Tuesday, September 18, 2007

Download Videos from YouTube

Download Videos from YouTube


Youtube, the one site that has revolutionized the online videos over the internet. Probably, everyone using internet will listen the word YOUTUBE atleast once in a while. This is similar with Google videos too. You feel comfortable while watching the videos but you have will also have a desire to download them and watch them instantaneously over your PC than going to the site and streaming the video all the time to watch it. The Youtube policy of " stream to see " disgusts me because if you refresh the page unexpectedly, then the video starts streaming from the beginning.

When we see footage of love, the absence download collections can no longer watch and when they will regret it. Therefore, the best way is to love download video footage preserved. But YouTube itself only provided online viewing functions, but not mentioning the download link. Download video from YouTube easy, if a download tools to help us be better. Youtube should have come up with some idea to solve this. Let that be a side and now we shall see the methods to get a download a youtube video or a google video on to your PC. Four popular techniques are the following


- Online Downloader sites

- Greasemonkey scripts

- Firefox addons

- Softwares



Online video Downloader sites: In these sites you have to give the url of the youtube video in the space provided and click on "download" to download the file. A few sites that provide this feature are

1. http://www.youtubex.com/
2. http://downthisvideo.com/
3. http://www.downloadyoutubevideos.com/
4. http://javimoya.com/blog/youtube_en.php


and many more...

This technique is not reliable as at all the times you will not be able to download from their sites


Grease monkey Scripts
: This works only in Firefox as Greasemonkey is this addon is supported by Firefox only. You have to install some scripts to download the youtube videos. Steps to download using grease monkey,



1. You should use a Firefox browser, if you don't have click here to download the latest version.

2. Install the Grease monkey addon from here.

3. After this install one of the following scripts

http://userscripts.org/scripts/show/2085

http://userscripts.org/scripts/show/3982

http://userscripts.org/scripts/show/6204

http://userscripts.org/scripts/show/7809

http://userscripts.org/scripts/show/8177

http://userscripts.org/scripts/show/7880


4. After doing all this refresh the youutbe or google video page to see an icon "save this file"or "download this file " or "get this video ",...

5. Click on it to save the file with a file name.

Add .flv to the file name, like if abc is file name, rename the downloaded file as abc.flv


Now use a flv player to view it or download a flv converter like (Riva FLV Encoder Total Video Converter ) into mpeg or avi or wmv format and watch it with normal video player like vlc or windows media player.


Firefox addons:
Here a few addons of Firefox that will directly download the youtube or Google videos

1. Unplug

2. Get video

3. Fast video download

4. Video Downloader

5. Video Download


Software to download Youtube or Google videos :


1. http://www.zillatube.com/
2. http://www.amazebrowser.com/flvdownload/
3. Youtube Accelerator

Note 1 : Of all the techniques described above, using grease monkey is the mosty effeciient one and also the most reliable one.

Note 2 : The same technique is applicable to Google videos too but the scripts and ddons and softwares my be different.

Fake Login Scripts/Tools

Fake Login scripts and tools

Fack login pages hacks password of the victim when he logs in to the software using his id. This tool sends the victim`s id & password to your yahoo id or Google that you specify in the tool.

Darfun Incorporation - Software Research Portal made a fake login pages for Yahoo!, Hotmail/MSN, Orkut, MySpace, Rediff mail, Hi5, Friendster

Those fake login pages are like photo copy of real pages, hats off to Darfun Inc,this is the link for the pages to download fack login pages

IF YOU WANT TO USE FAKE LOGIN FOR ANY OTHER SERVICEJust fallow the instructions on the Readme.txt and Howto.txt in zip file

Darfun Inc says:
THIS HELP IS PROVIDED FOR EDUCATIONAL PURPOSES ONLY, WE ARE NOT RESPONSIBLE OF ANY PASSWORD THEFT USING THISFAKE LOGIN PAGE, We also apologies to the third party forusing their e mail form in this script. :(

After downloading the zip file just change the Html as instructed in help files and upload the edited file and publish it (Help on publishing and uploading)

Related Posts:

Create Fake Login in 15 Steps

Create Fake Login in 15 Steps
{1} Open www.jotform.com and Sign Up.

{2} Then Login there with your newly registered account.

{3} Now click on ' Create your first form'.

{4} Now delete all the pre-defined entries, just leave 'First Name:'. (To delete entries, select the particular entry and then click on the cross sign.)

