Thursday, May 31, 2012

Cracking credit card codes - CCCC

,
4417 1234 5678 9113 4 - the first digit is the Major Industry Identifier.It designates the category of the entity which issued the card. 1 and 2 are airlines 3 is Travel and Entertainment 4 and 5 are Banking and Financial 6 is Merchandizing and Banking 7 is Petroleum 8 is Telecommunications 9 is National assignment The first 6 digits are the Issuer Identification Number. It will indentify the institution that issued the card. Visa: 4xxxxx Mastercard: 51xxxx - 55xxxx Discover:6011xx, 644xxx, 65xxxx Amex: 34xxxx, 37xxxx Cards can be looked up by their...
Read more →

Microsoft Photosynth for Windows Phone

,
We were just mentioning how Microsoft was teasing Photosynth for Windows Phone and sure enough, the popular and creative photo stitching app is now available! "Photosynth for Windows Phone is the panorama app that makes it easy and fun to capture and share interactive panoramas of the places, people, and events that are important to you. Using the latest in computer vision techniques, Photosynth is the acknowledged leader in mobile panorama creation. It is the only app available on any mobile platform that allows you to capture 360 degrees horizontally...
Read more →

Tuesday, May 29, 2012

Trick that allows apps to run while computer is locked

,
You can have a system shell on an application you have administrative access on or if you have physical access to the box and can boot to repair disk or linux distro to change files. 1. Make a backup of the original sethc.exe copy c:\windows\system32\sethc.exe c:\ 2. Copy cmd.exe into sethc.exe's place copy /y c:\windows\system32\cmd.exe c:\windows\system32\sethc.exe 3. Restart & hit Shift key 5 times, cmd.exe will pop up! There's also another way of doing this just before you log-out the last time from this machine. Start an elevated cmd and type: REG...
Read more →

Nokia Lumia 900 32GB confirmed by O2

,
Well colour us all surprised. O2 Germany has confirmed, via Twitter, that the 32GB Lumia 900 is actually what's on offer and is not a typo on the website as we first presumed. The Windows Phone in question isn't just any old Lumia 900 either, it's the glossy white version, which has been listed on the carriers website as "coming soon". There's still no word on pricing or availability just yet, and it'll be interesting to see if this 32GB variant makes its way elsewhere, especially with some owners demanding more storage. Twitter user XB-Mod tweeted a photo...
Read more →

Monday, May 28, 2012

Performing a DoS attack - personal use only

,
What exactly is a Denial of Service Attack? It's an attempt to make a machine or network resource unavailable to its intended users. Like a flood, when the DoS Attacker sends many packets of information and requests to a single network adapter, each computer in the network would experience effects from the DoS attack. In this post, you will learn to perform a DoS (not a DDoS) attack ONLY FOR PERSONAL USE. Let's say we have a website with low bandwidth/connection. Step 1: Fire up command prompt, ping the website & find it's IP. ex. ping google.com...
Read more →

Bind a file into an image

,
This is a really good way to hide some of your data :) Prepare... Choose a file you wish to bind into the image, place both of them in a folder. Add the files into a rar archive. Fire up CLI & navigate to the folder where you keep those files together. Type: copy /b NAMEOFPICTURE.jpg + NAMEOFARCHIVE.rar You have a picture that's hiding a file in it, to extract simply open with WinRAR. Have f...
Read more →

Auto-delete temporary folder

,
We all know what's the temporary files folder...., junk after use. Some programs create temporary files and then leave them behind - they do not delete them. This can happen because the program crashed or the developer of the program simply forgot to add the code needed to delete the temporary files after the program is done with them (disk leak). In Microsoft Windows the temporary files left behind by the programs accumulate over time and can take up a lot of disk space. System utilities, called temporary file cleaners or disk cleaners, can be used...
Read more →

Sunday, May 27, 2012

FBI is now officially spying on YOU!

,
We all knew that the FBI probably was monitoring the web activite of random citizens for quite some time now but today as Cnet reports the law enforcement bureau has formed a dedicated unit for the purpose of internet surveillance. According to Declan McCullough, the National Domestic Communications Assistance Center has a mandate to try and crack skype conversations, analyze internet traffic data, and build wiretapping hardware. But its not for investigations of its own; the goal is to develop new technologies to help make it easier for other law enforcement...
Read more →

Understanding the difference between hackers

,
White Hat A hacker can be a wiz-kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world. In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We...
Read more →

Virus type identification

,
A potentially damaging computer program capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user. Virus A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer...
Read more →

Saturday, May 26, 2012

Absinthe 2.0 - iPhone untethered jailbreak

,
News of an untethered jailbreak for Apple's iPhone OS 5.1.1 has been circulating for at least several days, but this morning iOS hackers managed to release the fruits of their labor: Greenpois0n's Absinthe 2.0. If you're curious, the press release (yes, a press release) can be found here. The untethered jailbreak tool works on virtually all iPhones and nearly all iPads, including the iPhone 4S, iPad 2 and the iPad 3. The tool does require that the device already have 5.1.1 loaded, so make sure your iOS device is up to date before beginning. Firstly, it...
Read more →

