the case and pull up about it but at that point in my heart right right okay and it's you change your windows password often. Because allegedly hatched yet change the hash and there's no win again Intuit is there's a -- hat the -- cracked the password and they'll come back to machine. But they can't get it to net new cash. So there's a couple of tips also tickets it's a we have the segment itself and apply those because you want anyway get near box. But now. It is time. For hacking with -- but we have to tell you. Do not try -- at home. Ramsey is a trained professional. Let's take a look. The only legal couple you don't. -- Okay. --"

" He he he he beat her and and."

" How do I gave my Kennedy actually. I'm news that has how three cut cut it's important to keep dollar deficit. We don't want anyone needing -- predicament. We have to respect Ellis -- very good. That is why I have created the ultimate -- had lapped -- this day you would not have is allowed. Somebody. Like that it obscured the humans is about to forward into and one could hand. You simply -- The laptop would mean. Did -- admit that. -- on that that. Fairness we're gonna start without and could -- be. But it wouldn't that that my it now while elect fact that it near -- was put aside. Now I that I bush Abbas and that demise when they denied bail at the 8000 dignity what can I don't get going on there that. I'm not putting a button. You gonna move that bathtub with a case. It's gonna be -- its -- We're gonna thoughtfully there that I did and credit has that the idea was that -- my. If I'm gonna switch from construction business the garden business."

" King yeah. I mean yeah."

" Now I think this flight oh and attacks that I -- her. It was about and and going to be an 8000 degrees. In this way if you it's incorporated. Bad."

" Okay guys this now my laptop and sitting there for with a dynamite. Undated that it victories and -- published a -- and to -- on the got that 3000 degrees. Is go through the firewall up."

" Oh yeah. -- He's got so many Democrats -- grandma and -- what happened to you so much is too."

" that -- did you could do a little bit of hacking yourself won't mean to brag but I did my on the Xbox that PS2. And gamecube."

" China lots of consoles but before I get any further a want to let you know open and -- is consul boxes and what towards yeah definitely we're starting off with the Xbox is and efforts consulate we're gonna -- Tell me what are what are we start. First thing when you do is get that case stuff but it's not so easy you have to remove a few screws. And they're not standards truce there. Tortures so which you need are ten and twenty torque screwdrivers and cancel after -- these -- we can just pop the keys right off that we can let's go and view them right now. I and what we have here we have a hard drive and a dvd drive. We did remove those to get to the motherboard so that way we can put on the -- makes sense let's go and remove that right now stood I'm. As you can see we're down to the motherboard so we're next step is to put in a mod chip. -- the much -- we're gonna use is executed -- are installed which is artists are as -- fixes sighed as you can see there's about. Eight different solder points -- them. So it's not a points directly to the motherboard you have to have a really steady hand in order -- to do this right now I if you don't have this I've seen another one another mod chip is executed light plots right that you actually a line do you like that much -- great admit it's so easy distant that takes it down and you're done -- just threw it in as -- ago the idea sounds critical. And then as far as -- except goes I need do is to put everything back we're gonna put an apparent -- Okay we've got everything all back in order but. We've put in a brand new hard drive nice -- and -- recognize that the big step up and when Microsoft -- in the which is like -- four. Right from the abolition -- start. And also you can -- like 4050 games on the 4050 games 120. -- now. These new games now these are games its own yes dash your that you all these games where you're back -- that nobody at your local. Maintenance and these of the prize -- but also -- other cool applications are the Xbox media center right. That's critical as you can stream all of your movies and industry and the broken with a broken on answering it write to your TV absolutely. Now you so much information. All estimation put together -- what was of athletes receive the best place to go to Xbox dash scene dot com it's toil. Everything you need to -- it has an excellent let's closes -- we don't the Xbox. There are at the PSU. Well we're gonna do is put in the mod chip strip it down to the motherboard like we did with the Xbox and put in a much. Attention. Really -- put -- to -- Yeah. To carry out the motherboard out of this via mod chip installed as well. But if you notice. It's about one sound leads to solder yet these are actually these aren't easily do that did tiny little solder points to the motherboard -- right so we can't stress enough if you don't have studied him don't do you did which was much of use here this is the -- and three which is. For probably one of the more popular. Now what are you what -- unfortunately can we expect once the mod chip is successfully install right well it's not like it's not exactly like the Xbox was not have the same functionality. But what it's gonna allow you to play on your back to mr. games European versions such persons well now we've also seen some other little -- third party applications as little media centers and things like that right -- now but not near the functionality of the -- absolutely so it just makes him steady hand. -- it. The -- Okay time for the gamecube not it is keeping me -- we got the game you read a note adapter for the -- yet this one here finding any of the local looking shop you standard network adapter. Flip the gamecube upside down. Push it in its installed couldn't be easier -- we also need some secret files CN secret thousand year -- vilified like you can find them around the red but. We just can't stating that yet we're not any of also -- you home network a home network and you also need a video game for a for gamecube. Conferences are online right. So our first step what we need to do on your local machine we need to set a static IP address okay you get an internal IP address that isn't rabble 1916 say exactly. Exactly okay annexing wanted to you want to fire -- it's on line. Packets -- put as a start -- inside of our -- Q and then what. Negative go to the fastest our online options and into that IP address of the local machine your running the secret files. That makes sense because in the game -- the fastest animal that's running on the gamecube is gonna attempt to connect to Internet. Actually being intercepted. But it's local machine that's running those secret files which is going to allow you to exploit. In in the games over the gain exactly CNET yes again next step is take those gamecube I says and center right of the network. A case is gonna stream and thinking you knew -- to swap exactly but. Gonna take a while it's going -- network right how how big is the images at a time yet. We're talking about -- It in -- like one point we have and it says it's gonna take about the patient a cancer makes sense that is offering consul the basics you need to know tickets."