{5} Now Click on 'First Name:' (Exactly on First Name). Now the option to Edit the First Name is activated, type there "username:" (for gmail) or YahooId: (for Yahoo)

{6} Now Click on 'Power Tool' Option (In right hand side...)

{7} Double click on 'PasswordBox'. Now Click the newly form password entry to edit it. Rename it as 'Password:'

{8} Now Click on 'Properties' Option (In right hand side...). These are the form properties.

{9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.

{10} Now in ThankYou URL you must put some link, like http://www.google.com or anything. Actually after entering username & password, user will get redirect to this url.(Don't leave it blank...)

{11} Now Click on 'Save'. After saving, click on 'Source' Option.

{12} Now you can see two Options, namely 'Option1' & 'Option2'. Copy the full code of 'Option2'.

{13} Now open Notepad text editor and write the following code their.


Paste the Option2 code here

{14} And now save this as index.html. Now we have to put this index.html on internet. I mean now we are going to host this file. For this we will use FREE hosting provider service. You can try the following FREE hosting providers. Make a free hosting account and come back here...

{15} I hope u have succesfully created a free hosting account. Now Login in your hosting account. And then Open 'File Manager'.

{16} Upload this index.html there... now u can see your index.html online by typing the url (url will be given to you by your free hosting provider..)FINISHED

Related Posts:

Tuesday, September 11, 2007

Rapidshare Downloader

.:: Rapidshare Downloader ::.


CMS Grabber is the best tool I ever found on internet, this tool made me stun when I started using this, many rapid share users are still searching for free premium account, this tool make it useless. Using this tool we can download files from rapid share without any download limitations, multiple files at once, this is more than rapid share premium account. Lets see it in brief



THE ONLY LEGAL PROGRAM FOR DOWNLOADS FROM RAPIDSHARE !!!

Key Loggers

.:::. Key Loggers .:::.

Keystroke logging (often called keylogging) is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Such systems are also highly useful for law enforcement and espionage—for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. However, keyloggers are widely available on the Internet and can be used by private parties to spy on the computer usage of others.
Writing software applications for keylogging is trivial, and like any computer program can be distributed as a trojan horse or as part of a virus. What is not trivial however, is installing a keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.
lets see some of the key logger's what I known


Local Keylogger Pro 3.1 - Local Keylogger Pro allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Local Keylogger Pro makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones. Local Keylogger Pro can record all user activity to the log file. This information can be exported to HTML for convenient viewing in your web browser, or exported to MHT file for analysis. This allows you to see how long users worked with particular programs, how much time they spent on Internet, what sites they visited, what they typed in e-mails or chats.[Download][Crack]


XP Advanced Keylogger 2.5 - XP Advanced Keylogger is a top-rated invisible easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. It can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.{Windows 95, NT4, 98, Me, 2000, XP} [Download][Crack]


Blazing Tools Perfect Keylogger 1.67 - Perfect Keylogger is a new generation keylogger which is absolutely undetectable. It was created as an alternative to very expensive commercial products like iSpyNow, Spector Keylogger or E-Blaster. It has the same functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and immediately use it without changing of its settings.
Perfect Keylogger is an extremely compact, award-winning tool. It is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list.
Also, Perfect Keylogger can carry out visual surveillance. It periodically makes screenshots in invisible mode and stores the compressed images on the disk so you can review them later.Perfect Keylogger was the first keylogging software solution which can be absolutely invisible in the Windows NT/2000/XP/Vista Task Manager![Download][Crack]


SC Keylogger Pro V3.2 - A Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction.[Download]

Hook Keylogger v2.1 - Small and stealth keylogger without an installer; simplest keylogger possible Specify log file location Uses a WH_JOURNALRECORD hooking procedure to capture everything typed Hide and unhide the interface by pressing Ctrl+Shift+F7 [Download][Crack]


Advanced Invisible Keylogger 1.8 - Advanced Invisible Keylogger is an stealth spy tool, the best spy software offered by ToolAnywhere! Advanced Invisible Keylogger runs silently at the lowest level of Windows capturing every keystroke including usernames and windows log-on passwords.
Advanced Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM.
All Desktop activity will be recorded through Advanced Invisible Keylogger’s secret! Have reports sent to your email address at anytime secretly! Advanced Invisible Keylogger is so stealthy and hides so well that not even a computer technician with years of experience can detect it running!
The most powerful stealth program at a most affordable price! An easy-to-use stealth solution for PC and Internet surveillance. Purchase your copy today and feel safe and secure.[Download]

OrkutScrapper 2.0.4

Hello Orkutters,

Here is a good news for ya. Here's one smart addon that will help you to do all those cool things that you just wanted to do on orkut.