June 1: Windows 8 RC

,
Windows 8 RC will be available on June 1, according to some posts in the net. This latest morsel of information helps confirm earlier rumors that a preview version would be available during the first week of June. Although the future is uncertain, Windows 8 officially will launch near october. Also, Windows 8 will be delivered with Adobe Flash pre-installed. This is an interesting departure from Microsoft's past practices, but one can't help but think they're a little late to the party -- Flash has been around since 1998. Interestingly, for better or worse,...
Read more →

Thursday, May 24, 2012

Automated computer security software - Stay protected

,
Security scanners, tools, safety guidelines, software, discussions, antiviruses, firewalls, antispyware... everything to get protection but....Nothing to stay updated. Do you own the latest version of every app you have currently installed? No? Why not? It's because it's not free ? Then don't get mad if you become a victim for a hacker. Except for 0days of course.... :) Update your antivirus or choose a better antivirus, update every single software you use, stop clicking at spam mails. I`ll give you an application to play with... it will save you...
Read more →

HP fires 9% of the Company

,
Hewlett-Packard - HPQ is considering cutting 27,000 jobs, or 8 percent of its workforce, to reduce costs and help the company contend with ebbing demand for computers and services. CEO Meg Whitman, is seeking to reverse the growth slump that led to the ouster of her predecessor, Leo Apotheker. The company’s PC sales are dropping as consumers favor tablets, such as Apple Inc.’s iPad, and it has been slow to adapt to the shift toward cloud computing, away from the IT services Hewlett-Packard provides... This “would enable investments in strategic, higher...
Read more →

Wednesday, May 23, 2012

Delay while working with shared folders

,
Troubleshooting will help you a lot, not. Many shares between server & client infrastructure - WindowsXP machines , who would update to seven in these days? Sudden delay while trying to access a file share or network share. What will everyone do? Start searching every single machine for any kind of misplaced cables, maybe a switch or a router..., or even server settings! But, will you start thinking that it's client's fault? A forgotten service from the very first start of the machine? of the client? It's 'webclient', this pesky service sometimes...
Read more →

Tuesday, May 22, 2012

Cheap flash memory: A scam?

,
Flash memory in this day and age is essential for mobile data storage. With the price competitiveness of the flash memory market and their applications in a wide range of mobile storage consumer electronics, many sellers resort to faked memory capacities to earn extra profit. From the China manufacturing segment alone, a big percentage of exported flash memory products (USB drives and memory cards) have capacities that are set higher than the actual available storage in the flash memory. This causes many problems with the storage of data and can and will...
Read more →

Backup solutions

,
Backups are often neglected; do you backup your computer or server, if so, how often? At any moment a computer or server may crash unpredictably and put your critical data at risk. Are you confident that you will be able to do a full restoration with minimal downtime? Have you done a full backup test restoration including the hard drive images?  How much information do you have stored on your Server’s hard drives? Are you hosting your own email or website? Are you running any SQL databases? These are all very critical and require a good...
Read more →

Windows 8 super fast boot, a real problem

,
A real problem. What if you`d like to go into safe mode for example? Have you imagined how you could do it? Pressing the power button would get you straight to your OS, there's no time for tapping buttons. There won't be time to interrupt a boot screen, from the other side....Who wouldn't like great boot speeds? Take some time to watch the video below: In this video you can see a laptop with a SSD booting super fast. Booting this fast doesn't require special hardware, but it is a feature of a new 'BIOS' called UEFI. You'll still see much improved...
Read more →

Anonymous hater credited for Pirate Bay and Wikileaks DDoS

,
WikiLeaks and Swedish BitTorrent file-sharing site Pirate Bay were reportedly battling Distributed Denial-of-Service (DDoS) attacks for several days earlier this week. The user, who goes by the Twitter handle @AnonNyre, has been riling up members of the hacktivist group and supporters of TPB with a series of angry posts on Twitter, to the extent that Anonymous supporters are now demanding to get in contact with him over the social network. WikiLeaks tweeted status of its Web site a short while ago: "WikiLeaks has been under sustained DDOS attacks over the...
Read more →

Monday, May 21, 2012

New WindowsPhone Freeman's wallpapers

,
Everyone wants a different design, especially for a lovely cellphone.... I found some wallpapers that should do the trick for you. Levi Freeman's wallpapers: Use your phone (search > tap the eye for Bing Vision > point and tap the link that appears, then save to phone phone and set as wallpaper) to scan the tags. I find them very beautif...
Read more →

Advanced browser history search tool

,
This software is an advanced local browser history search engine. In less than few seconds it will extract the chosen keywords of most famous web browsers including: Internet Explorer, Google Chrome, Mozilla FireFox, RockMelt, Comodo Dragon and Opera. The program will attempt to find the keyword(s) in the history title and search, if the keyword is present or suspected to be, it will be display in the result list with it's URL and Title. The software also gives you the possibility to edit the default keywords and of course add / modify your own keywords. Fully...
Read more →

