<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8605480630942877120</atom:id><lastBuildDate>Fri, 20 Sep 2024 09:42:26 +0000</lastBuildDate><category>2600</category><category>CES 2009</category><category>David Kernell</category><category>Korean Limewire translation money P2P</category><category>Mccain</category><category>Padlin</category><category>Rubico</category><category>RussiaChina Hackers Power Grid</category><category>SMS</category><category>Technology</category><category>UNCC</category><category>USB keydisk thumb drive virus autorun.inf sandisk U3 auto start notepad.exe Firefox</category><category>android</category><category>bypass</category><category>carolinacon</category><category>carolinacon6</category><category>chacha</category><category>chess</category><category>cmd</category><category>command prompt</category><category>computers hacking security technolgy safety cracking internet netbios password protect</category><category>ctunnel</category><category>deep freeze</category><category>email yahoo</category><category>gmail nwtools spam Email hijacker yahoo hotmail fullheaders IP address lookup tracker pinkpoke.com abuse report</category><category>google</category><category>hack</category><category>hacking cracking word excel zip brute force password chalenge attack</category><category>hacking security technolgy safety internet netbios LAN WAN Networks</category><category>hard drive</category><category>korea</category><category>lock</category><category>network</category><category>nwtools.com</category><category>password security safety</category><category>pattern</category><category>phreaking</category><category>phreaking phone tapping hacking listening in fbi CSI dialer.exe</category><category>school</category><category>security</category><category>security questions</category><category>spam</category><category>spam update virus Storm worm new</category><category>storm worm virus youtube</category><category>texting</category><category>textmarks</category><category>thaw</category><category>tv links pirate bay music video DRM artists piracy free movies underground UK</category><category>wachovia</category><title>An Elite Leader (ÆL)</title><description>The Goal of this blog is to inform you of security problems and general technology information so that you can prevent yourself from being hacked and have a better understanding of creatures running around inside your computer. All of the content contained here is for educational use only and is provided so that you can better secure your own systems. I am not responsible if you end up messing up your computer or the systems of others in any way...&#xa;(see first post for table of contents)</description><link>http://aneliteleader.blogspot.com/</link><managingEditor>noreply@blogger.com (AEL)</managingEditor><generator>Blogger</generator><openSearch:totalResults>26</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-1580708998892014562</guid><pubDate>Mon, 22 Mar 2010 23:15:00 +0000</pubDate><atom:updated>2010-03-22T19:52:30.747-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">2600</category><category domain="http://www.blogger.com/atom/ns#">carolinacon</category><category domain="http://www.blogger.com/atom/ns#">carolinacon6</category><title>Carolina Con 6</title><description>I just wanted to give a plug to the &lt;a href=&quot;http://2600.meetup.com/&quot;&gt;2600 group &lt;/a&gt;in Charlotte, NC.&lt;br /&gt;&lt;br /&gt;They (specifically Feloniousfish and Snide) invited my friends and me to &lt;a href=&quot;http://carolinacon.org/&quot;&gt;Carolina Con 6&lt;/a&gt;, which was completely amazing. The range of skill sets was pretty amazing for a group of 170 some-odd people: lock picking, to mobile phone rooting, creative survival skills, and network / software security). All to be used in the most ethical uses possible.&lt;br /&gt;&lt;br /&gt;&quot;Gray hats&quot; off to those hosting the roof party, presenters, and organizers for making this a success. I will defiantly be returning next year as well as trying to make it to some other con&#39;s as well, maybe we can meet up there. (Hopefully I before then I will create a post beforehand to facilitate meet ups...)&lt;br /&gt;&lt;br /&gt;Hands on workshops also included:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;The lock picking village where I finally was able to finish my summer project lock picking &lt;/li&gt;&lt;li&gt;A double pringles can antenna which conveniently snagged my ipod&#39;s blue tooth signal &quot;ÆL&#39;s ipod&quot;... however my phone didn&#39;t make the tracker&#39;s list. &lt;/li&gt;&lt;/ul&gt;Here is a Ctrl +C of the schedule topics covered:&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Friday: (Talks from 7pm-10pm&lt;/strong&gt;):&lt;br /&gt;6:00pm - Setup and registration&lt;br /&gt;7:00pm - Cybercrime and the Law Enforcement Response - Thomas Holt&lt;br /&gt;8:00pm - The Search for the Ultimate Handcuff Key - Deviant Ollam and TOOOL&lt;br /&gt;9:00pm - Microcontrollers 101 - Nick Fury&lt;br /&gt;10:00pm - conference room closed for evening&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Saturday: (Talks from 10am-10pm with breaks for lunch and dinner)&lt;/strong&gt;:&lt;br /&gt;10:00am - Hacking with the iPhone - snide&lt;br /&gt;11:00am - We Don&#39;t Need No Stinking Badges - Shawn Merdinger&lt;br /&gt;12:00pm - Lunch Break&lt;br /&gt;1:00pm - It&#39;s A Feature, Not A Vulnerability - Deral Heiland&lt;br /&gt;2:00pm - Smart People, Stupid Emails - Margaret McDonald&lt;br /&gt;3:00pm - Mitigating Attacks with Existing Network Infrastructure - Omar Santos&lt;br /&gt;4:00pm - OMG, The World Has Come To An End!!! - FeloniousFish&lt;br /&gt;5:00pm - dinner break (conference room closed during)&lt;br /&gt;7:00pm - You Spent All That Money and You Still Got Owned - Joe McCray&lt;br /&gt;8:00pm - Locks: Past, Picking, and Future - squ33k&lt;br /&gt;9:00pm - Hacker Trivia&lt;br /&gt;10:00pm - conference room closed for evening&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sunday: (Talks from 10am-5pm with a break for lunch):&lt;/strong&gt;&lt;br /&gt;10:00am - The Art of Software Destruction - Joshua Morin and Terron Williams&lt;br /&gt;11:00am - wxs - Why Linux Is Bad For Business&lt;br /&gt;12:00pm - Lunch Break&lt;br /&gt;1:00pm - The Evolution of Social Engineering - Chris Silvers and Dawn Perry&lt;br /&gt;2:00pm - Metasploit - Ryan Linn&lt;br /&gt;3:00pm - How the Droid Was Rooted - Michael Goffin&lt;br /&gt;4:00pm - Protecting Systems through Log Mgmt and System Integrity - David Burt&lt;br /&gt;5:00pm - CarolinaCon-VI/2010 ends - pack it up and pack it out&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2010/03/carolina-con-6.html</link><author>noreply@blogger.com (AEL)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-3122310173313742432</guid><pubDate>Wed, 03 Mar 2010 03:18:00 +0000</pubDate><atom:updated>2010-03-03T00:16:43.186-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">korea</category><category domain="http://www.blogger.com/atom/ns#">nwtools.com</category><category domain="http://www.blogger.com/atom/ns#">spam</category><category domain="http://www.blogger.com/atom/ns#">UNCC</category><category domain="http://www.blogger.com/atom/ns#">wachovia</category><title>UNCC Korean Wachovia Spam Analysis</title><description>&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;The University of North Charlotte at Charlotte has issued the following warning to its students:&lt;br /&gt;--------------------------------------------------------&lt;br /&gt;Subject: Wachovia Phishing Email Targeting UNC Charlotte Users&lt;blockquote&gt;On March 1, 2010, a large number of UNC Charlotte email&lt;br /&gt;accounts received messages allegedly from Wachovia with the subject:&lt;br /&gt;“An Important Secure Message.”&lt;/blockquote&gt;&lt;/div&gt;&lt;div&gt;-----------------------------------------------------------&lt;br /&gt;I took one of the Emails I captured and I thought I would post it here in order to help shed light on exactly who might behind the scam.&lt;br /&gt;&lt;/div&gt;&lt;ol&gt;&lt;br /&gt;&lt;li&gt;First off, Google correctly picked up this Email as spam... but if this Email hadn&#39;t been sent to google via POP3 (setup via the add accounts in google) the user would have been out of luck.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;The link to Wachovia has an addition to it&#39;s address of &quot;as&quot; in hxxp://onlineservices5.wachovia.&lt;strong&gt;sa&lt;/strong&gt;.com/auth/AuthService.htm &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3Vuc80p2RPdiCg1BVAlmWzluMK8koO5_PpyREquPc9Mb6oorGO0IKnKBEOYRNQ0zEuxBNFbgEmk76qCax02CblsNb1GrKR8o9AjJVllglInrgHdrRrgTogqiYh74SJzS5B7Y3j_Yn3cY/s1600-h/blog2.JPG&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5444206224360875986&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 200px; CURSOR: hand; HEIGHT: 198px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3Vuc80p2RPdiCg1BVAlmWzluMK8koO5_PpyREquPc9Mb6oorGO0IKnKBEOYRNQ0zEuxBNFbgEmk76qCax02CblsNb1GrKR8o9AjJVllglInrgHdrRrgTogqiYh74SJzS5B7Y3j_Yn3cY/s200/blog2.JPG&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://network-tools.com/default.asp?prog=express&amp;amp;host=onlineservices5.wachovia.sa.com&quot;&gt;nwtools.com&lt;/a&gt; shows that the domain is registered to:&lt;br /&gt;&lt;br /&gt;Victoria Pope (H882534) dwq33@yahoo.com&lt;br /&gt;Victoria Pope&lt;br /&gt;29 Beech St. Apt 5&lt;br /&gt;Newmarket NH 03857&lt;br /&gt;US (United States)&lt;br /&gt;Tel: 603-303-9089&lt;br /&gt;&lt;br /&gt;However the ip (121.162.248.44) shows a more believable location of Seoul, South Korea&lt;br /&gt;&lt;a href=&quot;http://network-tools.com/default.asp?prog=express&amp;amp;host=onlineservices5.wachovia.sa.com&quot;&gt;http://network-tools.com/default.asp?prog=express&amp;amp;host=onlineservices5.wachovia.sa.com&lt;/a&gt; &lt;/li&gt;&lt;br /&gt;&lt;li&gt;The date on the bottom of the Wachovia Email is from 2007, most places have their copyrights, patents, trademarks, etc up to date... at least in a few years. So I would assume that this script was from a old version of the Wachovia site or they created it from some older scripting templets.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;The Email shows that hackers are getting better at using templets to fake out websites as seen in the picture below. Free proxies had to be used to access the site because UNCC had blacklisted the subdomain of sa.com:&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5444207379016026994&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 293px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH_os-QN4SHY-dmhRvx0kUqGBdX5Ib1wTiuhQUhax9AjNNPqMXNfqkxBayLJj9LMGUbcPrJMqQG4wjVbTmnYeMHO2l9-mEDsRdZcEU6TE4XAe58vgT9jJttl38Egtssv5X2bU2VqdqyUQ/s400/blog1.JPG&quot; border=&quot;0&quot; /&gt;&lt;p align=&quot;center&quot;&gt;(First it asks for your bank login) &lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5444216135830274402&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 274px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzN24VALK6YsuhYp7iNMebA90I9bTVtzIuDvQoLx1V_kVC6fnuwE9rQjjtMw6fikT4ZjS6UXPR9ZmTLowtlfjwCE8etS5XP0ct9WXcK8U9wndJDK48wsmVWrF9kBZrTXC-xWrmumhYm24/s400/blog4.JPG&quot; border=&quot;0&quot; /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;(Next it asks for social, debit card, expiration date,&lt;br /&gt; CCV# and ATM pin, and Email)&lt;/div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5444227188871962386&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 245px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD7RXry4WnlO5hzLFKIg-e7u1u-66wXlHjj1RZiS2s1tv0GbJ-JcsSAy2PKgTx8yQtB4HvyU1arXa-NfXCZUUtCVCvbVuHlj3Z3nNdHVkkzQT8uYqBpMlL6BwRa4teGtURJJY7R0W-rJ4/s400/blog5.JPG&quot; border=&quot;0&quot; /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;(Chances are they have an account with&lt;br /&gt;Wachovia as this is a generic window shown after first account setup)&lt;/div&gt;&lt;br /&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5444227264224610450&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 259px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnXiqnCxoyOVpJAU4RkRMcEkhje2Z_JoB1f9JUgIGHkV88bp05-EZk20RNzxNGscCqa3dW3lEQcpdhLAZZvvx5lD4BtF7CilMNpREOAWFSU51VBNTCSKmX1Nf9FZcoIxn1jR8vqlTIVi4/s400/blog6.JPG&quot; border=&quot;0&quot; /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;(Final step redirects to official Wachovia site)&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5444208256406976018&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 231px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOP-XQW2kKZlHG4yKVqeOkRo1GHuXONmWWFv7FSYk-mnSbPvypBlCb7AuSu4d2wNShM7w2Hj5ZhFELtILpw27Mza0h1QJzHC6uhRMdoph-HdSdx8nQoy3xXnP7lk4d8i0lcfthsRsL6n8/s400/blog3.JPG&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;(Shows Top Level Domain,&lt;br /&gt;SA.com seems to be a custom google search)&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Here is a transcript of the complete Wachovia March 1st Scam Email: &lt;/div&gt;&lt;br /&gt;&lt;div&gt;---------------------------------------------------&lt;/div&gt;Mon, 1 Mar 2010 16:06:57 -0500&lt;br /&gt;Received: from uncc.edu ([152.15.xx.xx]) by exfe06.its.uncc.edu with Microsoft SMTPSVC(6.0.3790.3959);&lt;br /&gt;Mon, 1 Mar 2010 16:06:57 -0500&lt;br /&gt;Received: from User (copland.udel.edu [128.175.13.92])&lt;br /&gt;by md4.nss.udel.edu (MOS 3.10.2-GA)&lt;br /&gt;with SMTP id IOY25036;&lt;br /&gt;Mon, 1 Mar 2010 16:02:38 -0500 (EST)&lt;br /&gt;Message-Id: &lt;201003012102.ioy25036@udel.edu&gt;&lt;br /&gt;Reply-To: &lt;wachoviamcalerts.wachovia@udel.edu&gt;&lt;br /&gt;From: &quot;Wachovia Message Center&quot;&lt;wachoviamcalerts.wachovia@udel.edu&gt;&lt;br /&gt;Subject: An important Secure Message!&lt;br /&gt;Date: Mon, 1 Mar 2010 16:01:53 -0500&lt;br /&gt;MIME-Version: 1.0&lt;br /&gt;Content-Type: text/plain;&lt;br /&gt;charset=&quot;Windows-1251&quot;&lt;br /&gt;Content-Transfer-Encoding: 7bit&lt;br /&gt;X-Priority: 1&lt;br /&gt;X-MSMail-Priority: High&lt;br /&gt;X-Mailer: Microsoft Outlook Express 6.00.2600.0000&lt;br /&gt;X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000&lt;br /&gt;X-esp: ESP&lt;2&gt;=&lt;br /&gt;SHA:&lt;6&gt;&lt;br /&gt;SHA_FLAGS:&lt;400&gt;&lt;br /&gt;UHA:&lt;0&gt;&lt;br /&gt;ISC:&lt;0&gt;&lt;br /&gt;BAYES:&lt;-1&gt;&lt;br /&gt;SenderID:&lt;0&gt;&lt;br /&gt;DKIM:&lt;0&gt;&lt;br /&gt;TS:&lt;-3&gt;&lt;br /&gt;SIG:&lt;dnmkkrn1aadrwnetw0ribrvyifbryfapldugcwk4tjb5bfl5zujlllnaaaaa&gt;&lt;br /&gt;DSC:&lt;0&gt;&lt;br /&gt;TRU_marketing_spam: &lt;0&gt;&lt;br /&gt;TRU_spam2: &lt;0&gt;&lt;br /&gt;TRU_money_spam: &lt;0&gt;&lt;br /&gt;TRU_scam_spam: &lt;0&gt;&lt;br /&gt;TRU_stock_spam: &lt;0&gt;&lt;br /&gt;TRU_adult_spam: &lt;0&gt;&lt;br /&gt;TRU_embedded_image_spam: &lt;0&gt;&lt;br /&gt;TRU_ru_spamsubj: &lt;0&gt;&lt;br /&gt;TRU_medical_spam: &lt;0&gt;&lt;br /&gt;TRU_urllinks: &lt;0&gt;&lt;br /&gt;TRU_misc_spam: &lt;0&gt;&lt;br /&gt;TRU_watch_spam: &lt;0&gt;&lt;br /&gt;TRU_legal_spam: &lt;0&gt;&lt;br /&gt;URL Real-Time Signatures: &lt;0&gt;&lt;br /&gt;TRU_lotto_spam: &lt;0&gt;&lt;br /&gt;TRU_phish_spam: &lt;0&gt;&lt;br /&gt;TRU_playsites: &lt;0&gt;&lt;br /&gt;TRU_spam1: &lt;0&gt;&lt;br /&gt;TRU_html_image_spam: &lt;0&gt;&lt;br /&gt;TRU_profanity_spam: &lt;0&gt;&lt;br /&gt;TRU_freehosting: &lt;0&gt;&lt;br /&gt;Bcc:&lt;br /&gt;Return-Path: wachoviamcalerts.wachovia@udel.edu&lt;br /&gt;X-OriginalArrivalTime: 01 Mar 2010 21:06:57.0435 (UTC) FILETIME=[20B94EB0:01CAB983]&lt;br /&gt;This is a courtesy reminder that your Online Account needs to be verified:&lt;br /&gt;In order to receive uninterrupted services, please verify your information immediately.&lt;br /&gt;To verify your account, please click the link below, log in and follow the provided&lt;br /&gt;steps:&lt;br /&gt;&lt;span style=&quot;color:#ff9900;&quot;&gt;hxxp://onlineservices5.wachovia.&lt;span style=&quot;color:#ff0000;&quot;&gt;&lt;strong&gt;sa&lt;/strong&gt;&lt;/span&gt;.com/auth/AuthService.htm&lt;/span&gt;&lt;br /&gt;Regards, Wachovia.&lt;br /&gt;Please do not &quot;Reply&quot; to this message.&lt;br /&gt;Contact Us&lt;br /&gt;(800) 950-2296, 24 hours a day, seven days a week.&lt;br /&gt;(c)2007 Wachovia Corporation, 301 South College Street, Suite 4000, One Wachovia Center, Charlotte, NC 28288-0013. All Rights Reserved.&lt;br /&gt;Wachovia Bank, N.A. Member FDIC.&lt;br /&gt;--------------------------------------------------------------------&lt;br /&gt;&lt;blockquote&gt;&lt;/blockquote&gt;&lt;/dnmkkrn1aadrwnetw0ribrvyifbryfapldugcwk4tjb5bfl5zujlllnaaaaa&gt;&lt;/wachoviamcalerts.wachovia@udel.edu&gt;&lt;/wachoviamcalerts.wachovia@udel.edu&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2010/03/uncc-korean-wachovia-spam-analysis.html</link><author>noreply@blogger.com (AEL)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3Vuc80p2RPdiCg1BVAlmWzluMK8koO5_PpyREquPc9Mb6oorGO0IKnKBEOYRNQ0zEuxBNFbgEmk76qCax02CblsNb1GrKR8o9AjJVllglInrgHdrRrgTogqiYh74SJzS5B7Y3j_Yn3cY/s72-c/blog2.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-8641806453141696095</guid><pubDate>Sat, 06 Feb 2010 02:22:00 +0000</pubDate><atom:updated>2010-02-27T18:29:25.722-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">android</category><category domain="http://www.blogger.com/atom/ns#">bypass</category><category domain="http://www.blogger.com/atom/ns#">lock</category><category domain="http://www.blogger.com/atom/ns#">pattern</category><title>Android Security lockbypass</title><description>&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;b&gt;Intro:&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div&gt;At the risk of letting every user into my Sprint HTC Hero Android version 1.5 phone I am going to publish the steps that allow a user to get past the lock screen that is deployed with the phone.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;This is not a full fledged hack, but it is more a temporary way to gain&lt;/div&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn2D5r8mxLTKa6LK3qaWtWR2JxtPrmc7iJKL5QR_SZKXn0LscDXVK3paxhBejumIpFBnfY7d_HAk7wScbcLSJTB726SDjWtox9APL7ycMzG22SIezeyOqoRNfPrTTecGtVfWxlAHPOS08/s200/IMGP2896.JPG&quot; style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 150px; height: 200px;&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5435897562048186002&quot; /&gt;&lt;div&gt;acc&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;ess to the device, get the information you need and then leave it with no trace.&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;When you lock the Android you will notice th&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;at you can&#39;t access &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;the notifications and the only thing that you can do is make emergency calls &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;or enter a passcode pattern. This tutorial will show you how to enter the phone through those basic notifications just by calling the phone.&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Walk though:&lt;/b&gt;&lt;/div&gt;&lt;div&gt;First you will need the phone and the ability to text, call and/or Email the person with the android device. You would have to use whatever means needed (endings of Emails, websites, phone books etc) to find out their cell phone number.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The goal is to get a &quot;missed call&quot; or &quot;new text&quot; icon to appear on the top status bar, this will serve as your entry point into the back end of the phone. &lt;/div&gt;&lt;div&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQQ68Z9jQ9GE7K9SsgMfvC4xDsNqVbiLwm7BiA2qWuNm72z9BRbL4-eXSGYpqOsmKV3spUsyYLwx6Or7NavJWFmSlt0cP7sZftSZVySPz85EYDSIiaxoRmQE2XBlA974u2sS53SgcKiPs/s200/IMGP2901b.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5435121012540552466&quot; style=&quot;cursor: pointer; width: 150px; height: 200px; &quot; /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF6600;&quot;&gt;Step 1 - Place a Missed call or Text on the Android&lt;/span&gt;&lt;/div&gt;&lt;div&gt;With the phone locked, call the phone from another number. Do not answer the call, you want the missed call to show up in the status bar at the top. I would recommend that you use *67 before calling the phone number to conceal the source but once you have access you can easily d&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;elete the record anyway.&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;Note: &lt;/span&gt;Know that sprint logs all calls to their devices, as do many other carriers. Using a VOIP phone or google voice could work well to preserve the anonymous connection.  Alternatively you could send a SMS message, Email, or other notification that you know will show up on the phone.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEkrAe7-K30HNoG2u6hm0HaQluv3T3BRsYOgq_2jfBiaWqBim9eXRQ143EmiP6Cex_gSFN9ZU3GqWEPKjEJneOspN7fjsEHdtWtyyZejrLkAh-MdNXKK95kPWVbEorRlNnFqR9jfKT4xk/s200/SlidedownJPGb.jpg&quot; style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 150px; height: 200px;&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5435899942917842690&quot; /&gt;&lt;div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF6600;&quot;&gt;Step 2 - Place call and access phone&lt;/span&gt;&lt;br /&gt;After leaving a missed call on the phone, call the Android again. T&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;his time answering the call on the Android device, leaving both phones on the hook to keep a open connection going. &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;Next, while the call is in progress, slide the notifications bar down. This time it will work, unlike when the phone was locked.&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjgGbfD7jeYZOgbDE8xQyUg18FCN3KchsHCrFFAAO9110ucFFw1uuZbhCBG-fq-ycYj7LNAev6d4xYgSr_w57n506I7sLcEqp8fvsryHyGGp3Gbebu7Qc993cK5EM8pE8LopWJD2VGm60/s200/AccesstocallListb.jpg&quot; style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 150px; height: 200px;&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5435901838181979346&quot; /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Pressing the missed call notification will allow you access to all past phone calls (left).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF6600;&quot;&gt;Step 3 - Begin traversing through phone&lt;/span&gt;&lt;/div&gt;&lt;div&gt;From the call history screen (right) you can see that there are buttons to access the list of contacts on the android.By using these buttons I was able to do the following: &lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;Viewed most contact&#39;s current Facebook activity&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;Send and view recent texts &lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;Make new calls and view all call history&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;div style=&quot;display: inline !important; &quot;&gt;Open browser and access sites with &quot;remember me&quot; checked, triggered by opening text containing a URL&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;Limitations to this hack would include the following terms and conditions (Which you may agree to by checking the radio box included below).