Share For All

Sunday, March 28, 2010

Google Chrome Still Failed to penetrate

Among the web browser available today, only a Google Chrome that can not be penetrated by hackers in the contest arena Pwn2Own in CanSecWest conference in Vancouver, USA. Other browsers successfully penetrated, starting from Firefox 3.6, Safari, until Internet Explorer 8.

Charlie Miller of Independent Security Evaluators managed to penetrate the security system of the Safari browser on the MacBook and take over the operating system OS X. Miller had been known as a reliable security researchers into artificial systems, and this success Apple won the same competition for the third time.

Another security researcher, Peter Vreugdenhill, managed to penetrate the fortress of Internet Explorer 8 by way of bypass on the function of the data execution prevention (DEP) and the layout of address space randomization (ASLR). Meanwhile, a critical weakness in Firefox 3.6.2 called Nils hacker penetrated from MWR Info Security UK. Even so, the weakness IE8 and Firefox can not penetrate if the browser is running on the Windows 7 Protected Mode sandbox feature.

How techniques and how to penetrate the security of the leading browsers were not disclosed in this event. The contestants were forbidden to memublikasikannya to vendors who can provide the cement to provide (patch) to prevent the attack from the irresponsible.

Friday, January 22, 2010

Spy Camera Belt Playboy

Maybe it's a lot of spy cameras on the market. With a variety of shapes and sizes that make spy camera is hardly detectable, and suitable for the "peek" of all things no one else knew. And for this one will make you look more elegant, spy camera on a belt with Playboy written on it. Makes you look more like 007 agent, a spy who loved many women.

Playboy belt can also be connected directly to your computer or laptop using a USB cable. So can immediately see and move the results of your observation to the computer with ease. Also spy camera is also equipped with a driver disk. In the camera also features such as, time setting, manual video recording, video recording acoustic control automatically, and the reset function.

Results AVI video format and has a sharp enough resolution 720x480. You can upgrade the memory of this camera up to 16G using TF memory card. This belt can be found for $ 43 USD

Djarum Black Blog Competition Volume II

Kept his promise to keep giving opportunities to the general public, especially the national bloggers, held back Djarum Black Djarum Black Blog Competition Volume II. Event that gave priority to people's creativity in writing skills through on-line media is intended for the bloggers who are ready to compete sportsmanship. As a form of continuity that teaches people to continue these creative and ever-consistent form exhibited by Djarum Black.

Registration also has started since last Tuesday (1 / 9) and ends on February 28, 2010. For about five months, participants have the opportunity to make even straighten and fill his blog each. Registration can be done online through the official website of Djarum Black, namely All forms of competition terms and conditions set also can be known through the website. The next scheduled voting begins on 1 February to 31 March 2010, to be forwarded to the assessment phase which began on March 1 to 31 2010.

Related to the appreciation given to the winner was chosen, Djarum Black provides a variety of attractive prizes and prestigious course. In contrast to Volume I, a gift given in Volume II is more interesting. For the first champion to provide Djarum Black Notebook DELL, while the winner of the two available diurutan Blackberry Javeline, and continued the third Champions deserve Blackberry Gemini. Not only were the other winners in the category Top 4 to 10 are also entitled to a merchandise voucher worth Rp. 500 thousand.

One criteria for the assessment of interest in the Djarum Black Blog Competition Volume II, this time there votting to find your favorite winner will qualify for the iPod Touch 8GB. The winners will be announced that on April 1, 2010, and previously contacted further by the committee. Djarum Black hope your creativity in growing a second chance this time. So, do not hesitate to get your creative runway and ready to be champions.

Tuesday, September 15, 2009

PC Activity Monitor Pro 6.5.1

PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis.

The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.

Program works in background, transparent for user, and captures the following events:

- Application start

- Switching between applications/windows. In addition program saves

static text elements and windows edit controls:

- Window content of most chat clients (ICQ, AIM, Yahoo etc.)

- Content of Internet browser window (Internet explorer)

- Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express

- etc.

- Keystrokes

- Pasting text from clipboard

- File operations

- System registry operations

- Application installation/uninstallation

- Putting programs in Startup folder

- Visiting web sites.

Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended).

Log file can be optionally sent via e-mail to specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis (NET and PRO versions only).