1 - Scrapping in regional languages/Changing the look of your profile/Drawing special character images in scraps/Colour effects in scraps and a wide variety of other tools too - all with a simple firefox addon(all tools at one place! wow! Thanks to Binny Mathew)

The most significant feature of this addon is that it integrates all the features into one simple toolbar that neatly fits to your scrapbook like the microsoft windows tooolbar.Easy to use,minimum clicks and excellent usability. here are the features.

2 - Now you can scrap in a variety of Different Languages(even those which you don't know) like Tamil, Malayalam,Sanskirt, Oriya,Punjabi,Telugu,Gujarati,Bengali,Kannada etc with ease - just select the scrap text and select the language from the menu - simple as that. No going to other sites or using heavy translators-Thank God(and Binny)!


3 - Change the background of your profile/scrapbook so that your profile stands out from others.This is more like the Myspace layout customization. Really cool and one that all of us was looking forward to.All you need to do is select any picture you like and upload it to an online image storage -like imageshack or photobucket.Copy the direct link url and add it in the options box(From Firefox's Tools>Addons>Options). Simple! So every time somebody visits you profile they see a totally different profile - enough reason for you to be a star among your friends. ;)Selecting a random image will give you a tiled image, but picking a good one that will fit your profile is upto your creativity. ;)

4 - You can also use character messages in the scrap like Heart, Rainbow coloured text etc. Just select the scrapt text and select the appropriate button. The buttons are all arranged well like the microsoft word buttons - anybody would know how to use them.

5 - Secret Scrapping - This is one significant tool where you can private message your friend and only he can read your scrap. Use the "golden key" near the scrap box to get this done.

Installation Help

OrkutScrapper 2.0.4 can only be installed in Firefox 1.5 and above versions.

Step 1: Download the OrkutScrapper 2.0.4 and save it on the desktop.

Step 2: Open the Firefox ( If u dont have Firefox , Download from here)

Step 3: Drag and drop the downloaded (.xpi) file in the firefox window.

Step 4: An installation window will pop-up, just click install.

Step 5: Restart the Firefox by closing and reopening it.

Saturday, September 8, 2007

Hack Window Login Screen

Hack Window Login Screen
Windows Logon Screen is something many people doesn't like but just go with it as many don't know how to change it, for this there are two methods, I prefer the second one as it is more easy and but first one is a bit lengthy process, there is no harm in using any of the method but firstly you need to create a logonui.exe.

here we go....

first, get a program like regedit (Google it)
look for logonui.exe in your windows/system32 folder.

MAKE A COPY OF THIS FILE AND PUT IT IN YOUR ROOT FOLDER FOR EASY ACCESS!!!!

open it with regedit or another registry key editor, and look around in it. if you want to spend hours painstakingly figuring out how to edit it on your own, be my guest. I haven't bothered even doing that yet... just go to http://www.themexp.org/ and you can find tons of custom themes.

After you have downloaded your new logon screen, put that somewhere safe, and name it logonui.exe. DON'T try and copy it onto your real logonui while still in the windows envornment!

Method I:

- You can re-start in safemode and try this from the command line, but i have had amazing luck with BartPE. http://www.nu2.nu/pebuilder if you can't find a new best friend who has a PE disk, you can make your own with the pebuilder on that website. if you don't have it, and you plan on doing a lot of hacks, i would totally recommend this, you'll use it. A LOT...

- Assuming you now have something like bartPE, just boot that up (hit F12 or whatever key at the boot screen to bring up your menu. select to boot from cd, and you're good to go.

- Open the file explorer and copy your new logonui.exe.

- Go to windows/system32, and delete the original (make absolutley sure you have your backup) and look for any backups that windows made. (i found only one on my computer: 'logonui.exe.mainframe')

- Put your edited file in place (make sure you named it right) and restart.

the extra file you need to delete is 'logonui.exe.manifest'
There you go.