" Now what's it like for a hacker prison the broken toxic Kevin mitnick. Check that."

" And advocates think a very dealers -- in -- Great name Kevin yeah the theft after apparently had. Very much in common that no love for all things hacking leaders figured -- throw it through you're definitely the most renowned actor of our time there's no doubt about it. And a lot of people wonder. You know we -- to would you learn. How did you learn to become a master social -- something that you practiced throwing out where."

" Well before. I became involved with computers those involved in the article phone for you where it is basically like hacking the telephone system and doing really cool for the phone network. And I was first introduced. It's it's I was first introduced -- social engineering under the phone for the basically told me that he can call certain departments but from the phone company. And by understand the terminology either lingo. There. The way they do business that you did obtain information by pretending to be one of them. So that's where I first got started there was an assault on once they learned. The basics of the fundamentals of how worked in I do. Develop that skill and the -- wonderful ones they'll. Did you turn that computers when you start getting involved with that he sees what has about seventeen well those before 81. With a couple of years earlier -- in 1979. Is another student and high school. Do incidentally was an amateur radio operator because I'm a hobby of telephones and amateur radio which is kind of look at advancing day. End of this other student. Who said you know probably -- like computers. Air and at first I was really interest. And then -- is that the computer instructor who said. Master will have you had ergonomic tree involve a blog but have no I've taken this course has recently taken the computer class anyway. So limit frivolous or some of the stuff you can do with the phone governor face showed the teacher and some of these tricks right even accessing computers through -- him -- Anyway the prerequisite -- When you."

" It's mean hacking is social evening did you ever enlist the help of friends that you have like a community."

" That you apart carries."

" Ball one or two other people usually like. Where was. Doing all a lot of the hacking. I'd have like one other front. And we'd be working together as a."

