<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3158454373083223789</id><updated>2025-10-14T00:12:22.469-07:00</updated><category term="hacking"/><category term="NEWS"/><category term="reviews"/><category term="facebook"/><category term="windows"/><category term="mobiles"/><category term="android"/><category term="notepad"/><category term="technology"/><category term="LEARNING"/><category term="gadgets"/><category term="ios"/><category term="backtrack"/><category term="website"/><category term="windows 8"/><category term="bikes"/><category term="comparision"/><category term="gmail"/><category term="mobile"/><category term="movie"/><category term="session hijacking"/><category term="smartphones"/><category term="sql injection"/><category term="twitter"/><category term="whats app"/><category term="wifi"/><category term="window"/><category term="wireless"/><category term="xss attack"/><category term="youtube"/><category term="blackberry"/><category term="computer"/><category term="dns attack"/><category term="earning"/><category term="games"/><category term="iphone"/><category term="lifestyle"/><category term="linux"/><category term="macos"/><category term="microsoft"/><category term="mitm"/><category term="projects"/><category term="rooting"/><category term="secure"/><category term="z10"/><title type='text'>                       Be a Geek</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>215</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-1123319965170219615</id><published>2014-06-25T00:38:00.002-07:00</published><updated>2014-06-25T00:38:43.847-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="android"/><title type='text'>Lg knock codeport</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
What if instead of launching applications using gestures, you’d like 
to use gestures to secure your device? LG offers such functionality 
through the Knock Code security system found on their newer handsets. 
But thanks to&amp;nbsp;XDA Recognized Developer&amp;nbsp;&lt;a href=&quot;http://forum.xda-developers.com/member.php?u=2011359&quot;&gt;MohammadAG&lt;/a&gt;&amp;nbsp;and the magic of Xposed Framework, you can use it on your device as well.&lt;br /&gt;
&lt;a href=&quot;http://cdn-www.xda-developers.com/wp-content/uploads/2014/06/ljo9TyZl.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Secure Your Device with a Knock Code Using Xposed&quot; border=&quot;0&quot; class=&quot;alignright wp-post-image&quot; height=&quot;400&quot; src=&quot;http://cdn-www.xda-developers.com/wp-content/uploads/2014/06/ljo9TyZl.jpg&quot; width=&quot;225&quot; /&gt;&lt;/a&gt; &lt;br /&gt;

There are a few caveats with this implementation. For starters, 
rather than being able to enter your knock code while the device is off,
 you first have to power on your screen, after which you can input&amp;nbsp;the 
code. In addition, the module is currently only compatible with Android 
4.4, but compatibility will be added for 4.2 and 4.3 very soon. Finally,
 while&amp;nbsp;using a knock code is fairly convenient, this is not a very 
secure method of locking your device. This is because due to a 
limitation in Xposed, the file where the code is stored is world-readable. 
Furthermore, this essentially functions as a 2×2 PIN password, which 
itself isn’t very difficult to break.
If you wish to get Knock On-style functionality on your own device, head over to the&amp;nbsp;&lt;a href=&quot;http://forum.xda-developers.com/xposed/modules/mod-knock-code-screen-t2768502&quot;&gt;module&amp;nbsp;thread&lt;/a&gt;&amp;nbsp;and give this a shot.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/1123319965170219615/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/06/lg-knock-codeport.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/1123319965170219615'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/1123319965170219615'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/06/lg-knock-codeport.html' title='Lg knock codeport'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02120668744614122255</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-2378091499341439053</id><published>2014-06-22T02:32:00.000-07:00</published><updated>2014-06-22T02:32:25.450-07:00</updated><title type='text'>Run windows programs on linux</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Ubuntu is pretty neat ,but with windows software its even better!&lt;br /&gt;
Almost any windows software can be run on ubuntu using a software WINE.&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;http://www.winehq.org/images/winehq_logo_glass.png&quot; /&gt; &lt;br /&gt;
Official website-&lt;a href=&quot;http://www.winehq.org/&quot;&gt;http://www.winehq.org/&lt;/a&gt;&lt;br /&gt;
A nice set of instructions is already present on the web, here are some useful links-&lt;br /&gt;
&lt;a href=&quot;http://www.wikihow.com/Install-Wine-on-Ubuntu&quot;&gt;http://www.wikihow.com/Install-Wine-on-Ubuntu&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.winehq.org/download/ubuntu&quot;&gt;http://www.winehq.org/download/ubuntu&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Most of the softwares work fine but there is a problem with .NET Framework.&lt;br /&gt;
I will post a solution soon.If u have any query related to it or anything else, Please do comment.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/2378091499341439053/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/06/run-windows-programs-on-linux.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/2378091499341439053'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/2378091499341439053'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/06/run-windows-programs-on-linux.html' title='Run windows programs on linux'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02120668744614122255</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-2570923896368144479</id><published>2014-06-21T22:04:00.002-07:00</published><updated>2014-06-21T22:47:15.383-07:00</updated><title type='text'>learn linux terminal</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
I once heard an author say that when you are
a child you use a computer by looking at the
pictures. When you grow up, you learn to read and
write.&lt;br /&gt;
&lt;img alt=&quot;terminal display&quot; border=&quot;0&quot; height=&quot;442&quot; src=&quot;http://linuxcommand.org/images/Screenshot-Terminal.png&quot; width=&quot;660&quot; /&gt; &lt;br /&gt;
Linux is a very powerful os but to unleash its full power , terminal use is a must.&lt;br /&gt;
I was just googling around and found a cool website t0 learn Linux terminal.&lt;br /&gt;
Here&#39;s the link - &lt;a href=&quot;http://linuxcommand.org/lc3_learning_the_shell.php&quot;&gt;http://linuxcommand.org/lc3_learning_the_shell.php&lt;/a&gt; .Enjoy&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/2570923896368144479/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/06/learn-linux-terminal.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/2570923896368144479'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/2570923896368144479'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/06/learn-linux-terminal.html' title='learn linux terminal'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02120668744614122255</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-8878183836734334661</id><published>2014-04-26T10:22:00.003-07:00</published><updated>2014-04-26T10:22:41.231-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="reviews"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Alleged Amazon smartphone to reportedly come with tilt gesture support</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1&gt;
        &lt;div class=&quot;header5&quot;&gt;
            
            &lt;span id=&quot;HeadContent_FullstoryCtrl_title&quot;&gt;Alleged Amazon smartphone to reportedly come with tilt gesture support&lt;/span&gt;
            &lt;/div&gt;
&lt;/h1&gt;
&lt;div class=&quot;listing_tags&quot;&gt;
        &lt;div class=&quot;clr&quot;&gt;
        &lt;/div&gt;
&lt;div class=&quot;float_l&quot;&gt;
            &amp;nbsp;

&lt;/div&gt;
&lt;div class=&quot;bar_cont ad_common mart10&quot;&gt;
    &lt;div class=&quot;socialShare&quot;&gt;
        
        
        
        
    &lt;/div&gt;
&lt;div class=&quot;socialShare&quot;&gt;
        
        &lt;div class=&quot; fb_reset&quot; id=&quot;fb-root&quot;&gt;
        &lt;/div&gt;
&lt;span style=&quot;height: 20px; vertical-align: bottom; width: 78px;&quot;&gt;&lt;/span&gt;
        
    &lt;/div&gt;
&lt;div class=&quot;socialShare&quot;&gt;
        
        
        
        
        &lt;span class=&quot;IN-widget&quot; style=&quot;display: inline-block; line-height: 1; text-align: center; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;display: inline-block ! important; font-size: 1px ! important; margin: 0px ! important; padding: 0px ! important; text-indent: 0px ! important; vertical-align: baseline ! important;&quot;&gt;&lt;span id=&quot;li_ui_li_gen_1398532733835_0&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; id=&quot;li_ui_li_gen_1398532733835_0-link&quot;&gt;&lt;span id=&quot;li_ui_li_gen_1398532733835_0-logo&quot;&gt;in&lt;/span&gt;&lt;span id=&quot;li_ui_li_gen_1398532733835_0-title&quot;&gt;&lt;span id=&quot;li_ui_li_gen_1398532733835_0-mark&quot;&gt;&lt;/span&gt;&lt;span id=&quot;li_ui_li_gen_1398532733835_0-title-text&quot;&gt;Share&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;display: inline-block ! important; font-size: 1px ! important; margin: 0px ! important; padding: 0px ! important; text-indent: 0px ! important; vertical-align: baseline ! important;&quot;&gt;&lt;span class=&quot;IN-right IN-hidden&quot; id=&quot;li_ui_li_gen_1398532733845_1-container&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
        
    &lt;/div&gt;
&lt;div class=&quot;socialShare&quot;&gt;
        
        
        
        
        
        
    &lt;/div&gt;
&lt;div class=&quot;socialShare&quot;&gt;
        
        
        
        
        
        
        
        
        
    &lt;/div&gt;
&lt;div class=&quot;socialShare&quot;&gt;
        
        
        
        
        
    &lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;newslist_img&quot;&gt;
            &lt;img alt=&quot;amazon_smartphone_leak_bgr.jpg&quot; class=&quot;imgbdr&quot; id=&quot;HeadContent_FullstoryCtrl_mainstoryimage&quot; src=&quot;http://cdn.ndtv.com/tech/images/gadgets/amazon_smartphone_leak_bgr.jpg&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;&quot; id=&quot;HeadContent_FullstoryCtrl_fulldetails&quot;&gt;
We have already seen the first alleged glimpse of Amazon&#39;s upcoming 
smartphone&#39;s prototype - one of the two rumoured devices that the online
 retail giant is said to have been working on for more than a year.Now,
 a new leak tips that the alleged &lt;a href=&quot;http://gadgets.ndtv.com/tags/amazon&quot;&gt;Amazon&lt;/a&gt; smartphone, much like the 
company&#39;s Kindle tablet range, will run a highly customised &lt;a href=&quot;http://gadgets.ndtv.com/android&quot;&gt;Android&lt;/a&gt; 
OS and will also support tilt 
gestures for interacting with various apps.&lt;br /&gt;
BGR, citing some of 
its sources, claims that the alleged Amazon smartphone will make use of a
 combination of cameras, sensors and software for interacting with the 
device. Further, the report notes that the combination will make use of a
 number of 3D effects on the Amazon smartphone.&lt;br /&gt;
As reported 
earlier, the prototype high-end model of the rumoured 
Amazon smartphone is said to sport a total of six cameras: one at the
 rear, one at the top-front panel, while four are placed on four corners
 on the front. The report also suggested that the four camera units are 
low-power infrared cameras that would work with other sensors on the 
Amazon smartphone for the 3D effects on the screen.&lt;br /&gt;
&lt;a href=&quot;http://bgr.com/2014/04/22/amazon-smartphone-specs-details-kindle-phone-exclusive/&quot; target=&quot;_blank&quot;&gt;BGR&lt;/a&gt; also 
claims 
that the Internet retailer will introduce new gesture controls on its
 first smartphone, such as tilt in different directions while the device
 is being used to display additional details on the display without even
 touching the screen.&lt;br /&gt;
The report further details some of the 
gesture functions in the yet-to-be-named Amazon smartphone, like if a 
user performs tilt gesture after searching a place in the maps app, Yelp
 ratings will appear for various results on the searched place&#39;s map.&lt;br /&gt;
Another
 tilt gesture function is said to be used in Amazon&#39;s video store, which
 is likely to show IMDb ratings on top of movie thumbnails.&lt;br /&gt;
In 
addition, apart from sensors and multiple gesture functions, the alleged
 Amazon smartphone is said to come with optical character recognition 
(OCR) and other technology which will automatically recognise text and 
convert it to a digital note if a user captures image of signs and other
 real-life objects with printed text using the device&#39;s primary rear 
camera.&lt;br /&gt;
An earlier leak had tipped that the e-commerce giant has 
been working with third-party developers to build apps for its 3D 
interface. Another report had suggested that Amazon has been preparing 
to launch its long-rumoured smartphone in the second half of the year, citing people briefed on the 
company&#39;s plans.&lt;br /&gt;
 &lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/8878183836734334661/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/alleged-amazon-smartphone-to-reportedly.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/8878183836734334661'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/8878183836734334661'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/alleged-amazon-smartphone-to-reportedly.html' title='Alleged Amazon smartphone to reportedly come with tilt gesture support'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-2686192709565653952</id><published>2014-04-12T09:23:00.001-07:00</published><updated>2014-04-12T09:23:09.467-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NEWS"/><title type='text'>First Paid Fake Android Antivirus App Downloaded 10,000 times from Google Play Store</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 align=&quot;justify&quot; class=&quot;post-title entry-title url&quot; itemprop=&quot;headline name&quot;&gt;
First Paid Fake Android Antivirus App Downloaded 10,000 times from Google Play Store&lt;/h1&gt;
&lt;br /&gt;


&lt;div id=&quot;aim14710078786357381920&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;VIRUS SHIELD GOOGLE PLAY STORE&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEila73htzNyXYtnNQFsNg0dWt2O9O19lRyAI9yFEnmHHXCtrRqemxlnVZg7KIdGJXRbXpjetud3VfOq3WFlrsotTvho4nrzkqgGcJbDGdEc8FxR8W5R2mi-Vr7E7Ntozp4TmRhdArfeTs4/s728/VIRUS-SHIELD-GOOGLE-PLAY-STORE.jpg&quot; title=&quot;VIRUS SHIELD GOOGLE PLAY STORE&quot; /&gt;&lt;/div&gt;
Well, we all are very conscious, when it comes to the security of our 
personal information, security of our financial data and security of 
everything related to us. In the world of Smart devices where our 
Smartphones knows more than we know ourselves.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
To keep our device protected from harmful viruses, malware or spyware, 
we totally depend on various security products such as antivirus, 
firewall and privacy guard apps, that we typically install from some 
trusted sources, Google Play Store. Most Antivirus apps are available to
 download for free, but some of them are paid with extra premium 
features like advance firewall protection, anti theft,&amp;nbsp;App Locker or 
Cloud Backup etc.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
But do you believe that just because you&#39;re downloading an application 
from an official app store and also if its a premium paid version, 
you&#39;re safe from malicious software? Think twice.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;insidearticlead&quot; style=&quot;clear: both; margin: 5px 0 -15px 0;&quot;&gt;


&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-7983783048239650&quot; data-ad-slot=&quot;3325994802&quot; data-adsbygoogle-status=&quot;done&quot; style=&quot;display: inline-block; height: 90px; width: 728px;&quot;&gt;&lt;ins style=&quot;background-color: transparent; border: none; display: inline-table; height: 90px; margin: 0; padding: 0; position: relative; visibility: visible; width: 728px;&quot;&gt;&lt;ins id=&quot;aswift_1_anchor&quot; style=&quot;background-color: transparent; border: none; display: block; height: 90px; margin: 0; padding: 0; position: relative; visibility: visible; width: 728px;&quot;&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/ins&gt;

