Monday, 21 April 2014

How to get Saved Password from Browser

How to get Saved Password from Browser


How to get Saved Password from Browsers its easy and helpful sometime you need a saved password form victim computer there are may software that do this for you without even doing all this stuff ! you may get facebook password too :D so how to secure your password ? Don't save passwords -_-


Monday, 14 April 2014

Facebook Trolled by Google. Facebook interested Titan Aerospace Purchased By Google

Facebook Trolled by Google.

Google has purchased Titan Aerospace, a maker of drones that Facebook was reportedly interested in buying as well.


“Titan Aerospace and Google share a profound optimism about the potential for technology to improve the world," Google said in a statement provided to Mashable. "It’s still early days, but atmospheric satellites could help bring internet access to millions of people, and help solve other problems, including disaster relief and environmental damage like deforestation. It’s why we’re so excited to welcome Titan Aerospace to the Google family."

Titan's 20-person team will stay in New Mexico and work closely with Google on Project Loon, high-altitude balloons that provide Internet service to areas that currently lack such service. Titan may also work with Makani, a Google project that is developing an airborne wind turbine, according to The Wall Street Journal.

In addition, Titan's drones can collect real-time, high-resolution images of Earth, which may help Google's Maps unit, according to the report.

Friday, 11 April 2014

Cryptography-How to hide any files in an image

BlindSide is a cryptographic tool. It is possible to encrypt and hide almost any file in an image and then retrieve it later with blindSide. The larger the bitmap file, the more you can encrypt and hide in it. The original image as well as the encoded image looks similar when viewed by the human eye but when run through BlindSide, the hidden data may be revealed.


Tools required:
blindSide  pasword is  way2h
I uploaded the tool to mediafire so you guys can get it easier.
 
The Files required:
-a graphic in .bmp format (scenery pictures and photographs seem to work better that computer generated images)
-a file to encrypt (audio, application, anything, as long as it’s not too large)
 
To encrypt:
Rub blindside
-Open command prompt in the same directory as where the blindSide application is located.
-Now as example, to encrypt file “myAttacker.bat” into “originalImage.bmp” and save the encrypted file as “leetImage.bmp”, type the following excluding the quotation marks:
“BSIDE -a originalImage.bmp myAttacker.bat leetImage.bmp”
To be super safe, you can also add a password as shown below
“BSIDE -a originalImage.bmp myAttacker.bat leetImage.bmp PASSWORD”
 
To decrypt:
Rub blindside
-Open command prompt in the same directory as where the blindside application is located.
-Now to decrypt the same files as used above:
“BSIDE -x leetImage.bmp”
If you wanted to extract a specific file (e.g. myAttacker.bat) you could use the following:
“BSIDE -x leetImage.bmp myAttacker.bat”
If there exists a password for the encryption, the code below will be used:
“BSIDE -x leetImage.bmp myAttacker.bat PASSWORD”
 
To calculate the amount of data an image may hold:
“BSIDE -c originalImage.bmp”


To list files stored within an image: 
“BSIDE -l originalImage.bmp”
 
Why would you want to use blind side?
Well, let’s say I have a key logger, and a batch file to execute the key logger, I can encrypt the two files within an image file, use some binding with windows files functions and there you go. A key logger that runs on a clients machine without the user knowing. A tutorial on how to do this is soon to come if responses to this are good

Cryptography 102: History

Substitution Cipher

One of the most readily known Ciphers is called the substitution cipher, in fact you probably played with one as a kid. However what you didn't know is they are all very badly broken.

A Substitution Cipher is essentially where you create a table where you would say A = C, B = W, C = N all the way to Z = A. This table becomes your key for the cipher, we discussed keys in my earlier lesson. For instance is we had the word "ABBA" and we wanted to encrypt that using our cipher it would come out as "CWWC". To decrypt it we would just use the key in reverse.

Caesar Cipher

Back in the days of Rome when Caesar wanted to send secret messages to people he would use something he developed called the Caesar Cipher. This cipher essentially involves a shift in the letters. For example your Caesar Cipher may be a shift of 3, A = D, B = E, C = F... Y = B, Z = C.

In short this shifts all of the letters values over by 3.

Again we we had a message of "Hello" it would become, "Khoor". We do this by again shifting the letters by 3. They key in this case would be the shift of 3.