&lt;br /&gt;&lt;br /&gt;&lt;input type=&quot;radio&quot; name=&quot;jokeText&quot; value=&quot;This button is simply to make sure you&#39;re paying attention&quot;&gt; Agree &lt;input type=&quot;radio&quot; name=&quot;jokeText&quot; value=&quot;There is nothing special about it, I assure you... Thanks! AnEliteLeader[at]gmail.com&quot;&gt; Disagree &lt;/div&gt;&lt;ul&gt;&lt;li&gt;You need access to the phone physically (physical hack)&lt;/li&gt;&lt;li&gt;You need to know the person&#39;s phone number (social hacking)&lt;/li&gt;&lt;li&gt;Hitting home button will cause you to leave the screen and require you to execute steps 1 -3 to get back in. &lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjmHM8U86hB3JW881R8n4P6XayaKWvq8Gbfim6qrukLntP5YPKsZ_UbKRhqwzwK7eXbA8D7DPeuRNHg8tUAiEm4DUmAfEss2rudQOEBXjm7Kg-it1seoknXtbqHxWn9TsD-Xww9Q6Jpl0/s200/makeOutboundCallsb.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5435121020576041922&quot; style=&quot;cursor: pointer; width: 200px; height: 150px; &quot; /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Conclusion:&lt;/b&gt;&lt;/div&gt;&lt;div&gt;In order to prevent someone from gaining access to the information on your phone, keep it on you at all times or to use a third party app such as &lt;a href=&quot;https://www.wavesecure.com/&quot;&gt;Wavesecure&lt;/a&gt; or &lt;a href=&quot;https://www.mobiledefense.com/&quot;&gt;Mobile Defense &lt;/a&gt;(both found in the android market). Wavesecure lets you lock, delete, backup and locate your phone through their website, while Mobile Defense allows you to view multiple device&#39;s locations and stats all on one website. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;&lt;form&gt;&lt;br /&gt;&lt;br /&gt;&lt;/form&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2010/02/android-security-lockbypass.html</link><author>noreply@blogger.com (AEL)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn2D5r8mxLTKa6LK3qaWtWR2JxtPrmc7iJKL5QR_SZKXn0LscDXVK3paxhBejumIpFBnfY7d_HAk7wScbcLSJTB726SDjWtox9APL7ycMzG22SIezeyOqoRNfPrTTecGtVfWxlAHPOS08/s72-c/IMGP2896.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-8580771430077069926</guid><pubDate>Tue, 26 May 2009 21:55:00 +0000</pubDate><atom:updated>2009-05-26T19:06:14.331-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cmd</category><category domain="http://www.blogger.com/atom/ns#">command prompt</category><category domain="http://www.blogger.com/atom/ns#">deep freeze</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">hard drive</category><category domain="http://www.blogger.com/atom/ns#">network</category><category domain="http://www.blogger.com/atom/ns#">school</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">thaw</category><title>Command the burn of Deep Freeze</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJUU4gpbs6pM6tkV8AEBvDFxHb6F_5aT0TEgrWjn1zHMo75EQyOcchgJiqN5TuvbQCPl3fS_A2Fpv2ngNNc8oRDoxdyPVey-WqhzNgZVHPHY8kaG2y_j0W8RLXtMGdY8ePW2zi_EvJoO0/s1600-h/deep-freeze-panel.gif&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 148px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJUU4gpbs6pM6tkV8AEBvDFxHb6F_5aT0TEgrWjn1zHMo75EQyOcchgJiqN5TuvbQCPl3fS_A2Fpv2ngNNc8oRDoxdyPVey-WqhzNgZVHPHY8kaG2y_j0W8RLXtMGdY8ePW2zi_EvJoO0/s320/deep-freeze-panel.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5340257301260618898&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;A few months ago I was working for on a clients network who had a third party come in and setup their network. Unfortunately, many of the PCs were setup with deep freeze. Now for those of you that don&#39;t know, deep freeze is this amazing program that allows administrators to lock the hard drive so that users can install software,&lt;br /&gt;download files, etc and then as soon as you reboot the system is back to defaults.&lt;br /&gt;(image Source: http://blog.eches.net/wp-content/uploads/2007/10/deep-freeze-panel.gif)&lt;br /&gt;&lt;br /&gt;When you want to change the settings you have to use a keyboard shortcut, Ctl+Alt+Shift+F6 in order to get to a login screen. Then once you type the password, you can &quot;Thaw&quot; the system. Each Thaw/ Freezed session is determined on how the system was told to boot. The screen gives options to Thaw it once and then once you have rebooted, re-Thaw system on reboot -- without logging back into the Deep freeze control panel.&lt;br /&gt;&lt;br /&gt;You can figure out if a system is running deep freeze by looking for the following icon in the systray:&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCH3bnJ3oSZiKAMA1vj19EbkEAYtpDLrfJ7CP0Lr2e38vtti7EvEXH46-Syhg2GZghYP1LIn40j3izBG72MYRh8edN-iAArT2aD8QSyJqYS1LfSE_4kKDyrbYzM6RvimAi81MSjMWbEiA/s1600-h/DeepFreeze.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 72px; height: 69px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCH3bnJ3oSZiKAMA1vj19EbkEAYtpDLrfJ7CP0Lr2e38vtti7EvEXH46-Syhg2GZghYP1LIn40j3izBG72MYRh8edN-iAArT2aD8QSyJqYS1LfSE_4kKDyrbYzM6RvimAi81MSjMWbEiA/s200/DeepFreeze.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5340272716974919442&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;(polar bear, symbal of deep freeze)&lt;br /&gt;&lt;br /&gt;However, this didn&#39;t work so well for me as I was wanting to install the newest version of office and setup the desktop icons with some new shortcuts, because, you guessed it, they had forgotten the password... So I was left with no way to get the computer changed or was I?&lt;br /&gt;&lt;br /&gt;It turns out that Windows 2000, XP (and Vista too I am pretty sure,) have this save mode setting called safemode Command Prompt. Which loads the system with only the minimal components and a command prompt, and this is what allowed me to get access to the system and make changes with out Deep Freeze stopping me.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiZM4esbDTc1f_V9yLpDmexamEK5dHBahSkQoaOKMNb8Jm3uLgEJqnjKXAl7zQKjncgOMNuCBP9gyCclljWEklEeu8F-DeyVyHUwCXsptpFE1l-ekGWY53p_cerg8h36II_3OBOdHcQDs/s1600-h/WinbootF8.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 206px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiZM4esbDTc1f_V9yLpDmexamEK5dHBahSkQoaOKMNb8Jm3uLgEJqnjKXAl7zQKjncgOMNuCBP9gyCclljWEklEeu8F-DeyVyHUwCXsptpFE1l-ekGWY53p_cerg8h36II_3OBOdHcQDs/s320/WinbootF8.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5340270182431790450&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;The how to:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;First reboot the computer&lt;/li&gt;&lt;li&gt;Press F8 at boot&lt;/li&gt;&lt;li&gt;Select &quot;Safe Mode&quot; with Command Prompt&lt;/li&gt;&lt;li&gt;Wait for the Desktop to load. It will load windows just as in normal, but it will have a cmd window open... some systems may be locked, so you might need to try default usernames such as username=Adminstartor, password=&quot;&quot;, or whatever admin user you can get access to.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;At the black window that shows C:\ type,&quot;explorer&quot;&lt;/li&gt;&lt;li&gt;This will start windows explorer which will allow you to do most system changes that are needed.&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;The only limitation of this hack is the fact that many programs will not install, however you can change (or delete Deep Freeze) permanently from the following folders and when you return to normal mode you will have complete control:&lt;br /&gt;&lt;br /&gt;c:\program files\hypert~1\deepfr~1&lt;br /&gt;c:\windows\system\iosubsys\persifrz.vxd&lt;br /&gt;(you can easily delete both of these from the command line or explorer)&lt;br /&gt;&lt;br /&gt;For more extensive information on deep freeze check out:&lt;br /&gt;Source: http://www.governmentsecurity.org/forum/index.php?showtopic=123&lt;br /&gt;(it is old but seems to still have relevancy)&lt;br /&gt;&lt;br /&gt;Just remember you could get in a lot of trouble for modify business or school network computer systems... and I won&#39;t be there to thaw you out ;-)&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2009/05/command-burn-of-deep-freeze.html</link><author>noreply@blogger.com (AEL)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJUU4gpbs6pM6tkV8AEBvDFxHb6F_5aT0TEgrWjn1zHMo75EQyOcchgJiqN5TuvbQCPl3fS_A2Fpv2ngNNc8oRDoxdyPVey-WqhzNgZVHPHY8kaG2y_j0W8RLXtMGdY8ePW2zi_EvJoO0/s72-c/deep-freeze-panel.gif" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-7612125154090231715</guid><pubDate>Wed, 08 Apr 2009 12:54:00 +0000</pubDate><atom:updated>2009-04-08T08:57:11.217-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">RussiaChina Hackers Power Grid</category><title>Hacked: US Power Grid.</title><description>So I thought it was something that could only happen on the movies. But it turns out that we don&#39;t have as good security as I thought.&lt;br /&gt;&lt;br /&gt;When me and my friend watched Live Free Die Hard 2 weekends ago we were both concluded that our Power grid isn&#39;t well connected enough to get a nation wide hack. However it looks like a firesail could be possible. According to the NY times Russian and Chinese Hackers have gotten in and placed backdoor software into computers that operate our powergrid. Right now the Government isn&#39;t releasing any detailed information and we don&#39;t know if this was government run attack or a independent.  See full story below:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;So%20I%20thought%20it%20was%20something%20that%20could%20only%20happen%20on%20the%20movies.%20But%20it%20turns%20out%20that%20we%20don%27t%20have%20as%20good%20security%20as%20I%20thought.%20%20When%20me%20and%20my%20friend%20watched%20Live%20Free%20Die%20Hard%202%20weekends%20ago%20we%20were%20both%20concluded%20that%20our%20Power%20grid%20isn%27t%20well%20connected%20enough%20to%20get%20a%20nation%20wide%20hack.%20However%20it%20looks%20like%20a%20firesail%20could%20be%20possible.%20According%20to%20the%20NY%20times%20Russian%20and%20Chinese%20Hackers%20have%20gotten%20in%20and%20placed%20backdoor%20software%20into%20computers%20that%20operate%20our%20powergrid.%20Right%20now%20the%20Government%20isn%27t%20releasing%20any%20detailed%20information%20and%20we%20don%27t%20know%20if%20this%20was%20government%20run%20attack%20or%20a%20independant.%20%20See%20full%20story%20below:%20%20%20%20http://www.nypost.com/seven/04082009/news/nationalnews/re_volt_ing_spies_hack_into_us_power_gri_163443.htm&quot;&gt;http://www.nypost.com/seven/04082009/news/nationalnews/re_volt_ing_spies_hack_into_us_power_gri_163443.htm&lt;br /&gt;&lt;/a&gt;  &lt;div class=&quot;flockcredit&quot; style=&quot;text-align: right; color: rgb(204, 204, 204); font-size: x-small;&quot;&gt;Blogged with the &lt;a href=&quot;http://www.flock.com/blogged-with-flock&quot; style=&quot;color: rgb(153, 153, 153); font-weight: bold;&quot; target=&quot;_new&quot; title=&quot;Flock Browser&quot;&gt;Flock Browser&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2009/04/hacked-us-power-grid.html</link><author>noreply@blogger.com (AEL)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-1962964581125531137</guid><pubDate>Sun, 11 Jan 2009 15:49:00 +0000</pubDate><atom:updated>2009-01-20T19:17:54.504-05:00</atom:updated><title>CES 2009 - TV&#39;s Lets compete: 3d, slimest, and maybe some Wireless to go.</title><description>At the show there seemed to be a competition between LG, Pansonic, and Samsung on who could create the largest exhibit with the most flashing gadgets.&lt;br /&gt;&lt;br /&gt;Keypoints of...&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Samsung:&lt;br /&gt;Name: Not set yet&lt;/div&gt;&lt;div&gt;Prototype size: 6.5 mm&lt;br /&gt;&lt;div&gt;Launce date: Unknown for thin, but 3d ready  plasma TVs ready by this spring&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Panasonic:&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Name: Prototype name z1&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Prototype size: 1/3 &quot;&lt;br /&gt;Launch date: 2010&lt;br /&gt;Special: &lt;/div&gt;&lt;div&gt;Wireless will hook up maybe to box which has feeds of hd cable&lt;br /&gt;Panasonic had 5 Movie theators sporting new 3D technology and also a showcase&lt;/div&gt;&lt;div&gt;off how home theators could easily migrate their systems to the new 3D standards. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;LG:&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;white-space: pre; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Name: Plasma TV 42PQ65C&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Launching: This spring&lt;/div&gt;&lt;div&gt;Special: &lt;/div&gt;&lt;div&gt;Showed of new Plasma and LCD TVs that save on energy. One of the reps I spoke to &lt;/div&gt;&lt;div&gt;told me they see consumers wanting to save on energy prices as well as get the same&lt;/div&gt;&lt;div&gt;features that they have seen in the past and expect in the future.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;embed type=&quot;application/x-shockwave-flash&quot; src=&quot;http://picasaweb.google.com/s/c/bin/slideshow.swf&quot; width=&quot;400&quot; height=&quot;267&quot; flashvars=&quot;host=picasaweb.google.com&amp;captions=1&amp;noautoplay=1&amp;RGB=0x000000&amp;feed=http%3A%2F%2Fpicasaweb.google.com%2Fdata%2Ffeed%2Fapi%2Fuser%2FAneliteleader%2Falbumid%2F5293281503782015089%3Fkind%3Dphoto%26alt%3Drss&quot; pluginspage=&quot;http://www.macromedia.com/go/getflashplayer&quot;&gt;&lt;/embed&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2009/01/ces-2009-tvs-lets-compete-3d-slimest.html</link><author>noreply@blogger.com (AEL)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-6545073915147651705</guid><pubDate>Sun, 11 Jan 2009 07:12:00 +0000</pubDate><atom:updated>2009-01-20T18:56:21.229-05:00</atom:updated><title>Federal Communications Commission Commissioner Talks on Technology Issues</title><description>Here is a video that was taken yesterday at the Panasonic Exhibit with the FCC Commissioner.&lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;425&quot; height=&quot;344&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/2Y8DljzPxrw&amp;amp;hl=en&amp;amp;fs=1&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/2Y8DljzPxrw&amp;amp;hl=en&amp;amp;fs=1&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;425&quot; height=&quot;344&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2009/01/federal-communications-commission.html</link><author>noreply@blogger.com (AEL)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-5564007888378275431</guid><pubDate>Sat, 10 Jan 2009 16:41:00 +0000</pubDate><atom:updated>2009-01-20T18:52:04.027-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CES 2009</category><category domain="http://www.blogger.com/atom/ns#">Technology</category><title>CES 2009 - Jan 9 - Instant on, more 3D and larger exibits</title><description>&lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 0);font-family:verdana;&quot;&gt;Intro&lt;/span&gt;&lt;br /&gt;The next official day of the show is a blast. I move over to the Convention center which exhibits the large TV players (Samsung, Panasonic, LG... which will be show in a future post) and Microsoft. Once again the focus was a lot of 3D, as well as some other very creative technologies.&lt;br /&gt;(see below for another slide on pictures from the show)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 0);&quot;&gt;Body&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The first technology that blew me was &lt;a href=&quot;http://farm4.static.flickr.com/3112/3184431965_61edef174e.jpg?v=0&quot;&gt;&lt;span style=&quot;color: rgb(51, 153, 153);&quot;&gt;Fulton&lt;/span&gt;&lt;/a&gt;. They have been working over the last 12 years and have successfully created a new type of convection system allows for wireless power. The first part consists of a coil with smart electronics that can go under a table or desk. The second part consists of a coil which goes in the devices to be charged. They use magnetic residence to get the energy to transfer which prevents wasted energy.&lt;br /&gt;&lt;br /&gt;This is a old technology but what makes it practice is that fact that it has smart electronics to control the amount of energy being transferred.  This prevents the problems of short outs that previously prevented this from being used. Now in theory it could go over 3 feet and could be put into an entire table top so you can imagine were they may take this technology.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The next technology that I found very interesting was phoenix technologies new instant on Laptop. They have used a custom version of Linux paired with a technology know as VT which they happened to be embeded in most PCs less than 2 years old. I have to say the guys at the exhibit were very open and easy to talk to... providing a lot of insight into their technologies. They also invited me to their private party at V bar in the Venetian were I talked to 2 of the engineers behind the technology. He said they had been working it for about 3 years and with the expansion of distributions such as Ubuntu as well as Yahoo, Mccafee and other companies developing tools for Linux it has allowed them to put this together so that really you can get online instantly while you wait for Vista or your other OS to come in in the background.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 102, 0);&quot;&gt;End Notes&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Later today or tomorrow I will be posting on TVs and the exhibits I see today. As well as more details on other exhibits.&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(255, 102, 102);&quot;&gt;Edit: Fixed some problems with the slide show not playing.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;embed type=&quot;application/x-shockwave-flash&quot; src=&quot;http://picasaweb.google.com/s/c/bin/slideshow.swf&quot; width=&quot;400&quot; height=&quot;267&quot; flashvars=&quot;host=picasaweb.google.com&amp;captions=1&amp;noautoplay=1&amp;RGB=0x000000&amp;feed=http%3A%2F%2Fpicasaweb.google.com%2Fdata%2Ffeed%2Fapi%2Fuser%2FAneliteleader%2Falbumid%2F5293523915132784817%3Fkind%3Dphoto%26alt%3Drss&quot; pluginspage=&quot;http://www.macromedia.com/go/getflashplayer&quot;&gt;&lt;/embed&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2009/01/ces-2009-jan-9-instant-on-more-3d-and.html</link><author>noreply@blogger.com (AEL)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-7118801732582375810</guid><pubDate>Fri, 09 Jan 2009 06:07:00 +0000</pubDate><atom:updated>2009-01-20T18:20:59.786-05:00</atom:updated><title>CES 2009 - Rising up in 3D</title><description>&lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 0);&quot;&gt;Intro:&lt;/span&gt;&lt;br /&gt;As many of you know most of my blog focuses on the area of security, but when I got the unique opportunity to go to CES 2009, I couldn&#39;t pass up the chance to do a little blogging about the show.&lt;br /&gt;&lt;br /&gt;The show, which is held in Las Vegas, Nevada, reports 130,000 visitors to their 2700 exhibits and many sessions. I also have been enjoying the hospitality of vendors such as Imagination and ViewSonic who allowed me to be present at their after show receptions.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(204, 102, 0);&quot;&gt;Body:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Last night I regret to have missed the first keynote address by Microsoft&#39;s new CEO Steve Ballmer. But this morning at 8:30AM I heard CEA CEO Gary Shapiro talk about the current state of Consumer Electronics. His predictions for 2009, estimate that it will be a &quot;flat year&quot; compared to the increase of about 6% in 2008. He was not shy in expressing how he feels that the Obama Administration will make great strides as America&#39;s first &quot;Digital President.&quot; He also stated that CEA will be lobbying for the greater good of Consumer electronics by seeing if new laws pass the following test:&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;     Does it create jobs?&lt;/li&gt;&lt;li&gt;     Does it spur new tech? &lt;/li&gt;&lt;li&gt;     Does it encourage the best and brightest to come to the US?&lt;/li&gt;&lt;li&gt;     Does it reward risk taking?&lt;/li&gt;&lt;li&gt;     Does it promote exports?&lt;/li&gt;&lt;li&gt;     Will it help deploy broadband?&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;I felt a lot of his speech focused on the fact of how government and Consumer Electronics need to help each other. However he stated that the members of the industry need to step up and be leaders in order to propel this economy forward.&lt;br /&gt;&lt;br /&gt;The next speaker in the Jan 9th Keynote address was Sony CEO and chairman, Sir Howard Stringer. Many of my &lt;a href=&quot;http://blogs.technet.com/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx&quot;&gt;previous hesitations about Sony &lt;/a&gt;were downgraded, by the many products they released. Such as some the new Sony HD Bravo TVs which allow direct uploads from Sony&#39;s new wireless enabled Sony CyberShot.&lt;br /&gt;&lt;br /&gt;Another interesting feature of the Sony Keynote presentation was announcements from Disney&#39;s Pixer who will be producing new 3D movies using Sony&#39;s Blue Ray technology and DreamWorks who announced all productions from this point will host 3D animation compatibility.&lt;br /&gt;&lt;br /&gt;I decided that it would be better for this first post to upload a slide show of the newest products that were at the show. One of the big things that seemed to come up more than once is the transition of TV to 3D. In his address during the keynote, chief creative officer John Lasster compared 3d coming to movies to the introduction of sound and color to tvs.&lt;br /&gt;&lt;br /&gt;Take a look at the following slideshow for what I captured on Jan 9 at CES.&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(255, 0, 0);&quot;&gt;Edit: Fixed Slideshow.