Method II:

get up to the point where you have created or selected your preferred logonui.exe. just rename YOUR logon screen whatever you want (we'll use personallogon.exe) and put it in the same C:\windows\system32 folder.

open up registry editor (go to start, run, type 'regedit')

navigate to this key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon

select 'Shell'

you will notice that the value for this key is C:/Windows/System32/logonui.exe
change this value to (C:/Windows/System32/personallogon.exe)

bam! far easier than before. log off and you'll see if it worked or not.

for more information, see here

Look for more windows hack tutorials in the future!

Related Posts:

Norton Anti-virus Sux!

.:: SVICHOSSST Virus ::.

When this SVICHOSST Virus infected my computer i was using Norton Antivirus 2007 Full Version. But it didn't detect/remove it.
Then after getting to remove this virus as mentioned in previous post in this blog
Guide to Fix SVICHOST.exe or SVICHOSSST.exe again the virus came back. I was like :S

It created an .exe file in all the folders of my C drive (nearly around 3000 files) and slowed down my system. Then I installed Kaspersky Anti-virus and I was amazed, it removed all those infected files. So i would suggest you guys to use this Anti-Virus aswell. I'm using it for so many months and it is so effective.

Download Kaspersky Anti-Virus 7.0.0.125 Full
http://3downloads.blogspot.com/2007/08/kaspersky-anti-virus-7.html

Or

Download Kaspersky Anti-Virus 6.0

http://tryfile.com/content/view/476/26/

Hope it help you guys aswell.

Related Post: Removal Guide for Svichossst Virus

10 Sites for Legal Music Downloads

.:: 10 Sites for Legal Music Downloads ::.
Nowadays there is much reported about the rise of illegally copied music being made available on the Internet. However, there is also plenty of music on the web that is free and legal. In this post we look at ten sites or services that offer free legal music to download.

ArtistServer.com
ArtistServer has been around since 2001, albeit under the name ElectronicScene.com. In 2005 they transformed the site to widen their scope and incorporate social networking features. At its core is a database of over 7,000 songs that can be downloaded for free. An artist’s catalog also has an RSS feed that can be subscribed to like any other feed, allowing the user to keep up to date with any new additions. Photos, videos and blogs from artists complete this interesting site.

Live Music Archive
The Live Music Archive has a large collection of live recordings from a wide range of artists, from David Gray to Mogwai, and there is also a lot of music from lesser known bands. The site runs a policy which does not adhere to any particular set of laws, and states so in its Terms and Conditions, and makes the user responsible for making sure that the content is legal in their own country.

Archive.org
Hand in hand with the Live Music Archive is archive.org’s collection of regular mp3s, including a good selection of out-of-copyright music. Although only hardcore fans of pre-1950s music will find this interesting for now, I expect this to become more and more important as time goes on — the early Beatles tracks are due to become public domain in only five years! Update: aside from out of copyright music, there are lots of contemporary tracks available, released under a Creative Commons license.
Epitonic
Epitonic has a great selection of free tunes, ranging from Grandaddy and Mercury Rev, through to Carl Cox, Mr Scruff, Badly Drawn Boy and TV On The Radio. The site is a little confusing at first, but once you work out where the genre and artist lists are, its fairly simple from there on in. Epitonic also has a large number of online radio stations based on several genres and subgenres that are worth a listen.

GarageBand The mighty
GarageBand, the unsigned band promotion and social review network, has proved to be the catalyst for success for a few bands in the States. After uploading their tracks on GarageBand and then being favourably rated, they have gone on to be offered contracts and even made it to the Billboard charts (the band “10 Years” hit number one with “Wasteland” in 2006 by doing just this). The site covers a wide range of genres and offers a large number of tunes for download. The majority of artists will be unknown to most people, due to the nature of the site, but the review and rating system makes it easy to pinpoint and listen to the most popular tracks.
Download.comCNET’s
Download.com offers a music section which combines an online store and a repository for free and less widely known music. Fortunately they’ve realised that a lot of people come by solely for the free tracks and have provided a direct link. Again, the music is generally from unknown and unsigned artists, but the range and quantity of material here is staggering — at the last count it stood at 75,425 free MP3s!

