<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4345114366424812305</id><updated>2024-11-08T21:10:21.943+05:30</updated><category term="News"/><category term="TipsTricks"/><category term="General"/><category term="Tutorials"/><category term="United States"/><category term="Website Hacking"/><category term="Anonymous"/><category term="Facebook"/><category term="Hacking"/><category term="How-To&#39;s"/><category term="SocialMedia"/><category term="WebTips"/><category term="Contest"/><category term="Google"/><category term="India"/><category term="Jailbreak"/><category term="Phone Hacking"/><category term="Tools"/><category term="United Kingdom"/><category term="Windows"/><category term="Blackberry"/><category term="Censorship"/><category term="Challenges"/><category term="Chicago"/><category term="China"/><category term="Computer Hacking"/><category term="Congress"/><category term="Data Theft"/><category term="Downloads"/><category term="Facebook Hacking"/><category term="Fraud"/><category term="Giveaway"/><category term="Government"/><category term="Infographic"/><category term="Kunal Bamankar"/><category term="Nepal"/><category term="Pakistan"/><category term="Phishing"/><category term="Pirates"/><category term="RIM"/><category term="Schemer"/><category term="Security"/><category term="Steve Jobs"/><category term="Supreme Court"/><category term="Twitter"/><category term="Vista"/><category term="WiFi"/><category term="ZTE"/><title type='text'>The Hackers Ville</title><subtitle type='html'>The Hackers Ville (THV) actively covers all news, happenings, development, software reviews, basic hacks, tips and tricks, guides and tutorials, programming and script writing around the world of hacking. Over time we have moved on to cover the web tips, coputing tips and system tweaks to boost the speed of everyday technology.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>24</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-662255555769030468</id><published>2012-05-28T14:00:00.000+05:30</published><updated>2012-05-28T14:00:54.632+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Censorship"/><category scheme="http://www.blogger.com/atom/ns#" term="Government"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="India"/><category scheme="http://www.blogger.com/atom/ns#" term="Website Hacking"/><title type='text'>Anonymous Hacks BJP Websites To Protest Against Internet Censorship</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;BJP&#39;s two website has been hacked by anonymous hacker group to protest against Internet censorship.through its twitter account- @opindia_back ,the group announced www.mumbaibjp.org and www.bjpmp.org were defaced. The announced to protest against &quot;web censorship&quot; in India on June 9.&amp;nbsp;&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Report says that home page of victim shows a message posted by hackers and they also posted&amp;nbsp;YouTube&amp;nbsp;links on Mumbai &amp;nbsp; BJP website. Earlier, Reliance servers was hacked by anonymous group, users were blocked to access&amp;nbsp;Facebook&amp;nbsp;and twitter. Instead &amp;nbsp;users were directed to page featuring a slogan against the Indian government &amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPHkyZSpaQ6rPFTwLW5cylSfL5UyPT8DZGbTre_7r4AqtPfGsaKLDlTkoVwbngB5g0kHDldJTxiOp-5RbNgXLuw1F9SXB_wSovGh4u5F45nBJGvTOEncgqxjt04poSB_HzzRS1NP-16iU/s1600/BJP.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPHkyZSpaQ6rPFTwLW5cylSfL5UyPT8DZGbTre_7r4AqtPfGsaKLDlTkoVwbngB5g0kHDldJTxiOp-5RbNgXLuw1F9SXB_wSovGh4u5F45nBJGvTOEncgqxjt04poSB_HzzRS1NP-16iU/s1600/BJP.JPG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;“There are many people asking us how they can support us for what we are gonna do on 9th June. We thank you for offering your support, please wait for a while and we will share the Deep Web Links with you when the time comes, we don&#39;t want them to be taken down by security agencies before we plan the attack. Till then, you may help us by spreading this Page over to your friends and ask them to Join Us.”&amp;nbsp;&lt;a href=&quot;http://www.thehackersville.com/search/label/Anonymous&quot; target=&quot;_blank&quot;&gt;Anonymous&lt;/a&gt;, meanwhile, has also created a &lt;a href=&quot;http://www.facebook.com/pages/Anonymous-India/274481662568783&quot; target=&quot;_blank&quot;&gt;Facebook page&lt;/a&gt; to garner more support to its efforts. In one of its Facebook posts, the group said.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Anonymous group claimed responsibility for cyber-attacks on host Indian government website after the government blocked sites such as Daily Motions, Pastebins, Vimeo and The Pirate Bay &amp;amp;&amp;nbsp;protest is still on and government is only claiming that the location has been traced and they are trying to reach hackers group.&amp;nbsp;Now whats the next target of Anonymous group?&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/662255555769030468/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/662255555769030468' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/662255555769030468'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/662255555769030468'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2012/05/anonymous-hacks-bjp-websites-to-protest.html' title='Anonymous Hacks BJP Websites To Protest Against Internet Censorship'/><author><name>Kunal Bamankar</name><uri>http://www.blogger.com/profile/11162221570217510565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPHkyZSpaQ6rPFTwLW5cylSfL5UyPT8DZGbTre_7r4AqtPfGsaKLDlTkoVwbngB5g0kHDldJTxiOp-5RbNgXLuw1F9SXB_wSovGh4u5F45nBJGvTOEncgqxjt04poSB_HzzRS1NP-16iU/s72-c/BJP.JPG" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-3466734201640086862</id><published>2012-05-20T23:39:00.001+05:30</published><updated>2012-05-20T23:39:29.466+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Chicago"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="United States"/><category scheme="http://www.blogger.com/atom/ns#" term="Website Hacking"/><title type='text'>Anonymous Hackers Claim To Take Down Chicago Police Website</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Law enforcement officials are investigating a possible cyber attack on the City of Chicago’s website. The website of a Chicago Police Department is down, and the Anonymous group of hackers are taking the credit for that action. It is the part of a protest in Chicago against the NATO summit, where U.S. President Barack Obama is meeting with world leaders.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Activists from Anonymous group are protesting against NATO’s policies. They are actually the holding signs such as “War (equals) Debt,” and “NATO, Go Home.” Members of the hacker group Anonymous, calling themselves “AntiS3curityOPS,” &amp;amp; posted a video on YouTube with an ominous message to the Chicago Police Department. But, the video was later taken from public view. We have added a full transcript of the video to this post.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6TRhXNTMlELE0lJRBPsc3-6_SI_wq83TVrnt1KlDccnHyefEZQNxn_AumhT-qgwvjU9IExP8mx3a-vYuNAaxXyQpwSZ84UFUpLbup08GV2pjWxhbGLrrENRQCeZrbejPagsM6OJ-26eY/s1600/Anonymus+Hackers.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6TRhXNTMlELE0lJRBPsc3-6_SI_wq83TVrnt1KlDccnHyefEZQNxn_AumhT-qgwvjU9IExP8mx3a-vYuNAaxXyQpwSZ84UFUpLbup08GV2pjWxhbGLrrENRQCeZrbejPagsM6OJ-26eY/s320/Anonymus+Hackers.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
In the bold video manifesto, the group responded to what it perceived as police brutality against the protesters on Saturday night and vowed to take action:&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;“We are actively engaged in actions against the Chicago Police Department, and encourage anyone to take up the cause and use the AntiS3curityOPS Anonymous banner. For those able, &lt;a href=&quot;http://chicagopolice.org/&quot;&gt;chicagopolice.org&lt;/a&gt; should be fired upon as much as possible. We are in your harbor Chicago, and you will not forget us.”&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Here’s a transcript from the Anonymous video that has since been removed:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Greetings fellow citizens of the world. We are AntiS3curityOPS.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&quot;While this has come to no surprise, the NATO protests are already reaching a boiling point. As tonight we have already witnessed the Chicago Police Dept sending out a request for two water cannons deployed on Michigan Avenue, which the protesters briefly were able to close off the street completely. Just a few moments ago we witnessed cops on horses seemingly all too content with the destiny that has turned their hearts cold, trampling over protesters trying to intimidate. And you know what we saw during this? Protesters locking arms and holding their ground. A few had Anonymous masks on, a few were girls who looked like they belonged safely off on the sidelines bravely charging cops with shields and on horse. All the while the protesters are chanting “Take those animals off those horses,” drowning out any attempts by the Chicago police to get a word in. Everyone of you are heros to us.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;What we saw tonight watching a bit of the protest was everyday, average people fighting back and finally refusing to stand down. The NATO Summit is being utilized in such a way, and we couldn’t have predicted it more accurately. On the video we saw mothers, teenagers, elderly, the anarchists, white, black, Hispanic — this movement sees no skin color. Every sort of person is well represented in these actions.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;This is not a time to have our differences divide us; this is a time we all need to come together and rally around our brothers and sisters bravely in the streets of Chicago risking their lives to make the one voice they have, heard. If every single one of us has a voice, one opinion, let us unite and show the violent Chicago police, and the government big brother tactics that we are not going to take this.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;We are actively engaged in actions against the Chicago Police&amp;nbsp;Department, and encourage anyone to take up the cause and use the AntiS3curityOPS Anonymous banner. For those able, &lt;a href=&quot;http://chicagopolice.org/&quot;&gt;chicagopolice.org&lt;/a&gt; should be fired upon as much as possible. We are in your harbor Chicago, and you will not forget us.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;So for those unable to engage in attacks online by ddos, share with everyone you know what’s presently going on in Chicago, Tweet celebrities on twitter with the #SolidarityWithChicago #FuckNATO #FTP hashtags and get it trending. Also keep watching the live feeds, and spreading the live feed links all relevant places. Together, we the people, are going to take the power back.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;We are AntiS3curityOPS.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;We are Anonymous.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;We are legion.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;We do not forget.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;We do not forgive.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;Chicago Police Department, expect us.&quot;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