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;embed type=&quot;application/x-shockwave-flash&quot; src=&quot;http://picasaweb.google.com/s/c/bin/slideshow.swf&quot; width=&quot;400&quot; height=&quot;267&quot; flashvars=&quot;host=picasaweb.google.com&amp;amp;captions=1&amp;amp;noautoplay=1&amp;amp;RGB=0x000000&amp;amp;feed=http%3A%2F%2Fpicasaweb.google.com%2Fdata%2Ffeed%2Fapi%2Fuser%2FAneliteleader%2Falbumid%2F5292257863723587969%3Fkind%3Dphoto%26alt%3Drss&quot; pluginspage=&quot;http://www.macromedia.com/go/getflashplayer&quot;&gt;&lt;/embed&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2009/01/ces-2009-rising-up-in-3d.html</link><author>noreply@blogger.com (AEL)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-8901872151211330769</guid><pubDate>Sun, 28 Dec 2008 05:55:00 +0000</pubDate><atom:updated>2008-12-28T01:06:43.652-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">chacha</category><category domain="http://www.blogger.com/atom/ns#">google</category><category domain="http://www.blogger.com/atom/ns#">phreaking</category><category domain="http://www.blogger.com/atom/ns#">SMS</category><category domain="http://www.blogger.com/atom/ns#">texting</category><category domain="http://www.blogger.com/atom/ns#">textmarks</category><title>SMSing tips, tricks, and more phreaky stuff</title><description>&lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 0);&quot;&gt;INTRO:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;OK so if you have unlimited texting you may find this useful...&lt;br /&gt;Services such as Google, ChaCha.com, textmarks.com, and others have made SMS services so that individuals can find useful information on the go. Or stay in touch with their own services.&lt;br /&gt;&lt;br /&gt;Some have begun calling SMS/cell phone texting the new terminal line. Back in the days before windows 95 and MS-DOS computers would log on to the internet using something called the telnet. Telnet was later upgraded to terminal to allow encryption. Basically think of it as a text editor that talks back to you using ACSII art. In most cases you would have to dial a number and be connected using a login and password.&lt;br /&gt;&lt;br /&gt;As you can imagine, hackers, which at the time were really phreakers (people that hack phone lines) began hacking the terminal lines. They dialed into lines  they shouldn&#39;t began building software to gain access ect. Telnet and terminal lines are still used today, however they are very insecure and normally are used over the Ethernet internet lines, not so much regular phone lines.&lt;br /&gt;&lt;br /&gt;One thing that should be noted that when using these SMS messaging services is that anything you text allows the server to see your phone number... also most services allow you to text help to find the list of commands you can use.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 0);&quot;&gt;Main:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 204, 204);&quot;&gt;***GOOGLE***&lt;/span&gt;&lt;br /&gt;TEXT NUM: 466453 (GOOGLE)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Search Feature.......Sample Query&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Local.................. sushi 94040&lt;br /&gt;Weather.............w boston&lt;br /&gt;Glossary............d zenith&lt;br /&gt;Sports **............score red sox&lt;br /&gt;Movies............movies 94110&lt;br /&gt;Stocks............stock tgt&lt;br /&gt;Zip Codes............zip code 72202&lt;br /&gt;Directions............directions pasadena ca to 94043&lt;br /&gt;Maps .................map 5th avenue new york&lt;br /&gt;Flights ***................flight aa 2111&lt;br /&gt;Area Codes...............area code 650&lt;br /&gt;Products..................price ipod player 40gb&lt;br /&gt;Q&amp;amp;A...................... abraham lincoln birthday&lt;br /&gt;Airlines ***............united airlines&lt;br /&gt;Translation............translate hello in french&lt;br /&gt;Web Snippets............web hubble telescope&lt;br /&gt;Calculator............. 1 us pint in liters&lt;br /&gt;Currency Conversion........ 8 usd in yen&lt;br /&gt;Airports ***............... sfo airport&lt;br /&gt;METAR**** ................. metar khio&lt;br /&gt;Help..................... help local&lt;br /&gt;&lt;br /&gt;Source: http://www.google.com/mobile&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 204, 204);&quot;&gt;*** GOOGLE Calendar ****&lt;/span&gt;&lt;br /&gt;NUM:  48368 (GVENT)&lt;br /&gt;&lt;br /&gt;This allows you to update your events on your google calendar right from your phone, note you need to sign up first&lt;br /&gt;&lt;ol&gt;&lt;li&gt;by going to calendar.google.com while logged in.&lt;/li&gt;&lt;li&gt;clicking settings&lt;/li&gt;&lt;li&gt;and then selecting mobile.&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;add event....&quot;Shopping with Sarah at Monterey Market 5pm Saturday,&quot;&lt;br /&gt;request your next scheduled event............................. next&lt;br /&gt;request all of your scheduled events for the present day...... day&lt;br /&gt;request your events scheduled for the following day........... nday&lt;br /&gt;&lt;br /&gt;Source: http://www.google.com/support/calendar/bin/answer.py?hl=en&amp;amp;answer=37228&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 204, 204);&quot;&gt;*** Facebook ***&lt;/span&gt;&lt;br /&gt;NUM 32665 (FBOOK)&lt;br /&gt;&lt;br /&gt;Many Social engeneering websites are stepping the ways users can access their information to help them compete facebook allows you to use your mobile phone to watch who send you a message on your wall, writes you a status comment,&lt;br /&gt;or messages you. You can customize the ammount of messages when you set it up by....&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;going to http://www.facebook.com/mobile/?ref=sb&lt;/li&gt;&lt;li&gt;putting in your phone number,&lt;/li&gt;&lt;li&gt;waiting for a text&lt;/li&gt;&lt;li&gt;putting that text in the box on facebook&lt;/li&gt;&lt;li&gt;customizing the events you wish to know about.&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;Next you can use the following commands to find out about your friends or change your status:&lt;br /&gt;just send a text to facebook to change your status&lt;br /&gt;to search for a friend....... srch &lt;friend&gt;&lt;br /&gt;info on a friend............. info &lt;friend&gt;&lt;br /&gt;help on commands............. help&lt;br /&gt;For both of these&lt;br /&gt;&lt;br /&gt;message a friend............. using search or info find the 32665XX number of your friend (each user on facebook has their own texting number)&lt;br /&gt;Then send a text to 32665XX, and the message will show up in their inbox the next time they log in.&lt;br /&gt;&lt;br /&gt;Also, when you get events such as status message comments or a wall post messaging back the number that shows up on your phone. (once again it will be&lt;br /&gt;some 32665XX number) will put your message on the corresponding comment or wall post.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 204, 204);&quot;&gt;***ChaCha***&lt;/span&gt;&lt;br /&gt;NUM: 242242 (CHACHA)&lt;br /&gt;&lt;br /&gt;This service works by you simply texting them a question and then in about 10 to 15 min a live human will search the web and return an answer.&lt;br /&gt;&lt;br /&gt;Source: http://www.ChaCha.com&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 204, 204);&quot;&gt;***Textmarks***&lt;/span&gt;&lt;br /&gt;NUM 41411&lt;br /&gt;&lt;br /&gt;This one has to be my favorite texting service, it literally has hundreds options of custom services to let you find what you need from the net. If you don&#39;t find what you want, you can always create a custom text service. I was really impressed by the speed of their servers too.&lt;br /&gt;&lt;br /&gt;Some of my favorite SMS&#39;s from this service are:&lt;br /&gt;Find the name and address of a landline&#39;s phone number.......PHLOOK&lt;br /&gt;return a fake name and phone number of a person........ FAKE&lt;br /&gt;Hide your phone number when texting.................... anon &lt;phone&gt; &lt;message&gt;&lt;br /&gt;Ping a server to see if it is up on your phone......... PING &lt;ipaddress&gt;&lt;br /&gt;&lt;br /&gt;Source: http://www.textmarks.com&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 0);&quot;&gt;End notes:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;These are only a few of the services out there that provide texting feedback. I know Myspace can do the same as Facebook and that their are other services that allow you to interact more. One neat tool that I played around for a while was the instant messaging program trillian, it allows you to specify words in IM and perform acts on a PC from those words. At one time as a proof of concept I used the command cmd /c batchfile.bat to run a the code &quot;shutdown.exe&quot; which shutdown the computer any time I IMed via my phone.(textmarks would allow you to do this without having IM on your phone). It expanded to the point were I would lock, shutdown or reboot any PC on the targeted network.&lt;br /&gt;&lt;br /&gt;So here is the deal, as you can probably see I only have so much time to post anymore if you think the above method to control your home network would be  something interesting you want to know how to do. Leave a comment and I will  see what I can do :-). Or if you have a useful SMS service you know about you an post that too. (Linkbacks welcome)&lt;/ipaddress&gt;&lt;/message&gt;&lt;/phone&gt;&lt;/friend&gt;&lt;/friend&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2008/12/smsing-tips-tricks-and-more-phreaky.html</link><author>noreply@blogger.com (AEL)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-4841788785579949952</guid><pubDate>Tue, 23 Sep 2008 17:54:00 +0000</pubDate><atom:updated>2008-09-23T15:03:31.587-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">chess</category><category domain="http://www.blogger.com/atom/ns#">ctunnel</category><category domain="http://www.blogger.com/atom/ns#">David Kernell</category><category domain="http://www.blogger.com/atom/ns#">email yahoo</category><category domain="http://www.blogger.com/atom/ns#">Mccain</category><category domain="http://www.blogger.com/atom/ns#">Padlin</category><category domain="http://www.blogger.com/atom/ns#">Rubico</category><category domain="http://www.blogger.com/atom/ns#">security questions</category><title>Itis a shame I don&#39;t have more time to write....? The &quot;Questions&quot; that lead to hacker attacks.</title><description>I haven&#39;t had much time to write on here due to the fact of now being in school and not having a much time to devote to watching and reporting on the newest security trends.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Intro:&lt;/span&gt;&lt;br /&gt;But I thought I would just add a link to this interesting current event that I saw today. The U.S. Vice President running for office,&lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt; Sarah Palin, got her Email address hacked&lt;/span&gt; and the contents posted here: &lt;a href=&quot;http://wikileaks.org/wiki/Sarah_Palin_Yahoo_account_2008&quot;&gt;http://wikileaks.org/wiki/Sarah_Palin_Yahoo_account_2008&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;The Who:&lt;/span&gt;&lt;br /&gt;The person that did it was named Anonymous, but later was found to &lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt;be the hacker, &lt;/span&gt;&lt;a style=&quot;color: rgb(255, 153, 0);&quot; set=&quot;yes&quot; linkindex=&quot;48&quot; href=&quot;http://www.theage.com.au/news/technology/security/how-i-hacked-sarah-palins-email-account/2008/09/19/1221331144691.html&quot;&gt;Rubico,&lt;/a&gt;  according to Dancho Danchev in his blog: &lt;a set=&quot;yes&quot; linkindex=&quot;48&quot; href=&quot;http://www.theage.com.au/news/technology/security/how-i-hacked-sarah-palins-email-account/2008/09/19/1221331144691.html&quot;&gt;http://blogs.zdnet.com/security/?p=1939&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;He claimed to have used &lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt;simple guessing from Wikipedia and &lt;/span&gt;&lt;a style=&quot;color: rgb(255, 153, 0);&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEZY1CLBtKLtd69EEz4Cb0y2c_WU84KWZXuaqrdLJ-GnBpLPsHn8DQ6byWTZy7oogR4mYVjmbFUrqafdO7cH6kl9IszQSvIoIcuAAhLJRPosTwyxkFzQqM-CEo1mHsrbxZ1y2uIoln-AI/s1600-h/david2.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEZY1CLBtKLtd69EEz4Cb0y2c_WU84KWZXuaqrdLJ-GnBpLPsHn8DQ6byWTZy7oogR4mYVjmbFUrqafdO7cH6kl9IszQSvIoIcuAAhLJRPosTwyxkFzQqM-CEo1mHsrbxZ1y2uIoln-AI/s320/david2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5249284900000859762&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt;Google content&lt;/span&gt; to guess Yahoo&#39;s security questions of &quot;What is your Zip code?&quot; and &quot;Where did you meet your spouse?&quot;&lt;br /&gt;&lt;br /&gt;Bubico tried to keep himself anonymous by using a proxy server website that hides his ip address named .  However in his hast to tell the world about his discovery he &lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt;left the hash in screenshot&lt;/span&gt;... &lt;a set=&quot;yes&quot; linkindex=&quot;108&quot; href=&quot;http://ctunnel.com/index.php/1010110A/58a5cd1e8ab47088982c83282fd768456ebe14f44221026&quot;&gt;http://ctunnel.com/index.php/1010110A58a5cd1e8ab470889 82c83282fd768456ebe14f44221026&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;It is uncertain whether the &lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt;FBI reconstructed his IP address from that or from the posts he left on other blogs and bulletin boards&lt;/span&gt; such as 4chan.com . Needless to say they have a suspect: David Kernell, son of Tennessee representative Mike Kernell (check out &lt;a href=&quot;http://www.mtv.com/news/articles/1595343/20080922/story.jhtml&quot;&gt;http://www.wbir.com/news/local/story.aspx?storyid=64033&amp;amp;provider=top&lt;/a&gt; video in top right shows witness accounts)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Conclusion&lt;/span&gt;:&lt;br /&gt;What we should take away from this is the fact that if we use a 45 character &lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt;password&lt;/span&gt; with all the symbols, numbers and letters, it &lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt;is worthless if we use common security questions that someone can guessed off our myspace or facebook pages&lt;/span&gt;...&lt;br /&gt;&lt;br /&gt;One thing I recomend, and I practice, is to &lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt;use a fake answer&lt;/span&gt; that only you know, and keep that in your wallet or some other safe, none electronic location.&lt;br /&gt;&lt;br /&gt;Danchev states that currently Gmail allows you to customize your question which may prevent it from being so easy to guess, unlike Yahoo, Hotmail and others which use standard questions.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;For more detailed information check out:&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://blog.chess.com/billwall/a-chess-playing-hacker&quot;&gt;http://blog.chess.com/billwall/a-chess-playing-hacker&lt;/a&gt;&lt;br /&gt;(apparently David was a regular on the site, and they made a very detailed post describing all that has happened, including the suspected prison sentence)&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2008/09/itis-not-shame-i-dont-have-more-time-to.html</link><author>noreply@blogger.com (AEL)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEZY1CLBtKLtd69EEz4Cb0y2c_WU84KWZXuaqrdLJ-GnBpLPsHn8DQ6byWTZy7oogR4mYVjmbFUrqafdO7cH6kl9IszQSvIoIcuAAhLJRPosTwyxkFzQqM-CEo1mHsrbxZ1y2uIoln-AI/s72-c/david2.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-3710179405559898371</guid><pubDate>Mon, 19 Nov 2007 19:26:00 +0000</pubDate><atom:updated>2017-04-20T12:03:33.301-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">USB keydisk thumb drive virus autorun.inf sandisk U3 auto start notepad.exe Firefox</category><title>Danger! That USB Thumbdrive Keydisk thingy has a Virus.</title><description>&lt;span style=&quot;font-weight: bold;&quot;&gt;Intro:&lt;/span&gt;&lt;br /&gt;
You may be able to remember a time when a floppy disk, those 1.44mb of storage, was your only way to get that masterpiece from work or school to home at night. A floppy disk could start a computer and make it go into MS-DOS, but not activate programs just from a simple insertion. Today Keydisks(also called Thumb Drives, and USB disks) are replacing floppies faster than companies can make them. Prices for a 1GB Keydisk can be as low as $20 and I have heard of organizations purchasing them by the bucket load -- literally.&lt;br /&gt;
&lt;br /&gt;
The only problem with Keydisks is the fact that when inserted, they become a new Harddrive on the system, some, like &lt;a href=&quot;http://www.u3.com/&quot;&gt;U3&lt;/a&gt;  even create CD-Rom drive with a password protected start menu for portable access. This could allow someone to insert a Keydisk into a system, Autorun an invisible, no window launching virus, while they seem to type up that 30 page history report on why man didn&#39;t go to the moon and back... the reason I am writing this is because a while back some hackers in Australia left keydisks in public places containing viruses that would be activated as soon as they keydisk was inserted.&lt;br /&gt;
&lt;br /&gt;
This &lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;tutorial will show you how to create a keydisk that has the ability to run a hidden program with just simply inserting it&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
NEEDED:&lt;br /&gt;
- A U3 keydisk&lt;br /&gt;
- Internet connection&lt;br /&gt;
- works on all Win 98, Win 2000, XP, and Vista Machines.&lt;br /&gt;
&lt;br /&gt;
HOW TO:&lt;br /&gt;
&lt;br /&gt;
After briefly searching the Internet, I can find no program that compares to Sandisk&#39;s U3 software. It seems to work every time, no matter what the restrictions are on the PC. (Even limited users allow it to install with no problems)&lt;br /&gt;
So...&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Setting up the U3 loader on the Keydisk:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
If your key disk doesn&#39;t have the U3 loader installed, download the installer:                                 &lt;a href=&quot;http://www.sandisk.com/Retail/Default.aspx?CatID=1411&quot;&gt;http://www.sandisk.com/Retail/Default.aspx?CatID=1411&lt;/a&gt;&lt;br /&gt;
Run it, following the simple instructions.&lt;br /&gt;
&lt;br /&gt;
Unfortunately there are only certain keydisks that work with the U3 software.&lt;br /&gt;
There is a small chip inside the U3 disks that allow it to trick the computer into thinking there     is CD drive on the disk, this allows it to run the U3 start menu, which in turn can have a                 program auto started as soon as it is loaded up. The CD really is just an ISO file hidden on the disk. So when you download the  installer it may         say your disk is not compatible... which would be a bummer since this really is a neat hack.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Putting the Auto start to work:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Now the U3 firmware comes with some sample programs, the ability to lock the disk, and a bunch of other fancy stuff. You can access the &quot;start button&quot; for U3 by clicking the orange icon that appears by the clock.&lt;br /&gt;
&lt;br /&gt;
U3 allows user to make their own software packages by following instructions and package here &lt;a href=&quot;http://www.u3.com/developers/default.aspx&quot;&gt;http://www.u3.com/developers/downloads/reference.aspx&lt;/a&gt;&lt;br /&gt;
but for the simplicity of this tutorial I am going to show you how to &lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;replace Firefox with any program you like and set it to automatically start when the d&lt;/span&gt;&lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;isk is inserted.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Select the &quot;&lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;Explore Keydisk&lt;/span&gt;&quot; from the menu (top right)&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;In the explorer window that comes up, press Ctl + F (or View--&amp;gt; Search)&lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt; and tell it to find the file &quot;FirefoxForU3Start.exe&quot;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDJZ1jxZD7qkZ3rJlg5pJSwCeKCS-SN_aO9KD1lMUWYVN6DBNo6IJR4ZYvdcEOtW5xpwX9nRl0KicoNHfwvoA9xz1SFOHENmfXxjgWQE0g14bFnA0AOpZ8sI2rfQmokM01S_fQeYaWPuw/s1600-h/ael_blog_OpenContain.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5134425459412578242&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDJZ1jxZD7qkZ3rJlg5pJSwCeKCS-SN_aO9KD1lMUWYVN6DBNo6IJR4ZYvdcEOtW5xpwX9nRl0KicoNHfwvoA9xz1SFOHENmfXxjgWQE0g14bFnA0AOpZ8sI2rfQmokM01S_fQeYaWPuw/s320/ael_blog_OpenContain.JPG&quot; style=&quot;cursor: pointer; display: block; margin: 0px auto 10px; text-align: center;&quot; /&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Once you get the results, right click &quot;FirefoxForU3Start.exe&quot;and select &quot;Open Containing Folder.&quot;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;Rename &quot;FirefoxForU3Start.exe&quot;&lt;/span&gt; to something such as: &quot;(BK)FirefoxForU3Start.exe&quot;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Now take &lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;another exe file and copy it into the same folder&lt;/span&gt; as &quot;FirefoxForU3Start.exe&quot;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCVOo_plfkf03-Ui9H0CQUneYDWTKVm8CQ_kvCxHZPypr_4rn7qstIeCqrJ2DYa-PMQw3GlGpAM_GuSXqVOJkj90btJRWeT-RFOc2-j7TTD16UZnCiTB-hFk5n4pA7VLyRIR5yVzDEAwo/s1600-h/ael_blog_moveNotepad.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5134424329836179378&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCVOo_plfkf03-Ui9H0CQUneYDWTKVm8CQ_kvCxHZPypr_4rn7qstIeCqrJ2DYa-PMQw3GlGpAM_GuSXqVOJkj90btJRWeT-RFOc2-j7TTD16UZnCiTB-hFk5n4pA7VLyRIR5yVzDEAwo/s320/ael_blog_moveNotepad.JPG&quot; style=&quot;cursor: pointer; float: right; margin: 0pt 0pt 10px 10px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204 , 0 , 0);&quot;&gt;(NOTE: If you can&#39;t see the .exe&lt;/span&gt;&lt;span style=&quot;color: rgb(204 , 0 , 0);&quot;&gt; extention&lt;/span&gt;&lt;span style=&quot;color: rgb(204 , 0 , 0);&quot;&gt; then&lt;/span&gt;&lt;span style=&quot;color: rgb(204 , 0 , 0);&quot;&gt;, in explorer, click tools--&amp;gt; folder options, The &quot;View&quot; tab, and uncheck &quot;Hide extensions for known file types&quot;... this also helps you see viruses that disguise themselves as .PDF, .JPG files since now you can see the full ending of the file)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you don&#39;t have your own &quot;exe&quot; virus just use notepad.exe&lt;br /&gt;Click Start--&amp;gt; Run and then type:&lt;br /&gt;%systemroot%\system32&lt;br /&gt;(System root is a neat way of opening the folder windows lives in)&lt;br /&gt;scroll till you &lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;find &quot;notepad.exe&quot; and copy it to your keydisk.&lt;/span&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Now &lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;rename &quot;notepad.exe&quot; to &quot;FirefoxForU3Start.exe&quot;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Click the &lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;U3 icon and sel&lt;/span&gt;&lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;ect &quot;Manage U3 Programs.&quot;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbAO8m3LW7IgVSo1sQmf0GdmKhn4cMHLGZA_IWvWWV1SLrm-Xn9ge9q-K1-34sLwMD0_IKliGkO2jcApG_o88U97Kyy1ScYqAUfldJmoMLCf7xONoamRUQuRNsf8qb0GeWVDYcwch2CmU/s1600-h/ael_blog_u3StartMenu.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5134430445869608914&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbAO8m3LW7IgVSo1sQmf0GdmKhn4cMHLGZA_IWvWWV1SLrm-Xn9ge9q-K1-34sLwMD0_IKliGkO2jcApG_o88U97Kyy1ScYqAUfldJmoMLCf7xONoamRUQuRNsf8qb0GeWVDYcwch2CmU/s320/ael_blog_u3StartMenu.JPG&quot; style=&quot;cursor: pointer; float: left; height: 137px; margin: 0pt 10px 10px 0pt; width: 300px;&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;Click Mozilla Firefox&lt;/span&gt; and select the box that says &lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;&quot;Start on Insertion&quot;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Select OK and eject the Key disk, Now every time it is inserted &quot;Notepad.exe&quot; (which was renamed to FirefoxForU3Start.exe) will start...&lt;br /&gt;&lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;REMEMBER: Any exe file will work for this, &lt;/span&gt;&lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;most hackers will create a program that would set a&lt;span style=&quot;color: rgb(0 , 204 , 204);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.rootkit.com/&quot; style=&quot;color: #cc9933;&quot;&gt;&lt;span style=&quot;color: rgb(0 , 204 , 204);&quot;&gt;rootkit&lt;/span&gt; &lt;/a&gt;&lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;  embedd&lt;/span&gt;&lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;ed into the system, and then run the file &quot;(BK)FirefoxU3Start.exe,&quot; that way no one will no the differen&lt;/span&gt;&lt;span style=&quot;color: rgb(204 , 153 , 51);&quot;&gt;ce. &lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Other options:&lt;/span&gt;If you can&#39;t get the U3 Launcher on your Keydisk, then another option is to modify a file called &quot;autorun.inf&quot; which is in the root folder (the root is the first items you see when you double click on the drive).&lt;br /&gt;
