ads

Wednesday 13 June 2012

Gmail Hacked!! State-Sponsored Attackers Accessing Millions of Gmail Accounts Illegally

This year cyber criminals became very busy while penetrating security systems of many leading Industries. Last week we have seen hackers had managed to steal more than 6.5 million passwords of LinkedIn users. Also this week we have seen popular dating site eHarmony faced cyber attacks which causes serious damages. Now its the turn for Internet giant Google. Hackers have managed to breach the tight security system of Google Mail I mean Gmail. According to last report state-sponsored attackers are accessing millions of Gmail accounts illegally. Google unveiled a new warning system to alert Gmail users when it suspects “state-sponsored” attackers are attempting to compromise their accounts or computers using malicious software.



Monday 11 June 2012

Test Anti-virus / Firewall anda

1- buka notepad
2- copy and paste code kt bawah
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
3- save namepape.exe kat destop anda.
4- kalau file nie automatic kene delete maknenye Antivirus/firewall anda berfungsi..
     kalau x paham paham je larr erk..hahaha

Reason to be careful if 'PayPal' says you have changed your email address

 Have you received a notification claiming that your PayPal email address has changed?
Messages like the following have been spammed out to internet users:

Sunday 10 June 2012

TBD.my [Forum Untuk penggemar IT]

SALAM!!
Harini aku nak sembang sket pasal tbd.my.. Forum nie bukanlah seperti forum-forum hacking yang terdapat di luar saner tu.. ape yang menjadikan TBD nie special sket adalah, TBD akan membincangkan topik-topik Keselamatan Komputer dan Internet, Programming dan macam-macam lagi. Ingat, dorang akan bincangkan sahaje,kadang2 akan bagi terus pe yang korang nak tu.Tapi ini langkah yang terbaik sebab korang akan lebih banyak buat research sendiri dan akan lebih cepat faham..Kat sinie korang akan belajar banyak benda baru. Aku selalu gak bukak forum nie, hampir tiap2 hari..hehehe..Tapi hanya sekadar silent reader!! bhahahaha!!!!!




Understanding Different Types of Malware

You may have probably heard of the term malware, virus, Trojan, key-logger, worm, backdoor, bot, root-kit, ransom-ware, ad-ware, spyware and dialer but wonder what are the differences as you may probably only know about virus. Basically malware is short for Malicious Software where all of the terms above falls into this category because they are all malicious. The different term being used instead of just plain virus is to categorize what the malicious software is capable of doing. For example, a keylogger steals whatever that is typed on your keyboard and sends it to the hacker, a trojan opens up a backdoor allowing the hacker to gain full access to your computer and etc.

Firemin - The ultimate tool to fix Firefox memory leaks and optimize usage

Firefox high memory consumption is one of the biggest challenges this popular, open-source project, has faced in tough browser wars, while there have been quite a few attempts to make the web-browser optimized with forks and utilities and Mozilla foundation even addressed the "memory leakage" issue with targeted efforts like MemShrink - the results were promising but nothing very exciting.



Saturday 9 June 2012

Dating Site eHarmony Hacked, 1.6 Million Password Stolen


After LinkedIn now cyber criminals targeted one of the famous dating site eHarmony and stolen more than 1.6 millions of passwords from the database. The authority has admitted that its password database has been compromised, with around 1.5 million hashed passwords being found in the wild. The leaked database that appeared in public contained unsalted MD5 hashed passwords and was reported to not contain any identifying user-names or email addresses. According to the sources all the password hashes has been

15 Killer Windows 7 Keyboard Shortcuts


1. Ctrl+Shift+N to Create a New Folder

2. Ctrl+Shift+Click to Open a Program As Administrator


3. Shift+Right-Click Enhances Send to Menu

Kena Virus Atau Tidak!!

salam!!
Adakah komputer anda 'running slow' atau adakah anda fikir anda telah dijangkiti?
Sesetengah pengguna sekarang akan segera menyalahkan virus jika sesuatu yang pelik terjadi di komputer mereka!! kamon laa weyh!!!

Pertama, anda mesti belajar untuk membezakan antara jangkitan dan perkara umum apabila komputer anda perlahan.








Melajukan Komputer Anda

Salam!!

Sekarang anda tidak perlu memuat turun apa-apa perisian untuk membuat komputer anda lebih pantas, anda akan mencipta aplikasi anda sendiri atau boleh dikatakan skrip yang akan Mempercepatkan komputer anda sebanyak 25% dan ya, anda dapat kesan yang serta-merta pada pc anda. Jadi hanya ikut langkah mudah ini ..

 



TOR Browser[stay anonymous]

salam!!

kat sini aku nak kongsi sedikit sebanyak pasal TOR browser.. TOR browser nie membolehkan korang melepasi sekatan-sekatan ke atas website untuk di lihat menggunakan IP malaysia..bile korang guna TOR nie, IP korang akan bertukar tukar..hehehe..
Bawang nie Icon dye, bukan aku nak jual bawang ke hape!!