&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;PAID, BUT FAKE ANTIVIRUS APP&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
In Past, Mobile Security Researchers had spotted numerous fake mobile 
antivirus scanners that were available for free download at Google&#39;s 
Play marketplace, but its the first time when a cyber criminals are 
offering a fake, but paid Antivirus Solution called ‘&lt;b&gt;&lt;i&gt;Virus Shield&lt;/i&gt;&lt;/b&gt;’ for your Android device at Google’s play store.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Virus Shield masquerade itself as an antivirus that claims to &quot;&lt;i&gt;protect you and your personal information from harmful viruses, malware, and spyware&lt;/i&gt;&quot; and also &quot;&lt;i&gt;Improve the speed of your phone,&lt;/i&gt;&quot; which it does with just a click.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Moreover, it claims to have least effect on battery, run in the 
background, and in addition it also acts as adblock software that will 
stop those &quot;&lt;i&gt;pesky advertisements,&lt;/i&gt;&quot; which we deal every day.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;MORE THAN $&lt;/b&gt;&lt;span style=&quot;text-align: left;&quot;&gt;&lt;b&gt;40,000 FRAUD AT GOOGLE PLAY STORE&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Virus Shield antivirus app costs $3.99, and has been on the Google Play 
Store for just over a week and has already been successfully downloaded 
more than 10,000 times by Smartphones users with a 4.7 star review from 
1,700 people, that means total amount received by developer is more than
 $40,000.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Even 2,607 users had hit the Google &quot;&lt;i&gt;recommend&lt;/i&gt;&quot; button, which 
means that the antivirus app must be doing great to users who look for 
trusted and efficient antivirus app to secure their devices.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;WHAT A SCANNER - VIRUS SHIELD&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Surely it doesn&#39;t scan or detect anything. &lt;i&gt;Android Police&lt;/i&gt; has discovered that the app only changes a red &quot;X&quot; graphic to a red &quot;check&quot; graphic, that’s it, nothing less or more.&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;fake antivirus app&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilAZgxyUvUuHUMr35hJ7XvXG1uxJnUsz5UhfNi_ntYNGe1g6_-vKMYqp2q0KpRWXQdU_f6bRFbTVgJO8TQije6K8fGxb-53GkZhvulKmkrkqPx59ekiv54eyNyETzHrkfoVdmEFXl7AbI/s728/fake-antivirus-app.jpg&quot; title=&quot;fake antivirus app&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The virus shield antivirus app is a total scam and it doesn&#39;t scan or 
secure your device, which means thousands of users have been scammed out
 of their money.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
When the creator (&lt;i&gt;email : Jesse_Carter@live.com&lt;/i&gt;) tracked down by 
the investigators, it revealed that the creator was a well known scammer
 who was also accused and banned from forums for trying to scam people 
out of various low-valued online game items.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
You can check out the code for yourself from here, as the android police have decompiled the app and mirrored the java code on GitHub.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;HOW TO PROTECT YOURSELF&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
There is no such way to protect you from these kinds of fraudsters. All 
you can do is report the Virus Shield via the Play Store app by listing 
the app’s &quot;&lt;i&gt;flag as inappropriate&lt;/i&gt;,&quot; then tap &quot;&lt;i&gt;other objection&lt;/i&gt;&quot; and write about the app’s fraud to users. Alternatively, you can report it on the web. Users are advised to only download applications from known and trusted publishers&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/2686192709565653952/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/first-paid-fake-android-antivirus-app.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/2686192709565653952'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/2686192709565653952'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/first-paid-fake-android-antivirus-app.html' title='First Paid Fake Android Antivirus App Downloaded 10,000 times from Google Play Store'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEila73htzNyXYtnNQFsNg0dWt2O9O19lRyAI9yFEnmHHXCtrRqemxlnVZg7KIdGJXRbXpjetud3VfOq3WFlrsotTvho4nrzkqgGcJbDGdEc8FxR8W5R2mi-Vr7E7Ntozp4TmRhdArfeTs4/s72-c/VIRUS-SHIELD-GOOGLE-PLAY-STORE.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-1493944120024490158</id><published>2014-04-12T09:18:00.000-07:00</published><updated>2014-04-12T09:18:03.914-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="secure"/><title type='text'>How to encrypt your files before uploading to Cloud Storage using CloudFogger</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 align=&quot;justify&quot; class=&quot;post-title entry-title url&quot; itemprop=&quot;headline name&quot;&gt;
How to encrypt your files before uploading to Cloud Storage using CloudFogger
&lt;/h1&gt;
&lt;div class=&quot;postmeta&quot;&gt;
&lt;span class=&quot;updated dtstamp author&quot; itemprop=&quot;datePublished&quot; title=&quot;2014-01-16T00:37:00-11:00&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span id=&quot;hnews-vcard&quot; itemscope=&quot;itemscope&quot; itemtype=&quot;http://schema.org/Person&quot;&gt;&lt;span class=&quot;author vcard byline&quot;&gt;&lt;a class=&quot;email fn&quot; href=&quot;http://thehackernews.com/p/authors.html&quot; itemprop=&quot;url&quot; rel=&quot;author&quot;&gt;&lt;span class=&quot;fn contributor&quot; itemprop=&quot;name&quot; style=&quot;text-decoration: underline;&quot;&gt;&lt;/span&gt;
&lt;/a&gt;
&lt;/span&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;div class=&quot;shareinpost&quot;&gt;





&lt;div align=&quot;center&quot; id=&quot;socialleft&quot; style=&quot;z-index: 99999;&quot;&gt;
&lt;span class=&quot;st_plusone_hcount&quot;&gt;&lt;/span&gt;
&lt;span class=&quot;st_fblike_hcount&quot; style=&quot;margin-right: 10px;&quot;&gt;&lt;/span&gt;
&lt;span class=&quot;st_facebook_hcount&quot;&gt;&lt;/span&gt;
&lt;span class=&quot;st_twitter_hcount&quot;&gt;&lt;/span&gt;
&lt;span class=&quot;st_buffer_hcount&quot;&gt;&lt;/span&gt;
&lt;span class=&quot;st_reddit_hcount&quot;&gt;&lt;/span&gt;
&lt;span class=&quot;st_linkedin_hcount&quot;&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;aim19154605892239178803&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;How to encrypt your files before uploading to Cloud Storage using CloudFogger&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF3bVA9dJ1B85isxbqMURaNPVgGIlSdynCgSk5_iveq76zrHnQ2I8CYkaVJO6ceYSKKXCEvDgT0VojIAw3weCcg3hxRvwd4VZ_SFwT8Qb2Fn9UmGkBPLveyWDftRrnrmY7uSdi3C812gs/s728/How+to+Encrypt+your+Cloud+Storage+using+CloudFogger.png&quot; title=&quot;How to encrypt your files before uploading to Cloud Storage using CloudFogger&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
In
 this Internet savvy generation, we want all of our data to be secured 
at some place. Having backups of your data is always a good idea, 
whether that data is stored in the Cloud or on your computer.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
But everyone who is following the Edward Snowden leaks of the NSA&#39;s PRISM program now pushed to hardening their Mobile devices and computers for security, privacy, and anonymity.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;insidearticlead&quot; style=&quot;clear: both; margin: 5px 0 -15px 0;&quot;&gt;


&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-7983783048239650&quot; data-ad-slot=&quot;3325994802&quot; style=&quot;display: inline-block; height: 90px; width: 728px;&quot;&gt;&lt;/ins&gt;

&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
There are many Free Cloud storage providers including&amp;nbsp;&lt;i&gt;Google Drive&lt;/i&gt;,&amp;nbsp;&lt;i&gt;Dropbox, Box, RapidShare, Amazon Cloud Drive, Microsoft SkyDrive&lt;/i&gt;&amp;nbsp;and many more. These services have a limitation that all data is unencrypted, or even if it is encrypted, the encryption keys are still generated by the company&#39;s software, meaning the company still has an access to your data.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
So as an end user, we must think
 about the security and privacy of our data. We should first encrypt our
 files on the system level and then upload a copy of it on the cloud 
storage.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
For this a robust and highly user friendly tool called &lt;b&gt;CloudFogger &lt;/b&gt;is
 available at free of cost and for using it you even need not to be a 
GEEK. It provides encryption of 256 bit AES for your files.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Easy to Install and Easy to use:&amp;nbsp;&lt;/b&gt;Follow the steps to crypt your files using CloudFogger:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step-1:&lt;/b&gt; &lt;a href=&quot;http://www.cloudfogger.com/en/&quot;&gt;Download&lt;/a&gt; and Install CloudFogger from its website. Open and create an account first:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;How to encrypt your files before uploading to Cloud Storage using CloudFogger&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHEP_H4zGiTIUQqeZqsKq-DGQ_75xVg0xmwjuUsZdegnRvzNdYnUlCWbyNZGh1fkZe0ZoOEpsZ-01SbXA-T_7RvP016L5sFhB_yDN2hIGBb1Oa-XRC-qi_GVvDOwdAnqjG0XHDtvlztCY/s728/account.png&quot; title=&quot;How to encrypt your files before uploading to Cloud Storage using CloudFogger&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step-2:&lt;/b&gt; Select the folder you are using for syncing with cloud storage (Google Drive, Sky Drive, and Dropox etc.)&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;How to encrypt your files before uploading to Cloud Storage using CloudFogger&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1-KFdiIJ3GE4zNPXUJ4o6eFRl-wRXLuuJ3MSLkerCgG248rv4WifAwOOVfwwxIHgaKPlzPmZ73QIKQ93FITCypczxinMzvHLgE_oHLsVR9FUk2eXYz6_6XXie1sXsQ9uWX4K-baPjhlM/s728/folder+syncpng.png&quot; title=&quot;How to encrypt your files before uploading to Cloud Storage using CloudFogger&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step-3:&lt;/b&gt;&amp;nbsp;Now
 you just need to drop your files into that folder. A Small Green 
overlay-symbol will appear on your files, i.e. Your files are now 
encrypted and ready to upload/sync with your Cloud storage account. 
That&#39;s it!&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;How to encrypt your files before uploading to Cloud Storage using CloudFogger&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-fMT_6VJFzCK5vimUU7FF5-lnlkAVVYcZmY68Ps10iv_w0J4cNUudo8jO5B16vzETAhdEtXn6JoMJNLFT8FDrPuDUUafYZq2eKnVFBCudBOFtZnLqMykIxvBYJMEssZe5CoyO_2UfWSQ/s728/fileupload.png&quot; title=&quot;How to encrypt your files before uploading to Cloud Storage using CloudFogger&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The New file extension for all encrypted files will be &quot;&lt;b&gt;.cfog&lt;/b&gt;&quot;, that can be accessed only if decrypted using your own CloudFogger keys.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;How to encrypt your files before uploading to Cloud Storage using CloudFogger&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiepZL1-pmALo_CrBcz_7_c-sjdezFdzyCu6j7ErIJXjjLhbN7e4zi24wxVIsPkMXMqz0dBNBsBcT-7QrXi5d10IIhWK4VJDoU7EAVGKAuQT9Ui6YwRkzV6mMyGAm5PRS-Jl0s3TrLEqZY/s728/file+on+web.png&quot; title=&quot;How to encrypt your files before uploading to Cloud Storage using CloudFogger&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
You can also encrypt documents manually, just by right clicking it, select &lt;span style=&quot;font-weight: bold;&quot;&gt;cloudfogger-&lt;/span&gt;&lt;b&gt;&amp;gt;Fogg file(s)&lt;/b&gt; and you can&amp;nbsp;access the file yourself using a virtual drive created by cloudfogger without decrypting each file.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
This client-side encryption 
ensures that nobody will be able to access your protected documents and 
files without your password. RSA private keys are stored on the 
Cloudfogger server to allow convenient installation of the product on 
several devices, but all keys are again encrypted with 256 bit AES based
 on the user&#39;s password and the company claims that user passwords will 
be never ever transmitted to their&amp;nbsp;Cloudfogger servers.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;How to encrypt your files before uploading to Cloud Storage using CloudFogger&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8GscKWOSlf4IEFtYpr0Z5-Z7WkayS4ylcN52YbwFjG1Vjsqs_aijERlsRC30NIUQy67m5ZQ18CnfVfHhsZuV0suyCD5QS-5FudSmi_elsmPAinDqp8XPaLGCqtDTrIUHrFvEeBa58k-4/s728/non+cloud+enc.png&quot; title=&quot;How to encrypt your files before uploading to Cloud Storage using CloudFogger&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Each
 file uses its own, unique AES key, that allows sharing files with 
different people, so you can add the email addresses of your friends, if
 you want them to allow decrypt your private document, image or etc.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
For most users, finding a truly 
protected Cloud service can be a challenge, as many services obviously 
have security gaps that leave data wide open to third party attacks, 
leaks, or hacking.&lt;br /&gt;
&lt;br /&gt;
CloudFogger is an application available for Windows, Mac, Andoird, iOS. 
There are many more similar tools and services that are available 
i.e.&amp;nbsp;SpiderOak, Mozy, Carbonite, IDrive or BoxCryptor and many more.&lt;br /&gt;
&lt;br /&gt;
However, CloudFogger is not an open source software, so there is an alternate available called &quot;&lt;a href=&quot;http://stefanstools.sourceforge.net/CryptSync.html&quot;&gt;CryptSync&lt;/a&gt;&quot;,
 which is an open source tool for encrypting the files before uploading 
to cloud server and it also does not store your files on the developer’s
 server like CloudFogger.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
This way, even if programs like 
NSA&#39;s PRISM continue to stand unchallenged, people can rest easy knowing
 that their data is truly protected.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/1493944120024490158/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/how-to-encrypt-your-files-before.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/1493944120024490158'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/1493944120024490158'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/how-to-encrypt-your-files-before.html' title='How to encrypt your files before uploading to Cloud Storage using CloudFogger'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF3bVA9dJ1B85isxbqMURaNPVgGIlSdynCgSk5_iveq76zrHnQ2I8CYkaVJO6ceYSKKXCEvDgT0VojIAw3weCcg3hxRvwd4VZ_SFwT8Qb2Fn9UmGkBPLveyWDftRrnrmY7uSdi3C812gs/s72-c/How+to+Encrypt+your+Cloud+Storage+using+CloudFogger.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-3709559395269539718</id><published>2014-04-12T09:16:00.000-07:00</published><updated>2014-04-12T09:16:06.754-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="NEWS"/><title type='text'>&#39;123456&#39; giving tough competition to &#39;password&#39; in Worst 25 Passwords of 2013</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 align=&quot;justify&quot; class=&quot;post-title entry-title url&quot; itemprop=&quot;headline name&quot;&gt;
&#39;123456&#39; giving tough competition to &#39;password&#39; in Worst 25 Passwords of 2013&lt;/h1&gt;
&lt;br /&gt;

&lt;div class=&quot;articlebodyonly&quot; id=&quot;articlebodyonly&quot; itemprop=&quot;articleBody&quot;&gt;
&lt;div id=&quot;aim13584373771119925329&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Worst Passwords&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS4RW6z4pThIBqZaLWJvtG5_G7wjWTqvZFjI4KRgOp_Wd1CJlRP448bOWdoXuts8kPSSeuT0q7cWESc4xyJa0wAejRQRR6h3ykaaq5YnBt7OdVfrVmC23EuJRc4xDb-52t6DXsFE9Vr0x4/s1600/Worst+Passwords.png&quot; title=&quot;Worst Passwords&quot; /&gt;&lt;/div&gt;
&lt;b&gt;123456, password, 12345678, qwerty… or abc123&lt;/b&gt;, How many of you have your password one of these??? I think quite a many of you.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Even after countless warnings and advices given to the users by many 
security researchers, people are continuously using a weak strength of 
password chains. &lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;insidearticlead&quot; style=&quot;clear: both; margin: 5px 0 -15px 0;&quot;&gt;


&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-7983783048239650&quot; data-ad-slot=&quot;3325994802&quot; data-adsbygoogle-status=&quot;done&quot; style=&quot;display: inline-block; height: 90px; width: 728px;&quot;&gt;&lt;ins style=&quot;background-color: transparent; border: none; display: inline-table; height: 90px; margin: 0; padding: 0; position: relative; visibility: visible; width: 728px;&quot;&gt;&lt;ins id=&quot;aswift_1_anchor&quot; style=&quot;background-color: transparent; border: none; display: block; height: 90px; margin: 0; padding: 0; position: relative; visibility: visible; width: 728px;&quot;&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/ins&gt;

