Pakistani Hacker's Website Hacked by Lucky..!!

Posted by Ganesh Murugaraju

Nov 2:

Indian Hacker Lucky Hacked The pakistani Hacker's Website "pakjanoon.com".
This hack is in response to the challenge made by CYBER_SWATI yesterday to ICA & All Indian Hackers.
but the Sadest part  was on the very first Day itself their website was hacked by Indian Hacker..! And also Lucky had left a message in that website for cyber_swati.
Indians Again Proved Themself.. Always They are a step Ahead of Pakistani Hackers..!!
Jai Ho..!!
Proud To Be an Indian.!!

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi210A9AffqXDguBavwfX3WFqp51vGZcfWYp5aoXWLaa3x_3e0tmThIUe9nBRG_YjC5nhhRVsLrAH738ecTcuVc2feVlwASeRW6_juBnBt8sztgShEq_4fj0nw0IhLRS6JLq43qfI7L26zw/s1600/Cyber+Swati+Hacked.JPG

Facebook Apps leaking personal Data

Posted by Ganesh Murugaraju


Facebook privacy has been in the news numerous times and it’s a subject we’ve also covered many times, with the sheer mass of users on the site the amount of data (especially personal data) is phenomenal.
The latest buzz is that many of the most popular 3rd party apps (mostly games like Farmville and Texas HoldEm Poker) are leaking the unique Facebook ID that enables tracking of an individual Facebook user.
A number of Facebook apps have been providing advertisers with information that make social networking users easily identifiable, according to an investigation by the Wall Street Journal.
All 10 of Facebook’s most popular apps, including Farmville and Texas HoldEm Poker, are among those leaking the unique ‘Facebook ID’ number to outside firms. Every Facebook number is individual and assigned to every profile. Searching for the number will provide access to the Facebook user’s profile and anyone can view the information a user has chosen to share with ‘everyone’. This can include their name, date of birth and even photos.
Farmville, which has 59 million users, also passes this information about a user’s friends. The WSJ said at least 25 firms were being sent the Facebook IDs, which they were using to build profiles of web users, and in some cases, even track their web browsing. It’s not known if the developers knew their apps were leaking data.
It’s become a big issue because WSJ reported on it – Facebook in Privacy Breach, it seems that with the data that the apps leak + some good old data mining advertising and marketing companies can build fairly comprehensive databases about individuals on the Internet.
Not that this is a new problem for anyone who has followed the issues Facebook has been dealing with and in part making worse themselves with lax default privacy settings. It’s a contradiction really because for a service like Facebook the more data they can collect the more valuable they are and on the flip-side everyone and his dog is so worried about privacy…but they still use Facebook.
Millions of Facebook users have been affected, even those that use the social network’s strongest privacy settings. It also breaks Facebook’s rules concerning privacy, which state app developers can not pass on users’ data to outside firms, even if the user has given permission.
Facebook admitted a user’s ID “may be inadvertently shared by a user’s internet browser or by an application” but it “does not permit access to anyone’s private information on Facebook”.
Third-party developers are usually responsible for developing the apps. Facebook stopped users accessing several apps thought to have been leaking personal data.
“We have taken immediate action to disable all applications that violate our terms,” Facebook said. The WSJ named RapLeaf as one of the developers using the Facebook IDs in its own database as well as passing them onto to several other firms.
Facebook claims that somehow they are going to address these issues (by introducing new technology), perhaps another use for a OTP or some kind of token access for the application which allows you to use the application without revealing ANY personal info – including the Facebook ID.
But then I’m not sure how games like Farmville would track your progress and link to your account if they can’t use your Facebook ID.

Source: Network World

Free Utilities download

Posted by Ganesh Murugaraju

Free Anti virus online scanners
BitDefender Online Scanner
BitDefender
Online Scanner is an on-demand virus scanner which incorporates the
award-winning BitDefender scanning engines. You can use it to scan your
system’s memory, all files and drives’ boot sectors, and to
automatically clean infected files.
Kaspersky Online Scanner
Welcome to Kaspersky Online Scanner 7.0! Use the program to check your computer for viruses and other malware for free.
HouseCall
This is a free Online Virus Scan from Trend Micro.
Symantec’s Scan for Viruses
Examine
your computer using Symantec’s award-winning virus detection technology
to determine if it is infected by any known virus or Trojan horse.
Panda ActiveScan
Panda
ActiveScan is Panda Software’s online antivirus, that works directly
over the Internet. With a simple click from your browser you can scan
all your files and e-mail for viruses.
  
