twitter
    Find out what I'm doing, Follow Me :)

Computer facts....

1. The first computer mouse was invented by Doug Engelbart in around 1964 and was made of wood.

2. 80% of all pictures on the internet are of naked women.

3. Bill Gates' house was designed using a Macintosh computer.

4. For every 'normal' webpage, there are five porn pages.

5. "Stewardesses" is the longest word that is typed with only the left hand.

...............................................................................

1. On eBay, there are an average of $680 worth of transactions each second.

2. "Stewardesses" is the longest word that is typed with only the left hand.

3. 80% of all pictures on the internet are of naked women

4. In the 1980s, an IBM computer wasn't considered 100 percent compatible unless it could run Microsoft Flight Simulator*.

5. The world's first computer, called the Z1, was invented by Konrad Zuse in 1936. His next invention, the Z2 was finished in 1939 and was the first fully functioning electro-mechanical computer.

21 6. The first computer mouse was invented by Doug Engelbart in around 1964 and was made of wood.

7. Domain names are being registered at a rate of more than one million names every month.

8. There are approximately 1.06 billion instant messaging accounts worldwide.

9. The first banner advertising was used in 1994.

10. E-mail has been around longer than the World Wide Web.

List of World Best Top Hackers of All Time



Hackers, a group that consists of skilled computer enthusiasts. A black hat is a person who compromises the security of a computer system without permission from an authorized party, typically with malicious intent. The term white hat is used for a person who is ethically opposed to the abuse of computer systems, but is frequently no less skilled. The term cracker was coined by Richard Stallman to provide an alternative to using the existing word hacker for this meaning.The somewhat similar activity of defeating copy prevention devices in software which may or may not be legal in a country's laws is actually software cracking........

There are numbers of Hackers in the world till date, Few has become famous by their Black hat work and few of them are famous by their Ethical Hacking. Below is separate list of World's All Time Best Hackers and Crackers. Although I represent them by Hackers only because what every they did, was wrong but one thing is sure they were Brilliant. Hacking is not a work of simple mind, only Intelligent Mind can do that.

Gary McKinnon
Gary McKinnon, 40, accused of mounting the largest ever hack of United States government computer networks -- including Army, Air Force, Navy and NASA systems The court has recommended that McKinnon be extradited to the United States to face charges of illegally accessing 97 computers, causing US$700,000 (400,000 pounds; euro 588,000) in damage.


Jonathan James
The youth, known as "cOmrade" on the Internet, pleaded guilty to intercepting 3,300 email messages at one of the Defense Department's most sensitive operations and stealing data from 13 NASA computers, including some devoted to the new International Space Station. James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive e-mails and capture employee usernames and passwords.James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, “The software supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost

Adrian Lamo
Dubbed the “homeless hacker,” he used Internet connections at Kinko’s, coffee shops and libraries to do his intrusions. In a profile article, “He Hacks by Day, Squats by Night,” Lamo reflects, “I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional.”Dubbed the “homeless hacker,” he used Internet connections at Kinko’s, coffee shops and libraries to do his intrusions. For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker.

FACEBOOK PASSWORD CRACKING

The firts time you should do is to know the email address used for facebook account that you want to crack.

You can get email addresses from newsgroups on google or yahoo and some chatting of the internet. When you are communicating, you can ask them their facebook account. If you already have an email account that in use on facebook, you can proceed to the following steps:

1. Download Facebook cracker at here. 5 MB of File Capacity
2.Install Java Runtime Environment (JRE). This software is available in many site on the web.
3. Open the tool and add the email you want to crack.
4. You must have a list of passwords on the notepad and add it to the password box. (FB cracker uses brute force technique to the attack .)
5. The last, cracking start ...
download from under url

http://rapidshare.com/#!download|433l34|261012027|IndoGear.Com.FB.Cracker.zip|5611

BASIC KNOWLEDGE OF PASSWORD CRACKING

Passwords are typically encrypted when they’re stored on a computer, using an encryption or one-way hash algorithm such as DES or MD5. Hashed passwords are then represented as fixed-length encrypted strings that always represent the same passwords with exactly the same strings. These hashes are irreversible for all practical purposes, so, in theory, passwords can never be decrypted. Furthermore, certain passwords such as those in Linux have a “salt” value added to them to create a degree of randomness. This prevents the same password used by two different people from having the same hash value.