&lt;br /&gt;
Edit it in the form of:&lt;br /&gt;
Open=&quot;notepad.exe&quot;&lt;br /&gt;
Action=&quot;notepad.exe&lt;br /&gt;
Shell=&quot;notepad.exe&lt;br /&gt;
where &quot;notepad.exe&quot; is a program in the root folder.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Protection:&lt;/span&gt;&lt;br /&gt;
The only way to prevent this--- and it isn&#39;t fully fool proof--- is to download &lt;a href=&quot;http://www.annoyances.org/exec/show/tweakui&quot;&gt;Microsoft Powertool&#39;s TweakUI.exe&lt;/a&gt;&lt;a href=&quot;http://www.annoyances.org/exec/show/tweakui&quot;&gt; &lt;/a&gt;(&lt;a href=&quot;http://filehippo.com/download_tweakui/&quot;&gt;Mirror&lt;/a&gt;)&lt;br /&gt;
Open the Program from the Start Menu(All Programs--&amp;gt; Powertoys for Windows--&amp;gt; TweakUI)&lt;br /&gt;
Then click on My Computer --&amp;gt;Auto Play--&amp;gt; Drives&lt;br /&gt;
Uncheck the drives you wish to protect, and click OK.&lt;br /&gt;
&lt;span style=&quot;color: rgb(204 , 0 , 0);&quot;&gt;(NOTE: This disables Auto Run, &lt;/span&gt;&lt;span style=&quot;color: rgb(204 , 0 , 0);&quot;&gt;so any time you put in a CD you will have to go into My Computer to start it)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;br /&gt;END NOTES:&lt;/span&gt;This particular attack is hard to execute, since it requires a physical access to someone else&#39;s Keydisk and PC. But there has been &lt;a href=&quot;http://www.mydigitallife.info/2007/03/16/virus-infections-via-usb-drive/&quot;&gt;some talk about&lt;/a&gt; the idea that a virus could be implanted into a system and instead of using the Internet to travel, it travels by hopping onto a USB disk, Mobile phone/PDA, and even the USB flash disk in your Camera---  like one of the ways shown above (most likely the second example however).&lt;br /&gt;
&lt;br /&gt;
So the next time some body says they want to plug their Keydisk into your PC think about what you are risking.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;More Reading...&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.usbhacks.com/&quot;&gt;http://www.usbhacks.com/&lt;/a&gt;  made a post on how Sony installed Rootkits on they Keydisk, causing files to be hidden in the C:\windows  folder&lt;br /&gt;
&lt;a href=&quot;http://www.dailycupoftech.com/have-your-lost-usb-drive-ask-for-help/&quot;&gt;http://www.dailycupoftech.com/have-your-lost-usb-drive-ask-for-help&lt;/a&gt;/ As soon as your keydisk is inserted, a message shows up saying how to return it.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.mydigitallife.info/2007/03/16/virus-infections-via-usb-drive/&quot;&gt;http://www.mydigitallife.info/2007/03/16/virus-infections-via-usb-drive&lt;/a&gt;/&lt;br /&gt;
The Virus doesn&#39;t need the Internet any more, it has your camera and USB drive!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/11/danger-that-usb-thumbdrive-keydisk.html</link><author>noreply@blogger.com (AEL)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDJZ1jxZD7qkZ3rJlg5pJSwCeKCS-SN_aO9KD1lMUWYVN6DBNo6IJR4ZYvdcEOtW5xpwX9nRl0KicoNHfwvoA9xz1SFOHENmfXxjgWQE0g14bFnA0AOpZ8sI2rfQmokM01S_fQeYaWPuw/s72-c/ael_blog_OpenContain.JPG" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-2236499462503918801</guid><pubDate>Sun, 04 Nov 2007 19:39:00 +0000</pubDate><atom:updated>2008-12-10T11:52:58.766-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">gmail nwtools spam Email hijacker yahoo hotmail fullheaders IP address lookup tracker pinkpoke.com abuse report</category><title>Gmail making Spam tracking and Reporting just one step easier.</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFnJRVR5ieJENLQn_SJE1UIpwBsZLsh8kiLlW2XzYkLVdUfsd-COxg9HEkE7Y-nHpuEApXy82jRrLufqJq4yZGs6SULTxK9OOTWZzJKwCAcUW-xj_OXii8rUFg17Mv38lKDKNTQrUtfxU/s1600-h/ael_blog_gmail.JPG&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFnJRVR5ieJENLQn_SJE1UIpwBsZLsh8kiLlW2XzYkLVdUfsd-COxg9HEkE7Y-nHpuEApXy82jRrLufqJq4yZGs6SULTxK9OOTWZzJKwCAcUW-xj_OXii8rUFg17Mv38lKDKNTQrUtfxU/s320/ael_blog_gmail.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5129136204184308370&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;After checking my Email this weekend I noticed that Google has made a lot of changes.&lt;br /&gt;One is the ability to easily view header by clicking the drop down arrow to the right of the  &quot;reply&quot; button.&lt;br /&gt;&lt;br /&gt;Many times when you receive spam and want to report it,&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt; the abuse department of the sender requests that you include &lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(204, 153, 51);&quot;&gt;full&lt;/span&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt; headers.&lt;/span&gt; This is what the the &quot;show original&quot; button lets you see:&lt;br /&gt;&lt;pre&gt;(NOTE: This is a spam Email I received on Nov 3, the only thing that has been left out is my Email, everything else&lt;br /&gt;is left as is. Highlighed are the sending &lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;IPs and Emails&lt;/span&gt;)&lt;br /&gt;                                                                                                                                                                                                                                                   &lt;br /&gt;Delivered-To: Anelite...@gmail.com&lt;br /&gt;Received: by 10.142.114.1 with SMTP id m1cs413197wfc;&lt;br /&gt;  Sat, 3 Nov 2007 09:46:11 -0700 (PDT)&lt;br /&gt;Received: by 10.78.186.9 with SMTP id j9mr2269184huf.1194108369681;&lt;br /&gt;  Sat, 03 Nov 2007 09:46:09 -0700 (PDT)&lt;br /&gt;Return-Path: &lt;&lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;cohen@pinkponk.com&lt;/span&gt;&gt;&lt;br /&gt;Received: from &lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;CSTLGA-COE-CIP525-01.coastalnow.net.216.166.216.in-addr.arpa&lt;/span&gt; ([&lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;216.166.216.138&lt;/span&gt;])&lt;br /&gt;  by mx.google.com with ESMTP id 2si7442642nfv.2007.11.03.09.46.08;&lt;br /&gt;  Sat, 03 Nov 2007 09:46:09 -0700 (PDT)&lt;br /&gt;Received-SPF: &lt;span style=&quot;color: rgb(51, 51, 255);&quot;&gt;neutral&lt;/span&gt; (google.com: &lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;216.166.216.138 &lt;/span&gt;is neither permitted nor denied by domain of cohen@pinkponk.com) client-ip=216.166.216.138;&lt;br /&gt;Authentication-Results: mx.google.com; spf=neutral (google.com: &lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;216.166.216.138&lt;/span&gt; is neither permitted nor denied by domain of cohen@pinkponk.com) smtp.mail=cohen@pinkponk.com&lt;br /&gt;Received: from [&lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;216.166.216.138&lt;/span&gt;] by taurus-1.siol.net; Sat, 03 Nov 2007 16:49:32 +0000&lt;br /&gt;Message-ID: &lt;000401c81e39$0786d5d8$f9708d81@aengcxn&gt;&lt;br /&gt;From: &quot;bjorne monty&quot; &lt;&lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;cohen@pinkponk.com&lt;/span&gt;&gt;&lt;br /&gt;To: &lt;anelite...@gmail.com&gt;&lt;br /&gt;Subject: Fw:&lt;br /&gt;Date: Sat, 03 Nov 2007 15:02:09 +0000&lt;br /&gt;MIME-Version: 1.0&lt;br /&gt;Content-Type: text/plain;&lt;/anelite...@gmail.com&gt;&lt;br /&gt;&lt;anelite...@gmail.com&gt; format=flowed;&lt;br /&gt;charset=&quot;iso-8859-1&quot;;&lt;br /&gt;reply-type=original&lt;br /&gt;Content-Transfer-Encoding: 7bit&lt;br /&gt;X-Priority: 3&lt;br /&gt;X-MSMail-Priority: Normal&lt;br /&gt;X-Mailer: Microsoft Outlook Express 6.00.3790.2663&lt;br /&gt;X-MimeOLE: Produced By Microsoft MimeOLE V6.00.3790.2757&lt;/anelite...@gmail.com&gt;&lt;/pre&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Yahoo&lt;/span&gt;:&lt;br /&gt;&lt;pre&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvNMto9A1tkmHqJgidWgiGyYMqMlPmtWXv7NObsSOSO5Y4Y1BvXuLzRpsMzfdYlMDegsyPVOGejEzqtb2g-juNnM6_ayr5suilw31zDY4KUwaZzIoSWgsV6ciWwGVmuY_WttcV2jDeN9Q/s1600-h/ael_blog_yahoo.JPG&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvNMto9A1tkmHqJgidWgiGyYMqMlPmtWXv7NObsSOSO5Y4Y1BvXuLzRpsMzfdYlMDegsyPVOGejEzqtb2g-juNnM6_ayr5suilw31zDY4KUwaZzIoSWgsV6ciWwGVmuY_WttcV2jDeN9Q/s320/ael_blog_yahoo.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5129135809047317122&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;Hotmail:&lt;br /&gt;&lt;/span&gt;&lt;p&gt;To make MSN Hotmail display all header lines:  &lt;/p&gt;&lt;ul&gt;&lt;li&gt;Select &lt;i&gt;&lt;a href=&quot;http://hotmail.msn.com/cgi-bin/options?&quot; onclick=&quot;zT(this, &#39;1/XJ&#39;)&quot;&gt;Options&lt;/a&gt;&lt;/i&gt; from the top MSN Hotmail navigation bar. &lt;/li&gt;&lt;li&gt;Make sure the &lt;a href=&quot;http://hotmail.msn.com/cgi-bin/options?section=mail&quot; onclick=&quot;zT(this, &#39;1/XJ&#39;)&quot;&gt;&lt;i&gt;Mail&lt;/i&gt;&lt;/a&gt; category is selected. &lt;/li&gt;&lt;li&gt;Choose &lt;i&gt;&lt;a href=&quot;http://hotmail.msn.com/cgi-bin/prefs?screen=mail&quot; onclick=&quot;zT(this, &#39;1/XJ&#39;)&quot;&gt;Mail Display Settings&lt;/a&gt;&lt;/i&gt;. &lt;/li&gt;&lt;li&gt;Set &lt;i&gt;Message Headers&lt;/i&gt; to &lt;i&gt;Full&lt;/i&gt;. &lt;/li&gt;&lt;li&gt;Click &lt;i&gt;OK&lt;/i&gt;. &lt;/li&gt;&lt;/ul&gt;(source: about.com)&lt;br /&gt;&lt;br /&gt;As can be seen by the highlighted parts, the IP Address is show in many places. Every user of the internet, whether they are a business, school, or home user is issued a individual IP Address that becomes specific to their router or PC. This IP normally will change after a given length of time called the license period or when ever the router/computer is disconnected or restarted.&lt;br /&gt;When this email is reported to the parent company (in this case &quot;pinkpoke.com&quot;)  they can:&lt;br /&gt;&lt;br /&gt;-  simply &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;delete the account and ban that IP Address from their site.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;-  &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;report the IP Address to the ISP&lt;/span&gt; (which can be publicly found by going to &lt;a href=&quot;http://www.nwtools.com/&quot;&gt;nwtools.com&lt;/a&gt;) .... this could result in a shutdown of the offender&#39;s internet.&lt;br /&gt;&lt;br /&gt;-   Finally pinkpoke.com could request a &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;court order for the ISP to tell them who abused the              account and file a lawsuit&lt;/span&gt; against the abuser. The ISP would then have to turn over logs               showing what time and address was using that IP Address at the time the spam was sent. One small Email service says they attempt to collect a $10/per spam Email when they prosecute offenders. (now if I could get that for all my Spam... hehehe)&lt;br /&gt;&lt;br /&gt; Unfortunately ISPs don&#39;t always keep the logs for an extended time (an anonymous                        source told me only about &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;8 to 10 days&lt;/span&gt;, due to volume and space limits)  and therefore if             the parent company doesn&#39;t act fast, this option will not be available to them.  Also                         spammers have many ways to keep from getting caught.&lt;br /&gt;&lt;br /&gt;Spammers &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;stay anonymous by hijacking computers&lt;/span&gt; and using them to send their &quot;hate mail&quot; or by &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;using one of the many spoofers&lt;/span&gt; available on the internet. A spoofer is a program that allows you to send and Email that looks like someone else. (e.g. I could send an Email from admin.goog@gmail.com just by entering it into a text box.)&lt;br /&gt;&lt;br /&gt;Many times the &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;spoofed Emails don&#39;t have the same certificates as official Emails&lt;/span&gt; and therefore they can be picked up by the spam blocker. A certificate appears in every Email and issued by the domain (Gmail, yahoo, etc) and help programs validate Emails. (note above Email header shows a certificate of &lt;span style=&quot;color: rgb(51, 51, 255);&quot;&gt;neutral&lt;/span&gt;)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Analysis: &lt;/span&gt;&lt;br /&gt;I hate to break it to you, but &quot;cohen@pinkponk.com&quot; doesn&#39;t really exist and that  oh-so-special  product they advertised doesn&#39;t work much better. A check on &lt;a href=&quot;http://www.nwtools.com/&quot;&gt;http://www.nwtools.com&lt;/a&gt; came back with the following (check the &quot;Email Validation&quot; radio button for validating Emails):&lt;br /&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;color:Green;&quot;&gt;[Contacting pinkponk.com [213.229.249.143]...]&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;color:Green;&quot;&gt;[Timed out]&lt;/span&gt;&lt;br /&gt;A Google searched turn up no other reports of this address either. (sometimes other people have will posted on a particular spammer, what they find out)&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;I also ran a check on the IP address, I believed it would be a valid home user (maybe hijacked) due to the fact that the full header the &quot;X-Mailer: Microsoft Outlook Express 6.00.3790.2663&quot; signature. Outlook is one of the oldest windows Email programs, and therefore is a breeze to hijack.&lt;br /&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;OrgName:    Mebtel Communications &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;OrgID:      MEBT&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;Address:    103 South Fifth Street&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;City:       Mebane&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;StateProv:  NC&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;PostalCode: 27302&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;Country:    US&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;more.... &lt;/span&gt;&lt;a style=&quot;font-family: times new roman;&quot; href=&quot;http://network-tools.com/default.asp?prog=express&amp;amp;host=216.166.216.138&quot;&gt;click here&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;What do you know? Its valid... and if I sent an Email to &lt;span style=&quot;font-family:times new roman;&quot;&gt;abuse@madisonriver.net they might even look into shutting down this spammer, provided they care... &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;END Notes:&lt;/span&gt;&lt;br /&gt;Yahoo has had a &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;quick links to full headers for some time&lt;/span&gt; now, but Hotmail requires users to go through some steps to turn the full headers on, and has&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt; no quick On/off feature.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The previous way to get Gmail full headers was to click &quot;basic html&quot; at the very bottom of the page and then click option for &quot;full headers&quot; which would appear by the address box.  This step by Google to make full headers easier to get at may reduce the time it takes to report spam. Which is good because Spam is one kind of &quot;food&quot; ad that I don&#39;t want in my inbox... I get enough &quot;food&quot; ads as it is in the regular mail.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Future post highlights:&lt;/span&gt;&lt;br /&gt;I received requests for this post and I am still working on the next planned post: &lt;span style=&quot;font-weight: bold; color: rgb(204, 153, 51);&quot;&gt;Keydisk security&lt;/span&gt;. I should be posting it in about a week or so. If you have ideas or something you want to know how to do that relates to protecting PC user safety let me know... Post on the blog or Email me at the address shown in contact info.&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/11/gmail-making-spam-traking-and-reporting.html</link><author>noreply@blogger.com (AEL)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFnJRVR5ieJENLQn_SJE1UIpwBsZLsh8kiLlW2XzYkLVdUfsd-COxg9HEkE7Y-nHpuEApXy82jRrLufqJq4yZGs6SULTxK9OOTWZzJKwCAcUW-xj_OXii8rUFg17Mv38lKDKNTQrUtfxU/s72-c/ael_blog_gmail.JPG" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-4282697701219914989</guid><pubDate>Mon, 22 Oct 2007 04:50:00 +0000</pubDate><atom:updated>2007-11-17T00:36:16.916-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">tv links pirate bay music video DRM artists piracy free movies underground UK</category><title>Where did TV-links go?</title><description>Acording to &lt;a href=&quot;http://business.guardian.co.uk/story/0,,2195407,00.html&quot;&gt;http://business.guardian.co.uk/story/0,,2195407,00.html&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://tv-links.co.uk/&quot;&gt;http://www.tv-links.co.uk/&lt;/a&gt;was taken offline Oct 19.&lt;br /&gt;&lt;blockquote style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;The arrest and the closure of the site - www.tv-links.co.uk - came during an operation by officers from Gloucestershire County Council trading standards in conjunction with investigators from Fact and Gloucestershire Police.&lt;/blockquote&gt; &lt;blockquote style=&quot;color: rgb(255, 204, 102);&quot;&gt;&lt;/blockquote&gt;TV-links, until last week, was one of the largest internet movies, anime, TV show, and cartoon web video streaming portals. The 26 year old that set it up, used ads and paypal donations to gain income off of the illegal videos. The theory of the site was similar to that of Piratebay.org, which hosts none of the content, but simply provides links to it.&lt;br /&gt;&lt;br /&gt;The difference between these two sites and their sustained uptime, lies in the location of their servers.&lt;a href=&quot;http://thePirateBay.org&quot;&gt; thePirateBay.org&lt;/a&gt; hosts out of Switzerland, a neutral, piracy acceptant country. &lt;a href=&quot;http://tv-links.co.uk/&quot;&gt;www.tv-links.co.uk&lt;/a&gt;, on  the other hand, hosted in the UK where tolerance of piracy, though not as strict as the US, normally is frowned on.&lt;br /&gt;&lt;br /&gt;Both sites have been shut down by the government at least once. Piratebay.org ended up reopening within days after their police raid. TV links also came back online after its first shutdown.&lt;br /&gt;&lt;br /&gt;After this second shutdown a post on the TV-Links Forum reported:&lt;br /&gt;&lt;h4 style=&quot;color: rgb(255, 204, 102);&quot;&gt;&lt;/h4&gt;&lt;blockquote style=&quot;font-weight: bold; color: rgb(204, 153, 51);&quot;&gt;&lt;h4&gt;Posted by: xxxx Oct 20 2007, 02:51 AM&lt;/h4&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;&lt;a href=&quot;http://business.guardian.co.uk/story/0,,2195407,00.html&quot;&gt;     http://business.guardian.co.uk/sto&lt;/a&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;&lt;a href=&quot;http://business.guardian.co.uk/story/0,,2195407,00.html&quot;&gt;ry/0,,2195407,00.html&lt;/a&gt; &lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;that happened! Were working on a way to save the links.&lt;/span&gt;    &lt;/blockquote&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;It will only  be a matter of time before TV links comes back online again, or at least a spin off site. Detailed cache information of TV links can still be found on Google by doing site search of TV-links &lt;a href=&quot;http://www.google.com/search?q=+site:tv-links.co.uk+tv+links&quot;&gt;http://www.google.com/search?q=+site:tv-links.co.uk+tv+links&lt;/a&gt;&lt;br /&gt;also the content sites:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://54.com/&quot;&gt;54.com&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://youku.com&quot;&gt;youku.com&lt;/a&gt;&lt;a href=&quot;http://www.todou.com/&quot; title=&quot;todou.com - Pirate TV content&quot;&gt;&lt;br /&gt;todou.com&lt;/a&gt;&lt;br /&gt;and&lt;br /&gt;&lt;a href=&quot;http://videos.google.com&quot;&gt;http://videos.google.com&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://youtube.com&quot;&gt;http://youtube.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;still host the videos untouchable content, that TV-links.co.uk linked to. (note: even though Google and Youtube remove content, a large amount of illegal videos are hidden within the site using code names)&lt;br /&gt;&lt;br /&gt;If the movie industry was smart, they would see that they could profit by allowing more open access to their content. Many music artists such as, &lt;del&gt;Radiohead&lt;/del&gt;, Prince, and others have released their albums for free via the internet. As I heard in an interview the other day, these artists are making more from the ringtones, clothing, and advertising they incorporate into their music. One artist has made 4 million dollars off ringtones alone.