Friday, November 11, 2016

The hacker news deals

The hacker News deals..

Guys following courses are providing free from the hacker news website but enroll time is very limited..go fast and enroll and learn.

Courses are :
Digital photography.
Web development technologies
Andriod Development
Chef Audio Book
GIT Training bundle
Programming for Entrepreneurs JavaScript Course

Go through the following link and earn 10 $ also  click here... to earn .

1)Click on click here.
2)Click on login button.
3)Click on signup.
4)Save details.




Tuesday, July 26, 2016

Check (or) Checkmate to ransomware hackers.

Check (or) Checkmate to Ransomware hackers.

        Good, news for victims .........................................................Bad news to ransomware hacker.

What is good news?

Good news is no more Ransome attacks.So our data is secured we don't need to pay money for our own data.
Ok, Ransomware is a small malware code is used to encrypt a file illegally.To decrypt, hackers will ask money for encrypted files.
Recently many firms and organisations are affected with a ransomware virus.I read in a website ransomware hackers demanded 17000$ to a hospital to decrypting virus encrypted files.
So bad right,Here is the solution. 

Decrypt all encrypted files for free.

About the project:



The following  below text copied from https://www.nomoreransom.org.Click here to know more
Law enforcement and IT Security companies have joined forces to disrupt cybercriminal businesses with ransomware connections.
The “No-More-Ransom” website is an initiative by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre and two cyber security companies – Kaspersky Lab and Intel Security – with the goal to help victims of ransomware retrieve their encrypted data without having to pay the criminals.
Since it is much easier to avoid the threat than to fight against it once the system is affected, the project also aims to educate users about how ransomware works and what countermeasures can be taken to effectively prevent infection. The more parties supporting this project the better the results can be. This initiative is open to other public and private parties.
Funny Conclusion: Unity is the strength.Quotes are quotes.Huh, thank you No-More-Ransom I can decrypt my files now for free.

Wednesday, July 13, 2016

Pokemon GO Android Game download.

                   Pokemon GO Android Game download.

Support details:


Version: 0.29.0 (2016070500)
arm 
Package: com.niantic labs.pokemongo
58.06 MB (60,876,068 bytes)
Min: Android 4.4 (Kitkat, API 19)
Target: Android 6.0 (Marshmallow, API 23)
nodpi
2580d2687af1ffaaec16ff3b48380f76




APK Notes:


There are malware APKs floating around but never on APK Mirror. This APK's MD5 checksum is2580d2687af1ffaaec16ff3b48380f76, which is the same as the one downloaded from the Play Store, so rest assured that it has not been modified in any way.
Click here to download

For official website click on pokemon

Sunday, July 10, 2016

Complete ASP NET MVC Web Development


Complete ASP NET MVC Web Development.


I collected the following torrent from Torrent site.

Click here to download.

Complete ASP NET MVC Web Development - Newbie to Ninja!
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 8 Hours | 1.38 GB
Genre: eLearning | Language: English
Learn Web Development with ASP NET MVC and C#.

Friday, April 3, 2015

One hundred Million dollars valuable information was steal by 4th Member of "X box Underground ".

One hundred Million dollars valuable information  was steal by 4th Member of "X box Underground ".
Group of "Xbox Underground" (XU) has pled guilty to steal more than $100 Million in intellectual property and data from Microsoft, Epic Games, and Valve Corporation.

Austin Alcala, a 19-year-old of McCordsville, Indiana, along with two other Americans and a Canadian, has found guilty to charges of computer hacking conspiracies and criminal copyright infringement involving theft of information related to then-unreleased Xbox One gaming console and
 Xbox Live games.