&lt;/div&gt;
&lt;div id=&quot;aim23584373771119925329&quot;&gt;
 After observing many cyber attacks in
 2013, we have seen many incidents  where an attacker can predict or 
brute-force your passwords very easily.  
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
From 2012, the only change till now is that the string “&lt;b&gt;password&lt;/b&gt;” has shifted to the second place in a list of the most commonly used passphrases and string “&lt;b&gt;123456&lt;/b&gt;” has taken the first place recently, according to an annual &quot;Worst Passwords&quot; report released by &lt;i&gt;SplashData&lt;/i&gt;, a password management software company&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
They announced the annual list of 25 most common passwords i.e. 
Obviously the worst password that found on the Internet. The Most common
 lists of the passwords this year are &quot;&lt;b&gt;qwerty&lt;/b&gt;,&quot; &quot;&lt;b&gt;abc123&lt;/b&gt;,&quot; &quot;&lt;b&gt;111111&lt;/b&gt;,&quot; and &quot;&lt;b&gt;iloveyou&lt;/b&gt;&quot;, which are really easily guessable.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;&lt;i&gt;Another interesting aspect of this year&#39;s list is that most short 
numerical passwords showed up even though websites are starting to 
enforce stronger password policies,&lt;/i&gt;&quot; says Morgan Slain, CEO of SplashData.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Below are the worst passwords list of 2013 with Rank and showing the comparison of it from 2012:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhShg19n5ftdA5ulU8k4rZWdkgc2IVpFUyYdIWwMSM6a7GyyYOm0AEEsfaX9cWXFQkggLiM_3LyKemJo3lvZq07fPVUypnRxTmAS5WUAA5C2Zc0k0MoKHrUdvpIh8tQCPCWHFU2S-i5GLSn/s1600/List+of+Worst+Passwords.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;List of Worst Passwords&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhShg19n5ftdA5ulU8k4rZWdkgc2IVpFUyYdIWwMSM6a7GyyYOm0AEEsfaX9cWXFQkggLiM_3LyKemJo3lvZq07fPVUypnRxTmAS5WUAA5C2Zc0k0MoKHrUdvpIh8tQCPCWHFU2S-i5GLSn/s1600/List+of+Worst+Passwords.png&quot; title=&quot;List of Worst Passwords&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
If you are also using one of these passwords or other dictionary words, 
then you are advised to change it as soon as possible. We further advise
 you to use different passwords for different accounts, as if one of 
your account gets hacked, you’ll be totally ruined.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The above list of passwords was compiled from data dumps of stolen 
passwords posted online, and the firm says it was especially influenced 
by the millions of &lt;i&gt;Adobe accounts&lt;/i&gt; that were compromised in the fall.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Fact &amp;amp; figure&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;Stricture Consulting Group&lt;/i&gt; attempted to decrypt the leaked Adobe 
passwords and released an estimate that almost 2 million of the more 
than 130 million users affected by the breach appeared to be using &quot;&lt;b&gt;123456&lt;/b&gt;&quot; as a password.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Now when you talk about various security measures to protect your 
privacy and data, installing an Antivirus doesn’t mean that here your 
work gets over and you are safe enough. “&lt;i&gt;God helps those who help themselves&lt;/i&gt;” likewise nobody can secure your privacy unless and until you yourself not willing to.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Here I have listed some useful tips to make your password strength secure and easier to remember:&lt;/div&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Use a combination of lowercase, uppercase, numbers, and special characters of 8 characters long or more like &lt;i&gt;s9%w^8@t$i&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Use short passphrases with special characters separating to make it difficult for crackers and could be easily remembered like &lt;i&gt;cry%like@me (cry like me)&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Avoid using the same combination of passwords for different websites&lt;/li&gt;
&lt;li&gt;If it is difficult for you to remember different passwords for different websites and accounts than try using&lt;b&gt; Password manager applications&lt;/b&gt; like RoboForm, 1Password, LastPass.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;STAY SECURE, STAY SAFE!&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/3709559395269539718/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/123456-giving-tough-competition-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/3709559395269539718'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/3709559395269539718'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/123456-giving-tough-competition-to.html' title='&#39;123456&#39; giving tough competition to &#39;password&#39; in Worst 25 Passwords of 2013'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS4RW6z4pThIBqZaLWJvtG5_G7wjWTqvZFjI4KRgOp_Wd1CJlRP448bOWdoXuts8kPSSeuT0q7cWESc4xyJa0wAejRQRR6h3ykaaq5YnBt7OdVfrVmC23EuJRc4xDb-52t6DXsFE9Vr0x4/s72-c/Worst+Passwords.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-1660897586637416078</id><published>2014-04-12T09:14:00.003-07:00</published><updated>2014-04-12T09:14:23.106-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NEWS"/><title type='text'>Learn to Encrypt Your Emails against an invasion of privacy by NSA</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 align=&quot;justify&quot; class=&quot;post-title entry-title url&quot; itemprop=&quot;headline name&quot;&gt;
Learn to Encrypt Your Emails against an invasion of privacy by NSA&lt;/h1&gt;
&lt;div id=&quot;aim14558523318956921193&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Learn to Encrypt Your Emails against an invasion of privacy by NSA&quot; border=&quot;0&quot; height=&quot;470&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0D2D_fXfNlhl02MeBb7QXRlWCfR79M5qnQ9LbwYTsMJmmVO15b_IUWrPNn9obmEH6guAPgcVvZVEjbGa_lHfekChVyjfwoFcv4XYk6sA2I2Hkmst2YevCB4USmkUPwCBeWBgKv8LwcRk/s728/Learn+to+Encrypt+Your+Emails+against+an+invasion+of+privacy+by+NSA.jpg&quot; title=&quot;Learn to Encrypt Your Emails against an invasion of privacy by NSA&quot; width=&quot;728&quot; /&gt;&lt;/div&gt;
Now that we have enough details about how the NSA&#39;s Surveillance program, running for a long time against almost each country of this planet.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Hundreds of top-secret NSA documents provided by whistleblower Edward Snowden already exposed that Spying projects like PRISM and MUSCULAR
 are tapping directly into Google and Yahoo internal networks to access 
our Emails. NSA&#39;s tactics are even capable to&amp;nbsp;defeat the SSL encryption,
 so&amp;nbsp;unsecured email can easily be monitored and even altered as it 
travels through the Internet.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
One major point on which all of 
us are worrying is about the privacy of communication among each other 
and If you&#39;re looking for a little personal privacy in your 
communications you will need to encrypt your messages.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;insidearticlead&quot; style=&quot;clear: both; margin: 5px 0 -15px 0;&quot;&gt;


&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-7983783048239650&quot; data-ad-slot=&quot;3325994802&quot; data-adsbygoogle-status=&quot;done&quot; style=&quot;display: inline-block; height: 90px; width: 728px;&quot;&gt;&lt;ins style=&quot;background-color: transparent; border: none; display: inline-table; height: 90px; margin: 0; padding: 0; position: relative; visibility: visible; width: 728px;&quot;&gt;&lt;ins id=&quot;aswift_1_anchor&quot; style=&quot;background-color: transparent; border: none; display: block; height: 90px; margin: 0; padding: 0; position: relative; visibility: visible; width: 728px;&quot;&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/ins&gt;

&lt;/div&gt;
&lt;div id=&quot;aim24558523318956921193&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
To 
avoid privacy breaches; rather I should say to make it more difficult 
for the NSA or British GCHQ surveillance program to read our 
communication, we should use&amp;nbsp;PGP encryption (Pretty Good Privacy).&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Why we should Encrypt our Emails?&amp;nbsp;&lt;/b&gt;Each
 public mail service provider sends information from sender to recipient
 like a postcard which has a recipient’s address and the content to be 
conveyed; and is open to the medium used for sending the card. Encryption
 is an envelope of the content of the document to be sent and leave the 
recipient’s address open so that it can reach to the destination. So by 
encrypting your mail, even if any mail service provider is keeping a 
record of all mails, you need not to worry that your document is being 
read by third person neither by NSA people.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Encrypting your email may sound 
daunting, but it&#39;s actually quite simple.&amp;nbsp;We are going to use something 
called GNU Privacy Guard (GnuPG) or Gpg4win (Windows).&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
 &lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Installation&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step 1:&lt;/b&gt; Download the &lt;a href=&quot;http://gpg4win.org/download.html&quot;&gt;Gpg4win&lt;/a&gt; on windows machine and install it.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Gpg4win&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgq_ODkYuppMVnD2X4zZg_WaLCFHtmyqv4aD1v-4wlRyNHHXSr0DE4uEcfzIM2KF2j1d_pySlFE4VQ4hXbvoQrzukgQ8OzY4p0_K8EIt4FkbINRaTs31ZFHl76SE-LfQQK1cvrE2LOiDbU/s728/Gpg4win.png&quot; title=&quot;Gpg4win&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step 2:&lt;/b&gt; Go ahead and after successful installation, close the window.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Generating your PGP pair key:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step 3:&lt;/b&gt; Now open&lt;i&gt; Kleopatra&lt;/i&gt; tool (A GUI GPG Key Manager) to create a new asymmetric key pair (public &amp;amp; private). Click on &lt;i&gt;File&lt;/i&gt; -&amp;gt;&lt;i&gt; New Certificate&lt;/i&gt;.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;PGP pair key&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi5fQ-zZhmercGe3oRS-tA20ry6ixFEUKjU8xoppTpnTY7lKG2kzJlEWdLj0C7PuDho4rUXOPupp0rKnn5HCZ6F_k1YncIJ5s80dMucRJVvMeQA8ySiMK0lrStwnNzu1tqy8K5tR4cs9A/s728/PGP+pair+key.png&quot; title=&quot;PGP pair key&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step 4:&lt;/b&gt; In the key generation wizard, click on &quot;&lt;i&gt;Create a personal OpenPGP key pair&lt;/i&gt;&quot; and in the next window enter your basic details:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;PGP pair key&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5Hi5DwU0ZcFm3LEs7W4pC7pJm3cs5yukODMAoZ8wGUnKamhkPHr8fw_Qi3ywUIjIlQekIRZebWV3qhwdHRKnO8ruQytq9S2G5CWQk8Dn-nevh_2KZR9oD_9qVblSiy6hkgkzwUIH6O08/s728/PGP+pair+key.png&quot; title=&quot;PGP pair key&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step 5: &lt;/b&gt;In the next window, once review your details and click &quot;&lt;i&gt;Create Key&lt;/i&gt;&quot;. It will prompt you for entering a &lt;span class=&quot;GINGER_SOFTWARE_mark&quot; id=&quot;af2fe827-4331-49b6-bb70-bbae43a938f8&quot;&gt;passphrase&lt;/span&gt;. Set a strong password and confirm it once again in the next window.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step 6: &lt;/b&gt;Within a few seconds (depending on your system speed), Your Key pair will be generated (as shown).&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;PGP pair key&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6ueIvyK7rqWyEeOIs8orcCVyxOhN_we4rzXUuRhPoYnzjkzxbB-YoXFVdcJab6L0DdSekNrHHjdttV0EwHCvzebTeECrn3N7hsX3C_7fW3LX75OTgLk55Wx5Jl7egsNPIVI3MVabmFJg/s728/PGP+pair+key.png&quot; title=&quot;PGP pair key&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step 7:&lt;/b&gt; You should &quot;&lt;i&gt;Make a backup of your file pair&lt;/i&gt;&quot;
 somewhere safe. You can also export the public key to the public 
directory by clicking on the Upload Certificate to Directory Service.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step 8:&lt;/b&gt; Once done, the key manager main interface will show your certificate as shown:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;PGP pair key&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtSnCvvy_tWn9k8VzhpypEc1e5gDlXI1i2lhccDFrGGED0dVn3IovDuLWjGEkTkYh0VtXEqONBWkiw81MnWhGWPBmLNHXN_Klkt14algQMedgAWGJ13m46asXsEc5k61ll6iDJUeOsPQA/s728/PGP+pair+key.png&quot; title=&quot;PGP pair key&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step 9:&lt;/b&gt; Select your newly generated certificate -&amp;gt; Right click -&amp;gt; click on &lt;i&gt;Export Certificates&lt;/i&gt; to save your&amp;nbsp;Public keys on the desktop.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
You will have to exchange your 
public keys with whom you want to make secure communication&amp;nbsp;via mails. 
Many people post their public keys to their personal websites. You 
can&amp;nbsp;send it as attachments to everyone&amp;nbsp;you email, just so they have 
them.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;PGP pair key&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5qeN-aod-XMZMYom-Jdx0LiAzZWq5dXi6-ATY1hSpb1oHc4rUEB94XEGC_p-mXFSyVSI6vjwaFLEyhxnfupfZhyVf6dARIXTbHaw8cVvtkIC8d8XxFVw9N62JV-dVaJUawSCvCgaWXas/s728/PGP+pair+key.png&quot; title=&quot;PGP pair key&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Once your friends will have your Public keys, they can import it &lt;i&gt;Kleoptra&lt;/i&gt; software via &#39;Import Certification&#39; option from the menu.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Composing an encrypted email:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step 1:&lt;/b&gt; Open Outlook -&amp;gt; Compose a new mail and write the recipient’s address, Subject and your message.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;PGP pair key&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2l2a8xaakVX9ns5lkEyaoPeJpv_vGBCvld6WjB11xcDfyZ9MIAk3CRxB1rgDFI63p9sm5WbUhaIAErVf4v4K9vkbDBJPQhwgTypKyImjijErhLfOKh7fOCgcvTw9VfmTlkNp5jPWgylc/s728/PGP+pair+key.png&quot; title=&quot;PGP pair key&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;Note:&lt;/i&gt;
 You should already have your email ID configured over Outlook software 
on windows machine and if your Outlook doesn&#39;t have&amp;nbsp;OpenPGP, then you 
can install &#39;&lt;a href=&quot;https://code.google.com/p/outlook-privacy-plugin/&quot;&gt;Outlook Privacy Plugin&lt;/a&gt;&#39; to enable it.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step 2: &lt;/b&gt;Under GpgOL menu (as shown), click on &#39;&lt;i&gt;Encrypt&#39;&lt;/i&gt;. The software will automatically import the public keys of the recipient from the Key Manager (&lt;i&gt;only if exists or imported before&lt;/i&gt;).&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;PGP pair key&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizJDYMOS16ppcznjKemVY7JyXrw88b9811RP2xmkgdABM0aQDJds-qrjf7Ee95EJw6S_gNcHxfyh3kwO2rBOfOCFZerWaV8mlecOmTsILX8dE9n7PwNlT6ZetNyMKI2q8laj7vMXtDj0E/s728/PGP+pair+key.png&quot; title=&quot;PGP pair key&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step 3: &lt;/b&gt;If you also want to attach some files to this encrypted email, then under &lt;i&gt;GpgOL menu&lt;/i&gt;, click &lt;i&gt;Encrypted File&lt;/i&gt; and select the file to be attached and SEND mail.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
When you or the recipient will receive&amp;nbsp;the encrypted mail, one should first decrypt it using private keys.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Step 4:&lt;/b&gt;&amp;nbsp;Under &lt;i&gt;GpgOL&lt;/i&gt; menu, click on &#39;&lt;i&gt;Decrypt&lt;/i&gt;&#39; to convert the email into readable form. To proceed, It &lt;span class=&quot;GINGER_SOFTWARE_mark&quot; id=&quot;b507dec4-fa5e-4949-bba2-4a64f420712a&quot;&gt;will ask&lt;/span&gt; for &amp;nbsp;the secret &lt;span class=&quot;GINGER_SOFTWARE_mark&quot; id=&quot;115ba94f-13a0-409c-a17e-8a8de71d1b28&quot;&gt;passphrase&lt;/span&gt; entered at the time of creation of key pair.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
That&#39;s it!&amp;nbsp;Other than Outlook 
you can also use various desktop email clients (Thunderbird or Postbox) 
or web mail, that also support PGP encryption. You can import your key 
pair to other software also in order to manage the same account.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/1660897586637416078/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/learn-to-encrypt-your-emails-against.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/1660897586637416078'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/1660897586637416078'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/learn-to-encrypt-your-emails-against.html' title='Learn to Encrypt Your Emails against an invasion of privacy by NSA'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0D2D_fXfNlhl02MeBb7QXRlWCfR79M5qnQ9LbwYTsMJmmVO15b_IUWrPNn9obmEH6guAPgcVvZVEjbGa_lHfekChVyjfwoFcv4XYk6sA2I2Hkmst2YevCB4USmkUPwCBeWBgKv8LwcRk/s72-c/Learn+to+Encrypt+Your+Emails+against+an+invasion+of+privacy+by+NSA.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-7928916935008906603</id><published>2014-04-12T09:09:00.003-07:00</published><updated>2014-04-12T09:09:32.886-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NEWS"/><title type='text'> Introducing New Samsung Galaxy Tab Note 10.1</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot;&gt;
Introducing New Samsung Galaxy Tab Note 10.1
&lt;/h3&gt;
&lt;div class=&quot;line_10&quot;&gt;
&lt;span class=&quot;left10&quot;&gt;

