Fire Tablet Alexa Display Black

Saturday, August 11, 2012

Top 5 Iphone and Blackberry Apps

Top 5 Iphone and Blackberry Apps

Here you can find  top 5 iphone, android and blackberry apps that will greatly enhance your device's functionality and style, giving you quick instant access to information, shopping and makes life easier.
with MINT you can organise financial plans and track your daily, weekly or monthly expenses.  you can get a digital budget tracker and it can be downloaded at Mint.com for free.
Gift List by Gennubi  with gift list you can create and budget and be sure you wont exceed it while shopping online. this is particularly useful for shopaholics who just can not stick to a budget.
The free RedLaser app is a shopping app which uses your smartphone's camera to take photos of items bar codes and then displays, within a second or two, the best prices at online or local retailers so you can chose wisely.
Evernote is a great free app to help you stay organized by jotting down thought and information as you go.  Evernote lets you create, view, organize, search and share your ideas in a digital version of yellow sticky notes. with this app you can take your yellow board wherever you go.
Venmo is a free app that lets users pay back to friends, family or colleagues. Or it can be used to split a bill at a restaurant or gift someone cash from one device to another. Simply sign up online, and then link a credit card or bank account to your Venmo account for all transactions.
To enjoy a great phone like iphone, android or blackberry you need cool apps and there are thousands of them available for free, to give you the best smartphone experience. try out the top 5 iphone apps above and spread the word.
our goal is to ensure that you have a great time and easier life with your great phone!

Are you a Busy Bee? Dont let Your Friends Feel Ignored with BeeZee

Are you a Busy Bee? Dont let Your Friends Feel Ignored with BeeZee

A busy bee is someone who always has something doing whether important or not and sometimes this activities can make your friends and families feel left out of your life or ignored.
When you are so busy you can not take a minute to answer your call or reply a text message it leaves them wondering why you do not want to talk to them or when they can actually call you back.
there is a solution to this problem and its BeeZee, its an app that lets you callers know why you can not answer their call and what exactly you are doing, without you telling them.
it can
Automatically notifies people who call you to why you’re busy.
create Different profiles for different activities.
activate Silent mode and timers.
Post to Facebook your status.
The not so good thing is that it only works for Android Users and can be downloaded at the google play store.

The Newest Apps For Iphone this Month

The Newest Apps For I phone this Month

The Freshest of iphone Apps for the month of august
When you design an application software, it is imperative that you regularly update it to increase its usability and functionality or it will get outdated and less valuable.
this month of course, a lot of developers have gone to their labs to find out new ways to impress their users and out of the numerous we have picked the best 3 apps that are worth looking into.Iphone apps for august 2012
the first on the line is Slingshot Racer, a game that features turn based players and a whole lot of race track games, second is Flighttrack which gives you access to flights in transit, arrival time and spot them on maps, the third is Bitehunter which helps food lovers find the best deals on meals in their local environment.
Slingshot Racing for iphone and ipad is priced at less than $1, this game app test and trains your speed and maneuver tactics in car racing and you can more than one player.
Flighttrack covers updates from over 10,000 airports worldwide, it is free, provides airlines flying across the globe in very colour ful and clear maps, however it does not provide everything you need to know concerning a particular airline you may be interested in, just the basic: its departure and landing time.
Bitehunter which is not the least of all, and particularly my favourite, since i love food, helps you find food deals around your locality from your device and best of all it is free. earlier we had to find the eateries and order via mail or in person but now everything from finding to ordering happens right through the app.

How To hack websites using Havij 1.10(Full tutorial)

How To hack websites using Havij 1.10(Full tutorial)

First download Havij 1.10 from here
First Find a sqli infected site .Now here i found a vulernable site
http://www.hypetrading.com/productinfo.php?id=285
Now Let's start
Open havij and copy and paste infected link as shown in figure
Now click analyze
Then It shows some messages there....Be alert on it and be patient for sometime to find if it's vulernable and type of injection and if db server is mysql,then it will find database name.Then after
getting it's database, its is name like xxxx_xxxx
Then Move to another operation to find tables by clicking "tables" as figure shown.Now click "Get tables" Then wait some time if needed
After finding the tables ,you can see there will be "users" Put mark on it and click in the " get columns " tab as shown in figure
In that Just put mark username and password and click "Get data"
Bingo Got now id and pass that may be admin...
The pass will get as md5 you can crack it also using this tool as shown in figure.