Breaking The Substitution Cipher

The first question to ask is what is the size of the Key Space? In other words how many keys could their possibly be assuming there are 26 letters. The key is simply a permutation of all of the letters, if you are a math student you should know that to calculate this you use something called a Factorial, denoted by 26!.

26! is equal to about roughly 2^88, meaning our key is an 88 bit key. A key of this size is very adequate, in fact we will be going over very secure ciphers in a bit with key spaces no bigger than that. However because of the way the Substitution Cipher works, it is very easy to break.

To break The Substitution Cipher we use letter frequencies, this is essentially using the probability of a letter occurring in the English language to break the Cipher. The most common letter in English text is the letter "e" at 12.7%, followed by "t" at 9.1% and then "a" at 8.1%.

So for example, if you gave me a Cipher Text to decrypt that was encrypted using a substitution cipher and I know the original plain text was English, I can crack it with only the cipher text and probability. I would count the frequency of letters in the cipher text, lets say "t" is the most common letter. I can say that the decrypted version of "t" is "e" with high probability.

We can then continue to do this with more letters as well as letter pairs. Frequent letters pairs like "he", "an", "in", "th" and so forth can help us even more to create the decryption table.

Next think you know your message is completely decrypted using only the cipher text, we call this kind of attack a Cipher Text only Attack. This is the lowest level of attack and if your cipher is susceptible to it, well it sucks Nono

Vigener Cipher

The Vigener Cipher combines two messages to create a new decrypted one.

k = C R Y P T O C R Y P T O C R Y P T
m = W H A T A N I C E D A Y T O D A Y
__________________________________

C = Z Z Z J U C L U D T U N W G C Q S

Here is an example of a Vigener Cipher. Pretend every letter has a numerical value, a=1, b=2, c=3 and so forth. In the vigener cipher we add up these values and create a new message with it. C+W=Z, R+H=Z, Y+A=Z, and so forth.

So the key in this case is the word "Crypto", replicated as many times as needed to fit the message. Again breaking this is very easy, but we must first assume we know the length of the key, in this case 6.

We would break up the cipher text into groups of 6.
ZZZJUC|LUDTUN|WGCQS

Than we look at the first letter of every group. We know that the most common letter is "e" so lets suppose we went and counted all of the first letters and it turned out to be "h". We know that H is most likely the encrypted version of "e" so theoretically if we subtract "E" from "H" we should get the first letter in the key. H-E= C which is the first letter in the key.

You would continue to do this for the second letter, and then third letter until the entire set is done using letter and letter pair frequencies. Lets say for instance that you did not know the length of the key, you would simply start and assume the key is the length of 1, solve for that.When it doesn't work you would then go to a length of 2, and so forth until it is decrypted.

Rotor Machines

Another famous example is the Rotor Machine. In a rotor machine the key changes after a letter is pressed. The key actually rotates. If we had a key that said Z = E, we then hit a number, that key would cycle over and A = E now. You can decrypt these using similar Cipher Text Attacks.


Cryptography 101: Overview

In this course you will learn how cryptographic primitives work, as well as how implement them correctly and securely.


Cryptography is Everywhere

Cryptography is used for secure communication
  • Web traffic is secured using HTTPS Cryptography
  • Wireless traffic uses an array of protocols such as 802.11 WPA2, GSM, Bluetooth

It is used for encrypting files on a disk for secure storage using tools like TrueCrypt and EFS.

DvD and Blu-Ray disks have content protection to protect them from being ripped and duplicated. DvDs are secured with CSS and Blu-Ray AACS. It just so happens that CSS is very broken and we will go over how to crack it in a later lesson.

Secure Communication

Everyday we use applications that talk to servers securely using Cryptographic Protocols. For example, when browsing the web we secure our data using HTTPS which is in fact just a protocol called SSL. The goal of this protocol is to make it so the data traveling across the network can't be read by an attacker or tampered with.

Secure Socket Layer

Secure Socket Layer (SSL) also known as TLS consists of two parts.

The first part is called the handshake protocol where the user and the server establish a shared secret key using public key cryptography (we will go over this later).

The second part is called the record layer in which we use this shared secret key to transmit data securely. Because only the user and the server know the key, an attacker can not read or tamper with the data.