Friday 8 June 2012

Flamer/Skywiper Stuxnet

SALAM..
kebelakangan ini, Ace tengok kebanyakkan media sosial banyak Update mengenai Flame malware. So, Ace nak gak menyebok wat 1 post mengenai ni. hehehe.Selepas "Duqu" kini The Iranian Computer Emergency Response Team (IRCert) mendakwa telah menemui Stuxnet baru yang disasarkan untuk menyerang sistem dalaman negara.Stuxnet yang baru dijumpai nie telah digelar Flame (juga dikenali sebagai Flamer atau Skywiper). Nama "Flamer" datang dari modul serangan,

Thumbnail Zoom Plus Di Firefox!!

salam wahai blogger yang sudi singgah di sni..hehe.. hari ni Ace nak sembang 1 perkara, ni pasal Thumbnail Zoom Plus.. benda ni adalah add-ons [FIREFOX ONLY] untuk zoom mana-mana yang kita sentuh guna mouse..so , kalau kt facebook tu, korang x payah susah-susah nak click gambar.. hehehe..sesuai sangat untuk stalker sepenuh masa!! hahaha
[aku macam x percaye aku wat tutorial untuk install add-ons..hahaha]

6.5 Million of LinkedIn Passwords Stolen By Cyber Criminals

security compromised
Very popular social networking site LinkedIn are currently running through a massive cyber attacks. It has been allegedly reported that more than six million passwords belonging to LinkedIn users have been compromised among them more than 300,000 passwords has already been cracked and published as plain text. A file containing 6,458,020 SHA-1 unsalted password hashes has been posted on the internet, and hackers

Thursday 7 June 2012

-[alat pengesan untuk laptop/pc]-


salam blogger!!
kt snie aku nk kongsi satu open-source..software ni dah lama wujud, but aku nak kongsi kt dalam blog
untu sekadar pameran dan informasi kepada yang x berapa nak tau tue..orite??


[tuto]How to Upload Shell in Wordpress

wordpress logo
ok.let us learn together.
this tutorial will be in dual language
- english
+ bahasa melayu

Wednesday 6 June 2012

Crack Password WEP using BEINI

Question: WEP Key - What Are WEP Keys?
WEP stands for Wired Equivalent Privacy, a standard for WiFi wireless network security. But what exactly are WEP keys?
Answer: A WEP key is a security code used on some Wi-Fi networks. WEP keys allow a group of devices on a local network (such as a home network) to exchange encoded messages with each other while hiding the contents of the messages from easy viewing by outsiders.


Hacker Evolution Duality Game

Hacker Evolution Duality is the upcoming hacking simulation game, developed by exosyphen studios. Based on the successful Hacker Evolution game series, it has been completely redesigned to offer an impressive and new gaming experience.
Hacker Evolution Duality starts in the early days of Brian Spencer when he was nothing more than a brilliant programmer. It then fast forwards to the future, where he has to stop an Artificial Intelligence he has created, unknowingly and take back control of a giant company he once used to own.

Use ALFA in VMware



Post kali ini untuk memberi solution kepada mereka yang menggunakan ALFA NETWORK Wireless USB adapter..

ALFA AWUS036NHR review!!



AWUS036NHR
AWUS036NHR is the IEEE 802.11b/g/n Wireless USB adapter provides users to launch IEEE 802.11b/g/n wireless network at 150 Mbps in the 2.4GHz band, which is also compatible with IEEE 802.11b/g wireless devices at 54 Mbps. You can configure AWUS036NHR with ad-hoc mode to connect to other 2.4GHz wireless computers, or with Infrastructure mode to connect to a wireless AP or router for accessing to Internet.
AWUS036NHR includes a convenient Utility for scanning available networks and saving preferred networks that users usually connected with. Security encryption can also be configured by this utility.


Run BACKTRACK in VMWARE





BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date. Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community.

Tuesday 5 June 2012

Phishing Attack: Login Overflow


semua dah tau pasal phising kan, phishing ni da macam ancient technique untuk hacking..hehe

so x perlu buang masa jom kite tengok phishing yang dah di upgrade oleh BinusHacker  !!

DATABASE LEAK!!!

database
DATABASE adalah pangkalan data yang penting bagi sesebuah organisasi. Database juga terdapat dalam dynamic website.. Database ini penting jika melibatkan maklumat-maklumat peribadi dan menjadi bahaya kepada mangsa jika maklumat tersebut disalah guna oleh pihak yang lain..

GOOGLE DORK



Google menyokong beberapa operator canggih, yang mana merupakan perkataan yang dicari yang mempunyai erti khas untuk Google. Biasanya operator ini mengubahsuai pencarian dalam beberapa cara, atau bahkan memberitahu Google untuk melakukan sejenis yang sama sekali berlainan pencarian. Contohnya, "link:" adalah pengendali khas, dan permintaan tersebut [link: www.google.com] tidak melakukan pencarian yang biasa sebaliknya menemui semua laman web yang mempunyai pautan ke www.google.com.


APAKAH SQL?



SQL (disebut "ess-que-el") bermaksud untuk Bahasa Pertanyaan Berstruktur(Structured Query Language). SQL digunakan untuk berkomunikasi dengan pangkalan data. Menurut ANSI (American National Standard Institute), ia merupakan bahasa standard untuk sistem pengurusan pangkalan data hubungan. Kenyataan SQL digunakan untuk melaksanakan tugas-tugas seperti mengemas kini data dalam pangkalan data, atau mendapatkan data daripada pangkalan data. Beberapa hubungan

SCHEMAFUZZ tutorial

sql injection
schemafuzz ditulis dalam coding python oleh darkc0de crew.. tool ini berfungsi untuk melakukan sql injection terhadap website yang vuln atau dalam kata lainnya mempunyai kelemahan SQL..
 
Related Posts Plugin for WordPress, Blogger...