This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Hacker opens gaping holes in CSAT score security

As the investigation into the leak of college entrance exam results rolls on, prosecutors said yesterday that the computer server at the Korea Institute for Curriculum and Evaluation, which administers the exam, had been hacked over 200 times. Not only the test results but also the institute’s internal information was stolen.



According to prosecution and police sources, a manager at a public relations firm called Inuni Co. whose surname is Kim accessed the institute’s server over 200 times between August 2007 and December 2008.



A detention warrant was filed against Kim on charges of breaking information and network laws but it was rejected by the court.



Kim easily broke into the server. In August 2007, he accessed an employee’s e-mail account at the institute. Kim obtained the e-mail ID from a press release, and the password was the same as the ID.



Kim tried to log in to e-mail accounts of other institute employees over 50 times. One of his successes was with the account of someone in the institute’s administrative office. The employee used a password identical to the romanized spelling of his name.



One of the employee’s e-mails contained an attached file containing the passwords of five other employees at the institute. The employee temporarily managed the other employees’ e-mail access information because he dealt with changes in the institute’s server. Their passwords were identical to the last seven digits of their residential identification numbers.



In this way, Kim downloaded 16 types of internal information from the institute. Among the materials downloaded were plans to grade answer sheets from the 2009 College Scholastic Ability Test, scoring schedules and the number of students who missed the test.



“Kim could look at the Korea Institute for Curriculum and Evaluation’s internal information by accessing the e-mail of seven employees,” a prosecutor said.



Kim passed the information on to VisangEdu, a private education company. VisangEdu made the CSAT score analysis public on Dec. 9, a day before the CSAT results were announced.



Kim accessed the institute’s server four times on Dec. 10 after the institute requested a probe into this case.



As the investigation closed in on him, Kim destroyed a memo containing the IDs and passwords of the seven employees. Prosecutors plan to decide what kinds of charges they will file against Kim and a VisangEdu director whose surname is Jin this week.



source:click here

3 Ways a Twitter Hack

Just days after popular social networking tool Twitter was hit was a phishing scam, the company is now trying to clean up a mess surrounding a separate hacking attack.
Over the weekend, some Twitter users received scam tweets, or direct messages, to visit certain sites or blogs. The URL in the message redirected users to a bogus login page in an attempt to steal login credentials for a phishing scheme. Monday, thing got worse as Twitter officials revealed several high profile accounts, such as those of Britney Spears and Barack Obama were hacked.



"It appears someone gained access to the tools Twitter uses to control its millions of accounts," explained Graham Cluley, a senior technology consultant at security firm Sophos PLC. "Internal tools used by the tech support team were compromised. It's not clear if it was an inside job, or outside hacker. Twitter does say they think it was an individual."

The hack, according to Cluley, is much more serious than the earlier phishing attack because it was compromise of the system that potentially exposed all Twitter users to the following dangers.



Fraudalent password use If you gain access to someone's Twitter account, you might be able to gain access to their password, said Cluley.

"We know that 41 percent of people admit to using the same password on every web site and account that they access," he said.

Hackers, while gaining access to something seemingly simply like a username and password to one account may very well be able to use the information to gain access to more important information, such as your bank account.

Malware Infection Twitter officials said 33 accounts had been attacked in the latest hack, including high-profile users such as Britney Spears and Barack Obama. The hackers used their temporary access to send offensive messages. CNN journalist Rick Sanchez found his account had been hacked with a message that read "i am high on crack right now might not be coming to work today."

The damage could have been much worse, said Cluley, if the hacker had decided to take a different approach.

"Imagine if instead, in the case of Britney Spears account for example, that the hacker had posted a link that said: 'Here's my new video. Click on this link.' Imagine how many people would have clicked on that and it could have pointed to malware? And Barack Obama is one of the most followed people on Twitter. If he said: 'I've just made a new speech. Check it out.' a lot of people would click on that link and get infected."



source:network world

How To Identify Fonts Being Used In Images

Have you ever encountered problems in identifying what fonts is being used in an image? Of course fonts being used in popular movie banners can be found easily because you have the keyword but what if you found a free template and the font is not included? You either recreate the buttons with your own fonts replacing the original, or try posting in forums and hope that someone would have seen that font before and let you know what is the font name. There are so many fonts, maybe hundred of thousands fonts available on the internet and to identify an unknown font is definitely NOT an easy task!