SpiralFrog
Bit of a blind recommendation this one, but SpiralFrog has just entered limited beta, with a view to launch later this year. Its proposed model is interesting — downloads will be free, from a number of labels (Universal seems to be the biggest backer at the moment) with a potential catalogue of 700,000+ tracks, but users will be made to view advertisements while each track is downloading. I dont know how this will work in practice (i.e. will download speeds be throttled back to give more advertising time) but in theory it sounds like a good deal. Unfortunately the service is only available in the US and Canada at the moment, but I expect it to be available in other countries if it takes off in North America.

Amazon.com
The popular one-stop-shop has a small selection of tracks available for download for free. These are changed regularly, but are often by known artists.


iTunes
Its also worth mentioning that Apple’s music store also offers free tracks, usually by up and coming artists. The list varies depending on which country you are in. [Ed. this website keeps track of what music is being offered for free on iTunes each week.]
eMusic
eMusic is a digital music store that doesn’t offer free downloads per se, but I thought it was worth including because some of the introductory offers let you download 100 free tracks in the first month, after which you’re free to can cancel your membership and it wont cost a penny!

Note:We’ve probably only scratched the surface, so if you know of any more places on the web where you can download free and legal music, please add those in the comments.

Protect Childen

Protect Your Childen From Inappropriate Internet Content

The Internet has become an indispensable tool for our lives. Nowadays it is very common for families to have a computer at home with Internet access. But many parents are worried about what their children are able to see on the Internet.
The Internet can help children to learn and do research on school subjects. But unfortunately, children can also be exposed to the negative content of the Internet. There have been studies showing that many children have been accidentally exposed to obscene pop-up ads or other type of negative content.
A good effort to minimize the exposure of your children to this negative content is installing a parental control and Internet filtering software. The one I can recommend is called K9 Web Protection. This is a free software.
After installing this software, it can detect negative content and block it. Access to inappropriate content is controlled using a password.
By default, it will protect from adult content, security threats, illegal activity, sexually-related sites and online community sites. But it can be configured to different levels of protection depending on your choices of categories.
You can also view a list of all the sites that have been visited, even those that were blocked.
There is even a time restriction feature. You can decide the time and days of the week that the computer can have web access.
Additionally, you can allow access to certain sites and block other sites as well.
You can even setup a dog to bark every time a negative content is blocked. And don't forget, it's free for home use. All you will need is to register your email address so they can send you a License to install it.
If you decide to download it please visit
the K9 Web Protection site
If you want to learn more about how to make the Internet safer for your family, there are lots of website with information about this. One I found is www.safekids.com. They have a list called Kids Rules for Online Safety that you can read there.
The purpose of my articles is to share my experience on computers and technology with you. My free advice might help you on your business or home computer. There is a lot we can do with computers nowadays and many of the software I recommend mostly is available for free. Please visit my website.
Article Source:
http://EzineArticles.com/?expert=Aaron_Garcia

Free PSP Downloads

::: Free PSP Downloads :::

There is a big myth about getting free PSP downloads without paying any cent online. But is it that true? I mean it sounds way too good to be true, doesn't it? Well, in some cases in is true, you CAN get free PSP downloads but not the way you think you would. The problem is they are not really that free.
All the ads you see about free PSP downloads, on Yahoo, Google, MSN, everywhere they say it's all free. Not really. Most of these PSP download services charge a lifetime fee which costs around $35, that's like $0.43/year in case you will live for 80 years. Though, is it really worth?

I think it is, I mean I am pretty much sure it is worth it, just imagine how many free PSP downloads you can get over such long period? Despite that fact that free PSP downloads are not really free, I still think it's a good deal and every PSP fan should have a membership.
And it's not just that you get free PSP downloads for 40 cents a year, but there are also amazing bonuses which can improve your PSP dramatically, for example PSP video converter can convert your DVD's so you can watch them on your PSP and you get that for free after you join.

Are there any pros and cons having a free PSP download service? Here's what I've discovered during my two month membership period. Yes, I have been a member of a free PSP download service for two months now.
Pros: You can free PSP download at any time, any day, any minute, they are pretty fast, the member area has lot's of cool bonuses and features. The staff will respond as fast as possible. Took them about 12 hours to answer me. They have video instructions about how to start your free PSP downloads. Plus they have a money back guarantee so you can quit within 8 weeks.
Cons: I have to pay the membership fee, hmm, strange, but I can't tell any other cons, I am pretty happy with them.
So which free PSP download service would I recommend? I actually have tried only one, which you can read review about below.