&lt;br /&gt;&lt;br /&gt;But for now, tv-links.co.uk will remain hidden, buried underground, and as the government&#39;s attempted example to movie sharing sites that they will not be able to exist in free countries like the US and UK.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt;EDIT: Radiohead doesn&#39;t release their album for free, instead they allow the listener to choose how much they want to spend.&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/10/where-did-tv-links-go.html</link><author>noreply@blogger.com (AEL)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-4664773647781347669</guid><pubDate>Mon, 17 Sep 2007 19:26:00 +0000</pubDate><atom:updated>2008-12-10T11:52:59.122-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">phreaking phone tapping hacking listening in fbi CSI dialer.exe</category><title>Phone Phreaking</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgakTnYfVm9qJ6NIMC7lRVwhH_jEKC4vcviOLJxWKKJl2R9c_DXXKvdSgHJMrqbMTxNR_i8kOSyugRdvrrUE5P1YKkcZCrDqqFlPkMRWksW1q4M8b7iR91_i6ezjahEk31573F4oazEY0w/s1600-h/Neo+with+Cell+phone.JPG&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgakTnYfVm9qJ6NIMC7lRVwhH_jEKC4vcviOLJxWKKJl2R9c_DXXKvdSgHJMrqbMTxNR_i8kOSyugRdvrrUE5P1YKkcZCrDqqFlPkMRWksW1q4M8b7iR91_i6ezjahEk31573F4oazEY0w/s320/Neo+with+Cell+phone.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5111253564684847314&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Introduction&lt;/span&gt;&lt;br /&gt;Phone phreaking is basically just hacking over a phone line. This could include phone line tapping, breaking into phone networks, gaining free long distance, and sometimes it is considered part of the realm of social engineering. Social engineering is gaining information by tricking people directly instead of hacking machines; you in other words &quot;engineer using social tactics.&quot; In this post you will learn &lt;span style=&quot;font-weight: bold; color: rgb(204, 153, 51);&quot;&gt;how to tap your own home phone line&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 204, 0);&quot;&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Tools needed:&lt;/span&gt;&lt;br /&gt;Windows 95 dialer. exe  ( &lt;a href=&quot;http://aelshupit.googlepages.com/DIALER.rar&quot;&gt;RAR &lt;/a&gt;| &lt;a href=&quot;http://aelshupit.googlepages.com/DIALER.exe&quot;&gt;EXE&lt;/a&gt; )&lt;br /&gt;Free MP3 Recorder ( &lt;a href=&quot;http://textver.filehungry.com/go.php?url=373536343e37343033613b663266366136613660306636313664336537353332373336343a65353336323e613266373337363738353136363264326637303633363537313f30343136353e31373236353265373334613732&amp;amp;ref=53416&quot;&gt;Main&lt;/a&gt; | &lt;a href=&quot;http://aelshupit.googlepages.com/mp3recorder.exe&quot;&gt;Mirror&lt;/a&gt;)&lt;br /&gt;A computer connected to a phone line... like what you did back in the days of Dialup.&lt;br /&gt;&lt;/span&gt; &lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXZ-3of1bWbEbYhAK8fWs4-hY_j-E1ejBu5huD7wF59I1HxTYMazMtsR4OiF7KkLEClwfTQdHgmaLiWrwrx5estwrD9Sw0EFGBtBtgAEKRsTDM65XjBkSVTX0F_gYOBTGs2-3zCdY8pkQ/s1600-h/Dialer.JPG&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 168px; height: 185px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXZ-3of1bWbEbYhAK8fWs4-hY_j-E1ejBu5huD7wF59I1HxTYMazMtsR4OiF7KkLEClwfTQdHgmaLiWrwrx5estwrD9Sw0EFGBtBtgAEKRsTDM65XjBkSVTX0F_gYOBTGs2-3zCdY8pkQ/s320/Dialer.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5102889206253039650&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color: rgb(255, 204, 0);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;Lets go back to the future using the Windows 95 Dialer.exe tool (It must be windows 95, NT/2000 will not work)&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;Open it up and tell it to dial a letter. I normally put in &quot;f&quot;. &lt;/span&gt;  &lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;br /&gt;This will bring up a new window that asks you to pick up the receiver. Just ignore that until you&#39;re done. You should &lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;hear the phone line in through your speakers&lt;/span&gt;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;  &lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;br /&gt;The best time to listen in is to &lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;wait till someone starts dialing or after the parties have begun talking&lt;/span&gt; on the phone. If done too soon (like when you still have the tone) you will get a busy signal and it will hang up. Another practical use I have found for this program is when the answering machine picks up in another part of the house, I can hear the live recording by picking up just at the right moment.&lt;br /&gt;&lt;br /&gt;I recommend getting a copy of &lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;Free MP3 Sound Recorder if you want to record the conversation&lt;/span&gt;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;.&lt;/span&gt; Any program will work that allows you to record windows internal sounds. (you could also use &lt;a href=&quot;http://audacity.sourceforge.net/download/&quot;&gt;Audacity&lt;/a&gt; with a cable connecting your microphone to teh speaker, but unless you have a audio speaker you won&#39;t be able to here the conversation.&lt;/span&gt; &lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;This will record the sound of the phone line allowing you to save it to mp3/wav format. Another recorder that I found to be pretty good was: &lt;a href=&quot;http://www.roemersoftware.com/sound-recorder-comparison.html&quot;&gt;http://www.roemersoftware.com/sound-recorder-comparison.html&lt;/a&gt; (get the free version)&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;Instructions for &quot;Free MP3 Sound Recorder&quot;:&lt;br /&gt;&lt;/span&gt;Click file--&gt; New&lt;br /&gt;Then Select Record and stereo checkboxes.&lt;br /&gt;Click Ok and select the file format you want... I normally choose mp3.&lt;br /&gt;Click Ok and select where you want to save the file.&lt;br /&gt;A new window will come up saying &quot;Do you want to start recording now?&quot;&lt;br /&gt;Select yes if you have the call on the line, or no if you have yet to make the call.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;End Notes:&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;I have found that with practice I &lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;can have the line recording in thirty seconds&lt;/span&gt; (that is including the time to start each program). In many US states it is illegal to record a phone call without the consent at least one party.  But you can find a complete list here: &lt;a href=&quot;http://www.rcfp.org/taping/states.html&quot;&gt;http://www.rcfp.org/taping/states.html&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/08/phone-phreaking.html</link><author>noreply@blogger.com (AEL)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgakTnYfVm9qJ6NIMC7lRVwhH_jEKC4vcviOLJxWKKJl2R9c_DXXKvdSgHJMrqbMTxNR_i8kOSyugRdvrrUE5P1YKkcZCrDqqFlPkMRWksW1q4M8b7iR91_i6ezjahEk31573F4oazEY0w/s72-c/Neo+with+Cell+phone.JPG" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-4089155059094180447</guid><pubDate>Sun, 26 Aug 2007 13:38:00 +0000</pubDate><atom:updated>2007-08-26T09:40:28.110-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">storm worm virus youtube</category><title>Storm Worm - Now using youtube.</title><description>Some of you remember that I reported a while back that the Storm worm was using e-cards via Email to trick you into downloading. Now it has morphed to use a fake Youtube link.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://xx.99.65.224/&quot;&gt;http://www.youtube.com/watch?v=Ga4y9EQMuDe&lt;/a&gt;&lt;br /&gt;(link text = http://www.youtube.com...., and the real link is http://XX.99.65.225/)&lt;br /&gt;&lt;br /&gt;to get you to go to the Storm Worm website and download the worm. :-/&lt;br /&gt;&lt;br /&gt;Full story:&lt;br /&gt;&lt;a href=&quot;http://isc.sans.org/diary.html?storyid=3321&amp;rss&quot;&gt;SANS Internet Storm Center; Cooperative Network Security Community - Internet Security - isc&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/08/storm-worm-now-using-youtube.html</link><author>noreply@blogger.com (AEL)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-830531750845560381</guid><pubDate>Sat, 18 Aug 2007 00:57:00 +0000</pubDate><atom:updated>2008-12-10T11:52:59.417-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking cracking word excel zip brute force password chalenge attack</category><title>Password Cracking and Security: Part 2</title><description>&lt;div&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Introduction:&lt;/span&gt;&lt;br /&gt;This will show you &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;how to break the encryption on a zip file, word document, and excel document&lt;/span&gt;. The tools and methods shown here are just some of the many ways to get a password. There are things called &lt;a href=&quot;http://en.wikipedia.org/wiki/Exploit_%28computer_security%29&quot;&gt;exploits&lt;/a&gt; which could allow an attacker to get in even faster... but for now lets take a look at Brute Force and Dictionary attacks. &lt;span style=&quot;color: rgb(153, 0, 0);&quot;&gt;NOTE: This tutorial doesn&#39;t recommend you crack passwords that don&#39;t belong to you. It is meant be used for password recovery and password strength testing.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Tools needed:&lt;br /&gt;&lt;a href=&quot;http://www.excel-cracker.com/download.html&quot;&gt;Excel_crackers_setup.exe &lt;/a&gt;  (&lt;a href=&quot;http://aelshupit.googlepages.com/excel_cracker_setup.exe&quot;&gt;mirror&lt;/a&gt;)&lt;a href=&quot;http://aelshupit.googlepages.com/excel_cracker_setup.exe&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;a href=&quot;http://www.astonsoft.com/downloads/zpf.zip&quot;&gt;Zip Password Finder &lt;/a&gt;   (&lt;a href=&quot;http://aelshupit.googlepages.com/zpf.zip&quot;&gt;mirror&lt;/a&gt;)&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://aelshupit.googlepages.com/abc.doc&quot;&gt;abc.doc&lt;/a&gt; (word doc I made with password... see if you can get access)&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;These programs have been tested and they work with not only the older versions of office, but also newer ones...&lt;/div&gt;&lt;br /&gt;&lt;div&gt; &lt;/div&gt;&lt;ol&gt;&lt;li&gt;&lt;span style=&quot;color: rgb(0, 153, 0); font-weight: bold;&quot;&gt;Microsoft Word / Microsoft Excel&lt;/span&gt;&lt;br /&gt;This method will work on either a word or excel file, it doesn&#39;t matter which you choose.&lt;br /&gt;First &lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;create(or open) a password protected Microsoft Word or Excel document&lt;/span&gt;; type some information into it so that you will be able verify you have unlocked the document.&lt;br /&gt;To &lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;enable password click tools--&gt; options --&gt; security, and enter password&lt;/span&gt;, click ok and save the document. (&lt;a href=&quot;http://www.uwo.ca/its/doc/hdi/email/word-excel-protect.html&quot;&gt;Visual here&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Next &lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;download and install &lt;/span&gt;&lt;a style=&quot;color: rgb(51, 51, 255); font-weight: bold;&quot; href=&quot;http://aelshupit.googlepages.com/excel_cracker_setup.exe&quot;&gt;excel_cracker_setup.exe&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;You should get a&lt;br /&gt;window that looks like:&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-NR7-gaEa8E45N7BhVygTU2R3rLg0P72OFHE-bewjzuO2H2oI4lMLtNwfIAiuHdfuwX88eynZ9ZQcBsvJHBZLizZb0sqvW58UdxTZZAy5YC9npLTCvuOb3ETKMCX7OorYp3QWU7WREGE/s1600-h/AEL+Blog+PW+cracking_part+2.JPG&quot;&gt;&lt;blockquote&gt;&lt;img style=&quot;cursor: pointer; width: 170px; height: 207px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-NR7-gaEa8E45N7BhVygTU2R3rLg0P72OFHE-bewjzuO2H2oI4lMLtNwfIAiuHdfuwX88eynZ9ZQcBsvJHBZLizZb0sqvW58UdxTZZAy5YC9npLTCvuOb3ETKMCX7OorYp3QWU7WREGE/s400/AEL+Blog+PW+cracking_part+2.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5095075702583583842&quot; border=&quot;0&quot; /&gt;&lt;/blockquote&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;In the name box type or click the icon and browse, to &lt;span style=&quot;font-weight: bold; color: rgb(204, 153, 51);&quot;&gt;enter the password protected word/excel file&lt;/span&gt; you created.&lt;/li&gt;&lt;li&gt;You have 2 options: Brute Force attack! and Dictionary attack (see Password cracking part 1 for more info). If you do a dictionary attack you must select a word file... and it has to be text. For this demonstration &lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;select&lt;/span&gt; &lt;/span&gt;only&lt;span style=&quot;font-weight: bold;&quot;&gt; &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;Brute Force attack&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Further options include:&lt;br /&gt;- All printable (meaning all characters able to be typed)&lt;br /&gt;- Latin small symbols [ a...z] (lowercase letter)&lt;br /&gt;- Latin capital symbols [A...Z] (UPPERCASE letters)&lt;br /&gt;- Digits [0...9] (numbers)&lt;br /&gt;- Special symbols [1@#$...] (can you guess this one?)&lt;br /&gt;- Space [ ] (its like outer space...)&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;You can set the Minimum Length and Maximum Length of the passwords you want try. But here is where things get a little sticky. See chart below to see what I mean. (click to see it larger)&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9JXQcDYJpXrYFpba6hWKqLXsFY7Gome1C7A2ZlG1NztUI68QJCDRdsEH_hsiQ_2OT4Pv99gRPKpgLn9mmMMuPLfxKc7GozoZOsDOt-X-UgvuxGIMDuNAmtAf0WsCdlTlQGupH8043Co4/s1600-h/algarithms.JPG&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 471px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9JXQcDYJpXrYFpba6hWKqLXsFY7Gome1C7A2ZlG1NztUI68QJCDRdsEH_hsiQ_2OT4Pv99gRPKpgLn9mmMMuPLfxKc7GozoZOsDOt-X-UgvuxGIMDuNAmtAf0WsCdlTlQGupH8043Co4/s400/algarithms.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5097312306802976482&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;br /&gt;A ten character password with both symbols and letters (no caps) will take over 960000 years to crack.&lt;br /&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 153, 0);&quot;&gt;ZIP Archives&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 153, 0);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;In order to crack zip archives it is very similar but here are the step by step instructions.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 153, 0);&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;ol&gt;&lt;li&gt;Download: &lt;a href=&quot;http://www.astonsoft.com/downloads/zpf.zip&quot;&gt;Zip Password Finder &lt;/a&gt;&lt;/li&gt;&lt;li&gt;Once you have opened the program (it installs to the start menu),&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Click &quot;Open File&quot;  and select the zip file you wish to crack.&lt;/li&gt;&lt;li&gt;Next, pick the &quot;charType Property&quot; which will be the character set that is used for the Brute Force. (you should understand from the other demonstrations, so I don&#39;t have to re-list the distinctions.)&lt;/li&gt;&lt;li&gt;You may also want to select &quot;Max password Length:&quot;&lt;/li&gt;&lt;li&gt;Go get a drink and find something productive to do while you wait :-)&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9JXQcDYJpXrYFpba6hWKqLXsFY7Gome1C7A2ZlG1NztUI68QJCDRdsEH_hsiQ_2OT4Pv99gRPKpgLn9mmMMuPLfxKc7GozoZOsDOt-X-UgvuxGIMDuNAmtAf0WsCdlTlQGupH8043Co4/s1600-h/algarithms.JPG&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;END NOTES:&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9JXQcDYJpXrYFpba6hWKqLXsFY7Gome1C7A2ZlG1NztUI68QJCDRdsEH_hsiQ_2OT4Pv99gRPKpgLn9mmMMuPLfxKc7GozoZOsDOt-X-UgvuxGIMDuNAmtAf0WsCdlTlQGupH8043Co4/s1600-h/algarithms.JPG&quot;&gt;&lt;br /&gt;&lt;/a&gt;The best thing that you can use this for is to test how fast someone could crack your password or if you have forgotten the password to a word, excel, or zip file. Once you have cracked (or failed to crack) your password, you can make an assessment as to whether or not you need to change it. (If your password is over 10 charters, I expect you know better than to wait 100+ years to find out it is safe :-P )&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9JXQcDYJpXrYFpba6hWKqLXsFY7Gome1C7A2ZlG1NztUI68QJCDRdsEH_hsiQ_2OT4Pv99gRPKpgLn9mmMMuPLfxKc7GozoZOsDOt-X-UgvuxGIMDuNAmtAf0WsCdlTlQGupH8043Co4/s1600-h/algarithms.JPG&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;MORE TOOLS:&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;http://aelshupit.googlepages.com/ibios.zip&quot;&gt;IBIOS&lt;/a&gt; (&lt;a href=&quot;http://www.11a.nu/&quot;&gt;http://www.11a.nu/&lt;/a&gt;)....... BIOS cracking&lt;a href=&quot;http://aelshupit.googlepages.com/ibios.zip&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;a href=&quot;http://www.oxid.it/cain.html&quot;&gt;Cain and Able&lt;/a&gt;................................ OS PWD cracker /Net spoofer&lt;br /&gt;&lt;a href=&quot;http://aelshupit.googlepages.com/007PeepPassword.zip&quot;&gt;007PeepPassword&lt;/a&gt;..........................view password under asterisks&lt;br /&gt;&lt;a href=&quot;http://www.crackpassword.com/download/archpr.zip&quot;&gt;Archpr.&lt;/a&gt;................................... rar, zip, pkzip&lt;span class=&quot;text&quot;&gt;, ARJ/ACE + more&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://www.password-crackers.com/&quot;&gt;http://www.password-crackers.com&lt;/a&gt;.... good resource for free and paid tools.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/07/password-cracking-and-security-part-2.html</link><author>noreply@blogger.com (AEL)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-NR7-gaEa8E45N7BhVygTU2R3rLg0P72OFHE-bewjzuO2H2oI4lMLtNwfIAiuHdfuwX88eynZ9ZQcBsvJHBZLizZb0sqvW58UdxTZZAy5YC9npLTCvuOb3ETKMCX7OorYp3QWU7WREGE/s72-c/AEL+Blog+PW+cracking_part+2.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-9045125855899577581</guid><pubDate>Thu, 26 Jul 2007 19:05:00 +0000</pubDate><atom:updated>2008-12-10T11:52:59.656-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">spam update virus Storm worm new</category><title>PDF Yesterday... Ecards today</title><description>I have found that this weeks Email spam Scam is &lt;span style=&quot;font-weight: bold;&quot;&gt;E-cards&lt;/span&gt;...&lt;br /&gt;the following &quot;loving&quot; ECards from my &quot;friends&quot; can be seen below:&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwAHVr1_hN1TXbJ6ohoweIafz1h8lDMrYPeJCIg365yZ-cwKDZxURt_EdMnIuUF2gMEoBosN64NaaqWpPvwrv06Vx-lwEJLAjyfKMRFEGNnTWF42ZpKr-u7oCz3jgWzATeoELKjj1usf8/s1600-h/blog+-+spam.JPG&quot;&gt;&lt;img style=&quot;cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwAHVr1_hN1TXbJ6ohoweIafz1h8lDMrYPeJCIg365yZ-cwKDZxURt_EdMnIuUF2gMEoBosN64NaaqWpPvwrv06Vx-lwEJLAjyfKMRFEGNnTWF42ZpKr-u7oCz3jgWzATeoELKjj1usf8/s400/blog+-+spam.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5091774960087065442&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;It appears that this round of Spam is &lt;span style=&quot;font-weight: bold; color: rgb(255, 0, 0);&quot;&gt;very Dangerous &lt;/span&gt;as can be seen in detail from a report by&lt;br /&gt;&lt;a href=&quot;http://isc.sans.org/diary.html?storyid=3190&amp;rss&quot;&gt;SANS Internet Storm Center; Cooperative Network Security Community - Internet Security - isc&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;They said that it has been labeled &quot;Storm worm&quot;&lt;br /&gt;and houses a collection of&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;-botnet malware&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;                    (allows virus master to control 100 or 1000s of machines at a time)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;-a rootkit&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;                   (hides programs from antivirus and spyware  detection software so no detection is                         even possible)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;-&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(204, 153, 51);&quot;&gt;NEW:&lt;/span&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt; Virtual Machine Detection &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;                (harder to use a &lt;/span&gt;&lt;a style=&quot;font-style: italic;&quot; href=&quot;http://en.wikipedia.org/wiki/Sandbox_%28security%29&quot;&gt;sandbox &lt;/a&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;windows environment to test and understand the virus)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;-Worming virus like activity&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;                        (allows program to hop from machine to machine uninvited) &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;-hiding behind a P2P style network&lt;/span&gt;&lt;br /&gt;                      &lt;span style=&quot;font-style: italic;&quot;&gt;(uses its own network to spread)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;This mix allows it to deal a perfected blow to any PC it is allowed to infect. What has changed the game for this virus/malware is the fact that when researches put it inside their Virtual Machines (the place they test the virus safely) nothing happened. The Virus didn&#39;t deploy and only rebooted the Virtual Machine.&lt;br /&gt;&lt;br /&gt;Now I haven&#39;t personally tried these attachments, like I did with the PDF ones (see earlier post)&lt;br /&gt;But I did notice that there are more attachments with these Emails and there volume is increased and not every Email has a attachment, it may have a link to a file to download.&lt;br /&gt;&lt;br /&gt;Thats it for now... check back again to stay informed on more everyday security problems and to follow my security series.