According to the &lt;a href=&quot;http://www.suntimes.com/news/metro/12656378-418/city-of-chicago-website-may-be-under-cyber-attack.html&quot; target=&quot;_blank&quot;&gt;Chicago Sun-Times&lt;/a&gt;, Police are investigating the possible hacking of the city of Chicago’s website. The law enforcement officials told the AP late Saturday that, they planned to arrest people committing violent acts. &lt;i&gt;“If anything else happens, the plan is to go in and get the people who create the violent acts, take them out of the crowd and arrest them. We’re not going to charge the crowd wholesale.”&lt;/i&gt; - Said by police superintendent Garry McCarthy,.&lt;br /&gt;
&lt;br /&gt;
At press time, the site, &lt;a href=&quot;http://cityofchicago.org/&quot;&gt;CityofChicago.org&lt;/a&gt; was still inaccessible. According to &lt;a href=&quot;http://www.cyberwarnews.info/2012/05/20/nato-taken-offline-by-anonymous/&quot; target=&quot;_blank&quot;&gt;Cyber War News&lt;/a&gt;, the Anonymous group also claimed to have taken the &lt;a href=&quot;http://www.cyberwarnews.info/2012/05/20/nato-taken-offline-by-anonymous/&quot; target=&quot;_blank&quot;&gt;NATO website&lt;/a&gt; offline, but it was accessible early Sunday afternoon.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/3466734201640086862/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/3466734201640086862' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/3466734201640086862'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/3466734201640086862'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2012/05/anonymous-hackers-claim-to-take-down.html' title='Anonymous Hackers Claim To Take Down Chicago Police Website'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6TRhXNTMlELE0lJRBPsc3-6_SI_wq83TVrnt1KlDccnHyefEZQNxn_AumhT-qgwvjU9IExP8mx3a-vYuNAaxXyQpwSZ84UFUpLbup08GV2pjWxhbGLrrENRQCeZrbejPagsM6OJ-26eY/s72-c/Anonymus+Hackers.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-2803825266982183486</id><published>2012-05-20T17:04:00.001+05:30</published><updated>2012-05-20T17:04:25.342+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Pakistan"/><category scheme="http://www.blogger.com/atom/ns#" term="SocialMedia"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter"/><title type='text'>Microblogging Site Twitter Blocked In Several Parts Of Pakistan</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;The news report for today is coming from Pakistan, the authorities have blocked the access to Twitter in several parts of the country. Interior Minister Rehman Malik&#39;s claim that no restrictions were being imposed on the micro-blogging site. There was no official word on the development, but users from different parts of Pakistan, especially Islamabad and the nearby garrison city of Rawalpindi,&amp;nbsp;reported that they were unable to access the site.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
The people from those regions were unable to access the site on their computers and mobile phones. The move came hours after Interior Minister Malik himself tweeted early this morning that the government had no plans to impose restrictions on Twitter and Facebook.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrDJc7d2yUuTyaPikArmV-scg65kL9gl3uxkVGXeYmzfTJpDWj3mF5WONex57EMdMiSqyCjLpIHpaqKfABPC4ru_p680amOYrveWKlI0Q9qzN5UFpGalJt44VoSOsnzqjx_GPA2cW44Cs/s1600/Twittr.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrDJc7d2yUuTyaPikArmV-scg65kL9gl3uxkVGXeYmzfTJpDWj3mF5WONex57EMdMiSqyCjLpIHpaqKfABPC4ru_p680amOYrveWKlI0Q9qzN5UFpGalJt44VoSOsnzqjx_GPA2cW44Cs/s1600/Twittr.JPG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&quot;Dear all, I assure u that Twitter and Facebook&amp;nbsp;will continue in our country and it will not be blocked. Pl do not believe in rumors.&quot; - Interior Minister Rehman Malik said in the tweet early in this morning.&lt;br /&gt;
&lt;br /&gt;
Yesterday, TV news channels had quoted Information Technology Minister Raja Parvez Ashraf. &amp;nbsp;He was saying that the government could restrict access to Twitter and Facebook as the sites were being used to circulate blasphemous caricatures. In the past, the Lahore High Court was ridiculed by Internet users and commentators after it briefly banned Facebook over blasphemous caricatures of Prophet Mohammed.&lt;br /&gt;
&lt;br /&gt;
Civil society and rights groups and activists have made use of Twitter in several recent campaigns. The government recently dropped plans to acquire sophisticated equipment to block and monitor websites after a campaign on Twitter and several other websites.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/2803825266982183486/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/2803825266982183486' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/2803825266982183486'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/2803825266982183486'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2012/05/microblogging-site-twitter-blocked-in.html' title='Microblogging Site Twitter Blocked In Several Parts Of Pakistan'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrDJc7d2yUuTyaPikArmV-scg65kL9gl3uxkVGXeYmzfTJpDWj3mF5WONex57EMdMiSqyCjLpIHpaqKfABPC4ru_p680amOYrveWKlI0Q9qzN5UFpGalJt44VoSOsnzqjx_GPA2cW44Cs/s72-c/Twittr.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-6706812971541235434</id><published>2012-05-18T21:14:00.001+05:30</published><updated>2012-05-18T21:15:00.144+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="TipsTricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi"/><title type='text'>Tips To Protect Your Wi-Fi Connection</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Wi-Fi is a popular technology that allows an electronic device to exchange data wirelessly using radio waves over a computer network. It includes high-speed Internet connections. The Wi-Fi Alliance defines Wi-Fi as any &quot;wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers&#39; (IEEE) 802.11 standards&quot;.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
However, since most modern WLANs are based on these standards, the term &quot;Wi-Fi&quot; is used in general English as a synonym for &quot;WLAN&quot;. Although not all wireless appliances are Wi-Fi certified, so it’s advisable from us to use certified equipment to maintain interoperability and security.&lt;br /&gt;
&lt;br /&gt;
Because to its wireless nature, it’s easier for hackers to access your Wi-Fi connection without breaking into your home or entering your compound and stealing sensitive information or using your Internet connection for free. Hackers can also use your wireless Internet connection to commit online fraud, hacking accounts and leave you paying for crime you never committed.&lt;br /&gt;
&lt;br /&gt;
So we are here for you as your security suit with some basic &amp;amp; advance tips to protect your Wi-Fi connection. Below we have&amp;nbsp;mentioned&amp;nbsp;some basic &amp;amp; advance tips to protect your Wi-Fi connection. Go through it:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqcmqeLENbJE09_yE9PgC8bz5vuG4V5_I7igAWnCZ2bQvEq58jK2hyphenhyphenAvHu30GUpGkL1YYL73oJLpZaVIdtHWHKz8p7okzIeItPcIhzup5i963gCHJ87IGC58BrzsIww5ijOniNd7rIW-k/s1600/WiFi.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqcmqeLENbJE09_yE9PgC8bz5vuG4V5_I7igAWnCZ2bQvEq58jK2hyphenhyphenAvHu30GUpGkL1YYL73oJLpZaVIdtHWHKz8p7okzIeItPcIhzup5i963gCHJ87IGC58BrzsIww5ijOniNd7rIW-k/s320/WiFi.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;Secure physical access to your wireless access point:&lt;/span&gt;&lt;br /&gt;
It is not easy to mount the wireless access point in a location. If it is in a public place, the wireless access point mounted at a position that cannot be reached without a ladder and probably an area can be covered by a security camera. Restricting physical access leads towards the maximum layer of protection and it allows remote access only.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;Secure administration and SSID (Service Set Identifier):&lt;/span&gt;&lt;br /&gt;
Most of the people, always leaves the default administration and SSID settings on an access point. Most default&amp;nbsp;username&amp;nbsp;and password for various wireless access points are available from the Internet. In such case, if a hacker sniffs your Wi-Fi connection and finds a SSID of Linksys, he will get to know the default password and username, that is “admin”.&lt;br /&gt;
&lt;br /&gt;
Also, you can disable SSID broadcasting and change it as per your wish for you or your users. In addition, also disable the remote administration &amp;amp; configure the administration from an IP address. Also&amp;nbsp;don&#39;t forget to keep this IP address as a secret.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;Use WPA or WPA-2 instead of WEP encryption:&lt;/span&gt;&lt;br /&gt;
Basically WEP (Wired Equivalency Privacy) encryption is not at all strong and you shouldn’t be implement it unless a connecting device does not use other encryption standards. You must change to WPA (Wi-Fi Protected Access) or WPA-2 if it supports your devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;Prevent signal leaking:&lt;/span&gt;&lt;br /&gt;
You can carry your laptop or wireless device outside your house and always keep it busy with walking if the wireless signal is weak. If the signal is weak then you can reduce the power of your access point transmitter or you can also use Omni directional antennas. This will prevent war driving. War driving can used &amp;nbsp;when hacker drives around with a wireless scanner looking for wireless networks that are leaking to the outside.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;Keep your Wi-Fi equipment up-to-date:&lt;/span&gt;&lt;br /&gt;
Manufacturers always release firmware upgrades and patches it to address security and performance issues on their products. To get the benefits from this, always ensure that you are regularly checking for updates and install them on your devices. If possible subscribe to the manufacturer’s website so that you will get notified via e-mail when a new firmware upgrade will release.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;For advanced users, set up monitoring and strict authorization:&lt;/span&gt;&lt;br /&gt;
When you are using a wireless network, You always have to monitor the visitors &amp;amp; their access levels. Do not allow you visitors to access the business files or data that exists on your home file server. You can also use Access Control List (ACL), MAC address filtering, VLANs (Virtual Local Area Networks). For extra authentication, you can set up the RADIUS server.&lt;br /&gt;
&lt;br /&gt;