Windows Phone beats iPhone in China

,
Windows Phone 7 may be struggling worlwide, but it's overtaken the iPhone in China after only two months, according to a Microsoft official. Do the Chinese know something that the rest of the world doesn't? The online Dutch magazine Emerce quotes Michel van der Bel, Microsoft chief operating office the Greater China region as saying that Windows Phone now has a market share of 7 percent, even though it was launched in China only two months ago. Van der Bel claims that the iPhone market share is 6 percent. (Note: All information and quotes for this blog...
Read more →

Sunday, May 20, 2012

Windows 8 Release Preview is now ready

,
The next public version of Windows 8 is reportedly completed, about two weeks ahead of its planned launch to the world. Winunleaked.tk claims that Microsoft has finished work on the Windows 8 Release Preview (otherwise known as the release candidate) which will have the version number of 8400. The post on the Winunleaked.tk forums (free registration required) supposedly has an image of the Start screen from the 8400 Release Preview build of Windows 8. The post also claims that the SKUs that will be launched for the Release Preview include Windows 8 (Core), Windows...
Read more →

Anonymous Hackers attack Indian government - file-sharing ban

,
Anonymous Hackers has turned its attention to India, taking down the web sites of the Supreme Court, the country’s two major political parties and several government sites in retaliation for a court injunction which led to the blocking of several video sharing and bit torrent sites. Anonymous tweeted saying that it was now India’s time to bring in a new government.“Namaste #India, your time has come to trash the current government and install a new one. Good luck. | #SaveTPB #Anonymous #Censorship”. The hacking was reportedly in response to the blocking...
Read more →

Nokia Lumia - Crash test

,
If there was any doubt how well built the Nokia Lumia is, the above video should help anyone's concerns over the quality of the phone. The unibody design coupled with Corning's Gorilla Glass make the Lumia a very solid Windows Phone. While the Lumia clearly survives crash test in the video, we won't encourage you to do the same. Post below if your Lumia has survived any near death experienc...
Read more →

Saturday, May 19, 2012

Say Good Bye to Aero: Latest Windows 8 build reveals minimalisticdesktop UI

,
It's safe to say that many of us have high anticipation for the upcoming Windows 8 Release Preview,which will be available as soon as the first week of June. While though we are on hold Windows management are releasing sneak peaks inside their work such as the changes in the desktop UI.As you might remember from the Consumer Preview, window borders and widgets featured a simplified and subdued look in comparison to the glass-like materials of Aero, which Microsoft now calls "dated and cheesy." With the latest refresh, however, the company has pushed...
Read more →

Friday, May 18, 2012

Anonymous’ Massive Data Leaks Are Being Erased Off the Internet

,
After every online strike by Anonymous and LulzSec—back when they did that sort of thing—it was inevitable that the leaked goods would wind up on Pastebin, the web's vandalized bathroom stall. Now, the company wants out of the game. The Register reports Pastebin's Dutch owner and awesome last name possessor, 28-year-old Jeroen Vader, is tired of thousands of abuse alerts and DDoS attacks against his meek little site, which wanted only to become a place to anonymously and easily post text before it was appropriated by Sabu and co. Vader...
Read more →

Thursday, May 17, 2012

Custom network profiles using NetSetMan

,
NetSetMan is a network settings manager which can easily switch between 6 different profiles including IP address, subnet mask, default gateway, DNS server, Win server, computer name, printer, DNS domain, work group, and scripts. It also can get current settings and do a FastSwitch from the tray bar. With only two mouse clicks you can activate a saved profile and it is easy to use and very powerful. NetSetMan is a network settings manager which can easily switch between 6 different, visually structured profiles including: IP Addresses Gateways (incl....
Read more →

Google bots learning to read webpages like humans, one step closer toknowing everything

,
Google just launched its Knowledge Graph, a tool intended to deliver more accurate information by analyzing the way users search. Of course, with a desire to provide better search results comes a need for improved site-reading capabilities. JavaScript and AJAX have traditionally put a wrench in Google bots' journey through a webpage, but it looks like the search engine has developed some smarter specimens. While digging through Apache logs, a developer spotted evidence that bots now execute the JavaScript they encounter -- and rather than...
Read more →

The Pirate Bay down for 24h after DDoS

,
Thepiratebay the last of the old-school media sharing sites was down for 24 hours after a Distributed Denial of Service attack. Rumors are spread about who launched this attack against thepiratebay, with more popular answer the anonymous. Piratebay confirmed the attack in it's Facebook page and ended the rumors about anonymous with these posts : "We're under a quite big ddos attack. We don't know who's behind it but we have our suspicions..." "Just to clarify, we KNOW that it is NOT Anonymous who is behind the ddos attack. Stop spreading rumors...
Read more →