Protecting Files on Disk

As I mentioned before, one of the main uses of cryptography is to secure data on a disk. The user generates a secret key just like in secure communication using SSL, this key in then used to write the files to the disk. When the user wants to read these files they must supply the proper secret key to properly read them. This means if the data is stolen it would be completely unreadable without the key, which we will assume the thief doesn't have.

Basic Cryptography

The fundamental building block of cryptography is called symmetrical encryption.

Basically the two parties communicating share a secret key in which the attacker does not know. They use this key in conjunction with a cipher, a set of encryption and decryption algorithms, to secure their data.

The encryption algorithm takes the original data and the secret key and produces what is called a "cipher text". For example, if the original data is the word "hello" the algorithm may convert that into "lb597z" using the secret key.

The decryption algorithm can than take that cipher text and the secret key and turn it back into the original plain text of "hello".

Types of Keys

Single use keys
A single use key is used to encrypt one message. For example, an encrypted E-Mail would generate a new key for every E-Mail.

Multi use keys
A Multi use key is used to encrypt multiple messages. For example, encrypting many files on a disk at the same time would use the same key for each file.

The Flood *Spreading Methods* Amazing Methods!

Method 1: YouTube Spreading
1. The things you will need in this method are a YouTube Account and a File Sharing Account.

2. Basically what you are going to be doing is record yourself using a program, attracting the user to download and execute the program.(The program will be binded with your stub)

3. So you will obviously need DarkComet or some other programs involving stubs. Bind your stub with the program that you are "advertising" or using in the video that you made with YouTube.

4. When your file is uploaded, you can post the link in the description and simply label it "Download Link" like this: [Image: aJXDCHT.png]

5. Make sure the site that you upload your file on doesnt have any surveys, this will turn off people from downloading your binded file.


Method 2 : VB Project + YouTube Spreading
1. The things you will need for this method are Visual Basic or Studio, a YouTube Account, and a File Sharing site.

2. This method is basically making a simple program(doesnt have to be simple) and binding it with your stub.

3. Things you could make are... a pinger with 1000's of packets(to lag people) a game launcher, an alarm clock, a website pinger(to snatch website ip's) and much more.(the booter/pinger will be very popular)

4. You are going to want to make a video of you using your program, then uploading to YouTube. You will bind your stub with the made program and upload it to a File Sharing Site.

 5. Some methods to spread your video and your download link are posting on pastebin, go on YouLikeHits and you can get your video many likes and views. Also, you can get subscribers. Last, you can post your programs on forums, there are many people looking for these little tools. You can learn how to make these tools on YouTube and Google.


Method 3: E-Whoring
1. E-Whoring is when you act like a girl, and get someone to download your infected file. This is a great method if you want this specific type of slaves; weirdos and desperate people.

2. Some sites you can E-Whore on are... Omegle, ChatRoulette, any chat room site, and forums. Theses sites and web "places" are the most popular places to E-Whore, and the most promising.

3. If you are going to E-Whore, you are going to have to act cute. I know this sounds pretty queer but whatever it takes to get bots and slaves.Some ways to E-Whore are to say that you have a picture of you, have a video of you, and or a slideshow of you. To do this, you will probably need an extension spoofer which you can find on HackForums, the search bar is your friend Thumbsup . Also, you must be patient and very persuasive in the process.

Thursday, 10 April 2014

How To Bypass(hack) Windows Password



hack windows seven password 
hack win xp password 
hack windows 8.1 password 
using KOUSB 


hello friends this is my first time m writing a blog , before then i just use copy and paste :P :D 

so today i am gona show you how to bypass windows password  usig bootable usb pendrive 

this is a linux based boot loader which bypass the *sam* folder and make your Operating system without password  

when u see a video   you will find that  on the login screen  windows ask for password thats because password is there  but this loader make the new sam file with blank password so u just press enter and done ! how hope u enjoy this

this is the download file u need http://www.mediafire.com/download/hhik4k1y7da0igr/KONUSB.rar



Monday, 7 April 2014

#OpIsrael, Hundreds of Israeli websites are being attacked by Anonymous hackers

#OpIsrael, Hundreds of Israeli websites are being attacked by Anonymous hackers

Hundreds of websites of Israeli ministries and organizations came under attack by Anonymous early Monday as part of the hacktivist group's anti-Israel operation, dubbed #OpIsrael.