Monday, August 6, 2012

Tutorial On Pro Rat

--:::::::::::Tutorial On Pro Rat::::::::::::---

To show an example of malicious program.I will use a well known Windows Trojan, ProRat
Step 1.  Download ProRat.Once it downloaded right click on folder and extract it.A password prompt will come up.The password will be "pro"
Step 2.  open up program. You should see the following:
3. Next we will create the actual Trojan file. Click on Create and choose Create ProRat Server.
4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.
5. Click on the General Settings button to continue. Here we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.
6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. In the example I will use an ordinary text document.


7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I will stick with the default because it has icon support, but exe’s looks suspicious so it would be smart to change it.

8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.

9. Finally click on Create Server to, you guessed it, create the server file. Below is what my server file looks like.
10. A hacker would probably rename it to something like “Funny Joke” and send it as an attachment to some people. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.
11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.
12. I’m going to run the server on my own computer to show you what would happen. Once I run it the trojan will be installed onto my computer in the background. The hacker would then get a message telling him that I was infected. He would then connect to my computer by typing in my IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to my computer and have full control over it.
13. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all my computer files, he can shut down my pc, get all the saved passwords off my computer, send a message to my computer, format my whole hard drive, take a screen shot of my computer, and so much more. Below I’ll show you a few examples.
14. The image below shows the message I would get on my screen if the hacker chose to message me.
15. Below is an image of my task bar after the hacker clicks on Hide Start Button.

16. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.
As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

Install Android 4.0.4 – Ice Cream Sandwich on your PC

Install Android 4.0.4 – Ice Cream Sandwich on your PC !

Hello friends, today I've installed Android 4.0.4 Ice Cream Sandwich in my PC.
As we know Android - the leader in mobile/tablet PC smart phone OS is a Linux based OS basically designed for ARM CPU, but it has also been ported for x86 architecture i.e. Intel/AMD CPU. This project is called Android-x86, you can visit www.android-x86.org or www.androidx86.org for more information. So, we'ii now install Android x86 4 (Ice cream Sandwich) on our PC. I'm doing it in Virtual Box OS Emulator but you can also install Android directly on your computer.
First, we need to download the ISO CD image of android x86, so click here to go to the android-x86 download page and download the ISO image of your choice, I've downloaded the IBM think pad installer, you can download it too, it will work on your PC too...
Now you have the ISO CD image, we can directly boot it by writing it on a CD or we can build a boot able pen-drive using free tools like Linux Live USB Creator or Unetbootin. These ISO are in hybrid format one can simple write its content to a pen-drive using 'dd' command in Linux. Open terminal and issue command:
$ dd if= of=/dev/sdxx
Whatever, once we boot in we will see the grub menu as follows...
Android-x86 Live & Installation CD 4.0-RC2 GRUB Menu
select 'Installation - Install Android-x86 to harddisk' using Arrow Keys and you will be shown this window if your harddisk is not partioned...and you will be asked to do so...
else...you will see this...
where you will be asked to select the harddisk where to install the system...
Let's assume that your harddisk is not partioned and you will have to do so, then you hit OK in the previous window and you will be seeing this
select [New] using Arrow Keys to create a new partition in the free space.
Now, enter the size of the partition in MB and hit Enter.
Now, mark the drive as [Bootable] by hitting Enter on it, then select [Write] and you will be greeted with this warning...
type 'yes' and hit Enter, after writing the filesytem, hit [Quit]
Now, installer will ask you to select your harddisk that you just prepared.
select your harddisk and hit OK, now the installer will ask you to choose filesystem type, select 'ext3' and hit OK
Now installer will display a warning, just type Yes to format the harddisk.
You will also be asked to install the GRUB bootloader, select Yes, without it you can't boot into your Adroid OS.
Since, we are not now interested in debugging the system, so when the system asks for /system directory to be R/W, select No, however you may also select Yes.
And now...your installation has begun, it will take less than a minute...
Congratulation! Your Android has been installed! Now just reboot or start your new;y installed OS.
Now the OS will boot from the harddisk and then it will display the Welcome screen
select language, then a couple of thing like user name, license, updates etc, and you Android is ready!
that's it, click on finish...and you will see your home screen of your Android!
Now, enjoy and play with your Ice Cream Sandwich, have fun :)
ATTENTION VirtualBox users! Until and unless you have a touch screen display, disable the feature "Enable absolute pointing device" in the Settings of your virtual OS under the System tab.
un-mark this check box!
That's it folks! Have fun...

