Sign Up To Recive Latest Blog Updates

subscribe to Hacks N Cracks

Enter your email address:

Delivered by FeedBurner

Lock Your Computer With USB Flash Drive



Security of laptops and notebooks have been evolving with new technologies like fingerprint readers, eye scanners, face recognition etc but what about the personal computers?

Using this trick you will be able to lock your computer with a Usb. The computer will work only when the Usb is plugged in. Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark. Moreover your computer will get automatically locked. To unlock the computer you will need to insert the Usb again.

This trick will work on on all versions of windows including both windows 32 bit and 64 bit

Facebook Has Powerful Friends; Will Users Suffer?

President Obama shares a laugh with Facebook CEO Mark Zuckerberg during a town hall meeting earlier this year on reducing the national debt.

President Obama has done pretty well on Facebook. He recently told an audience at a San Francisco fundraiser that he has 19 million friends on the website, "which only puts me half a million friends behind SpongeBob SquarePants."

The president's chummy relationship is not just with Facebook users — he's also friendly with Facebook executives.

CYBER LAW INDIA WEBSITE DATABASE HACKED BY MADNI


Cyber Law India website database hacked by MaDnI


Cyber Law India website database hacked by MaDnI. This website was vulnerable to SQL injection attack. Hacker has exposed the detail of database and posted it on a website

WHAT IS LINUX

As you move in this world of hacking.You will realise the importance of linux forhackers,programmers,geeks.

I wont go in deep here in hackersbay for more tutorials&functioning of linux you can refer to oursister site

How Antivirus Software identifies threats

Most of us are aware how Antivirus Works and updates. As ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. Even though every one of us have an antivirus software installed on our computers, only a few really bother to understand how it actually works and updates.

Talent Hunt For Hackers

MobME’s Online contest is only college students in Kerala and it starts next month





Trivandrum: MobME Wireless has announced an online contest CodeJAM to find the smartest computer hacker from Kerala’s college campuses. The contest is open to all college students who have a passion for programming puzzles regardless of their degree or educational merit. A grand prize of Rs 1 lakh awaits the winner. Now, this doesn’t get bigger and better than this.


Facebook "news feed" are actually malware


Facebook "news feed" are actually malware


Security company BitDefender has said today that 20 percent of posts that Facebook users see on their "news feed" are actually malware.


60 percent of those attacks come from third-party apps.

Farmville Cheats, Codes & Facebook Hacks

Hi Readers....This post is only for new readers who have joined us recently. From last few days I am getting tons of emails regarding......Facebook Farmville Cheats, Codes, Tips, Tricks, Hacks and Secretss...etc.

Report: Hackers Can Use Internet Explorer Security Hole To Steal Your Cookies


According to an Italian internet security expert, all versions of Internet Explorer suffer from a flaw that could give up your private account access to hackers. Criminals can potentially break into any of your web sessions to steal cookies that grant them access to your Facebook, Gmail and Twitter accounts, among others.

Microsoft helping hacker to "develop his talent"

A while back, Microsoft issued a security warning alert about a phishing scam targeting players of the popular first-person shooter Modern Warfare 2. The hacker has since been caught. Turns out he was a 14-year-old schoolboy from Dublin, Ireland.

Share Large Files Directly Pc To Pc Using Web Browser Without Uploading Anywhere

Share Large Files Directly Pc To Pc Using Web Browser Without Uploading Anywhere




Can Hacking Be Ethical?



Can Hacking Be Ethical?

  • The noun 'hacker' refers to a person who enjoys learning the details of computer systems and stretch their capabilities.

What do Ethical Hackers do?



What do Ethical Hackers do?

  • "If you know the enemy and know yourself, you need not fear the result of a hundred battles." - Sun Tzu, Art of War

Hack Video Conference: How to hack VOIP



Hack Video Conference: How to hack VOIP



Network admins and users have a big mis-conception about VoIP, IP Video. They think its secure enough to be used in Coporate offices.

Sony Hacked Again... and Again... and Again... and Again


Sony Hacked Again... and Again... and Again... and Again

Sony has been hacked again, further bruising its tarnished image, as the company struggles to prove it can secure its networks.