&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/07/pdf-yesterday-ecards-today.html</link><author>noreply@blogger.com (AEL)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwAHVr1_hN1TXbJ6ohoweIafz1h8lDMrYPeJCIg365yZ-cwKDZxURt_EdMnIuUF2gMEoBosN64NaaqWpPvwrv06Vx-lwEJLAjyfKMRFEGNnTWF42ZpKr-u7oCz3jgWzATeoELKjj1usf8/s72-c/blog+-+spam.JPG" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-5026050067370281131</guid><pubDate>Sun, 15 Jul 2007 17:28:00 +0000</pubDate><atom:updated>2008-12-10T11:52:59.957-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">password security safety</category><title>Password Cracking and Security: Part 1</title><description>&lt;span style=&quot;font-weight: bold; color: rgb(0, 153, 0);&quot;&gt;Introduction:&lt;/span&gt;&lt;br /&gt;Many times the only thing stopping a hacker from accesses your data is a username and/or password. A strong password will insure that nothing gets leaked. A password&#39;s strength can broken down into:&lt;span style=&quot;font-weight: bold;&quot;&gt; numbers, letters&lt;/span&gt;(lower and UPPERCASE), &lt;span style=&quot;font-weight: bold;&quot;&gt;symbols, &lt;/span&gt;and&lt;span style=&quot;font-weight: bold;&quot;&gt; length&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Most hackers will try the default passwords first. (and I have to say I have recovered many a password by having that list handy) Examples include, but aren&#39;t limited to: admin, root, password, pass, password1, default, and.... so on and so forth. &lt;a href=&quot;http://aelshupit.googlepages.com/DefaultRouterPasswords.htm&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;View larger sample&lt;/span&gt;&lt;/a&gt; (router default passwords)&lt;a href=&quot;http://aelshupit.googlepages.com/passlist.txt&quot;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 153, 0);&quot;&gt;Definitions:&lt;/span&gt;&lt;br /&gt;If he can&#39;t get in with the default passwords he may step up the attack to a &lt;a href=&quot;http://aelshupit.googlepages.com/passlist.txt&quot;&gt;dictionary attack&lt;/a&gt; or brute force attack.&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;A Dictionary Attack -- which is where he takes a list of words from the dictionary and other sources(like acronyms, foreign words etc) and trys each one to see if it is the password. He may also add numbers such as a 1 or a 2 to the end for a quick check. If your password is a single word or a phrase, such as &quot;hardcrack&quot; or &quot;notime&quot; then the attacker will be inside your account(s) in a matter of hours or days.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Brute Force Attack -- this is where the attacker attempts every combination in the book, and out of the book. Normally he selects the category and length he wishes to try. The script he has made will then try an &lt;span style=&quot;font-weight: bold;&quot;&gt;alphabetical/numeric/symbolic&lt;/span&gt; attempt 1 by 1. e.g aa, ab, ac... ax, ay, az, a1, a2, a3, ... a7, a8, a9, a0, a!, a@, a#..... Oh yeah, I can&#39;t forget to mention that he also has to try &lt;span style=&quot;font-weight: bold;&quot;&gt;Uppercase and lower&lt;/span&gt; case letters. This can end up taking forever since time to try the passwords compounds itself.&lt;br /&gt;(&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;Check back for &lt;span style=&quot;font-weight: bold;&quot;&gt;Password Cracking and Security: Part 2&lt;/span&gt;&lt;/span&gt; Word, Excel, and Zip brute force demonstration)&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 153, 0);&quot;&gt;THE Protection TIPS:&lt;/span&gt;&lt;br /&gt;The more combinations you use in your password the harder it will be to crack. The most secure passwords contain a mix of the items noted above. Now you may be thinking how in the world am I going to remember such a complicated password? &lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;Here are some tips:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;- &lt;span style=&quot;font-weight: bold; color: rgb(51, 153, 153);&quot;&gt;Develop an algorithm for your passwords&lt;/span&gt;. The password to your &quot;mail&quot; could be &lt;/span&gt;&lt;span style=&quot;color: rgb(255, 204, 51); font-style: italic;&quot;&gt;MaIl6245&lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt; and the password for your computer could be &lt;/span&gt;&lt;span style=&quot;color: rgb(204, 153, 51); font-style: italic;&quot;&gt;cOmPuTeR26678837&lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;. With the algorithm being: Subject name, alternating upper and lower case, and then the corresponding numbers from a phone keypad.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li style=&quot;font-style: italic;&quot;&gt;- Use &lt;span style=&quot;font-weight: bold; color: rgb(51, 153, 153);&quot;&gt;geometric shapes to remember your password&lt;/span&gt;&lt;span style=&quot;color: rgb(51, 153, 153);&quot;&gt;:&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyuDfDEKgg04zoprxZEXBj6A77QhcdvBH4itSwXR5BJTRtlyPip07toj23ihN6t4s_5WiOlTiAqiqpnfRT32u6z0rBmbzUQlPGRsw45G0J1SEm6woVi7L70bPWGZ-nb4ZwTwu6NdzTbCQ/s1600-h/keyboard_password.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 379px; height: 193px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyuDfDEKgg04zoprxZEXBj6A77QhcdvBH4itSwXR5BJTRtlyPip07toj23ihN6t4s_5WiOlTiAqiqpnfRT32u6z0rBmbzUQlPGRsw45G0J1SEm6woVi7L70bPWGZ-nb4ZwTwu6NdzTbCQ/s320/keyboard_password.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5081716005899977394&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Each button would be pressed and make up passwords that look hard, but really when you sit down to type are easy to remember. (Picture shows passwords: &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;&quot;e3dcft654&lt;/span&gt;&quot; and &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;&quot;8ik./lo9&lt;/span&gt;&quot;)&lt;br /&gt;&lt;/li&gt;&lt;li style=&quot;font-style: italic;&quot;&gt;- Another way to remember your password is to &lt;span style=&quot;font-weight: bold; color: rgb(51, 153, 153);&quot;&gt;write it down&lt;/span&gt;&lt;span style=&quot;color: rgb(51, 153, 153);&quot;&gt;...&lt;/span&gt;&lt;br /&gt;BUT don&#39;t just leave the paper lying around for someone to find. Put it in your wallet, or other safe place (and that doesn&#39;t include your monitor) Plus,  hide it in such a way as not to make it obvious. e.g. if your password was &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;MaIl6245&lt;/span&gt; mix it up --- put &quot;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;MaIl&lt;/span&gt;&quot; on one line and &lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;6245&lt;/span&gt; on another line on the index card.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li value=&quot;4&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;&lt;span style=&quot;color: rgb(51, 153, 153);&quot;&gt;Don&#39;t type your password in straight.&lt;/span&gt; &lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;What I mean is type your password in backwards, out of sequence, and add extra keys to confuse the keyloggers. When you are on a computer there are programs called &lt;/span&gt;&lt;a style=&quot;font-style: italic;&quot; href=&quot;http://en.wikipedia.org/wiki/Keystroke_logging&quot;&gt;keyloggers&lt;/a&gt;&lt;span style=&quot;font-style: italic;&quot;&gt; that will log every stroke you make. It doesn&#39;t matter how strong your password is, if the computer has a keylogger, then the keylogger&#39;s master can get it easily.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Also, use the mouse, not the arrow keys to move around in the password field. Most keyloggers that I have tested can&#39;t pick up mouse movements.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;For Example lets say you have a password of abc123 (though not especially safe, it is alphanumeric). If typed :&lt;/span&gt;&lt;a style=&quot;font-style: italic;&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSvVSoJPZ0fqVzQa1YtnrZwtS58d4Hk9zLd0AjHdkDW3SfHqs4JujHGXhkvUksTowBx_tVrsL5jedKE9RnyfMNWkQQnlUPJOV5_i0BnMkWpzgDZrx0SvBP7z7rKekhzkjpy0I9RCfO_Ws/s1600-h/keylogger_blog.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSvVSoJPZ0fqVzQa1YtnrZwtS58d4Hk9zLd0AjHdkDW3SfHqs4JujHGXhkvUksTowBx_tVrsL5jedKE9RnyfMNWkQQnlUPJOV5_i0BnMkWpzgDZrx0SvBP7z7rKekhzkjpy0I9RCfO_Ws/s320/keylogger_blog.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5082110001303260738&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Then it will show in the keylogger: 123xabnc&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;And unless the keylogger can log backspace/left/right arrows then whoever looks at it will be confused, and hopefully pass you by.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you want to try out a keylogger I recommend:&lt;br /&gt;FREE:&lt;br /&gt;&lt;a href=&quot;http://home.rochester.rr.com/artcfox/TinyKL/&quot;&gt;Tiny KL  - http://home.rochester.rr.com/artcfox/TinyKL/ OR&lt;br /&gt;&lt;/a&gt;&lt;a href=&quot;http://www.download.com/3001-2092_4-10541792.html&quot;&gt;Actual Keylogger - http://www.download.com/3001-2092_4-10541792.html&lt;/a&gt;&lt;br /&gt;Or you can try out my all time favorite:&lt;br /&gt;$19.99&lt;br /&gt;&lt;a href=&quot;http://www.win-spy.com/&quot;&gt;Winspy - http://www.win-spy.com/&lt;/a&gt; (feature list is amazing)&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;- You may even want to use a &lt;span style=&quot;font-weight: bold; color: rgb(51, 153, 153);&quot;&gt;password storage program&lt;/span&gt;. Firefox has a built in password manager which I recommend using --- so long as you add a master password (Tools--&gt; Options, Security Tab, Check &quot;use master password&quot; and click &quot;change&quot;/&quot;setup password&quot;). You can also use &lt;/span&gt;&lt;a style=&quot;font-style: italic;&quot; href=&quot;http://www.roboform.com/download.html&quot;&gt;Roboform &lt;/a&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;which works well to remember Internet Explorer and Firefox passwords. Most of the time a password gets added by you typing it in and selecting you want Roboform or Firefox to remember it.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;What I did for a while with my passwords was I kept them in Firefox&#39;s list (practically all of my vital passwords were for websites) . Then I created a master password using symbols and letters and stored a hard copy of that in my wallet. For passwords that were not in the browser(like the screensaver) I just picked 1 tricky alpha/numeric/symbol   password and used it over and over till I had memorized it --- that is one thing I have found true to remembering passwords, if you have to type it every time you start windows(however infrequent that may be :-P) you will tend to remember the password better.&lt;br /&gt;&lt;br /&gt;If you have passwords outside the browser (like to get into Windows) it is best to keep them in a protected password manger program or password protected Word or Excel document with auto recovery turned off (so no cache copies remain on disk) which is located on a keydisk(which can be hidden under your bed, the place every robber looks ;-P).&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;Note: I personally don&#39;t trust any password manger program, and just use a combo of MS word, MS excel, and zip files to keep my passwords manged and safe.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 153, 0); font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Now there are some people that argue that you need to have better &lt;span style=&quot;font-weight: bold; color: rgb(0, 153, 0);&quot;&gt;Encryption&lt;/span&gt; for your passwords. Two good applications for that are &lt;a href=&quot;http://www.schneier.com/blowfish.html&quot;&gt;Blowfish &lt;/a&gt;and &lt;a href=&quot;http://www.truecrypt.org/&quot;&gt;&lt;span&gt; &lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;a href=&quot;http://www.truecrypt.org/&quot;&gt;TrueCrypt &lt;/a&gt;&lt;/span&gt;. If you need any help with them feel free to leave a comment, but for now I don&#39;t have room in this post to go into details about encryption. (both are free)&lt;br /&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;Another &lt;span style=&quot;color: rgb(0, 153, 0); font-weight: bold;&quot;&gt;problem with passwords&lt;/span&gt; that I have found is that people make a great secure password only to have a very simple password recovery question. Like their birthday. Chances are if they have a myspace or something else online where a birth date or father&#39;s name, age, favorite place to vacation is posted, etc. then they might as well have no password at all. A hacker can get your password just from those backdoors...&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span&gt;This is why many companies and individuals have selected to use a security disk instead of passwords. &lt;span style=&quot;font-weight: bold;&quot;&gt;Security disks&lt;/span&gt;(USB or Floppy) hold a password generated from the make up of a file or a longer password. The only way to log on to the computer  is with that keydisk or the longer password thereby eliminating the need to type the password in each time. This allows you to select a password that you wouldn&#39;t ever think of using before. (e.g. you could make a password out of the 255 first characters of the definition of A in the Dictionary) &lt;a href=&quot;http://www.truecrypt.org/&quot;&gt;TrueCrypt &lt;/a&gt;has some of these features.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;End Notes: &lt;/span&gt;As you probably can tell, security is an ongoing, never ending&lt;br /&gt;&quot;black art&quot;.  You are never completely secure. Hackers find exploits, create newer tools, and trick you with their looks and charms :-P. But what you have to do is take steps to be more secure; increase your security to the point that you are so hard to reach, you become not worth the time. Be creative. There is a saying &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;to prevent a robber you must think like a robber.&quot; &lt;/span&gt;The same goes for Hackers.&lt;br /&gt;&lt;br /&gt;Stay informed, be alert, and if you think security has been compromised, &lt;span style=&quot;font-weight: bold;&quot;&gt;You better pick a new PWD FAST.&lt;/span&gt; Trust no-one, not even your yourself.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;EDIT INCLUDES MINOR GRAMmATICAL/SPELLING CHANGES.&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/06/password-cracking-and-security-part-1.html</link><author>noreply@blogger.com (AEL)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyuDfDEKgg04zoprxZEXBj6A77QhcdvBH4itSwXR5BJTRtlyPip07toj23ihN6t4s_5WiOlTiAqiqpnfRT32u6z0rBmbzUQlPGRsw45G0J1SEm6woVi7L70bPWGZ-nb4ZwTwu6NdzTbCQ/s72-c/keyboard_password.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-3085451525110493871</guid><pubDate>Fri, 13 Jul 2007 22:52:00 +0000</pubDate><atom:updated>2008-12-10T11:53:00.102-05:00</atom:updated><title>PDF Viruses on Yahoo? nah-uh</title><description>During the last few weeks I have received about 3 PDF Containing Emails from people&lt;br /&gt;I didn&#39;t know on my yahoo Email account. Then today while I was working at a customer&#39;s I was alerted to the fact that she had opened one of the PDF files, mistaking it for a legit attachment, so I knew I needed to find out whether it was dangerous or not.&lt;br /&gt;&lt;br /&gt;I began searching for the answer to whether it was a virus or just spam. According to &lt;a href=&quot;http://www.google.com/search?q=pdf+viruses&quot;&gt;various sites&lt;/a&gt; and Antivirus software, this round is just a spamming ploy to make money.&lt;br /&gt;&lt;br /&gt;I opened the PDF on my Windows XP PC and scanned it with AVG, and Norton (via yahoo&#39;s scanner.)&lt;br /&gt;No virus was found, and the contents of the PDF showed:&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD8YW8D8wTRzd8eVNTDSiqmTGVJ3avBBpzbSTpLixV8ygf8PdOX51w5meF6t06inaqbBWVi4vuMFhptwWQk8X2tQ5-6gXuz179xin8LU_Zd87mTxsDwic13EKPEUfWJIr-wXyOxIH2DEI/s1600-h/Spam_PDF.JPG&quot;&gt;&lt;img style=&quot;cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD8YW8D8wTRzd8eVNTDSiqmTGVJ3avBBpzbSTpLixV8ygf8PdOX51w5meF6t06inaqbBWVi4vuMFhptwWQk8X2tQ5-6gXuz179xin8LU_Zd87mTxsDwic13EKPEUfWJIr-wXyOxIH2DEI/s320/Spam_PDF.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5086818354131032946&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The name of this particular file was &quot;check_50290cba35810.pdf&quot; but I have seen many other names.&lt;br /&gt;&lt;br /&gt;I tried a simple Google search on SZSN, It appears that this Chinese company may be paying spammers in order to get to get the word out about there new seed and products. Header information could not verify the location of the spammer (no surprise). I can&#39;t help wondering if something was really happening with a virus this Morning and has yet to turn up.&lt;br /&gt;&lt;br /&gt;But I can only guess the spammer is working out of China which ranks in the top 10 nations for illegal piracy and activity.  The disguise of the PDF and the crooked print attempt to make it look more legitimate... to the spam blocker software.&lt;br /&gt;&lt;br /&gt;This is something that has become more and more of a problem, spammers get paid to spam. These people have created a new profession which has a paycheck in the thousands or even millions.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Resources:&lt;br /&gt;&lt;a href=&quot;http://chris.pirillo.com/media/2007/07/02/pdf-viruses/&quot;&gt;http://chris.pirillo.com/media/2007/07/02/pdf-viruses/&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://chris.pirillo.com/media/2007/07/02/pdf-viruses/&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/07/pdf-viruses-on-yahoo-nah-uh.html</link><author>noreply@blogger.com (AEL)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD8YW8D8wTRzd8eVNTDSiqmTGVJ3avBBpzbSTpLixV8ygf8PdOX51w5meF6t06inaqbBWVi4vuMFhptwWQk8X2tQ5-6gXuz179xin8LU_Zd87mTxsDwic13EKPEUfWJIr-wXyOxIH2DEI/s72-c/Spam_PDF.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-202247010734373836</guid><pubDate>Fri, 06 Jul 2007 03:31:00 +0000</pubDate><atom:updated>2007-07-05T23:49:39.878-04:00</atom:updated><title>Antivirus Test and Results in</title><description>After testing several Antivirus and spyware protection programs against over &lt;span style=&quot;font-family:Tahoma;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;&lt;strong&gt;174,770&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; viruses and malware, &lt;a href=&quot;http://Virus.gr&quot;&gt;Virus.GR&lt;/a&gt; a list has been compiled on how well different security applications have held up:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: georgia;font-family:Tahoma;font-size:100%;&quot;  &gt;Testing was done on an up to date Windows XP Professional SP2 on a P4 3000 Mhz, 1024MB    DDRAM. &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;Each program was customized to maximize its ability to detect and remove the nasties.&lt;br /&gt;&lt;br /&gt;This test does not include DOS scanners and scanned file types: &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-family:Tahoma;font-size:100%;&quot;  &gt; SH, ELF, COM, EXE, PL, BAT, PRC, DOC, XLS, BIN, MDB, IMG, PPT, VBS, MSG, VBA, OLE, HTM, INI, SMM, TD0, REG, CLASS, HTA, JS, VI_, URL, PHP, WMF, HLP, XML, SCR, PIF, SHS, WBT, CSC, MAC, DAT, CLS, STI, INF, HQX, XMI, SIT.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;And just for the record: Anyone trying to use Norton or Macafee and protect them self from viruses/malware is going to get infected soon or later (most likely sooner rather than later) ... which is why I am posting this list.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;(list provided by &lt;a href=&quot;http://www.virus.gr/english/fullxml/&quot; target=&quot;_blank&quot;&gt;virus.gr&lt;/a&gt;, partial information &lt;a href=&quot;http://www.techdo.com/?p=62&quot;&gt;www.techdo.com&lt;/a&gt;)&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;margin-right: 0px;&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;1.   &lt;/span&gt;&lt;a href=&quot;http://www.kaspersky.com/beta?product=193384471&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;Kaspersky version 7.0.0.43 beta&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; -  99.23%&lt;br /&gt;2.  &lt;/span&gt;&lt;a href=&quot;http://usa.kaspersky.com/products_services/anti-virus.php&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;Kaspersky version 6.0.2.614&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; -  99.13%&lt;br /&gt;3.  &lt;/span&gt;&lt;a href=&quot;http://www.activevirusshield.com/antivirus/freeav/index.adp?&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;Active Virus Shield by AOL version 6.0.0.308&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; - 99.13%&lt;br /&gt;4.  &lt;/span&gt;&lt;a href=&quot;http://www.zonealarm.com/store/content/catalog/catalog_main.jsp&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;ZoneAlarm with KAV Antivirus version 7.0.337.000&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; - 99.13%&lt;br /&gt;5.  &lt;/span&gt;&lt;a href=&quot;http://www.f-secure.com/home_user/products_a-z/fsis2007.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;F-Secure 2007 version 7.01.128&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; -  98.56%&lt;br /&gt;6.  &lt;/span&gt;&lt;a href=&quot;http://www.bitdefender.com/site/view/comp.html?itxt_link=SiteHome&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;BitDefender Professional version 10&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; -  97.70%&lt;br /&gt;7.  &lt;/span&gt;&lt;a href=&quot;http://www.bullguard.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;BullGuard version  7.0.0.23&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; - 96.59%&lt;br /&gt;8.  &lt;/span&gt;&lt;a href=&quot;http://www.ashampoo.com/frontend/products/php/product.php?session_langid=2&amp;idstring=0045&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;Ashampoo version 1.30&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; -  95.80%&lt;br /&gt;9.  &lt;/span&gt;&lt;a href=&quot;http://www.mwti.net/products/escan/escan_antivirus/escanantivirus.asp&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;eScan version 8.0.671.1&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; - 94.43%&lt;br /&gt;10.  &lt;/span&gt;&lt;a href=&quot;http://eset.com/products/workstations.php&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;Nod32 version  2.70.32&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; - 94.00%&lt;br /&gt;11. &lt;/span&gt;&lt;a href=&quot;http://www.cyberscrub.com/products/antivirus/features.php&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;CyberScrub version 1.0&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; - 93.27%&lt;br /&gt;12.  &lt;/span&gt;&lt;a href=&quot;http://www.avast.com/index.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;Avast Professional  version 4.7.986&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; - 92.82%&lt;br /&gt;13. &lt;/span&gt;&lt;a href=&quot;http://www3.grisoft.com/doc/products-avg-anti-malware/us/crp/0&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;AVG Anti-Malware version 7.5.465&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; -  92.14%&lt;br /&gt;14. &lt;/span&gt;&lt;a href=&quot;http://www.f-prot.