If you need to identify a font, don’t despair. I have found 2 methods that is able to help you identify an unknown font. If it is not able to help you identify the font, it will at least help you narrow down to the closest ones.



Identifont, a free service offered to help you identify fonts by answering a series of simple questions about its appearance.
 
[ Identify Unknown Fonts with Identifont ]
 
Images can be color or black & white, and they don’t have to be very high quality (although that helps). Even a digital photograph of some lettering you like can be accepted. Accuracy of results is unprecedented by previous automatic systems. [ Identify Unknown Fonts with WhatTheFont ]

Finally, if WhatTheFont system is unable to give you a good match of the font you’re looking for, you can then submit your image to WhatTheFont Forum to have your image viewed by font geeks the world over.

Creates Auto-Starting Installer CDs for Any Applications

Windows only: Free app Install-It puts a small auto-starting application on any removable drive that makes installing applications a double-click affair.

After downloading the Install-It package, you'll want to extract its files to somewhere you can reach, like your desktop, and open up the Install.ini file in your favorite text editor. This file is simply a list of program descriptions and the locations of their installer files. If you're creating a disc full of useful installers, just replace the default examples with your chosen verbiage for each app and the location/names of the setup files. You separate those two items with a comma, using slashes where necessary, and end each line with a semi-colon.

Here's an example Install.ini I made for a supposed Windows XP re-installation:



Copy all your installer files and Install-It's files into a CD-burning app, such as CDBurnerXP, and fire away.

Now you've got a CD that, on most computers, will pop up with a list of programs that can be installed without anyone having to guess which icon or cryptic filename means. If a computer isn't set to auto-start when it detects an autorun.inf file, though, you'll have to point the computer to install.exe—not a problem, though, if you've put each application in its own directory.

Install-It is a free download for Windows systems only.

Install-It [via The Red Ferret Journal

Lock ID Yahoo Messenger: How to Unlock your Locked ID?

Lock ID means that your ID of Yahoo Messenger cannot be used anymore caused by someone who lock your ID. When you ID got locked, you will never be able to join or login to yahoo messenger. It mean, when you try to type your ID and type your password in chat client such as official chat client of yahoo messenger the error message will arise. Usually the error told that your password or username is incorrect.



You are being in chat room. Than suddenly, your got disconnected. When you try to login with your password and ID, the error that I told above appear. It may be you got locked. Lock ID work to lock you ID or username because you have a weak password, so whit a little iterations your password got locked. However, you will never got locked if you never online or login to yahoo messenger. Lock ID usually working if you are online.



How to unlock your ID if you got locked? You can find or search the software or tool to unlock your password again. However, if the ID or username not online, it usually the software not working that mean the unlocking doesn’t work.



For that reason, I will not share or give a link of download unlock ID software because, I am not guarantee the software work well. The best attempt to unlock your ID is, try to login not by yahoo messenger, but by mail of yahoo which has a same user name and password that been locked. Sometime, this step worked, but make sure after your login to yahoo mail and success, you have to change your password with new password, and then you can login to yahoo messenger with new password that you just been created. If you try to send a complain to the contact of yahoo messenger, It will useless. Yahoo doesn’t care what happen to your if you go locked.



To protect your ID or to prevent Lock ID, you must have a strong password. I will suggest you to not chat with your primary email in yahoo messenger. Sometime yahoo makes a prohibition to some of ID. This mean your ID can be banned by yahoo and your ID never be join to yahoo messenger or yahoo email again.



To create a strong password you must use all character who listed in your keyboard. Such as uppercase, number, and symbol. You must be create password which have not less 8 character or more. Here I give you an example a strong password: H4rP3 ^&* (with 3 space on it). To make a better password work well, you have to change your password frequently: 3 week or 3 month, depending how strong and important your password is.