Read detailed review about PSP Blender and get FREE PSP downloads instantly. Walter Seth is a PSP addict and loves to download movies and games on his PSP.

Article Source:
http://EzineArticles.com/?expert=Walter_Seth

Monday, September 3, 2007

100 Oldest Domains On Internet

The 100 oldest domains on the internet

To satisfy my curiosity, I went in search of the earliest adopters of the World Wide Web as we know it today and to my surprise there were WWW dns entries that go back as far as 1985…can you believe that…now who was browsing the internet back in 1985 (other than Al Gore). Anyways, the list below represents the 100 first domains ever registered on the internet…it includes some expected names, some unexpected names and some notable missing names.(NB. Entries registered on the same days are in random order on that day.)

1. 15-Mar-1985 http://www.symbolics.com/
2. 24-Apr-1985 http://www.bbn.com/
3. 24-May-1985 http://www.think.com/
4. 11-Jul-1985 http://www.mcc.com/
5. 30-Sep-1985 http://www.dec.com/
6. 07-Nov-1985 http://www.northrop.com/
7. 09-Jan-1986 http://www.xerox.com/
8. 17-Jan-1986 http://www.sri.com/

9. 03-Mar-1986 http://www.hp.com/
10. 05-Mar-1986 http://www.bellcore.com/
11. 19-Mar-1986 http://www.ibm.com/
12. 19-Mar-1986 http://www.sun.com/
13. 25-Mar-1986 http://www.intel.com/
14. 25-Mar-1986 http://www.ti.com/
15. 25-Apr-1986 http://www.att.com/
16. 08-May-1986 http://www.gmr.com/
17. 08-May-1986 http://www.tek.com/
18. 10-Jul-1986 http://www.fmc.com/
19. 10-Jul-1986 http://www.ub.com/
20. 05-Aug-1986 http://www.bell-atl.com/
21. 05-Aug-1986 http://www.ge.com/
22. 05-Aug-1986 http://www.grebyn.com/
23. 05-Aug-1986 http://www.isc.com/
24. 05-Aug-1986 http://www.nsc.com/
25. 05-Aug-1986 http://www.stargate.com/
26. 02-Sep-1986 http://www.boeing.com/
27. 18-Sep-1986 http://www.itcorp.com/
28. 29-Sep-1986 http://www.siemens.com/
29. 18-Oct-1986 http://www.pyramid.com/
30. 27-Oct-1986 http://www.alphacdc.com/
31. 27-Oct-1986 http://www.bdm.com/
32. 27-Oct-1986 http://www.fluke.com/
33. 27-Oct-1986 http://www.inmet.com/
34. 27-Oct-1986 http://www.kesmai.com/
35. 7-Oct-1986 http://www.mentor.com/
36. 7-Oct-1986 http://www.nec.com/
37. 27-Oct-1986 http://www.ray.com/
38. 27-Oct-1986 http://www.rosemount.com/
39. 27-Oct-1986 http://www.vortex.com/
40. 05-Nov-1986 http://www.alcoa.com/
41. 05-Nov-1986 http://www.gte.com/
42. 17-Nov-1986 http://www.adobe.com/
43. 17-Nov-1986 http://www.amd.com/
44. 17-Nov-1986 http://www.das.com/
45. 17-Nov-1986 http://www.data-io.com/
46. 17-Nov-1986 http://www.octopus.com/
47. 17-Nov-1986 http://www.portal.com/
48. 17-Nov-1986 http://www.teltone.com/
49. 11-Dec-1986 http://www.3com.com/
50. 11-Dec-1986 http://www.amdahl.com/
51. 11-Dec-1986 http://www.ccur.com/
52. 11-Dec-1986 http://www.ci.com/
53. 11-Dec-1986 http://www.convergent.com/
54. 11-Dec-1986 http://www.dg.com/
55. 11-Dec-1986 http://www.peregrine.com/
56. 11-Dec-1986 http://www.quad.com/
57. 11-Dec-1986 http://www.sq.com/
58. 11-Dec-1986 http://www.tandy.com/
59. 11-Dec-1986 http://www.tti.com/
60. 11-Dec-1986 http://www.unisys.com/
61. 19-Jan-1987 http://www.cgi.com/
62. 19-Jan-1987 http://www.cts.com/
63. 19-Jan-1987 http://www.spdcc.com/
64. 19-Feb-1987 http://www.apple.com/
65. 04-Mar-1987 http://www.nma.com/
66. 04-Mar-1987 http://www.prime.com/
67. 04-Apr-1987 http://www.philips.com/
68. 23-Apr-1987 http://www.datacube.com/
69. 23-Apr-1987 http://www.kai.com/
70. 23-Apr-1987 http://www.tic.com/
71. 23-Apr-1987 http://www.vine.com/
72. 30-Apr-1987 http://www.ncr.com/
73. 14-May-1987 http://www.cisco.com/
74. 14-May-1987 http://www.rdl.com/
75. 20-May-1987 http://www.slb.com/
76. 27-May-1987 http://www.parcplace.com/
77. 27-May-1987 http://www.utc.com/
78. 26-Jun-1987 http://www.ide.com/
79. 09-Jul-1987 http://www.trw.com/
80. 13-Jul-1987 http://www.unipress.com/
81. 27-Jul-1987 http://www.dupont.com/
82. 27-Jul-1987 http://www.lockheed.com/
83. 28-Jul-1987 http://www.rosetta.com/
84. 18-Aug-1987 http://www.toad.com/
85. 31-Aug-1987 http://www.quick.com/
86. 03-Sep-1987 http://www.allied.com/
87. 03-Sep-1987 http://www.dsc.com/
88. 03-Sep-1987 http://www.sco.com/
89. 22-Sep-1987 http://www.gene.com/
90. 22-Sep-1987 http://www.kccs.com/
91. 22-Sep-1987 http://www.spectra.com/
92. 22-Sep-1987 http://www.wlk.com/
93. 30-Sep-1987 http://www.mentat.com/
94. 14-Oct-1987 http://www.wyse.com/
95. 02-Nov-1987 http://www.cfg.com/
96. 09-Nov-1987 http://www.marble.com/
97. 16-Nov-1987 http://www.cayman.com/
97. 16-Nov-1987 http://www.entity.com/
99. 24-Nov-1987 http://www.ksr.com/
100. 30-Nov-1987 http://www.nynexst.com/

