Security of laptops and notebooks have been evolving with new technologies like fingerprint readers, eye scanners, face recognition etc but what about the personal computers? Using this trick you will be able to lock your computer with a Usb. The computer will work only when the Usb is plugged in. Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark. Moreover your computer will get automatically locked. To unlock the computer you will need to insert the Usb again. This trick will work on on all versions of windows including both windows 32 bit and 64 bit
President Obama shares a laugh with Facebook CEO Mark Zuckerberg during a town hall meeting earlier this year on reducing the national debt.
President Obama has done pretty well on Facebook. He recently told an audience at a San Francisco fundraiser that he has 19 million friends on the website, "which only puts me half a million friends behind SpongeBob SquarePants."
The president's chummy relationship is not just with Facebook users — he's also friendly with Facebook executives.
Cyber Law India website database hacked by MaDnI. This website was vulnerable to SQL injection attack. Hacker has exposed the detail of database and posted it on a website
As you move in this world of hacking.You will realise the importance oflinuxforhackers,programmers,geeks. I wont go in deep here in hackersbay for more tutorials&functioning of linuxyou can refer to oursister site
Most of us are aware how Antivirus Works and updates. As ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. Even though every one of us have an antivirus software installed on our computers, only a few really bother to understand how it actually works and updates.
MobME’s Online contest is only college students in Kerala and it starts next month
Trivandrum: MobME Wireless has announced an online contest CodeJAM to find the smartest computer hacker from Kerala’s college campuses. The contest is open to all college students who have a passion for programming puzzles regardless of their degree or educational merit. A grand prize of Rs 1 lakh awaits the winner. Now, this doesn’t get bigger and better than this.
Hi Readers....This post is only for new readers who have joined us recently. From last few days I am getting tons of emails regarding......Facebook Farmville Cheats, Codes, Tips, Tricks, Hacks and Secretss...etc.
According to an Italian internet security expert, all versions of Internet Explorer suffer from a flaw that could give up your private account access to hackers. Criminals can potentially break into any of your web sessions to steal cookies that grant them access to your Facebook, Gmail and Twitter accounts, among others.
A while back, Microsoft issued a security warning alert about a phishing scam targeting players of the popular first-person shooter Modern Warfare 2. The hacker has since been caught. Turns out he was a 14-year-old schoolboy from Dublin, Ireland.
In case you missed it, hackers were busy building new ideas and products at TechCrunch Disrupt’s Hackathon in New York last night. Fueled by RedBull, coffee, and massive quantities of junk food, hackers burned the midnight oil last night, preparing to show off their designs to the judges, who included VC Jeff Clavier and Canv.as founder Christopher Poole, and VP of Product Bradley Horowitz.
The Google Chrome web browser is slowly growing in popularity. This is no surprise, as it is a great browser, and is backed by no other than Google. It also provides great tools for web developers and I find myself using it more and more (actually Firebug is the only thing keeping me from crossing to the other side).
With the introduction of extensions, Google Chrome became even more agile and powerful.
In this tutorial, we are going to create a simple extension, which puts a small icon next to Chrome’s address bar, and, when clicked, will fetch HACKS N CRACKS RSS feed and display a fancy preview of our latest POSTS.
Facebook Hacked Again: Facebook Leaked millions of user credentials
App bug overrides user privacy settings
Facebook has leaked access to millions of users' photographs, profiles and other personal information because of a years-old bug that overrides individual privacy settings, researchers from Symantec said.
WikiLeaks Threatens Its Own Leakers With $20 Million Penalty
By Kevin Poulsen: Senior editor at Wired.com
WikiLeaks founder Julian Assange now makes his associates sign a draconian nondisclosure agreement that, among other things, asserts that the organization’s huge trove of leaked material is “solely the property of WikiLeaks,” according to a report Wednesday.