Create user account and password on the RADIUS server. Once a user has correctly identified the SSID, the access point will check the MAC address and grant access levels are depends on you configuration settings. A user is then prompted to enter username and password by the RADIUS server. If a user fails to login, then he will not be able to access your home network.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/6706812971541235434/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/6706812971541235434' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/6706812971541235434'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/6706812971541235434'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2012/05/tips-to-protect-your-wi-fi-connection.html' title='Tips To Protect Your Wi-Fi Connection'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqcmqeLENbJE09_yE9PgC8bz5vuG4V5_I7igAWnCZ2bQvEq58jK2hyphenhyphenAvHu30GUpGkL1YYL73oJLpZaVIdtHWHKz8p7okzIeItPcIhzup5i963gCHJ87IGC58BrzsIww5ijOniNd7rIW-k/s72-c/WiFi.gif" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-3543944264585573402</id><published>2012-05-18T18:38:00.001+05:30</published><updated>2012-05-18T18:38:25.357+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Jailbreak"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="United Kingdom"/><category scheme="http://www.blogger.com/atom/ns#" term="United States"/><title type='text'>Facebook Hacker Sentenced To Jail For A Year</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;A 21-year-old British hacker who accessed a U.S. citizen&#39;s Facebook account &amp;nbsp;has been sentenced to a year in prison. Gareth Crosskey, the U.K.&amp;nbsp;resident&amp;nbsp;has been sentenced to&amp;nbsp;twelve&amp;nbsp;months in jail for illegally accessing a Facebook account belonging to an unidentified individual in the U.S.&amp;nbsp;The guy was accused of hacking into the American’s Facebook account on January 12, 2011.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
After being contacted by the victim, the Federal Bureau of Investigation (FBI)&amp;nbsp;started&amp;nbsp;looking into the case last year. The FBI traced the source of the hack to the U.K., where the inquiry had to leave American hands. U.S. agents thus contacted Scotland Yard to take over and the Metropolitan Police Central e-crime Unit (PCeU) tracked down the suspect.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK90SkJNLfbsNCXWUy_yS2bZNuOBdOBWDzpcY7js7wwUU_2aLbVJDvAEh1PQdJKUDj6OrmroEPNeVVitnk_gWMuYqMoJkO_SVHYrBVNIjTGRUc5UXzC4o0lzeqgJuJjpm5YKDHfduTvog/s1600/Facebook.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK90SkJNLfbsNCXWUy_yS2bZNuOBdOBWDzpcY7js7wwUU_2aLbVJDvAEh1PQdJKUDj6OrmroEPNeVVitnk_gWMuYqMoJkO_SVHYrBVNIjTGRUc5UXzC4o0lzeqgJuJjpm5YKDHfduTvog/s400/Facebook.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Crosskey was arrested in July 2011 last year from his home, where authorities also seized computers and storage devices. After being released on bail on February 29, 2012, he was charged with two offenses under the UK’s Computer Misuse Act 1990. He was convicted on Wednesday and now he will now serve a year in prison.&lt;br /&gt;
&lt;br /&gt;
He pled guilty to both counts, using a computer to gain unauthorised access to a program/data as well as performing unauthorised acts with intent to impair operation to prevent the access to a computer. We not aware with the purpose of Crosskey’s breach, whether it was an act of malicious intent or to test his own capabilities.&lt;br /&gt;
&lt;br /&gt;
“The PCeU are working to detect and bring before the courts those responsible for this type of offence. Today’s result should act as a&amp;nbsp;deterrent&amp;nbsp;to any individuals thinking of participating in this type of criminal activity,” a PCeU spokesperson said in a statement. “By taking swift action, PCeU officers were able to quickly detain Crosskey thereby preventing further disruption to the victim.&lt;br /&gt;
&lt;br /&gt;
Image Source: &lt;a href=&quot;http://www.inquisitr.com/100702/is-evidence-gathered-from-social-media-the-future-of-litigation/businessman-in-suit-with-hands-in-handcuffs/&quot; target=&quot;_blank&quot;&gt;[THE INQUISITR]&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/3543944264585573402/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/3543944264585573402' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/3543944264585573402'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/3543944264585573402'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2012/05/facebook-hacker-sentenced-to-jail-for.html' title='Facebook Hacker Sentenced To Jail For A Year'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK90SkJNLfbsNCXWUy_yS2bZNuOBdOBWDzpcY7js7wwUU_2aLbVJDvAEh1PQdJKUDj6OrmroEPNeVVitnk_gWMuYqMoJkO_SVHYrBVNIjTGRUc5UXzC4o0lzeqgJuJjpm5YKDHfduTvog/s72-c/Facebook.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-422055215184124170</id><published>2012-05-18T16:38:00.000+05:30</published><updated>2012-05-18T16:38:04.476+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="China"/><category scheme="http://www.blogger.com/atom/ns#" term="Phone Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="United States"/><category scheme="http://www.blogger.com/atom/ns#" term="ZTE"/><title type='text'>ZTE Confirms Security Hole In U.S Phone</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;ZTE Corp, the world&#39;s No.4 handset vendor and one of two Chinese companies under U.S. scrutiny over security concerns, said one of its mobile phone models sold in the United States contains a vulnerability that researchers say could allow others to control the device.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
The hole affects ZTE&#39;s Score model that runs on Google Inc&#39;s Android operating system and was described by one researcher as &quot;highly unusual.&quot;&lt;br /&gt;
&lt;br /&gt;
&quot;I&#39;ve never seen it before,&quot; said Dmitri Alperovitch, co-founder of cybersecurity firm, CrowdStrike. The hole, usually called a backdoor, allows anyone with the hardwired password to access the affected phone, he added. ZTE said it had confirmed the vulnerability on the Score phone, but denied it affected other models.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8nriS93bto5wBet8alY4ljGzVczSP2Ii6OasYQwUNGTnV8HkRkPQvj2HNg9aHv6iHXcFhkiGsXlnLgcHN97IkzHV1Ne8d_KQcIEg3IAkIp0lVuz4wGZ1K2bIS6jm1g2zmaVcBuLJnHpAB/s1600/zte.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;141&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8nriS93bto5wBet8alY4ljGzVczSP2Ii6OasYQwUNGTnV8HkRkPQvj2HNg9aHv6iHXcFhkiGsXlnLgcHN97IkzHV1Ne8d_KQcIEg3IAkIp0lVuz4wGZ1K2bIS6jm1g2zmaVcBuLJnHpAB/s400/zte.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
ZTE and fellow Chinese telecommunications equipment manufacturer, Huawei Technologies Co Ltd, have been stymied in their attempts to expand in the United States over concerns they are linked to the Chinese government, though both companies have denied this.&lt;br /&gt;
&lt;br /&gt;
Most such concerns have centered on the fear of backdoors or other security vulnerabilities in telecommunications infrastructure equipment rather than in consumer devices.&lt;br /&gt;
&lt;br /&gt;
Last month a U.S. congressional panel singled out Huawei and ZTE by approving a measure designed to search and clear the U.S. nuclear-weapons complex of any technology produced by the two companies.&lt;br /&gt;
&lt;br /&gt;
Reports of the ZTE vulnerability first surfaced this week in an anonymous posting on the code-sharing website, pastebin.com. Others have since alleged that other ZTE models, including the Skate, also contain the vulnerability. The password is readily available online.&lt;br /&gt;
&lt;br /&gt;
&quot;ZTE is actively working on a security patch and expects to send the update over-the-air to affected users in the very near future,&quot; ZTE said in an emailed statement. &quot;We strongly urge affected users to download and install the patch as soon as it is rolled out to their devices.&quot;&lt;br /&gt;
&lt;br /&gt;
Alperovitch said his team had researched the vulnerability and found that the backdoor was deliberate because it was being used as a way for ZTE to update the phone&#39;s software. It is a question, he said, of whether the purpose was malicious or just sloppy programming.&lt;br /&gt;
&lt;br /&gt;
While security researchers have highlighted security holes in Android and other mobile operating systems, it is rare to find a vulnerability apparently inserted by the hardware manufacturer.&lt;br /&gt;
&lt;br /&gt;
&quot;I have never seen this before. There are rumors about backdoors in Chinese equipment floating around,&quot; Alperovitch said. &quot;That&#39;s why it&#39;s so shocking to see it blatantly on a device.&quot;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/422055215184124170/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/422055215184124170' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/422055215184124170'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/422055215184124170'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2012/05/zte-confirms-security-hole-in-us-phone.html' title='ZTE Confirms Security Hole In U.S Phone'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8nriS93bto5wBet8alY4ljGzVczSP2Ii6OasYQwUNGTnV8HkRkPQvj2HNg9aHv6iHXcFhkiGsXlnLgcHN97IkzHV1Ne8d_KQcIEg3IAkIp0lVuz4wGZ1K2bIS6jm1g2zmaVcBuLJnHpAB/s72-c/zte.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-1218582144231223782</id><published>2012-05-18T02:31:00.004+05:30</published><updated>2012-05-20T23:43:34.134+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Congress"/><category scheme="http://www.blogger.com/atom/ns#" term="India"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Supreme Court"/><category scheme="http://www.blogger.com/atom/ns#" term="Website Hacking"/><title type='text'>Supreme Court &amp; Congress Websites Hacked - Both Deny Attack</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;On a day the government said in the Rajya Sabha that, it would build consensus on rules for controlling Internet content. An international hacking group reportedly breached the websites of the ruling Congress and the Supreme Court of India. The Delhi Bar Council also claimed that its website was defaced by unidentified hackers.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Hacker group Anonymous is believed to have attacked the websites in response to the&amp;nbsp;Center&amp;nbsp;blocking torrent portal Pirate Bay and video-sharing Vimeo. The group is said to have launched “MT Operation India” to protest the government&#39;s censorship plan. While both the Congress and SC admitted their sites were down for sometime, but they denied the sites were hacked.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgssqIsp_Tgxt938uPOe45GSyCczKbU7MKCRZ-tOdNhDapLjmtnVdcAcpelWn0o6IllnEMNrWGsny2D0GjLyYozmrU9N3P0m7qMArIBg7Ih7SHWHEdRzi8-nNjhZYrLuNmpbc7j6YRvkmk/s1600/Supreme+Court+Site+Hacked%2521.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgssqIsp_Tgxt938uPOe45GSyCczKbU7MKCRZ-tOdNhDapLjmtnVdcAcpelWn0o6IllnEMNrWGsny2D0GjLyYozmrU9N3P0m7qMArIBg7Ih7SHWHEdRzi8-nNjhZYrLuNmpbc7j6YRvkmk/s1600/Supreme+Court+Site+Hacked%2521.JPG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Tweets coming in by the hacker group, opindia confirm that the security of the official websites of the Supreme Court of India and the All India Congress Committee has been compromised. Even as you&#39;re reading this, the websites - http://supremecourtofindia.nic.in, dot.gov.in and aicc.org.in have been rendered inaccessible.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