Windows usually stores passwords in these locations:
• Security Accounts Manager (SAM) database
(c:\winnt\system32\config)
• Active Directory database file that’s stored locally or spread across domain controllers (ntds.dit) Windows sometimes stores passwords in either a backup of the SAM file in the c:\winnt\repair directory or on an emergency repair disk. Some Windows applications store passwords in the Registry or as plaintext files on the hard drive!
_ Linux and other UNIX variants typically store passwords in these files:
• /etc/passwd (readable by everyone)
• /etc/shadow (accessible by the system and the root account only)
• /etc/security/passwd (accessible by the system and the root account only)
• /secure/etc/passwd (accessible by the system and the root account only)

Password-Cracking Software

You can try to crack your organization’s operating system and application passwords with various password-cracking tools:

- pwdump3 extracts Windows password hashes from the SAM database.

- John the Ripper cracks hashed UNIX and Windows passwords.

- Proactive Password Auditor runs brute-force, dictionary, and rainbow cracks against extracted LM and NTLM password hashes.

- Cain and Abel cracks LM and NTLanManager (NTLM) hashes, Windows PWL passwords, Cisco IOS and PIX hashes, VNC passwords, ADIUS hashes, and more.

- RainbowCrack cracks LanManager LM) and MD5 hashes very quickly by using rainbow tables.

- Elcomsoft Distributed Password Recovery cracks Microsoft Office, PGP, and PKCS passwords in a distributed fashion using up to 2,500 networked computers at once.

- Proactive System Password Recovery recovers practically any locally stored Windows password, such as logon passwords, WEP/WPA passphrases, SYSKEY passwords, RAS/dialup/VPN passwords, and more.

- chknull checks for Novell NetWare accounts with no password.

- Pandora cracks Novell NetWare passwords online and offline

TRAINING TO BE HACKER FOR BEGINNERS

To become a competent hacker, need for training and testing, before an attack. The goal is clear, so that the victim site was not damaged. Moreover, the definition of hacker is one who can penetrate the computer system without damaging the system.

For beginner of hackers, should learn the web programming such as PHP and Javascript. On the internet, many web that offer learning web as http://www.w3schools.com/js/default.asp.

If you already understand some of the syntax, commands or code you visit on http://www.hackthissite.org to test your understanding of hacking websites. After registration you will be confronted with several missions from the basic hacking untill the most difficult. These missions are a challenge to hack with a search for security holes so we can penetrate. These missions include:


- Basic mission
- Realistic missions
- Application missions
- Programming missions
- Logic missions
- Extbasic missions
- Javascript missions
- Stego missions

7 WAYS TO HACK FACEBOOK ACCOUNT

Method of data theft on facebook is a lot of interesting things in the discuss and the search. The following ways are usually used by hackers to obtain personal information of facebook account:

1. Social engineering tools: how to trick the victim to deceptive telephone and internet media,

2. Phishing tools: deceptive actions by falsifying the original site.

3. Sniffing tools: tricks to tap information on wireless computer networks or cable, using software like Able Cain - aircrack - snort - nmap.

4. Keylogger tools. almost the same as sniffing action but straight from the source intercepts every keyboard keystrokes the victim, usually a keylogger installed on computers that have public access

5. Brute force tools. This action is a direct attack by hackers to a Web site offering profile,

6. Facebook Application tools. tricks hackers can access the necessary data to your computer when you install the application on the profile. currently there are several types on facebook apikasi dangerous values are 'the Facebook users', 'the Secret Crush Check System Error', 'My Account' and 'Rule-Breaking For reported'.

7. Exploits a vulnerability tools. This is a hacking technique which is always updated, ie by finding the weakness of the system facebook site.