The important advantage of PRO version is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.
Short tags:
security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy, key loger, keylogger, trojan, hack, hacking, cheating spouse, internet
System Requirements:
Change Info:
support for Portuguese/Brasilian, Romanian and Hungarian languages is added; bugs in Log Viewer are fixed.


Monday, September 14, 2009

Hack Yahoo Password Yahoo 2009

------klik here to download------

Top 10 Windows Hacking Tools

1. Cain & Abel – Cain & Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

2. SuperScan – SuperScan is a powerful TCP port scanner, pinger, resolver. SuperScan 4 (Current Version) is a completely-rewritten update of the highly popular Windows port scanning tool, SuperScan.

3. GFI LANguard Network Security Scanner – GFI LANguard N.S.S. is a network vulnerability management solution that scans your network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides you with tools to patch and secure your network. GFI LANguard N.S.S. was voted Favorite Commercial Security Tool by NMAP users for 2 years running and has been sold over 200,000 times!

4. Retina – Retina Network Security Scanner, recognised as the industry standard for vulnerability assessment, identifies known security vulnerabilities and assists in prioritising threats for remediation. Featuring fast, accurate, and non-intrusive scanning, users are able to secure their networks against even the most recent of discovered vulnerabilities.

5. SamSpade – SamSpade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more.

6. N-Stealth – N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as whisker and nikto, but you have to pay for the privilege.

7. Solarwinds – Solarwinds contains many network monitoring, discovery and attack tools. The advanced security tools not only test internet security with the SNMP Brute Force Attack and Dictionary Attack utilities but also validate the security on Cisco Routers with the Router Security Check. The Remote TCP Reset remotely display all active sessions on a device and the Password Decryption can decrypt Type 7 Cisco Passwords. The Port Scanner allows testing for open TCP ports across IP Address and port ranges or selection of specific machines and ports.

8. Achilles – The first publicly released general-purpose web application security assessment tool. Achilles acts as a HTTP/HTTPS proxy that allows a user to intercept, log, and modify web traffic on the fly. Due to a cyber squatter, Achilles is no longer online at its original home of…OOPS!

9. CookieDigger - CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications. The tool works by collecting and analyzing cookies issued by a web application for multiple users. The tool reports on the predictability and entropy of the cookie and whether critical information, such as user name and password, are included in the cookie values.

10. Netcat (The Network SwissArmy Knife) – Netcat was originally a Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.

Korsel Siapkan 3.000 Polisi Cyber

SEOUL - Korea Selatan berencana melatih 3.000 orang untuk dijadikan sebagai polisi cyber. Nantinya, mereka akan mengawal situs bisnis dan pribadi dari serangan-serangan di dunia maya.

"Para polisi cyber tersebut akan kami tugaskan untuk melindungi informasi perusahaan dan mencegah kebocoran rahasia industri dari serangan penjahat dunia maya," demikian keterangan dari pemerintah yang dilansir Yonhap dan dikutip AFP, Senin (14/9/2009).

Untuk mengatasi serangan cyber pula, Badan Intelijen Nasional Korsel akan membentuk sebuah gugus tugas yang terdiri dari warga sipil maupun pegawai pemerintah, untuk menangkal ancaman online. Kehadiran polisi cyber ini untuk memperkuat unit cyber militer yang sebelumnya telah ada.

Negeri Ginseng memang sering menjadi sasaran empuk serangan para penjahat dunia maya yang menyerang situs-situs kepresidenan, kementerian pertahanan, parlemen, maupun perbankan. Para penyelidik Departemen Luar Negeri Amerika Serikat sejauh ini gagal menelusuri siapa di balik aktivitas peretasan itu.

Kendati belum berhasil mengungkap dalang aksi tersebut, Korsel menuduh Korea Utara yang bertanggung jawab atas sejumlah serangan.

Korea Selatan sendiri memiliki akses internet yang paling kencang. Sebanyak 95 persen penduduknya sudah menggunakan broadband di rumahnya. Maka tak mengeherankan jika sebuah survei yang berbasis di Boston, Amerika Serikat, memilih Korsel sebagai negara dengan akses internet paling cepat di dunia.

ShoutMix chat widget



Copyright © 2009 by Share For All