“The site is not hacked at all. It was not opening for sometime because the load on the particular server was too heavy due to huge number of hits after the news of website hacking spread. It went slow at that time due to over-traffic,” Congress party&#39;s computer department chief Vishwajeet Prithvijeet Singh said.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anonymous Central had earlier tweeted, &quot;Namaste #India, your time has come to trash the current government and install a new one. Good luck&quot;. Hackers had broken into Congress websites last December and &lt;a href=&quot;http://www.thehackersville.com/2011/12/congress-website-hacked-sonia-gandhis.html&quot; target=&quot;_blank&quot;&gt;defaced party chief Sonia Gandhi&#39;s profile page&lt;/a&gt; with objectionable material. The cyber attack coincided with Gandhi&#39;s 65th birthday.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/1218582144231223782/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/1218582144231223782' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/1218582144231223782'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/1218582144231223782'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2012/05/supreme-court-congress-websites-hacked.html' title='Supreme Court &amp; Congress Websites Hacked - Both Deny Attack'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgssqIsp_Tgxt938uPOe45GSyCczKbU7MKCRZ-tOdNhDapLjmtnVdcAcpelWn0o6IllnEMNrWGsny2D0GjLyYozmrU9N3P0m7qMArIBg7Ih7SHWHEdRzi8-nNjhZYrLuNmpbc7j6YRvkmk/s72-c/Supreme+Court+Site+Hacked%2521.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-2426510757063068168</id><published>2012-05-16T21:08:00.001+05:30</published><updated>2012-05-16T21:09:29.364+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Data Theft"/><category scheme="http://www.blogger.com/atom/ns#" term="Fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="United States"/><title type='text'>Utah Tech Director Resigns In Wake Of Data Theft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Utah&#39;s chief technology officer has recently resigned for following the theft of hundreds of thousands of online medical records from state computers by some unknown hackers. Government officer, Gary Herbert announced on Tuesday the comprehensive response to the massive data breach, including the resignation of Stephen Fletcher, director of the state&#39;s Department of Technology Services.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Last month in April, some hackers stole the personal information of about 780,000 Medicaid recipients and participants in the Children&#39;s Health Insurance Program, including the Social Security numbers of about 280,000 of them. The state has already offered the victims a free credit monitoring.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKqI2raT_P45kjtu7Xq5bpMpyNjh8ilWZmgHas-TGNaob67t7X8WiqQbjhMf1tX5v5UwP4lSt2gDg2NsysclEUhE_gsqrJxH54L1DVO01DIcvkaHwrcMeuBK0Ta1qnan41fUoVsjWLw1s/s1600/Utah+tech+director+resigns+in+wake+of+data+theft.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKqI2raT_P45kjtu7Xq5bpMpyNjh8ilWZmgHas-TGNaob67t7X8WiqQbjhMf1tX5v5UwP4lSt2gDg2NsysclEUhE_gsqrJxH54L1DVO01DIcvkaHwrcMeuBK0Ta1qnan41fUoVsjWLw1s/s400/Utah+tech+director+resigns+in+wake+of+data+theft.jpg&quot; width=&quot;292&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&quot;The incident is completely unacceptable breach of trust. The people of Utah rightly believe that their government will protect them, their families and their personal data. As a state government, we failed to honor that commitment. For that, as your governor and as a&amp;nbsp;Utah, I am deeply sorry.&quot; - Gary Herbert said that over the incident.&lt;/blockquote&gt;&lt;br /&gt;
To build &amp;amp; restore the public trust, the state has opened bidding to public relations firms until May 21 for a crisis communication plan and outreach to data breach victims. Investigators have also traced the hackers&#39; IP address to eastern Europe, but haven&#39;t identified any suspects.&lt;br /&gt;
&lt;br /&gt;
Herbert also appointed Sheila Walsh-McDonald to the new post of health data security ombudsman. She will oversee individual case management, credit counseling and public outreach.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Source&lt;/u&gt; : &lt;a href=&quot;http://www.foxnews.com/us/2012/05/15/utah-tech-director-resigns-in-wake-data-theft/&quot; target=&quot;_blank&quot;&gt;[Fox News]&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/2426510757063068168/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/2426510757063068168' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/2426510757063068168'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/2426510757063068168'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2012/05/utah-tech-director-resigns-in-wake-of.html' title='Utah Tech Director Resigns In Wake Of Data Theft'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKqI2raT_P45kjtu7Xq5bpMpyNjh8ilWZmgHas-TGNaob67t7X8WiqQbjhMf1tX5v5UwP4lSt2gDg2NsysclEUhE_gsqrJxH54L1DVO01DIcvkaHwrcMeuBK0Ta1qnan41fUoVsjWLw1s/s72-c/Utah+tech+director+resigns+in+wake+of+data+theft.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-1034793282804572554</id><published>2012-05-13T12:04:00.000+05:30</published><updated>2012-05-13T12:04:14.741+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="How-To&#39;s"/><category scheme="http://www.blogger.com/atom/ns#" term="Kunal Bamankar"/><category scheme="http://www.blogger.com/atom/ns#" term="Pirates"/><category scheme="http://www.blogger.com/atom/ns#" term="TipsTricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>How To Update Pirated Version Of Windows OS Without Get Caught</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&amp;nbsp;Sorry friends for&amp;nbsp;inconvenience. Our site was been facing from some technical problem, Now all Error has been removed. So we can provide you all Cracking and Hacking Tips and Tricks.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Here we are with Cracking Windows Pirated copy.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
As basically most of &amp;nbsp;Windows user uses a pirated copy &amp;nbsp;of it and because of this we can&#39;t able to update it.&amp;nbsp;So to Update our Pirated copy we just had to follow the steps:&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b style=&quot;background-color: #f2f2f2; font-family: Verdana, Geneva, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;1.)&lt;/b&gt;&lt;span style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;&amp;nbsp;Go to&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;Control Panel-&amp;gt;Windows Update&lt;/b&gt;&lt;span style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;. Then select&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;xx important updates are available&lt;/b&gt;&lt;span style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;. Where xx represent the no of Important Updates.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;2.)&lt;/b&gt;&lt;span style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;&amp;nbsp;There find a Update Named&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;&quot;Update For Windows 7(KB91033)&quot;&lt;/b&gt;&lt;span style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;. Note the no.&lt;/span&gt;&lt;b style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;KB971033&lt;/b&gt;&lt;span style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;. It is same for Windows XP, Vista and Windows 7.&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;background-color: #f2f2f2; font-family: Verdana, Geneva, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifIegNpl8G0pqOJZQHCl-TS4_nTI0dKjDNd-9WoEV7hxSBOw1tDcz3i6k9-iccGvFfnOWaTwPwqj3eLx_KQ0b3jdw-GauzPmy8a9mezTtQs8-efAzxNBhOJrxn4FHpPM6aWov0nJY1g3U/s1600/update_windows.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifIegNpl8G0pqOJZQHCl-TS4_nTI0dKjDNd-9WoEV7hxSBOw1tDcz3i6k9-iccGvFfnOWaTwPwqj3eLx_KQ0b3jdw-GauzPmy8a9mezTtQs8-efAzxNBhOJrxn4FHpPM6aWov0nJY1g3U/s1600/update_windows.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b style=&quot;background-color: #f2f2f2; font-family: Verdana, Geneva, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b style=&quot;background-color: #f2f2f2; font-family: Verdana, Geneva, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;3.)&lt;/b&gt;&lt;span style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;&amp;nbsp;Unchecked&amp;nbsp;that update and install the others. If you never install this(KB971033) update you never will be caught.&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;background-color: #f2f2f2; font-family: Verdana, Geneva, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, Geneva, sans-serif;&quot;&gt;Now you can try it..&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/1034793282804572554'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/1034793282804572554'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2012/05/how-to-update-pirated-version-of.html' title='How To Update Pirated Version Of Windows OS Without Get Caught'/><author><name>Kunal Bamankar</name><uri>http://www.blogger.com/profile/11162221570217510565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifIegNpl8G0pqOJZQHCl-TS4_nTI0dKjDNd-9WoEV7hxSBOw1tDcz3i6k9-iccGvFfnOWaTwPwqj3eLx_KQ0b3jdw-GauzPmy8a9mezTtQs8-efAzxNBhOJrxn4FHpPM6aWov0nJY1g3U/s72-c/update_windows.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-7102073328139328668</id><published>2011-12-12T20:52:00.008+05:30</published><updated>2011-12-15T16:18:07.946+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Contest"/><category scheme="http://www.blogger.com/atom/ns#" term="Giveaway"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Schemer"/><title type='text'>We are Giving Away 40 Invites For Google Schemer</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Google has recently launched an invitation-only website called Schemer.&amp;nbsp;The aim of this &amp;nbsp;website is to help users to discover new things and share schemes with others using Google+.&amp;nbsp;&lt;/span&gt;Users can find interesting stuff to so. They can keep track of what they want to do.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt; Also they will get ideas from celebrities, experts and friends.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBzzw4kmjAuWMauoBhrqPLtwz19_D7WxxgeHqS03NZ1avNKuFRjqqTQAD_MHw6N9xbKzWJO36cIc3gVtOzZsQLZpFAjTU4meBkA9xBOJvhuTGB9zMR-nGB7wakSKWIh2w36bi2xV9xMrc/s1600/Schemer1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;423&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBzzw4kmjAuWMauoBhrqPLtwz19_D7WxxgeHqS03NZ1avNKuFRjqqTQAD_MHw6N9xbKzWJO36cIc3gVtOzZsQLZpFAjTU4meBkA9xBOJvhuTGB9zMR-nGB7wakSKWIh2w36bi2xV9xMrc/s640/Schemer1.JPG&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;br /&gt;