Free Anti virus
AVG Free Edition
AVG
Free Edition is the well-known anti-virus protection tool. AVG Free is
available free-of-charge to home users for the life of the product!
Rapid virus database updates are available for the lifetime of the
product, thereby providing the high-level of detection capability that
millions of users around the world trust to protect their computers.
AVG Free is easy-to-use and will not slow your system down (low system
resource requirements).
Avira AntiVir Personal
Avira
AntiVir Personal – FREE Antivirus is a reliable free antivirus
solution, that constantly and rapidly scans your computer for malicious
programs such as viruses, Trojans, backdoor programs, hoaxes, worms,
dialers etc. Monitors every action executed by the user or the
operating system and reacts promptly when a malicious program is
detected. Avira AntiVir Personal is a comprehensive, easy to use
antivirus program, designed to offer reliable free of charge virus
protection to home-users, for personal use only, and is not for
business or commercial use. Available for Windows or UNIX.
avast! Antivirus Home Edition
avast!
antivirus Home Edition represents the best antivirus protection
available and is available free of charge for non-commercial, home use.
It is designed to protect your valuable data and programs, as well as
keep itself up-to-date. It also comes with the kind of built-in
features that many vendors charge for additionally, or don’t include at
all such as anti-spyware, anti-rootkit and strong self-protection.
Simply install and forget.
   Software Firewall for personal use.
Comodo Firewall (Free edition)
Unlike some other free firewalls, this is not a stripped down version, but is a fully functional product. Updates are also free.
  • Complete protection from Hackers, Spyware, Trojans and Identity theft
  • Host Intrusion Prevention System stops malware from being installed
  • Clean PC Mode registers your current applications then will allow only applications that you approve to be installed on your computer
  • Malware Scan Feature checks your computer for viruses, spyware and trojans before you install Comodo Firewall Pro
  • Free Download. No charges or license fees ever.
Install now for out-of-the-box protection against identity theft hackers, trojans, viruses, scripts and other unknown threats.
ZoneAlarm (Free edition)
Easy-to-use
firewall blocks hackers and other unknown threats. Stealth mode
automatically makes your PC invisible to anyone on the Internet. The Free version provides you with only the basic protection, but it is enough to keep you and your PC safe from intruders.


                                                               Virtualization tools
VMware Server
Begin
enjoying the benefits of server virtualization for free. VMware Server
is a hosted virtualization platform that installs like an application
on any existing server hardware and partitions a physical server into
multiple virtual machines.
Microsoft Virtual PC
With Microsoft
Virtual PC 2007, you can create and run one or more virtual machines,
each with its own operating system, on a single computer. This provides
you with the flexibility to use different operating systems on one
physical computer.
VirtualBox
VirtualBox
is a general-purpose full virtualizer for x86 hardware. Targeted at
server, desktop and embedded use, it is now the only
professional-quality virtualization solution that is also Open Source Software.

 Hard disk Backup and Restore tool
Double Driver
Double
Driver is a very simple and useful tool which not only allows you to
view all the drivers installed on your system but also allows you to
backup, restore, save and print all chosen drivers simply and reliably.
FBackup
FBackup
is a free backup software for both personal and commercial use. It
protects your important data by backing it up automatically to any
USB/Firewire device, local or network location. The backed up data can
be either compressed (using standard zip compression) or an exact copy
of the original files.
Areca Backup
Backup
solution for Linux and Windows. It basically allows you to select a set
of files / directories to back-up, choose where and how (as a simple
file copy, as a zip archive, …) they will be stored, and configure
post-backup actions (like sending backup reports by email or launching
custom shell scripts)
Cobian Backup
Cobian Backup is a multi-threaded program that can be used to schedule
and backup your files and directories from their original location to
other directories/drives in the same computer or other computer in your
network. FTP backup is also supported in both directions (download and
upload).
Many Other goodies coming soon happy visiting  !!!

How to get stored Passwords from Browsers

Posted by Ganesh Murugaraju

hi friends.. Here is the small tutorial to recover your Saved Passwords from your Browser, 

Google Chrome :

ENABLE PASSWORD SAVE OPTION
You can easily enable Chrome to save passwords for website you visit. Click the Tools menu > Select Options > Click the Minor Tweaks tab and then check option ‘Offer to save passwords’. Now Chrome will save username and passwords for you.


HOW TO VIEW STORED PASSWORDS?
Click the Tools menu > Select Options > Click the Minor Tweaks tab. In the ‘Passwords’ section, click the Show saved passwords button.