Meet This 14-Year-Old Self Taught Hacker

In case you missed it, hackers were busy building new ideas and products at TechCrunch Disrupt’s Hackathon in New York last night. Fueled by RedBull, coffee, and massive quantities of junk food, hackers burned the midnight oil last night, preparing to show off their designs to the judges, who included VC Jeff Clavier and Canv.as founder Christopher Poole, and VP of Product Bradley Horowitz.

Area 51: An Uncensored History of Americas Top Secret Military Base [Audio, Unabridged]



Area 51: An Uncensored History of Americas Top Secret Military Base [Audio, Unabridged]

H-ch-tte Audio | 2011 | ISBN: 1609410890 | MP3@64 kbps | 16 hrs 11 mins | 458.97 Mb

Area 51.

Phishing site is running on the Sony’s servers: Sony Thai domain Hacked


Phishing site is running on the Sony’s servers: Sony Thai domain Hacked

Fake site running on hdworld.sony.co.th domain aiming an Italian credit card company

Making Your First Google Chrome Extension

The Google Chrome web browser is slowly growing in popularity. This is no surprise, as it is a great browser, and is backed by no other than Google. It also provides great tools for web developers and I find myself using it more and more (actually Firebug is the only thing keeping me from crossing to the other side).
With the introduction of extensions, Google Chrome became even more agile and powerful.
In this tutorial, we are going to create a simple extension, which puts a small icon next to Chrome’s address bar, and, when clicked, will fetch HACKS N CRACKS RSS feed and display a fancy preview of our latest POSTS.

Facebook Hacked Again: Facebook Leaked millions of user credentials

Facebook Hacked Again: Facebook Leaked millions of user credentials

App bug overrides user privacy settings

Facebook has leaked access to millions of users' photographs, profiles and other personal information because of a years-old bug that overrides individual privacy settings, researchers from Symantec said.

"Barack Obama" caught hacking cash machines

"Barack Obama" caught hacking cash machines

The alias is "Barack Obama" and the White House is his address. Of course, we're not talking about President Barack Obama.

WikiLeaks Threatens Its Own Leakers With $20 Million Penalty

WikiLeaks Threatens Its Own Leakers With $20 Million Penalty

By Kevin Poulsen: Senior editor at Wired.com

WikiLeaks founder Julian Assange now makes his associates sign a draconian nondisclosure agreement that, among other things, asserts that the organization’s huge trove of leaked material is “solely the property of WikiLeaks,” according to a report Wednesday.

"Facebook dislike button" is a new kind of spam

All of us use facebook and want a dislike button too for disliking some posts on facebook. Scammers are now using this need as their spam spreading method on facebook. Facebook scammers are tricking users to paste rogue code into their browser's address bars in order to get a Dislike button added to their options. The spam messages posted by victims read "Facebook now has a dislike button! Click Enable Dislike Button' to turn on the new feature!" The scammers replace share link by a message "Enable Dislike Button".
After clicking the link, this message will share this spam message to all friends of user and also rune some rouge code on his system too.

Lady Gaga becomes first Twitter user with 10 million followers

Lady Gaga became the first Twitter user to reach 10 million followers this weekend, setting a new record for the social networking site.
Gaga hit the number Saturday and announced it in a tweet to her fans, whom she often calls "little monsters."
Gaga's celebratory tweet, which included a link to a photo of her in England, read:

Facebook has bought FB.com domain


Facebook has bought FB.com for 8.5 million dollars from American Farm Bureau. Facebook bought the Web address for Facebook employees' internal use. The transaction was announced by Facebook founder and chief executive Mark Zuckerberg on Nov. 15 when the company unveiled its retooled messaging system. Zuckerberg said that employees were already using the site in addition to adopting email addresses ending in FB.com. At the time, financial details of the sale were not disclosed.


Back in August 2005, TheFacebook purchased Facebook.com for $200,000 -- 42.5 times less than the estimated price tag for FB.com.

Facebook Tells Some Developers They Have 48 Hours to Authentication Data Leaks


For a group of developers on Facebook’s platform, the clock is ticking.
Last night and into today, Facebook has been sending out notices to developers they believe have apps in violation of their policy against sending authentication data to third parties. Those developers have 48 hours to fix their apps or they risk being “subject to one of the enforcement actions” — read: being booted.
You may recall that all of this initially came up last week when Symantec wrote a blog post entitled “Facebook Applications Accidentally Leaking Access to Third Parties.” That post detailed how the company found close to 100,00 apps that were inadvertently leaking auth tokens due to the use of iframes for app authentication. As a result, Facebook responded with a blog post of their own noting that by September 1 of this year all apps must migrate to OAuth 2.0, ensuring encrypted access tokens.