&lt;/blockquote&gt;&lt;/blockquote&gt;&amp;nbsp;The service, which is in beta presently, is reserved to a few members who can invite others via invitation. &lt;b&gt;&quot;Still don&#39;t have your invite?&quot; &lt;/b&gt;Don&#39;t worry! &amp;nbsp;We are giving away 40 invites for our readers. Giveaway will work on &#39;First Come - First Serve&#39; method.&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;First Like &#39;The Hackers Ville&#39; on &lt;a href=&quot;http://www.facebook.com/TheHackersVille&quot; target=&quot;_blank&quot;&gt;Facebook&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Share this post on your Facebook wall.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Final Step, Comment at below the post. Enter your Facebook profile URL and Email ID.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Yea, You are done!&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;Remember once again,&amp;nbsp;Giveaway will work on &#39;First Come - First Serve&#39; method. So, Hurry Up!&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/7102073328139328668/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/7102073328139328668' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/7102073328139328668'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/7102073328139328668'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/12/we-are-giving-away-40-invites-for.html' title='We are Giving Away 40 Invites For Google Schemer'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBzzw4kmjAuWMauoBhrqPLtwz19_D7WxxgeHqS03NZ1avNKuFRjqqTQAD_MHw6N9xbKzWJO36cIc3gVtOzZsQLZpFAjTU4meBkA9xBOJvhuTGB9zMR-nGB7wakSKWIh2w36bi2xV9xMrc/s72-c/Schemer1.JPG" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-7402360704613463969</id><published>2011-12-10T17:37:00.002+05:30</published><updated>2011-12-15T16:18:31.440+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="TipsTricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type='text'>How do I know if my computer has been hacked?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;The most common thing in computer&#39;s hacking is, a computer to be hijacked first then hacked. Sometimes it can be difficult to detect a hacker on a computer. We have featured some of the most common things that change after a computer is hacked. Take a look:&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikjIQ3uEG3y8nHZd3PAyZ8sePAdGQ7UbIO86GpNSbxXxxqrOWPTukb5DqqQZKCMYG_Jnn1TwKagY-I7O59vJPyL4pkkzj6zwWFeklCEh6W4xhdQOv2RmuHpu5yqel6DvqMLHFXC2GD_gc/s1600/How+do+I+know+if+my+computer+has+been+hacked.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikjIQ3uEG3y8nHZd3PAyZ8sePAdGQ7UbIO86GpNSbxXxxqrOWPTukb5DqqQZKCMYG_Jnn1TwKagY-I7O59vJPyL4pkkzj6zwWFeklCEh6W4xhdQOv2RmuHpu5yqel6DvqMLHFXC2GD_gc/s400/How+do+I+know+if+my+computer+has+been+hacked.JPG&quot; width=&quot;371&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: large;&quot;&gt;&lt;b&gt;Automatic installation of new programs:&lt;/b&gt;&lt;/span&gt; &lt;br /&gt;
In such critical situations, you will see some new programs or files in your computer system without manual installation. If you are the only user on the computer and new programs are installed, this could be an indication of a hacked computer. Following is the list of indications, take a look:&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;program received updates that included new programs or files.&lt;/li&gt;
&lt;li&gt;Modifications in Registry settings.&lt;/li&gt;
&lt;li&gt;Error message or indication in Registry settings.&lt;/li&gt;
&lt;li&gt;Automatic executions of unnecessary programs.&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: large;&quot;&gt;&lt;b&gt;Unsuccessful Admin Login:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;If you are unable to log on to administrator account without playing with password, it may have been hacked. There is no reason why a password would change on its own. Log into an administrator account to change your accounts password.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: large;&quot;&gt;&lt;b&gt;Computer doing things by itself:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;When someone is remotely connected to a computer via network, they can remotely control any device. For example, a mouse cursor could be moved or something could be typed. It can be done via Trojan programs. If you see the computer doing something as if someone else was in control, this can be an indication of a hacked computer.&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/7402360704613463969/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/7402360704613463969' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/7402360704613463969'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/7402360704613463969'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/12/how-do-i-know-if-my-computer-has-been.html' title='How do I know if my computer has been hacked?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikjIQ3uEG3y8nHZd3PAyZ8sePAdGQ7UbIO86GpNSbxXxxqrOWPTukb5DqqQZKCMYG_Jnn1TwKagY-I7O59vJPyL4pkkzj6zwWFeklCEh6W4xhdQOv2RmuHpu5yqel6DvqMLHFXC2GD_gc/s72-c/How+do+I+know+if+my+computer+has+been+hacked.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-925667197545337066</id><published>2011-12-10T13:43:00.001+05:30</published><updated>2011-12-15T16:20:45.849+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Website Hacking"/><title type='text'>Congress Website Hacked, Sonia Gandhi&#39;s Profile Defaced</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;The official website of Congress was hacked yesterday. Another big news with this issue is the profile of President of the Congress party, Sonia Gandhi was defaced with hackers. The hackers placed sexual innuendo and other content on the webpage. The website is now recovered and running again.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt; Reuters reported, hackers attacked the site on the party president&#39;s 65th birthday on Friday.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBDgxaBmmVZ3E9pO72R-Id67WeXhp69eNVXM36Q_7ezXKETdVFQmSQazkFlRWOXxHecy2Jmal9p8LHvW005ZBOaLttmN-wEwp0dRmQ_NdzrCd14Lc16iat0KCYrF0CnZ4jNR4ZzCD7cP4/s1600/Congress+Website+Hacked%252C+Sonia+Gandhi%2527s+Profile+Defaced.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;369&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBDgxaBmmVZ3E9pO72R-Id67WeXhp69eNVXM36Q_7ezXKETdVFQmSQazkFlRWOXxHecy2Jmal9p8LHvW005ZBOaLttmN-wEwp0dRmQ_NdzrCd14Lc16iat0KCYrF0CnZ4jNR4ZzCD7cP4/s400/Congress+Website+Hacked%252C+Sonia+Gandhi%2527s+Profile+Defaced.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
While meantime, the official website of Congress wasn’t available for public viewing around noon on Friday. It means that the website was most probably hacked earlier. Hackers attacked the website just after India urged social media networks including Facebook, Twitter and Google to remove offensive material from their websites, unleashing a storm of criticism from Internet users complaining of censorship.&lt;br /&gt;
&lt;br /&gt;
A New York Times reported on Monday, &lt;b&gt;Telecoms and Information Technology Minister Kapil Sibal called executives about six weeks ago and showed them a Facebook page that maligned Gandhi and told them it was &quot;unacceptable.&quot;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/925667197545337066/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/925667197545337066' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/925667197545337066'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/925667197545337066'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/12/congress-website-hacked-sonia-gandhis.html' title='Congress Website Hacked, Sonia Gandhi&#39;s Profile Defaced'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBDgxaBmmVZ3E9pO72R-Id67WeXhp69eNVXM36Q_7ezXKETdVFQmSQazkFlRWOXxHecy2Jmal9p8LHvW005ZBOaLttmN-wEwp0dRmQ_NdzrCd14Lc16iat0KCYrF0CnZ4jNR4ZzCD7cP4/s72-c/Congress+Website+Hacked%252C+Sonia+Gandhi%2527s+Profile+Defaced.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-2051188199906575458</id><published>2011-12-03T00:44:00.013+05:30</published><updated>2012-03-17T12:01:05.832+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Contest"/><category scheme="http://www.blogger.com/atom/ns#" term="Downloads"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Steve Jobs"/><title type='text'>Get Free Soft copy of &#39;Steve Jobs Biography by Walter Isaacson&#39; [Closed]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&#39;Steve Jobs Biography by Walter Isaacson&#39; is based on more than forty interviews with Steve Jobs conducted over two years, as well as interviews with more than a hundred family members, friends, adversaries, competitors, and colleagues. The very passionate story of Steve Jobs, whose life was completely dedicated for personal computers,&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;animated movies, music, phones, tablet computing, and digital publishing.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8k_-OowvFGHBXPnVaDL8hgWeofrni2YbhvU88hRLJ5THN6BXItL7NFchd94orPUhZeurOCnCAGzr_jGMlEm00AhSKfTJP05bMtKtxM52yfuchY8LBhaGsGI191RHB05IYaCK8CLW1caQ/s1600/steve-jobs-biography.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8k_-OowvFGHBXPnVaDL8hgWeofrni2YbhvU88hRLJ5THN6BXItL7NFchd94orPUhZeurOCnCAGzr_jGMlEm00AhSKfTJP05bMtKtxM52yfuchY8LBhaGsGI191RHB05IYaCK8CLW1caQ/s1600/steve-jobs-biography.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;Steve Jobs, the man whose company changed how we use Personal Computers passed away recently. After his death, Walter Isaacson published his Biography to the world. This book is one of the best-seller book around the world. We are giving you an opportunity to get the free soft copy of this book today.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;color: red; font-size: large;&quot;&gt;&lt;u&gt;Important Update:&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;This contest / giveaway is currently closed. We will open it again, so stay tuned with us...&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/2051188199906575458/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/2051188199906575458' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/2051188199906575458'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/2051188199906575458'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/12/get-free-soft-copy-of-steve-jobs.html' title='Get Free Soft copy of &#39;Steve Jobs Biography by Walter Isaacson&#39; [Closed]'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8k_-OowvFGHBXPnVaDL8hgWeofrni2YbhvU88hRLJ5THN6BXItL7NFchd94orPUhZeurOCnCAGzr_jGMlEm00AhSKfTJP05bMtKtxM52yfuchY8LBhaGsGI191RHB05IYaCK8CLW1caQ/s72-c/steve-jobs-biography.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-3791942890474150077</id><published>2011-12-01T23:16:00.002+05:30</published><updated>2011-12-15T16:21:18.437+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="How-To&#39;s"/><category scheme="http://www.blogger.com/atom/ns#" term="Infographic"/><category scheme="http://www.blogger.com/atom/ns#" term="WebTips"/><title type='text'>Infographic: How to Use Google Search More Effectively</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Provided by the folks at HackCollege, the infographic reminds student researchers that you can use Google as a calculator and unit converter, how to find papers by a specific author in Google Scholar, and basic operators you can use. &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;The infographic below offers a helpful primer for how to best structure searches using advanced operators to more quickly and accurately drill down to the information you want. This is by no means an exhaustive list of search operators and advanced techniques, but it’s a good start that will help set you on the path to becoming a Google master. &amp;nbsp;Here&#39;s the full infographic:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://cache.gawkerassets.com/assets/images/17/2011/12/medium_3fdca60ef504702f8c3d8584d8fcd502.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2011/12/medium_3fdca60ef504702f8c3d8584d8fcd502.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Source: &lt;a href=&quot;http://lifehacker.com/5864111/the-get-more-out-of-google-infographic-summarizes-online-research-tricks-for-students&quot; target=&quot;_blank&quot;&gt;Lifehacker&lt;/a&gt;&amp;nbsp;| &lt;a href=&quot;http://www.hackcollege.com/&quot; target=&quot;_blank&quot;&gt;HackCollege&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/3791942890474150077/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/3791942890474150077' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/3791942890474150077'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/3791942890474150077'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/12/infographic-how-to-use-google-search.html' title='Infographic: How to Use Google Search More Effectively'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-950514038281537220</id><published>2011-12-01T22:04:00.003+05:30</published><updated>2011-12-15T16:26:05.695+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Blackberry"/><category scheme="http://www.blogger.com/atom/ns#" term="Jailbreak"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="RIM"/><title type='text'>Hackers &quot;Jailbreak&quot; RIM&#39;s PlayBook</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Three hackers in reuters said, they have exploited a vulnerability in Research In Motion&#39;s PlayBook tablet. It was all to gain root access to the device. This action by three of them could damage the BlackBerry maker&#39;s hard-won reputation for security for sure.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8-9i_tgVY30VIj5m6fxVurSxE3KN5_zD75NWlUwmaI9jSuS2u7ygPoRqBEY4BtlTfY5dodufmNaZ-i11t3Ckst3Yxoh2ZtKHWGLHYvpNVIJ_UAmdShPbEw9tfOU2tVhhOzXa2uhX65NU/s1600/playbook.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8-9i_tgVY30VIj5m6fxVurSxE3KN5_zD75NWlUwmaI9jSuS2u7ygPoRqBEY4BtlTfY5dodufmNaZ-i11t3Ckst3Yxoh2ZtKHWGLHYvpNVIJ_UAmdShPbEw9tfOU2tVhhOzXa2uhX65NU/s1600/playbook.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Root access to device is a way to grant the permission to alter any file or program on a device for users. Also, it can control hardware functions. RIM said that, investigation of this issue is under process, and if a &quot;jailbreak&quot; is confirmed then they will release a patch to plug the hole.&lt;br /&gt;