Make Internet Calls from Computer PC to Phone Free Services Include

Below is the list (Website and Tools) how you can make a call to phone including mobile phone or home phone that you can do from you computer just only using Internet. That means you don’t use a cellphone or handphone or any phone, you just use Internet Connection and you desktop or Laptop or NoteBook or NetBook  computer



  • Magic Jack - Most Call are Free .

  • Skype - PC to PC aka skype to Skype Free Call, Need Charge for pc to Phone but cheaper that Phone to Phone

  • Yahoo! Voice - PC to PC Free using Yahoo Messenger Voice Talk, Need Charge for PC to Mobile Phone and else but in low cost

  • PalTalk - PC to PC and als PC to Phone

  • BuddyTalk

  • JaJah

  • DukaDial - North America Free Call

  • Voipcheap - Free Internet Calls (Limited)

  • sharpVoice

  • iConnectHere = PC to Pnone Calls

  • PC2Call - Prepaid Calls

  • YouTring - Free PC to PC, Cheap PC to Phone, International Calls available.

  • EvaPhone - Free VoiP Service PC to Cell Phone Home Phone all over the World

  • Net2Phone

How to get back your lost usb -USB Lost and Found

USB Lost and Found is a tool to setup your USB drive to keep unauthorized users from keeping your USB drive if it were to be lost. USB Lost and Found has two methods of telling unauthorized users to return it. The first method is the Message method which when the user tries to use your USB drive it comes up with a message box that tells them to return it, along with your contact information, and denies access to the USB drive. The second method, which only comes with the Pro version, is called Lock Down. Lock Down immediately locks the user's computer when the USB drive is accessed, covering the whole screen and denying access.

Message method:
[Image]
Lock Down method (Pro version only):
[Image]

[Image]

-Download/Version-
· This version of USB Lost and Found is currently 1.1

· You can download the Free version here. (1.2MB file)

· You can buy the Pro version below



-Requirements-
· Personal computer with Windows 2000/XP/Server/Vista



-Release Notes-
· 1.1:

· Redesigned installer

· Redesigned unlocking system

· Fixed Pro version password on Message selection bug

· 1.0:

· Publicly Released





-Features-
· Free version only has the Message method.

· Pro version has the Message method and the Lock Down method.

· Tricks users to not open it with AutoPlay and run Lock Down/Message.

· Double clicking the USB drive in My Computer causes Lock Down/Message to run.

· Fine with many Anti-viruses.



      Disclaimer: This software is shareware, if you liked it, buy the Pro version. The creator and contributors are not responsible with your actions with any of this software, and cannot be held accountable for any of it. You are not allowed to redistribute this software without Skyler Lyon's permission and consent. By using this software you agree to these terms.
[ Download USB Lost and Found ]

How to delete duplicate Wordpress posts

It can also used to delete the duplicate posts by wp-o-matic



I recently ran into trouble with a Wordpress installation of mine, where a homemade script went totally overboard, and never stopped running, adding posts to the database. Over a few days it added close to 9.000 posts, of which all were duplicates.

After a bit of searching I found the problem, but getting into the database to clean up was a bit of a problem, since the script was still running. I had to remove the script totally from my install in order to stop it!





After a bit of google search i found this trick its working 100% i tried with wordpress 2.6





login in to your  cpanel and go to the phpmyadmin  and select the your wordpress database and run this script in the  query window



DELETE bad_rows.*

from wp_posts as bad_rows

inner join (

select post_title, MIN(id) as min_id

from wp_posts

group by post_title

having count(*) > 1

) as good_rows on good_rows.post_title = bad_rows.post_title

and good_rows.min_id <> bad_rows.id
after deleting the posts u can  prevent the  duplicate post by Wp-o-matic

  1. Open up wp-includes/post.php in your favorite editor

  2. at approx line 703 you will find the following line :

    if ($post_name_check || in_array($post_name, $wp_rewrite->feeds) ) {

  3. After this insert a new line of code :

    return 0;

  4. save (you did make a backup, right?).