Firefox :

In Firefox, navigate to the Tools \ Options menu item. Select the Privacy button, the Passwords tab, and then click on View Saved Passwords. You’ll be presented with this screen:
Click the Show Passwords button, and navigate down to the website password you are looking for


Safari :

 
In Firefox world viewing the saved passwords is really easy . You just need to go to Firefox preferences in Mac ( and tools> options in Windows ) then to Security tab and click on the “Saved Passwords” then “Show Passwords” . Its not possible from Safari menu to see the Autofill passwords . In Mac there is something called “Keychain Access” which does this thing of saving and revealing the saved passwords from Safari as well as other Mac application . So basically to see the Safari saved password in Mac open Keychain Access navigate to the website or username whose password you forgot , right click the particular row and click ” Copy Password to Clipboard” . You can paste it to any text editor ( eg. Textedit ) and see the saved password. This way finally , i got my lost password :-) .
In Windows version of Safari its not possible to see the saved password as Windows version of Safari also doesn’t have show password option in its Preferences> Autofill . Note: not for Windows

Google's next project

Posted by Ganesh Murugaraju

Google has a penchant for making computers do all kinds of things. It’s latest project includes driving a car without the need of a person actually driving it. That basically means no driver is required. The logic for Google? Simple, they want to remove human errors which leads to accidents on the road.
Google announced that they have cars which drive themselves, using a on-board computer. They have completed over 160,000 miles quite safely.
google cars Google testing automated cars!

How the Google car works?

  • The car has a video camera which reads traffic lights and helps the car’s computer recognize traffic on the road.
  • A radars which help decide positions of faraway objects.
  • Another radar like device at the top which creates a 3D map of the car’s surroundings.
  • This information is crunched by computers on-board the car and help it navigate around on the roads without the need of a driver.

What is driving Google?

  • Genuine concerns of safety. Imagine cars which just did not allow people to drive rashly or over the speed limit. It will obviously make car travel safer. Most road safety research statistics show that rise in number of accidents are due to human errors.
  • The other thing that could be this is a great way for Google to showcase their technology (android, google maps).
According to NY Times, the earliest we can see such cars is 2018. What do you think about Google’s latest experiment? Are they losing focus or are they focusing on something truly visionary? Do drop in your comments and views.

Firebug script for your IE, chrome, safari etc..

Posted by Ganesh Murugaraju

Firebug Lite is a Java Script that enables us to use Firebug like features in other browsers. It gives the same look and feel like Firebug. If you wish to use Firebug Lite for IE6 or other browsers like Chrome,Safari then here’s the way how to do that.

Just add the following code at the top of the of your page inside script tag :

Stable Live Link:  "text/javascript"src="https://getfirebug.com/firebug-lite.js"
Stable Local Link:  "text/javascript" src="/local/path/to/firebug-lite.js"

Features
    * Compatible with all major browsers: IE6+, Firefox, Opera, Safari and Chrome.
    * It has the same look and feel as Firebug.
    * Inspect HTML and change style in real-time in different browsers.

200 evasion techniques are used by hackers

Posted by Ganesh Murugaraju

New cyber threats bypass most network security systems,


Cybercriminals are using new, advanced evasion techniques that can pose a serious threat to existing network security systems worldwide, says security firm Stonesoft.

Companies may suffer a significant data breach including the loss of confidential corporate information, the firm warned.

According to the Stonesoft's Helsinki research labs, the threats significantly extend what was previously known about evasion techniques.

The researchers found that the new techniques provide cybercriminals with a master key to any vulnerable system such as ERP by bypassing network security systems.

"It does not matter what intrusion prevention systems are in place, because these master keys can bypass most of them," said Ilkka Hiidenheimo, chief executive at Stonesoft.
200 evasion techniques

Cybercriminals are now using 200 different evasion techniques in combination to create an almost infinite number of different attack methods, he told Computer Weekly.

A range of content inspection technologies are affected, said researchers, which means cybercriminals can use them to evade many network security systems.

Field tests and experimental data show many of the existing network security solutions fail to detect these techniques and thus fail to block the attack inside.

The details of this discovery have been shared with CERT-FI in Finland for vulnerability co-ordination purposes and validated by ICSA Labs.

CERT-FI said it would work with Stonesoft and other network security suppliers to remediate the vulnerabilities exposed by the new evasion techniques.

ICSA Labs said the advanced evasion techniques could result in lost corporate assets with potentially serious consequences for breached organisations.

The dynamic and undetectable nature of these advanced evasion techniques could have a direct effect on the network security landscape, said Juha Kivikoski, chief operating officer at Stonesoft.

"The industry is facing a non-stop race against this type of advanced threats and we believe only dynamic solutions can address this vulnerability," he said.
Defence

The best defence against these evasion techniques is through flexible, software-based security systems with remote update and centralised management capabilities, said Ash Patel, country manager for UK and Ireland at Stonesoft

However, most organisations today use static hardware-based solutions, which can be difficult or even impossible to update against rapidly evolving and dynamic threats, he said.

"By working at different layers in the TCP/IP stack, cybercriminals can set up invisible communication channels in which they can embed attacks," he said.

According to Patel, 99% of network security systems are vulnerable to these techniques, and it is therefore important for all organisations to identify all their critical data assets and find out as much as they can about the threat to ensure they are protected.

Stonesoft has published detailed information and a video on the advanced evasion techniques, and called on the network security industry to collaborate on combating them.