Create Fake Login Page of any site with Super Phisher Tool

Create Fake Login Page of any site with Super Phisher Tool

Hello Friends,I hope you all are fine.
Phishing is known as the basic hacking trick to hack anyone's accountPassword.
But it becomes very difficult to make phishing page for every site.
Today I'm giving you the best deal.Here's a s/w called super phisher which can create fake login page of any site you want.
So Today I am going to explain you how to make your own Phishing page without any sort of copy & pasting but just with a simple click. Most of Hackers Zone readers demanded me to post this article, so I thought of posting it and make it available to all.

First of all let me specify some key features of this Phishing tool :-
 
* Simple and easy tool which can be used even by a 10 years old boy.
*Create any fake page. For ex- FacebookGmail, Yahoo, Hotmail, etc.
 
Steps to create your own Fake Page:-
 
* Download super phisher   (candshackers is my site) & Extract it.
*Run it
*Fill the Boxes
* In the [url of login box] Type that url which you want to make fake page
ex :-www.facebook.com/login.php
*2nd your password txt file xxx logs.txt
*name of fake page file same as phish.php
*site to be redirected after login of victim
1)
 
 
2) This is the Output folder where the fake page has been created.
 
 
3)These are the Fake pages which are created by the Super Phisher.
 
 
Thanks for reading this article. If u face any problem, feel free to ask. 
 
Feel Free to ask anything if you face any problem.
Hope you like it.
Enjoy and don't forget to share.

HOW TO FIND UPLOADED SHELLS AND PASSWORD USING GOOGLE?

HOW TO FIND UPLOADED SHELLS AND PASSWORD USING GOOGLE?


Hello Friends Chinmoy Here and today i am going to teach you How to find uploaded shells and password using google?

So, let's start!
Go to Google.com and type these Dorks, and you will got a Lot of uploaded shells in Google serach results !!
Dorks for finding shells:
inurl:.php "cURL: ON MySQL: ON MSSQL: OFF"
"Shell" filetype:php intext:"uname -a:" "EDT 2010"
intitle:"intitle:r57shell" [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ]
inurl:"c99.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
inurl:"c100.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
intitle:"Shell" inurl:".php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Dorks for finding Passwords:
filetype:htpasswd htpasswd
intitle:"index of" ".htpasswd" -intitle:"dist" -apache -htpasswd.c
index.of.private (algo privado)
intitle:index.of master.passwd
inurlasslist.txt (para encontrar listas de passwords)
intitle:"index of..etc" passwd
intitle:admin intitle:login
"incorrect syntax near" (sql script error)
intitle:"the page cannot be found" inetmgr (debilidad en iis4)
intitle:index.of ws_ftp.ini
"supplied arguments is not a valid postgresql result" (possible debilidad sql)
_vti_pvt password intitle:index.of (frontpage)
inurl:backup intitle:index.of inurl:admin
"index of /backup"
index.of.password
index.of.winnt
inurl:"auth_user_file.txt"
"index of /admin"
"index of /password"
"index of /mail"
"index of /" +passwd
index of /" +.htaccess
index of ftp +.mdb allinurl:/cgi-bin/ +mailto
allintitle: "index of/admin"
allintitle: "index of/root"
allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov
administrator.pwd.index
authors.pwd.index
service.pwd.index
filetype:config web
gobal.asax index
inurlasswd filetype:txt
inurl:admin filetypeBig Grinb
inurl:iisadmin
inurl:"auth_user_file.txt"
inurl:"wwwroot/*."
allinurl: winnt/system32/ (get cmd.exe)
allinurl:/bash_history
intitle:"index of" .sh_history
intitle:"index of" .bash_history
intitle:"index of" passwd
intitle:"index of" people.1st
intitle:"index of" pwd.db
intitle:"index of" etc/shadow
intitle:"index of" spwd
intitle:"index of" master.passwd
intitle:"index of" htpasswd
intitle:"index of" members or accounts
intitle:"index of" user_carts or user _cart

HOW TO HACK ANY USERS YOUTUBE ACCOUNT, THE EASY WAY!

HOW TO HACK ANY USERS YOUTUBE ACCOUNT, THE EASY WAY!

HOW TO HACK ANY USERS YOUTUBE ACCOUNT, THE EASY WAY!

