<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3468947878637018782</id><updated>2025-08-25T17:56:06.369+01:00</updated><category term="Hacking"/><category term="Tech News"/><category term="Security"/><category term="Apple"/><category term="Facebook"/><category term="Anonymous"/><category term="Google"/><category term="Android"/><category term="Hacking Tricks"/><category term="How-tos"/><category term="LulzSec"/><category term="Social Media"/><category term="software"/><category term="Hacking Tools"/><category term="Microsoft"/><category term="iPhone"/><category term="Malware"/><category term="Windows"/><category term="Facebook Tricks"/><category term="Linux"/><category term="Sony"/><category term="Privacy"/><category term="DDos Attack"/><category term="Skype"/><category term="Hacking Techniques"/><category term="Programming"/><category term="Torrent"/><category term="Twitter"/><category term="computer tricks"/><category term="PlayStation"/><category term="Mobile"/><category term="Windows 8"/><category term="Linux Tips"/><category term="Mac OS X Lion"/><category term="iPad"/><category term="Adobe"/><category term="Ethical Hacking"/><category term="Gmail"/><category term="Google +"/><category term="Google Chrome"/><category term="Hackers"/><category term="Internet Tricks"/><category term="MySQL"/><category term="Reviews"/><category term="Tablet"/><category term="Trojan"/><category term="AnonOps"/><category term="Best Torrent Site"/><category term="Browser"/><category term="Firefox"/><category term="Hacktivism"/><category term="Hardware"/><category term="IOS"/><category term="Jailbreak"/><category term="Network Hacking"/><category term="Phishing"/><category term="Vulnerability"/><category term="Android Malware"/><category term="Defacement"/><category term="Facebook Symbols"/><category term="Google Plus Tips"/><category term="Ipv6"/><category term="Java"/><category term="MAC"/><category term="Mobile Tricks"/><category term="Mozilla"/><category term="MySQL Injection"/><category term="Python"/><category term="Twitter hack"/><category term="Windows 7"/><category term="Antivirus"/><category term="Chrome extensions"/><category term="Crime"/><category term="Cross-Site Scripting (XSS)"/><category term="Cyber Security"/><category term="Data-Leak"/><category term="Developer"/><category term="Download"/><category term="Emoticons"/><category term="Facebook  Hacks"/><category term="Gaming"/><category term="IP address"/><category term="Internet"/><category term="Jobs"/><category term="Jobs in Nigeria"/><category term="Lulz Security"/><category term="Mozilla Firefox"/><category term="MySQL Injection for dummies"/><category term="Networking"/><category term="Protest"/><category term="Rim"/><category term="Smartphone"/><category term="Steve Jobs"/><category term="Virus"/><category term="Wi-Fi"/><category term="Window 8"/><category term="icloud"/><category term="uTorrent"/><category term="Amazon"/><category term="AntiSec"/><category term="App"/><category term="Apps"/><category term="Basic Hacking Skills"/><category term="Bittorent"/><category term="Blackberry"/><category term="Bug"/><category term="China"/><category term="Chrome"/><category term="Cloud"/><category term="Cloud Storage"/><category term="Cyber Crime"/><category term="DNS"/><category term="Domain Names"/><category term="FBI"/><category term="Facebook Emotions"/><category term="Facebook Video Call"/><category term="Firefox 5"/><category term="Flash Player"/><category term="Gadget"/><category term="Hack"/><category term="IE Bug"/><category term="Internet Explorer"/><category term="JavaScript"/><category term="Microsoft Surface"/><category term="Mobile Phone Tips"/><category term="Nokia"/><category term="Pdf"/><category term="Penetration Testing"/><category term="Pro Hacking"/><category term="Spam"/><category term="Symbols on Facebook"/><category term="Ubuntu"/><category term="Vacancies"/><category term="Virus Attack"/><category term="Web Hacking"/><category term="Wireless"/><category term="iPhone 4S"/><category term="itune"/><category term="penetration-testing"/><category term="web-application-security"/><category term="wep-cracking"/><category term="windows software"/><category term="Administrator"/><category term="Advanced System Care"/><category term="Al-Qaeda"/><category term="Amazon Kindle"/><category term="Android Apps"/><category term="BART"/><category term="BackTrack"/><category term="Battery"/><category term="Bittorrent"/><category term="Black Hat Conference"/><category term="Blackberry 10"/><category term="Botnet"/><category term="CIA"/><category term="Chromebook"/><category term="Cloud Computing"/><category term="Code improvement"/><category term="Code rewrite"/><category term="Cookies"/><category term="Cybercrime"/><category term="Defcon 19"/><category term="Encryption"/><category term="Exploit"/><category term="Facebook Emoticons"/><category term="Facebook Hacks"/><category term="Facebook Tips"/><category term="Facebook privacy"/><category term="Facial Recognition"/><category term="Final Cut Pro X"/><category term="Firefox Release"/><category term="Fraud"/><category term="Gmail Hacking"/><category term="Google Search"/><category term="Government site"/><category term="Hacking Books"/><category term="Hacking Tips"/><category term="Hacking tool"/><category term="Hacktivist"/><category term="Htc"/><category term="IBM"/><category term="ICANN"/><category term="IObit"/><category term="IPv4"/><category term="India"/><category term="Indian"/><category term="Internet Governance"/><category term="Ipv6 Protocol"/><category term="Jailbreak Surface"/><category term="Kaspersky"/><category term="License Key"/><category term="Linkedin"/><category term="Linkedin Hacked"/><category term="Linux Kernel"/><category term="Linux hacked"/><category term="LulSec"/><category term="LulzSec Hackers"/><category term="Lulzsec Leader"/><category term="McAfee"/><category term="Microsoft Outlook"/><category term="Occupy Wall Street"/><category term="Oracle"/><category term="P2P Program"/><category term="PC"/><category term="PC Security Tips"/><category term="Patents"/><category term="Peer to Peer"/><category term="Piracy"/><category term="Pirate Bay"/><category term="SIPVicious"/><category term="Scammers"/><category term="Script Kiddies"/><category term="Secure Socket Layer"/><category term="Sopa"/><category term="Ssl"/><category term="Startups"/><category term="Status Symbols"/><category term="The Sun"/><category term="Top-Level Domains"/><category term="Torrent Client"/><category term="VPN"/><category term="Web 20th birthday"/><category term="Window Xp"/><category term="Windows 7 SP1"/><category term="Windows RT"/><category term="Wireless Hacking"/><category term="Worms"/><category term="Youtube"/><category term="computer trick"/><category term="mysql injection prevention"/><category term="sql-injection"/><category term="sql-injection-tool"/><category term="web-application-hacking"/><category term="web-hacking-tool"/><category term="wifi-cracking"/><category term="wifi-hacking"/><category term="#OpPolicia"/><category term="+1 Button"/><category term="AT-T Hacker"/><category term="ATM"/><category term="AVG 2013"/><category term="Aakash"/><category term="Aakash $35"/><category term="Aakash tablet"/><category term="Aaron Swartz"/><category term="Absinthe"/><category term="Academic Earth"/><category term="Admin Application"/><category term="Adobe Edge"/><category term="Adobe Muse"/><category term="Adode Flash"/><category term="Adware"/><category term="AlJahad"/><category term="Alabama State Server"/><category term="Amazon Kindle Cloud Reader"/><category term="Amazon gift card"/><category term="Analytics"/><category term="Android Antivirus"/><category term="Android Botnet"/><category term="Android Phones"/><category term="Angry Bird"/><category term="Angry Ip Scanner"/><category term="Anonymous-Os Live"/><category term="AppCleaner"/><category term="Apple Secret Doc"/><category term="Apple Security"/><category term="Apple Store"/><category term="Apple Store Genuises"/><category term="Automated Teller Machine"/><category term="Avast Pro"/><category term="BTGuard"/><category term="Back Door"/><category term="BackTrack 5"/><category term="BackTrack hacking livecd"/><category term="BackTrack live hacking cd"/><category term="Bank"/><category term="Battery Life"/><category term="Best Hacking Books"/><category term="Best VPN Services"/><category term="Bitdefender"/><category term="Bittorrent Surf"/><category term="Blackberry Tips"/><category term="Blackboard"/><category term="Blogger"/><category term="Blogger Template"/><category term="Blogging"/><category term="Bot"/><category term="Box.net"/><category term="Brute Force Attack"/><category term="Brutus"/><category term="Burp"/><category term="Burp Suite v1.4"/><category term="C++"/><category term="CMD Hack"/><category term="Cain-and-Abel"/><category term="Call Blocker"/><category term="Camael Diamonds"/><category term="Cameras"/><category term="Cat 5e"/><category term="Cat 6"/><category term="Censorship"/><category term="Chinese"/><category term="Cleary arrested"/><category term="Cloud Flare"/><category term="Code"/><category term="Codemasters hacked"/><category term="Company"/><category term="Computer"/><category term="Computer Virus"/><category term="Computer chips human brain"/><category term="Cool"/><category term="Cosmos the God"/><category term="Coursekit"/><category term="Coursera"/><category term="Cracking"/><category term="Credit Card"/><category term="Cryptography"/><category term="CyanogenMod"/><category term="Cyber Ghost"/><category term="Cydia"/><category term="D33Ds"/><category term="DCMA"/><category term="DNS hack"/><category term="DNS hijacking"/><category term="DPI"/><category term="Dart"/><category term="Data Consolidation"/><category term="Data Security"/><category term="Data-Security"/><category term="Database Password Cracker"/><category term="Debank"/><category term="Decrypt"/><category term="Deep Packet Inspection"/><category term="Deface"/><category term="Defense Contractor"/><category term="Denial of Service"/><category term="Design"/><category term="Design Tips"/><category term="Desktop Mail Client"/><category term="Detection"/><category term="Dev Design"/><category term="Digg"/><category term="DigiNotar"/><category term="DocLock"/><category term="Download Kernel"/><category term="Download Windows 7"/><category term="Download Windows 8"/><category term="Doxing"/><category term="Driveby Attacks"/><category term="Dual Booting"/><category term="Education"/><category term="Email"/><category term="Emoticons Smileys"/><category term="Encrypt"/><category term="Enterprise Security"/><category term="Ethernet"/><category term="Evasi0n"/><category term="Exploitable"/><category term="Explorer"/><category term="F-Secure"/><category term="F8"/><category term="FaceNiff"/><category term="Facebook Acquisition"/><category term="Facebook Design"/><category term="Facebook Developer"/><category term="Facebook Lawsuit"/><category term="Facebook Ticker"/><category term="Facebook Timeline"/><category term="Facebook page hack"/><category term="Facebook scam"/><category term="Facebook sharing"/><category term="Facebook subscribe"/><category term="Fake Torrent Files"/><category term="File sharing"/><category term="Firefox 6"/><category term="Firefox Tips n Tricks"/><category term="Firefox add-ons"/><category term="Firefox tips"/><category term="Firesheep"/><category term="Firewalls"/><category term="Firmware"/><category term="Flash"/><category term="Flash 11"/><category term="Flash bug"/><category term="Flash drive"/><category term="Flashback"/><category term="Flikr"/><category term="Fox News"/><category term="Fox Twitter Hacked"/><category term="Foxconn"/><category term="Foxit Reader"/><category term="Free Upgrade"/><category term="Freeware"/><category term="GSM"/><category term="GSM Cellular Crypto Code"/><category term="Ghostshell"/><category term="Github"/><category term="Gmail Inbox"/><category term="Gmail Tricks"/><category term="Go Hacking"/><category term="Goggles"/><category term="Google Acquires Android partners"/><category term="Google Certificate"/><category term="Google Chrome 14"/><category term="Google Doc"/><category term="Google Drive"/><category term="Google Mail"/><category term="Google Plus"/><category term="Google Plus Tip"/><category term="Google Redesign"/><category term="Google Skipfish"/><category term="Google Wallet"/><category term="Google map"/><category term="GoogleTV"/><category term="Great Hacking Books"/><category term="Groupon"/><category term="HTML5"/><category term="Hack Pro"/><category term="Hacker"/><category term="Hacker Group"/><category term="Hackers Choices"/><category term="Hackers Mindset"/><category term="Hackers Principles"/><category term="Hacking Iphone"/><category term="Hacking MSN"/><category term="Hacking Request"/><category term="Hacking Zip Files"/><category term="HconSTF"/><category term="Heart Symbols"/><category term="Holes"/><category term="Hotmail"/><category term="Hotspot"/><category term="Hotspot Shield"/><category term="Hp"/><category term="Huawei"/><category term="Hurricane tracker"/><category term="IAEA"/><category term="IBM Synapse"/><category term="ICM"/><category term="IE 10"/><category term="IE 10 Preview"/><category term="IE 6"/><category term="IE 7"/><category term="IE 8"/><category term="IE 9"/><category term="IOS 6.1"/><category term="Imperva"/><category term="Install windows 8"/><category term="Internet Connection"/><category term="Internet Explorer 10"/><category term="Internet Protocal"/><category term="Ip Scanner"/><category term="Ipv5"/><category term="Isohunt"/><category term="Its Hidden"/><category term="Jailbreak IOS 6.1"/><category term="Kernel.org"/><category term="Keyboard shortcut"/><category term="Keylogging"/><category term="Khan Academy"/><category term="Kindle Fire"/><category term="Kretsinger Jailed"/><category term="Laptop"/><category term="Launches"/><category term="Lawsuit"/><category term="Layar"/><category term="Learn How to Hack"/><category term="Linux Foundation"/><category term="Linux Kernel 3.4"/><category term="Linux Kernel 3.4.29 LTS"/><category term="Linux network addresses"/><category term="Lithuania"/><category term="Lumia 820"/><category term="Lytro"/><category term="MEID"/><category term="MIT"/><category term="MIUI"/><category term="MPAA"/><category term="Mac Malware"/><category term="Macintosh"/><category term="Malicious Link"/><category term="Mediapad"/><category term="Metasploitable"/><category term="Microsft"/><category term="Microsoft Acquires Skype"/><category term="Microsoft Office 365"/><category term="Microsoft Server 8"/><category term="Mitsubishi"/><category term="Mobile Development"/><category term="Motorola"/><category term="Muse"/><category term="Music"/><category term="MySql Security Audit Tool"/><category term="NBC hacked"/><category term="NFC"/><category term="Namebench"/><category term="Nato"/><category term="Nepal Hackers"/><category term="Network Cable"/><category term="Network forensics"/><category term="New York"/><category term="Nexus"/><category term="Nmap"/><category term="Nmap 6"/><category term="Nokia Lumia 920"/><category term="Nokia N9"/><category term="Norton"/><category term="Norton 2013"/><category term="Notebook"/><category term="Notepad++"/><category term="Office 365"/><category term="Offline Gmail"/><category term="Oneiric"/><category term="Online Degree"/><category term="Online IDE"/><category term="Open Source"/><category term="Orable"/><category term="Os X"/><category term="Outlook"/><category term="PC revolution"/><category term="PRQ"/><category term="Packet sniffers"/><category term="Pandora"/><category term="Pandora IPO debacle"/><category term="Password Cracker"/><category term="Password Cracking"/><category term="Password Management"/><category term="Password Security"/><category term="Password folders"/><category term="Pastebin"/><category term="Patch"/><category term="Paypal"/><category term="Peepdf"/><category term="Pen Test"/><category term="Php"/><category term="Picasa"/><category term="Pipa"/><category term="Politics"/><category term="PopCap"/><category term="Porn"/><category term="Porn Passwords"/><category term="Porn Usernames"/><category term="Porn site Hacks"/><category term="Port Forwarding"/><category term="Port Scanner"/><category term="Preview Pain"/><category term="Pro Hacking Tricks"/><category term="Professional Hacking"/><category term="Project Muse"/><category term="Ps 3"/><category term="Pwn2own"/><category term="Pypy"/><category term="Pypy 1.6"/><category term="Quake 3"/><category term="Quake live"/><category term="RAT"/><category term="RIAA"/><category term="RJ45"/><category term="Radware"/><category term="Ramnit"/><category term="Ransomware"/><category term="Red Hat Linux"/><category term="Remote file Intr"/><category term="Reverse Image Search"/><category term="Ribbon"/><category term="Router"/><category term="Run Linux from Flash"/><category term="SMS Trojan"/><category term="SSLyze"/><category term="SUPERAntiSpyware"/><category