&lt;a class=&quot;timestamp-link&quot; href=&quot;http://www.igadgetware.com/2012/03/introducing-new-samsung-galaxy-tab-note.html&quot; rel=&quot;bookmark&quot; title=&quot;permanent link&quot;&gt;
&lt;abbr class=&quot;published&quot; itemprop=&quot;datePublished&quot; title=&quot;2012-03-05T13:12:00+05:30&quot;&gt;
&lt;/abbr&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;right10&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;post-header&quot;&gt;

&lt;/div&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgC45-0Rw88Ny2sosLkTevV7WeoiAP-b-RInq4TfHo90uRpaWuCJ69WWdR43WJ2iIXwofQOMNmYMtaOZXUy0vUrNDCGTxh4kD3_8w9MGMXi3nBZ-3GLIsFGyzT3afMiq-jvflfe7tXssYbE/s1600/galaxy-note-10.1-product-image-3.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;532&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgC45-0Rw88Ny2sosLkTevV7WeoiAP-b-RInq4TfHo90uRpaWuCJ69WWdR43WJ2iIXwofQOMNmYMtaOZXUy0vUrNDCGTxh4kD3_8w9MGMXi3nBZ-3GLIsFGyzT3afMiq-jvflfe7tXssYbE/s640/galaxy-note-10.1-product-image-3.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Samsung Galaxy Tab 10.1&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Samsung introduce new 10.1 inch Tablet
 with S pen specific features. This tablet support Android 4.0 Ice Cream
 sandwich OS. and its running on 1.4 GHz dual-core CPU with 1GB RAM. 
Both side Camera with&amp;nbsp;3 MGpx rear front facing camera and 2 MGpx at 
backside on this Tab.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;This
 tablet has specially design for creative designers, students and for 
business professionals purpose.In this Tab Adobe Photoshop and Adobe 
Ideas apps are pre installed.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;and it will be coming in 16GB, 32GB, 64 GB versions&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;with a&amp;nbsp;micro SD&amp;nbsp;card slot capable of accepting another 32GB worth of space.&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&amp;nbsp;..&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;div&gt;
&lt;span style=&quot;color: red; font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;b&gt;Features:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Resolution 10.1 inch (1280*800) WXGA&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;1.4dual core CPU&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;1Gb RAM&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Wifi&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Bluetooth 3.0&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b style=&quot;color: red; font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Press Release:&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b style=&quot;color: red; font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;Boost your Creativity and Productivity with GALAXY Note 10.1&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;A new device category, GALAXY Note 10.1 comes with an immersive 10.1&#39;&#39; screen and&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;S Pen versatility to unlock your creativity and productivity&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;Barcelona,
 February 27, 2012 – At Mobile World Congress, Samsung announced the 
launch of GALAXY Note 10.1, which expands the GALAXY Note experience in 
creativity, productivity, and learning.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;With
 its large display, GALAXY Note 10.1 provides multi-screen functionality
 to maximize efficiency in learning, work and creative endeavors. Its 
multi-screen functionality enables you to do a true multi-tasking, by 
viewing Internet pages, videos or other applications side by side while 
writing or sketching your ideas.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;GALAXY
 Note 10.1 features S Note, a unique and efficient tool that lets you 
combine notes or sketches together with web content, images and other 
digital media into your own personalized storyboards. It gives you a new
 way to create stories as S Note provides various ready-to-use templates
 such as meeting minutes, recipe, cards, diary, magazine and more. Also,
 hand-drawn geometric shapes can be perfectly digitized by using the 
Shape Match function, which helps users to create more organized idea 
sketches and storyboards.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;Moreover,
 by using the S Note&#39;s integrated knowledge search engines, users can 
quickly search, obtain information, and easily drag &amp;amp; drop the 
cropped images and content onto S Notes without having to switch between
 screens.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;GALAXY
 Note 10.1 enables an extraordinary learning experience. Students can 
watch a lecture live-streamed on video while writing down comments on S 
Note; research a college essay on the web while taking notes; or even 
read a full e-textbook while annotating it. Similar to the Shape Match, 
Formula Match function helps to correct and digitize formulas hand-drawn
 with S Pen, making the device a more powerful education tool.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;Users
 can fully enjoy PC-like premium photo editing and drawing experiences 
with Adobe® Photoshop® Touch and Adobe Ideas. Photoshop Touch lets users
 transform images with core Photoshop features and combine multiple 
photos into layered images, make popular edits, apply professional 
effects, and more. Adobe Ideas is an easy-to-master drawing tool that 
allows users to sketch ideas, choose amazing color themes and import 
images. Both are specially optimized for S pen and are exclusively 
pre-loaded on Samsung GALAXY Note 10.1.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;&quot;GALAXY
 Note 10.1 takes productivity on a Note to a whole new level. With a 
larger, fully utilizable screen and superior performance, it combines 
the intuitiveness of handwriting with all the versatility of digital 
content to let users be more productive across all of life&#39;s demanding 
tasks-whether working, learning, or simply creating their own stories,&quot; 
said JK Shin, President of IT &amp;amp; Mobile Communications Division at 
Samsung Electronics. &quot;With GALAXY Note 10.1 we are demonstrating 
Samsung&#39;s commitment to extend the mobile category and are working with 
key partners like Adobe to provide extraordinary experiences for users 
that enable them to be more productive, express themselves creatively 
and add a touch of fulfillment to their lives.&quot;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;Ensuring
 intuitive multitasking and web browsing, GALAXY Note 10.1 runs on 
AndroidTM 4.0 (Ice Cream Sandwich) and features a 1.4GHz dual-core 
processor and HSPA+ connectivity. Its real-time video streaming and Full
 HD video playback add to the device&#39;s content versatility.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;GALAXY
 Note 10.1&#39;s innovative S Pen, the most advanced pen input solution on 
the market, is completely integrated into the device&#39;s original 
applications. It provides enhanced pressure sensitivity, superior 
accuracy and control when editing or writing, providing an analog pen 
writing experience on a digital device.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;i&gt;The GALAXY Note 10.1 is exhibited at Samsung stand (Hall 8), Mobile World&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/7928916935008906603/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/introducing-new-samsung-galaxy-tab-note.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/7928916935008906603'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/7928916935008906603'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/introducing-new-samsung-galaxy-tab-note.html' title=' Introducing New Samsung Galaxy Tab Note 10.1'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgC45-0Rw88Ny2sosLkTevV7WeoiAP-b-RInq4TfHo90uRpaWuCJ69WWdR43WJ2iIXwofQOMNmYMtaOZXUy0vUrNDCGTxh4kD3_8w9MGMXi3nBZ-3GLIsFGyzT3afMiq-jvflfe7tXssYbE/s72-c/galaxy-note-10.1-product-image-3.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-267148529481870865</id><published>2014-04-12T09:07:00.005-07:00</published><updated>2014-04-12T09:07:49.004-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NEWS"/><title type='text'> Google Chrome 35.0.1912.2 Dev And Firefox 29.0 Beta 3 Updated</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;text-align: left;&quot;&gt;
Google Chrome 35.0.1912.2 Dev And Firefox 29.0 Beta 3 Updated
&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;


&lt;/h2&gt;
&lt;div class=&quot;line_10&quot; style=&quot;text-align: left;&quot;&gt;
&lt;h2&gt;
&lt;span class=&quot;left10&quot;&gt;

&lt;a class=&quot;timestamp-link&quot; href=&quot;http://www.igadgetware.com/2014/03/google-chrome-35019122-dev-and-firefox.html&quot; rel=&quot;bookmark&quot; title=&quot;permanent link&quot;&gt;
&lt;abbr class=&quot;published&quot; itemprop=&quot;datePublished&quot; title=&quot;2014-03-28T18:53:00+05:30&quot;&gt;
&lt;/abbr&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;right10&quot;&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;/div&gt;
&lt;div class=&quot;post-header&quot;&gt;

&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; height=&quot;282&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvIu1dOWWhzj2bMkBc-FFHIUtvBL95yo7OasAz3XS_AflcLaBZW8wjVjTl85Sc7_dSkLxnPFQIFAaDVThm_a2lmxa1g9NocKNbsxD6za6VKEE93PLKFErmDJkCpyo3SbgxkKXS_hHcyXjW/s1600/Chrome+And+Firefox.png&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Google 
Chrome 35.0.1912.2 Dev And Firefox 29.0 Beta 3 Updated. New Firefox 
change their graphics and updates with speed. Both browser has fixed 
their bugs with new updates to get fast and free browsing.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red; font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;Firefox 29.0 Beta 3&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Filename: Firefox Setup 29.0b3.exe&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;File size: 28.82MB (30,218,912 bytes)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Requirements: Windows 2000 / XP / Vista / Windows7 / XP64 / Vista64 / Windows7 64 / Windows8 / Windows8 64&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Languages: en-US&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;License: Open Source&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Download available&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red; font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;Google Chrome 35.0.1912.2 Dev Beta&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Filename: 35.0.1912.2_chrome_installer.exe&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;File size: 31KB (32,097 bytes)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Requirements: Windows XP / Vista / Windows7 / XP64 / Vista64 / Windows7 64 / Windows8 / Windows8 64&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Languages: Multiple languages&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;License: Open Source&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;You can also download Chrome for OSX and Linux too.&lt;/span&gt;&lt;br /&gt;
Download available&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/267148529481870865/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/google-chrome-35019122-dev-and-firefox.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/267148529481870865'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/267148529481870865'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/google-chrome-35019122-dev-and-firefox.html' title=' Google Chrome 35.0.1912.2 Dev And Firefox 29.0 Beta 3 Updated'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvIu1dOWWhzj2bMkBc-FFHIUtvBL95yo7OasAz3XS_AflcLaBZW8wjVjTl85Sc7_dSkLxnPFQIFAaDVThm_a2lmxa1g9NocKNbsxD6za6VKEE93PLKFErmDJkCpyo3SbgxkKXS_hHcyXjW/s72-c/Chrome+And+Firefox.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-1489142023619706051</id><published>2014-04-12T09:06:00.002-07:00</published><updated>2014-04-12T09:06:21.441-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NEWS"/><title type='text'> Twitter Gets Banned In Turkey</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;text-align: left;&quot;&gt;
Twitter Gets Banned In Turkey&lt;/h2&gt;
&lt;br /&gt;&lt;div&gt;
&lt;div class=&quot;post-header&quot;&gt;

&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; height=&quot;358&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI8TTKK1ghnxauuNvepeiNM3ruFsRatSttqJn_Z-DyThuijmjNl97lanT-sKIOOpbNPmUWY-fZfYFc-lWJiYgbTnHbFrgt_m6d0UZAZ6VZZT6RJbxY6ZaagtBbVjvid4ZBQn2ywluHXKEU/s1600/Twitter+Banned.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Twitter Gets Banned In Turkey.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Twitter
 Blocked In Turkey due to leak post against Turkish Government. As well 
as Iran, Egypt, China already blocked twitter due to privacy policy. 
Twitter have 200 million active users.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;According to &lt;a href=&quot;http://www.dailydot.com/politics/twitter-banned-turkey/&quot; target=&quot;_blank&quot;&gt;Dailydot&lt;/a&gt;,
 Turkish journalist Erdem Arda Gunes explained how the ban was 
implemented to the Daily Dot. “The ban started after midnight and got 
into effect gradually depending which internet providers they used, but 
it&#39;s a court order (actually four different courts) which means every 
provider, including GSM companies, are obliged to implement this ban.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;But still 
Turkey user can send tweet from Sms service, Avea and Vodafone users can
 text START to 2444 and Turkcell subscribers can text START to 2555, 
also&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&amp;nbsp;use twitter with proxies, Vpn and SMS services.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/1489142023619706051/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/twitter-gets-banned-in-turkey.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/1489142023619706051'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/1489142023619706051'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/twitter-gets-banned-in-turkey.html' title=' Twitter Gets Banned In Turkey'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI8TTKK1ghnxauuNvepeiNM3ruFsRatSttqJn_Z-DyThuijmjNl97lanT-sKIOOpbNPmUWY-fZfYFc-lWJiYgbTnHbFrgt_m6d0UZAZ6VZZT6RJbxY6ZaagtBbVjvid4ZBQn2ywluHXKEU/s72-c/Twitter+Banned.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-2012153274041938985</id><published>2014-04-12T09:02:00.005-07:00</published><updated>2014-04-12T09:02:55.955-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NEWS"/><title type='text'> Apple iRing The Bluetooth Ring Concept </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;







                          
                        
&lt;br /&gt;
&lt;div class=&quot;you-in&quot; style=&quot;text-align: left;&quot;&gt;
&lt;h2 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;in0&quot;&gt;&lt;/span&gt;&lt;span class=&quot;in2&quot;&gt;&lt;a href=&quot;http://www.igadgetware.com/search/label/Tech%20News&quot; rel=&quot;tag&quot;&gt;&lt;/a&gt;&lt;/span&gt;Apple iRing The Bluetooth Ring Concept
&lt;/h2&gt;
&lt;/div&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;


&lt;/h2&gt;
&lt;div class=&quot;line_10&quot; style=&quot;text-align: left;&quot;&gt;
&lt;h2&gt;
&lt;span class=&quot;left10&quot;&gt;