All the other members of the hacking group have been pleaded guilty before. 
Two members, Sanadodeh Nesheiwat, 28, and David Pokora, 22, pleaded guilty last September, while a third member, Nathan Leroux, 20, pleaded guilty to the same conspiracy charge in January.
The tools like Keylogger and sql injection were  used to gain  access  targeted computers.
SQL injection is one of the most popular attack  among all traditional  attacks.HAVIJ is one of the most popular tool for SQl injection.
Keylogger is also a best tool  for capturing a keyboard and mointor of pc ie means is the action of  recording  the key struck on a keyboard and mointor.
By using these tools they gained intellectual  information of microsoft and zomabie studios.
As per court information , Austin Alcala(19 years old),Sanadodeh Nesheiwat(28 years old),David Pokora( 22 years old) and Nathan Leroux(20 years old) all these were  involved in cyber crime.
The value of the confidential data stolen by the XU Group and the cost to the victims’ companies to recover it after the intrusions is estimated to range between $100 Million and $200 Million.
For this crime prosecutors were able to recover some $620,000 in cash and other proceeds that hackers had earned related to their thefts.
     

Saturday, February 14, 2015

(ISIS) ISLAMIC STATE MEDIA ACCOUNTS HACKED BY HACKTIVIST GROUP ANONYMOUS

WE SEE WE JUDGE WE NEVER FORGIVE -HACKERS THEME 



The hacktivist group Anonymous has embark  a massive cyber attack against the Islamic State of Iraq and Syria (ISIS) — the radical Islamic terrorist group who were responsible for the terrorist attack against the Paris offices of satirical magazine Charlie Hebdo.

With huge social media presence, ISIS is the most active terror group on Facebook, Twitter, YouTube and Instagram accounts. But unluckily, over dozens of Facebook and Twitter accounts linked to ISIS has recently been taken by the Anonymous group.
since the group released the first list in June, 2014 and dozens of militant recruiting websites were knocked offline using collective DDoS Attack.