term="Sabu"/><category term="Safari"/><category term="Safego"/><category term="SagaTv"/><category term="Saudi Arabia"/><category term="Screenwise"/><category term="Search Improvement"/><category term="Secure Boot"/><category term="Security Flaw"/><category term="Security Kiss"/><category term="Sega"/><category term="Session hijacking"/><category term="Siri"/><category term="Skype 2.1"/><category term="So.cl"/><category term="Social Engineering"/><category term="Social Media Management"/><category term="Sofa design"/><category term="Solutions"/><category term="Sophos"/><category term="Source Code Stolen"/><category term="Spamhaus"/><category term="Speed Torrent Download"/><category term="Spider.io"/><category term="Spy Image"/><category term="Spyware"/><category term="SqlMap 0.9"/><category term="Start Button"/><category term="StartW8"/><category term="Steganography"/><category term="Steve Jobs Quit"/><category term="Streaming"/><category term="Study"/><category term="Sucuri"/><category term="Surface"/><category term="Swagg Security"/><category term="Swedish Police"/><category term="Symantec"/><category term="Symbols"/><category term="Syrian Ministry of Defense"/><category term="THC-Hydra"/><category term="Team Poison"/><category term="Teampoison"/><category term="Tech New"/><category term="Thailand"/><category term="The Top Ten Torrent Site"/><category term="Theft"/><category term="Thinqtek"/><category term="Ticker"/><category term="Time Maching"/><category term="Timeline"/><category term="Tips"/><category term="Tls"/><category term="Tony Blair"/><category term="Top 10"/><category term="Torrent Downloader"/><category term="Transport Layer Security"/><category term="Tutorials"/><category term="Two Column"/><category term="U.N"/><category term="URLVoid"/><category term="US Army"/><category term="US Senate Hacked"/><category term="Ubuntu 11.10"/><category term="Uefi"/><category term="Ug Nazi"/><category term="Unix"/><category term="Updates"/><category term="Upgrade Android"/><category term="Uploading"/><category term="Urge"/><category term="VMware"/><category term="VOIP"/><category term="Vanguard Group"/><category term="Vega"/><category term="Vibes"/><category term="Video"/><category term="Video Editing"/><category term="Virtual Router Plus"/><category term="Vuze"/><category term="W3 Total Cache"/><category term="WSJ"/><category term="Wapsites"/><category term="Web"/><category term="Web 2.0"/><category term="Web Design"/><category term="Web Security"/><category term="Web tracking"/><category term="Webos"/><category term="Website"/><category term="Website Security"/><category term="WhatsApp"/><category term="White House"/><category term="Win 7 Command"/><category term="Window 7"/><category term="Windows 7 Tablets"/><category term="Windows 7 Themes"/><category term="Windows 8 Developer Preview"/><category term="Windows 8 Start Button"/><category term="Windows Explorer"/><category term="Windows Genuine Notifications"/><category term="Windows Mobile"/><category term="Windows Phone"/><category term="Windows Vista Tricks"/><category term="Wine"/><category term="Winreducer"/><category term="Wordpress"/><category term="XSS"/><category term="Xbox"/><category term="Your Freedom"/><category term="Youtube Box Office"/><category term="Zed Attack Proxy"/><category term="Zeus"/><category term="adobe flash vulnerability"/><category term="aircrack"/><category term="aircrack-ng"/><category term="ascpro"/><category term="cd data recovery"/><category term="cd recovery"/><category term="cloud service"/><category term="cloud service providers"/><category term="co.cc"/><category term="data-recovery"/><category term="downloads hacks"/><category term="dvd data recovery"/><category term="dvd recovery"/><category term="eCommerce"/><category term="ebooks"/><category term="flash exploit"/><category term="hacking voip"/><category term="hacking with metasploit"/><category term="havij sql injection"/><category term="hurricane bound"/><category term="iPad 2"/><category term="iPad tips"/><category term="iPhone 5 Jailbreak"/><category term="iPod"/><category term="metasploit"/><category term="netsh"/><category term="nitro pdf reader"/><category term="outlook attachments"/><category term="outlook cleanup tool"/><category term="pdf document"/><category term="pdf reader"/><category term="portable software"/><category term="pytbull"/><category term="pytbull intrusion"/><category term="radar"/><category term="secondgen"/><category term="security hacks"/><category term="sources"/><category term="spywae"/><category term="start-up"/><category term="svchost.exe"/><category term="th3j35t3r"/><category term="unlocked iPhone"/><category term="vm"/><category term="weather"/><category term="web animation tool"/><category term="web-application-security-testing"/><category term="web-security"/><category term="white papers"/><category term="wifi"/><category term="wifi-sniffing"/><category term="wireless hacks"/><category term="wireless-cracking"/><category term="xSQL Scanner"/><title type='text'>Pro Hacking Tricks - Technology Analysis &amp;amp; Blogging Tips</title><subtitle type='html'>Learn more about Cyber Security, Penetration Testing, Technology Trends, Social Media, Blogging Tips, Hacking Tricks and Facebook Hacks</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default?start-index=26&amp;max-results=25'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>528</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-6516260301873694434</id><published>2013-05-20T11:04:00.006+01:00</published><updated>2013-05-20T11:04:55.581+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Admin Application"/><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><category scheme="http://www.blogger.com/atom/ns#" term="iPhone"/><title type='text'>Top 5 Server and Admin Applications for Android and iPhone</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifDwr7yvXolMFn9aQCf_xaa7vC2nlzrsZNMUtRjOQzFROuurDVduV_Qct3Zv3IHr1X4j7y1XO4ou6fxoFa2WtNbiPPKMHcNyUwUNHQhxb26364zOvThWMbJQ-_zr3cM55BJruniBNt8Cs/s1600/android-vs-ios.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifDwr7yvXolMFn9aQCf_xaa7vC2nlzrsZNMUtRjOQzFROuurDVduV_Qct3Zv3IHr1X4j7y1XO4ou6fxoFa2WtNbiPPKMHcNyUwUNHQhxb26364zOvThWMbJQ-_zr3cM55BJruniBNt8Cs/s320/android-vs-ios.jpg&quot; /&gt;&lt;/a&gt;No matter what is the nature of your work, whether you are a webmaster, server administrator or an IT professional, the ability is to deal with your admin tasks and the server is your utmost priority. In this article, we are going to discuss the top five server and admin applications that is suitable to your iPhone, and Android mobile gadgets. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;1. AndFTP&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
For those who are not yet familiar about AndFTP it serves as an SCP, FTP, and SFTP and FTPS client. Moreover, AndFTP let the user to handle number of FTP configurations; as well it provides features like download and upload and sharing management. As well AndFTP allows the user to delete, rename, open, or update permissions, and also to run custom commands. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;2. ConnectBot&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
ConnectBot act as a Secure Shell client intended for Android users, as well it creates secure connection through using a shell even the gadget is in the remote distance to transmit files and data back and forth to your phone. Furthermore, ConnectBot let the user to handle numbers of SSH sessions, as well allow them to copy and paste between other applications, and to build protected tunnels. &lt;br /&gt;
&lt;br /&gt;
Jack Wallen an award winning writer of Linux.com stated that ConnectBot is a must have app, in fact he recommend this app to the Linux admin who are using Android phone.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;3. ServerMonitor&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
ServerMonitor is an app intended for iPhone users, it uses SSH protocol to link machines remotely to assists with your workstation and server monitoring requirements. The multi-protocol supports include the following: FTP, SMTP, HTTP, IMAP, MySQL, HTTPS, DNS, POP3, Ping and SSH. &lt;br /&gt;
Although there is no much review regarding this app but the general response seems to be optimistic. Based on the feedback from the users one thing they want to be added in this app on the next update is the ability to view all list of running processes and to view how much memory they occupy. &lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;4. iSSH – SSH / VNC Console&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
The iSSH – SSH / VNC Console for iPhone is an SSH and Telnet emulator that is fully featured with ANSI, VT102, VT100, and VT220 incorporated with tunneled X server, RDP client and VNC client. As well this app has the ability to carry simultaneous connections with total terminal compatibility, intuitive user interface, and configurable macro and key options.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;5. Network Utility&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Network Utility let the user to check the status of their server or websites through their Apple device or iPhone anywhere. Network Utility is fully featured with TCP/IP Port Scan, ping (ICMP Echo), IP address information, Whois Query, GeoIP Lookup, and more.&lt;br /&gt;
&lt;br /&gt;
For me this another iPhone app that seems to be gathering mixed reviews. Some user approved its efficiency and its user friendliness, but other user rising complaint that this app causes their device to freeze up that can only be fixed through restarting the device. Users as well object about the absence of subnet scans. The decision is still out on this app. But the best thing we need to do is to try this and experience how it holds up.&lt;br /&gt;
&lt;hr /&gt;
&lt;br /&gt;
&lt;b&gt;About the Author:&lt;/b&gt;&lt;br /&gt;
Stacy Carter is a tech writer and freelance blogger laying out for tech news via online exposures. She is the author of the site: &lt;a href=&quot;http://www.netspysoftware.com/iphone-spy.html&quot;&gt;iPhone Spy&lt;/a&gt; where you can get valuable information about spy software program on your cell phone. &lt;br /&gt;
&lt;style&gt;
.author_info {display:none!important;}
&lt;/style&gt;</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/6516260301873694434/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/05/server-and-admin-app-for-android-and-iphone.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/6516260301873694434'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/6516260301873694434'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/05/server-and-admin-app-for-android-and-iphone.html' title='Top 5 Server and Admin Applications for Android and iPhone'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifDwr7yvXolMFn9aQCf_xaa7vC2nlzrsZNMUtRjOQzFROuurDVduV_Qct3Zv3IHr1X4j7y1XO4ou6fxoFa2WtNbiPPKMHcNyUwUNHQhxb26364zOvThWMbJQ-_zr3cM55BJruniBNt8Cs/s72-c/android-vs-ios.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-1548567971815764338</id><published>2013-04-04T16:06:00.001+01:00</published><updated>2013-04-04T16:06:46.013+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Nexus"/><category scheme="http://www.blogger.com/atom/ns#" term="secondgen"/><category scheme="http://www.blogger.com/atom/ns#" term="sources"/><category scheme="http://www.blogger.com/atom/ns#" term="Tablet"/><title type='text'>Google plans to start sales of second-gen Nexus 7 tablet from July</title><content type='html'>&lt;P&gt;Google Inc will launch a new version of its Nexus 7 tablet powered by Qualcomm Inc&#39;s Snapdragon processor around July, as the software giant pushes deeper into the cut-price mobile hardware market.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;Google is aiming to ship as many as eight million of the Asustek-made tablets in the second half of the year, throwing down the gauntlet to other low-end tablets such as Amazon.com Inc&#39;s Kindle Fire and Apple Inc&#39;s iPad mini, the sources with knowledge of the new product said.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;This is the first time details about the timing and sales targets for Google&#39;s new tablet have been unveiled, although the company has not publicly released any information.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;Google, which gets almost all of its revenue from online advertising, wants the aggressively priced Nexus tablets to be a hit as more Nexus users would mean more exposure for Google&#39;s ads.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;The latest version will have a higher screen resolution, a thinner bezel design and adopt Qualcomm&#39;s chip in place of Nvidia Corp&#39;s Tegra 3, which was used in the first Nexus 7s released last year, the sources said, declining to be identified because they are not authorized to speak to the media.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;In a blow to Nvidia, Google weighed both U.S. chipmakers&#39; processors but finally decided on Qualcomm&#39;s for power reasons, one of the sources added.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;Qualcomm and Nvidia are competing aggressively in the tablet market as they seek to expand from their traditional strongholds of cellphones and PCs respectively.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;A Google spokesman declined to comment on its new tablet. Qualcomm and Nvidia also declined to respond to questions.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;Google and other traditionally non-hardware companies like Amazon and Microsoft Corp have begun making inroads into mobile devices as consumers increasingly access the Web on the go.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;Google introduced its first tablet last June, hoping to replicate its smartphone success in a hotly contested market now dominated by Kindle Fire and iPad.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;The Nexus 7 joined the ranks of smaller, 7-inch tablets popularized by Amazon and Samsung Electronics, among others.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;Pricing is yet to be determined and Google&#39;s plans are fluid, the sources said. Market leader Apple is expected to launch new iPads this year as well, possibly forcing its competitors to change their assumptions.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;Google may choose to sell the new gadget for $199, the same as the first generation rolled out last June, while the old model may be discounted, one of the sources said. Alternatively, the new tablet could be priced more competitively at $149 and the previous model discontinued, the source added.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;The cheapest iPad mini goes for more than $300.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;CORE STRENGTHS&lt;/P&gt;&lt;br /&gt;&lt;P&gt;Though pricing has not been finalized, discounting could play to Google&#39;s and Amazon&#39;s strengths by getting cheaper hardware into more consumers&#39; hands to drive revenue from their core Internet-based businesses.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;&quot;This is the &#39;zero margin strategy&#39;,&quot; said Fubon Securities analyst Arthur Liao. &quot;Ninety-seven percent of Google&#39;s revenue comes from advertisement, so it needs to sell more mobile devices in order to reach more consumers.&quot;&lt;/P&gt;&lt;br /&gt;&lt;P&gt;The Internet search giant, which has never disclosed tablet sales, plans to ship six to eight million of the new Nexus 7s in the second half of this year, the sources said. That compares to an estimated 4.6 million Nexus 7s sold in the same period last year, according to Enders Analysis mobile industry analyst Benedict Evans.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;The large volume could help to accelerate development of tablet-specific applications for its Android operating software.&lt;/P&gt;&lt;br /&gt;&lt;P&gt;Asustek, a netbook PC pioneer, will continue to co-brand with Google on the new Nexus 7. The Taiwanese company has said it aims to ship over 12 million tablets this year, almost double last year&#39;s shipments.&lt;/P&gt;</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/1548567971815764338/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/04/google-plans-to-start-sales-of-second.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/1548567971815764338'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/1548567971815764338'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/04/google-plans-to-start-sales-of-second.html' title='Google plans to start sales of second-gen Nexus 7 tablet from July'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-3876224803160889527</id><published>2013-04-02T17:36:00.001+01:00</published><updated>2013-04-02T17:39:22.935+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Chrome"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Holes"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>11 Security Holes Addressed by Google in Chrome 26</title><content type='html'>&lt;b&gt;Chrome 26 is officially out and, as always, the latest stable channel update comes with a number of improvements in the security section. However, on this occasion, only 2 high-severity vulnerabilities have been addressed.&lt;/b&gt;&lt;br /&gt;