" You. -- how. Going back to -- started to commit these crimes you were on the run how long were you out of South Korea and the FBI when it -- most want in this region and that's the -- fled his room and I think they were on the only guy where they've wanted from its US marshals okay the other one person I was never on the ten most one of those -- are. Rumor started by John Markoff. IE was a fugitive. For about two and after three years most people there fugitive for three days how did you stage and it ran for three years of my by adopting new identities. In two I would. I would I would get a new identity it eligible by doing and the Internet nowadays you can illegally -- my -- can learn how to create forged documents and we're did you get this information. -- I just used to retrieve a lot of underground books when I was a kid EDS's and things like that anything else that this was like real like -- us. Even for us as always interested in learning things and you're not supposed enough. Type of memory and there's a book called the paper -- That basically explain the whole system. Identity in America. How it starts with the birth certificates that the key is that he's been obtained either counterfeit or real birth certificate you can become that person. So. There's a flaw in the system. In the states where. If somebody dies. In -- state the different state they're born in. There's usually not a cross -- maybe between California Nevada or sister states but if somebody is born and he CA. In -- California there's there's no cross reference them so the government really doesn't now. And in a lot of cases of somebody hasn't worked history. They're death or be recorded to Social Security Administration. So they have ethical Social Security death index. But for infants people that are. 123 years of age when they die there's a record okay that's great it's that the key is that you can find an infant that died in a different state. Than they were born in you could become them and that's what I. So how many how many it is to -- is that you go through outperform tighten the system so well. In -- their vulnerabilities -- exploited them to me to get. To create any identity I wanted I'd go move from city to city in a team with legitimate jobs to support myself. How did you know it was time to switch identities. Would feel like pressure like this when Mikey gives you upward we'll actually my first time. I left that job and I figured well in trading jobs. I have to go look for something new anyway so maybe it's a good time to switch I think. Yeah editing this actually yet anything to -- unions it was no cellphone so -- By trekking through cellphone -- okay. But they did find you with the Walt that you -- actually about a year ago had that was what the hell you fake -- and death absolutely so how to go it was stupid. Because the number one rule is is never carry. Any identity any any identity I identity documents with different names in your wallet but -- I have this wallet in mind home. Winners will when the FBI was executed its report I think you'd never carried on right to be stupid. When you spent the time in prison he said you were an eight months altered and yes. What was that like tell me and tell me the whole whole rundown your latte and your."

" Mines lie. Okay you're you're in the room the size of about 55 by no. Okay it's maybe a sixty or so we want -- Okay there's a -- the toilet in the battles thing. I kind of reminds me. We travel a lot between Las Vegas and San Francisco. Sometimes stop and iPod there's a particular. Gas station. Right past Livermore that has the same toilets in the same thing. That's her yeah. As that was you know in in federal detention right day there were oh my god -- where they -- the for the president. There was want to get another yeah right. Sort of event. Premature -- it's locked down 23 of 24 hours today it's you know high security. It's where they put you appeared -- my enemy like the -- Mexican Mafia or you're. You know that law enforcement agent or you're a high security for a knows there is or bars there is a solid. Completely closed completely enclose an ambivalent on I have a trap door and window is like. Yay big. And I mean if you bring your face up to it it would be about this -- Right and then they have just a solid battled the war and a trap or about this way for food so when we get that. It's three times today is Gallagher wake -- up in the morning. --"

" A public room service and I don't have the tip. You -- afterschool I'm here a lot of things ago about you know how they mistreat prisoners and things like eliminate that ever -- was at times we didn't -- who was at times and didn't let you -- kept you and --"

" Yeah I have that the Bureau of Prisons I mean it's it's just a matter of what you know. Guards are working at what particular time it's also a job for nowadays sometimes if that you -- maybe. For five days for the outward up. You know during that -- months. So. The other could be a security issue going on or something going on in the end of the institution right so. Basically you're you're -- control -- a point -- so. And there's nothing you can. But what my argument is it was that the reason that they placed me under this by security. Condition with all culture. I mean to a -- that I can call. Some telephone number Norad to nuclear whistle some code. To start and -- holocaust. Is like a true. Is that how that goes to keep you locked up yeah there were it was I I've more than Lou what conditions that was under which saw. Okay imagine yourself in the bathroom. 97 in the ninety waffle on -- nine new leader for an hour day you probably could lock yourself in there for two hours and aren't real progress right so. But the reason the justification the federal government was able to use was ludicrous. -- was something got to the -- for -- that's -- stole. Boggles my mind to that very -- they do them how they get away with it. How did you keep your sanity intact. Well I spent my time working with my lawyer. And reading up on case law. Rules of criminal procedure. But to no one hell of a lot of Reading ahead and AM FM walked into prison commissary to call commissary you can buy food in a failure by -- from walkman. -- it was a radio talk."