9 WRONG COMMON MYTHS ABOUT COMPUTER

Wrong myths around the computer is one of miss understanding in society. Along the development of computers, not all myths are true. Here is a nine wrong myths about the computer:

1) To improve the computer speed and it’s performance, we have to upgrade his hardware. Speed computer performance, depending on several factors like software as well.

2) Good computer performance will make the faster to your Internet connection. In fact, the internet connection not only need good computer performance.

3) virus is the main thing cause disturbance on the computer. In fact, that interfere with the computer very much, including electric power and human error.

4) The more expensive computer is the better the quality. The most important thing here is the selection of types and brands of compatible hardware. So, expensive hardware if not support to other, it would trigger new problems.

6) The company should replace to new computer for two years. The most important thing is to see its usefulness. If only in use for typing course, it does not need to replace the computer.

7) Computers will last longer if the let burn.
First necessary to turn the computer on which a large electric power and to maintain the stability of the temperature inside the computer is advisable not too often turned on and off the computer. But it was no longer applicable to today's computers.

8) Hackers can cause a world war. In lot of movies or stories are often portrayed that a hacker can break through the military facilities of a country that has nuclear weapons and create interference with nuclear directs owned to another country.

9) The greater the power the CPU, the faster the computer
Many people assume greater clock speed MHZ processor is marked with the faster a computer. What exactly is the speed of a processor has very little effect on the overall performance of computers, there are still other factors are more dominant for example: cache size, graphics capabilities and hard disk access time.

9) Apple / Linux is more secure than Windows
Windows operating system is often referred to as the most vulnerable because they are making Windows as a target so 'excited' for Windows users in the world. For Mac OS X would often get security patches, though often late and for Linux was not much different.

7 CARELESSNESS OF FACEBOOK USERS

The emergence of Facebook as a leading social networking today, was not in balanced with strong security systems to personal data held by a facebook user.

According to Consumer Reports Magazine, more than half of social networking users inadvertently disclose their personal data, which can be used for evil motives. Consumer Reports Magazine revealed that seven Blunder by Facebook users:

1. Using a weak password
It should use the 8 character password that contains a combination of uppercase, lowercase, numbers and symbols.

2. Bring birth date
Date of birth should not be in the show to just anyone, because people can use to break through a credit card or bank account.

3. Ignores Privacy Control
Facebook Privacy Control serves to maximize access restrictions beyond those of personal data. because people who are not in the know will not be free to access all data on the profile and photo gallery.

4. Posting Child Name in Photo Caption
Child's name often used by a parent to make email password or his facebook account. By placing the child's name, there is an opportunity to guess passwords.

5. Citing information while traveling Far
By claiming the status of being away from home so that no one was at home today. this can be utilized person who intends evil.

6. Leaks of Personal Data on Search Engine
Your personal data may not be until the leak to the search engines like google, to do re-adjustment section 'Search' on facebook's privacy controls. Select the option 'Only Friends' and make sure that the box 'Public Search' is not checked.

7. Allowing a child to use Facebook without supervision.
Now many of the children and teenagers who use Facebook so make sure parents are always watching.

Overview of Hacker..?

The hackers used his expertise in computers to view, find and fix vulnerabilities security system in a computer system or in a software. Therefore, thanks to the hackers, the Internet is there and can we enjoy today, and even continued to be improved to become an even better system. So hackers can be referred to a hero's network is a cracker can be called a criminal network because doing do infiltration with the intent to benefit himself personality mean harming others. Hackers often called white hackers (which is the real hackers who are building) and black hackers (crackers who are dismantling and destroying).

There are 2 types of hacking:

1. Social Hacking, hacking activities will be undertaken to obtain information about what system is used by the server, who the owner of the server, who the administrator who manages the server, what type of connection used and how the server is connected to the internet, use one connection and any information provided by the server, if the server is also connected to the LAN in an organization and other information.

2. Technical Hacking, is a technical action to the infiltration into the system, either with the tool (tool) or using the facilities the system itself that is used to attack the weakness (security holes) contained in the system or service. The core of this activity is to gain full access into the system in any way and how even.