One of the high-severity flaws has been uncovered by Atte Kettunen of OUSPG. The expert has been rewarded with $1,000 (780 EUR) for a use-after-free issue in Web Audio.&lt;br /&gt;
&lt;br /&gt;
By fixing the other high-severity bug, Google ensures that isolated websites run in their own processes. &lt;br /&gt;
&lt;br /&gt;
Of the four medium-severity vulnerabilities, one – a use-after-free with pop-up windows in extensions – affects only the Linux variant.&lt;br /&gt;
&lt;br /&gt;
Five low-severity bugs have also been identified.&lt;br /&gt;
&lt;br /&gt;
Most of the issues have been found by the Google Chrome Security Team and members of the Chromium development community. &lt;br /&gt;
&lt;br /&gt;
Subho Halder, Aditya Gupta, and Dev Kar, all three of xys3c, and “t3553r” have also been credited for finding security holes. </content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/3876224803160889527/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/04/11-security-holes-addressed-by-google.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/3876224803160889527'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/3876224803160889527'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/04/11-security-holes-addressed-by-google.html' title='11 Security Holes Addressed by Google in Chrome 26'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-965585447539098606</id><published>2013-04-02T17:20:00.001+01:00</published><updated>2013-04-02T17:39:50.377+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Analytics"/><category scheme="http://www.blogger.com/atom/ns#" term="Detection"/><category scheme="http://www.blogger.com/atom/ns#" term="eCommerce"/><category scheme="http://www.blogger.com/atom/ns#" term="Fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="Launches"/><category scheme="http://www.blogger.com/atom/ns#" term="Solutions"/><title type='text'>ID Analytics Launches eCommerce Fraud Detection Solutions</title><content type='html'>Fraud detection solutions launched by ID Analytics&lt;strong&gt;ID Analytics has launched a series of solutions designed to help online retailers in their fight against fraud, a problem that costs companies around $3.4 billion (2.6 billion EUR) a year.&lt;br /&gt;
&lt;/STRONG&gt;&lt;br /&gt;
The eCommerce suit offered by ID Analytics can be used not only to stop fraudulent transactions before any money or time is wasted, but it can also reduce the number of false positive results reported by automated fraud detection systems.&lt;br /&gt;
&lt;br /&gt;
The solutions include Transaction Protector, a score card that can identify over 80% of fraud charge-back losses in the riskiest two percent of transactions; Transaction Advanced Intelligence, which provides real-time risk insight based on a series of attributes; and Transaction Takeover, which detects when an account is overtaken by a fraudster.&lt;br /&gt;
&lt;br /&gt;
“Fraudsters are becoming increasingly sophisticated, and eCommerce retailers still encounter too many false positives when screening for potential fraud,” explained Aaron Kline, director of eCommerce at ID Analytics.  &lt;br /&gt;
&lt;br /&gt;
“ID Analytics partners with merchants to help them fight fraud while ensuring that no additional friction is introduced into the online customer experience.”</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/965585447539098606/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/04/id-analytics-launches-ecommerce-fraud.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/965585447539098606'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/965585447539098606'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/04/id-analytics-launches-ecommerce-fraud.html' title='ID Analytics Launches eCommerce Fraud Detection Solutions'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-2291924358500943038</id><published>2013-04-02T15:29:00.001+01:00</published><updated>2013-04-02T15:29:33.354+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="Saudi Arabia"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Skype"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp"/><title type='text'>Saudi Arabia Government Threatens to Ban Skype, WhatsApp and other VOIP Services</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilpFgp8gu5-m1V3o1BHtNhWXaEYxo5C5rx2c3LjG1kDnSCE-FaW458Q79aGQ0lNOgSdt79txkY5mnTMdj_c0tcm6VOF9WICvLtWZJDpcIBF3FT44iQuImFWp9Y-H-1ZzFZS11DMOpc3W4/s1600/Saudi-Arabia-Wants-to-Ban-Skype-Viber-WhatsApp-Other-VoIP-Apps.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilpFgp8gu5-m1V3o1BHtNhWXaEYxo5C5rx2c3LjG1kDnSCE-FaW458Q79aGQ0lNOgSdt79txkY5mnTMdj_c0tcm6VOF9WICvLtWZJDpcIBF3FT44iQuImFWp9Y-H-1ZzFZS11DMOpc3W4/s1600/Saudi-Arabia-Wants-to-Ban-Skype-Viber-WhatsApp-Other-VoIP-Apps.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
VoIP services regularly get into trouble in countries where governments like to keep a solid grip on what people are talking about and with whom.&lt;br /&gt;
&lt;br /&gt;
No, not the US this time, Saudi Arabia is the latest to join the anti-Skype brigade as it &lt;a href=&quot;http://edition.cnn.com/2013/03/31/world/meast/saudi-arabia-may-block-apps/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;threatens&lt;/a&gt; to ban essentially all VoIP communications in the country unless those communications fall within the regulations.&lt;br /&gt;
&lt;br /&gt;
Regulations that involve the government being allowed to snoop in on communications, which can&#39;t be done practically if the communications are encrypted.&lt;br /&gt;
&lt;br /&gt;
While the government hasn&#39;t said exactly why these apps are being targeted, it did mention Skype, WhatsApp and Viber as falling outside the rules. All three are very popular VoIP services, the latter two mostly on mobile phones.&lt;br /&gt;
&lt;br /&gt;
Saudi Arabia has a history of going against communication methods it can&#39;t control, it banned BlackBerry&#39;s built-in messaging service temporarily a few years ago over the use of encryption.</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/2291924358500943038/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/04/saudi-arabia-citizens-using-voip-under-surveillance.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/2291924358500943038'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/2291924358500943038'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/04/saudi-arabia-citizens-using-voip-under-surveillance.html' title='Saudi Arabia Government Threatens to Ban Skype, WhatsApp and other VOIP Services'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilpFgp8gu5-m1V3o1BHtNhWXaEYxo5C5rx2c3LjG1kDnSCE-FaW458Q79aGQ0lNOgSdt79txkY5mnTMdj_c0tcm6VOF9WICvLtWZJDpcIBF3FT44iQuImFWp9Y-H-1ZzFZS11DMOpc3W4/s72-c/Saudi-Arabia-Wants-to-Ban-Skype-Viber-WhatsApp-Other-VoIP-Apps.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-5564053446915263684</id><published>2013-03-27T19:33:00.000+00:00</published><updated>2013-03-27T19:33:15.174+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Flare"/><category scheme="http://www.blogger.com/atom/ns#" term="DDos Attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Spam"/><category scheme="http://www.blogger.com/atom/ns#" term="Spamhaus"/><title type='text'>The Biggest DDos Attack in History, Disrupts Global Internet</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH1H2wczvp7KOLSFUqoaKwLpaOZ0WXJbykSJi2w2zeEr5zZ4lBzfg9552Uri8JLgq9z4xZ4fJGt5OzIlUGHxpJW3nabMHk86SImSeoVlboc7SqCLJvVKjZBNyJXI7taFbJbo3IuxQ-r18/s1600/disconnected_internet.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH1H2wczvp7KOLSFUqoaKwLpaOZ0WXJbykSJi2w2zeEr5zZ4lBzfg9552Uri8JLgq9z4xZ4fJGt5OzIlUGHxpJW3nabMHk86SImSeoVlboc7SqCLJvVKjZBNyJXI7taFbJbo3IuxQ-r18/s320/disconnected_internet.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Anti-spam organisation Spamhaus has recovered from possibly the largest ‪DDoS‬ attack in history.&lt;br /&gt;
&lt;br /&gt;
A massive 300Gbps was thrown against Spamhaus&#39; website but the anti-spam organisation was able to recover from the attack and get its core services back up and running. CloudFlare, the content delivery firm hired by Spamhaus last week to guard against an earlier run of DDoS attacks, was also hit, forcing it into taking the highly unusual step of dropping London as a hub in its network - as a &lt;a href=&quot;https://twitter.com/CloudFlareSys/status/316284579247960064&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Twitter update&lt;/a&gt; by CloudFlare on Monday explained.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
Our peering in London has been dropped due to a large attack. Modifying routes to avoid degradation.Affecting location: London, GB&lt;br /&gt;
— CloudFlareStatus (@CloudFlareSys) &lt;a href=&quot;https://twitter.com/CloudFlareSys/status/316284579247960064&quot;&gt;March 25, 2013&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;//platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;
Spamhaus supplies lists of IP addresses for servers and computers on the net linked to the distribution of spam. The blacklists supplied by the not-for-profit organisation are used by ISPs, large corporations and spam filtering vendors to block the worst sources of junk mail before other spam filtering measures are brought into play.&lt;br /&gt;
&lt;br /&gt;
Spammers, of course, hate this practice so it&#39;s no big surprise that Spamhaus gets threatened, sued, and DDoSed regularly. Those affected by what they regard as incorrect listings also object about Spamhaus&#39; alleged vigilante tactics.&lt;br /&gt;
&lt;br /&gt;
The latest run of attacks &lt;a href=&quot;http://www.spamhaus.org/news/article/694/ddos-update-20-march-2013&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;began&lt;/a&gt; on 18 March with a 10Gbps packet flood that saturated Spamhaus&#39; connection to the rest of the Internet and knocked its site offline. Spamhaus&#39;s blocklists are distributed via DNS and widely mirrored in order to ensure that it is resilient to attacks. The website, however, was unreachable and the blacklists weren&#39;t getting updated.&lt;br /&gt;
&lt;br /&gt;
The largest source of attack traffic against Spamhaus came from DNS reflection, launched through Open DNS resolvers rather than directly via compromised networks. Spamhaus turned to CloudFlare for help and the content delivery firm was able to mitigate attacks that reached a peak of 75Gbps, as explained in a blog post &lt;a href=&quot;http://blog.cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Things remained calm for a few days before kicking off again with even greater intensity - to the extent that collateral damage was seen against services such as Netflix, the New York Times reports.&lt;br /&gt;
&lt;br /&gt;
Spamhaus&#39; site remains available at the time of writing on Wednesday. Steve Linford, chief executive for Spamhaus, &lt;a href=&quot;http://www.bbc.co.uk/news/technology-21954636&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;told the BBC&lt;/a&gt; that the scale of the attack was unprecedented.&lt;br /&gt;
&lt;br /&gt;
&quot;We&#39;ve been under this cyber-attack for well over a week.But we&#39;re up - they haven&#39;t been able to knock us down. Our engineers are doing an immense job in keeping it up - this sort of attack would take down pretty much anything else,&quot; he said.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Turning up the volume of DDoS attacks&lt;/b&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
A blog post by CloudFlare, written last week before the latest run of attacks, explains the mechanism of the attack against Spamhaus and how it can be usde to amplify packet floods.&lt;br /&gt;
&lt;br /&gt;
The basic technique of a DNS reflection attack is to send a request for a large DNS zone file with the source IP address spoofed to be the intended victim to a large number of open DNS resolvers. The resolvers then respond to the request, sending the large DNS zone answer to the intended victim. The attackers&#39; requests themselves are only a fraction of the size of the responses, meaning the attacker can effectively amplify their attack to many times the size of the bandwidth resources they themselves control.&lt;br /&gt;
&lt;br /&gt;
In the Spamhaus case, the attacker was sending requests for the DNS zone file for ripe.net to open DNS resolvers. The attacker spoofed the CloudFlare IPs we&#39;d issued for Spamhaus as the source in their DNS requests. The open resolvers responded with DNS zone file, generating collectively approximately 75Gbps of attack traffic. The requests were likely approximately 36 bytes long (e.g. dig ANY ripe.net @X.X.X.X +edns=0 +bufsize=4096, where X.X.X.X is replaced with the IP address of an open DNS resolver) and the response was approximately 3,000 bytes, translating to a 100x amplification factor.&lt;/blockquote&gt;
CloudFlare reckons 30,000 unique DNS resolvers have been involved in the attack against Spamhaus.&lt;br /&gt;
&lt;br /&gt;
&quot;Because the attacker used a DNS amplification, the attacker only needed to control a botnet or cluster of servers to generate 750Mbps - which is possible with a small sized botnet or a handful of AWS instances,&quot; it explains.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/5564053446915263684/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/03/biggest-ddos-attack-in-history.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/5564053446915263684'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/5564053446915263684'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/03/biggest-ddos-attack-in-history.html' title='The Biggest DDos Attack in History, Disrupts Global Internet'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH1H2wczvp7KOLSFUqoaKwLpaOZ0WXJbykSJi2w2zeEr5zZ4lBzfg9552Uri8JLgq9z4xZ4fJGt5OzIlUGHxpJW3nabMHk86SImSeoVlboc7SqCLJvVKjZBNyJXI7taFbJbo3IuxQ-r18/s72-c/disconnected_internet.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-1307743874841387892</id><published>2013-03-22T12:26:00.000+00:00</published><updated>2013-03-22T12:26:55.651+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Advanced System Care"/><category scheme="http://www.blogger.com/atom/ns#" term="ascpro"/><category scheme="http://www.blogger.com/atom/ns#" term="IObit"/><category scheme="http://www.blogger.com/atom/ns#" term="License Key"/><title type='text'>Advance SystemCare Pro 6 Latest Version for 2013 License Key</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiszsndeMEnoxPq-ydZsiZz_v0FVsukDQbcJl5lXN6_7-4zaTjN_DDVPHdhh-dUxWdp7t-4ThsECeX2i0pMXvQWcPGe2Wyk6GWB78-iOtmQDqZMON_-xbkA-fk9RXNV26IQBVezMwrNxUE/s1600/ascpro.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiszsndeMEnoxPq-ydZsiZz_v0FVsukDQbcJl5lXN6_7-4zaTjN_DDVPHdhh-dUxWdp7t-4ThsECeX2i0pMXvQWcPGe2Wyk6GWB78-iOtmQDqZMON_-xbkA-fk9RXNV26IQBVezMwrNxUE/s320/ascpro.png&quot; /&gt;&lt;/a&gt;Advanced SystemCare PRO provides an always-on, automated, all-in-one PC Healthcare Service with anti-spyware, privacy protection, performance tune-ups, and system cleaning capabilities. This powerful and award-winning precision tool fixes stubborn errors, cleans out clutter, optimizes Internet and download speeds, ensures personal security, and maintains maximum computer performance automatically. Key benefits include:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1) &lt;/b&gt;Keeps your PC running at peak performance: Fully optimizes Windows for ultimate system performance and top Internet speed by unleashing the built-in power of your system, based on how you use your PC and your network configuration. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2) &lt;/b&gt;It turns your PC into a business PC, a productive workstation, an entertainment center, a game machine, or a scientific computing PC. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3)&lt;/b&gt; Defends PC security with extra protection: Detects and analyzes Windows security environment. Scans and removes spyware and adware using up-to-date definition files. Prevents spyware, hackers and hijackers from installing malicious programs on your computer. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4) &lt;/b&gt;Erases and updates your PC&#39;s activity histories. One click to solve as many as 10 common PC problems: Advanced SystemCare 5 inherits the ease-of-use from previous versions, with more powerful capabilities. With one click, it scans and repairs ten PC problems and protects your PC from hidden security threats. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5) &lt;/b&gt;Real-time optimization with ActiveBoost function: ActiveBoost, technology that actively runs in the background intelligently managing system resources in real-time, constantly detecting inactive resources and optimizing CPU and RAM usage.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;What’s New in Advanced SystemCare 6&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Brand New User Interface – The New One-Click Solution Provides Maximum Convenience to Conduct a Comprehensive PC-Care with Just a Click of a Button.&lt;/li&gt;