All of us use facebook and want a dislike button too for disliking some posts on facebook. Scammers are now using this need as their spam spreading method on facebook. Facebook scammers are tricking users to paste rogue code into their browser's address bars in order to get a Dislike button added to their options. The spam messages posted by victims read "Facebook now has a dislike button! Click Enable Dislike Button' to turn on the new feature!" The scammers replace share link by a message "Enable Dislike Button". After clicking the link, this message will share this spam message to all friends of user and also rune some rouge code on his system too.
Lady Gaga became the first Twitter user to reach 10 million followers this weekend, setting a new record for the social networking site.
Gaga hit the number Saturday and announced it in a tweet to her fans, whom she often calls "little monsters."
Gaga's celebratory tweet, which included a link to a photo of her in England, read:
Facebook has bought FB.com for 8.5 million dollars from American Farm Bureau. Facebook bought the Web address for Facebook employees' internal use. The transaction was announced by Facebook founder and chief executive Mark Zuckerberg on Nov. 15 when the company unveiled its retooled messaging system. Zuckerberg said that employees were already using the site in addition to adopting email addresses ending in FB.com. At the time, financial details of the sale were not disclosed.
Back in August 2005, TheFacebook purchased Facebook.com for $200,000 -- 42.5 times less than the estimated price tag for FB.com.
For a group of developers on Facebook’s platform, the clock is ticking.
Last night and into today, Facebook has been sending out notices to developers they believe have apps in violation of their policy against sending authentication data to third parties. Those developers have 48 hours to fix their apps or they risk being “subject to one of the enforcement actions” — read: being booted.
You may recall that all of this initially came up last week when Symantec wrote a blog post entitled “Facebook Applications Accidentally Leaking Access to Third Parties.” That post detailed how the company found close to 100,00 apps that were inadvertently leaking auth tokens due to the use of iframes for app authentication. As a result, Facebook responded with a blog post of their own noting that by September 1 of this year all apps must migrate to OAuth 2.0, ensuring encrypted access tokens.
Cisco ran a rather grandiosely named “Pan-European Security Council” yesterday, which wasn’t really any such thing. Nor, alas, did it deliver on its promise to look at the security issues surrounding the future internet when 50 billion or more devices are wired up, the so-called “internet of things”.
This was a missed opportunity because this is an area worth investigating, and a networking company like Cisco could have brought some real insight. Instead we were treated to the usual diet of how teenagers use Facebook and, that hoariest of hoary internet subjects, the internet-enabled fridge.
Here’s how Ronaldinho’s site is supposed to look. But here’s how it looked on Friday after a dastardly hacker changed things around. Shocked fans of the Brazilian soccer star couldn’t believe their eyes: how could someone be so callous as to link Ronaldinho with such a loathesome figure? I mean really: Ronaldino, a Jar Jar Binks fan?
Gary McKinnon may lose his fight against being extradited to the United States. The 45-year-old Scottish computer hacker was charged by the U.S. with the “biggest military computer hack of all time” in 2001 and 2002 after looking for information about UFOs and extraterrestrials, and has been fighting extradition ever since. There were hopes than an upcoming visit to the UK by U.S. president Barack Obama later this month would result in a breakthrough for McKinnon’s case. But according to the Daily Mail, U.S. Attorney General Eric Holder vowed last week to take all necessary steps to extradite Gary.
Hey guyz, today at Hacks N Cracks we are going to discuss “5 Most Common Mistakes Done by Beginners in the field of Hacking“ or we can say “5 things Every New Beginner Hacker Should Know”. This post is for everyone out there who actually want to become a true hacker:- 1) Never trust sites that ask you for money in return of Hacking Softwares or who claim to Hack Email Id’s in return of money. All such things are Scam . Nothing Works.
A little less than two years ago we set out to make computers much better. Today, we’re announcing the first Chromebooks from our partners, Samsung and Acer. These are not typical notebooks. With a Chromebook you won’t wait minutes for your computer to boot and browser to start. You’ll be reading your email in seconds.
For indians, songs.pk is one of those famous websites which are usd for downloading latest bollywood and pakisatani songs. www.songs.pk is Hacked. It's FTP has been broken by a hacker. The hacker who hacked this is from Pujab, India. Hacker used some custom exploit to break into the FTP. Songs.pk's three-month global Alexa traffic rank is 799. About 81% of visitors to the site come from India, where it has attained a traffic rank of 60. Now just imagine how much huge traffic this website is getting.