“On April 7, 2014, we call upon our brothers and sisters to hack, deface, hijack, database leak, admin takeover, and DNS terminate the Israeli Cyberspace by any means necessary” the group said in a statement.

The move is an act of protest against Israel's policies, including those against Palestine.

“The further assault on the people of Gaza, who have been flooded by your sewage, terrorized by your military apparatus, and left to die at the border while waiting for medical attention will NOT be tolerated anymore,” the statement read.

“We will not stop until the police state becomes a free state and Palestine is free.”

On a website dedicated to the event, another hacker group – AnonGhost – posted a video saying that the attack will target every possible Israeli website in order to show solidarity with Palestine.

In March, hackers united under the AnonGhost banner claimed to have crashed the website of Israel’s Ministry of Agriculture and Rural Development. The group posted the logins and passwords of the website’s users online.

The first cyber-attacks under the name OpIsrael were launched by Anonymous during and Israeli assault on Gaza in November 2012. Around 700 Israeli websites, including high-profile government setups such as the Foreign Ministry and the Israeli President's official website, were taken down. Following the attack, Anonymous posted the personal data of 5,000 Israeli officials online.



The websites of the Israeli parliament, ministries and other government organizations stopped operating for some time after last year's attack, which also took place on April 7.

A Middle East hacker who participated in the operation told RT that the “aim of the attack was to show the world the true face of Israel and its armed forces.” He said that last year’s attack was a warning for Israel to be ready for new, larger “surprises.”

In retaliation against the massive assault, Israeli hackers allegedly broke into the website OpIsrael.com and posted pro-Israeli content. The site was allegedly being used to coordinate cyber-attacks on Israeli sites. 


Hackers:

Mauritania Attacker - Virusa Worm - Deto Beiber - Dr.SaM!M_008 - M3GAFAB - Extazy007 - PhObia_PhOneyz - Mr Domoz - Tak Dikenal - AnonxoxTN - Raka 3r00t - PirateX - Bl4ck Jorozz - Younes Lmaghribi - Indonesian r00t - BlackBase Hacker - CoderSec - h4shcr4ck - Mrlele - Donnazmi - TheGame Attacker - SaccaFrazi - Egy Eagle - Mr.Ajword - HusseiN98D - Pr3d4T0r - THE GREATEST - HoLaKo - Man Rezpector - BiosTeRminat0r - Spec Tre - Hani Xavi - Don Maverick - RevCrew - Psyco Hacker - Black Cracker - rummykhan - VINUX - ARAFET - TITO_SFAXSIANO - SQUICK HACKER - Root Max and probably a lot more that are not listed.


DDOS Attack:

Hacked Sites List:
Israeli Gov password hashes and emails http://pastebin.com/XLyGkBYF

http://www.refuatyeladim.co.il/
http://www.gush-etzion.co.il/
http://www.cooler-mizug.co.il/
http://www.facesofberlin.org/
http://www.fried-hebron.co.il/
http://www.nofeimamre.com/
http://www.chabadnelson.com/
http://www.yachadisrael.org/
http://www.tiferethanna.com/
http://www.bakufsa.com/
http://www.zimmer-yehuda.co.il/
http://www.hadesk.co.il/
http://www.ora-vitrage.co.il/
http://elilev.me/
http://www.talkshow.co.il/
http://www.14across.co.il/
http://www.14across.com/
http://www.bwithme.co.il/
http://www.camacal.co.il/
http://www.danielzelig.com/
http://www.goingoout.co.il/
http://www.ideals.co.il/
http://www.newpro.co.il/
http://www.talkshow.co.il/
http://www.webhostsstatus.com/
http://cleanex.co.il/
http://adel.co.il/
http://www.doritsivan.com/
http://www.mediaportal.co.il/
http://fb4success.co.il/
http://www.extra-tlv.co.il/
http://eco-artvillage.org/
http://gil-text.com/
http://panpirsum.co.il/
http://www.down-from-youtube.com/