&lt;li&gt;New Web Surfing Protection – Creates a Safer Online Environment by Detecting Risky Websites and Other E-threats that May Harm Your PC.&lt;/li&gt;
&lt;li&gt;New Internet Boost Technology – Provides Smoother Online Experience by Accelerating Internet Downloading, Web Surfing, Online Video and Gaming up to 300% Faster.&lt;/li&gt;
&lt;li&gt;New Generation Disk Defragment Engine – Makes Disk Scanning and Optimization Much Faster by Intelligently Organizing Drive Data for Maximum Performance.&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&amp;nbsp;License Key&lt;/b&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;pre&gt;&lt;span style=&quot;font-size: large;&quot;&gt;4A639-FD966-C5435-512C4 (4 months from now)

65792-57FC4-5CEC1-677C4 (not sure)&lt;/span&gt;&lt;/pre&gt;
&lt;/blockquote&gt;
</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/1307743874841387892/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/03/license-code-advance-system-care6.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/1307743874841387892'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/1307743874841387892'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/03/license-code-advance-system-care6.html' title='Advance SystemCare Pro 6 Latest Version for 2013 License Key'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiszsndeMEnoxPq-ydZsiZz_v0FVsukDQbcJl5lXN6_7-4zaTjN_DDVPHdhh-dUxWdp7t-4ThsECeX2i0pMXvQWcPGe2Wyk6GWB78-iOtmQDqZMON_-xbkA-fk9RXNV26IQBVezMwrNxUE/s72-c/ascpro.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-3650985140132240054</id><published>2013-03-19T17:32:00.000+00:00</published><updated>2013-03-19T17:33:59.529+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AT-T Hacker"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="iPad"/><category scheme="http://www.blogger.com/atom/ns#" term="Lawsuit"/><title type='text'>AT&amp;T Hacker Sentenced to 41 Months in Prison</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1n5besbTVmRligb21-f3elLWimAYAHA6_iGoYyFmLCZbqeJ38bxSk9e9RjQXTHKMWu2HHbFNoG6Az4RAWOpEsXq5fN2J3b3IrvMqlQRW0KA7zfEK2v4W1rnqg2h7t34eSYqGAbZy41HE/s1600/AT-T-Hacker-Andrew-Auernheimer-Sentenced-to-41-Months-in-Prison-2.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1n5besbTVmRligb21-f3elLWimAYAHA6_iGoYyFmLCZbqeJ38bxSk9e9RjQXTHKMWu2HHbFNoG6Az4RAWOpEsXq5fN2J3b3IrvMqlQRW0KA7zfEK2v4W1rnqg2h7t34eSYqGAbZy41HE/s320/AT-T-Hacker-Andrew-Auernheimer-Sentenced-to-41-Months-in-Prison-2.png&quot; /&gt;&lt;/a&gt;Andrew Auernheimer – aka “Weev,” the Internet activist found guilty in November 2012 of hacking into the systems of AT&amp;amp;T and stealing the details of around 120,000 iPad owners – has been reportedly sentenced to 41 months in prison and three years of supervised release.&lt;br /&gt;
&lt;br /&gt;
Tweets are being posted from the courthouse where the trial is taking place.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://twitter.com/Timcast&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Tim Pool&lt;/a&gt; of Timcast, who has been following the trial from the court, says Auernheimer and his co-defendant Daniel Spitler will also have to pay $73,000 (56,000 EUR) in restitution to AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
“Judge stated the sentence she administered would help weev down a ‘positive path’ and give him ‘respect for the law’,” Pool wrote.&lt;br /&gt;
&lt;br /&gt;
One noteworthy aspect is the fact that the prosecution apparently used Auernheimer&#39;s Reddit &lt;a href=&quot;http://www.reddit.com/r/IAmA/comments/1ahkgc/i_am_weev_i_may_be_going_to_prison_under_the/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;AMA&lt;/a&gt; (ask-me-anything) to justify the sentencing. &lt;br /&gt;
&lt;br /&gt;
In addition, at one point in the trial, court agents asked Weev to hand over his phone. He gave the device to his lawyer instead, after which he was “quickly grabbed, pinned, and cuffed.”&lt;br /&gt;
&lt;br /&gt;
Auernheimer maintained his innocence up until the last minute. He has highlighted on numerous occasions that he wasn’t trying to cause any harm.&lt;br /&gt;
&lt;br /&gt;
His tweet just before the trial.&lt;br /&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
No matter what the outcome, I will not be broken. I am antifragile.&lt;br /&gt;
— Andrew Auernheimer (@rabite) &lt;a href=&quot;https://twitter.com/rabite/status/313658826387779585&quot;&gt;March 18, 2013&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;//platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/3650985140132240054/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/03/at-t-hacker-sentenced-to-prison.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/3650985140132240054'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/3650985140132240054'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/03/at-t-hacker-sentenced-to-prison.html' title='AT&amp;T Hacker Sentenced to 41 Months in Prison'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1n5besbTVmRligb21-f3elLWimAYAHA6_iGoYyFmLCZbqeJ38bxSk9e9RjQXTHKMWu2HHbFNoG6Az4RAWOpEsXq5fN2J3b3IrvMqlQRW0KA7zfEK2v4W1rnqg2h7t34eSYqGAbZy41HE/s72-c/AT-T-Hacker-Andrew-Auernheimer-Sentenced-to-41-Months-in-Prison-2.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-8129030000884031626</id><published>2013-03-13T12:46:00.000+00:00</published><updated>2013-03-13T12:46:59.248+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cryptography"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="SSLyze"/><title type='text'>Download SSLyze v0.6 – SSL Server Configuration Scanning Tool</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJz61mJiagdHPeyrR4VEs9zuMQil-c-Am94w1cE9SBP20DOXu4y9ijkcvHB7QhB9e_NBAM5dFxMhypzywIVqgSKg5zGV0rVnyHD5J3TLp3pTu8qEFZ29RrCSDVOjFQPRzil4ULDzZK13s/s1600/SSLyze.jpeg&quot; imageanchor=&quot;1&quot; &gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJz61mJiagdHPeyrR4VEs9zuMQil-c-Am94w1cE9SBP20DOXu4y9ijkcvHB7QhB9e_NBAM5dFxMhypzywIVqgSKg5zGV0rVnyHD5J3TLp3pTu8qEFZ29RrCSDVOjFQPRzil4ULDzZK13s/s320/SSLyze.jpeg&quot; /&gt;&lt;/a&gt;SSLyze is a Python tool that can analyze the SSL configuration of a server by connecting to it. It is designed to be fast and comprehensive, and should help organizations and testers identify misconfigurations affecting their SSL servers.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Key features include:&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;SSL 2.0/3.0 and TLS 1.0/1.1/1.2 compatibility&lt;/li&gt;
&lt;li&gt;Performance testing: session resumption and TLS tickets support&lt;/li&gt;
&lt;li&gt;Security testing: weak cipher suites, insecure renegation, CRIME and THC-SSL DOS attacks&lt;/li&gt;
&lt;li&gt;Server certificate validation&lt;/li&gt;
&lt;li&gt;Support for StartTLS with SMTP and XMPP, and traffic tunneling through an HTTPS proxy&lt;/li&gt;
&lt;li&gt;Client certificate support for servers performing mutual authentication&lt;/li&gt;
&lt;li&gt;Scan results can be written to an XML file for further processing&lt;/li&gt;
&lt;/ul&gt;While v0.5 saw the addition of a server side check for the &lt;a href=&quot;http://arstechnica.com/security/2012/09/many-ways-to-break-ssl-with-crime-attacks-experts-warn/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;CRIME attack&lt;/a&gt;, that uses SSL Compression, v0.6 also has significant improvements. New in v0.6:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Added support for Server Name Indication; see –sni&lt;/li&gt;
&lt;li&gt;Partial results are returned when the server requires client authentication but no client certificate was provided&lt;/li&gt;
&lt;li&gt;Preliminary IPv6 support&lt;/li&gt;
&lt;li&gt;Various bug fixes and better support of client authentication and HTTPS tunneling&lt;/li&gt;
&lt;/ul&gt;ou can download SSLyze v0.6 here:&lt;br /&gt;
&lt;br /&gt;
Linux/OSX – &lt;a href=&quot;https://dl.dropbox.com/s/h4cc7q68jdmxay3/sslyze-0.6_src.zip?dl=1&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;sslyze-0.6_src.zip&lt;/a&gt;&lt;br /&gt;
Windows 7/Python 32-bit – &lt;a href=&quot;https://dl.dropbox.com/s/lexhsfejbjp209e/sslyze-0.6_Windows7_Python32.zip?dl=1&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;sslyze-0.6_Windows7_Python32.zip&lt;/a&gt;&lt;br /&gt;
Windows 7/Python 64-bit – &lt;a href=&quot;https://dl.dropbox.com/s/l194sbqvnuuz2xs/sslyze-0.6_Windows7_Python64.zip?dl=1&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;sslyze-0.6_Windows7_Python64.zip&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Read more &lt;a href=&quot;https://github.com/iSECPartners/sslyze&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/8129030000884031626/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/03/download-sslyze-v0.6.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/8129030000884031626'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/8129030000884031626'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/03/download-sslyze-v0.6.html' title='Download SSLyze v0.6 – SSL Server Configuration Scanning Tool'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJz61mJiagdHPeyrR4VEs9zuMQil-c-Am94w1cE9SBP20DOXu4y9ijkcvHB7QhB9e_NBAM5dFxMhypzywIVqgSKg5zGV0rVnyHD5J3TLp3pTu8qEFZ29RrCSDVOjFQPRzil4ULDzZK13s/s72-c/SSLyze.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-8082308064063609652</id><published>2013-03-08T17:33:00.001+00:00</published><updated>2013-03-08T17:33:28.877+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Adobe"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Mozilla"/><category scheme="http://www.blogger.com/atom/ns#" term="Pwn2own"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Pwn2Own ends with Oracle Java, Reader and Adobe Flash exploits</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi99z_9LIczsHdIKw1FJ96DVOK01SSVL06BdlG4_PhrMCIwo-XOYMIzMNDgBwSHRla8tUJ-WhtAuipAqUZFaKqQ0hM0Ptgy4bY8gz-G784DNAKMrkLvl2NiVMnZ6tfdgqj_weX9z9Zy00E/s1600/google.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi99z_9LIczsHdIKw1FJ96DVOK01SSVL06BdlG4_PhrMCIwo-XOYMIzMNDgBwSHRla8tUJ-WhtAuipAqUZFaKqQ0hM0Ptgy4bY8gz-G784DNAKMrkLvl2NiVMnZ6tfdgqj_weX9z9Zy00E/s320/google.png&quot; height=&quot;168&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Day two of the Pwn2Own competition at CanSecWest was again successful for French Vupen security, as they succeeded in exploiting Adobe Flash on Internet Explorer 9 on Windows 7 by chaining together three zero-days (an overflow, a ASLR bypass technique and a IE9 sandbox memory corruption) and earning themselves another $70,000.&lt;br /&gt;
&lt;br /&gt;
George Hotz exploited Adobe Reader XI (also on IE 9 on Win7), and Ben Murphy - the last contestant to target Java - has also managed to earn a prize even though he wasn&#39;t there, because James Forshaw, a winner from the previous day, agreed to serve as proxy and demonstrate the attack.&lt;br /&gt;
&lt;br /&gt;
All in all, ZDI has awarded over half a million dollars in cash prizes and, of course, the compromised laptops and ZDI reward points.&lt;br /&gt;
&lt;br /&gt;
The Google financed Pwnium hacking contest - also held at CanSecWest - this year requires contestants to &quot;break&quot; Chrome OS but has so far not witnessed a successful exploitation.&lt;br /&gt;
&lt;br /&gt;
In the meantime, Mozilla has already &lt;a href=&quot;https://www.mozilla.org/security/announce/2013/mfsa2013-29.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;fixed&lt;/a&gt; the use-after-free zero-day flaw exploited yesterday by Vupen Security, and Google &lt;a href=&quot;http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_7.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;has issued&lt;/a&gt; a Chrome update that fixes the flaws discovered by the MWR Labs team.</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/8082308064063609652/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/03/pwn2own-ends-with-oracle-java-reader-adobe-flash-exploit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/8082308064063609652'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/8082308064063609652'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/03/pwn2own-ends-with-oracle-java-reader-adobe-flash-exploit.html' title='Pwn2Own ends with Oracle Java, Reader and Adobe Flash exploits'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi99z_9LIczsHdIKw1FJ96DVOK01SSVL06BdlG4_PhrMCIwo-XOYMIzMNDgBwSHRla8tUJ-WhtAuipAqUZFaKqQ0hM0Ptgy4bY8gz-G784DNAKMrkLvl2NiVMnZ6tfdgqj_weX9z9Zy00E/s72-c/google.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-4075371317355120457</id><published>2013-02-23T15:08:00.000+00:00</published><updated>2013-02-23T15:08:59.469+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Administrator"/><category scheme="http://www.blogger.com/atom/ns#" term="Win 7 Command"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 7"/><title type='text'>Windows 7 Commands Every Administrator Should Know</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ3NmvYlSgizKJoQ5G0TGCBFmuy6AQiaomqZcUWIqziCBGJ1yCLWuzVdc-M4b9eiBlS1L-Ti-ku-1-PFlhz1rLIwcJSPU1JZytdepchVTcp_m0Beei_7Nz7Hr4w9wWjiQFtVN_7I33eqI/s1600/windows7logo-580-75.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Windows 7&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ3NmvYlSgizKJoQ5G0TGCBFmuy6AQiaomqZcUWIqziCBGJ1yCLWuzVdc-M4b9eiBlS1L-Ti-ku-1-PFlhz1rLIwcJSPU1JZytdepchVTcp_m0Beei_7Nz7Hr4w9wWjiQFtVN_7I33eqI/s320/windows7logo-580-75.jpg&quot; /&gt;&lt;/a&gt;PC troubleshooting is becoming less common in larger organizations, but consultants and techs in smaller shops still have to get their hands dirty identifying and fixing desktop problems. Oftentimes, troubleshooting Windows 7 means delving into the command line. Here are 10 fundamental Windows 7 commands you might find helpful.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;1: System File Checker&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Malicious software will often attempt to replace core system files with modified versions in an effort to take control of the system. The System File Checker can be used to verify the integrity of the Windows system files. If any of the files are found to be missing or corrupt, they will be replaced. You can run the System File Checker by using this command:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;sfc /scannow&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;2: File Signature Verification&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
One way to verify the integrity of a system is to make sure that all the system files are digitally signed. You can accomplish this with the File Signature Verification tool. This tool is launched from the command line but uses a GUI interface. It will tell you which system files are signed and which aren’t. As a rule, all the system files should be digitally signed, although some hardware vendors don’t sign driver files. The command used to launch the File Signature Verification tool is:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;sigverif&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;3: Driverquery&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Incorrect device drivers can lead to any number of system problems. If you want to see which drivers are installed on a Windows 7 system, you can do so by running the driverquery tool. This simple command-line tool provides information about each driver that is being used. The command is:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;driverquery&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you need a bit more information, you can append the -v switch. Another option is to append the -si switch, which causes the tool to display signature information for the drivers. Here’s how they look:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;driverquery -v&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;driverquery -si&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;4: Nslookup&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The nslookup tool can help you to verify that DNS name resolution is working correctly. When you run nslookup against a host name, the tool will show you how the name was resolved, as well as which DNS server was used during the lookup. This tool can be extremely helpful when troubleshooting problems related to legacy DNS records that still exist but that are no longer correct.&lt;br /&gt;
&lt;br /&gt;