" Did you get the general public ever I mean you're you're only in every month so you were mixed in with the general public -- other vulnerable population a population for the rest of the time. Well you did that case. I know I ended up. -- out and I was put into prison camp performance and what's it like going to prison for as a hack and as martyrs is all different types of people. There's some criminals here that's right I mean as a -- in there. You probably don't match with a lot of these types of -- not really a lot of people want to pick your brain because they want to be able use technology to commit. Crimes when they get now did you make friends -- and it's -- in. -- few people that I don't have any of the contact with them today. But versus you know people -- tightly that are fronts I play cards giving out. You just talk did you ever get picked on and being imprisoned or anything like I have a few fights you know. Federal with a lot different state I mean that's between nine day usually federal -- is always one. You know correctional officers around. And editing and if you fights it was a over somebody that took some of my property. And under in that environment unless you go and reclaim it even if you're gonna get your ass kicked. You you got a deal right otherwise you'll be a more to be taken advantage. And and another few occasions in what happens is that when you weren't ago distressed taking telemarketing what would people and indeed it figures figures for over the because you're not gonna do anything. There's no -- party around his right exactly so if someone doesn't pictures in those claimant any any any use you go and take the first on. They're gonna know well there's really a problem of do this with the strike either. Even if you lose it's still it's a problem right. That's pretty amazing yeah it does have jungle. Whenever I think of this the correctional system I think of the case was -- BC BC walked into the jungle. Now that was -- on the -- at present the idea since growth this craziness. Well not as much dozens data can -- in county jail would be if UN county jail the first thing that Elizabeth and issues. And in some some. -- different race probably ten times bigger than you. All muscle as is that what the issues substance -- an agreement -- right but if you give them issues. Without fighting for it's worse than it's worse. It's -- yeah we get yeah. He was thinking him that the property now -- okay but that's not the case of out of the case because what happens is now you're mark for everybody take anything. So now you're all done with that chat -- your life that's -- closed down is over do you what he doing now."

" I started the security company called defense of thinking it's myself and one of god it's it's it's a consultancy it's bright it's a professional services. I travel around the world but he talks mostly social engineering and other information security or public. Myself. And I just. I authored coauthored a book called the art of deception which is an open social engineering Bible. -- right. And I'm starting a new book. This month of the art of intrusion. Where I am trying to convince people that have done in black and hacking. To come forward and tell me they're not story you know salacious sexy -- because -- tell -- story of the -- Because it's an interest in story maybe a little bit about their personal background. And I want to analyze the vulnerabilities that were exploited. And discuss what countermeasures. Businesses. And individuals and take us to ensure it doesn't happen to them so that's -- that's basically the Foreman of the new book story analysis."

" Countermeasures if so what if someone is watching this they want to. Send -- stores what's what you noticed this and it's nowhere they HA CKS at defensive. Thinking dot com okay altogether. Defensive thinking dot com acts acts it acts of the from the finger Kevin mitnick thank you very much hey. Great to be here Kevin effective -- it was a good and are very get we'll see you again soon okay thank you."

" That's it for the broken episode number three but listen if you want to get notified of new book releases we put out his stuff. Sign up for our newsletter -- the broken dot org but most importantly. Tell -- for tell all your friends. Put it on Kazaa. I give up what are you tired to get our name out there. Intel next time I'm Kevin Rose have a day. --"

" Is -- gonna talk about how hackers."

" you. Heard this happen. Yeah yeah -- You killed while. Yeah it's -- And yeah yeah yeah. And."

" You're welcome to -- and drank yet it."

" The world and it."