list of accounts hacked:
  1. ________________________________________________________
  2. ISIS Twitter accounts:
  3.  
  4. https://twitter.com/Daash
  5. https://twitter.com/DaashISIS
  6. https://twitter.com/DaashConnect
  7. https://twitter.com/DaashConnect1
  8. https://twitter.com/DaashConnect2
  9. https://twitter.com/DaashConnect3
  10. https://twitter.com/DaashConnect4
  11. https://twitter.com/DaashConnect5
  12. https://twitter.com/DaashConnect6
  13. https://twitter.com/DaashConnect7
  14. https://twitter.com/DaashConnect8
  15. https://twitter.com/DaashISIS
  16. https://twitter.com/ISISConnect
  17. https://twitter.com/ISISConnect2
  18. https://twitter.com/ISISConnect3
  19. https://twitter.com/ISIS_Connect
  20. https://twitter.com/D3ichy1
  21. https://twitter.com/Nour_zalam
  22. https://twitter.com/fadou7_ilma3bar
  23. https://twitter.com/Faysal_da3iche
  24. https://twitter.com/sam7anA7mar
  25. https://twitter.com/Salman7asoun
  26. https://twitter.com/far7at_naser_3
  27. https://twitter.com/Asad3oumran
  28. https://twitter.com/AbouHilal_bader
  29. https://twitter.com/Abou7amadElrasy
  30. https://twitter.com/Dafiq_ISIS
  31. https://twitter.com/Salman_Anwar
  32. https://twitter.com/Jazib_moutawakil
  33. https://twitter.com/Albakistani_JN
  34. https://twitter.com/umar_media_ttp
  35. https://twitter.com/Din1080
  36. https://twitter.com/abu_elbaraa91
  37. https://twitter.com/Din1080
  38. https://twitter.com/ZawahiriRafidhi
  39. https://twitter.com/interditAuPaien
  40. https://twitter.com/Qan9Yaman
  41. https://twitter.com/Abouyamany
  42. https://twitter.com/AlRani1
  43. https://twitter.com/AMouwahidin
  44. https://twitter.com/AbouMoustapha1
  45. https://twitter.com/Abou_illabaisse
  46. https://twitter.com/Ja3faralsadik
  47. https://twitter.com/E7sanALsadiq
  48. https://twitter.com/Ja3far_aboumahdi
  49. https://twitter.com/imam_3antar
  50. https://twitter.com/AbuBicha
  51. https://twitter.com/OumShaheed1
  52. https://twitter.com/aboomusab69
  53. https://twitter.com/riahizaid12
  54. https://twitter.com/Khaled_nousra
  55. https://twitter.com/MouvementSalafi
  56. https://twitter.com/akhypotteur
  57. https://twitter.com/Dz_Bara_ah
  58. https://twitter.com/UmmSherazzade
  59. https://twitter.com/Salam_nour
  60. https://twitter.com/Abou_OmarAlchamy
  61. https://twitter.com/Abou_jabal
  62. https://twitter.com/Baghdadid1
  63. https://twitter.com/Ra2if_w
  64. https://twitter.com/Amin_3abdala
  65. https://twitter.com/Qouyas7
  66. https://twitter.com/zalmour_3aziz
  67. https://twitter.com/karkhan_el_nour
  68. https://twitter.com/Barlous_3antar
  69. https://twitter.com/karim_soura
  70. https://twitter.com/SrhZtn
  71. https://twitter.com/Monimelperso
  72. https://twitter.com/Abounizar_sadim
  73. https://twitter.com/AbouNasir_nousra
  74. https://twitter.com/khalid_da3ichy
  75. https://twitter.com/Mouhran_salam_alah
  76. https://twitter.com/Mounir3abed_nousra
  77. https://twitter.com/MinhajNoubouwa
  78. https://twitter.com/abou_suisse
  79. https://twitter.com/dawlaReporter
  80. https://twitter.com/FatimaYouYouu
  81. https://twitter.com/Nour_Da3ich
  82. https://twitter.com/aylan7x
  83. https://twitter.com/Parigi6
  84. https://twitter.com/moujahidardent
  85. https://twitter.com/patience1900
  86. https://twitter.com/alfuratwadijlah
  87. https://twitter.com/CassKhattab
  88. https://twitter.com/ibnhouss > Rachid Abou Houdeyfa
  89. https://twitter.com/aboushaheed_
  90. https://twitter.com/abubakr99amb
  91. https://twitter.com/Salashh
  92. https://twitter.com/jamilnousran
  93. https://twitter.com/jamilnousran1
  94.  
  95. Anonymous says the following Facebook accounts are in close contact with ISIS in Syria and Iraq. They advise us to “keep a close eye” on them.
  96.  
  97. https://www.facebook.com/azizi.salina
  98. ————————————–
  99. https://www.facebook.com/mujahiddin.bolzan
  100. ————————————–
  101. https://www.facebook.com/sinar.cahaya.73
  102. ————————————–
  103. https://www.facebook.com/putraijamarul77
  104. ————————————–
  105. https://www.facebook.com/profile.php?id=100007817504822 ====> This are Junaid Hussain AkA TriCk.
  106. ————————————–
  107. https://www.facebook.com/najmi.mie.9
  108. ————————————–
  109. https://www.facebook.com/mohdazril.matsoom
  110. ————————————–
  111. https://www.facebook.com/mohdrahemyl.remy
  112. ————————————–
  113. https://www.facebook.com/safwan.wan.5661
  114. ————————————–
  115. https://www.facebook.com/LanMazPasForAll
  116. ————————————–
  117. https://www.facebook.com/cikgu.ihsan
  118. ————————————–
  119. https://www.facebook.com/buxy.bux ====> (Recruiter) This woman she to brainwash young people to go to Syria to fight alongside Terrorists of the Islamic State.



Thursday, December 19, 2013

indian govt's ,rajasthan state government websites were hacked by Pakistan hackers....

Over 30 Rajasthan Government websites 

hacked by Pakistan Hacker "H4x0r 

HuSsY" 

More than 30 India's state 'Rajasthan' Government websites has been hacked and defaced by a Pakistani hacker named as "H4x0r HuSsY 
The motivation of the hack is appeared to be increasing defacement notification in Zone-h.  The hacker claims he is the "person with the highest number of special (.IN) Notifs."