The Internet Of Things: How Will We Trust A Word It Says?

Cisco ran a rather grandiosely named “Pan-European Security Council” yesterday, which wasn’t really any such thing. Nor, alas, did it deliver on its promise to look at the security issues surrounding the future internet when 50 billion or more devices are wired up, the so-called “internet of things”.
This was a missed opportunity because this is an area worth investigating, and a networking company like Cisco could have brought some real insight. Instead we were treated to the usual diet of how teenagers use Facebook and, that hoariest of hoary internet subjects, the internet-enabled fridge.

Ronaldinho’s web site hacked in most ominous yet hilarious way possible

Here’s how Ronaldinho’s site is supposed to look. But here’s how it looked on Friday after a dastardly hacker changed things around. Shocked fans of the Brazilian soccer star couldn’t believe their eyes: how could someone be so callous as to link Ronaldinho with such a loathesome figure? I mean really: Ronaldino, a Jar Jar Binks fan?
The hacker also put Osama bin Laden up there as well.

No mercy for UFO hacker Gary McKinnon

McKinnon with mother Janis Sharp
Gary McKinnon may lose his fight against being extradited to the United States. The 45-year-old Scottish computer hacker was charged by the U.S. with the “biggest military computer hack of all time” in 2001 and 2002 after looking for information about UFOs and extraterrestrials, and has been fighting extradition ever since. There were hopes than an upcoming visit to the UK by U.S. president Barack Obama later this month would result in a breakthrough for McKinnon’s case. But according to the Daily Mail, U.S. Attorney General Eric Holder vowed last week to take all necessary steps to extradite Gary.

5 Things Every Beginner Hacker Should Know

Hey guyz, today at Hacks N Cracks we are going to discuss “5 Most Common Mistakes Done by Beginners in the field of Hacking“ or we can say “5 things Every New Beginner Hacker Should Know”.
This post is for everyone out there who actually want to become a true hacker:-
1) Never trust sites that ask you for money in return of Hacking Softwares or who claim to Hack Email Id’s in return of money. All such things are Scam . Nothing Works.

Google anounces THE CHROME BOOK

A new kind of computer: Chromebook

(Cross-posted on the Code and Chrome Blogs)

A little less than two years ago we set out to make computers much better. Today, we’re announcing the first Chromebooks from our partners, Samsung and Acer. These are not typical notebooks. With a Chromebook you won’t wait minutes for your computer to boot and browser to start. You’ll be reading your email in seconds.

Pakisatini songs website www.songs.pk hacked

Pakisatini songs website www.songs.pk hacked



For indians, songs.pk is one of those famous websites which are usd for downloading latest bollywood and pakisatani songs. www.songs.pk is Hacked. It's FTP has been broken by a hacker. The hacker who hacked this is from Pujab, India. Hacker used some custom exploit to break into the FTP. Songs.pk's three-month global Alexa traffic rank is 799. About 81% of visitors to the site come from India, where it has attained a traffic rank of 60. Now just imagine how much huge traffic this website is getting.

SOURCE: AMARJIT.INFO

 

"Verify your account" Scammers Use New Trick to Mimic Legit Facebook Links


"Verify your account" Scammers Use New Trick to Mimic Legit Facebook Links

This is a new kind of scam spreading on facebook. Scammers are managing to spread scams on Facebook by using a new trick to make malicious links appear as if they are part of the website's normal user interface.

Clickjacking | attack and protection



I was surfing around the internet when i saw the news saying that clickjacking attack is now targeting facebook users. yeah it's bad news for facebook user. Then it came in my mind that i didn't tell my readers about this attack. Now it is important to know about this attack because this is very advance attack and need some programming skill. I will try to explain it in simple but it is li'le bit complicated for a non programmer to understand but now too hard as as you are thinking now :)

facebook deploys a new system to detect and prevent spams

We hear about a new scam daily on facebook. All technology failed to prevent and stop spams on facebook. Facebook has also tie up with WOT to check a link to be malicious or not. Social netorking website has also deloyed a new mechanism to detect and block spams. New mechanism is designed to prevent clickjacking and rogue code pasting tricks commonly used in survey scams. 