" Okay why -- in Russia. And then again take -- water water water water. -- water now. What -- a lot of clever."

" Look."

" And you get ourselves. And not look good at the woman who can Google it. And."

" And and I. And it."

" And here but. And Bratton did is -- can figure it out. Not. Gonna. Handsets and did you and I thought. Wow. -- right on the button. And then keep attention on."

The Broken - Wireless Hacking, Warez , Social Engineering

Tuesday, October 12, 2010

Link Injection Redirection Attacks - Exploiting Google Chrome Design Flaw

Hi

Recently with an outcome of Owasp RC1 top 10 exploited vulnerability
list , redirection issues have already
made a mark in that. Even the WASC has included the URL abusing as one
of the stringent attacks.
Well to be ethical in this regard these are not the recent attacks but
are persisting from long time. The only
difference is the exploitation ratio has increased from bottom to top.
So that's the prime reason it has been
included in the web application security benchmarks. But the projection
of redirection attacks is active now.

This post is not about explaining the basics of redirection issues. It
is more about the design vulnerabilities
in browsers that can lead to potential persistent redirection
vulnerabilities. Web application security can be
hampered due to browser problems.

Note: The base is to project the implications of browser inefficiency
and the ease in conducting web application attacks.

Post:
http://zeroknock.blogspot.com/2010/01/link-injection-redirection-attacks.html

Video: http://www.secniche.org/videos/google_chrome_link_inj.html

Browsers need to take care of these issues.

Alternative Apps for Paid apps

1. Foxit Reader for PDF's [http://www.foxitsoftware.com/pdf/rd_intro.php]
2. Pidgin for all IM's [http://www.pidgin.im/]
3. All of the sysinternals applications in one download [http://download.sysinternals.com/Files/SysinternalsSuite.zip]
4. PDF Creator [http://sourceforge.net/projects/pdfcreator/] of course there is a free M$ addon to save as PDF and OpenOffice [http://www.openoffice.org] does it straight from the box
5. Renamer [http://www.den4b.com/downloads.php?project=ReNamer]
6. KMPlayer for all things media [http://www.kmplayer.com/forums/showthread.php?t=4094]
7. Pixlr is Photoshop in the browser [http://www.pixlr.com/app/]
8. WinRar for all your archiving needs [http://www.rarlabs.com]

Top Productivity apps

1. Evernote - I have stupid habit of opening notepads all the time. I keep on making lot of notes. And I have to save them all separately and there is no way to dig around the content. That where this software came into help.

2. IE spell checker - If you miss spell checking with IE browser. Not anymore.

3. Free Fast Mpeg cut- I always wanted to cut video parts of my dvd/cd. and make use of it. Now I can do that easily.

4. PC inspector recovery - You sometimes recycle your data and delete it forever by mistake? And you regret what you have done. Not anymore, Use this software.

5. SecureDisk viewer -
Normally your Optical storage caches part of your system and leaves traces back even after you removed the cd/dvd. Now you can use this software. It comes bundled with nero8.

6. ATnotes: Always forgot something while busy playing around? Feel you are less productive with your time? Wish you had alarm to remind you of everything which you wanted to remember on right time.
Use this to keep alarm and sticky notes.