  5. All done.

Microsoft confirms that all versions of IE have critical new bug

It adds IE6 and IE8 Beta 2 to the list, recommends disabling .dll to stay safe 

The unpatched bug in Internet Explorer 7 (IE7) that hackers are now exploiting also exists in older versions of the browser, including the still-widely-used IE6, Microsoft Corp. said late yesterday. Today, a Danish security researcher added that Microsoft's original countermeasure advice was insufficient and recommended that users take one of the new steps the company spelled out.

In a revised security advisory, Microsoft said research confirmed that the bug is within all its browsers, including those it currently supports -- IE5.01, IE6 and IE7 -- as well as IE8 Beta 2, a preview version that the company doesn't support through normal channels.

Users running any of those browsers on Windows 2000, XP, Vista, Server 2003 or Server 2008 are at risk, Microsoft said.

Even so, the company continued to downplay the severity of the threat. "At this time, we are aware only of limited attacks that attempt to use this vulnerability against Windows Internet Explorer 7," said the advisory.

Microsoft also spelled out the root of the problem, saying that the bug is in IE's data binding functionality and, contrary to earlier reports by independent security researchers, not in the HTML rendering code.

"The vulnerability exists as an invalid pointer reference in the data-binding function of Internet Explorer," said Microsoft. "When data binding is enabled (which is the default state), it is possible under certain conditions for an object to be released without updating the array length, leaving the potential to access the deleted object's memory space. This can cause Internet Explorer to exit unexpectedly, in a state that is exploitable."

Microsoft also hinted that the "oledb32.dll" file contains the bug when it added a recommendation that users disable or cripple the .dll's function as a stopgap measure. Oledb32.dll is a component of Microsoft Data Access, a collection of technologies for accessing different types of data in a uniform fashion. "OLEDB" stands for "Object Linking and Embedding, Database."

Copenhagen-based Secunia APS claimed that its research, which it said has been passed along to Microsoft, identified the vulnerability's true nature. "After having published our initial advisory concerning this [zero-day exploit], one of my guys was therefore tasked with figuring out the exact nature of the problem," said Carsten Eiram, chief security specialist at Secunia, in a post to the security company's blog early Friday. "It turned out that a lot of available information and assumptions were wrong."

Among those, said Eiram, was the belief that the vulnerability existed only in IE7 and was related to XML processing -- as some, including Secunia, first thought.

Also incorrect, or at least partly so, is the idea that setting IE's Internet security zone to "High" and disabling scripting will keep one safe from attack, added Eiram. "Technically no ... it is still possible to trigger the vulnerability," he said. "However, it does make exploitation trickier as it protects against attacks using scripting."





source: computerworld

Google Chrome is now out of Beta

I know that most people arent really lining up to care about this but Google Chrome has finally come out of beta.  Now why is that really a big deal? Well thats because it seems like Google never takes anything out of beta. So why are they starting now. Also what is Google"s plan for this browser?  I really like potential for spyware protection and security but what else?



I have to admit after being out just 100 days of development and achieving 10 million active users around the globe, Google deserved to remove the “Beta” label from their software. I think we are just owed a bit of an explanation. I am sure that is what Mozilla Firefox is lookin for. If i was them I would be shaking right about now. The Chrome user base is probably made up of almost all Firefox users.



Some of the upcoming features that Gogole is working on includes RSS support, form auto-fill, extensions, bug fixes, security patches, etc. The adoption of the extension system by developers could also play a major role in eroding even more marketshare from Firefox. Lets see where Google goes now that Chrome is out of beta.

How to Use and Turn on GMail to send free SMS

Google is giving the whole SMS through Gmail thing a second try. The  Gmail Labs feature that lets people send text messages to people's mobile phones was originally taken off of line because Google was not able to figure out some of the issues with the SMS gateway they were using.  "A few weeks back, we ran into a few snags when we first started rolling this out, but starting today you can turn on text messaging for chat," said Leo Dirac, a Google product manager, in a blog post Wednesday.

[Image]
Right now Google has decided to only treat the US crowd with the ability to send sms messages from inside of GMail,  But I think that is just do to the logistics and trying to control the amount of load that the service will be generating.  Google will not want to pull the service for a second time since people will most likely become frustrated with the service and adoption will be impeded.