Lock Your Computer With USB Flash Drive

Security of laptops and notebooks have been evolving with new technologies like fingerprint readers, eye scanners, face recognition etc but what about the personal computers?

Using this trick you will be able to lock your computer with a Usb. The computer will work only when the Usb is plugged in. Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark. Moreover your computer will get automatically locked. To unlock the computer you will need to insert the Usb again.

Host Live Radio Shows Online, Create Podcasts, Broadcast DJ Sessions


Spreaker (http://www.spreaker.com) offers a new perspective on online radio: everyone has a voice and everyone gets a chance to speak their mind. By registering for free on www.spreaker.com you can record podcasts or go live with your own personal radio shows, audio web shows, start a discussion on whatever topic you wish, and people will listen.

Sony hires security & forensic firms to Solve Hacking puzzle


Sony hires Security & Forensic firms to Solve Hacking puzzle

Sony has hired a number of top security and forensic firms in an attempt to figure out who was behind the catastrophic breach of its online gaming networks, which led to millions of account details being exposed.

Leader of Hacker Gang Sentenced to 9 Years For Hospital Malware



The former leader of an anarchistic hacking group called the Electronik Tribulation Army was sentenced Thursday to 9 years and 2 months in prison for installing malware on computers at a Texas hospital.
Jesse William McGraw, aka “GhostExodus,” was also ordered to pay $31,881 in restitution and serve three years of supervised release following his prison term.
McGraw, 26, of Arlington, Texas, came to FBI’s attention in 2009 after he shot a YouTube video of himself staging an “infiltration” mission at an office building, in which he’s seen dramatically skulking through the halls and installing RxBot on a desktop computer. According to the government, the Electronik Tribulation Army was building a modest botnet to attack rival hacker gangs, including Anonymous — which at the time was known more for ambitious pranks than for the hacktivism that has since made it famous.
Computer security researcher Wesley McGrew. (Photo: Kristen Hines Baker, courtesy Mississippi State University)
In another video McGraw displayed his personal collection of infiltration gear, including lock picks, a cellphone jammer and fake FBI credentials. Both videos turned out to be shot at the Northern Central Medical Plaza in Dallas, where McGraw worked as a night security guard and had free run of the building.
McGraw pleaded guilty in May of last year to computer-tampering charges for putting malware on a dozen machines at the hospital, including a nurses’ station that had access to medical records. He also installed the remote-access program LogMeIn on the hospital’s Windows-controlled HVAC system.
“I think the sentence is appropriate,” says R. Wesley McGrew, of McGrew Security, the Mississippi computer-security researcher who first notified the FBI of GhostExodus’ antics after discovering screenshots of the HVAC access online.”He jeopardized public health and safety with his actions and I think its important to take a really strong stance against that.”
In the aftermath of McGraw’s arrest, other members of ETA mounted a campaign of harassment at McGrew, leading to FBI raids of three suspected members last year, but no apparent charges.
While his YouTube videos suggest McGraw was something less than a grave danger to cyberspace, FBI agents took him seriously when they learned he’d installed a backdoor in the HVAC unit. A failure of the unit — which controlled the heating, ventilation and air conditioning for the first and second floors of the North Central Surgery Center — could have affected hospital patients in the middle of a hot Texas summer, or caused drugs and other medical supplies to go bad, according to the bureau.

Bin Laden's Hideout On Google The Whole Time?


Bin Laden's Hideout On Google The Whole Time?


UPDATEDOsama bin Laden may have been the U.S.'s most wanted fugitive for the last decade, but his comfortable mansion on the outskirts of Islamabad, Pakistan was there for all to see - providing they had Google Earth and knew where to look.
In the wake of U.S. President Barack Obama's surprise announcement Sunday evening that U.S. Special Forces had located and killed bin Laden in Abbottābad,

Report: bin Laden Raid Yields Treasure Trove of Data


The Wall Street Journal is reporting that Navy Seals hauled off a treasure trove of data, including computers, hard drives and portable storage devices, following their successful raid on the compound of Osama bin Laden - a raid that culminated with the death of the terrorist leader.