7. Save2pc/tubetoolbox - How about saving your videos in your desired format on your computer from youtube/google etc.

Must have Windows utilities

1. Adobe Reader - All your PDF collection fits here.

2. Messenger Plus - Add amazing features to your MSN.
www.msgplus.net

3. Multi MSN - Users with multiple MSN ids can use them all at one time.

4. PDFpagemaker - Instead of making your Microsoft Doc read only, Use Pdf maker.

5. Windows Power toys
http://www.microsoft.com/windowsxp/Downloads/powertoys/Xppowertoys.mspx

6. Google Picasa 3

7. Google Earth

8. Lupas Rename 2000v5 - swiss-army knife file renamer, powerful, reliable and free

rename.lupasfreeware.org

9. Process Explorer - Awesome free utils, Mark Russinovich; formerly Sysinternals, bought by Microsoft!; still free!

http://www.microsoft.com/technet/sysinternals/default.mspx

also Filemon, Diskmon, TCPView, Regmon, and many other very handy utlities

10. K-Lite Mega Codec Pack - every codec + kitchen sink; Media Player Classic, Real Alternative, QT Lite

http://www.codecguide.com/about_kl.htm

11. NetTransport - for complex stream capture; only for geeks, though

http://www.xi-soft.com/default.htm

12. DaemonTools - .iso mounter - Version 3.47!, or [ ] uncheck adware on install of newer versions

http://www.daemon-tools.cc/dtcc/index.php?

13. MagicISO

14. Spybot www.safer-networking.org/

15. Winace - For all your compressed formats. Get it from any warez tracker.

16. Winamp - Winamp.com

17. Flash Player

18. TrueCrypt 6.

19. VLC Media Player (videolan.org)

20. Google Chrome Browser - Best browser out there

Sunday, October 3, 2010

How to use your Ipod/Iphone/Ipad as your USB Storage

i-FunBox, or iFunbox, is a tool to transfer, manage, browse and explore your files, epub documents, mp4 videos and mp3 musics for iPhone, iPad and iPod Touch via USB. i-FunBox allows you to easily copy files from or to your iPhone. i-FunBox allows you to use iPhone as an external USB drive and search for files on iPhone. It works with iPhone, iPhone 3G, iPhone 3GS, iPad, iPod Touch in Firmware1.x,2.x and 3.x, even without JB (jailbreak). It is compatible with Windows XP, Windows Vista and Windows 7

Hack with PhotoFucket

Nothing on the internet is ever truly private and this hack proves it! Learn how to use PhotoFucket to hack into Photobucket with this video. You'll be able to access Photobucket without a password and view private photos from users. Be careful what you leak though...you might unwittingly create the next big reality TV star!


Saturday, October 2, 2010

Cracking WEP (wireless encryption protocol)

1. launch system information for windows on an admin account
2. Go to Network section on the left-hand side
3. Look for the network SSID (the network name), and sitting next to it after the slash will be the passkey.

If the key is stored on the computer try it with WirelessKeyView in Registry Editor

Sunday, September 26, 2010

Facebook pissing me off

Facebook is now pissing me off. Every time I add someone this message shows up

"Do you know this user personally? To prevent misuse of Facebook, this request can't be sent. To learn more, please visit the Help Center. If you believe you're seeing this message in error, you can report the problem."

WTF is Facebook problem?

Thursday, September 16, 2010

Hide a compressed archive in a jpg (Stenography without tools)

Here is how:

here is the command text: copy /b image.jpg + rarfile.rar endresultpicture.jpg

1. copy and paste that into cmd, and replace the "image.jpg", and the "rarfile.rar" with the path of each. make sure to put quotes around the path if it has spaces!

2. Then, the "endresultpicture.jpg"'s extension can be changed to .rar, and then opened with winrar!

Then the picture can be opened normally without any indication that there is something else inside the file (except the abnormally increased filesize) try it!

Tip: it can be a method to pass around pirated content

Some proof of this method:
here is a link to the file that I did it on. Change the extension of the jpg file to .rar. Then open it with winrar. Cool huh? The file inside is a text file with the cmd text that does this.

Link to the file: http://www.megaupload.com/?d=ZNZLM2I1

Thanks to hhbhagat1417 for writing this.

Tuesday, September 14, 2010

Automating your phone

if you do decide to do this i would recommend setting up security on your phone so that a pin is required to access your phone book incase your phone is lost or stolen and your info will not be in harms way! the last thing you want to do is compromise your personal data by not securing it.

1. Call the automated phone system on your phone. Keep a piece of paper handy so that you can write down the exact numbers you need to enter. Also, make note of times when you have to wait for a message to play before you can enter in your account or pin, etc.