Just like all features that Google enables.  They first must be enabled by going into the settings of your of your Gmail account.

Ok so the first thing that you have to do is enable the "Text Messaging in Chat" option inside of your Gmail account.  Login to your Gmail account and then in the upper right hand corner click on the link that says "Settings".  Now this will open up the settings tab for your account. Now click on the tab that says "Labs" which is right next to "Themes" and "Web Clips" in your Gmail account.  Inside of the Labs section you are going to see a number of features that Google is releasing but I guess they don't feel is ready for primetime. Here is where you can enable the "Text Messaging in Chat Feature" Now this feature will be enabled on the left hand side inside of the window that you normally use when chatting.  Pretty simple.  Now you can send chat messages to your friends phones and they will be automatically converted to SMS messages.  When they respond they show up inside your chat window.  Same as any othe Google chat user.

Now your friends arent going to see your name inside of the message.  Instead they are going to see a "406" area code number.  This is a unique ID .  So they can add it to there phone and text back to you whenever they want.  Its is a great setup.

Sapyto v0.98 Released - SAP Penetration Testing Framework Tool

sapyto is the first SAP Penetration Testing Framework, sapyto provides support to information security professionals in SAP platform discovery, investigation and exploitation activities.

sapyto is periodically updated with the outcome of the deep research on the various security aspects in SAP systems.



Although sapyto is a versatile and powerful tool, it is of major importance for it to be used by consultants who are highly skilled and specialized in its usage, preventing any interference with your organization’s usual SAP operation.

New in This Version

This version is mainly a complete re-design of sapyto’s core and architecture to support future releases. Some of the new features now available are:

  • Target configuration is now based on “connectors”, which represent different ways to communicate with SAP services and components. This makes the

    framework extensible to handle new types of connections to SAP platforms.

  • Plugins are now divided in three categories: Discovery, Audit & Exploit.

  • Exploit plugins now generate shells and/or sapytoAgent objects.

  • New plugins!: User account bruteforcing, client enumeration, SAProuter assessment, and more…

  • Plugin-developer interface drastically simplified and improved.

  • New command switches to allow the configuration of targets/scripts/output independently.

  • Installation process and general documentation improved.



You can download sapyto v0.98 here (you may have to fill in a form):

sapyto Public Edition (v0.98)

World First Wireless USB Hub

[Image]
Finally Ratoc Systems Int. which is based in Japan released the first wireless USB hub. Named REX-WUSB1 and the price of this device is 345$

The kit contains a  wireless card put into the PC card slot and a hub that can also be plugged into the computer for non wireless use. The hub has three USB ports, But you can this wireless usb hub with only and Win XP and Win Vista.

It transfer Data with amazing speed that is near about 480Mbps for the USB 2.0 and wireless speed is also about 400-450 It will be helpful when you don’t have to move around three hard drives just to be able to plug them into a USB hub

Firefox issues eight patches for Web browser

Mozilla has issued eight patches for its Firefox Web browser, three of which fix problems classified as critical.
The patches come after security experts have recommended using a browser other than Microsoft's Internet Explorer 7 and older versions of IE due to a dangerous vulnerability. Microsoft is due to release an emergency patch for that problem Wednesday.

Two of the critical Firefox problems could allow an attacker execute a cross-site scripting attack, in which scripts or commands from one Web application that shouldn't run in another are successfully executed. The third problem relates to Firefox's browser engine, and could make it crash or possibly allow someone to remotely execute code on a PC, Mozilla said in its advisory.

Mozilla defines a critical vulnerability as one that could allow an attacker to run code on a machine in the course of normal Web browsing.



The patches are for Firefox version numbers 3.04 and 2.0.0.18. Mozilla has said this round of patches will be the last for Firefox 2, which it will now stop supporting. The update also removes the phishing filter in Firefox 2 because the browser uses an outdated version of a protocol used to import a blocklist of phishing sites supplied by Google. Firefox 2 users are being promoted to upgrade to Firefox 3.