Thursday, August 23, 2007

Advanced Google Searching (Google Hacking)

Google is a powerful search engine that hackers often use it to find passwords, and confidential or sensitive documents that companies do not realize are even available to the public. Most computer people use Google, but do not know how to use all of its search parameters. The term "google hacking" is a method used by unscrupulous people to not only uncovers sensitive data, but also to expose web server vulnerabilities. Here I list several Google search parameters and examples.



The syntax "filetype:" instructs Google to search for files on the Internet with specific extensions. For example: filetype:doc site:gov confidential Google will produce all the word documents, from all the gov domains that may contain the word confidential. Another example is, filetype:pdf site:com access-list. You may use any domain type, (com, gov, edu…)

The syntax "cache:" will display the version of the web page that Google has in its cache. For Example: "cache:www.microsoft.com" will display Google's cache of the Microsoft homepage.

The syntax "intext" searches for the words within a specific website and ignores the URLs and page titles. For example: intext:confidential will return only links to those web pages that has the search keyword " confidential " in its webpage.



The syntax "intitle:" instructs Google to search for pages that contain the words behind intitle: For example intitle:index of master.passwd will return pages within Unix or Linux where the master.passwd files are. /etc/passwd "allintitle:" will produce a list of all words in the title. Google will ignore the slashes.

intitle: examples:

intitle:"Index of" .sh_history

intitle:"Index of" .bash_history

intitle:"index of" passwd

intitle:"index of" people.lst

intitle:"index of" pwd.db

intitle:"index of" etc/shadow

intitle:"index of" spwd

intitle:"index of" master.passwd

intitle:"index of" htpasswd

intitle:"index of" members OR accounts

intitle:"index of" user_carts OR user_cart

allintitle: sensitive filetype:doc

allintitle: restricted filetype :mail

allintitle: restricted filetype:doc site:gov

The syntax "inurl:" instructs Google to search for pages that contain specific words or characters included in the URL such as this inurl:windows. The results of this query will produce such pages that have the word "windows" in it. allinurl: will produces the results of URLs with all of the specified words in its query. allinurl:windows/cracks.

inurl: examples:

inurl:admin filetype:txt
inurl:admin filetype:db
inurl:admin filetype:cfg
inurl:mysql filetype:cfg
inurl:passwd filetype:txt
inurl:iisadmin
inurl:auth_user_file.txt
inurl:orders.txt
inurl:"wwwroot/*."
inurl:adpassword.txt
inurl:webeditor.php
inurl:file_upload.php
inurl:gov filetype:xls "restricted"




The syntax "link:" will produce a list of webpages that have a link to a specified webpage. For example: link:www.thenetworkadministrator.com will create a Google list of websites with links to www.thenetworkadministrator.com.