&lt;abbr class=&quot;published&quot; itemprop=&quot;datePublished&quot; title=&quot;2012-03-06T11:25:00+05:30&quot;&gt;
&lt;/abbr&gt;&lt;/span&gt;&lt;span class=&quot;right10&quot;&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;/div&gt;
&lt;div class=&quot;post-header&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIN0QZ_BghkG_n6FyblZ-pY847vBKsvrJvcuO0ZvK-WNwwNrW4f8lrEEUBoR6zZ5qwpA3kLTLVWurnPCrYPc-izcnYFpnEg2bZyAdO3n4-xP-bbP0t5yTVJ4Z1afhgEqBJFgeS4OEBjAQF/s1600/I_Can__t_Live_Without_You_by_Pain_Tears.jpg&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;This
 Gadget is unique because its has great concept of Bluetooth ring which 
has designed by Victor Solo. This ring connectivity with wireless 
bluetooth of your ipad and iphone.
 After connected you can play songs, volume control up and down, skip 
music, and with play and pause function controls on the ring. iRing 
features as&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;a touch sensitive functions strip.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-iqaf_FetT8qpUSIL9d7xw_uka_gMl0w12vmkwJAeczE6LoouSpZeURW7WuwP39TYWGape1fYsQPCZsmY-IBa7nqzcTloePui4Gr_8CDyZytQT76L9cXfx0HRTZ3nYj_Deus2_ROEjIz/s1600/505181216255855.jpg&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
The below image show that how its will look on finger&lt;/div&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie6aViyZCrba91ZuqkyfJdtY8oqi3PgyqG8CXY0rZLBE2SNtE5RbLXAOPmliNMFG7eS0R_UXNAnPnWNH12DzYKfLHvwAXG8nW8rJ_jUtwjCwZ7vvtolnvESVewaoUxeiIcIAhRwqGPEcXd/s1600/505181216255831.jpg&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/2012153274041938985/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/apple-iring-bluetooth-ring-concept.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/2012153274041938985'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/2012153274041938985'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/apple-iring-bluetooth-ring-concept.html' title=' Apple iRing The Bluetooth Ring Concept '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIN0QZ_BghkG_n6FyblZ-pY847vBKsvrJvcuO0ZvK-WNwwNrW4f8lrEEUBoR6zZ5qwpA3kLTLVWurnPCrYPc-izcnYFpnEg2bZyAdO3n4-xP-bbP0t5yTVJ4Z1afhgEqBJFgeS4OEBjAQF/s72-c/I_Can__t_Live_Without_You_by_Pain_Tears.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-4310296911939905106</id><published>2014-04-12T08:59:00.002-07:00</published><updated>2014-04-12T08:59:23.792-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>Bypass Victim Smartphone Through Viber App</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 class=&quot;post-title entry-title&quot; itemprop=&quot;name headline&quot;&gt;
Bypass Victim Smartphone Through Viber App
&lt;/h1&gt;
&lt;div class=&quot;bwh-title&quot;&gt;
&lt;div class=&quot;isibwh&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;post-header&quot; style=&quot;left: -9999px; position: absolute;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; height=&quot;348&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2DiFAgP54lX-11lnitH4Qc6NXy44BiQIC4sQb5lKL0gX6BBM8akTlAnwPQ7zCRWd3hL7EPxLWRrWIf1DFBo4EMMM7cPPVwsfKLbDmf18U5aaOEmlwLLkiRXhjNsfACX41U1mnQPljkAI-/s640/viber+app+vulnerability.png&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;Bypass Smartphone Lock Screen Through Viber App:&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; First send viber message to victim&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Victim get viber message popups do some action on it.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Then send another message to victim mobile.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Victim mobile again get popup. Press back button of victim mobile.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Now you get a full access of victim phone. &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/4310296911939905106/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/bypass-victim-smartphone-through-viber.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/4310296911939905106'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/4310296911939905106'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/bypass-victim-smartphone-through-viber.html' title='Bypass Victim Smartphone Through Viber App'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2DiFAgP54lX-11lnitH4Qc6NXy44BiQIC4sQb5lKL0gX6BBM8akTlAnwPQ7zCRWd3hL7EPxLWRrWIf1DFBo4EMMM7cPPVwsfKLbDmf18U5aaOEmlwLLkiRXhjNsfACX41U1mnQPljkAI-/s72-c/viber+app+vulnerability.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-3589243894017368925</id><published>2014-04-12T08:57:00.005-07:00</published><updated>2014-04-12T08:57:40.357-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NEWS"/><title type='text'>Introducing New JARVIS Operating System</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 class=&quot;post-title entry-title&quot; itemprop=&quot;name headline&quot;&gt;
Introducing New JARVIS Operating System
&lt;/h1&gt;
&lt;div class=&quot;bwh-title&quot;&gt;
&lt;br /&gt;&lt;a class=&quot;comment-link&quot; href=&quot;http://blog.hackersonlineclub.com/2013/09/introducing-new-jarvis-operating-system.html#comment-form&quot;&gt;&lt;/a&gt;
&lt;/div&gt;
&lt;div class=&quot;post-header&quot; style=&quot;left: -9999px; position: absolute;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;_38 direction_ltr&quot;&gt;
&lt;span class=&quot;null&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span class=&quot;null&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;358&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAab7PCgACvAOHMos7YMzX0sgHC0XAk44D01ueUx2AOBG1RJMe9oJ0RaBYhEATgXmJIyXER36k0H3c4zNpcINBOGx4OuO18bEahwUADaQ94lrumwfA2P4o9QyVTK3uWAiZgPSuEPgo4H2n/s640/jarvis+Artificial+Intelligence+Assistant+Operating+System.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;null&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;_38 direction_ltr&quot;&gt;
&lt;span class=&quot;null&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;_38 direction_ltr&quot;&gt;
&lt;span class=&quot;null&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Jarvis v0.1 (Artificial Intelligence based Operating System).&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Indian
 Cyber Security researchers has designed JARVIS. HOC talked with one of 
the developer named Chiragh Dewan, 18 year old, who is&amp;nbsp;pursuing&amp;nbsp;BCA.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Its totally different from other OS because its function can be control by voice.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;_38 direction_ltr&quot;&gt;
&lt;span class=&quot;null&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;_38 direction_ltr&quot;&gt;
&lt;span class=&quot;null&quot;&gt;&lt;b style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;1) Introduction on Jarvis OS&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;_38 direction_ltr&quot;&gt;
&lt;span class=&quot;null&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Jarvis is different, because it can interact with its 
users using voice and gestures. It’s also a server which can be accessed
 by many clients (we call them nodes), so basically it&#39;s a new concept, 
one which is new and better than anything available in the market.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;b&gt;2) Introduce Developer &amp;amp; Their Team&lt;/b&gt;&lt;br /&gt;

                Himanshu Vaishnav and Chiragh dewan originally founded 
this project. We were driven by our passion about bringing Jarvis to 
life. We designed the system Together. This project is output of our 
combined efforts and our individual knowledge.&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;null&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Our team consist of 7 members both founders [Chiragh 
&amp;amp; Himanshu], Vikas [AIML], Vinmay [API], Sravan [UI], Mayur 
[Programming].&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;b&gt;3) Aim to make Jarvis OS&lt;/b&gt;&lt;br /&gt;

                To make a new product, a new technology with a fresh 
approach to the technology. Our motto is making Jarvis a companion to 
its user, we are making a life Automation system.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;b&gt;4) Features of Jarvis OS&lt;/b&gt;&lt;br /&gt;

                Jarvis interact with humans with voice, gestures, 
sensors, and behavior. It will automate it&#39;s user&#39;s life with its 
capabilities of learning from usage and use previous data to generate 
new facts.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;b&gt;5) How much time is remaining to launch Jarvis OS?&lt;/b&gt;&lt;br /&gt;
                We are at working hard to finish the first public version, world will know when we will launch.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;b&gt;6) Jarvis OS is Free or Paid?&lt;/b&gt;&lt;br /&gt;
                Haven’t decided yet!!! &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/3589243894017368925/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/introducing-new-jarvis-operating-system.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/3589243894017368925'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/3589243894017368925'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/introducing-new-jarvis-operating-system.html' title='Introducing New JARVIS Operating System'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAab7PCgACvAOHMos7YMzX0sgHC0XAk44D01ueUx2AOBG1RJMe9oJ0RaBYhEATgXmJIyXER36k0H3c4zNpcINBOGx4OuO18bEahwUADaQ94lrumwfA2P4o9QyVTK3uWAiZgPSuEPgo4H2n/s72-c/jarvis+Artificial+Intelligence+Assistant+Operating+System.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-387621687413356911</id><published>2014-04-12T08:56:00.001-07:00</published><updated>2014-04-12T08:56:20.159-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NEWS"/><title type='text'>Researchers Get $10,000 for Hacking Google Server with Malicious XML</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 align=&quot;justify&quot; class=&quot;post-title entry-title url&quot; itemprop=&quot;headline name&quot;&gt;
Researchers Get $10,000 for Hacking Google Server with Malicious XML&lt;/h1&gt;
&lt;br /&gt;&lt;div class=&quot;shareinpost&quot;&gt;





&lt;div align=&quot;center&quot; id=&quot;socialleft&quot; style=&quot;z-index: 99999;&quot;&gt;
&lt;span class=&quot;st_plusone_hcount&quot;&gt;&lt;/span&gt;
&lt;span class=&quot;st_fblike_hcount&quot; style=&quot;margin-right: 10px;&quot;&gt;&lt;/span&gt;
&lt;span class=&quot;st_facebook_hcount&quot;&gt;&lt;/span&gt;
&lt;span class=&quot;st_twitter_hcount&quot;&gt;&lt;/span&gt;
&lt;span class=&quot;st_buffer_hcount&quot;&gt;&lt;/span&gt;
&lt;span class=&quot;st_reddit_hcount&quot;&gt;&lt;/span&gt;
&lt;span class=&quot;st_linkedin_hcount&quot;&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;articlebodyonly&quot; id=&quot;articlebodyonly&quot; itemprop=&quot;articleBody&quot;&gt;
&lt;div id=&quot;aim17646985072141018969&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjUcbppCRSJ7xgXPIaNvqGFmeqR67k7cIm3JPNGrs1h7PS0JBM_TPUUFUl6vD3nNEly_2fsOuReRPfnUIRrxprGZFTmDT3T0ET_zDHQPjBhX0vlhKn9mL8M6NX_EKQwzvFWfbNGh11I5s/s728/XML-Externa-+Entity-vulnerability.png&quot; /&gt;A
 critical vulnerability has been uncovered in Google that could allow an
 attacker to access the internal files of Google’s production servers. 
Sounds ridiculous but has been proven by the security researchers from 
Detectify.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The vulnerability resides in the Toolbar Button Gallery (&lt;i&gt;as shown&lt;/i&gt;).
 The team of researchers found a loophole after they noticed that Google
 Toolbar Button Gallery allows users to customize their toolbars with 
new buttons. So, for the developers, it is easy to create their own 
buttons by uploading XML files containing metadata for styling and other
 such properties.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;insidearticlead&quot; style=&quot;clear: both; margin: 5px 0 -15px 0;&quot;&gt;


&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-7983783048239650&quot; data-ad-slot=&quot;3325994802&quot; style=&quot;display: inline-block; height: 90px; width: 728px;&quot;&gt;&lt;/ins&gt;

&lt;/div&gt;
&lt;div id=&quot;aim27646985072141018969&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
This feature of Google&amp;nbsp;search engine is vulnerable to&amp;nbsp;&lt;b&gt;&lt;i&gt;XML External Entity (XXE)&lt;/i&gt;&lt;/b&gt;. It is an XML injection that allows an attacker to force a badly configured XML parser to &quot;&lt;i&gt;include&lt;/i&gt;&quot; or &quot;&lt;i&gt;load&lt;/i&gt;&quot; unwanted functionality that can compromise the security of a web application.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
“&lt;i&gt;The root cause of XXE vulnerabilities is naive XML parsers that 
blindly interpret the DTD of the user supplied XML documents. By doing 
so, you risk having your parser doing a bunch of nasty things. Some 
issues include: local file access, SSRF and remote file includes, Denial
 of Service and possible remote code execution. If you want to know how 
to patch these issues, check out the OWASP page on how to secure XML 
parsers in various languages and platforms,&lt;/i&gt;&quot; the researchers wrote on a blog post.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Using the same, the researchers crafted their own button containing 
fishy XML entities. By sending it, they gain access to internal files 
stored in one of Google&#39;s production servers and managed to read the “&lt;i&gt;/etc/passwd&lt;/i&gt;” and the “&lt;i&gt;/etc/hosts&lt;/i&gt;” files from the server.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
By exploiting the same vulnerability the researchers said they could 
have access any other file on their server, or could have gain access to
 their internal systems through the SSRF exploitation.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The researchers straight away reported the vulnerability to the Google’s security team and rewarded with $10,000 (€7,200) bounty for identifying an &lt;i&gt;XML External Entity (XXE) vulnerability&lt;/i&gt; in one of the search engine’s features.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/387621687413356911/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/researchers-get-10000-for-hacking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/387621687413356911'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/387621687413356911'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/researchers-get-10000-for-hacking.html' title='Researchers Get $10,000 for Hacking Google Server with Malicious XML'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjUcbppCRSJ7xgXPIaNvqGFmeqR67k7cIm3JPNGrs1h7PS0JBM_TPUUFUl6vD3nNEly_2fsOuReRPfnUIRrxprGZFTmDT3T0ET_zDHQPjBhX0vlhKn9mL8M6NX_EKQwzvFWfbNGh11I5s/s72-c/XML-Externa-+Entity-vulnerability.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-9172650566202828648</id><published>2014-04-12T08:54:00.003-07:00</published><updated>2014-04-12T08:54:45.151-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NEWS"/><title type='text'> Flappy Bird Developer Has Removed Game From App Stores</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;text-align: left;&quot;&gt;
Flappy Bird Developer Has Removed Game From App Stores&lt;/h2&gt;
&lt;br /&gt;
&lt;div class=&quot;post-header&quot;&gt;
&lt;/div&gt;
&lt;div data-twttr-id=&quot;twttr-sandbox-0&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUPjT85H7JZw8YBJq-F8ab3kkOxDHcr8pUaXBKZdnHgZ_XilQvUuJ2DBK2TEvkTSrYx4q-V1Scr50SzsG15mvIA4kU81UTtoEnu6bv_NEPCnr_XfFezporfzdJUgHn5mV8g-GIZUxqP8o1/s1600/Flappy-Bird-.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUPjT85H7JZw8YBJq-F8ab3kkOxDHcr8pUaXBKZdnHgZ_XilQvUuJ2DBK2TEvkTSrYx4q-V1Scr50SzsG15mvIA4kU81UTtoEnu6bv_NEPCnr_XfFezporfzdJUgHn5mV8g-GIZUxqP8o1/s1600/Flappy-Bird-.jpg&quot; height=&quot;312&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Flappy Bird Developer Has Removed Game From the App Stores.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The Vietnam based developer Dong Ngyen was created the game Flappy Bird in iOS and Android app platforms.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;According to &lt;a href=&quot;http://www.bbc.co.uk/news/technology-26114364&quot; target=&quot;_blank&quot;&gt;BBC&lt;/a&gt;,
 He created the game in just two to three days, was making as much as 
$50,000 (£30,482) a day from the game&#39;s advertising revenue.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The game, 
which was released on May 24, 2013, was removed from both Apple&#39;s App 
Store and Google Play by its creator on February 10, 2014.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;On February 8, 2014, Nguyen announced on Twitter.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Also he said that&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&amp;nbsp;taking
 down the game has &quot;nothing to do with legal issues&quot;. On February 9, 
2014, almost exactly 22 hours after this announcement, the game was 
removed from both Apple&#39;s App Store and Google Play.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;