Who Hacked PlayStation Network: PlayStation Network Hacking Suspects

 Who Hacked PlayStation Network: PlayStation Network Hacking Suspects


It’s one of the biggest data breaches in history. Now that Sony has come clean — sort of — on acomputer intrusion this month that exposed personal information on 77 million PlayStation Network users, one obvious question remains: Who pulled off the hack?

Osama Bin Laden Hacked Windows & MAC Users: Warning from Sophos


After Death, Osama Bin Laden Hacked Windows & MAC Users

Warning from Sophos to both Windows and Mac users

Mac users targeted by poisoned SEO in Google, DIY hacking kit

Web underworld launches DIY hacking kit for Mac
IT security company Sophos has issued a warning to both Windows and Mac users saying that a massive SEO poisoning attack has hit Google, which could in turn infect their computers.

Prime Minister Manmohan Singh Threatened by Anonymous Caller


Anonymous Caller Threatens to Kill Prime Minister Manmohan Singh

New Delhi, May 4: Delhi Police Wednesday said they have received an anonymous call threatening to kill Prime Minister Manmohan Singh and his predecessor Atal Bihari Vajpayee. The mobile phone call was traced to Ghaziabad, Delhi’s suburban town in Uttar Pradesh.

Soccer News Site Goal.com Hacked


Soccer News Site Goal.com Hacked

sSoccer news site Goal.com was recently found to be serving malware.

"In an analysis of the attack, Armorize researcher Wayne Huang suggests that a hacker specifically targeted and compromised Goal.com through a back-door that allowed the attacker to manipulate the site’s content

DDOS Attack hits Rabobank: Cyber Attack Target Internet Banking & Mobile Banking Network



DDOS Attack hits Rabobank: Cyber Attack Target Internet Banking & Mobile Banking Network

A cyber attack on Monday morning has almost completely paralysed the internet banking and mobile banking network of the Rabobank. A spokesperson said the bank’s network has been paralysed by a DDoS attack.

Iranian Hackers Hacked Bahrain's Ministry of Housing Web site with anti-government slogans


Iranian Hackers Hacked Bahrain's Ministry of Housing Web site with anti-government slogans

Similar attacks have been launched against the Philippines Embassy in Bahrain and several publications, Gulf Daily News reported, saying it had been one of the victims. Housing officials said the security breach of its Web site had not resulted in the theft of any personal information of housing applicants.

Scroogle - Google Tracks Spies your Privacy | Amazing Story by Google Big Brother



Scroogled - by Cory Doctorow
"Give me six lines written by the most honorable of men, and I will find an excuse in them to hang him." 
— Cardinal Richelieu 

"We don't know enough about you." 
— Former Google CEO Eric Schmidt

Magic animator [Animate objects easily]

Magic animator - HACK CRACK 0
Magic Animator 



Magic Animator is a quick and powerful animation creator for creating animated GIF & Flash banners, cool GIF animations and animated AVI videos. Fun, quick, and easy-to-useMagic animator - HACK CRACK 0

Simple interface and clear workflow let you to create your own animation with a few clicks.


 Edit animation with timeline Magic Animator introduces advanced timeline for animation editing. Which lets you manipulating animation symbols and texts, you can animate an object easily by creating liner motion and guide line motion. The layers technology helps to control over the object's size, placement, appearance and motion. 


Animaton symbols creation tool 
You can create animation symbols using drawing tools, your own pictures and videos to prepare your animation project . Magic Animator also provides lots of high quality animation symbols to help you express ideas and concepts, make your website or presentation more attractive and fun.

Magic animator - HACK CRACK 0
Add styled texts 
In addition to font size and color, you can apply special text styles like drop shadows, blur, glows or emboss.
Add liner motion 
The program lets you creates animation by changing the position, angle, size, visibility of animation symbols and texts. For each layer, you can add unlimited number of Linear motions. During the playback the program performs the motion sequence for each layer.

Magic animator - HACK CRACK 0
Add guide line motion
With Magic Animator, you can animate an object by create guide line motion easily. just drag your mouse to draw a guide line , you'll find animaton object moving follows it. you can add unlimited number of Linear motions on each layer .

Magic animator - HACK CRACK 0
Undoing operations Magic Animator provides you with the ability to Undo and Redo changes to your animation. All animation editing functions are undoable. The limitation of unregistered version is the FoxArc watermark on animation. Click to Download

Twitter Delicious Facebook Digg Stumbleupon Favorites More