"Verify your account" Scammers Use New Trick to Mimic Legit Facebook Links
This is a new kind of scam spreading on facebook. Scammers are managing to spread scams on Facebook by using a new trick to make malicious links appear as if they are part of the website's normal user interface.
I was surfing around the internet when i saw the news saying that clickjacking attack is now targeting facebook users. yeah it's bad news for facebook user. Then it came in my mind that i didn't tell my readers about this attack. Now it is important to know about this attack because this is very advance attack and need some programming skill. I will try to explain it in simple but it is li'le bit complicated for a non programmer to understand but now too hard as as you are thinking now :)
We hear about a new scam daily on facebook. All technology failed to prevent and stop spams on facebook. Facebook has also tie up with WOT to check a link to be malicious or not. Social netorking website has also deloyed a new mechanism to detect and block spams. New mechanism is designed to prevent clickjacking and rogue code pasting tricks commonly used in survey scams.
Security of laptops and notebooks have been evolving with new technologies like fingerprint readers, eye scanners, face recognition etc but what about the personal computers?
Using this trick you will be able to lock your computer with a Usb. The computer will work only when the Usb is plugged in. Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark. Moreover your computer will get automatically locked. To unlock the computer you will need to insert the Usb again.
Spreaker (http://www.spreaker.com) offers a new perspective on online radio: everyone has a voice and everyone gets a chance to speak their mind. By registering for free on www.spreaker.com you can record podcasts or go live with your own personal radio shows, audio web shows, start a discussion on whatever topic you wish, and people will listen.
Sony hires Security & Forensic firms to Solve Hacking puzzle
Sony has hired a number of top security and forensic firms in an attempt to figure out who was behind the catastrophic breach of its online gaming networks, which led to millions of account details being exposed.
The former leader of an anarchistic hacking group called the Electronik Tribulation Army was sentenced Thursday to 9 years and 2 months in prison for installing malware on computers at a Texas hospital.
Jesse William McGraw, aka “GhostExodus,” was also ordered to pay $31,881 in restitution and serve three years of supervised release following his prison term.
McGraw, 26, of Arlington, Texas, came to FBI’s attention in 2009 after he shot a YouTube video of himself staging an “infiltration” mission at an office building, in which he’s seen dramatically skulking through the halls and installing RxBot on a desktop computer. According to the government, the Electronik Tribulation Army was building a modest botnet to attack rival hacker gangs, including Anonymous — which at the time was known more for ambitious pranks than for the hacktivism that has since made it famous.
Computer security researcher Wesley McGrew. (Photo: Kristen Hines Baker, courtesy Mississippi State University)
In another video McGraw displayed his personal collection of infiltration gear, including lock picks, a cellphone jammer and fake FBI credentials. Both videos turned out to be shot at the Northern Central Medical Plaza in Dallas, where McGraw worked as a night security guard and had free run of the building.
McGraw pleaded guilty in May of last year to computer-tampering charges for putting malware on a dozen machines at the hospital, including a nurses’ station that had access to medical records. He also installed the remote-access program LogMeIn on the hospital’s Windows-controlled HVAC system.
“I think the sentence is appropriate,” says R. Wesley McGrew, of McGrew Security, the Mississippi computer-security researcher who first notified the FBI of GhostExodus’ antics after discovering screenshots of the HVAC access online.”He jeopardized public health and safety with his actions and I think its important to take a really strong stance against that.”
In the aftermath of McGraw’s arrest, other members of ETA mounted a campaign of harassment at McGrew, leading to FBI raids of three suspected members last year, but no apparent charges.
While his YouTube videos suggest McGraw was something less than a grave danger to cyberspace, FBI agents took him seriously when they learned he’d installed a backdoor in the HVAC unit. A failure of the unit — which controlled the heating, ventilation and air conditioning for the first and second floors of the North Central Surgery Center — could have affected hospital patients in the middle of a hot Texas summer, or caused drugs and other medical supplies to go bad, according to the bureau.