STEALING FACEBOOK ACCOUNT BY FAKE LOGIN PAGE

Currently, Facebook is the most popular of social networking site on cyber world then other.. Based on latest data of Check Facebook, the Facebook users all over the world are reach 230,379,660 users with the biggest users are from the United States of America reached 70,340,120 users. While the country with the largest growth of facebook users are Taiwan reached 15.79% of the total 102,140 users.

A large number of facebook user is one of the cyber crime target both interact through fraud in the facebook and steal the account in the experiment. For with spring a trap, then the username and password opted more and more.

Setting Up The Attack.
This tutorial will use phishing techniques that trepan facebook users included in a facebook copycat form of a trap similar to the original view facebook. If the careless, the user is stuck and Hi will enter a username and password on the login box. Tyhen the account that entered will be saved in a online file and we can check at any time and anywhere.

Here are the stepping of attacks:
1. Make a script file of fake login page. On the internet, this script is already in wide circulation. The script is divided into 2 files which contain the file in PHP called index.php and a executor file that called write.php which can be downloaded here.

2. Both files are uploaded to our web hosting that supports php language. You can search the web hosting in google. In this tutorial we use www.ripway.com. To register, click at here.

3. In the ripway, go to the My Files tab, so, the two files that we upload will appear. Well, the address of the Direct Link in the index.php file is a link that we need to steal facebook account.

Launch The Attacks.

We need to use the Address link of index.php with a little clumsy. For example if the victim was getting emails from facebook to confirm or invitation tobe friend. To further refine, can use a fake email with the sender name is admin.facebook or the other. So, the victim is not suspicious at all. To fill email content, copy and paste the confirmation email from facebook.

Or we can directly access the victim computer with changing the default address bar of the computer browser to fake facebook.

All the stolen account will be stored automatically in a file called password.txt that automatically appear in Ripway. Refresh or press F5 to see the latest account stored.

To Prevent Fake Facebook.
To prevent facebook phishing techniques is improving vigilance. The step details are as follows:

1. Answer confirmation to the people who already know us only
2. Make sure, the only original facebook address is http://www.facebook.com
3. Bookmark the original Address of facebook
4. See confirmation link. If the link is not listed in the facebook address genuine, please ignore it.the original CONFIRMATION includes the original address as : http://www.facebook.com/n/?reqs.php&mid=b676a5G6a24e19G74e2aG2
5. Always follow the improvement of cyber crime news.

Top 3 methods to hack facebook password

In this post I will tell you the Top 3 Methods Which hackers use to Hack Facebook passwords and some counter measures also to help you protect your Facebook account from Hackers. In my previous posts I have mentioned lots of techniques to Hack a Facebook Password but In this article I will highlight the most effective ones.e

A lot of people contact me about suspecting their boyfriend/girlfriend of cheating, but they are on Facebook and ask why I haven’t written a guide for hacking Facebook passwords.

The following are the methods used by most Hackers to Hack a Facebook Password
--> Keyloggers
--> Mobile Phone Spying
--> Phishing

Keyloggers
(Spying Softwares)
Well keylogging is the widest and most commonly used Technique to Hack a Facebook Password. A keylogger is a piece of software used to record keystrokes( Keys that were typed) on a computer.Keyloggers support two types of monitoring depending upon their efficiency and quality


Phishing or Fake Login Pages
Studies show that over 70% of the internet accounts get hacked with this method how ever Making a Fake login pages demands the skill of PHP Coding and HTML too. In Phishing a hacker creates a Fake login page which exactly resembles to the Facebook Page and then makes the victim login through that page and thus the victim gets his/her Facebook account Hacked. To Learn more about Facebook Phishing refer my post How to hack Facebook Password



If you have any questions regarding this article feel free to comment!

,

My lines....?

If you give a hacker a new toy, the first thing he'll do is take it apart to figure out how it works.


Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms.


The hacker mindset doesn't actually see what happens on the other side, to the victim.