http://www.galilchocolate.co.il/
http://www.farod-inn.com/
http://www.dreamingforpeace.com/
http://doula4life.com/
http://dorit-coach.co.il/
http://www.ditiyair.com/
http://www.villa-tehila.co.il/
http://www.visual-taste.com/
http://www.webysitter.co.il/
http://www.yaelfriends.com/
http://www.yarokyarokevents.com/
http://derech-hashani.com/
http://www.orly-yeor.co.il/
http://ylogo.co.il/
http://www.yofitofiart.com/
http://www.zalishnik.co.il/
http://www.daliaoz.com/
http://www.csttax.co.il/
http://www.career360.co.il/
http://constellations.org.il/
http://www.biodog.co.il/
http://www.baofan.co.il/
http://www.bizcity.org.il/
http://anzor.co.il/
http://all2cad.co.il/
http://adalya.co.il/

http://hdesigners.co.il/my/
http://hdesign.co.il/my/index.php
http://hayadrori-law.co.il/my/
http://hawwai.co.il/my/index.php
http://judaicaisrael.co.il/my/index.php
http://isahar.co.il/my/index.php
http://ideo.co.il/my/index.php
http://gymtogo.co.il/my/
http://guyroze-law.co.il/my/
http://grfit-ag.co.il/my/
http://green-leaf.co.il/my/
http://gether.co.il/my/
http://haybniya.co.il/my/
http://hinashelly.co.il/my/
http://helena-cate.co.il/my/

http://mh-club.co.il/
http://www.mistica.org.il/wp-content/
http://מורה-פרטי.co.il/
http://שיעורי×-פרטיי×.co.il/
http://מורהפרטית.co.il/
http://irita.co.il/
http://lwp.co.il/
http://netadieta.co.il/
http://tnufabook.co.il/
http://forward-seo.co.il/
http://tgr.co.il/
http://mobland.co.il/
http://mobland.co.il/index.html
http://mishol.co.il/
http://www.greenify.co.il/
http://www.gargamel.co.il/


Hacked by @security_511 http://mops.gov.il/ http://pastebin.com/BZkAegrL 8 emails + pass @Op_Israel @AnonOpIsrael #Opisrael #OpIsraelBirthday

SITE: http://horadot.co.il/vengenz.html STATUS:#defaced #hacked 
#AnonsIndonesia #OpIsraelBirthday #OpIsrael


The Interreligious Coordinating Council in Israel Website Users Leaked By #AnonGhostTeam http://pastebin.com/MYARx01X

And many many more. For more Visit zone-h.

Sunday, 30 March 2014

Indonesia Website Hacked By BarrabravaZ, ISRAEL CYBER ARMY

Indonesia Website Hacked By BarrabravaZ, ISRAEL CYBER ARMY.

Today 100+ websites hacked by an other Muslims Hackers Group but it seems like Israeli hackers are also active in these days. According to deface page there are not any thing specifically mention about this hack. But still these kinds of attack really rise many questions for performance of security experts.


Deface Page Say's:
"# HackeD By : BarrabravaZ #
[ ISRAEL CYBER ARMY ]
Greetz to./Israel Haxor and All Member Israel Cyber Army"

Hacked Sites:
GO.ID http://inspektorat.dumaikota.go.id/  
CO.ID http://taksibosowa.co.id/  
AC.ID http://univpgri-palembang.ac.id/  
OR.ID http://apchiergofuture2014.or.id/  
SCH.ID http://smkbinataruna1medan.sch.id/  
WEB.ID http://dapursitus.web.id/  
MY.ID http://fakhruddin.my.id/



author

About Author:

Muhammad Usman - Designer, Security Expert and Programmer.
Muhammad Usman is a Professional Geek. Follow him on Facebook, Twitter, Google+, LinkedinPinterest and Soundcloud.

99 Israeli Websites 0wn3d bY AnonGhost

99 Israeli Websites 0wn3d bY AnonGhost.

According to hackers, this was just a warning attack. The real attack on Israeli cyber space will be after 3 days(7 Apr 2014). Whole server is massively defaced and hackers message is displaying on each hacked site. This kind of attacks rise many questions for security experts that how much hackers become powerful and there is not enough knowledge security experts have.



Deface Page Say's:
"Hi Israel !
We always here to Punish you as we did on the last Operation 7 April and we back again to celebrate it
Because We are the voice of Palestine and we will not remain silent!!