&lt;div&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;b&gt;“RIM is currently not aware of a jailbreak being leveraged by anyone other than the researchers, who claim to have performed a jailbreak on their own PlayBook tablets only, RIM is committed to the PlayBook and to working with researchers to continue to protect our customers.”&lt;/b&gt; - said by the Waterloo-based company.&lt;/blockquote&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;Apple&#39;s iOS and Google&#39;s Android operating systems are frequently attacked by users. Users are attacking those operating systems because þhey wants to run programs that have not been authorized by the manufacturers. But, the PlayBook runs on a different operating system than RIM&#39;s current BlackBerry smartphones. So it means, the QNX system will be incorporated into its smartphones starting next year.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/950514038281537220/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/950514038281537220' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/950514038281537220'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/950514038281537220'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/12/hackers-jailbreak-rims-playbook.html' title='Hackers &quot;Jailbreak&quot; RIM&#39;s PlayBook'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8-9i_tgVY30VIj5m6fxVurSxE3KN5_zD75NWlUwmaI9jSuS2u7ygPoRqBEY4BtlTfY5dodufmNaZ-i11t3Ckst3Yxoh2ZtKHWGLHYvpNVIJ_UAmdShPbEw9tfOU2tVhhOzXa2uhX65NU/s72-c/playbook.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-6175465124302343702</id><published>2011-12-01T14:20:00.005+05:30</published><updated>2011-12-15T16:23:31.493+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="How-To&#39;s"/><category scheme="http://www.blogger.com/atom/ns#" term="TipsTricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="WebTips"/><title type='text'>How to Download any Book from Google Books</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Book Search works just like web search. Try a search on Google Books or on Google.com. When we find a book with content that contains a match for your search terms, we&#39;ll link to it in your search results.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
By this tutorial, we are about to learn, How to download any book for free from Google Books. &lt;br /&gt;
This is step-by-step exclusive tutorial by The hackers Ville. Follow the stepls and you will learn, How to download any book for free from Google Books. Take a look:&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;How to download any book from Google Books?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Open Firefox web browser.&lt;/li&gt;
&lt;li&gt;Download &lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/greasemonkey/&quot; target=&quot;_blank&quot;&gt;Greasemonkey&lt;/a&gt; &amp;amp; &lt;a href=&quot;http://userscripts.org/scripts/show/109963&quot; target=&quot;_blank&quot;&gt;Google Book Downloader&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0mkv2g3RFXGCgDs0teSspwGjb2EfH1UsIS7yraH77PQH53_0_vxlj_DXQYAZ8vu1IwbrHCLCvf6-whA0sRoSO_MhOLR0WPzDDllOY2isUpnvqTpiz_98ptQaRwtvJikobkfVCpMRI3o8/s1600/Download+Books+From+Google+Books.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;219&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0mkv2g3RFXGCgDs0teSspwGjb2EfH1UsIS7yraH77PQH53_0_vxlj_DXQYAZ8vu1IwbrHCLCvf6-whA0sRoSO_MhOLR0WPzDDllOY2isUpnvqTpiz_98ptQaRwtvJikobkfVCpMRI3o8/s640/Download+Books+From+Google+Books.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcJWajVejE3oVTe-aQ46OW61yIc27MDxz0SDTfNE8KzUoLCr-oVAMpF_F8wRfohZLnjZ1VAk8hw0ZjpJ0KgyXM3sKMmSliUW-G3GwO_bt0A-zDAs1aHrwot3t338g2H2HIpFpKk4z0DMk/s1600/Download+Books+From+Google+Books1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;264&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcJWajVejE3oVTe-aQ46OW61yIc27MDxz0SDTfNE8KzUoLCr-oVAMpF_F8wRfohZLnjZ1VAk8hw0ZjpJ0KgyXM3sKMmSliUW-G3GwO_bt0A-zDAs1aHrwot3t338g2H2HIpFpKk4z0DMk/s640/Download+Books+From+Google+Books1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Restart your Firefox browser.&lt;/li&gt;
&lt;li&gt;Select any book from &lt;a href=&quot;http://books.google.com/books&quot; target=&quot;_blank&quot;&gt;Google Books&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghJgUvChsIFiO-onZmFoItzPYQ9TXE3GcBK7wF2Mq5ki1mTBGAd7EsNM6PfMNvIQ9052JEp1ZFWPi-F9UsAAmlTjWIARODUTiCiv3JfLfRvpeph5cYMzXL47eSQ-dV9_ft9vanRZ6IeZ4/s1600/Download+Books+From+Google+Books2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghJgUvChsIFiO-onZmFoItzPYQ9TXE3GcBK7wF2Mq5ki1mTBGAd7EsNM6PfMNvIQ9052JEp1ZFWPi-F9UsAAmlTjWIARODUTiCiv3JfLfRvpeph5cYMzXL47eSQ-dV9_ft9vanRZ6IeZ4/s400/Download+Books+From+Google+Books2.jpg&quot; width=&quot;365&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;On left side, click on &#39;Download this Book&#39;.&lt;/li&gt;
&lt;li&gt;Yo, you are done!&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;That&#39;s it for now! Stay tuned to The Hackers Ville and we will get back to you with more interesting cool tips &amp;amp; tutorials. You can also subscribe to our &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=thehackersville&quot; target=&quot;_blank&quot;&gt;Email Newsletters&lt;/a&gt; and you will get our daily stories in your inbox for free!&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/6175465124302343702/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/6175465124302343702' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/6175465124302343702'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/6175465124302343702'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/12/how-to-download-any-book-from-google.html' title='How to Download any Book from Google Books'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0mkv2g3RFXGCgDs0teSspwGjb2EfH1UsIS7yraH77PQH53_0_vxlj_DXQYAZ8vu1IwbrHCLCvf6-whA0sRoSO_MhOLR0WPzDDllOY2isUpnvqTpiz_98ptQaRwtvJikobkfVCpMRI3o8/s72-c/Download+Books+From+Google+Books.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-8916338176037625207</id><published>2011-11-30T22:55:00.003+05:30</published><updated>2012-05-20T17:11:56.053+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Phone Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="United Kingdom"/><title type='text'>Phone Hacking: Former journalist of News of the World arrested in Northumberland</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Bethany Usher, a former journalist of News of the World and senior Journalism lecturer at Teesside University, was today arrested by the police in connection with the phone-hacking scandal in north-east England by officers from Operation Weeting.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
31-year-old Bethany Usher, who worked for the media baron Rupert&#39;s Murdoch&#39;s tabloid from 2005-2007, was held held on suspicion of conspiracy to intercept voicemail messages, contrary to the Criminal Law Act 1977. She was arrested at 06:35 GMT and is at a police station in Northumberland. Usher is the 17th person to be arrested under the &#39;Operation Weeting&#39;, which is investigating the scandal.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://i.thisislondon.co.uk/i/pix/2011/11/30_bethany-415.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;279&quot; src=&quot;http://i.thisislondon.co.uk/i/pix/2011/11/30_bethany-415.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
The Metropolitan Police set up Operation Weeting to investigate the illegal hacking of the mobile phone voicemails of public figures by the now-defunct NoW newspaper. The scandal has led Met Police Commissioner Sir Paul Stephenson and Assistant Commissioner John Yates to resign, and the NoW to close down after 168 years. It is now investigating more widespread phone hacking.&lt;br /&gt;
&lt;br /&gt;
She was questioned by police in 2006 on suspicion of providing false information for a job at Buckingham Palace. That time she was not charged. It was involved in a genuine journalistic inquiry into royal security. &amp;nbsp;Her biography on Teesside University&#39;s website states that she spent seven years working in the newspaper industry after reading English Literature and Language at the University of Leeds. The Metropolitan Police set up Operation Weeting to investigate the illegal hacking of the mobile phone voicemails of public figures by the now-defunct NoW newspaper.&lt;br /&gt;
&lt;br /&gt;