&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Flappy Bird 
is a side-scrolling mobile game featuring 2D retro style graphics. The 
objective is to direct a flying bird, which moves continuously to the 
right, between each oncoming set of pipes without colliding with them, 
which otherwise ends the game. The bird briefly flaps upward each time 
the player taps the screen, and the player is scored on the number of 
pipe sets the bird successfully passes through.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/9172650566202828648/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/flappy-bird-developer-has-removed-game.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/9172650566202828648'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/9172650566202828648'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/flappy-bird-developer-has-removed-game.html' title=' Flappy Bird Developer Has Removed Game From App Stores'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUPjT85H7JZw8YBJq-F8ab3kkOxDHcr8pUaXBKZdnHgZ_XilQvUuJ2DBK2TEvkTSrYx4q-V1Scr50SzsG15mvIA4kU81UTtoEnu6bv_NEPCnr_XfFezporfzdJUgHn5mV8g-GIZUxqP8o1/s72-c/Flappy-Bird-.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-3333497172198094125</id><published>2014-04-12T08:51:00.000-07:00</published><updated>2014-04-12T08:52:28.588-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>How To Identify Fake Facebook Profiles</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 class=&quot;post-title entry-title&quot; itemprop=&quot;name headline&quot;&gt;
How To Identify Fake Facebook Profiles
&lt;/h1&gt;
&lt;div class=&quot;bwh-title&quot;&gt;
&lt;br /&gt;
&lt;a class=&quot;comment-link&quot; href=&quot;http://blog.hackersonlineclub.com/2013/09/how-to-identify-fake-facebook-profiles.html#comment-form&quot;&gt;&lt;/a&gt;
&lt;/div&gt;
&lt;div class=&quot;post-header&quot; style=&quot;left: -9999px; position: absolute;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-1181302693595680542&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqb9p03K2OPF71SuzgAKFvCQDL7qIB1RaLA5gSM_ZYFJC3yqf7IBa6Qy8F-FXnJ-S5Gi9tG8K5gKV6RJNUNYce6sd7dVjzSxNrSpvFn1ehst2JBHr50uOetPJkvlFZ-o5MnQhyphenhyphenEVJyxAUa/s640/fake-fb-EditB20120927093701.jpg&quot; height=&quot;392&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;How can you 
detect the Fake FB Profile.&amp;nbsp;On these days we are getting so many friend 
request specially by girls, but there is no way to identify that account
 is fake or original. So don&#39;t worry we are going to tell you simple 
method to detect fake Facebook account.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;clear: left; float: left; font-family: Georgia, Times New Roman, serif; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW-4lwIuM5VxWT_17KEgTK35avpWICTZhhkX_8b-XN45e0Yt81KKQaN3ilPk8LSbbj_5SjOCFtXga_QwEx6b3Rwem9zDd0-ImeKRxwNmnPfe251EbriZYx26dY_uqrk-qJlI00Odxy-plu/s640/1.png&quot; height=&quot;262&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;So this is a
 Facebook account which named by Sarikha Agarwal. Now we need to verify 
this account real or fake, so our first step is&amp;nbsp;going to the &lt;a href=&quot;http://images.google.com/&quot;&gt;images.google.com&lt;/a&gt; and click on camera image.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;clear: left; float: left; font-family: Georgia, Times New Roman, serif; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJP-1ue3yStP7RpDJ5pjas00gofe2UERveK4j08i2sYMzq2_tsx94lHUzZXdQLtNRiEOt5Sr2B5vv0ec3Eoxgwxx6tDbOHqNY21WKD1DD69wJKS-G9KbSQTCZsBhaLOtte9Hr4sDjo1eMc/s640/2.png&quot; height=&quot;211&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;So when you click on search by image you will get popup like below image.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;clear: left; float: left; font-family: Georgia, Times New Roman, serif; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu6VMo3ZR8ia1bS53NIIqPIAUH9DfXfnCAqmK6YP9ItC1r40kWTqTicg_Hqtd3MQBkPQo6daX7wL6RpMfIJVALozoRHeqCIvcQvkJaRFjY_qvN5uXu-RL_2aseMDjBjroIHoLFIprAKlze/s640/3.png&quot; height=&quot;294&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Now go to that profile, right click on image and click on copy image URL&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;clear: left; float: left; font-family: Georgia, Times New Roman, serif; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6Yb_oFaQAU3z9D8daYYV0_AwUYlKO-phjgAPLUJWKn1XxFyY5YHysgBklfhvx7u445bnaV_CbqXubsrfEbk8D8jHt8LKuIw6mad4QtNsz7bZHzXMuhETdEGV7eYKbTu4LfWhHkGCnAvoz/s640/4.png&quot; height=&quot;267&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;now profile pic URL has copied.. now again go to images.google.com Tab and paste image URL&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;clear: left; float: left; font-family: Georgia, Times New Roman, serif; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJjo1EB6ZR3vLvRHEfLOZfd0BaJdeoKJHxqASTf2vvuAgmvfMRuv92OYi_rFydLffMT7y5jeSeUTooMIl8XHQBrfhGB1GTG2HKSlazJg3a3fL-trK9wdtrx_GmYckQSjnGKmAq4g8hj9oV/s640/5.png&quot; height=&quot;150&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;When you enter then you get related images search...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif; margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE34X8gvvmBL0XUkXqf_wl1tSXUMtTWrpLhGbpG8u1Nc-CNAX5t81bppmdjMwWNCagEdYEjp35cCcmbWY3xIRo05rZuMD4XRgVAKInhC4VlsGsvTMET5ZbSr9FoOFDXDunLVgkXnpOvUiP/s1600/6.png&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Now you can better see that this profile is real or fake..So here is a proof that this profile is fake.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Enjoy the trick..&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Be aware when you will going to add an beautiful or smart unknown person as your friend.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;So be checked first.. there are lot of fake profiles made everyday.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;This
 person might be spy on your profile and steal personal information like
 your photos, etc for their hacking stuffs.. So Be Safe Online..&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/3333497172198094125/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/how-to-identify-fake-facebook-profiles.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/3333497172198094125'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/3333497172198094125'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/how-to-identify-fake-facebook-profiles.html' title='How To Identify Fake Facebook Profiles'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqb9p03K2OPF71SuzgAKFvCQDL7qIB1RaLA5gSM_ZYFJC3yqf7IBa6Qy8F-FXnJ-S5Gi9tG8K5gKV6RJNUNYce6sd7dVjzSxNrSpvFn1ehst2JBHr50uOetPJkvlFZ-o5MnQhyphenhyphenEVJyxAUa/s72-c/fake-fb-EditB20120927093701.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-8385607513116366739</id><published>2014-04-12T08:50:00.000-07:00</published><updated>2014-04-12T08:51:16.117-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>Forensic Memory Analysis And Techniques For Windows, Linux And Mac OS</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 class=&quot;post-title entry-title&quot; itemprop=&quot;name headline&quot;&gt;
Forensic Memory Analysis And Techniques For Windows, Linux And Mac OS&lt;/h1&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;ABSTRACT&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Due
 to the increased number of cases of cyber-crimes and intrusions, along 
with the storage capacity of hard disks and devices, it was necessary to
 extend the techniques of computer forensics, currently works consist in
 collection and analysis of static data stored hard drives, seeking to 
acquire evidence related to the occurrence of malicious activities in 
computer systems after its occurrence.&lt;br /&gt;With the evolution of 
technological resources and the popularity of the Internet, it has 
become impractical to maintain only the traditional approach, due to the
 large volume of information to be analyzed and the growth of digital 
attacks. In this context, the analysis of data stored in volatile memory
 comes up with new techniques, it is necessary to check the processes 
that were running, established connections, or even access keys 
encrypted volumes, without causing the loss of sensitive information to 
the investigation, thus allowing the recovery of important data to the 
computer forensics.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;Concept&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Memory
 forensics is a promising technique that involves the process of 
capturing and analyzing data stored in volatile memory. Since, by 
volatile memory, which means that data can be lost on system shutdown, 
or can be rewritten in the normal functioning of the same. This 
characteristic of constant flux, the data in memory are usually less 
structured and predictable.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;Data contained in the memory&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;The
 overview of the information stored in memory, everything is running on a
 computer is stored temporarily in memory, either in volatile memory, 
the paging file is related to virtual memory. By extracting an image of 
memory known as &#39;dump&#39; memory is possible to identify the relationship 
of the running processes, it is possible to establish a relationship 
between the processes in order to identify which processes have started 
other processes, likewise, is feasible to identify which files, 
libraries, registry keys and sockets that were in use by each process. 
In summary, it is possible to map how the system was being used when 
generating the &#39;dump&#39; memory and also recover executable programs stored
 in memory.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;More information about “Dumps”&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;This is the method currently used by the experts in computer forensics to acquire the contents of RAM.&lt;br /&gt;There
 are several programs that help the image acquisition memory system, 
this work. These tools make reading memory bit-by-bit and copy its 
contents to a file, the &quot;dump&quot; of memory. This file will have the same 
physical memory size of the system.&lt;br /&gt;What should be taken into 
account, regardless of the tool being used, is that, as shown by the 
&quot;Locard Exchange Principle&quot;, when an acquisition program dump is 
executed, it must be loaded into memory, meaning it will traces, and 
that some of the memory space that could contain valuable information 
will be used, and can even lead to changes in the area occupied by 
processes to paging files. Furthermore, while the tool is reading the 
contents of the memory, the status of the system is not frozen, which 
means that while some pages are being copied, and others may be changed 
if the process is that use is still running, for example. What will 
define the time spent to collect the image are factors such as processor
 speed, bus fees and operations in and out of the disc.&lt;br /&gt;&lt;span style=&quot;color: #0c343d;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;span style=&quot;color: #073763;&quot;&gt;Creating &quot;Forensic Image&quot; with FTK Imager&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;color: #0c343d;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;INTRODUCTION&lt;/b&gt;&lt;br /&gt;FTK
 Imager is a free tool provided by Access to Data acquiring forensic 
images. The tool allows you to create, mainly disk images…Besides 
creating forensic disk images, we can perform memory dumps and even 
perform a forensic analysis on the small image created. There are many 
other fucionalidades you will discover when you are working with it. The
 FTK Imager was created by the company AccessData and is free.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;STEP TO STEP&lt;/b&gt; &lt;br /&gt;Well,
 I&#39;m looking for a simple and practical way to demonstrate these 
concepts. Let&#39;s click on the &quot;File&quot; menu and click the &quot;Create Disk 
Image&quot; and choose which disk or partition, or we will make the image. To
 choose the option to perform a forensic image of the disc, we will on 
the &quot;Physical Drive”, if we want to make the image of a partition, let 
the option &quot;Logical Drive&quot;. Look the pictures below:&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOZDIyQnRjQYXwQWBMA_WoFyzY95J0sVZ_wFaR-73TDVzU7roAcNxEQivOxqiHn4s5Yhii1sschS5DODyoZgQ2GY_v-fYbnIQJXm29OK8KvZQIIN0GIhV717SzZACUE1saMgcpcfXU-3xX/s1600/1.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 1) FTK Imager.&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4Cv9V1dY3WeFDSLGYhA49PijKdRH1uic1b7f55xfX0NBajd1aG9XU6X1G9SXh9J4UrkIzvnGstKXrHFHlm6qJbEjB06nHaEWX9bwmN9nUoy-WO2CWmcYy7ib0PYjid6t0LXwXFu7vE7Qr/s1600/2.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 2) Logical Drive.&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisWdjg4v9zxdjiazqouTge4QR2PYhq23SJYH7cMZs4YBxsvQjsegnGYJPgdSETFbqIXqNYAYIGFu-2hJEWG7NdCxTFjOHqwMLDO1cKD9yA6skhIql827-tzq7eOLhYPCpv871ELclMIuyi/s1600/3.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 3) Physical Drive.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Then
 I&#39;ll do the forensic image of a USB stick plugged into my machine, and 
also choose the option &quot;Physical Drive &quot;. Can I choose which device I 
want to make the image and then I click on the &quot;Finish&quot; button.&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzenMN_eGkDNWXgRKLBlZNPGPona-pIE3Zt7ZncZefZfm-9zbp3q06ZDwWIgUMCWJqcg6SbYAatuWhNMyUwzDTRCQVwIwKWVjcmm38bGJFZpqFqcPPAj1LRaBu-vY_ioQAYca4PhGb7ERR/s1600/4.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 4) Select Drive.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Now
 click on &quot;checkbox Verify images after area They created&quot;. With this 
option selected, the tool will calculate the &quot;hash&quot; MD5 and SHA1 image 
created after that, click the &quot;ADD&quot; button.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirX8ffffiEDwcx9VbNlNdjnL_sImncAiK8Agv0XgRxju9wN3draeqkaJ8mNEUR5Hf03BMVI4RBY-jhqSFxM6dT1ItImcRiUf-JLg5rMU9axQ2zmGqK-V37JwbSjaeD_8M4cOL3xciPCTG-/s1600/5.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 5) Create Image.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Let&#39;s select &quot;RAW&quot;, to perform forensic image format which is the tool of &quot;DD&quot; and click &quot;Next&quot;.&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0ZGNW8sPU8_bUdTLvsv1Y59dbb8mxSAJszGLHQ9alh_s0QRhS_AkwxOPBSmW9IyyCmCxnE8lYLDi0OxZWvU8IEVoem53VOW08N1NkglQuTMPv6friDoPNsOU_lbcoViDHKD4oGmtFDJ2j/s1600/6.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt; &lt;br /&gt;&lt;b&gt;Figure 6) Select RAW.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Will request some information on evidência. We can fill these information . After that, click on &quot;Next&quot;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpy6EHezBHigABntFsjwmt7U3_hLcAH5TDzxNl5c5xMfu09Dj66cz_3Rzm2x106S6QdA2XSdHISXIPKOva8ea7Vs_4boIz85LoAQYABBmgca2zQX2QPHO7OoWkDVAY9JNrKedNTuxdRSRA/s1600/7.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 7) Evidence Item Information. &lt;/b&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgepaPe8ccTkI9Fn21U7zveF4XxWI7HBMCaLmlQp_A36ss_8uB6IjvpFg20es-vOpDXF1JGbDm_aRkaPkikUKm_zwZT2O585f8uy4_Dj_1TsyQQn5Qz857e40Sx92_4zGWnHzTdcvYPYn3R/s1600/8.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt; &lt;br /&gt;&lt;b&gt;Figure 8) Select Image Destination.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;We
 will choose the output directory (where the forensic image is saved). 
&quot;Image Filename&quot; is where you must enter the filename of my image. In 
the &quot;Image Fragment Size&quot; I can put zero because I do not want my 
fragmented image. If I wanted to break into pieces, I put this field 
size in MB that every piece of my image would have. After that , just 
click on the &quot;Finish&quot; button.&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHoWtUWPRrPeJoHxZvmvPPAI5uMdkFZOdim6hwyMKI6MNxEUPUtgt49bHKuK1EcHAmNjlJP1HVvf5mjwzY69ZaLVbgMjnCykNiqludVU_-U4aWaoWWuICx2jqx9eLtVrVeuP_vR0TprAZa/s1600/9.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 9) The output directory.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Just click on the &quot;Start&quot; button.&lt;br /&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw0Heu_06KFyggDNs6t42_PA1WjJiHKcwYQT23p4cLBMveMTpF5Hd1ZXt3CnEu3z1t7GtuCBOFUjkaG_TBL8uBF4YiCdjRdtzJb4jtvCjUOZqAsL4ya_6bgfHLhqm8PcfjUWaQd0sWJGIj/s1600/10.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw0Heu_06KFyggDNs6t42_PA1WjJiHKcwYQT23p4cLBMveMTpF5Hd1ZXt3CnEu3z1t7GtuCBOFUjkaG_TBL8uBF4YiCdjRdtzJb4jtvCjUOZqAsL4ya_6bgfHLhqm8PcfjUWaQd0sWJGIj/s1600/10.png&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 10) Create Image.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRQM9dqR-ga8Ql31Zoi5yYbF1Cs52-yElcDRUkUZse8UQ2313qWxlfAlMjMde-i0cbyGeieGUEzDiurMQcRoBoNKGRGjSrLNYEbSrmstl6kvusdpE0W7gqgNSZ-17zqzIsMeLFl8pw0Sd7/s1600/11.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 11) Image Sumary.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;When the process of image acquisition forensics has finished , we can display a summary with various information.&lt;br /&gt;In
 the same directory where the image was stored was created a “txt”, 
which is like a log , which has the same summary information.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;Extraction of digital artifacts with Volatility:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;INTRODUCTION&lt;/b&gt;&lt;br /&gt;Volatility
 is a completely open collection of tools, implemented in Python under 
the GNU General Public License, for the extraction of samples of digital