To use this tool, just enter the nslookup command, followed by the name of the host you want to resolve. For example:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;nslookup dc1.contoso.com&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;5: Ping&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Ping is probably the simplest of all diagnostic commands. It’s used to verify basic TCP/IP connectivity to a network host. To use it, simply enter the command, followed by the name or IP address of the host you want to test. For example:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;ping 192.168.1.1&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Keep in mind that this command will work only if Internet Control Message Protocol (ICMP) traffic is allowed to pass between the two machines. If at any point a firewall is blocking ICMP traffic, the ping will fail.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;6: Pathping&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Ping does a good job of telling you whether two machines can communicate with one another over TCP/IP, but if a ping does fail, you won’t receive any information regarding the nature of the failure. This is where the pathping utility comes in.&lt;br /&gt;
&lt;br /&gt;
Pathping is designed for environments in which one or more routers exist between hosts. It sends a series of packets to each router that’s in the path to the destination host in an effort to determine whether the router is performing slowly or dropping packets. At its simplest, the syntax for pathping is identical to that of the ping command (although there are some optional switches you can use). The command looks like this:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;pathping 192.168.1.1&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;7: Ipconfig&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The ipconfig command is used to view or modify a computer’s IP addresses. For example, if you wanted to view a Windows 7 system’s full IP configuration, you could use the following command:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;ipconfig /all&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Assuming that the system has acquired its IP address from a DHCP server, you can use the ipconfig command to release and then renew the IP address. Doing so involves using the following commands:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;ipconfig /release&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;ipconfig /renew&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Another handy thing you can do with ipconfig is flush the DNS resolver cache. This can be helpful when a system is resolving DNS addresses incorrectly. You can flush the DNS cache by using this command:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;ipconfig /flushdns&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;8: Repair-bde&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If a drive that is encrypted with BitLocker has problems, you can sometimes recover the data using a utility called repair-bde. To use this command, you will need a destination drive to which the recovered data can be written, as well as your BitLocker recovery key or recovery password. The basic syntax for this command is:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;repair-bde &lt;/span&gt;&lt;/b&gt;&lt;source&gt;&lt;/source&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;destination&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt; -rk | rp &lt;/span&gt;&lt;/b&gt;&lt;source&gt;&lt;/source&gt;&lt;br /&gt;
&lt;br /&gt;
You must specify the source drive, the destination drive, and either the rk (recovery key) or the rp (recovery password) switch, along with the path to the recovery key or the recovery password. Here are two examples of how to use this utility:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;repair-bde c: d: -rk e:\recovery.bek&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;repair-bde c: d: -rp 111111-111111-111111-111111-111111-111111&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;9: Tasklist&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The tasklist command is designed to provide information about the tasks that are running on a Windows 7 system. At its most basic, you can enter the following command:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;tasklist&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The tasklist command has numerous optional switches, but there are a couple I want to mention. One is the -m switch, which causes tasklist to display all the DLL modules associated with a task. The other is the -svc switch, which lists the services that support each task. Here’s how they look:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;tasklist -m&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;tasklist -svc&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;10: Taskkill&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The taskkill command terminates a task, either by name (which is referred to as the image name) or by process ID. The syntax for this command is simple. You must follow the taskkill command with -pid (process ID) or -im (image name) and the name or process ID of the task that you want to terminate. Here are two examples of how this command works:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;taskkill -pid 4104&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;taskkill -im iexplore.exe&lt;/span&gt;&lt;/b&gt;&lt;/destination&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/4075371317355120457/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/windows7-commands-for-system-administrator.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/4075371317355120457'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/4075371317355120457'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/windows7-commands-for-system-administrator.html' title='Windows 7 Commands Every Administrator Should Know'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ3NmvYlSgizKJoQ5G0TGCBFmuy6AQiaomqZcUWIqziCBGJ1yCLWuzVdc-M4b9eiBlS1L-Ti-ku-1-PFlhz1rLIwcJSPU1JZytdepchVTcp_m0Beei_7Nz7Hr4w9wWjiQFtVN_7I33eqI/s72-c/windows7logo-580-75.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-2614970645320716001</id><published>2013-02-23T14:13:00.000+00:00</published><updated>2013-02-23T14:13:23.892+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hotspot"/><category scheme="http://www.blogger.com/atom/ns#" term="Networking"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtual Router Plus"/><category scheme="http://www.blogger.com/atom/ns#" term="Wi-Fi"/><title type='text'>Turn Windows 8 PC into Wi-Fi Hot Spot</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqYQ5Iumysv4RUzlu13RCfLoR_MVqI5nSjVM2mWSPev_Wm9PIs_dteU6DqtKLEQBUdgLWUCmDrYVnaXPtWGoYs5Aga6HW2ppkKHasU7LEQqH6caTe8-CMCseNwzQSS4FgZ39F-IDdM5fo/s1600/VRP.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqYQ5Iumysv4RUzlu13RCfLoR_MVqI5nSjVM2mWSPev_Wm9PIs_dteU6DqtKLEQBUdgLWUCmDrYVnaXPtWGoYs5Aga6HW2ppkKHasU7LEQqH6caTe8-CMCseNwzQSS4FgZ39F-IDdM5fo/s320/VRP.png&quot; /&gt;&lt;/a&gt;In Windows 8, Microsoft &lt;a href=&quot;http://windows.microsoft.com/en-US/windows-8/whats-new-in-networking&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;quietly removed&lt;/a&gt; a useful networking feature: ad-hoc networks.&lt;br /&gt;
In Windows 7 (and previous OSes), the tool could turn your PC into a Wi-Fi hot spot, allowing it to share its Ethernet or other Internet connection with other devices by broadcasting its own network.&lt;br /&gt;
&lt;br /&gt;
So, if you paid for Internet access at a cafe, or you&#39;re at work, and want to share your PC&#39;s Internet with your phone or tablet, this feature would let you do that.&lt;br /&gt;
&lt;br /&gt;
It is very possible to do this in Windows 8, but the built-in method requires fiddling with the command prompt. And for some of us, walking into that black abyss is daunting.&lt;br /&gt;
&lt;br /&gt;
Instead, check out &lt;a href=&quot;http://www.virtualrouterplus.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Virtual Router Plus&lt;/a&gt;. It&#39;s a free, open-source program that does the geek work for you, allowing you to quickly fire up an ad-hoc network whenever you need one.&lt;br /&gt;
&lt;br /&gt;
Once you&#39;ve downloaded the file, extract it, and launch the VirtualRouterPlus file within that folder. There&#39;s no real installation here -- the program will simply launch.&lt;br /&gt;
&lt;br /&gt;
At this point, setup is easy. Enter a name for your network, then choose a secure password with at least eight characters. Finally, choose the connection you want to share (there will most likely only be one choice), and click Start.&lt;br /&gt;
&lt;br /&gt;
To test it out, grab your phone or tablet and connect to your newly created Wi-Fi network. If it doesn&#39;t show up, stop the connection on your computer, and hit Start again.&lt;br /&gt;
&lt;br /&gt;
Also remember that your computer needs to stay awake and running to keep its ad-hoc network alive. So, tweak your power settings if need be.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/2614970645320716001/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/turn-windows-8-pc-into-wi-fi-hot-spot.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/2614970645320716001'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/2614970645320716001'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/turn-windows-8-pc-into-wi-fi-hot-spot.html' title='Turn Windows 8 PC into Wi-Fi Hot Spot'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqYQ5Iumysv4RUzlu13RCfLoR_MVqI5nSjVM2mWSPev_Wm9PIs_dteU6DqtKLEQBUdgLWUCmDrYVnaXPtWGoYs5Aga6HW2ppkKHasU7LEQqH6caTe8-CMCseNwzQSS4FgZ39F-IDdM5fo/s72-c/VRP.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-6985864010692057789</id><published>2013-02-23T12:00:00.003+00:00</published><updated>2013-02-23T12:00:45.358+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="LulzSec Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Lulzsec Leader"/><category scheme="http://www.blogger.com/atom/ns#" term="Sabu"/><title type='text'>LulzSec Hacker Sabu’s Sentencing Postponed </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip85uEiV6HnE2NBQxNXfWJpxm28Jo8R_O55OJxwIb28V_g90cW5CpONa8vP6cN97xhWz1PAjOqUUems0Onua9OVVsIFJ1_2aPXGtt-tOPL3wCpCbxJAq0vKAPZ119JdxKV9W7_fA-fPMI/s1600/LulzSec-Hacker-Sabu-s-Sentencing-Postponed-Again-No-Reason-Provided.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;161&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip85uEiV6HnE2NBQxNXfWJpxm28Jo8R_O55OJxwIb28V_g90cW5CpONa8vP6cN97xhWz1PAjOqUUems0Onua9OVVsIFJ1_2aPXGtt-tOPL3wCpCbxJAq0vKAPZ119JdxKV9W7_fA-fPMI/s200/LulzSec-Hacker-Sabu-s-Sentencing-Postponed-Again-No-Reason-Provided.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;The sentencing of Hector Xavier Monsegur – better known as Sabu, the leader of the infamous LulzSec hacker collective – has been postponed once again without any explanation.&lt;br /&gt;
&lt;br /&gt;
According to &lt;a href=&quot;http://www.guardian.co.uk/technology/2013/feb/22/lulzsec-sabu-sentencing-monsegur-postponed&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;The Guardian&lt;/a&gt;, Monsegur was scheduled to appear at a Manhattan federal court on Friday where he should have been sentenced for 10 counts of hacking, one count of identity theft and one count of bank fraud.&lt;br /&gt;
&lt;br /&gt;
This is not the first time when the hacker’s sentencing is postponed. Back in August, 2012, authorities requested a six-month adjournment because Sabu was still cooperating with the government.&lt;br /&gt;
&lt;br /&gt;
Cooperation with the government is what made Monsegur become the symbol of treason among hacktivists. In March 2012, the alleged members of the LulzSec group were arrested after being ratted out by Sabu.&lt;br /&gt;
&lt;br /&gt;
He was first arrested in June 2011, but the FBI released him in exchange for his assistance in apprehending other hackers.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/6985864010692057789/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/lulzsec-hacker-sabu-sentencing-postponed.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/6985864010692057789'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/6985864010692057789'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/lulzsec-hacker-sabu-sentencing-postponed.html' title='LulzSec Hacker Sabu’s Sentencing Postponed '/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip85uEiV6HnE2NBQxNXfWJpxm28Jo8R_O55OJxwIb28V_g90cW5CpONa8vP6cN97xhWz1PAjOqUUems0Onua9OVVsIFJ1_2aPXGtt-tOPL3wCpCbxJAq0vKAPZ119JdxKV9W7_fA-fPMI/s72-c/LulzSec-Hacker-Sabu-s-Sentencing-Postponed-Again-No-Reason-Provided.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-1175878184064419166</id><published>2013-02-23T11:30:00.000+00:00</published><updated>2013-02-23T11:30:44.644+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cybercrime"/><category scheme="http://www.blogger.com/atom/ns#" term="Deface"/><category scheme="http://www.blogger.com/atom/ns#" term="Government site"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Indian"/><title type='text'>Pakistani Cyber Army Defaces 7 Indian Government Website</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMMiSyJXUJd_KUXFSUEmmjISAcJbGjjQWhHUTsyg5ccQCcXyhF3BWXXeueZ7buSeWmjgzu1FPKkyf5ly_vY0Gqr9xfjgagal6ow21GmhG9TEbZIrzPiIOkeoeAFnLxovfkgDZQ8VcWv3s/s1600/PCA-Pakistan-cyber-army.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMMiSyJXUJd_KUXFSUEmmjISAcJbGjjQWhHUTsyg5ccQCcXyhF3BWXXeueZ7buSeWmjgzu1FPKkyf5ly_vY0Gqr9xfjgagal6ow21GmhG9TEbZIrzPiIOkeoeAFnLxovfkgDZQ8VcWv3s/s1600/PCA-Pakistan-cyber-army.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Hackers of the Pakistan Cyber Army (PCA) have breached and defaced 7 websites owned by the Indian government.&lt;br /&gt;
&lt;br /&gt;
The &lt;a href=&quot;http://pastebin.com/D28kck8X&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;affected websites&lt;/a&gt; are the ones of the Bihar Tourism from Ministry of Tourism India (bihartourism.gov.in), Mitigating Poverty in Western Rajasthan (mpowerraj.gov.in), the Directorate of Medical Education of the Government of Kerala (nurses.kerala.gov.in), the Salary Revision Commission of Government of Kerala (src.kerala.gov.in).&lt;br /&gt;
&lt;br /&gt;
Other victims are the Customs, Excise &amp;amp; Service Tax Appellate Tribunal in New Delhi (cdrcestat.gov.in), the Works Information &amp;amp; Monitoring System (pwddelhi.gov.in) and the Society for Applied Microwave Electronics Engineering &amp;amp; Research (sameer.gov.in)&lt;br /&gt;
&lt;br /&gt;
The hack comes in response to the attacks launched by Indian hackers against Pakistani websites. According to the deface message. &lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;Here u g0 KiDs! Indian Government Servers Own3D! Hello GaY HinD People! Now Where’s SecuritY? ;) Listen U Fucked Up Indishell Kids! We Were Trying To Be in Peace! BuT We Don’t Think U Want It to Be Like That Anymore! So Here comes The Fuck From Us. &lt;br /&gt;
&lt;br /&gt;
U abused All Pakistanis ( Which Includes Our Parents as Well )..I Had Told U AlreadY We have access to more than 50% of Indian GOV servers! BuT U ThoughT We MighT Be Kidding &amp;amp; U KepT Trying ur Lame ShiTs on .PK siTeS! When I see ur lame ShiTTy defaces on .PK SiTeS, It Drives me Real CrazY..Shame on U kids! :D&lt;br /&gt;
&lt;br /&gt;
I Also Told U noT To Hack .PK Otherwise U will see Zone-h Full Of StarWhite Indian FLAG :D..Now Is The Time For Doing ThaT ShiT! In Other Words! We have Done this ShiT..&lt;/blockquote&gt;At the time of writing, three of the websites were restored, two of them were still defaced, while the last two were taken offline altogether.&lt;br /&gt;
&lt;br /&gt;
It appears the site’s administrators haven’t patched the vulnerabilities, since the sameer.gov.in has been defaced for the second time.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/1175878184064419166/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/hackers-defaces-7-indian-government-sites.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/1175878184064419166'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/1175878184064419166'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/hackers-defaces-7-indian-government-sites.html' title='Pakistani Cyber Army Defaces 7 Indian Government Website'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMMiSyJXUJd_KUXFSUEmmjISAcJbGjjQWhHUTsyg5ccQCcXyhF3BWXXeueZ7buSeWmjgzu1FPKkyf5ly_vY0Gqr9xfjgagal6ow21GmhG9TEbZIrzPiIOkeoeAFnLxovfkgDZQ8VcWv3s/s72-c/PCA-Pakistan-cyber-army.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-553279857579208168</id><published>2013-02-19T13:40:00.000+00:00</published><updated>2013-02-20T14:56:42.511+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ethical Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Books"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Testing"/><title type='text'>Hacking Books for Serious Beginners Learning The Art of Hacking</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Learning to hack, is a vague word that has been misunderstood by so many. You see people buzzing around with phrases like &quot;Teach me how to hack facebook&quot;, &quot;I need to hack my girlfriends gmail account&quot; bla bla bla, not having the slightest clue about what they are taking about. &lt;br /&gt;