How to hack any users Youtube account, the easy way!
This isn't exactly an account (profile or channel) hack, but more of a password retrieval. All you need is a little snippet of HTML from their channel homepage and you've got the information needed to get their password and log into their account.
Step 1. Go to the users main page (channel) where you see the featured youtube video, uploads, favorites, comments and contact information.
Step 2.Use your internet browser to View Source (Often within the 'view' or 'edit' menu). This will allow you to see the HTML that makes up the webpage.
Step 3.Look for the following line of javascript, located almost at the bottom of the script.
var authTokens = {
  'watch_pms_ajax_xsrf_token': 'pg9h1lNsbNBhSlPIS8uFacqfNcdQMTI2NDczMzO1NA==',
  'address_book_ajax_xsrf_token': 'zTa3VjUtn1IQYsUKzinPyPurVfZ8MTI9NDczOzA1NA=='

The address_book_ajax_xsrf_token output alpha-numeric portion changes nearly every few seconds (a youtube security measure to prevent hackers from getting other user's passwords), you'll you'll have to be quick to use it or it will expire on Youtube's server and the password retrieval won't work, so be sure to read all of these instructions and act quickly to avoid errors.
Step 4.Enter the code into the box below (just whats within the quotes, after the ' and before the =='s) and press the button to get the users password.
IMPORTANT! This is VERY time sensitive. If you get an error, try it again. Some users have reported that it may take up to 10 tries or more before the script will return a valid response. Our server can only respond to so many attempts and inputs are case sensitive. Password retrievals may not return during hours that external hosts are performing site maintenance or server upgrades. Please be patient and try again, or come back later if results are not provided at this time.

DOMAIN HIJACKING – HOW TO HIJACK A DOMAIN

DOMAIN HIJACKING – HOW TO HIJACK A DOMAIN

DOMAIN HIJACKING – HOW TO HIJACK A DOMAIN
 In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.
Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).
The operation of domain name is as follows
Any website say for example gohacking.com consists of two parts. The domain name(hacking.com) and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows.
1. After registering a new domain name, we get a control panel where in we can have a full control of the domain.
2. From this domain control panel, we point our domain name to the web server where the website’s files are actually hosted.
For a clear understanding let me take up a small example.
John registers a new domain “abc.com” from an X domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the domain control panel (of X) he configures his domain name “abc.com” to point to his web server (of Y). Now whenever an Internet user types “abc.com”, the domain name “abc.com” is resolved to the target web server and the web page is displayed. This is how a website actually works.
What happens when a domain is hijacked
Now let’s see what happens when a domain name is hijacked. To hijack a domain name you just need to get access to the domain control panel and point the domain name to some other web server other than the original one. So to hijack a domain you need not gain access to the target web server.
For example, a hacker gets access to the domain control panel of “abc.com”. From here the hacker re-configures the domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “abc.com” he is taken to the hacker’s website (Z) and not to John’s original site (Y).
In this case the John’s domain name (abc.com) is said to be hijacked.
How the domain names are hijacked
To hijack a domain name, it’s necessary to gain access to the domain control panel of the target domain. For this you need the following ingredients
1. The domain registrar name for the target domain.
2. The administrative email address associated with the target domain.
These information can be obtained by accessing the WHOIS data of the target domain. To get access the WHOIS data, goto whois.domaintools.com, enter the target domain name and click on Lookup. Once the whois data is loaded, scroll down and you’ll seeWhois Record. Under this you’ll get the “Administrative contact email address”.
To get the domain registrar name, look for something like this under the Whois Record. “Registration Service Provided By: XYZ Company”. Here XYZ Company is the domain registrar. In case if you don’t find this, then scroll up and you’ll see ICANN Registrarunder the “Registry Data”. In this case, the ICANN registrar is the actual domain registrar.
The administrative email address associated with the domain is the backdoor to hijack the domain name. It is the key to unlock the domain control panel. So to take full control of the domain, the hacker will hack the administrative email associated with it. Email hacking has been discussed in my previous post how to hack an email account.
Once the hacker take full control of this email account, he will visit the domain registrar’s website and click on forgot password in the login page. There he will be asked to enter either the domain name or the administrative email address to initiate the password reset process. Once this is done all the details to reset the password will be sent to the administrative email address. Since the hacker has the access to this email account he can easily reset the password of domain control panel. After resetting the password, he logs into the control panel with the new password and from there he can hijack the domain within minutes.
How to protect the domain name from being hijacked
The best way to protect the domain name is to protect the administrative email account associated with the domain. If you loose this email account, you loose your domain. So refer my previous post on how to protect your email account from being hacked. Another best way to protect your domain is to go for private domain registration. When you register a domain name using the private registration option, all your personal details such as your name, address, phone and administrative email address are hidden from the public. So when a hacker performs a WHOIS lookup for you domain name, he will not be able to find your name, phone and administrative email address. So the private registration provides an extra security and protects your privacy. Private domain registration costs a bit extra amount but is really worth for it’s advantages. Every domain registrar provides an option to go for private registration, so when you purchase a new domain make sure that you select the private registration option.