UPDATED: Osama bin Laden may have been the U.S.'s most wanted fugitive for the last decade, but his comfortable mansion on the outskirts of Islamabad, Pakistan was there for all to see - providing they had Google Earth and knew where to look.
In the wake of U.S. President Barack Obama's surprise announcement Sunday evening that U.S. Special Forces had located and killed bin Laden in Abbottābad,
The Wall Street Journal is reporting that Navy Seals hauled off a treasure trove of data, including computers, hard drives and portable storage devices, following their successful raid on the compound of Osama bin Laden - a raid that culminated with the death of the terrorist leader.
It’s one of the biggest data breaches in history. Now that Sony has come clean — sort of — on acomputer intrusion this month that exposed personal information on 77 million PlayStation Network users, one obvious question remains: Who pulled off the hack?
After Death, Osama Bin Laden Hacked Windows & MAC Users
Warning from Sophos to both Windows and Mac users
Mac users targeted by poisoned SEO in Google, DIY hacking kit
Web underworld launches DIY hacking kit for Mac
IT security company Sophos has issued a warning to both Windows and Mac users saying that a massive SEO poisoning attack has hit Google, which could in turn infect their computers.
Anonymous Caller Threatens to Kill Prime Minister Manmohan Singh
New Delhi, May 4: Delhi Police Wednesday said they have received an anonymous call threatening to kill Prime Minister Manmohan Singh and his predecessor Atal Bihari Vajpayee. The mobile phone call was traced to Ghaziabad, Delhi’s suburban town in Uttar Pradesh.
sSoccer news site Goal.com was recently found to be serving malware.
"In an analysis of the attack, Armorize researcher Wayne Huang suggests that a hacker specifically targeted and compromised Goal.com through a back-door that allowed the attacker to manipulate the site’s content
Wednesday, May 04, 2011Abhishek KhandalNo comments
DDOS Attack hits Rabobank: Cyber Attack Target Internet Banking & Mobile Banking Network
A cyber attack on Monday morning has almost completely paralysed the internet banking and mobile banking network of the Rabobank. A spokesperson said the bank’s network has been paralysed by a DDoS attack.
Wednesday, May 04, 2011Abhishek KhandalNo comments
Iranian Hackers Hacked Bahrain's Ministry of Housing Web site with anti-government slogans
Similar attacks have been launched against the Philippines Embassy in Bahrain and several publications, Gulf Daily News reported, saying it had been one of the victims. Housing officials said the security breach of its Web site had not resulted in the theft of any personal information of housing applicants.
Magic Animator is a quick and powerful animation creator for creating animated GIF & Flash banners, cool GIF animations and animated AVI videos. Fun, quick, and easy-to-use
Simple interface and clear workflow let you to create your own animation with a few clicks.
Edit animation with timeline Magic Animator introduces advanced timeline for animation editing. Which lets you manipulating animation symbols and texts, you can animate an object easily by creating liner motion and guide line motion. The layers technology helps to control over the object's size, placement, appearance and motion.
Animaton symbols creation tool
You can create animation symbols using drawing tools, your own pictures and videos to prepare your animation project . Magic Animator also provides lots of high quality animation symbols to help you express ideas and concepts, make your website or presentation more attractive and fun.
Add styled texts
In addition to font size and color, you can apply special text styles like drop shadows, blur, glows or emboss.
Add liner motion
The program lets you creates animation by changing the position, angle, size, visibility of animation symbols and texts. For each layer, you can add unlimited number of Linear motions. During the playback the program performs the motion sequence for each layer.
Add guide line motion
With Magic Animator, you can animate an object by create guide line motion easily. just drag your mouse to draw a guide line , you'll find animaton object moving follows it. you can add unlimited number of Linear motions on each layer .
Undoing operations Magic Animator provides you with the ability to Undo and Redo changes to your animation. All animation editing functions are undoable. The limitation of unregistered version is the FoxArc watermark on animation. Click to Download