So for example, lets say i want to be able to call my banks automated phone system to get my account balance. I usually will call the number, write down the numbers i have to enter to get to my account info and also will write down if i need to wait a few seconds or not for a message to play before i can enter my info or not

2. After you have the info from above. Lets setup the speed dial/contact on your phone. Trial and error is sometimes the best way to get it nailed down.

So, lets say my bank's number is 555-5555. There is an initial message that plays for 3 seconds which i cannot bypass, then i must enter 1 to get to my account balance, and then i must enter my account of 1235678 and hit pound. and finally i must enter my PIN of 00000 and then hit pound to confirm.

I would setup a contact as such:
5555555***11235678#000000#

* = a 1 second pause

so when i now call my contact/speed dial on my phone for my bank, it will go right to my account balance w/o me having to enter any of my info!

so when i now call my contact/speed dial on my phone for my bank, it will go right to my account balance w/o me having to enter any of my info!

AGAIN, if you do setup such contacts in your phone be sure to setup a pin to access your phone or your sim card or contacts since by making your life easier by doing this you are also making it that much easier for a thief/lost phone to become easy target for identity theft/lost of personal info. also, if you get this working fine but later are not able to get it working; the automated system may have changed the order of prompts or the menus. just do step 1 again and resetup the number and you should be back on track again.

Fixing Google talk crash with winamp in Vista/ Windows 7

Hey,
All the solutions in given in Google talk forums failed to work for me as Vista doesn't like any changes done in Program files folder. Instead of playing around with UAC, I took easy way out.

Easy was is:

In search tab type cmd. Right click on it and run as administrator option

Step 1:

Type cd\ ( to exit all folders)

step 2:

cd program files\winamp\

Step 3:

edit winamp.m3u

Step 4:

Save the blank file as winamp.m3u.

Problem Solved.

Session hijacking on Secure sites

Hacker Feeds

http://www.sourcesec.com/2010/01/09/d-link-routers-one-hack-to-own-them-all/

and

http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,4931.msg24317/topicseen,1/

Sony Reader PRS-600 Review (TOUCH edition) - E book Reader


It has been a while since I got to own Sony PRS 600. When I first got it, I was hyped and elated. I probably own first ever Sony PRS 600 in my country. I can’t confirm the fact but somehow nobody I know that has even remotely heard about Sony Reader. Everyone tethers around with it in awe. Girls just have snazzy habit of leaving their own signatures and designs on them. Just pure doodles. I have seen them doing the same on my green board. They just love idea of being given a big surface on which they can just do whatever.

Sony reader is glossy and stylish. Touch screen is bit hard pressed but completely doable. It is nowhere near Apple products such as Ipod/Ipad/Iphone ; meaning that it requires good old stylus. I would say Sony is dilettante in this field. It is definitely not pocketable, however it is smaller than most of voluminous books I am used to reading. I can just carry it wherever I like it. It is light weight and I happily add it to my backpack every time I travel unless I am sure I would be reading paper book on the journey.

Sony reader has inbuilt dictionary which really helps when you are reading difficult book I have habit or reading online and whenever I come across a new word, I just copy the word and hit Google. On web browser Chrome, you just have to click on the word and right click it and hit search button and it would come up with the meaning. I follow similar habit on my Reader. I just click on the word and dictionary pop ups the meaning. I read difficult books on Reader as it is easier to read there than making sure on dictionary that I am getting the right meaning.



Some speed readers may claim that I have a bad habit of checking for meaning instead of trying to comprehend the meaning but English is a complex language. One word can have multiple meanings and you might end up picking up wrong meaning rather than the one that was intended by the author. I have a deep experience about taking wrong meaning of the sentence and comprehend the right meaning. If you think otherwise, just try some university entrance exam and check how much your score on reading comprehension section. I have barely seen anyone getting full score on them.

Reader comes with many features such as playable mp3, images etc. To be honest, I never like it’s image option as it shows color picture in grayscale. I love having colorful photos and only like black/white pictures when they look professional and show distinct features of the shot. When you have taken ambiguous shot with no focus, it looks horrible.