Muslims are everywhere - We will enter to Palestine soon :) remember this :D 

Alkhilafah is Coming soon Insha'Allah"

Hacked Sites:

http://fpisrael.co.il/index.htm 
http://fanpagepro.co.il/ 
http://opticcenter.co.il/ 
http://intersurf.co.il/index.htm 
http://master-market.co.il/index.htm 
http://elit.org.il/index.asp 
http://mtns.co.il/ghost.htm 
http://melach-haaretz.co.il/index.htm 
http://elicohen.org.il/index.htm 
http://elazraki.org.il/index.htm 
http://burgerville.co.il/ 
http://komunityproject.co.il/index.htm 
http://coolshoe.co.il/index.htm 
http://aclimatic.co.il/index.htm 
http://www.agr-non.co.il/index.htm 
http://animalhouse.co.il/index.htm 
http://harel.co.il/index.htm 
http://ibca.org.il/index.htm 
http://colorless-carotenoids.com/index.htm 
http://dormins-technology.com/index.htm 
http://phyto-flu-ene.com/index.htm 
http://phytoene-phytofluene.com/index.htm 
http://ibrlogin.com/index.htm 
http://antiaging-dormins.com/index.htm 
http://skincarotenoids.com/index.htm 
http://skin-youth.com/index.htm 
http://prophyderm.com/index.htm 
http://phytoeneandphytofluene.com/index.htm 
http://ariel-weltsch.com/index.htm 
http://arnongolani.co.il/index.htm 
http://bizbazz.co.il/index.htm 
http://bootnest.com/index.htm 
http://buna.co.il/index.htm 
http://www.classico-group.com/index.htm 
http://classigan-ltd.co.il/index.htm 
http://dan-viro.co.il/index.htm 
http://elazraki.org/index.htm 
http://en-levant.com/index.htm 
http://eyal-cpa.co.il/index.htm 
http://fineschmeckers.com/index.htm 
http://golanplastic.com/index.htm 
http://gvahim-ltd.co.il/index.htm 
http://www.gvahim.com/index.htm 
http://handsontraining.co.il/index.htm 
http://handson-training.com/index.htm 
http://hatraklin.co.il/index.htm 
http://haygroup-web.com/index.htm 
http://hummer2rent.co.il/index.htm 
http://ibrweb.com/index.htm 
http://idc-diamond-deal.com/index.htm 
http://moriah-collection.com/index.htm 
http://iicc.org.il/index.htm 
http://josephbau.com/index.htm 
http://josephbau.org/index.htm 
http://kakkoii-fashion.com/ghost.htm 
http://levant.co.il/ghost.htm 
http://limelect.com/ghost.htm 
http://mbegood.co.il/index.htm 
http://memorex.co.il/index.htm 
http://mhasharon.co.il/ghost.htm 
http://miriambenhaim.com/ghost.htm 
http://mirshamim.co.il/index.htm 
http://mobisoft.co.il/ghost.htm 
http://monplatin.co.il/index.htm 
http://mor-logistics.co.il/index.htm 
http://moraz-pregnancy.com/index.htm 
http://mottichef.co.il/index.htm 
http://navy-raoul.com/index.htm 
http://kachol-atlit.co.il/index.htm 
http://neve-yam.co.il/index.htm 
http://nevemarom.co.il/index.htm 
http://www.nirugroup.com/index.htm 
http://nofim.net/index.htm 
http://nordic-dog-club.co.il/index.htm 
http://oig.co.il/index.htm 
http://opticjunior.co.il/index.htm 
http://rain-line.com/index.htm 
http://samarkand.co.il/index.htm 
http://www.sandwich-factory.co.il/ghost.htm 
http://sh-m.co.il/index.htm 
http://shay-cb.co.il/ghost.htm 
http://shay-cb.com/ghost.htm 
http://shtechs.com/ghost.htm 
http://www.sivan-digital.com/index.htm 
http://www.sivan-group.net/ghost.htm 
http://steinmetz-foundation.co.il/ghost.htm 
http://www.supercom.com/index.htm 
http://talyam.co.il/index.htm 
http://www.tavlit.co.il/ghost.htm 
http://terminator.co.il/index.htm 
http://www.the7d.co.il/index.htm 
http://www.the7d.com/index.htm 
http://www.ti-group.co.il/ghost.htm 
http://indoor-outdoor.co.il/index.htm 
http://transelectric.co.il/index.htm 
http://w2pcardpack.com/ghost.htm 
http://werubel.co.il/index.htm 
http://x-pens.com/index.htm 
http://yehudalight.co.il/index.htm



author

About Author:

Muhammad Usman - Designer, Security Expert, Blogger and Programmer.
Muhammad Usman is a Professional Geek. Follow him on Facebook, Twitter, Google+, LinkedinPinterest and Soundcloud.