&lt;br /&gt;
Like I tell folks close to me, hacking involves so many things, and it requires an open minded individual with abundance of patience to succeed in this field, and believe when I say the road is not always pleasant. It&#39;s not always about using that point and click tool to &lt;b&gt;ddos a web server&lt;/b&gt; or &lt;b&gt;hijacking a user session&lt;/b&gt; or even installing &lt;b&gt;backtrack&lt;/b&gt; thinking you&#39;ve setup hacker&#39;s lab like any other &lt;strike&gt;hacker&lt;/strike&gt;.&lt;br /&gt;
&lt;br /&gt;
A hacker is a know all specie, an addicted reader with a logical frame of mind. I present this books that will help any motivated individual who is ready to explore the world of hacking.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;&lt;a href=&quot;http://amzn.to/W1OsNW&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy&lt;/a&gt;&lt;/h2&gt;&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://amzn.to/W1OsNW&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgspJPC-cdF8f6Pb_vjRB9CE6CMZzCemBioNNc3py7_ohX_ZXw3j8k5iDFqVHwgMnxJbAG7wL3dhtj4sQ59XlSA4MrCDzxzRMIwjg3fwqGz-FbuNpm7hfWqTyI_fr0XvirmDGb4A-fDCPY/s320/basics-of-hacking-pen-test.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;&lt;a href=&quot;http://amzn.to/YzJS5O&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Hacking: The Art of Exploitation, 2nd Edition&lt;/a&gt;&lt;/h2&gt;&lt;a href=&quot;http://amzn.to/YzJS5O&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgORr2jbwrLSQ2uzoxLpgHuChuUrXJctKznXd7nOnNOE-lG1ae_by8bQEKsPEEh5Eo_CI7wfEZOdVhmnCnQjhIjIOj8a5whIr9c7vR7LNZly4zFr5IaPEn0EVRhCU9AuGNGuSYvLr3ZTek/s320/art-of-exploitation.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.&lt;br /&gt;
&lt;br /&gt;
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker&#39;s perspective.&lt;br /&gt;
&lt;br /&gt;
The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book&#39;s examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. &lt;br /&gt;
&lt;br /&gt;
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don&#39;t already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;&lt;a href=&quot;http://amzn.to/YmvFqM&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Hacking Exposed 7: Network Security Secrets &amp;amp; Solutions, Seventh Edition&lt;/a&gt;&lt;/h2&gt;&lt;a href=&quot;http://amzn.to/YmvFqM&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOQb2W-gf3sjx1XIe3hcF4D61tpymqs9Xwb6jQRypV2x8ogpG4KnVyhrj7Kd55koIaH4eLu0ca7lSzz4FEvHDRJPjZfjZfqz3w-KRjO9RNuOUjm6Djiif3sSRm4rhByebO803mwrGL41c/s320/51uRPyO+neL._BO2,204,203,200_PIsitb-sticker-arrow-click,TopRight,35,-76_AA300_SH20_OU01_.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
The first version of Hacking Exposed came out in 1999. The book was a game changer that made penetration and vulnerability testing available to the masses. Needless to say that in the ensuing 13 years, there has been a huge amount of change in the world of information security.&lt;br /&gt;
&lt;br /&gt;
With the release of Hacking Exposed 7: Network Security Secrets &amp;amp; Solutions, authors Stuart McClure, Joel Scambray and George Kurtz (along with over 10 contributing authors) provide an up to date version to the original classic. The book builds on the fundamentals of the first edition, and does include essentials of hacking on topics such as enumeration, foot printing, scanning, operating system detection and a lot more.&lt;br /&gt;
&lt;br /&gt;
The latest edition gets into current threats and details the new menace of APT (advanced persistent threats), embedded hacking, database hacking, and significant coverage of mobile devices.&lt;br /&gt;
&lt;br /&gt;
Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets &amp;amp; Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.”&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/553279857579208168/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/hacking-books-for-serious-beginners.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/553279857579208168'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/553279857579208168'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/hacking-books-for-serious-beginners.html' title='Hacking Books for Serious Beginners Learning The Art of Hacking'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgspJPC-cdF8f6Pb_vjRB9CE6CMZzCemBioNNc3py7_ohX_ZXw3j8k5iDFqVHwgMnxJbAG7wL3dhtj4sQ59XlSA4MrCDzxzRMIwjg3fwqGz-FbuNpm7hfWqTyI_fr0XvirmDGb4A-fDCPY/s72-c/basics-of-hacking-pen-test.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-5960743773636321997</id><published>2013-02-14T13:23:00.000+00:00</published><updated>2013-02-14T13:23:37.048+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Apple"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Iphone"/><category scheme="http://www.blogger.com/atom/ns#" term="How-tos"/><category scheme="http://www.blogger.com/atom/ns#" term="IOS 6.1"/><category scheme="http://www.blogger.com/atom/ns#" term="iPhone"/><title type='text'>How to Bypass the Lockcode Screen on iOS 6.1 and Use Anyone’s iPhone</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgqJDrdn-Y7_0gVts7uA7PeZu0OSLLHaIGfao7uCiLk_-UpOW3WQ4jp-4L9Hj1satumLO51OktIofbSKM9htQmTGPQsjxmxKh-IvJ0EN8bsEsm6xgDquPZr-4zyZ-lMv9yyEuAMp3sQ_0/s1600/iphone-ios-6.1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgqJDrdn-Y7_0gVts7uA7PeZu0OSLLHaIGfao7uCiLk_-UpOW3WQ4jp-4L9Hj1satumLO51OktIofbSKM9htQmTGPQsjxmxKh-IvJ0EN8bsEsm6xgDquPZr-4zyZ-lMv9yyEuAMp3sQ_0/s320/iphone-ios-6.1.jpg&quot; /&gt;&lt;/a&gt;Apple has had a few problems with its latest iPhone and iPad software update.&lt;br /&gt;
&lt;br /&gt;
Released just last month, iOS 6.1 was meant to be a relatively significant update bringing enhanced Siri capabilities, LTE support to more countries, and more iTunes Match features.&lt;br /&gt;
&lt;br /&gt;
But it seems as if the update is doing more harm than good.&lt;br /&gt;
&lt;br /&gt;
The Verge reports that a new bug, &quot;lets anyone bypass your iPhone password lock and access your phone app, view or modify contacts, check your voicemail, and look through your photos (by attempting to add a photo to a contact).&quot;&lt;br /&gt;
&lt;br /&gt;
The instructions are pretty simple. First you have to pretend to turn the phone off, then make an aborted emergency call, then a quick bit of off button and cancel pressing. That boots you into the full phone app where you can pretty much call or message anyone you like, or edit phone contacts.&lt;br /&gt;
&lt;br /&gt;
Besides allowing anyone access to your phone, Apple&#39;s latest software update also drains your battery much faster than usual, and Microsoft recommended users not upgrade because of an Exchange bug, which causes iPhones to continuously loop when syncing a recurring calendar meeting invitation to Microsoft Exchange.&lt;br /&gt;
&lt;br /&gt;
Apple has not issued a statement on this latest bug but here is a video of it in action:&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;360&quot; src=&quot;http://www.youtube.com/embed/9htICzd6A7o?feature=player_embedded&quot; width=&quot;595&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/5960743773636321997/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/how-to-bypass-lockcode-screen-on-ios-61.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/5960743773636321997'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/5960743773636321997'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/how-to-bypass-lockcode-screen-on-ios-61.html' title='How to Bypass the Lockcode Screen on iOS 6.1 and Use Anyone’s iPhone'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgqJDrdn-Y7_0gVts7uA7PeZu0OSLLHaIGfao7uCiLk_-UpOW3WQ4jp-4L9Hj1satumLO51OktIofbSKM9htQmTGPQsjxmxKh-IvJ0EN8bsEsm6xgDquPZr-4zyZ-lMv9yyEuAMp3sQ_0/s72-c/iphone-ios-6.1.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-2737562510714282118</id><published>2013-02-12T16:58:00.000+00:00</published><updated>2013-02-12T16:58:41.666+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Storage"/><category scheme="http://www.blogger.com/atom/ns#" term="Google Drive"/><title type='text'>Google Drive can now host your Static Webpage</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglMU9Xkt8p6_PiqZgw_o0iByS92btfxtmJrvsAmKQkDWBl0HIduaRBRWwY9YQkTNs8lh18WOugumAvnFq5wxpS_o1gImg2LKytSvGMsyrBUOUc0GMxJ1WE7k3LydCb317h7_POJtJjVT8/s1600/google_drive.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglMU9Xkt8p6_PiqZgw_o0iByS92btfxtmJrvsAmKQkDWBl0HIduaRBRWwY9YQkTNs8lh18WOugumAvnFq5wxpS_o1gImg2LKytSvGMsyrBUOUc0GMxJ1WE7k3LydCb317h7_POJtJjVT8/s320/google_drive.png&quot; height=&quot;250&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Google Drive has turned on a feature that lets the cloud storage service become a limited web host.&lt;br /&gt;
&lt;br /&gt;
It&#39;s long been possible to allow others to access data stored in the service, which can produce a URL for files. The new tweak means it&#39;s possible to ask for a “Preview” of an HTML file stored in Google Drive. Doing so renders the page and produces a URL that, once copied and pasted, can be used by anyone to access the page.&lt;br /&gt;
&lt;br /&gt;
The feature is sophisticated enough that a quick bit of coding produced this page, with a lengthy JavaScript and graphics stored in the same Google Drive folder appearing just as the code intends. We&#39;ve not tested the promised ability to handle CSS.&lt;br /&gt;
&lt;br /&gt;
The Cloud Storage provider&#39;s have not said how far the service will scale, but it seems unlikely that will be much of a problem given this is hardly a heavyweight hosting platform. Google&#39;s not alone in offering a simple service: Amazon Web Services allows users of its simple storage service to serve static HTML from the “buckets” it uses to contain files.&lt;br /&gt;
&lt;br /&gt;
Amazon charges for the privilege of doing so. Google does not, unless one uses paid versions of its Apps.&lt;br /&gt;
&lt;br /&gt;
In these days of widget-populated free blogging platforms and Facebook it is hard to imagine a stampede towards this new service. Developers, however, may appreciate the extra collaborative opportunities it presents.</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/2737562510714282118/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/hosting-web-pages-with-google-drive.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/2737562510714282118'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/2737562510714282118'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/hosting-web-pages-with-google-drive.html' title='Google Drive can now host your Static Webpage'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglMU9Xkt8p6_PiqZgw_o0iByS92btfxtmJrvsAmKQkDWBl0HIduaRBRWwY9YQkTNs8lh18WOugumAvnFq5wxpS_o1gImg2LKytSvGMsyrBUOUc0GMxJ1WE7k3LydCb317h7_POJtJjVT8/s72-c/google_drive.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-8896276711763965113</id><published>2013-02-09T17:56:00.000+00:00</published><updated>2013-02-09T17:56:52.174+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Design"/><category scheme="http://www.blogger.com/atom/ns#" term="Thinqtek"/><title type='text'>Completely Hack Facebook News Feed Appearance</title><content type='html'>Are you the type that&#39;s not scared of trying out new stuffs? Do you think Facebook design is becoming too boring and not challenging the likes of Google Plus or Pinterest? Roll up your sleeves. Wonderful designers at Thinktek Studio just rolled out a new extension that alters some significant part of facebook. It&#39;s tagged &lt;a href=&quot;http://thinqtek.com/newgenbook/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;NewGenBook &lt;/a&gt;&#39;&lt;i&gt;Facebook the way it should&#39;ve been&lt;/i&gt;&#39;.&lt;br /&gt;
&lt;br /&gt;
Once you have the extension installed and visit Facebook, you&#39;ll notice a considerable amount of change in the newsfeed. The top right menu where you have access to logout, change privacy settings and advertise have been moved to the left hand side close to the logo but the layout still maintains the same 3 column. &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQIYnxn125BGNJJhr5jrQpFubhX7ULrjqE-gyO19TfhU8fZjPrPs4Kg6_Cs3itFv3J7sv3Vj5FUmmvyNY7TRrvw__2TPZrC1vXoElR0HFCSJd2aUjb3jhSo8MzGB5fmqvTCuKCiYcVjjo/s1600/Untitled-1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQIYnxn125BGNJJhr5jrQpFubhX7ULrjqE-gyO19TfhU8fZjPrPs4Kg6_Cs3itFv3J7sv3Vj5FUmmvyNY7TRrvw__2TPZrC1vXoElR0HFCSJd2aUjb3jhSo8MzGB5fmqvTCuKCiYcVjjo/s1600/Untitled-1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
This extension is available for all major browsers (Chrome, Firefox, Safari &amp;amp; Opera) except Internet Explorer and plan to release Iphone version is on the way, according to the developer.&lt;br /&gt;
&lt;br /&gt;
You must note that this extension adds nothing to Facebook&#39;s functionality. It only re-arranges certain items and changed the overall look, the chat box design was also altered. The only part of the site that remains untouched so far is the fan page and timeline i.e. profile.&lt;br /&gt;
&lt;br /&gt;
NB: If you noticed any discomfort after installing this extension while browsing you can remove and restore previous experience.</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/8896276711763965113/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/hack-facebook-design.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/8896276711763965113'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/8896276711763965113'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/hack-facebook-design.html' title='Completely Hack Facebook News Feed Appearance'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQIYnxn125BGNJJhr5jrQpFubhX7ULrjqE-gyO19TfhU8fZjPrPs4Kg6_Cs3itFv3J7sv3Vj5FUmmvyNY7TRrvw__2TPZrC1vXoElR0HFCSJd2aUjb3jhSo8MzGB5fmqvTCuKCiYcVjjo/s72-c/Untitled-1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-3729824918838832660</id><published>2013-02-05T18:07:00.001+00:00</published><updated>2013-02-05T18:07:23.568+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Evasi0n"/><category scheme="http://www.blogger.com/atom/ns#" term="iPhone 5 Jailbreak"/><category scheme="http://www.blogger.com/atom/ns#" term="Jailbreak"/><category scheme="http://www.blogger.com/atom/ns#" term="Jailbreak IOS 6.1"/><title type='text'>How to Jailbreak iOS 6.1 with Evasi0n 1.0 – OS X, Including iPhone 5</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiFafOv2DXhcrV7r2onqhgcySnNS3_0xr27SkOTdYZNcj-wGNBcN_AuGuZmEFWGC15ZzCHMvtiFir_NEvMT2nejVKrqWh3-Ea3nDJdJF9GLwCV5C1pGIdSp5m2PTKWtmh3MFxbVbHRW84/s1600/How-to-Jailbreak-iOS-6-1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiFafOv2DXhcrV7r2onqhgcySnNS3_0xr27SkOTdYZNcj-wGNBcN_AuGuZmEFWGC15ZzCHMvtiFir_NEvMT2nejVKrqWh3-Ea3nDJdJF9GLwCV5C1pGIdSp5m2PTKWtmh3MFxbVbHRW84/s320/How-to-Jailbreak-iOS-6-1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;a href=&quot;http://evasi0n.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Evasi0n&lt;/a&gt; &lt;/b&gt;is finally here to enable all iDevice owners to break the shackles and install mods, themes and tweaks on their iOS 6 iPhones, iPads, and iPod touch players. This guide here will show you how to do that.&lt;br /&gt;
&lt;br /&gt;
Before we begin, we need to stress that Apple doesn’t condone jailbreaks. In the offset chance that something goes wrong with your device in the future, the company may refuse service on the count of your hacking it.&lt;br /&gt;
&lt;br /&gt;
With that out of the way, the team responsible for Evasi0n (the evad3rs) also has some important notes for would-be jailbreakers.&lt;br /&gt;
&lt;br /&gt;
“Backup your device using iTunes (or iCloud) before using evasi0n. If something breaks, you&#39;ll always be able to recover your data.&lt;br /&gt;
&lt;br /&gt;
Here are some important notes from Evasi0n’s release notes:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Those who use backup passwords in iTunes must disable them for now. After doing so, iTunes makes a brand new backup. Please wait for that backup to complete before proceeding! Feel free to re-enable your backup password after jailbreaking.&lt;br /&gt;
&lt;br /&gt;
Please disable the lock passcode of your iOS device before using evasi0n. It can cause issues.&lt;br /&gt;
&lt;br /&gt;
Avoid all iOS and iTunes related tasks until evasi0n is complete. Why not just enjoy a brief break from the computer to stretch your legs?&lt;br /&gt;
&lt;br /&gt;
If the process gets stuck somewhere, it&#39;s safe to restart the program, reboot the device (if necessary by holding down Power and Home until it shuts down), and rerun the process.”&lt;/blockquote&gt;