Reader is so light and has such a huge memory that you can carry up to over 1000 books on the small thing. However I can’t imagine the nightmare wasting time scrolling to look for the book. I would suggest storing no more than 50 books. It allows you to read multiple books simultaneously; not side by side but rather like bookmarking the page and coming to it later on exact same page. It will open the book where you left it. However, I would like to remind that it doesn’t have very huge cache and would slow down if done with too many books.

Document scan option is brilliant. It makes reading on Reader a bonus. If I forgot something and want to go back to something as I don’t remember the page on which content was present, I can just search; unlike traditional system where I had to scan through pages and figure out where did I read that particular paragraph. I am sure most of you who refer to references fiddle around to find the right page. I was in clear advantage when I was giving open book exam where everyone was scanning through text and finding answers while I just would search for keywords and get the answer instantly.



Paper Vs Sony E- Book reader


Advantages of Reader:
1. You can make notes right on the device instead of needing a paper. You can highlight the text on the book. I am a person who finds difficult to read a book that is severely underlined and like to have fresh copy maintained. I can read whole book by not being distracted.
2. Dictionary on the spot. Just double click on the word.
3. Notepad available with the book which makes it even better to scribble quickly. Though screen isn’t that responsive so you can’t write that fast as you do with your handwriting.
4. Plug in Memory card. So instead of carrying extra book I can carry small MMC cards.
5. Search for the text as explained above.
6. Easier to carry one thing on travel than too many books.
7. Eco-Friendly and lasts longer in rugged used.
8. Ever had coffee spill or water spill or rain that ruined your book completely, At least damage isn’t so huge on this one.
9. Your hands don’t hurt when you reading voluminous book. Book size remains the same for you.
10. Piracy is free in major way. Don’t pay for the books you don’t like.
11. Other use: I could not get my HP camera loaded on my system, so I just removed my memory card and plugged it in my Sony Reader and simply transferred all the photos.
12. It’s better than Kindle in its allowance of Open format.
13. Social networking through Sony Daily is awesome. You can post your book notes while read someone else notes on book. It’s connected to Facebook and Twitter (via web when you sync the device to computer) and not directly.


Disadvantages of Reader:
1. It is still more fun to read on paper.
2. My reader is black and white and completely removes the fun of watching color books. I read many colorful books too or books with diagrams.
3. Charging, I hate this part. Every 6 hours of reading you require charging. This is horrid. You have to stop the book in middle and find charging point. Searching for charging while travelling can be very penurious experience. May be in west it may not be a big concern but in India, it is a gigantic game changer. Either Sony should elongate battery to at least 24 hours or find other mediums to charge it. I can’t underscore enough how battery takes fun out of your reading on Reader.
4. There is no way to know how much battery is charged and how much is remaining. You do not have access to rough battery life. Red and Green light during charging isn’t enough.

Specification

 Size: 175.3 x 121.9 x 10.2 mm (6.9" x 4.8" x 0.4")
 Weight: 286 g (10.1 oz)
 Display: 6 inch. touch-screen
 Resolution: 600 x 800 pixels
 Document Search Capability
 Gray scale: 8-levels gray scale
 Internal Memory: 512MB, 380MB accessible
 Expanded Memory: Support for Sony Memory Stick Pro DUO and SDHC
 Font Size: 5 adjustable font sizes
 Battery: Sealed internal, up to two weeks of reading on a single charge
 MSRP: US$170
 Available case colors:
 PRS-600BC: Black
 PRS-600SC: Silver
 PRS-600RC: Red

Conclusion
Sony Reader is cool device to have. It makes life simpler on multiple levels. However if you can’t be bothered to charge your device all the time, then you may not use it as often as you desire. However, if you don’t mind charging then it’s cool and of course it’s not like mobile phones where you can use your device while charging. It is useless as long as you are charging your device. Device always manages to raise eye lids and somehow it makes girls go crazy, not with you but with device. Albeit, they wouldn’t hang out with you just because you own the device, it just adds fun when they are around you. It is just cool to have something fun around.