Saturday, 15 March 2014

Malaysian Missing plane could have been hijacked to Pakistan: US Media

Washington- The missing Malaysia Airline flight MH370 could have flown for an extra four hours after it lost contact with air traffic controllers and could had been hijacked and landed in Pakistan, according to American media reports.
In another dramatic twist, aviation experts believe the plane flew for a total of five hours under radar.
The possibility means the plane could have travelled for another 2,200 miles to Pakistan or Mongolia, according to the Wall Street Journal.


The plane could had been hijacked and taken to an unknown location – one of many theories as to what may have happened to the disappearing plane.
The Wall Street Journal said it isn’t clear whether investigators have evidence of a hijacking – but they haven’t ruled the possibility out.
US investigators are looking into the prospect and counter terrorism officials are investigating the idea that the plane’s transponders were turned off intentionally and the aircraft was diverted when an image appeared to show debris.
It is based on data automatically downloaded and sent to the ground from the aircraft’s Rolls Royce engines as part of a standard monitoring program.
The Boeing 777 jetliner vanished six days ago with 239 people on board. The flight left Kuala Lumpur at 4.41pm GMT bound for Beijing, but less than 50 minutes later it lost communication with air traffic control. But a senior Malaysia Airlines official told journalists that no such data relating to the potential extra flight time existed, while a second official said he was unaware of it too.
A spokesperson for engine manufacturer Rolls-Royce had no immediate comment. Malaysia Airlines said previously the engines stopped transmitting monitoring signals when contact with the plane was lost. The engines should transmit live data to the ground every 30 minutes.
Hopes were raised when a Chinese state agency released satellite images of three pieces of large debris floating near the plane’s last recorded position in the South China Sea but found nothing.

Sunday, 23 February 2014

Google Acquires Spider.io To Help Spot And Stop Online Ad Fraud



London-based Spider.io has been acquired by Google, the company’s DoubleClick advertising blog announced today (via Re/Code). Spider.io is a startup that specialized in weeding out fraudulent clicks around online ads. The three-year old company has tech that will help Google identify bad behavior around their content in video and display ads on the web, to help them get a more accurate picture of what is and isn’t succeeding.

From Google’s official blogpost on the deal:
Advertising helps fund the digital world we love today — inspiring videos, informative websites, entertaining apps and services that connect us with friends around the world. But this vibrant ecosystem only flourishes if marketers can buy media online with the confidence that their ads are reaching real people, that results they see are based on actual interest. To grow the pie for everyone, we need to take head on the issue of online fraud.
Google isn’t revealing the terms of the deal, but the small London company is only seven strong, and this is a fairly specialized niche product so it’s unlikely to have been a huge exit. Still, the Spider.io team brings some impressive talent to Google’s ranks, including three PhDs and a an ex-Yahoo natural language processing and artificial intelligence expert.


Spider.io’s tech is designed specifically to detect attacks originating from PCs infected by malware. Often these hijacked computers are programmed by their attackers to place a high volume of ad requests, thus skewing the numbers and defrauding online advertisers out of millions of dollars. An FT article from last year revealed that one botnet last year managed to falsify billions of web-based ad clicks, sometimes accounting for as much as two-thirds of the sum total of visits to some websites.

Wednesday, 5 February 2014

100+ Indian Website Hacked By Hexlook, Pakistani Hackers

100+ Indian Website Hacked By Hexlook for Kashmir In Solidarity with Kashmir by Pakistani Hackers.