Original Source: &lt;a href=&quot;http://www.bbc.co.uk/news/uk-15958513&quot; target=&quot;_blank&quot;&gt;BBC News&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/8916338176037625207/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/8916338176037625207' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/8916338176037625207'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/8916338176037625207'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/11/phone-hacking-former-journalist-of-news.html' title='Phone Hacking: Former journalist of News of the World arrested in Northumberland'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-1358855317362236952</id><published>2011-11-30T15:36:00.005+05:30</published><updated>2011-12-15T16:29:02.016+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="TipsTricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Vista"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Ultimate Windows Tweaker: Tweak UI For Windows 7 / Vista</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Ultimate Windows Tweaker (UWT) is a freeware TweakUI Utility application for tweaking and optimizing Windows 7 &amp;amp; Windows Vista opearing system. It is very efficient and portable to customize your Windows as per your wish. This tweaker is very useful for making your system faster, more stable,&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt; and more secure with just a few mouse clicks. Very strong feature of this tweaker is it always detects whether you have Windows 7 or Windows Vista installed. As per your installed opearting system, it performs specific&amp;nbsp;tweaker&amp;nbsp;tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;Recently, Ultimate Windows Tweaker has been updated to the next version, v 2.2. It now works on Internet Explorer 9 and includes additional tweaks too. The UWT application is specially designed for advanced users and it gives you control over more than 130 Vista settings. All settings are already grouped into seven categories. They are like Personalization, Security, Internet Explorer, and so on.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_A1FT6RaMYxkWjH3eNOpU60vjvK_lBLLn1AsQvq-PFiZAr2fHVHEs75zBDj85WeBfR4t6nB26gKjsaeu1Um_UwgLJkVCkkxyjEbr3HHLe4QlROIOnr_AukLvYDekW16eKBc8awfxwBSVc/s1600/ultimate-windows-tweaker-v2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;431&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_A1FT6RaMYxkWjH3eNOpU60vjvK_lBLLn1AsQvq-PFiZAr2fHVHEs75zBDj85WeBfR4t6nB26gKjsaeu1Um_UwgLJkVCkkxyjEbr3HHLe4QlROIOnr_AukLvYDekW16eKBc8awfxwBSVc/s640/ultimate-windows-tweaker-v2.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Ultimate Windows Tweaker (UWT) is compatible with&amp;nbsp;Microsoft Windows Vista, Microsoft Windows 7. System requires&amp;nbsp;32-bit or 64-bit OS, 5MB free disk space, 800x600 screen resolution with 256 colors, Microsoft Internet Explorer 7.0.&lt;br /&gt;
&lt;br /&gt;
You will get all the full details, features, and requirements about&amp;nbsp;Ultimate Windows Tweaker on their official website. &lt;a href=&quot;http://www.thewindowsclub.com/ultimate-windows-tweaker-v2-a-tweak-ui-for-windows-7-vista&quot; target=&quot;_blank&quot;&gt;Download Ultimate Windows Tweaker for Windows 7 /Windows Vista&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/1358855317362236952/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/1358855317362236952' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/1358855317362236952'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/1358855317362236952'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/11/ultimate-windows-tweaker-tweak-ui-for.html' title='Ultimate Windows Tweaker: Tweak UI For Windows 7 / Vista'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_A1FT6RaMYxkWjH3eNOpU60vjvK_lBLLn1AsQvq-PFiZAr2fHVHEs75zBDj85WeBfR4t6nB26gKjsaeu1Um_UwgLJkVCkkxyjEbr3HHLe4QlROIOnr_AukLvYDekW16eKBc8awfxwBSVc/s72-c/ultimate-windows-tweaker-v2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-7169637805832655481</id><published>2011-11-30T02:31:00.003+05:30</published><updated>2012-05-20T17:09:14.495+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Nepal"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="SocialMedia"/><title type='text'>Hacker From Nepal Releases Huge List of Facebook Login Credentials</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;A hacker from Nepal, who is know as Cru3l Int3ntion, has recently released a huge list of Facebook usernames and passwords. This all comesout a few days after Facebook was hacked, and Facebook users found pornographic content on their wall posts. &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Cru3l Int3ntion claims responsibility for this hack, and has not tagged it under any Anonymous operation.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://cdn2.techie-buzz.com/images4/chinmoy/facebook-hack.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://cdn2.techie-buzz.com/images4/chinmoy/facebook-hack.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cru3l Int3ntion has recently leaked login details for over 2500 Facebook accounts. The total list of all these stuff &amp;nbsp;is 500 KB in size. Most of the hacked accounts from this list &amp;nbsp;have been locked due to repeated login attempts from multiple locations. This is Facebook’s biggest preventive measure against hacks and it is very good for security. This is very unique and unknown method of Hacking.&lt;br /&gt;
&lt;br /&gt;
Facebook is already the treasure of phishing. A few days ago, another hacker Cr@zy 3xpl0!t released a list of hacked Facebook accounts. Unless Facebook does about it, its users are under a continuous risk. Phishing scams on Facebook are at an all-time high and to get the solution is very tough question at the moment.&lt;br /&gt;
&lt;br /&gt;
Check for whether your Facebook account is hacked?&amp;nbsp;&lt;a href=&quot;http://www.thehackersville.com/2011/11/pwnedlist-tool-to-find-compromised.html&quot; target=&quot;_blank&quot;&gt;PwnedList: Tool to Find Compromised Accounts&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/7169637805832655481/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/7169637805832655481' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/7169637805832655481'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/7169637805832655481'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/11/hacker-from-nepal-releases-huge-list-of.html' title='Hacker From Nepal Releases Huge List of Facebook Login Credentials'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-6738068842310206274</id><published>2011-11-30T02:06:00.003+05:30</published><updated>2011-12-15T16:31:06.318+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="TipsTricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="WebTips"/><title type='text'>PwnedList: Tool to Find Compromised Accounts</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;The word pwned comes from the hacker jargon &#39;pwn&#39;, meaning to compromise or control, specifically another computer ,server .PC, web site, gateway device, or application. It is synonymous with one of the definitions of hacking or cracking.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt; The past tense and past participle of &#39;pwn&#39; is often spelled as &#39;pwned&#39;. Hence the name PwnedList, meaning compromised list, or in our case a list of compromised accounts.&lt;br /&gt;
&lt;br /&gt;
PwnedList is a tool that allows an average person to check if their online accounts have been compromised. The site started out as small research project with a rather simple premise. To discover how many compromised accounts can be harvested programatically in just a couple of hours.&amp;nbsp;It collects data in such a short amount of time. Visit the official website of &lt;a href=&quot;http://pwnedlist.com/&quot; target=&quot;_blank&quot;&gt;PwnedList&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoS2RRGrIwgQJGkHqOTKqV53fDZPV_ryXTTskdLFo9kwUVs_j7rtg625ccuFXVP-by_obuWGWEDS6kYJfE5arObb_k34nxuZzwpI-_-BIKnJQ86hakKhTbHY7wOjAuMfNrBNPInNYcMwQ/s1600/pwned+list.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoS2RRGrIwgQJGkHqOTKqV53fDZPV_ryXTTskdLFo9kwUVs_j7rtg625ccuFXVP-by_obuWGWEDS6kYJfE5arObb_k34nxuZzwpI-_-BIKnJQ86hakKhTbHY7wOjAuMfNrBNPInNYcMwQ/s1600/pwned+list.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
They have two principal sources of data. One is the manual collection of data from account dumps made by various hacker groups. Every week they spend a fair amount of time researching possible new security breaches and trying to collect any resulting data dumps. The other source is their automated harvesting system that is able to spider certain places on the internet, identify potential account dumps and import them into their database, all without human intervention.&lt;br /&gt;
&lt;br /&gt;
PwnedList was started as a project by security researchers who wanted address the current state of web security and raise public awareness of data breaches that have become a daily occurrence. The purpose of this project is hopefully to raise security awareness, encourage users to be more proactive about handling their personal security in cyberspace and at the same time help people monitor their accounts for potential compromises.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://pwnedlist.com/&quot; target=&quot;_blank&quot;&gt;&quot;Visit the Official Website of PwnedList to access the tool&quot;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/6738068842310206274/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/6738068842310206274' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/6738068842310206274'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/6738068842310206274'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/11/pwnedlist-tool-to-find-compromised.html' title='PwnedList: Tool to Find Compromised Accounts'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoS2RRGrIwgQJGkHqOTKqV53fDZPV_ryXTTskdLFo9kwUVs_j7rtg625ccuFXVP-by_obuWGWEDS6kYJfE5arObb_k34nxuZzwpI-_-BIKnJQ86hakKhTbHY7wOjAuMfNrBNPInNYcMwQ/s72-c/pwned+list.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-2522393379655991749</id><published>2011-11-30T00:11:00.002+05:30</published><updated>2011-11-30T15:54:51.843+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="SocialMedia"/><title type='text'>&quot;Facebook had made a bunch of mistakes&quot; - Mark Zuckerberg</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
Facebook has recently agreed that, settlement with the FTC over charges that the social network had deceived its users about privacy. The FTC had accused Facebook in an eight-count complaint of not living up to its own promises. It all said by the CEO of Facebook, Mark Zuckerberg. It includes, sharing users’ personal information with third parties without their knowledge or consent, changing privacy practices without informing users, and claiming to have a program to verify the security of apps when it didn’t.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://src-tv.com/wp-content/uploads/2011/03/facebook-logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;http://src-tv.com/wp-content/uploads/2011/03/facebook-logo.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
The terms of the settlement bar Facebook from is now making deceptive privacy claims.Facebook also agrees to obtain users’ permission before making any changes to the way the service shares their information. So it must submit to regular assessments from privacy auditors for a no less than 20 years.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://5.mshcdn.com/wp-content/gallery/easier_to_share_with_who_you_want_screenshots/1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://5.mshcdn.com/wp-content/gallery/easier_to_share_with_who_you_want_screenshots/1.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://9.mshcdn.com/wp-content/gallery/easier_to_share_with_who_you_want_screenshots/5.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;272&quot; src=&quot;http://9.mshcdn.com/wp-content/gallery/easier_to_share_with_who_you_want_screenshots/5.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
“The most important thing is to ensure consumer privacy going forwred, and we believe this order does that, It will also allow Facebook to move on and create more services and features. Nothing in this order will prevent Facebook from innovating.” FTC Chairman Jon Leibowitz said in a conference call. It all was about the settlement.&lt;br /&gt;
&lt;br /&gt;