"Proved to be Hell For India!  I might Opt Out of the Cyber World As I don't get much time. But Here's a Peace Message.  To All Indian Hackers etc etc  U Gotta Look at my Zone-H Archive Whenever you have Intentions of hacking (.PK) Sites"  The defacement message reads.



It appears hacker does not like to deface the main page because it will be easily detected by admins.  He just uploaded 1337.html which contains the defacement contents instead.

This is not the first time these Rajasthan Government Government websites being hacked by Pakistani hackers; Last year, KhantastiC haXor defaced them.

The hacker also mentioned that the server was previously compromised by the Khantastic and he again compromised the server with another security flaw in the server.
H4x0r HuSsY also hacked more than 15 Goa government websites.

Full list of hacked websites:
http://dpipraj.gov.in/1337.html
http://bor.rajasthan.gov.in/1337.html
http://bpe.rajasthan.gov.in/1337.html
http://bpl.rajasthan.gov.in/1337.html
http://collegeeducation.rajasthan.gov.in/1337.html
http://doitc.rajasthan.gov.in/1337.html
http://dop.rajasthan.gov.in/1337.html
http://finance.rajasthan.gov.in/1337.html
http://ftmsdemo.rajasthan.gov.in/1337.html
http://governorhouseonline.rajasthan.gov.in/1337.html
http://gpck.rajasthan.gov.in/1337.html
http://gwpcjpr.rajasthan.gov.in/1337.html
http://igprgvs.rajasthan.gov.in/1337.html
http://jalabhiyan.rajasthan.gov.in/1337.html
http://jawaharkalakendra.rajasthan.gov.in/1337.html
http://jrrsanskrituniversity.ac.in/1337.html
http://krishi.rajasthan.gov.in/1337.html
http://lokayukt.rajasthan.gov.in/1337.html
http://mail.rajasthan.gov.in/1337.html
http://hcmripa.gov.in/1337.html
http://minorityaffairs.rajasthan.gov.in/1337.html
http://rajamb.com/1337.html
http://rerc.gov.in/1337.html
http://rajasthankrishi.gov.in/1337.html
http://rajeduboard.rajasthan.gov.in/1337.html
http://rajftms.rajasthan.gov.in/1337.html
http://rajind.rajasthan.gov.in/1337.html
http://rajpanchayat.gov.in/1337.html
http://rajsec.rajasthan.gov.in/1337.html
http://rfconline.org/1337.html
http://rhbonline.com/1337.html
http://ric.rajasthan.gov.in/1337.html
http://sdri.rajasthan.gov.in/1337.html
http://techedu.rajasthan.gov.in/1337.html
http://testrpsc.rajasthan.gov.in/1337.html
http://transport.rajasthan.gov.in/1337.html
http://ttctest.rajasthan.gov.in/1337.html
http://uitbhilwara.rajasthan.gov.in/1337.html 

Advanced Power" botnet attempts to hack website using victim's machine

  Advanced Power" botnet attempts to       

   hack website using victim's machine       

S ecurity researcher Brian Krebs has discovered a new Botnet that tests websites for vulnerabilities using the infected machines. 

The malware disguise itself as a legitimate Firefox add on called "Microsoft .NET Framework Assistant" is apparently using the infected machines to find SQL Injection vulnerability in any website visited by the victim.

Once the malware determine the list of vulnerable website, the cyber criminals behind the botnet will be able to exploit the vulnerability to inject malicious codes in the websites.  So, it will probably help the attacker to increase the number of infected websites and systems.

Advanced Power test SQL Injection vulnerability

The malware also capable of stealing sensitive information.  However, the feature is not appeared to be activated on infected systems.

Alex Holden, chief information security officer at Hold Security LLC, analyzed the malware and believes the malware authors are from Czech Republic, based on the text string available in the threat.