THE WORST ATTACK OF 2014 on Indian Cyber Space. Today(5 Feb 2014) was public holiday in Pakistan as Kashmir Day. Today most of Pakistani Hacktivists group attack on Indian Cyber Space to deliver message for the freedom of Kashmir. Its very rare moment to see all Pakistani Hackers working together for same reason. All Indian sites display message “Free Kashmir .. Freedom is our goal, End the Occupation” on their Index pages.


Hacked Sites List:
http://www.tnagaryellowpages.in/
http://www.nazaqat.co.in/
http://www.sonymax.in/
http://www.atticholidays.com/
http://www.kilpaukyellowpages.in/
http://www.augustinelopez.com
http://www.americaneducationaids.com/
http://www.kitba.in/
http://www.gingerholidays.com/
http://www.gmatbest.com/
http://www.grebest.com/
http://www..mdacs.org.in/
http://www.floralgallery.in
http://www.gingerholidays.com
http://www.cityfarmers.in
http://www.divinemercyministries.in
http://www.classehousing.in/
http://www.pilgrimtours.in/
http://www.sncentralschool.com/php/displayContent.php?lid=13&cd=0
http://www.annmaria.co.in/php/showVideo.php?id=69
http://www.holyangelschool.in/
http://www.camerascan.in/services.php
http://www.meherastana.com/index.php?mode=Contact%20Us
http://www.riseconsultant.com/page.php?id=4
http://matin.co.in/product.php
http://www.gladhotels.com/
http://www.motivatorhub.com/
http://www.bvcorphr4u.com/vision_mission.php
http://www.itfcevents.com/
http://empireeventskerala.com/gallery.php
http://www.gseventscochin.com/
http://www.princytours.com/contact.php
http://www.holyangelschool.in/php/displayContent.php?lid=1
http://www.gladrealtors.com/
http://www.gayathricentralschool.com/php/displayContent.php?lid=6
http://www.meenumixonline.com/press.php
http://www.ernakulampressclub.com/news&event.php
http://www.vriddhiedubrain.com/
http://wwwabhilashgroup.in
http://wwwaquariusengineeringcompany.com
http://wwwalbrieuxafricatours.eu
http://www.alphysclub.com
http://www.ecoexotica.com
http://www.eservpartners.com
http://www.fortcastle.com
http://www.getschoolednow.org
http://www.gingerholidays.com
http://www.gladcares.com
http://www.gladdesigns.com
http://www.gladhotels.com
http://www.gladrealtors.com
http://www.gladnewsletter.in
http://www.gladshopping.com
http://www.gladshop.in
http://www.gladtech.in
http://www.gladsolutions.com
http://www.creativeoceandesigns.com/
http://www.gladtours.co.uk
http://www.riseconsultant.com/page1.php?id=4
http://www.gladtours.us
http://www.INDIAWEBDESIGNOUTSOURCECOMPANY.CO.UK
http://www.holylandtouroperators.com
http://nascapsgroup.com
http://www.INDIAWEBDESIGNOUTSOURCECOMPANY.US
http://www.INDIAWEBDESIGNOUTSOURCECOMPANY.IN
http://www.indiawebdirectory.in
http://www.ISRAELHOLYLANDTOURS.INFO
http://www.kahalam.in
http://www.jeevanadham.com
http://www.KCLIVING.US
http://www.KCMIDTOWNLIVING.US
http://www.keralaindiatouroperators.com
http://www.KERALASOLARDEALERS.COM
http://www.kochivaalaas.com
http://www.keralatourguides.com
http://www.kripaholidays.com
http://www.tourisminsingapore.com
http://www.syedattars.com
http://www.KRISTUJAYANTIAYURCENTRE.COM
http://www.legalmaxims.org
http://www.kjmaruthitrust.com/
http://www.suneeshdesinger.in
http://www.mamsacademy.org/our_team.php
http://www.SUNEESHDESIGNER.IN/
http://www.marcreading.co.uk
http://www.SEHIONPILGRIMAGES.COM
http://vnvandcompany.com/
http://www.provvidenzaholidays.com
http://www.marcreading.com
http://www.gmgranites.com/admin/
http://www.pondicherrymaritime.com
http://www.MERCEDARIANSINDIA.ORG
http://www.opticalsshop.com
http://www.poai.in
http://www.mojind.com
http://www.nelliindia.com
http://www.moonshealth.com
http://www.3cats.es
http://www.mcpsfortcochin.com/