With that out of the way, here are the actual steps required to jailbreak an iPhone, iPod touch or iPad running iOS 6.0 through iOS 6.1 using Evasi0n.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;How To Jailbreak&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4381h-67QzuxS5mArQi9O5ErifVrMB_2kf-ZBEJW84DImXuZZhVEmbeTsANHrkqi1rDLTqjef-EJ8bq12gj1oDNHP3gH6RsLJj1Ljw3-7wcdXZ8LTpnUYSj8WIln4rv5I84NOVrGcMXw/s1600/jailbreak1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4381h-67QzuxS5mArQi9O5ErifVrMB_2kf-ZBEJW84DImXuZZhVEmbeTsANHrkqi1rDLTqjef-EJ8bq12gj1oDNHP3gH6RsLJj1Ljw3-7wcdXZ8LTpnUYSj8WIln4rv5I84NOVrGcMXw/s1600/jailbreak1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Step 1: Once you’d downloaded the &lt;a href=&quot;http://evasi0n.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Evasi0n tool&lt;/a&gt;, drag it onto your desktop. Open it and plug in the iOS device you wish to jailbreak.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwwb4Ffh95tFzFewq7ZMffYwW5Z0MBmSwoXDY_fTWkjzoUCWfZiRLTqfP3VlJxJX7poTddlIr755mNIIWIwPD1eundTmeMGHjpK1LpSd_JwfyuTVvnvXFxdddtdXARSXj5VNuQz0Ls4YM/s1600/jailbreak2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwwb4Ffh95tFzFewq7ZMffYwW5Z0MBmSwoXDY_fTWkjzoUCWfZiRLTqfP3VlJxJX7poTddlIr755mNIIWIwPD1eundTmeMGHjpK1LpSd_JwfyuTVvnvXFxdddtdXARSXj5VNuQz0Ls4YM/s1600/jailbreak2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Step 2: Evasi0n will recognize your device, and then it’s safe to click the “Jailbreak” button. Sit back and relax while Evasi0n does its thing.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpZbNHocmufrniAi-J425IbigXGJ3RoG9hoy60BsxW2JEqNzvDPgwQLrQgy6dDNe36-vGHINiaa7lcTCrI14fXQjxJSLoTkf8in_T2igyQNemyDe8uW_pUVVI9wC1Y7Xu8u78TFl-usqg/s1600/jailbreak3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpZbNHocmufrniAi-J425IbigXGJ3RoG9hoy60BsxW2JEqNzvDPgwQLrQgy6dDNe36-vGHINiaa7lcTCrI14fXQjxJSLoTkf8in_T2igyQNemyDe8uW_pUVVI9wC1Y7Xu8u78TFl-usqg/s1600/jailbreak3.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Step 3: The tool will do its magic, and along the way it will ask you to unlock your device and tap a new “Jailbreak” icon that has been miraculously added to your Home screen.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuvWXoyplCUhWnfQ2dfN_rbNzQP8BPoOt5c-v69Rh0SFVyETu3-wyaesY0LUMC5oe-JFz0zqE_n4-VcoJEVKWzXGMLLG-I-vceFFDQSOZ7ALP-bdp3jA7lBXBO_hYMHp6Pd2WF1OEOem4/s1600/jailbreak4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuvWXoyplCUhWnfQ2dfN_rbNzQP8BPoOt5c-v69Rh0SFVyETu3-wyaesY0LUMC5oe-JFz0zqE_n4-VcoJEVKWzXGMLLG-I-vceFFDQSOZ7ALP-bdp3jA7lBXBO_hYMHp6Pd2WF1OEOem4/s1600/jailbreak4.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Step 4: Let Evasi0n install the rest of the jailbreak, and your device will reboot. Cydia should now be sitting there next to your other app icons. This is really one of easiest jailbreaks ever.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Disclaimer&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;Prohackingtricks provides this tutorial solely for informational purposes. We take no responsibility should your device malfunction as a result of using Evasi0n.&lt;/i&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/3729824918838832660/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/how-to-jailbreak-ios-device-with-evasion-in-5-minutes.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/3729824918838832660'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/3729824918838832660'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/how-to-jailbreak-ios-device-with-evasion-in-5-minutes.html' title='How to Jailbreak iOS 6.1 with Evasi0n 1.0 – OS X, Including iPhone 5'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiFafOv2DXhcrV7r2onqhgcySnNS3_0xr27SkOTdYZNcj-wGNBcN_AuGuZmEFWGC15ZzCHMvtiFir_NEvMT2nejVKrqWh3-Ea3nDJdJF9GLwCV5C1pGIdSp5m2PTKWtmh3MFxbVbHRW84/s72-c/How-to-Jailbreak-iOS-6-1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-1625837248833384024</id><published>2013-02-04T15:30:00.000+00:00</published><updated>2013-02-04T15:30:08.563+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Development"/><category scheme="http://www.blogger.com/atom/ns#" term="Open Source"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><category scheme="http://www.blogger.com/atom/ns#" term="Wine"/><title type='text'>Wine Making It Possible to Run Windows Apps on Android Platform</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVjg7jccQKP7-9T8gnmom9J1ITE2a5rclqtJ9ARof8nLlhtlf4v2ClE6loOvLI7xu1rZudZmHbZmG66mkChNkvvioiPZGNqXYpdmzVFKZFqxm05iay7MvgaPaXg8IdQMj8bc1LorQ_ZmQ/s1600/wine-android.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVjg7jccQKP7-9T8gnmom9J1ITE2a5rclqtJ9ARof8nLlhtlf4v2ClE6loOvLI7xu1rZudZmHbZmG66mkChNkvvioiPZGNqXYpdmzVFKZFqxm05iay7MvgaPaXg8IdQMj8bc1LorQ_ZmQ/s320/wine-android.jpg&quot; height=&quot;320&quot; width=&quot;253&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The man behind Wine, the not-an-emulator which runs Windows applications on Linux, has been showing off an early version for those desperate to run MS Office on their Android device.&lt;br /&gt;
&lt;br /&gt;
It was, according to &lt;a href=&quot;http://www.phoronix.com/scan.php?page=news_item&amp;amp;px=MTI5MjA&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Phoronix&lt;/a&gt; - who witnessed the demo - &quot;horrendously slow&quot;, and running on a Mac which was itself running an Android emulator. Nevertheless, he added, the demonstration at the FOSDEM open source meeting in Brussels did show Windows applications running on an Android platform, which is technically impressive even if difficult to justify.&lt;br /&gt;
&lt;br /&gt;
This is a step forward for Wine (originally an acronym for &quot;Wine Is Not an Emulator&quot;) as it would extend its capability of running Windows applications on other operating systems. At the moment, it can load them on Linux, Mac OSX, &amp;amp; BSD. It achieves this by real-time translation of Windows API calls into POSIX calls.&lt;br /&gt;
&lt;br /&gt;
Wine is funded largely by CodeWeavers, which makes money selling a supported version branded CrossOver, though Google has been known to send money Wine&#39;s way and other companies have been involved when getting their Windows applications ported to Linux.&lt;br /&gt;
&lt;br /&gt;
The idea of Wine isn&#39;t to provide a Windows desktop, but to support the single killer application which is keeping someone from switching... of course, the problem is that everyone has a different reason not to switch. If Android proves popular on tablets then Windows apps could be similarly sticky, and CodeWeavers could make money selling CrossOver for Android.&lt;br /&gt;
&lt;br /&gt;
But that&#39;s for the future. What we have now is a very flaky demo which proves it can be done. While CodeWeavers sponsors some staff, the majority of Wine is the usual open-source mix of hobbyists and fanatics (&lt;a href=&quot;http://wiki.winehq.org/HelpingWine&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;sign up here&lt;/a&gt;), so future development will depend on that community, as well as the commercial potential of running Windows apps on Android devices.</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/1625837248833384024/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/run-windows-apps-on-android-using-wine.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/1625837248833384024'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/1625837248833384024'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/run-windows-apps-on-android-using-wine.html' title='Wine Making It Possible to Run Windows Apps on Android Platform'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVjg7jccQKP7-9T8gnmom9J1ITE2a5rclqtJ9ARof8nLlhtlf4v2ClE6loOvLI7xu1rZudZmHbZmG66mkChNkvvioiPZGNqXYpdmzVFKZFqxm05iay7MvgaPaXg8IdQMj8bc1LorQ_ZmQ/s72-c/wine-android.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-2737712346316730308</id><published>2013-02-04T15:14:00.002+00:00</published><updated>2013-02-04T15:14:18.388+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Download Kernel"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux Kernel"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux Kernel 3.4.29 LTS"/><title type='text'>Linux Kernel 3.4.29 LTS Is Available for Download</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOAmmDXRdv-U9FtjfWndjCoT6DJ459Q0yOM2SRRZRR9dJw7nIuv_QCl0iqEi9oiYZMCbaNtUVtr043J02goHsRkLEZwW-PHbZNOa2DwWdk0-etHZoIXeOzEzTxR5dSr6m4bsR9GOmPO9M/s1600/Linux-Kernel-3-4-29.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOAmmDXRdv-U9FtjfWndjCoT6DJ459Q0yOM2SRRZRR9dJw7nIuv_QCl0iqEi9oiYZMCbaNtUVtr043J02goHsRkLEZwW-PHbZNOa2DwWdk0-etHZoIXeOzEzTxR5dSr6m4bsR9GOmPO9M/s1600/Linux-Kernel-3-4-29.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Linux kernel 3.4.29 introduces a lot of various fixes, as well as driver improvements and improved Arch support.&lt;br /&gt;
&lt;br /&gt;
Greg Kroah-Hartman announced the immediate availability for download of Linux kernel 3.4.29 LTS (long-term support).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Highlights of Linux kernel 3.4.29 LTS:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
• Incorrect strncpy() has been fixed in hidp_setup_hid();&lt;br /&gt;
• A typo in PCIe adapter NULL check has been fixed;&lt;br /&gt;
• DMAR has been disabled for g4x integrated gfx;&lt;br /&gt;
• Pass a proper identity mapping in efi_call_phys_prelog;&lt;br /&gt;
• A fixup for Packard-Bell desktop with ALC880 has been implemented.&lt;br /&gt;
&lt;br /&gt;
A complete list of changes and fixes can be found in the official &lt;a href=&quot;https://lkml.org/lkml/2013/2/3/422&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;mailing list&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
“I&#39;m announcing the release of the 3.4.29 kernel. All users of the 3.4 kernel series should upgrade or risk being turned into pumpkins.”&lt;br /&gt;
&lt;br /&gt;
“The updated 3.4.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-3.4.y and can be browsed at the normal kernel.org git web browser: &lt;a href=&quot;http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git&lt;/a&gt;,” said Greg Kroah-Hartman in the email announcement.&lt;br /&gt;
&lt;br /&gt;
Users of the Linux kernel 3.4.x branch are urged to update to the new version as soon as possible.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;a href=&quot;http://linux.softpedia.com/get/System/Operating-Systems/Kernels/Linux-Kernel-3-x-3022.shtml&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Download Linux kernel 3.4.29&lt;/a&gt;&lt;/i&gt; LTS right now from Softpedia.</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/2737712346316730308/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/download-linux-kernel-3.4.29-LTS.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/2737712346316730308'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/2737712346316730308'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/download-linux-kernel-3.4.29-LTS.html' title='Linux Kernel 3.4.29 LTS Is Available for Download'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOAmmDXRdv-U9FtjfWndjCoT6DJ459Q0yOM2SRRZRR9dJw7nIuv_QCl0iqEi9oiYZMCbaNtUVtr043J02goHsRkLEZwW-PHbZNOa2DwWdk0-etHZoIXeOzEzTxR5dSr6m4bsR9GOmPO9M/s72-c/Linux-Kernel-3-4-29.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-8145724294773944093</id><published>2013-02-04T14:54:00.000+00:00</published><updated>2013-02-04T14:54:57.807+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Data-Leak"/><category scheme="http://www.blogger.com/atom/ns#" term="Government site"/><category scheme="http://www.blogger.com/atom/ns#" term="Hack"/><title type='text'>Anonymous Compromises Alabama Government Site, Details of 4,000 Bankers Exposed</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcM43e4qG0C-S1RdmqrVucLNLJvwxLd6AMbWofZvDYRKpD8JMpNJQzQ0Yw82vDJqwE_7fGUJW0HhczFB_9Msl9L0l81GXtut9g4SKWBuQ_9i8Jogv7uyki8cTmYangdK1NBk5p_AhSPFo/s1600/Anonymous-Hacks-.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Anonymous-Hack&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcM43e4qG0C-S1RdmqrVucLNLJvwxLd6AMbWofZvDYRKpD8JMpNJQzQ0Yw82vDJqwE_7fGUJW0HhczFB_9Msl9L0l81GXtut9g4SKWBuQ_9i8Jogv7uyki8cTmYangdK1NBk5p_AhSPFo/s320/Anonymous-Hacks-.png&quot; height=&quot;320&quot; width=&quot;315&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Anonymous hackers continue Operation Last Resort (OpLastResort). In the latest phase of the campaign, the hacktivists have leaked the details of more than 4,000 bank executives.&lt;br /&gt;
&lt;br /&gt;
It’s interesting that the hackers haven’t used Pastebin or other similar websites to publish the data. Instead, they have hacked the website of the Alabama Criminal Justice Information Center (acjic.alabama.gov) and have posted the information in its “documents” folder under the name “oops-we-did-it-again.”&lt;br /&gt;
&lt;br /&gt;
The file published by &lt;a href=&quot;https://twitter.com/OpLastResort/status/298268672718417921&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Anonymous&lt;/a&gt; contains names, titles, email addresses, physical addresses, fax numbers, mobile phone numbers, login IDs, IP addresses, password hashes, and other details. The information appears to belong to presidents, vice presidents, managing officers, CEOs, SVPs, and others.&lt;br /&gt;
&lt;br /&gt;
ZDNet has &lt;a href=&quot;http://www.zdnet.com/anonymous-posts-over-4000-u-s-bank-executive-credentials-7000010740/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;analyzed&lt;/a&gt; the list of names and has learned that most of them show up as current employees on the banks’ websites.&lt;br /&gt;
&lt;br /&gt;
Reddit users have also studied the leaked information.&lt;br /&gt;
&lt;br /&gt;
“OK, I called a few of them. What must be so problematic for the Federal Reserve is not the information so much as this file was stolen from their computers at all. The ramifications of that kind of loss of control is severe,” one user &lt;a href=&quot;http://www.reddit.com/r/anonymous/comments/17uk52/anonymous_releases_banker_info_from_federal/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;noted&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Others, on the other hand, don’t agree with Anonymous.&lt;br /&gt;
&lt;br /&gt;
“#OpLastResort has shown up out of nowhere to leak the have personal information of a lot of innocent people and should not be regarded as part of &#39;Anonymous&#39;. There is no reason for what they did and they didn&#39;t even attempt to justify or even give meaning to their actions. They are simply destructive,” another user argued.&lt;br /&gt;
&lt;br /&gt;
Operation Last Resort, a campaign that comes in response to the suicide of Aaron Swartz, was initiated around one week ago with a hack which targeted the United States Sentencing Commission (USSC).</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/8145724294773944093/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/anonymous-hacks-government-site-leakes-4000-bankers-details.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/8145724294773944093'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/8145724294773944093'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/anonymous-hacks-government-site-leakes-4000-bankers-details.html' title='Anonymous Compromises Alabama Government Site, Details of 4,000 Bankers Exposed'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcM43e4qG0C-S1RdmqrVucLNLJvwxLd6AMbWofZvDYRKpD8JMpNJQzQ0Yw82vDJqwE_7fGUJW0HhczFB_9Msl9L0l81GXtut9g4SKWBuQ_9i8Jogv7uyki8cTmYangdK1NBk5p_AhSPFo/s72-c/Anonymous-Hacks-.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-2946739272389229387</id><published>2013-02-02T14:16:00.000+00:00</published><updated>2013-02-02T14:16:21.178+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="China"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter hack"/><title type='text'>Twitter Hacked, 250,000 Email and Password Compromised</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDnZgCIEWM42UeCzL-X07dBYUzbOj9ZDa9cMSYz-FkenO3pURqF_NUvPNp8DLad6jtE_xe3icioJ-96-VsPI9HYBTufe5f7Zwo_HQVdFg7xruLkbB2hkQSmvMlWtZ8YsVpYTgEOy_AJRY/s1600/twitter.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDnZgCIEWM42UeCzL-X07dBYUzbOj9ZDa9cMSYz-FkenO3pURqF_NUvPNp8DLad6jtE_xe3icioJ-96-VsPI9HYBTufe5f7Zwo_HQVdFg7xruLkbB2hkQSmvMlWtZ8YsVpYTgEOy_AJRY/s200/twitter.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;If you find that your Twitter password doesn&#39;t work the next time you try to login, you won&#39;t be alone. The service was busy resetting passwords and revoking cookies on Friday, following an online attack that may have leaked the account data of approximately 250,000 users.&lt;br /&gt;
&lt;br /&gt;
&quot;This week, we detected unusual access patterns that led to us identifying unauthorized access attempts to Twitter user data,&quot; Bob Lord, Twitter&#39;s director of information security, writes in a blog &lt;a href=&quot;http://blog.twitter.com/2013/02/keeping-our-users-secure.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;post&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