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;F-Prot version  6.0.6.4&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; - 91.35%&lt;br /&gt;15. &lt;/span&gt;&lt;a href=&quot;http://www.mcafee.com/us/enterprise/products/anti_virus/file_servers_desktops/virusscan_enterprise_80i.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;McAfee Enterprise version 8.5.0i+AntiSpyware module&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; - 90.65%&lt;br /&gt;16. &lt;/span&gt;&lt;a href=&quot;http://www.pandasoftware.com/download&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;Panda 2007  version 2.01.00&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; - 90.06%&lt;br /&gt;17. &lt;/span&gt;&lt;a href=&quot;http://www.norman.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;Norman version  5.90.37&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; - 88.47%&lt;br /&gt;18. &lt;/span&gt;&lt;a href=&quot;http://www.arcabit.com/download_product.html?product=ArcaVirWin2007&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;ArcaVir 2007&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; - 88.24%&lt;br /&gt;19. &lt;/span&gt;&lt;a href=&quot;http://us.mcafee.com/root/package.asp?pkgid=276&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;McAfee  version 11.0.213&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; - 86.13%&lt;br /&gt;20. &lt;/span&gt;&lt;a href=&quot;http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&amp;amp;pvid=nav2007&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;Norton Professional 2007&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt; -  86.08%&lt;/span&gt;&lt;/p&gt; &lt;p&gt;Then the following applications trailing behind:&lt;br /&gt;21. Rising AV version 19.19.42 - 85.46%&lt;br /&gt;22. Dr. Web version 4.33.2 - 85.09%&lt;br /&gt;23. PC-Cillin 2007 version 15.00.1450 - 84.96%&lt;br /&gt;24. Iolo version 1.1.8 - 83.35%&lt;br /&gt;25. Virus Chaser version 5.0a - 79.51%&lt;br /&gt;26. VBA32 version 3.11.4 - 77.66%&lt;br /&gt;27. Sophos Sweep version 6.5.1 - 69.79%&lt;br /&gt;28. ViRobot Expert version 5.0 - 69.53%&lt;br /&gt;29. Antiy Ghostbusters version 5.2.1 - 65.95%&lt;br /&gt;30. Zondex Guard version 5.4.2 - 63.79%&lt;br /&gt;31. Vexira 2006 version 5.002.62 - 60.07%&lt;br /&gt;32. V3 Internet Security version 2007.04.21.00 - 55.09%&lt;br /&gt;33. Comodo version 2.0.12.47 beta - 53.94%&lt;br /&gt;34. Comodo version 1.1.0.3 - 53.39%&lt;br /&gt;35. A-Squared Anti-Malware version 2.1 - 52.69%&lt;br /&gt;36. Ikarus version 5.19 - 50.56%&lt;br /&gt;37. Digital Patrol version 5.00.37 - 49.80%&lt;br /&gt;38. ClamWin version 0.90.1 - 47.95%&lt;br /&gt;39. Quick Heal version 9.00 - 38.64%&lt;br /&gt;40. Solo version 5.1 build 5.7.3 - 34.52%&lt;br /&gt;41. Protector Plus version 8.0.A02 - 33.13%&lt;br /&gt;42. PcClear version 1.0.4.3 - 27.14%&lt;br /&gt;43. AntiTrojan Shield version 2.1.0.14 - 20.25%&lt;br /&gt;44. PC Door Guard version 4.2.0.35- 19.95%&lt;br /&gt;45. Trojan Hunter version 4.6.930 - 19.20%&lt;br /&gt;46. VirIT version 6.1.75 - 18.78%&lt;br /&gt;47. E-Trust PestPatrol version 8.0.0.6 - 11.80%&lt;br /&gt;48. Trojan Remover version 6.6.0 - 10.44%&lt;br /&gt;49. The Cleaner version 4.2.4319 - 7.26%&lt;br /&gt;50. True Sword version 4.2 - 2.20%&lt;br /&gt;51. Hacker Eliminator version 1.2 - 1.43%&lt;br /&gt;52. Abacre version 1.4 - 0.00%&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/07/antivirus-test-and-results-in.html</link><author>noreply@blogger.com (AEL)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-820505345957678773</guid><pubDate>Sun, 10 Jun 2007 00:13:00 +0000</pubDate><atom:updated>2007-06-09T20:24:48.299-04:00</atom:updated><title>Hacking Defined</title><description>This is a essay that I did a while a back and I though I would post since it defines the various types of hackers and dismisses some common misconceptions about this group of people. As with the my other posts, you may use this for your educational use with out question --- provided you give me credit. If you would like to use my work for profit you can make a request &lt;a href=&quot;mailto:aelshupit+blog@gmail.com&quot;&gt;here&lt;/a&gt;. Enjoy ;-)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; text-align: center;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;&lt;strong&gt;Hackers: Protectors of  Computers&lt;o p=&quot;&quot;&gt;&lt;/o&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; text-indent: 0.5in;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;o p=&quot;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/o&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; text-indent: 0.5in;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;“What is a hacker?” seems like it has an obvious answer,  but it does not. Right now I bet you are thinking about some kind of evil crook  that tries to break into a company’s, or individual’s, computer in order to  steal private information. Though this may be true, a &lt;u&gt;hacker&lt;/u&gt; is just  someone “who is proficient at using or programming a computer” (“Hacker”). There  are two types of hackers. Black hat hackers give hacking a bad name; they break  into computers to destroy them or to steal data. White hat hackers look for  vulnerabilities in a computer system to make the owner and data safer. Script  kiddies, amateurs, and elite hackers, the three skill levels of hacking, can be  either black hats or white hats. &lt;o p=&quot;&quot;&gt;&lt;/o&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; text-indent: 0.5in;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;In the book, &lt;i style=&quot;&quot;&gt;Hack  Proofing&lt;/i&gt;, Jeff Forristal explains the differences between white hats (also  called ethical hackers) and black hats (or malicious hackers). The term “ethical  hacking occurs anytime you are ‘testing the limits’” concerning a piece of  software or hardware you, or your affiliates, have created (10). Those hacking  as black hats can be labeled as “malicious hackers … [who] exploit a weakness …  lead to theft, a DDoS attack [&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;denial of service], or  defacing of a website” (10). There is also the question that some people may  ask: when “is it … okay for someone to … poke around in some manner in search of  an exploitable weakness?” (11). &lt;o p=&quot;&quot;&gt;&lt;/o&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;          &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;There are many companies that hire  white hat hackers in order to prevent black hats from taking over. In Jeff  Forristal’s book, which tells businesses how to protect their websites, he  recommends, “the best possible way to focus on security … is to begin to think  like a hacker” (32). Another suggestion is to “invite a hacker into your code.  Think security from every level” (527). He is basically saying in order to  protect your system and data, you must know the way they think and try to  observe the methods they use to hack into your system.&lt;o p=&quot;&quot;&gt;&lt;/o&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; text-indent: 0.5in;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;The most novice hackers, script kiddies, do not know  what they are doing or what the rules of hacking are. They think it is “kool” to  hack government or company computer systems and, therefore, they can create much  damage and be traced easily. Christopher J. Coyne from the Department of  Economics at &lt;st1 st=&quot;on&quot; w=&quot;&quot; place=&quot;&quot;&gt;&lt;st1 st=&quot;on&quot; w=&quot;&quot; placename=&quot;&quot;&gt;Hampden-Sydney&lt;/st1&gt;&lt;st1 st=&quot;on&quot; w=&quot;&quot; placetype=&quot;&quot;&gt;College&lt;/st1&gt;&lt;/st1&gt; stated, “inferior programming skills prevent them  from creating effective hacking programs” (17). Most of the time, they are just  trying to “gain notoriety for the damage they cause using the programs and  information created by more elite hackers” (17); this is why they are called  “script” kiddies.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; text-indent: 0.5in;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;Amateur hackers are between script kiddies and elite  hackers. They have good knowledge of hacking rules and how to get what they  want. They many times can’t be traced easily. They may use a backdoor, a way of  running an undetectable code on a host’s system that requires no login or  confirmation (Forristal, 196). These people hack for enjoyment, although some  could still be using it as a way to show off.&lt;span style=&quot;&quot;&gt;   &lt;/span&gt;&lt;o p=&quot;&quot;&gt;&lt;/o&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; text-indent: 0.5in;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;Elite hackers are the most proficient; their success and  recognition among their peers makes them “the cream of the underground” (Coyne,  21). They could be thought of as hacker’s heroes, or leaders, since they “are  the most innovative in the underground and are responsible for making hacking  programs publicly available” (21). Some start out as “individuals who used to  hack illegally” and, on their own or by being caught, ended up as ethical  hackers and/or hired as security analyzers (21). This “‘hiring a hacker’” has  great advantages because the new “security professional is familiar with the  methods used by hackers” (Forristal 11). They still may hack for fun, but a lot  of the time, these “hackers sell their skills at finding security weaknesses in  computer systems.” (Coyne, 21).&lt;o p=&quot;&quot;&gt;&lt;/o&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; text-indent: 0.5in;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;Governments, computer businesses, and individuals pay in  order to have hackers test their security by inviting them to hack into their  computer systems. It takes hours, weeks, and even months to move from script  kiddie to amateur; and many years to obtain the well deserved “rank” of elite  hacker. &lt;o p=&quot;&quot;&gt;&lt;/o&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;o p=&quot;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/o&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;o p=&quot;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/o&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;o p=&quot;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/o&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt 0.5in; text-indent: -0.5in;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;Coyne, Christopher J. and Peter T. Leeson.  “The  Economics of Computer Hacking.” &lt;u&gt;&lt;span style=&quot;&quot;&gt;Journal of Law, Economics, and  Policy&lt;/span&gt;&lt;/u&gt; 1 (&lt;span style=&quot;&quot;&gt;2006):  511-532.&lt;span style=&quot;color: rgb(52, 52, 102);&quot;&gt;&lt;o p=&quot;&quot;&gt;&lt;/o&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt 0.5in; text-indent: -0.5in;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;Forristal, Jeff. &lt;u&gt;Hack Proofing: Your Web  Applications&lt;/u&gt;. Ed. Julie Traxler. &lt;st1 st=&quot;on&quot; w=&quot;&quot; place=&quot;&quot;&gt;&lt;st1 st=&quot;on&quot; w=&quot;&quot; state=&quot;&quot;&gt;Massachusetts&lt;/st1&gt;&lt;/st1&gt;: Syngress Publishing, 2001.&lt;o p=&quot;&quot;&gt;&lt;/o&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;“Hacker.” &lt;u&gt;The &lt;st1 st=&quot;on&quot; w=&quot;&quot; place=&quot;&quot;&gt;&lt;st1 st=&quot;on&quot; w=&quot;&quot; placename=&quot;&quot;&gt;American&lt;/st1&gt;&lt;st1 st=&quot;on&quot; w=&quot;&quot; placename=&quot;&quot;&gt;Heritage&lt;/st1&gt;&lt;st1 st=&quot;on&quot; w=&quot;&quot; placetype=&quot;&quot;&gt;College&lt;/st1&gt;&lt;/st1&gt; Dictionary&lt;/u&gt;. 4&lt;sup&gt;th&lt;/sup&gt; ed. 2004&lt;o p=&quot;&quot;&gt;&lt;/o&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;/span&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/06/hacking-defined.html</link><author>noreply@blogger.com (AEL)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-2898621003487279265</guid><pubDate>Mon, 04 Jun 2007 06:34:00 +0000</pubDate><atom:updated>2007-06-04T01:48:00.955-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking security technolgy safety internet netbios LAN WAN Networks</category><title>Netbios hacking, art/crime of</title><description>Netbios hacking is the art( or crime) or attacking a Window&#39;s Machine using the underlying file transfer protocol setup by Microsoft for file sharing. Almost every Microsoft Windows computer connected to a network, whether it be fiber optics, cable, DSL, Home or Business  Network or even dialup has the opportunity to be invaded by a Netbios attack. Many newer PCs have this feature turned off but a lot of times people share certain folders/files with others on the network, not using secure passwords or being careful about what they share.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;Scroll to the bottom to get the simple quick attack.&lt;br /&gt;&lt;br /&gt;Basics:&lt;br /&gt;&lt;/span&gt;IP addresses defined:&lt;br /&gt;&lt;br /&gt;First to understand how a netbios attack is done you must understand how a network works. Every network that has a computer or device(e.g. Palm Pad) on it has provides an individual number called an Internet Protocol (IP) address to each device in the form of X.X.X.X (e.g. 192.168.1.1) This can be compared to a house address in the real world. The first 2 Numbers are the &quot;Street address&quot; and are specific to the network/ISP that the device uses. (e.g. 192.168.X.X = a local address, and &lt;b&gt;64.12&lt;/b&gt;.X.X would be a AOL network) and the last 2 numbers are for the individual computer or &quot;House&quot;.&lt;br /&gt;&lt;br /&gt;Ports defined:&lt;br /&gt;For each IP address, their are ports that open so that applications can talk to the various other parts of the web. port 80 is for web browsing, port 21 is for File Transfer Protocol. You can think of each port as the &quot;name&quot; of a person at a particular house.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;THE HOW TO:&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;ol&gt;&lt;li&gt;For netbios attack to work all you need is the ip address of your target. You can find this  by going to command prompt (Start --&gt; Run, type CMD) Then at the black screen type &quot;ipconfig&quot;  look for some numbers in the form of &quot;IP address . . . . . . :X.X.X.X&quot;&lt;br /&gt;That is your IP address.&lt;/li&gt;&lt;li&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://img451.imageshack.us/img451/4075/netbiosipconfiggc3.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 333px; height: 113px;&quot; src=&quot;http://img451.imageshack.us/img451/4075/netbiosipconfiggc3.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;The computer can either be on a &lt;span style=&quot;font-weight: bold;&quot;&gt;WAN(Wide area network)&lt;/span&gt; or a &lt;span style=&quot;font-weight: bold;&quot;&gt;LAN (Local Area Network)&lt;/span&gt;. &lt;span style=&quot;color: rgb(0, 153, 0);&quot;&gt;A WAN IP address is the IP that shows up on the Internet and allows computers from around the world to contact your PC. Note: A router on a LAN will have it&#39;s own WAN IP address that it shares with other PCs.&lt;/span&gt; A LAN is a Home or business network that only computers at the same location (hence the name Local) can access. Normally if you are on a LAN you connect to the internet through a router, and all requests to talk to your PC go through that.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;The way to tell what you have is to look at the first numbers of your IP address from &quot;ipconfig&quot;. If the first 2 #s are &quot;192.168.X.X&quot;, &quot;10.10.X.X&quot;, or &quot;&lt;span style=&quot;font-family:Arial;&quot;&gt;172.1&lt;span style=&quot;font-size:100%;&quot;&gt;6.X.X&quot; then you have a LAN. Any other first 2 #s mean you are directly connected to the WAN without any router protection.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 153);&quot;&gt;For a LAN&lt;/span&gt; if you want to get into your PC from the internet you have to go through a router. You have to know the WAN of the router and set it up correctly. To find the WAN ip address, go to &lt;a href=&quot;http://www.nwtools.com/&quot;&gt;http://www.nwtools.com&lt;/a&gt; from any PC connected to the router with internet access(copy the numbers in the box-- middle screen. That is the IP address.). &lt;/span&gt;&lt;/span&gt;Your router also has to be setup to allow your PC to connect directly to the  Net, via &lt;a href=&quot;http://portforward.com/routers.htm&quot;&gt;port forwarding&lt;/a&gt; or &lt;a href=&quot;http://www.blogger.com/searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213891,00.html&quot;&gt;DMZ &lt;/a&gt;pass through. --- Check your router&#39;s manual for more information.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 153, 0);&quot;&gt;For a WAN without a Router&lt;/span&gt;, simply use ipconfig and copy the IP address you see.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Intruders can get your IP address just by sending you to their site, having you look/send them and Email, installing software on your PC, by network wide port scan(will talk about this later), or by various other means. If they only get your router you are fairly safe, but if they catch you without a router (e.g. a hotel, hotspot or other LAN) they can get inside more easily.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;For testing purposes I recommending setting up a network with at least 2 computers on it. (you could also use a &lt;a href=&quot;http://www.microsoft.com/windows/products/winfamily/virtualpc/default.mspx&quot;&gt;virtual machine&lt;/a&gt; on a single PC, you will need a Windows setup disk handy)&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Once you have the IP address, it is time to do something called a port scan. This will tell you what programs are running and communicating with the outside world using that IP address. Netbios use ports &lt;a href=&quot;http://www.nacs.uci.edu/security/netbios.html&quot;&gt;135, 137-139, and 445&lt;/a&gt; .(Full list of ports: &lt;a href=&quot;http://www.chebucto.ns.ca/%7Erakerman/port-table.html&quot;&gt;here&lt;/a&gt;) There are many port scanners that can be used:&lt;br /&gt;&lt;a href=&quot;http://www.snapfiles.com/get/angryip.html&quot;&gt;&lt;br /&gt;Angry IP Scanner: http://www.snapfiles.com/get/angryip.html&lt;/a&gt; (easiest and fastest, though not always the most anonymous)&lt;br /&gt;&lt;a href=&quot;http://download.insecure.org/nmap/dist/nmap-4.20-setup.exe&quot;&gt;&lt;br /&gt;Nmap&lt;/a&gt;:http://download.insecure.org/nmap/dist/nmap-4.20-setup.exe  (requires &lt;a href=&quot;http://www.winpcap.org/install/bin/WinPcap_4_0.exe&quot;&gt;WinCap &lt;/a&gt;  and isn&#39;t as easy to install, but has a whole score of options)&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;I will show how to do this with Angry IP Scanner since that is the easiest/ Try Nmap if you want more options and are comfortable with command prompt:&lt;br /&gt;&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;&quot;&gt;a.&lt;span style=&quot;&quot;&gt;       &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Open Angry IP scanner (the file called &quot;ipscan.exe&quot;)  &lt;span style=&quot;&quot;&gt;&lt;br /&gt;&lt;br /&gt;b.&lt;span style=&quot;&quot;&gt;      &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Put Ip range as X.X.X.X to X.X.X.X. (e.g. 192.168.1.1 to 192.168.1.1)  &lt;span style=&quot;&quot;&gt;&lt;br /&gt;&lt;br /&gt;c.&lt;span style=&quot;&quot;&gt;       &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;You could have more than 1 IP address: X.X.X.X to X.X.X.Z (e.g. 192.168.1.1 to 192.168.1.3) This would be if you where hacking more than 1 PC.  &lt;span style=&quot;&quot;&gt;&lt;br /&gt;&lt;br /&gt;d.&lt;span style=&quot;&quot;&gt;      &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Click Options --&gt; Select Ports…  &lt;span style=&quot;&quot;&gt;&lt;br /&gt;&lt;br /&gt;e.&lt;span style=&quot;&quot;&gt;       &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Fill in port field with “135, 137-139, 445” all the ports used by netbios  &lt;span style=&quot;&quot;&gt;&lt;br /&gt;&lt;br /&gt;f.&lt;span style=&quot;&quot;&gt;        &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Click “OK”, and then “Start”&lt;span style=&quot;&quot;&gt;&lt;br /&gt;&lt;br /&gt;g.&lt;span style=&quot;&quot;&gt;       &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;It will then pop up with a window showing alive hosts, note the number. Click Ok and Scroll through the list  till you see the host with ping column = X ms&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Now if you see alive host = 1 on the end message it means you can go further, but if it says 1 dead host then it most likely has a firewall and it can&#39;t be netbios hacked.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;The next thing to do is find out what is open via those ports... so open command prompt (Start--&gt; Run Type &quot;Cmd&quot;) type in nbtstat -a X.X.X.X this will give a list of what is open via NetBios.&lt;/li&gt;&lt;li&gt;Now look for a &lt;20&gt; next to the computers name i should look like:&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://img370.imageshack.us/img370/9198/netbioscmdzg9.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 331px; height: 138px;&quot; src=&quot;http://img370.imageshack.us/img370/9198/netbioscmdzg9.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;20&gt; is the code for netbios.&lt;a href=&quot;http://imageshack.us/&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Now we need to use &lt;a href=&quot;http://sourceforge.net/project/showfiles.php?group_id=15870&amp;package_id=15574&amp;amp;release_id=328573&quot;&gt;winfingerprint &lt;/a&gt;( www.winfingerprint.com) so that we can get a little more info about what Netbios shares that are open. A &quot;share&quot; is a folder or Drive (Hard drive, CD rom drive, etc) that is open to other Computers on the network. If this share has a weak password or no password then anybody can easily get in and access whatever is in that folder or drive.