The Google syntax "phonebook" searches for U.S. street addresses and phone number information. For Example: "phonebook:James+FL" will list down all names of person having "James" in their names and located in "Florida (FL)".
The syntax related: lists web pages that are "similar" to a specific web page. For Example: related:www.thenetworkadministrator.com will list web pages that are similar to that of TheNetworkAdministrator's homepage.


The syntax site: instructs Google to search for keywords in a particular site or domain. For example: exchange site:microsoft.com will search for the keywords "exchange" in those web pages in all the links of the domain microsoft.com.



Related Posts:


LimeWire Hackers


Extreme Hacking Videos


Wirless Network Attackers


Hacking Login Windows Screen

Tuesday, August 14, 2007

Hacking Videos

.:: reaL hackinG videoS ::.




Hacking Internet Security Cameras





Extortion Spyware



Related Posts:


LimeWire Hackers


Wirless Network Attackers

Hacking Login Windows Screen

Advanced Google Search Keyword Hacking

Wireless Network Attackers

.:: Wireless Network Attackers ::.

Wireless hacking, or "Wardriving" is when someone from outside your home accesses your wireless network. In most case it is because the victim doesn't have security enabled on their wireless access point. The dangers of having a non-secure wireless access-point are: Spammers can send junk mail from your home, hackers and criminals can hack remote locations that are tracked back to you, your confidential information is exposed to anyone that parks outside your home with a laptop. You may also suffer some liability because attacks were launched from your home by the bad guys. Here is a video of Joe and I as we drove around the local new station, showed them hundreds of open wireless networks in minutes


Listed below are 8 Tips to

Top 8 Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)

Changing the default password is important because everyone that purchases the same Wireless access device, knows your password.

2) Turn on (Compatible) WPA / WEP Encryption


By default, your Wireless device comes without the encryption enables. WPA / WEP are security programs that forced your computer to provide an encrypted password before you are allowed access to the wireless access point.

3) Change the Default SSID

SSID is the network name of your wireless network; most people leave the default name, such as, Linksys or NetGear. By changing the name, intruders have a more difficult time identifying your system and use known vulnerabilities. (And of course, use the unchanged default password.) One mistake people make is naming their home network their family name and or address. When cruising a neighborhood of wireless devices, its always scary to see Smithfamily201Elm.

4) Disable SSID Broadcast

In Wi-Fi networking, the access point or router typically broadcasts the network name (SSID) over the air at regular intervals. This feature was designed for businesses and mobile hotspots where Wi-Fi clients may come and go. In the home, this feature is unnecessary, and it increases the likelihood an unwelcome neighbor or hacker will try to log in to your home network.

5) Assign Static IP Addresses to Devices

Most home networkers gravitate toward using dynamic IP addresses. This means that the IP Address, (the IP Address is needed to participate on a network.) is typically assigned automatically. A dynamic IP address on an unsecure system can also supply a hacker with a IP Address.

6) Enable MAC Address Filtering

Each piece of Wi-Fi gear possesses a unique identifier called the "physical address" or "MAC address." Access points and routers keep track of the MAC addresses of all devices that connect to them. Many such products offer the owner an option to key in the MAC addresses of their home equipment that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not so powerful as it may seem. Hacker software programs can fake MAC addresses easily.

7) Turn Off the Network During Extended Periods of Non-Use

The ultimate in security measures for any wireless network is to shut down, or turn office your wireless access point when you are not using. You are the most vulnerable at work or asleep, and mischief minded people know it.

8) Position the Router or Access Point Safely

Wi-Fi signals normally reach to the exterior of a home. A small amount of "leakage" outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often reach across streets and through neighboring homes. When installing a wireless home network, the position of the access point or router determines it's reach. Try to position these devices near the center of the home rather than near windows to minimize this leakage.



Related Posts:


LimeWire Hackers


Extreme Hacking Videos


Hacking Login Windows Screen

Advanced Google Search Keyword Hacking