Facebook CEO Mark Zuckerberg addressed the settlement in a statement. He said, &quot;Facebook had proactively addressed the FTC’s complaints but that the company had made a bunch of mistakes.”&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/2522393379655991749/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/2522393379655991749' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/2522393379655991749'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/2522393379655991749'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/11/facebook-had-made-bunch-of-mistakes.html' title='&quot;Facebook had made a bunch of mistakes&quot; - Mark Zuckerberg'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-9057340840470255120</id><published>2011-11-29T23:34:00.004+05:30</published><updated>2012-05-19T11:40:18.701+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Challenges"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type='text'>Code-Breaking Challenges: Improve Your Skill of Reverse Engineering</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Code breaking excites you. Reverse-engineering seems pretty straightforward. And you like to break down information security systems just to build them back, stronger and better. You seem to be the kind of person we look for at Raytheon: a cyber warrior who can help us protect the world&#39;s most critical data from breach, fraud, theft and sabotage. But we want to test you to be sure. Conquer these hidden challenges and crack the code to gain restricted access to a secret message – just for cyber warriors like you.&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg06j0wh63ujGAM8i5ZcCJsWdxM4F4YXPNwuNPm24NvBNcSpqULBvpUCJCCUEuxD7q_IzBB8Hy7teM5wqEEqWrxcSedjBESe2MiVt7o7RzbrAcBwQjyoHWAlyjmY2PGLjsGgA-JgTeRWiY/s1600/CTC.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg06j0wh63ujGAM8i5ZcCJsWdxM4F4YXPNwuNPm24NvBNcSpqULBvpUCJCCUEuxD7q_IzBB8Hy7teM5wqEEqWrxcSedjBESe2MiVt7o7RzbrAcBwQjyoHWAlyjmY2PGLjsGgA-JgTeRWiY/s1600/CTC.JPG&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit; font-size: x-large;&quot;&gt;&lt;b&gt;What to do?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Log on to,&amp;nbsp;&lt;a href=&quot;http://www.rtncyberjobs.com/&quot;&gt;http://www.rtncyberjobs.com/&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Each puzzle solution reveals an identification key.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;As you find the keys, add them to the end of this url to see what&#39;s next.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;http://www.rtncyberjobs.com/[YOUR-KEY]&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;And you are done!&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;All the best! Also stay tuned with The hackers Ville because some more interesting challenges are about to come soon!&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/9057340840470255120/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/9057340840470255120' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/9057340840470255120'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/9057340840470255120'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/11/code-breaking-challenges-improve-your.html' title='Code-Breaking Challenges: Improve Your Skill of Reverse Engineering'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg06j0wh63ujGAM8i5ZcCJsWdxM4F4YXPNwuNPm24NvBNcSpqULBvpUCJCCUEuxD7q_IzBB8Hy7teM5wqEEqWrxcSedjBESe2MiVt7o7RzbrAcBwQjyoHWAlyjmY2PGLjsGgA-JgTeRWiY/s72-c/CTC.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-5797080747610602106</id><published>2011-11-29T01:31:00.001+05:30</published><updated>2011-11-29T01:37:45.427+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>What is Hacking? Who are the Hackers?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Hello Everyone, This is our first post on this website and if the website is full of hacking then lets start with the basic terms of Hacking. In this article, we will discuss about the term hacking and hacker. Simply,&amp;nbsp;Hacking has a lot of meanings depending upon the person’s knowledge and his work intentions. There are lots of definitions available on Internet. For Example, &lt;b&gt;&quot;Hacking is an Art&amp;nbsp;as well as a Skill. Hacking is the knowledge by which one gets to achieve his Goals, anyhow, using his Skills and&amp;nbsp;Power&quot;.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQlRCWO4cndw35lizpIZ4o03lDGvjFYHbTXuzZztvN-xTotpjJkcI0qcBE68LeS2g4WHU9saKUN6DSTin3lV63i10x6AgIj1ipuRYAJnkkz2AAwAWxQLZIrQgV9pjEiqwc33l27N11IaY/s1600/What+is+Hacking.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;168&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQlRCWO4cndw35lizpIZ4o03lDGvjFYHbTXuzZztvN-xTotpjJkcI0qcBE68LeS2g4WHU9saKUN6DSTin3lV63i10x6AgIj1ipuRYAJnkkz2AAwAWxQLZIrQgV9pjEiqwc33l27N11IaY/s640/What+is+Hacking.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit; font-size: x-large;&quot;&gt;What is Hacking:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Most people pretends that Hacking is breaking of a law, spoiling the privacy, illegeal access, or simply criminal activities.&amp;nbsp;to be criminals. We agree that there are people out there who use hacking techniques to break the law, but&amp;nbsp;hacking is not really about that. Actually hacking is a skill of &amp;nbsp;following the law and performing the steps within&amp;nbsp;the limits.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Hacking is simply an art&amp;nbsp;of exploring various security breaches.&amp;nbsp;Since the Internet became widely used in the World, We&amp;nbsp;have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known.&amp;nbsp;Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator&#39;s original purpose.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit; font-size: x-large;&quot;&gt;Who are the Hackers:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Basically, Hacker is someone who likes to play with Software or Electronic Systems. Hackers enjoy Exploring&amp;nbsp;and Learning how Computer systems operate. But recently, Hacker has taken on a new meaning. Hacking is someone who maliciously breaks into systems for personal gain or for money or for fame. All definitions are totally correct and as we said, it all depends on the situaltion and point of view.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Sometimes, hackers do hacking for Personal gain, Fame, Profit and even Revenge. They simply &amp;nbsp;Modifies, Delete and Steal critical information. But we are not saüing that every hacker in the world is criminal or unethical. There are also ethical hacker who tries hacking for good reasons like to increase the security levels or to avoid and tackle the spammers. These hackers are simply called as Ethical Hackers.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;So these are very basic terms of hacking &amp;amp; you have to understand it very well before learning an actual hacking. So stay tuned, we will get back to you with more interesting stuff!&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/5797080747610602106/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/5797080747610602106' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/5797080747610602106'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/5797080747610602106'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/11/what-is-hacking-who-are-hackers.html' title='What is Hacking? Who are the Hackers?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQlRCWO4cndw35lizpIZ4o03lDGvjFYHbTXuzZztvN-xTotpjJkcI0qcBE68LeS2g4WHU9saKUN6DSTin3lV63i10x6AgIj1ipuRYAJnkkz2AAwAWxQLZIrQgV9pjEiqwc33l27N11IaY/s72-c/What+is+Hacking.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4345114366424812305.post-7262856481517494838</id><published>2011-11-28T22:55:00.004+05:30</published><updated>2011-12-15T16:30:26.370+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>Welcome to The Hackers Ville!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 18px; word-spacing: 1px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font: inherit; margin-bottom: 1.625em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font: inherit; margin-bottom: 1.625em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: x-small;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font: inherit; margin-bottom: 1.625em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyyDfG3x4VtUG0hwwKddurOikAQSlgHiAL1Dl2B6sPK_j0_rN_5Uueo7a5w6Sw3b2zuvUGFQPzP_kCnCGSZsM2X9WFWi10-joLsidmSlFhFJSfZWnsnK_s7B_ma9wx2DGe3GVI7x6JK1s/s1600/THV+Logo2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;60&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyyDfG3x4VtUG0hwwKddurOikAQSlgHiAL1Dl2B6sPK_j0_rN_5Uueo7a5w6Sw3b2zuvUGFQPzP_kCnCGSZsM2X9WFWi10-joLsidmSlFhFJSfZWnsnK_s7B_ma9wx2DGe3GVI7x6JK1s/s400/THV+Logo2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: inherit;&quot;&gt;I am pleased to inform you that we are launching The Hackers Ville. We will actively covers all news, happenings, development, software reviews, basic hacks, tips and tricks, guides and tutorials, programming and script writing around the world of hacking.&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: inherit;&quot;&gt; Over time we have moved on to cover the web tips, computing tips and system tweaks to boost the speed of everyday technology.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font: inherit; margin-bottom: 1.625em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: inherit;&quot;&gt;All the information &amp;amp; tips offered in this website will be provided on ‘as-is’ basis, without any warranties. The authors or admins will not be liable for any special, incidental, consequential or indirect damages due to loss of data or any other reason. Any proceedings and or activities related to the material contained within this website are exclusively your liability.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font: inherit; margin-bottom: 1.625em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: inherit;&quot;&gt;The misuse and mistreat of the information in this website can consequence in unlawful charges brought against the persons in question. The authors and review analyzers will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this website to break the law. This website contains material and resources that can be potentially destructive or dangerous. If you do not fully comprehend something on this website, don‘t surf this website.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font: inherit; margin-bottom: 1.625em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: inherit;&quot;&gt;Please refer to the laws and acts of your state/region/ province/zone/territory or country before accessing, using, or in any other way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within. If this is your intention, then leave now.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font: inherit; margin-bottom: 1.625em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: inherit;&quot;&gt;Have a nice day!&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://thehackersville.blogspot.com/feeds/7262856481517494838/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4345114366424812305/7262856481517494838' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/7262856481517494838'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4345114366424812305/posts/default/7262856481517494838'/><link rel='alternate' type='text/html' href='http://thehackersville.blogspot.com/2011/11/welcome-to-hackers-ville.html' title='Welcome to The Hackers Ville!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyyDfG3x4VtUG0hwwKddurOikAQSlgHiAL1Dl2B6sPK_j0_rN_5Uueo7a5w6Sw3b2zuvUGFQPzP_kCnCGSZsM2X9WFWi10-joLsidmSlFhFJSfZWnsnK_s7B_ma9wx2DGe3GVI7x6JK1s/s72-c/THV+Logo2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>