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Once winfingerprint is installed select the check boxes &quot;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;single host&lt;/span&gt;&quot;,&quot;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;Win32 Os Version&lt;/span&gt;&quot;, &quot;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;null IPC$ sessions&lt;/span&gt;&quot;,&quot;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;NetBIOS shares&lt;/span&gt;, &quot;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;users&lt;/span&gt;&quot;, &quot;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;disks&lt;/span&gt;&quot;, &quot;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;groups&lt;/span&gt;&quot;,&quot;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;RPC bindings&lt;/span&gt;&quot;, &quot;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;Patch Level&lt;/span&gt;&quot;, &quot;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;MAC address&lt;/span&gt;&quot;, &quot;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;Sessions&lt;/span&gt;&quot; and &quot;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;Event log&lt;/span&gt;&quot;  This will give you a huge array of information to work with. (don&#39;t worry I will tell you what to do with your little &quot;gold mine&quot; lol )&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Type the ip address of the victim PC in the box below &quot;single Host&quot; and Click Scan.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://img213.imageshack.us/img213/7221/netbioswinfingerprintti3.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px;&quot; src=&quot;http://img213.imageshack.us/img213/7221/netbioswinfingerprintti3.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;When it finishes(it could take a min or 2) scroll down the list till you see &quot;NetBios Shares&quot;&lt;br /&gt;copy these down or leave the window open you will need them later. Also copy the name of the users under &quot;Users:&quot; -- Provided their are any.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Open a command prompt again and type &lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;net use  {insert share name here} &quot;&quot; /u:&quot;&quot;&lt;/span&gt;  for the share name you may want to try \\X.X.X.X\IPC$  first. This is a default share that comes up on most machines, though it may not be on the target you are testing. &lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Next type: &lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;net use * &quot;\\X.X.X.X\C$&quot;&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(204, 153, 51);&quot;&gt; * /u:adminstrator&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;If &quot;administrator&quot; doesn&#39;t work try some of the other usernames that you got from Winfingerprint. You will need to guess the password, good ones to try are:&lt;br /&gt;(blank), password, password1, pass, admin, administrator, whatever you can think of.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Repeat for each share that showed up in winfingerprint.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;If you get &quot;Error 5 access ... access is denied.&quot; or Other errors:&lt;a href=&quot;http://www.chicagotech.net/systemerrors.htm&quot;&gt;http://www.chicagotech.net/systemerrors.htm&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;You can hunt for more shares by typing &quot;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;net view X.X.X.X&lt;/span&gt;&quot; for the shares you see substitute &quot;C$&quot; for the share (e.g. if the share was &quot;Drive 2&quot; you would type &quot;&lt;span style=&quot;color: rgb(255, 204, 51); font-weight: bold;&quot;&gt;net use &quot;\\X.X.X.X\D&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 204, 51); font-weight: bold;&quot;&gt;rive 2&quot;&lt;/span&gt; &quot; note: put quotes around ip and share.)&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;(if you can guess the password skip to #17, otherwise continue with #16)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;NOTE: &lt;/span&gt;&lt;span style=&quot;color: rgb(255, 0, 0); font-weight: bold;&quot;&gt;I will talk more about password cracking in a future post. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; Download &lt;a href=&quot;http://www.cotse.com/tools/sw/nat10bin.zip&quot;&gt;NAT (http://www.cotse.com/tools/sw/nat10bin.zip) to&lt;/a&gt; begin trying multi combination passwords. Extract  all the files in to 1 folder. Then go into command prompt and type &quot; &lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;C:\Foldername\nat.exe -u userlist.txt -p password.txt X.X.X.X&lt;/span&gt; &quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;If you still have no cookie, try downloading another list of passwords off of google by searching &quot;filetype:txt passlist.txt&quot;. Download the file and put it in the folder with NAT overwriting the file &quot;passlist.txt&quot;. Type &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&quot; &lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;C:\Foldername\nat.exe -u userlist.txt -p password.txt X.X.X.X&lt;/span&gt; &quot; in command prompt again.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;You now have done everything you can do to get Netbios access. If you can&#39;t get in now, then most likely the computer is secure from a Netbios hack.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;If you get the password and have seen &quot;command completed successfully&quot;(after doing &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt;net use * &quot;\\X.X.X.X\C$&quot;&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(204, 153, 51); font-weight: bold;&quot;&gt; * /u:USER&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; . Open windows explorer. You will see a new drive (it may have a different icon too) . This drive is the drive of the other PC.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;You have hacked in. With this power you can put in backdoors, programs that allow you to get in even if the computer&#39;s netbios is turned off and passwords are changed. This is why it is not a good idea to go online with a brand new PC and now Protection.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 0, 0);&quot;&gt;&lt;br /&gt;&lt;br /&gt;Quick check:&lt;/span&gt;&lt;br /&gt;You can test simply if their are any open shared folders/drives on your network by running &lt;a href=&quot;http://www.snapfiles.com/get/angryip.html&quot;&gt;Angry IP scanner&lt;/a&gt; and putting in the IP address for all PCs on the network. (e.g. if 192.168. is the first 2 numbers: 192.168.1.1 to 192.168.1.255) This will test all PCs on your network and let you know which ones have open shares, you then can right click on the computer and select explorer to see what is open for viewing. &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;THIS IS FAST, BUT NOT DOESN&#39;T TEST EVERY ACCESS OPTION... fyi&lt;/span&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;END NOTES:&lt;/b&gt;&lt;br /&gt;You now have the basic idea of how someone could/will enter your system. Even if you weren&#39;t able to get access you have a better understanding of the importance of having a firewall. The firewalls I recommend are:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.download.com/ZoneAlarm/3000-10435_4-10653297.html?tag=lst-0-1&quot;&gt;Free Zone Alarm&lt;/a&gt;(Works well with all Windows systems, and is more protective/customizable). &lt;a href=&quot;http://support.microsoft.com/kb/283673&quot;&gt;&lt;br /&gt;Windows Firewall(only good in Vista and XP)&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;They seem to do the best job with less hassle (Pick only 1 though, or you might have problems). &lt;a href=&quot;http://www.mcafee.com/&quot;&gt;Mcafee &lt;/a&gt;and &lt;a href=&quot;http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&amp;pvid=nis2007&quot;&gt;Norton Internet Security 2007 &lt;/a&gt;are good and will protect you well, I just feel that over the years these programs have been blown up and take advantage of too many system resources --- Slowing the computer down.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;Another thing that you can do to protect yourself is to turn off file sharing. For Win2000, XP:&lt;/p&gt;  &lt;ol style=&quot;margin-top: 0in;&quot; start=&quot;1&quot; type=&quot;a&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Start      --&gt; control panel --&gt; network connections. &lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Look      for the connection(s) you use to connect to the internet. &lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Right      click and select Properties. &lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Uncheck      “File and printer sharing for Microsoft windows” &lt;/li&gt;&lt;/ol&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;(to my knowledge &lt;st1:place st=&quot;on&quot;&gt;Vista&lt;/st1:place&gt; doesn’t allow file sharing by default)&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0); font-weight: bold;&quot;&gt;WARNING&lt;/span&gt;: Don’t do these steps if you are using a school, work, or other pc that you don’t have permission to change settings on, or if you do printing/file sharing over your network.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;Finally it is a good idea to have a router to route your internet through, it proves what is called&lt;/o:p&gt; a hardware firewall.&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Hopefully with what you now know, you will be able to avoid becoming a victim of NetBios hacking. :-)&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;b style=&quot;&quot;&gt;DOWNLOADS &amp; Sites:&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;b style=&quot;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;Angry IP Scanner: &lt;a href=&quot;http://www.snapfiles.com/get/angryip.html&quot;&gt;http://www.snapfiles.com/get/angryip.html&lt;/a&gt;&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;|&lt;span style=&quot;&quot;&gt;   &lt;/span&gt;&lt;a href=&quot;http://www.plunder.com/-download-64504.htm&quot;&gt;mirror 1&lt;/a&gt; |&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;u&gt;&lt;span style=&quot;color:blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/u&gt;Nmap: &lt;a href=&quot;http://download.insecure.org/nmap/dist/nmap-4.20-setup.exe&quot;&gt;http://download.insecure.org/nmap/dist/nmap-4.20-setup.exe&lt;/a&gt; | &lt;a href=&quot;http://www.plunder.com/-download-64505.htm&quot;&gt;mirror 1&lt;/a&gt; |&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;WinCap: &lt;a href=&quot;http://www.winpcap.org/install/bin/WinPcap_4_0.exe&quot;&gt;http://www.winpcap.org/install/bin/WinPcap_4_0.exe&lt;/a&gt; |&lt;a href=&quot;http://www.plunder.com/-download-64510.htm&quot;&gt; mirror 1 &lt;/a&gt;|&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;Winfingerprint: &lt;a href=&quot;http://sourceforge.net/project/showfiles.php?group_id=15870&amp;amp;package_id=15574&amp;release_id=328573&quot;&gt;http://sourceforge.net/project/showfiles.php?group_id=15870&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;package_id=15574&amp;amp;release_id=328573&lt;/a&gt;&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;| &lt;a href=&quot;http://www.plunder.com/-download-64507.htm&quot;&gt;mirror 1&lt;/a&gt; |&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;Net Command Error List: &lt;span style=&quot;color:black;&quot;&gt;&lt;a href=&quot;http://www.chicagotech.net/systemerrors.htm&quot;&gt;http://www.chicagotech.net/systemerrors.htm&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;color:black;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;color:black;&quot;&gt;NAT: &lt;a href=&quot;http://www.cotse.com/tools/sw/nat10bin.zip&quot;&gt;http://www.cotse.com/tools/sw/nat10bin.zip&lt;/a&gt;&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;| &lt;a href=&quot;http://www.plunder.com/-download-64509.htm&quot;&gt;mirror 1&lt;/a&gt; |&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;Password list: &lt;a href=&quot;http://amsterdam1.plunder.com/2798/passlist.txt&quot;&gt;http://amsterdam1.plunder.com/2798/&lt;b&gt;passlist&lt;/b&gt;.txt&lt;/a&gt;&lt;span class=&quot;a&quot;&gt; &lt;/span&gt;&lt;span class=&quot;a&quot;&gt;&lt;span style=&quot;font-size:10;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;Free Zone Alarm 7.0: &lt;a href=&quot;http://www.download.com/ZoneAlarm/3000-10435_4-10653297.html?tag=lst-0-1&quot;&gt;http://www.download.com/ZoneAlarm/3000-10435_4-10653297.html?tag=lst-0-1&lt;/a&gt; | &lt;a href=&quot;http://www.snapfiles.com/download/dlzonealarm.html&quot;&gt;mirror 1&lt;/a&gt;(ver. 6.5) |&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;Windows firewall instructions: &lt;a href=&quot;http://support.microsoft.com/kb/283673&quot;&gt;http://support.microsoft.com/kb/283673&lt;/a&gt; &lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/06/netbios-hacking-artcrime-of.html</link><author>noreply@blogger.com (AEL)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-78974632986307803</guid><pubDate>Sun, 20 May 2007 17:23:00 +0000</pubDate><atom:updated>2007-05-20T13:39:38.425-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Korean Limewire translation money P2P</category><title>LimeWire - P2P File Sharing (translation needed)</title><description>Limewire, the largest P2P file sharing application, has offered a &lt;span style=&quot;font-weight: bold;&quot;&gt;$350&lt;/span&gt; insentive and a &lt;span style=&quot;font-weight: bold;&quot;&gt;free copy of Limewire Pro&lt;/span&gt; to any one who can translate their program into Korean.&lt;br /&gt;&lt;br /&gt;Since the majoraty of Limewire&#39;s &quot;sharing&quot; is not always legal it is a wonder they haven&#39;t done this sooner. Korea happends to be one of the largest pirate Nations in the world ranking 11th according to a study done by the &lt;a href=&quot;http://209.85.165.104/search?q=cache:2u5GiHmumdYJ:www.bsa.org/globalstudy/loader.cfm%3Furl%3D/commonspot/security/getfile.cfm%26pageid%3D16947%26hitboxdone%3Dyes+2007+online+Piracy+rankings+from+United+States&amp;hl=en&amp;amp;amp;amp;amp;amp;amp;amp;amp;ct=clnk&amp;cd=4&amp;amp;gl=us&quot;&gt;Business Software Alliance (page 6, table 2)&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;In order to translate the program Limewire wants a simple, but complete translation and they don&#39;t want you just blindly trying to do it with an online translator. Technical knowledge is not needed since all you have to do is modify a message bundle text file.&lt;br /&gt;&lt;blockquote&gt;&lt;br /&gt;&lt;code&gt;&lt;span style=&quot;color: rgb(0, 51, 0);&quot;&gt; #### SEARCH_DOWNLOAD_BUTTON_LABEL=Download&lt;/span&gt; &lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt;(this was the english line)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 51, 0);&quot;&gt;SEARCH_DOWNLOAD_BUTTON_LABEL=Charger&lt;/span&gt; &lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt;(this is the french line edit)&lt;/span&gt;&lt;br /&gt;&lt;/code&gt;&lt;/blockquote&gt;&lt;code&gt;&lt;/code&gt;&lt;a href=&quot;http://209.85.165.104/search?q=cache:2u5GiHmumdYJ:www.bsa.org/globalstudy/loader.cfm%3Furl%3D/commonspot/security/getfile.cfm%26pageid%3D16947%26hitboxdone%3Dyes+2007+online+Piracy+rankings+from+United+States&amp;hl=en&amp;amp;amp;amp;amp;amp;amp;amp;amp;ct=clnk&amp;cd=4&amp;amp;gl=us&quot;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Currenty Limewire is working to support over 70 differnet Languages, many of these projects are listed as less than 1% complete. (Only Korean is the one they show having a bountie.)&lt;br /&gt;&lt;br /&gt;So if you think you might want to pick up some money to pay for that Korean class you took and aren&#39;t using (not to mention an upgrade on your, um,  &quot;legal&quot; music downloads bandwidth) check out: &lt;a href=&quot;http://www.limewire.org/translate.shtml&quot;&gt;http://www.limewire.org/translate.shtml&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/05/limewire-p2p-file-sharing-translation.html</link><author>noreply@blogger.com (AEL)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8605480630942877120.post-3848577536823972782</guid><pubDate>Sun, 20 May 2007 04:42:00 +0000</pubDate><atom:updated>2007-06-01T13:48:25.412-04:00</atom:updated><title>Myspace Redirection information</title><description>&lt;p class=&quot;MsoNormal&quot;&gt;As you probably know(or if you don&#39;t you had better google), &lt;a href=&quot;http://www.myspace.com/&quot;&gt;Myspace&lt;/a&gt;, &lt;a href=&quot;http://www.facebook.com/&quot;&gt;Facebook&lt;/a&gt;, &lt;a href=&quot;http://www.virb.com/&quot;&gt;Virb &lt;/a&gt;and many other social sites have become leaders in the Web 2.0 revolution. Web 2.0 is a term used for any site that allows the reader to input information, instead of just reading. A example would be the Comment box below this blog.&lt;br /&gt;&lt;br /&gt;Anyway, the problem with these &quot;social club&quot; sites is that they contain pictures, posts, and Personal Messages(PMs) from one user to another. If someone steals your password and login, they can access all your stuff. The How To below shows you an example of a fake Myspace site that could be used to capture your email, password, and ip address. Hopefully this will give you a better understanding of what to look out for when Signing in.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;THE HOW TO:&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://preview.tinyurl.com/2a6bkb&quot;&gt;&lt;b&gt;&lt;span style=&quot;color:red;&quot;&gt;Really it is simple to make, but if your Lazy like me and just want to see it working scroll down --- I have a demo below :-). &lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;ol start=&quot;1&quot; type=&quot;1&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;First you create an account      that can use PHP on a website such as &lt;a href=&quot;http://110mb.com/&quot;&gt;110mb.com      &lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Next you select a domain name such      as myspace.110mb.com&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Then you go to myspace&#39;s      website and look at one of their pages that requires you to login the following      worked for me: (&lt;a href=&quot;http://login.myspace.com/index.cfm?fuseaction=login.process&amp;Mytoken=B0353D2A-7D79-427D-8F37FD877955882728990127&quot;&gt;http://login.myspace.com/index.cfm?fuseaction=login.process&amp;amp;Mytoken=B0353D2A-7D79-427D-8F37FD877955882728990127&lt;/a&gt;)&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;The page should say &quot;      You Must Be Logged-In to do That!&quot;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;right click on the page and      select view source, copy that the contents into a text file(most of the      time notepad works best)&lt;span style=&quot;color:yellow;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;You want the source and not a downloaded/ Save As      copy because the pictures and java links should link back to myspace, not      your server. (e.g instead of linking to      http://110mb.com/pictures/image.jpg it will be      http://myspace.com/pictures/image.jpg)&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Add the following to the      bottom of the file(see comments for more info about what is what): &lt;a href=&quot;http://aelshupit.googlepages.com/myspace_code.txt&quot;&gt;&lt;br /&gt;http://aelshupit.googlepages.com/myspace_code.txt&lt;/a&gt; (just copy the code      from the file to the bottom of the one with the source code)&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Next, search for:&quot;&lt;span style=&quot;color: rgb(204, 153, 51);&quot;&gt;tr valign=&quot;top&quot; bgcolor=&quot;FFFFFF&quot;&gt;&lt;/span&gt;&quot;      (should be below a table, about line 290)&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;color: rgb(255, 204, 51);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;And      add:  &lt;a href=&quot;http://aelshupit.googlepages.com/myspace_code2.txt&quot;&gt;http://aelshupit.googlepages.com/myspace_code2.txt&lt;/a&gt;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;/ol&gt;  &lt;ol start=&quot;9&quot; type=&quot;1&quot;&gt;&lt;li class=&quot;MsoNormal&quot;  style=&quot;color:black;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;save      the file with a .php extention (e.g. myspace.php Note you need to select      &quot;all files&quot; otherwise it will throw a .txt extension on the end      even though named .php)&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot;  style=&quot;color:black;&quot;&gt;Also Create a txt file with      the name &quot;myspace_boom.txt&quot;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; color=&quot;black&quot;&gt; &lt;span style=&quot;color:black;&quot;&gt;Upload both &quot;myspace.php&quot; and &quot;myspace_boom.txt&quot; to the 110mb.com site or the php site you are using via FTP. I use &lt;a href=&quot;http://sourceforge.net/project/showfiles.php?group_id=21558&quot;&gt;filezilla&lt;/a&gt; but you can use what ever you like so long as you can set permisions. The permissions of &quot;myspace_boom.txt&quot; HAVE to be 775 otherwise it can&#39;t be written to.&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;color: black;&quot;&gt; &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;..... OK YOUR DONE&lt;/span&gt;, goto the site you have and open the myspace.php file. Type in the password and email, then wait for the link to go redirect to the content. Now open myspace_boom.txt in your browser or FTP App. it should have the Email, password, and IP address for you.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;span style=&quot;color:black;&quot;&gt;&lt;/span&gt;  &lt;form&gt;  &lt;/form&gt;    &lt;form&gt;  &lt;/form&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 12pt 0.5in;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt; &lt;br /&gt;&lt;p class=&quot;MsoNormal&quot;&gt;it should look something like this: &lt;a href=&quot;http://tinyurl.com/27wddp&quot;&gt;CLICK ME For THE DEMO!&lt;/a&gt;&lt;/p&gt;  Click here for &lt;a href=&quot;http://tinyurl.com/2hq3hy&quot;&gt;Username, Password and IP address&lt;/a&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot;&gt;(note how I hide the link)&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 12pt 0.5in;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;END NOTES.&lt;/span&gt;&lt;br /&gt;The only way you can tell that you are on a legit page for login is by looking in the address bar, everything else can look official, but that is the hardest thing to spoof (meaning fake). Myspace tells you to do this every time you login, but you probably ignore it or don&#39;t check, it is important you do this to insure you don&#39;t get your stuff stolen --- provided you care ;-). This type of password redirection does not stop with myspace the basic concept can be used for paypal, Email login sites, websites, and other &lt;a href=&quot;http://en.wikipedia.org/wiki/Phishing&quot;&gt;phishing &lt;/a&gt;scams.   &lt;!--[if !supportLineBreakNewLine]--&gt;  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Its simple. I write IT, you read IT.&lt;/div&gt;</description><link>http://aneliteleader.blogspot.com/2007/05/myspace-redirection-information.html</link><author>noreply@blogger.com (AEL)</author></item></channel></rss>