Sunday, August 5, 2012

10 Ways to make Your Laptop Live Longer

10 Ways to make Your Laptop Live Longer

The glory of any electronic gadget is to last longer, as much years as it can spend. The durability of such device depends on its handling and utility. How it last depends on how the user make use of it. if you rough handle itm it breaks down so quickly, but if you handle with care you enjoy the longevity.
For example, my Nokia cellphone has been with mw for the past 3 years.
Laptops are very fragile electronics that needs to be handled with care for you to enjoy value for money. The glory of your laptop id for you use it, get tired of it because you want upgrade, give it out to a friend or sell it out a very good second hand deal to get a new or recent one. You will only enjoy this if you neatly handle your laptop.
When you buy a laptop, either a used or new one, you have to be aware that the life of your laptop in your hands.
From experience and feedback gotten from a laptop user forum, we bring you tips on "How you can maintain your laptop to still look new even after it has spent years in your hand"
1. Always be careful when plugging your power adaptor jack.
The motherboard is connected to the power adaptor jack with a solder point, you need to be very careful and you do not need to apply pressure or force while plugging the jack to your laptop, you should note this, do not use a loose jack adaptor, replace your charger with another original if you misplace it or it got damaged, loose jack causes damage to your adaptor as well as to the motherboard except you got lucky.
2. The cooling system should be cleaned with compressed air.
The cooling system in your laptop must be cleaned with a bottle of compressed air and you have to be careful about this. First, you need to open the case, call for an assistant if you cannot do that, then blow out the dust from the fan and the heat sink of the cooling system. You should practice this once a month to avoid stockpile of dust to damage the cooling system on your laptop. Thereby resulting into over-heating that now resultantly reduces the speed of your laptop processor, causing your laptop to get hanging all time. Static-neutral compressed air and Dust off is good at this.
3.Do not use your laptop on Bed or Soft surfaces.
Under and at the sides of your laptop are ventilation holes, the holes are there for your laptop to be able to suck in fresh air that cools down the system when it is working, using your laptop on soft surfaces blocks the air spaces and this results in over-heating that could quickly cause damage to your system.
The best place to use a laptop is on the lap; place it on hard surface whenever your lap is unavailable.
4. You can buy a cooling Pad
It is no more news that your laptop and other electronic devices generated heat while working, over heating should be avoided at all cost, the durability of a laptop depends on the temperature it always work.
Prevent over-heating on your laptop by using a cooling pad; it reduces the chances of your laptop failure that results from overheating.
5. You can download a Ccleaner.
Ccleaner is a freeware system privacy tool for optimization; it deletes internet history and other files freeing disk space, enhancing the speed of your computer.
6. Avoid drinking while using your laptop
No one is above mistake, do not consider yourself perfect, you may spill some liquid on your laptop when drinking while you are working, liquid quickly spoil electronics, if it gets to the panel and components, you may end up spending some hundreds of dollars on replacement or repair.
7. Manage the Battery Life
Over charging of laptop battery reduces the life span, only charge you laptop when the battery has reduced toe the minimum level. Also, it is recommended that you should completely drain your battery once a month.
8. Install an Anti-virus
Computer viruses and malwares are all over, they damage your computer program while some are sent to defile your computer security and spy data. An antivirus secures you from such. There are a number of them available for free download, but you need a premium antivirus if you want maximum security. Some examples of popular once include; AVG, Avast, Microsoft Essentials, Spybot etc.
9. Download your Operating system updates regularly.
This will give you more features and also avoid your system malfunction, these generation OS comes with a kind of security and such needs to be updated to enjoy its full services. Windows update is available on daily basis.
10. Properly Clean your Display Screen
Your device will look neat and new whenever you clean them properly, you laptop screen view will be clearer; this could be adopted as a daily practice. Soak a tissue in water and use it for the cleaning, use a dry tissue to clean afterwards. Do I need to tell you to avoid over-soak of tissue to the extent it starts dropping water on your laptop? You can get an LCD cleaner which makes your screen shiny and scratch free.
Hope you enjoy this compilation? Feel free to make your contributions.