Wednesday, November 20, 2013

E! Online website hacked by Tesla Team


E! Online website hacked by Tesla Team


TeslaTeam, one of the infamous hacker group from Serbia, claimed to have hacked into one of the most famous celebrity fashion sites E!NEWS. E! News is one of the high profile website that has alexa rank around 600, provides entertainment news, celebrities, celeb news, and celebrity gossip. The group has discovered a SQL injection vulnerability in one of the subdomain of E News(br.eonline.com), the poc for this vulnerability has been provided along with the database dump(pastebin.com/2c28RJDe) The database dump contains the list of tables, username and password phone of admin and other users. The same group recently hacked into the Vevo website and leaked the database. - See more at: http://www.ehackingnews.com/2013/11/e-online-website-hacked-by-tesla-team.html#sthash.onKGRMUl.dpuf

2014 avast! Premier full version free download

          Avast! Premier full version free download  INC KEY






STEPS FOLLOW

1) DOWNLOAD TRAIL VERSION  AVAST PREMIER 
               CLICK HERE TO DOWNLOAD

2)DOWNLOAD KEY 

                CLICK HERE TO DOWNLOAD

4TH GENERATION


23 nov
2013

LATEST COMMUNIATION  TECHNOLOGY

C.BAYA PRAKASH REDDY



[4TH GENERATION]
2nd generation to 4th generations.



             LATEST TECHNOLOGY

The fourth generation of mobile communications, to nobody’s surprise, offers extremely high downlink rates and in the case of Long Term Evolution (LTE), this can theoretically reach 100 MB per second. The question is; what is LTE technology all about?

Enter 4G with LTE
LTE is a bundle of improvements to the Universal Mobile Telecommunications System (UMTS) being worked on by the third Generation Mobile Communications standards, one notch higher than the second generation (2G) of mobile communications. Usually, it is speed that determines the generation any technology falls in. Hence, one of the main benefits of HMTS is its speed.
What makes LTE faster than other mobile communications technologies? The answer lies within the access technique employed by LTE. One the fastest access technique in use for LTE is orthogonal frequency division multiplexing (OFDM) which increases the amount of information that can be carried over a wireless network.
In frequency-division multiplexing (FDM), multiple signals, or carriers, are sent simultaneously over different frequencies between two points. In OFDM, a mathematical formula is used to ensure that multiple carriers sent out are orthogonal (separated by an angel, so they do not overlap) to each other. Another tool used by LTE is a multiple-input multiple-output (MIMO) antenna. These are adaptive antennas that can select the best coverage path in real time and accordingly propagate signals.

Transfer seamlessly with NFC
Near field communication (NFC) is a form of high-frequency, wireless communication in which two devices – within 10 centimeters of each other – can exchange data. Some of us may recall electromagnetic induction from our high school physics course. The communication in NFC is carried out through magnetic induction between two loop antennas that interact with each other’s fields, forming an air-core transformer. The rate of communication is up to 848 KB per second.
The main difference between NFC and Bluetooth communication is simply that the latter requires authentication and a series of steps before a connection is established. Hence, it takes time. NFC, which does not need to authenticate, can established a connection within one-tenth of a second.

Bluetooth 3.0 – yes you can!
Bluetooth is a wireless technology that was developed by the Bluetooth Special Interest Group (SIG). The first version of Bluetooth (Bluetooth 1.0) was extremely slow and not very efficient. Later versions like Bluetooth 1.2 incorporated adaptive frequency hopping, which reduced interferences issues. Now with Bluetooth 3.0, consumers can expect a speed of 24 Mbps (crazy fast for Bluetooth!).

Upcoming Apple iPhone 5 and iPad 4
Apple is bringing some of the latest and fastest communication technologies in the form of iPhone 5 and iPad 4. Every time they are trying to bring something interesting and new in front of their fans. There is a lot of buzz around the release dates of both these Apple’s products, want to know further! Checkout the Apple’s  and features.

Conclusion
Starting with the 2G standards that made services like short messaging service (SMS) extremely popular and the rollout of 3G services with faster downlink speeds, research has paved the way for further innovations and improvements. 4G is not far off from becoming a popular world standard. Technologies like LTE and NFC will only serve to augment changes in the ways we use our mobile phones today. From mobile payments and downloading full-length movies, to transferring huge files via Bluetooth 3.0, the mobile world is drastically evolving.

facebook frnds

About Me