According to Lord, Twitter was able to shut down the attack within moments of discovering it, but not before the attackers were able to make off with what he calls &quot;limited user information,&quot; including usernames, email addresses, session tokens, and the encrypted and salted versions of passwords.&lt;br /&gt;
&lt;br /&gt;
The encryption on such passwords is generally difficult to crack – but it&#39;s not impossible, particularly if the attacker is familiar with the algorithm used to encrypt them.&lt;br /&gt;
&lt;br /&gt;
As a precaution, Lord says Twitter has reset the passwords of all 250,000 affected accounts – which, he observes, is just &quot;a small percentage&quot; of the more than 140 million Twitter users worldwide.&lt;br /&gt;
&lt;br /&gt;
If yours is one of the accounts involved, you&#39;ll need to enter a new password the next time you login. Lord reminds all Twitter users to choose strong passwords – he recommends 10 or more characters, with a mix of letters, numbers, and symbols – because simpler passwords are easier to guess using brute-force methods. In addition, he recommends against using the same password on multiple sites.&lt;br /&gt;
&lt;br /&gt;
Lord says Twitter&#39;s investigation is ongoing, and that it&#39;s taking the matter extremely seriously, particularly in light of recent attacks experienced by The New York Times and The Wall Street Journal:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;This attack was not the work of amateurs, and we do not believe it was an isolated incident. The attackers were extremely sophisticated, and we believe other companies and organizations have also been recently similarly attacked. For that reason we felt that it was important to publicize this attack while we still gather information, and we are helping government and federal law enforcement in their effort to find and prosecute these attackers to make the Internet safer for all users. &lt;/blockquote&gt;Although the attack took place this week, it seems to have no relationship to the outage that took Twitter offline for several hours on Thursday. On the other hand, however, Lord&#39;s post does make rather cryptic mention of the US Department of Homeland Security&#39;s &lt;a href=&quot;http://www.kb.cert.org/vuls/id/625617&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;recent recommendation&lt;/a&gt; that users disable the Java plug-in in their browsers. He mentions Java twice, in fact.&lt;br /&gt;
&lt;br /&gt;
While it&#39;s true that the Java plug-in contains multiple known vulnerabilities and that numerous security experts have warned that it should be considered unsafe, the connection between Java and the attack Twitter experienced isn&#39;t clear and twitter is yet to respond to our request for clarification.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/2946739272389229387/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/hackers-compromises-250000-twitter-accounts.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/2946739272389229387'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/2946739272389229387'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/02/hackers-compromises-250000-twitter-accounts.html' title='Twitter Hacked, 250,000 Email and Password Compromised'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDnZgCIEWM42UeCzL-X07dBYUzbOj9ZDa9cMSYz-FkenO3pURqF_NUvPNp8DLad6jtE_xe3icioJ-96-VsPI9HYBTufe5f7Zwo_HQVdFg7xruLkbB2hkQSmvMlWtZ8YsVpYTgEOy_AJRY/s72-c/twitter.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-925647982339739736</id><published>2013-01-24T11:19:00.001+00:00</published><updated>2013-01-24T11:19:24.872+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DDos Attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Enterprise Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Radware"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Advance DDOS Tools: Encrypted Layer Attacks and Server-Based Botnets</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5SSn_DYTfezifUfISUwSni41HMryOs22LqyQsyk_TP5traAy8BaoTu2R1V5tmsUpXrkJt-Y0eN7ofEZvAVBwBv1-3H2rbbXay7mCM77WtbwlY_aPCgXsokfRMlKwnYFXL1WDSvvEdPQw/s1600/New-DDOS-Tools-Server.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5SSn_DYTfezifUfISUwSni41HMryOs22LqyQsyk_TP5traAy8BaoTu2R1V5tmsUpXrkJt-Y0eN7ofEZvAVBwBv1-3H2rbbXay7mCM77WtbwlY_aPCgXsokfRMlKwnYFXL1WDSvvEdPQw/s320/New-DDOS-Tools-Server.png&quot; height=&quot;236&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Application security solutions provider Radware has released its 2012 Global Application and Network Security Report. According to the study, distributed denial-of-service (DDOS) attacks are becoming more sophisticated and more severe.&lt;br /&gt;
&lt;br /&gt;
In addition, cybercriminals have started deploying new attack tools, such as server-based botnets and encrypted layer attacks, to make their campaigns more effective.&lt;br /&gt;
&lt;br /&gt;
While server-based botnets make the attacks more powerful, by weaponizing the encryption layer, cybercriminals can ensure that their operations escape detection and remain hidden.&lt;br /&gt;
&lt;br /&gt;
The recent DDOS attacks launched by Izz ad-Din al-Qassam Cyber Fighters against US banks are a perfect example of how efficient these new tools are.&lt;br /&gt;
&lt;br /&gt;
Besides the new attack tools, the report also highlights the fact that the number of DDOS and DOS attacks lasting more than one week doubled in 2012. &lt;br /&gt;
&lt;br /&gt;
On the other hand, organizations are still not investing enough resources to ensure that they’re protected against such attacks.&lt;br /&gt;
&lt;br /&gt;
While it’s becoming more and more difficult for organizations to protect their networks against cyberattacks, cybercriminals can turn to all sorts of relatively cheap services and kits that can help them achieve their goals.&lt;br /&gt;
&lt;br /&gt;
“The Radware ERT sees hundreds of DoS/DDoS attacks each year, and we’ve found attacks lasting more than one week have doubled in frequency during 2012. Through empirical and statistical research coupled with front-line experience, our team identified trends that can help educate the security community,” noted Avi Chesla, chief technology officer at Radware.&lt;br /&gt;
&lt;br /&gt;
“Through highlighting significant trends found in this report, our goal is to provide actionable intelligence to ensure organizations can better detect and mitigate these threats that plague their network infrastructure.”&lt;br /&gt;
&lt;br /&gt;
The complete report is available &lt;a href=&quot;http://www.radware.com/Resources/rclp.aspx?campaign=1630844&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/925647982339739736/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/01/new-ddos-tools.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/925647982339739736'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/925647982339739736'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/01/new-ddos-tools.html' title='Advance DDOS Tools: Encrypted Layer Attacks and Server-Based Botnets'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5SSn_DYTfezifUfISUwSni41HMryOs22LqyQsyk_TP5traAy8BaoTu2R1V5tmsUpXrkJt-Y0eN7ofEZvAVBwBv1-3H2rbbXay7mCM77WtbwlY_aPCgXsokfRMlKwnYFXL1WDSvvEdPQw/s72-c/New-DDOS-Tools-Server.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3468947878637018782.post-1600815716250611512</id><published>2013-01-23T16:08:00.003+00:00</published><updated>2013-02-12T11:42:44.356+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud service"/><category scheme="http://www.blogger.com/atom/ns#" term="cloud service providers"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Storage"/><title type='text'>Cloud Data Storage Providers that Offers Freemium Service</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Probably you&#39;ve got important documents, videos, music or other stuffs that needs to be shared across multiple devices, using&lt;b&gt; cloud storage technology&lt;/b&gt; is for now the easiest option you&#39;ve got and the number of people it are increasingly by day.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Cloud Storage&lt;/b&gt; has come to say and with so many &lt;b&gt;cloud service providers&lt;/b&gt;, you may be wondering which one could be right for you. The list below will help you based on general summary of each popular cloud service.&lt;br /&gt;
&lt;br /&gt;
First, let look at what cloud storage is for the benefit of those that don&#39;t know what it is. According to &lt;a href=&quot;http://en.wikipedia.org/wiki/Cloud_storage&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;wikipedia&lt;/a&gt;&lt;br /&gt;
&lt;blockquote&gt;
&lt;b&gt;Cloud storage&lt;/b&gt; is a model of networked online storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Hosting companies operate large data centers, and people who require their data to be hosted buy or lease storage capacity from them. The data center operators, in the background, virtualize the resources according to the requirements of the customer and expose them as storage pools, which the customers can themselves use to store files or data objects. Physically, the resource may span across multiple servers.The safety of the files depends upon the hosting websites.&lt;br /&gt;
Cloud storage services may be accessed through a web service application programming interface (API), a cloud storage gateway or through a Web-based user interface.&lt;/blockquote&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;1. &lt;a href=&quot;https://mega.co.nz/&quot;&gt;Mega&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA2JJT-KTV4vALrn2DTSYmZvsKyaxXhVy5zAajRYO-jCG4SZiQf7dx5chBYltNW7p32OAIuAvH9kiZpoWdk5KF4wMFVClq5wqXw6Yd-IclXE7p6ET4ZZlgegQtV7YGbjsFzTGBYmabLfE/s1600/mega-website.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA2JJT-KTV4vALrn2DTSYmZvsKyaxXhVy5zAajRYO-jCG4SZiQf7dx5chBYltNW7p32OAIuAvH9kiZpoWdk5KF4wMFVClq5wqXw6Yd-IclXE7p6ET4ZZlgegQtV7YGbjsFzTGBYmabLfE/s200/mega-website.jpg&quot; height=&quot;133&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Mega is a cloud storage provider and successor to Megaupload. The website was launched on 19 January 2013 to coincide with the one-year anniversary of the seizure of Megaupload. After the Gabonese Republic denied the new company the domain name me.ga, Kim Dotcom, the don in-charge announced it would instead be registered in his adopted home of New Zealand under the domain name mega.co.nz.&lt;br /&gt;
&lt;br /&gt;
Currently, free users will get 50 GB of free storage space and total bandwidth will be limited, from 1 to 8 TB per month, for paid accounts. Free account bandwidth is not currently disclosed.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;2. &lt;a href=&quot;http://skydrive.com/&quot;&gt;SkyDrive&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEib8VANIF_AwxvLJ_CEu_dXH38hcTCZVsagkx1TGbCRorpYu2p2Ey3Ia9vHTFFA2PWbq3t8Ye4w-FIzXfG_JHMhLabVvT9WBDa8KlYRMPzynF3pWHQkHihwvSyhNQWU4jS80cueK3oE6AE/s1600/skydrive-logo-l-11350829.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEib8VANIF_AwxvLJ_CEu_dXH38hcTCZVsagkx1TGbCRorpYu2p2Ey3Ia9vHTFFA2PWbq3t8Ye4w-FIzXfG_JHMhLabVvT9WBDa8KlYRMPzynF3pWHQkHihwvSyhNQWU4jS80cueK3oE6AE/s200/skydrive-logo-l-11350829.jpg&quot; height=&quot;137&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
SkyDrive (officially Microsoft SkyDrive, previously Windows Live SkyDrive and Windows Live Folders) is a file hosting service that allows users to upload and sync files to a&lt;b&gt; cloud storage &lt;/b&gt;and then access them from a Web browser or their local device. It is part of the Windows Live range of online services and allows users to keep the files private, share them with contacts, or make the files public. Publicly shared files do not require a Microsoft account to access.&lt;br /&gt;
&lt;br /&gt;
The service offers 7 GB of free storage for new users. Additional storage is available for purchase. Users who signed up to SkyDrive prior to April 22, 2012 could opt-in for a limited time offer of 25 GB of free storage upgrade. The service is built using HTML5 technologies, and files up to 300 MB can be uploaded via drag and drop into the web browser, or up to 2 GB via the SkyDrive desktop application for Microsoft Windows and OS X.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;3. &lt;a href=&quot;https://drive.google.com/&quot;&gt;Google Drive&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEil_3EakCyb04mY9uDGmVvMwZti2EJHLNLkh174O9kmtkrDMsGbn4Y4FjggXAeLjlSGZm9WYZeTa-tPbUzTOUp6zOWOM2PH-4uP37ipROE9z7i8-SEj9dwW0F3jkcLZBsRohof1_1vaUDM/s1600/Google_Drive.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEil_3EakCyb04mY9uDGmVvMwZti2EJHLNLkh174O9kmtkrDMsGbn4Y4FjggXAeLjlSGZm9WYZeTa-tPbUzTOUp6zOWOM2PH-4uP37ipROE9z7i8-SEj9dwW0F3jkcLZBsRohof1_1vaUDM/s200/Google_Drive.png&quot; height=&quot;200&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Google Drive is a file storage and synchronization service by Google that was released on April 24, 2012. Google Drive is now the home of Google Docs, a suite of productivity applications, that offer collaborative editing on documents, spreadsheets, presentations, and more. Rumors about Google Drive began circulating as early as March 2006.&lt;br /&gt;
&lt;br /&gt;
Google Drive gives all users 5 GB of &lt;b&gt;cloud storage&lt;/b&gt; to start with. A user can get additional storage, which is shared between Picasa and Google Drive, from 25 GB up to 16 TB through a paid monthly subscription plan ($2.49 US per month for 25 GB).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;4. &lt;a href=&quot;http://www.box.com/&quot;&gt;Box&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOZ6eHp5wIAfRec5vlgtst1gXdWGmLISUGXHjE5xl6KTO0glEZv_VpxER-r0QKo2oXBcAG_bfzv243UZzUEzEknS3Y4Kfg6f1p2qhbYgWkwA66FeLeVDB0wPkVPsogUfG2WJrObEptHVo/s1600/Box.net_logo.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOZ6eHp5wIAfRec5vlgtst1gXdWGmLISUGXHjE5xl6KTO0glEZv_VpxER-r0QKo2oXBcAG_bfzv243UZzUEzEknS3Y4Kfg6f1p2qhbYgWkwA66FeLeVDB0wPkVPsogUfG2WJrObEptHVo/s320/Box.net_logo.gif&quot; height=&quot;46&quot; width=&quot;83&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Box Inc. (formerly Box.net) is an online file sharing and &lt;b&gt;Cloud content management service&lt;/b&gt; for enterprise companies. The company has adopted a freemium business model, and provides 5 GB of free storage for personal accounts. A mobile version of the service is available for Android, BlackBerry, iPhone, iPad, WebOS, and Windows Phone devices. The company is based in Los Altos, California.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;5.&amp;nbsp;&lt;a href=&quot;http://www.mediafire.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;MediaFire&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwrCpTK3j6_25ikJQuW4H_IwcWEZyYPFHLrgpEhXdGfCh9034SWy8U3DjnRJDECmTQ8OCDUHXkLRIyGx89WUDlSloBrgGSl6-g-_5c86uDs1Ef4XSUOyAruXYRMHaGJpqhFweXtLtpkK4/s1600/68403_125440267510421_6194679_a.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwrCpTK3j6_25ikJQuW4H_IwcWEZyYPFHLrgpEhXdGfCh9034SWy8U3DjnRJDECmTQ8OCDUHXkLRIyGx89WUDlSloBrgGSl6-g-_5c86uDs1Ef4XSUOyAruXYRMHaGJpqhFweXtLtpkK4/s320/68403_125440267510421_6194679_a.jpg&quot; height=&quot;160&quot; width=&quot;160&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
MediaFire is a free file and image hosting web site that started in 2005 and is located in Shenandoah, Texas, United States. MediaFire include 50 GB of &lt;b&gt;cloud storage&lt;/b&gt; and a limit of 200 MB per file (250 GB of storage and 4GB of file size limit for Pro users and 1000 GB of storage and 10 GB of file size limit for Business users).MediaFire provides users with the ability to create image galleries from folders of images and view and share common document, presentation, and spreadsheet file types inside the web browser. MediaFire&#39;s free account service does not require download activity in order to preserve files, and is thus often suitable as a temporary or secondary backup solution although MediaFire does not officially support free data warehousing (long-term storage for inactive accounts).&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://prohackingtricks.blogspot.com/feeds/1600815716250611512/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://prohackingtricks.blogspot.com/2013/01/what-is-cloud-storage-and-best-provider.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/1600815716250611512'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3468947878637018782/posts/default/1600815716250611512'/><link rel='alternate' type='text/html' href='http://prohackingtricks.blogspot.com/2013/01/what-is-cloud-storage-and-best-provider.html' title='Cloud Data Storage Providers that Offers Freemium Service'/><author><name>dfgdfg</name><uri>http://www.blogger.com/profile/08507370230056793339</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA2JJT-KTV4vALrn2DTSYmZvsKyaxXhVy5zAajRYO-jCG4SZiQf7dx5chBYltNW7p32OAIuAvH9kiZpoWdk5KF4wMFVClq5wqXw6Yd-IclXE7p6ET4ZZlgegQtV7YGbjsFzTGBYmabLfE/s72-c/mega-website.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>