 artifacts from volatile memory (RAM).&lt;br /&gt;&lt;br /&gt;&lt;b&gt;STEP TO STEP&lt;/b&gt;&lt;br /&gt;The
 tool supports a variety of formats &quot;dump&quot;, performs some automatic 
conversion between formats and can be used on any platform that supports
 Python. Installation and use are simple, simply unzip the package 
supplied by Systems Volatility in a system where Python already 
installed.&lt;br /&gt;&lt;span style=&quot;color: #274e13;&quot;&gt;C:\Volatility&amp;gt;python volatility&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgM4fwnjbLz9fdayZXc3psfAHvyc_CbVsbHcMUlUVJoIKd4eAtG6irh-MGLON8lJBgW2TjKiIA13aESemW8CR2dqT4iiJgHK2dAcKMAhgfmac7SACXBxOR4LmegHhGFZYNcIesBob_M9Zut/s1600/Usage+Volatility.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 1) Supported Internel Comands&lt;/b&gt;.&lt;br /&gt;&lt;span style=&quot;color: #274e13;&quot;&gt;Example: volatility pslist -f /path/to/my/file&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQUmoHDgCCGdrLHVTW9aDcICcDA0qEi0Qg6Z1eqg2rWeSrk70DwrV5x806Lg_4x1qfcxlYdrvE2vAwRQuUkhUWcXXpRmmzTDi-oMlGQrR4FjqC7fc4weLSJIZtsMifXC8epZYQ5exgK01p/s1600/Fig+2.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 2) Use the command volatility&lt;/b&gt;&lt;br /&gt;The
 image 3 shows the use of the command &quot;ident&quot;, which can be used to 
identify the date and time the image was collected, as well as providing
 information about the operating system on which the dump was generated:&lt;span style=&quot;color: #274e13;&quot;&gt;&lt;br /&gt;C:\Volatility&amp;gt;python volatility ident –f C:\memorytest_rafael_fontes.dmp&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPycw5d_Df6f5b4mKcSH1bvhOQniFnIorGk38PCxPfiORoB4ea2iLVjODceDpweJ8S58C__BMxGj794P1L5YhKYUnUWD4pO0sjh0l2q16nnjUNZsk4Quqf4YkEsdZBWxKsRYBy0vF2ogAt/s1600/Fig+3.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 3) Command ident.&lt;/b&gt;&lt;br /&gt;You can use the --help option with any command to get help:&lt;br /&gt;&lt;span style=&quot;color: #274e13;&quot;&gt;C:\Volatility&amp;gt;python volatility ident –-help&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirpSTA0NyKCVmLYSLsI88Yo05kxN-h8TWmOF8Ro_47vFL7o-SwH8yf8iAQkOBfBzKUAvIIXRg3p0KiiohyphenhyphenTe3lrR4rQGpcRYBtZYdcyJG-nPEfYmOsvDV92eRXWIDEfCwUHwxnsYvldwQR/s1600/Fig+4.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 4) Option Volatility help tool.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;To
 list the processes that were running at the time it was generated dump 
can use the &quot;pslist.&quot; As can be seen below, the output will contain the 
name of the process, its identifier (Pid) and father process ID (PPID) 
beyond the time when it was started and other useful information.&lt;br /&gt;&lt;span style=&quot;color: #274e13;&quot;&gt;C:\Volatility&amp;gt;python volatility pslist –f C:\memorytest_rafael_fontes.dmp&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_7eiIRACK9xT2zm-2WY0O7614-7h8LHQjj-OOaYeSyebvY3uR7osCN3IvMFuWMktUjTO7TRO6wNO4KwfgDyHsy_ZZ42AGEUMVvVORysCVwSSQtxjn5fSmX2goayELmGd5Id-0njkImt0D/s1600/Fig+5.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 5) Use the command pslist.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The
 &quot;connscan&quot; provides information about the network connections that were
 active at the time the data were collected memory. Already the 
&quot;sockets&quot; displays the open sockets at the time the dump was generated. 
The command &quot;files&quot; displays open files for each process. You can 
specify the case number on the command line to display only those files 
opened by a particular process.&lt;br /&gt;&lt;span style=&quot;color: #274e13;&quot;&gt;C:\Volatility&amp;gt;python volatility files –p 1740 –f C:\ memorytest_rafael_fontes.dmp&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0Gno-MJntgjrSyuMvVYvlLR5SidEMbpoUgeTK0K00c3jWeQ-n11Qb5HApopV_JCTbsoN1cJsn4AUbYn_eIuQhaX1YIV4yeVuaIUIoa27-yrsxlr4FGfGD0sPEsFGH52GOcpLmNy8hlrD/s1600/Fig+6.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 6) Use the command files.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The
 command &quot;dlllist&quot; displays a list of DLLs loaded for each process, and 
the command &quot;regobjkeys&quot; displays a list of registry keys opened by each
 process.&lt;br /&gt;&lt;span style=&quot;color: #274e13;&quot;&gt;C:\Volatility&amp;gt;python volatility dlllist –p 1740 –f C:\memorytest_rafael_fontes.dmp&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikpV93s_av5zECxVoqNLPSFdLkz1ShMEOmTgN_pnU6qmL5uhSRFNOJF4FuZ60yG7c_Cu-jded3EwYdd0TA8tziqWFYyDSsj1dNucoMkVzts3tIgvRbwSqQ_LTgkNFs1ziJxN2iNdSj3OiT/s1600/Fig+7.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 7) Use the command dlllist&lt;/b&gt;&lt;br /&gt;&lt;span style=&quot;color: #274e13;&quot;&gt;C:\Volatility&amp;gt;python volatility regobjkeys –p 1740 –f C:\memorytest_rafael_fontes.dmp&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUX4xyZpaIk_7vwRCn0dz-LyMJry45RQ7uivX3CmBvfw7IStSlkdBFxnVfL3dXORvo6Un03ik7eMqwhtdTmJ30ZvFAMM770WqErxxWfCqusZhhNPkPRCzpb5mTPk9nwGUlmpnK37iDLUnI/s1600/Fig+8.png&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;Figure 8) Use the command regobjkeys.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;It
 is possible, through command &quot;procdump&quot; extracting executable from the 
dump of memory, allowing access to the code that was running on the 
machine, and thus better understand their behavior.&lt;br /&gt;&lt;span style=&quot;color: #274e13;&quot;&gt;C:\Volatility&amp;gt;python volatility procdump –p 1740 –f C:\ memorytest_rafael_fontes.dmp &lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiujlRvQAffoXP6MvfvEU3RliopMS-6h49_UPEGZlaAZx7cE5ulQ42-65RIoihLDc2kSv0b0VOmA7FtodghOeFDDmPYkI6dTfgN7vjJVhPjBhgiOsDkLRWZuye3iU5R2JVFtBnIKnW6lYWi/s1600/Fig+9.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Add caption&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 9) Use the command procdump.&lt;/b&gt;&lt;br /&gt;It
 was possible to observe the generation of executable 
&quot;executable.1740.exe&quot; and the occurrence of informational messages like 
&quot;Memory Not Accesible&quot; after using the command &quot;ProcDump&quot;. This is 
because not all the virtual memory addresses are accessible on the image
 because it may have been, for example, paged to disk. Thus, these 
messages provide an audit log so that you can determine which parts of 
the executable generated were successfully retrieved.&lt;br /&gt;&lt;br /&gt;Practical examples,to determine the date and time of the image, for example, one can use the following command:&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt; Python volatility datetime -f target-2013-10-10.img&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image Local date and time: Mon Oct 10 16:20:12 2013&lt;br /&gt;The command pslist, in turn, determines the procedures that were running at the time the image was captured:&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;gt;&amp;gt;&amp;gt; Python volatility pslist -f target-2013-10-10.img&lt;br /&gt;Name Pid PPID THDs HNDs Time&lt;br /&gt;lsass.exe 536 480 20 369 Mon Oct 10 16:22:18 2013&lt;br /&gt;&amp;nbsp;To
 determine which system ports were open, one can employ the command 
&quot;socks&quot;. For the system under analysis, it is possible to detect, for 
example, the process LSASS.exe listening on port 4500.&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt; Python volatility sockets -f target-2013-10-10.img&lt;br /&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;Forensic Memory for Linux distributions:&amp;nbsp;&amp;nbsp;&lt;/span&gt;&amp;nbsp;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp; &lt;br /&gt;&lt;b&gt;S.M.A.R.T Linux&amp;nbsp;&lt;/b&gt; &lt;span style=&quot;color: blue;&quot;&gt;http://smartlinux.sourceforge.net/&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKmMUKN61uafiVsXB_HecPsUzKZcMDlRmCheeT3cpBcgFgmq9ZLpWuhIu9RPRmT2GAV6NmqPgwKWzAmTPfjnO8hTZi4EnjnoBcXo73ONvyHSGccoIDp04arbfayhdTTlPF2xLydXYfQ7Ih/s1600/SMART.png&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;Figure 1) S.M.AR.T. Linux.&lt;/b&gt;&lt;br /&gt;S.M.A.R.T.
 Linux is a bootable floppy distribution containing tool (smartmontools)
 for monitoring IDE/SCSI hard disks (using Self-Monitoring, Analysis and
 Reporting Technology). Why floppy? Probably because all other 
distributions containing this useful utility are CD versions [and not 
everybody has a CD-ROM ;)]. It&#39;s going to be free, small, helpful and 
easy to use. Current version is based on Kernel 2.4.26, uClibc 0.9.24 
and BusyBox 1.00 official release. Built on Slackware 10.0.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;The Sleuth Kit and Autopsy:&lt;/b&gt; &lt;a href=&quot;http://www.sleuthkit.org/&quot;&gt;http://www.sleuthkit.org/&lt;/a&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzc8e8LY7vP4irn9L6187X19qJTooKVFG9u8rTst6TFM3nV6XT73ZsgziSGrccD-XdwV-o5MhmJGG6Ub2h2XjpP2-3jQzxxgBnqgAAfmRYvmkhTg_44NYG67NqvVEa1gWYGEsPY0sXVFOe/s1600/Autospy+&amp;amp;+The+Sleuth+Kit.png&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Autopsy™
 and The Sleuth Kit™ are open source digital investigation tools (a.k.a.
 digital forensic tools) that run on Windows, Linux, OS X, and other 
Unix systems. They can be used to analyze disk images and perform 
in-depth analysis of file systems (such as NTFS, FAT, HFS+, Ext3, and 
UFS) and several volume system types.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;CAINE (Computer Aided Investigative Environment)&lt;/b&gt;&lt;/span&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://www.caine-live.net/&quot;&gt;http://www.caine-live.net/&lt;/a&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKh_iDNBKCDFZsqjhoLD823XmlplX4TWbeFXcGioJ59sAlNwxbw7T9RpoXAcHJ-UsC5XeRAjLGHSQfta04ZIocgT3RNxyX2pIkzA1qXjNnbWdlx4AUh6gY0FIpjHrarLzHUgdBGseBQPJX/s1600/CAINE.png&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 4) C.A.I.N.E.&lt;/b&gt;&lt;br /&gt;CAINE(Italian
 GNU/Linux live distribution created as a project of Digital Forensics) 
offers a complete forensic environment that is organized to integrate 
existing software tools as software modules and to provide a friendly 
graphical interface.&lt;br /&gt;The main design objectives that CAINE aims to guarantee are the following:&lt;br /&gt;• An interoperable environment that supports the digital investigator during the four phases of the digital investigation.&lt;br /&gt;• A user friendly graphical interface.&lt;br /&gt;• A semi-automated compilation of the final report.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;For MAC OS X&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Below are some tools that can be used for forensic analysis on computers with Mac OS X.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;Mac OS X Forensics Imager&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://www.appleexaminer.com/Utils/Downloads.html&quot;&gt;http://www.appleexaminer.com/Utils/Downloads.html&lt;/a&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0Q2iVXjIOayd-gqeg6-NKIu3RCU-rBbZzIljflwrvgUQM9wuW1kB1X4rUpf5iKlOiN-KIpMNfHgtGD-TxYDfqKu5IKmkeQkAV8vGX5K8W3UXZaVHK7BuzPYASQ5ZPTh_xgCW0XP_gYAb6/s1600/MAC+OS+X+Foresic+imager.png&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;Figure 1) Mac OS X Forensics Imager.&lt;br /&gt;Tool for imaging disk byte by byte format Encase or FTK for later forensic analysis in these tools.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;color: #073763;&quot;&gt;Metadata Extractor&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;Application
 to extract meta-data files for a specific folder in Mac Displays 
location on google maps in case there are geo-location information in 
the file.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;File Juicer&lt;/b&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://echoone.com/filejuicer/&quot;&gt;http://echoone.com/filejuicer/&lt;/a&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPG7m9hbA7Ue35-iZpwvonV7YayJR9vibyzN5hwYIt8GmH-ULaXn9R03rXiq22FoeTK-jWTs8LhV7icuQNT3sGa1nQLWY7tgUtBfXEC9eC_S5kBK-byU2BPJr54t0vAX9MEdQuFlifmqUv/s1600/File+juicer+1.png&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;b&gt;Figure 2) File Juicer 1.&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbUe-NyWq4irBwrB2wA31y1r1QU5NUm2U_V6uOWrOgV9baA0dWoBAiRaKGiMoEwTUNcV30aNPevD5IjdxZfVCT32H5_um01rZowIdpDg1wbQRCMUGcwMjwozmZIeooziEpkME0sSnjv2yn/s1600/File+juicer+2.png&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&amp;nbsp;Figure 3) File Juicer 2.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;Commercial
 software that enables the extraction of images and texts from any file.
 Ignores format, and scans files byte by byte for identifying the data 
supported. Among other features, there are the following, which find 
application in forensic analysis:&lt;br /&gt;&lt;br /&gt;•&amp;nbsp;&amp;nbsp; &amp;nbsp;Extract images from PowerPoint presentations and PDFs&lt;br /&gt;•&amp;nbsp;&amp;nbsp; &amp;nbsp;Recover deleted pictures and videos from memory cards&lt;br /&gt;•&amp;nbsp;&amp;nbsp; &amp;nbsp;Recover text from corrupt&lt;br /&gt;•&amp;nbsp;&amp;nbsp; &amp;nbsp;Extract images and html files from the cache of Safari&lt;br /&gt;•&amp;nbsp;&amp;nbsp; &amp;nbsp;Extract attachments from email archives&lt;br /&gt;•&amp;nbsp;&amp;nbsp; &amp;nbsp;Generate Word document from simple PDFs&lt;br /&gt;•&amp;nbsp;&amp;nbsp; &amp;nbsp;Recover photos from iPods in TIFF&lt;br /&gt;•&amp;nbsp;&amp;nbsp; &amp;nbsp;Convert ZIP files which are in. EXE&lt;br /&gt;•&amp;nbsp;&amp;nbsp; &amp;nbsp;Extract JPEG images in RAW format (Canon &amp;amp; Nikon)&lt;br /&gt;•&amp;nbsp;&amp;nbsp; &amp;nbsp;Extracting data from different types of cache file&lt;br /&gt;•&amp;nbsp;&amp;nbsp;
 &amp;nbsp;Find and extract file in general data in JPEG, JP2, PNG, GIF, PDF, 
BMP, WMF, EMF, PICT, TIFF, Flash, Zip, HTML, WAV, MP3, AVI, MOV, MPG, 
WMV, MP4, AU, AIFF or text.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color: #0c343d;&quot;&gt;&lt;b&gt;CONCLUSION&lt;/b&gt;&lt;/span&gt;&lt;i&gt;&lt;br /&gt;There
 are several trends that are revolutionizing the Forensic Memory. The 
process to do the analysis in memory forensics also walks for a better 
solution and refinement of the technique, it is an approach increasingly
 relevant in the context of Computer Forensics. In certain cases the 
popularity and use of tools for encrypting volumes as TrueCrypt, or 
creating malware residing only in volatile memory, raise the difficulty 
of analyzing the data stored in these devices.&lt;br /&gt;However, it is 
interesting to note that the Forensic Memory is best seen as a 
complement to other approaches. An example of this is the procedure in 
which an investigation after the image capture of volatile memory, it 
uses the &quot;Analysis of Living Systems&quot; as a way to determine the next 
step in solving the case. Later, in the laboratory, we use the &quot;Memory 
Forensics&quot; as a complement to traditional forensics, giving greater 
agility and precision to the process.&lt;br /&gt;I hope my article has helped computational experts and specialists in information security.&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/8385607513116366739/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/forensic-memory-analysis-and-techniques.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/8385607513116366739'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/8385607513116366739'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/forensic-memory-analysis-and-techniques.html' title='Forensic Memory Analysis And Techniques For Windows, Linux And Mac OS'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOZDIyQnRjQYXwQWBMA_WoFyzY95J0sVZ_wFaR-73TDVzU7roAcNxEQivOxqiHn4s5Yhii1sschS5DODyoZgQ2GY_v-fYbnIQJXm29OK8KvZQIIN0GIhV717SzZACUE1saMgcpcfXU-3xX/s72-c/1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-7118087575376045477</id><published>2014-04-10T10:11:00.001-07:00</published><updated>2014-04-10T10:11:19.429-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'></title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;background-color: black; color: lime; font-family: georgia,serif; font-size: x-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: lime;&quot;&gt;ARPwner – ARP &amp;amp; DNS Poisoning Attack Tool&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black; color: lime; font-family: georgia,serif; font-size: x-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: lime;&quot;&gt;&lt;img class=&quot;irc_mut&quot; height=&quot;199&quot; src=&quot;data:image/jpeg;base64,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&quot; style=&quot;margin-top: 15px;&quot; width=&quot;320&quot; /&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;ARPwner is a tool to do ARP poisoning and DNS poisoning attacks, with a simple GUI and &lt;br /&gt;a plugin system to do filtering of the information gathered,&amp;nbsp;also has a implementation of SSLstrip and is coded in python&lt;b&gt;.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: black; color: lime; font-family: georgia,serif; font-size: x-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;https://github.com/ntrippar/ARPwner/archive/master.zip&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Photobucket&quot; border=&quot;0&quot; height=&quot;60&quot; src=&quot;http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png&quot; width=&quot;80&quot; /&gt;&lt;b&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Download&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;b&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/7118087575376045477/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/arpwner-arp-dns-poisoning-attack-tool.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/7118087575376045477'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/7118087575376045477'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/arpwner-arp-dns-poisoning-attack-tool.html' title=''/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/th_DownloadButton1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-466165962137565123</id><published>2014-04-10T10:10:00.001-07:00</published><updated>2014-04-10T10:10:24.757-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>winAUTOPWN v3.0 Released - System vulnerability exploitation </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;background-color: black; color: lime; font-family: georgia,serif; font-size: x-small;&quot;&gt;&lt;b&gt;winAUTOPWN v3.0 Released - System vulnerability exploitation &lt;br /&gt;Framework&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img class=&quot;irc_mut&quot; height=&quot;230&quot; src=&quot;data:image/jpeg;base64,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&quot; style=&quot;margin-top: 0px;&quot; width=&quot;320&quot; /&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;
WINAUTOPWN ACTIVE SYSTEMS TRANSGRESSOR GUI [ C4 - WAST ] is a Systems 
and Network Exploitation Framework built on the famous winAUTOPWN as a 
backend.&amp;nbsp; &lt;br /&gt;C4 - WAST gives users the freedom to select individual exploits and use them.&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;
&lt;b&gt;BSDAUTOPWN&lt;/b&gt; has been compiled, like always for various flavours and has been upgraded to version 1.8 alongwith all applicable exploits&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;
&lt;b&gt;WINAUTOPWN&lt;/b&gt; requires PERL,PHP,PYTHON,RUBY and its dependencies alongwith a few others&#39; too for smooth working of exploits included in it.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://winautopwn.co.nr/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Photobucket&quot; border=&quot;0&quot; height=&quot;60&quot; src=&quot;http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png&quot; width=&quot;80&quot; /&gt;&lt;b&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Download&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/466165962137565123/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/winautopwn-v30-released-system.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/466165962137565123'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/466165962137565123'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/winautopwn-v30-released-system.html' title='winAUTOPWN v3.0 Released - System vulnerability exploitation '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/th_DownloadButton1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-4770927594815966438</id><published>2014-04-10T10:08:00.001-07:00</published><updated>2014-04-10T10:08:41.710-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>Intercepter Sniffer</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;background-color: black; color: lime; font-family: georgia,serif; font-size: x-small;&quot;&gt;&lt;b&gt;Intercepter Sniffer&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img class=&quot;irc_mut&quot; height=&quot;192&quot; src=&quot;https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcQnkh_p9ueBRzMKtoe2k42NiOTkRTJ9RV5x-hcGg3-_p_y6aM6R&quot; style=&quot;margin-top: 114px;&quot; width=&quot;264&quot; /&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Intercepter
 is a sniffer tool which offers various capabilities including sniffing 
for password hashes related to 
ICQ/IRC/AIM/FTP/IMAP/POP3/SMTP/LDAP/BNC/SOCKS/HTTP/&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;WWW/NNTP/CVS/TELNET/MRA/DC++/VNC/MYSQL and ORACLE. It also sniffs ICQ/&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;AIM/JABBER/YAHOO/MSN/GADU-GADU/IRC
 and MRA protocols. It has a built-in arp poisoning module, can change 
MAC addresses of LAN adapters, and has various other interesting 
functionality.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;
&lt;br /&gt;&lt;a href=&quot;http://packetstormsecurity.org/files/download/113230/Intercepter-NG.v093.zip&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Photobucket&quot; border=&quot;0&quot; height=&quot;60&quot; src=&quot;http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png&quot; width=&quot;80&quot; /&gt;&lt;b&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Download&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/4770927594815966438/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/intercepter-sniffer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/4770927594815966438'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/4770927594815966438'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/intercepter-sniffer.html' title='Intercepter Sniffer'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/th_DownloadButton1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-5932591829352885277</id><published>2014-04-10T10:07:00.003-07:00</published><updated>2014-04-10T10:07:19.790-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>The Mole: Automatic SQL Injection Exploitation Tool </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b style=&quot;background-color: black; color: lime; font-family: georgia,serif;&quot;&gt;The Mole: Automatic SQL Injection Exploitation Tool &lt;/b&gt;&lt;br /&gt;
&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: white; display: block; margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://www.hackersonlineclub.com/hacking-tools/new_mole.png.jpg?attredirects=0&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;221&quot; src=&quot;http://www.hackersonlineclub.com/_/rsrc/1331478587882/hacking-tools/new_mole.png.jpg?height=221&amp;amp;width=400&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Mole is an automatic SQL 
Injection exploitation tool. Only by providing a vulnerable URL and a 
valid string on the site it can detect the injection and exploit it, 
either by using the union technique or a Boolean query based technique.&lt;/span&gt; &lt;span style=&quot;font-family: georgia,serif;&quot;&gt;The Mole uses a command based interface, allowing the user to indicate the action he wants to perform easily. &lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://themole.nasel.com.ar/?q=tutorial&quot; style=&quot;font-family: georgia,serif;&quot; target=&quot;_blank&quot;&gt;Read more&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;http://themole.nasel.com.ar/?q=downloads&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Photobucket&quot; border=&quot;0&quot; height=&quot;60&quot; src=&quot;http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png&quot; width=&quot;80&quot; /&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Download&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/5932591829352885277/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/the-mole-automatic-sql-injection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/5932591829352885277'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/5932591829352885277'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/the-mole-automatic-sql-injection.html' title='The Mole: Automatic SQL Injection Exploitation Tool '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/th_DownloadButton1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-1494332421477600757</id><published>2014-04-10T10:06:00.005-07:00</published><updated>2014-04-10T10:06:48.148-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>Havij v1.15 Advanced SQL Injection</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&lt;span style=&quot;background-color: black; color: lime;&quot;&gt;Havij v1.15 Advanced SQL Injection&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&lt;br /&gt;
Havij is an automated SQL Injection tool that helps penetration testers 
to find and exploit SQL Injection vulnerabilities on a web page.&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;display: block; text-align: left;&quot;&gt;
&lt;b&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcDT6NIt4hhT5HluqazNUTkgRK9oEd5WT4qiPLY_sTsPnUVGQkosDUtAY71hJs2vSp9OmK5EgpCQKwRQQCiaJf-N4o1lrrFHRhbxv0BQw0SR0tzUizj9e9gvfYAGf-X01yRdhhZl2o5ZCe/s200/havij.png&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; text-align: center;&quot; /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;b&gt;
&lt;b&gt;&lt;a href=&quot;http://itsecteam.com/files/havij/Havij1.15Free.rar&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Photobucket&quot; border=&quot;0&quot; height=&quot;60&quot; src=&quot;http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png&quot; width=&quot;80&quot; /&gt;Download&lt;/a&gt;&lt;/b&gt;
&lt;/b&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/1494332421477600757/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/havij-v115-advanced-sql-injection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/1494332421477600757'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/1494332421477600757'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/havij-v115-advanced-sql-injection.html' title='Havij v1.15 Advanced SQL Injection'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcDT6NIt4hhT5HluqazNUTkgRK9oEd5WT4qiPLY_sTsPnUVGQkosDUtAY71hJs2vSp9OmK5EgpCQKwRQQCiaJf-N4o1lrrFHRhbxv0BQw0SR0tzUizj9e9gvfYAGf-X01yRdhhZl2o5ZCe/s72-c/havij.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-8514636782742828198</id><published>2014-04-10T10:06:00.001-07:00</published><updated>2014-04-10T10:06:08.742-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'> Sqlninja 0.2.6</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: black; color: lime; font-family: georgia,serif;&quot;&gt;&lt;b&gt;Sqlninja 0.2.6&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFRsA0qJXgT2C3zDpeq8nvz16qhYqBVR4HuJSYJpFlSXUS_pw-gGX99SjzoJIrMTnyGQ8G4KKgb49kKBNQMo0PBFnwastdqftCqk0ENyouk44BP66Nn_Ut0_omoZwOng24RLnvqbF_ITof/s320/Untitled.png&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; text-align: center;&quot; /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;Features:&lt;/b&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&amp;gt;&amp;gt; Fingerprint of the remote SQL Server (version, user performing
 the queries, user privileges, xp_cmdshell availability, DB 
authentication mode)&lt;br /&gt;
&amp;gt;&amp;gt;&amp;nbsp; Bruteforce of &#39;sa&#39; password (in 2 flavors: dictionary-based and incremental).&lt;br /&gt;
&amp;gt;&amp;gt; Creation of a custom xp_cmdshell if the original one has been removed&lt;br /&gt;
&amp;gt;&amp;gt; Upload of netcat (or any other executable) using only normal HTTP requests (no FTP/TFTP needed).&lt;br /&gt;
&amp;gt;&amp;gt; TCP/UDP portscan from the target SQL Server to the attacking machine, in order &lt;br /&gt;
to find a port that is allowed by the firewall of the target network &lt;br /&gt;
and use it for a reverse shell.&lt;br /&gt;
&amp;gt;&amp;gt; Direct and reverse bindshell, both TCP and UDP&lt;br /&gt;
&amp;gt;&amp;gt; ICMP-tunneled shell, when no TCP/UDP ports are available for a direct/reverse &lt;br /&gt;
shell but the DB can ping your box.&lt;/span&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;gt;&amp;gt;&lt;/span&gt;
 DNS-tunneled pseudo-shell, when no TCP/UDP ports are available for&lt;br /&gt;
&amp;nbsp;a direct/reverse shell, but the DB server can resolve external hostnames&lt;br /&gt;
&amp;nbsp;(check the documentation for details about how this works).&lt;/span&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;gt;&amp;gt;&lt;/span&gt;
 Evasion techniques to confuse a few IDS/IPS/WAF.&lt;br /&gt;
&amp;gt;&amp;gt; Integration with Metasploit3, to obtain a graphical access to the remote DB&lt;br /&gt;
&amp;nbsp;server through a VNC server injection.&lt;/span&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://sqlninja.sourceforge.net/download.html&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Photobucket&quot; border=&quot;0&quot; height=&quot;60&quot; src=&quot;http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png&quot; width=&quot;80&quot; /&gt;Download&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/8514636782742828198/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/sqlninja-026.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/8514636782742828198'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/8514636782742828198'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/sqlninja-026.html' title=' Sqlninja 0.2.6'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFRsA0qJXgT2C3zDpeq8nvz16qhYqBVR4HuJSYJpFlSXUS_pw-gGX99SjzoJIrMTnyGQ8G4KKgb49kKBNQMo0PBFnwastdqftCqk0ENyouk44BP66Nn_Ut0_omoZwOng24RLnvqbF_ITof/s72-c/Untitled.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3158454373083223789.post-2565889231191694556</id><published>2014-04-10T10:05:00.004-07:00</published><updated>2014-04-10T10:05:31.500-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>Ani-Shell</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://itsecteam.com/files/havij/Havij1.15Free.rar&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;&lt;/b&gt; &lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;hr size=&quot;2&quot; width=&quot;100%&quot; /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: black; color: lime;&quot;&gt;Ani-Shell&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;div style=&quot;display: block; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;141&quot; src=&quot;http://sourceforge.net/dbimage.php?id=307787&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; text-align: center;&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;
&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Ani-Shell is a simple PHP shell 
with some unique features like Mass Mailer , A simple Web-Server Fuzzer ,
 DDoser, Back Connect , Bind Shell etc etc ! This shell has immense 
capabilities and have been written with some coding standards in mind 
for better editing and customization.&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;b&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Customisation&lt;/span&gt;&lt;/b&gt;
&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;1. Email Trace back is set to Off as default and emails will not be sent , If you are setting &lt;br /&gt;
this feature on make sure you change the default email address (lionaneesh@gmail.com)&lt;br /&gt;
&amp;nbsp;to Your email address , Please Change it before using.&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;2. Username and Passwords are set to lionaneesh and lionaneesh respectively , Please change them for better&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;security.&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;3. As a default Lock Mode is set to on! This should not be change unless you want your shell exposed.&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Default Login&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Username : lionaneesh&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Password : lionaneesh&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;b&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Features&lt;/span&gt;&lt;/b&gt;
&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Shell&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Platform Independent&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mass - Mailer&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Small Web-Server Fuzzer&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; DDoser&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Design&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Secure Login&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Deletion of Files&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bind Shell&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Back Connect&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fixed Some Coding errors!&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Rename Files&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encoded Title&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Traceback (Email Alerts)&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; PHP Evaluate&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Better Command Execution (even supports older version of PHP)&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mass Code Injector (Appender and Overwriter)&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lock Mode Customization&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Latest Version Addition&lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mail Bomber (With Less Spam detection feature)&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; PHP Decoder&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Better Uploader&lt;/span&gt;&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fixed some Coding errors&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;font-family: georgia,serif;&quot; /&gt;
&lt;b&gt;&lt;a href=&quot;http://sourceforge.net/projects/ani-shell/files/Ani-Shell%20v1.3/Ani-Shell%20v1.3.zip/download&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Photobucket&quot; border=&quot;0&quot; height=&quot;60&quot; src=&quot;http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png&quot; width=&quot;80&quot; /&gt;&lt;span style=&quot;font-family: georgia,serif;&quot;&gt;Download&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ashacks.blogspot.com/feeds/2565889231191694556/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ashacks.blogspot.com/2014/04/ani-shell.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/2565889231191694556'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3158454373083223789/posts/default/2565889231191694556'/><link rel='alternate' type='text/html' href='http://ashacks.blogspot.com/2014/04/ani-shell.html' title='Ani-Shell'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12239482188599953432</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/th_DownloadButton1.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>