Firefox's auto-update mechanism should automatically download these latest patches, and users will be prompted to restart the browser to complete the process.

How to Delete Files Permanently from the Computer

When you delete a file from your computer, it moves to the Windows Recycle Bin. You empty the Recycle Bin and so many might think that the file is permanently erased from the hard drive.



 but its worng! When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a data-recovery software.



To permanently erase files and prevent your confidential files from getting into wrong hands, Microsoft offers a free command line utility - SDelete (Secure Delete) - that overwrites all the free space to prevent data recovery.

You can use SDelete both to securely delete existing files , as well as to securely erase any file data that exists in the unallocated portions of a disk (including files that you have already deleted or encrypted)



Download SDelete  

Hoax Google Orkut message links to spread malicious Trojan

Google's social-networking Web site Orkut has been used to spread a malicious Trojan, says Websense.
According to an alert from the security firm, the hoax message, which has been received by a number of Orkut users and is written in Portuguese, looks like it comes from a lonely Orkut member looking for love and features a number of links that appear to point back to the social-networking site. 
However, Websense urges Orkut users not to click the links as they result in the Trojan imagem.exe being downloaded. This subsequently opens the Orkut login page while a password-stealing Trojan called msn.exe is downloaded in the background.

Useful Secrets for Social Networking Sites

Social networking websites like Orkut, Myspace, Yahoo and more are channels through which people communicate, find lost friends, tap resources, and even find work.

Online it is said to be the most vibrant and action packed space.

Online communities provide information, spur creativity, channel new designs in technology, and bring like-minded people closer to one another. From the PC or laptop a person can connect and communicate with the whole world. There are over 400 plus social networking sites online facilitating business and social networking. The online community can congregate each day 24/7 according to specific needs or interests; music, sports, gaming, trekking, every human interest or activity has spurred its own unique social networking website or channel. It is not city specific but global.

1. Join a social networking site that signifies you. Do an online search and go through the directories on social networking to identify what interests you the most.

2. Never sign up or join on an impulse take the time to read about the website and browse through many similar sites until you find one that suits your needs. Read and understand the rules and privacy statements.

3. Once you have found a social networking website that is “you” go ahead and register. When choosing a user name think of its use if you are registering for business purposes the name should trigger off recall. So curb the flights of fantasy and use a name that is practical and will showcase you to the world.

4. Choose the level of membership. Basic memberships are usually free but paid ones have more features. Begin with a free membership and then upgrade once you are comfortable.

5. Fill the user profile with care and think of how your profile will be distinctive from others. In networking unless your profile stands out you will be one among an ocean of profiles. To draw benefits from the site you need to create a clear profile and maximize it by innovating on the layout.

6. Browse the World Wide Web for templates that are compatible with the social networking site you are registered on. Many templates are free while others are paid. Check before you select one.

7. Try and customize the layout. This will make your profile distinctive and unique. Add style, color, and panache by including clips, photos and more.

8. While customizing the layout think about the purpose of your profile. If its business then try and keep it dignified unless you are in a “hep” line of business like ornaments, cards, or music. Use fonts, colors, and graphics to add style.

9. Ensure that your profile has cohesiveness and actually represents you in every way. What drives traffic on social networking sites is a profile that grabs attention.

10. Network online successfully but pay attention to security and privacy too! Read up on how to protect yourself and ensure that social networking does not put you or your family in any dangers. While there are many positive aspects to social networking there are negatives too.

How To Backup Ps1/PS2 Games

Okay, these are some methods to backup PS2 titles and Xbox titles, in order to play a backup you need a modchip of How To Backup Ps1/PS2 Games some sort, I have also included a tutorial on boot methods. Follow any one of these instructions to fit your needs. You can tell what format the PS2 title is by looking at the written side of the disc, DVD's are Silver and CD's are Purple. The DVD backup methods here consist of reading the image to the hard drive then burning it to the media for an easier How To Backup Ps1/PS2 Games backup, this depends on your hardware and its setup. I say that because the proper setup would be to have the Reader and Writer on separate IDE cables. This allows no cross information when doing Disc to Disc/On the fly copying. But, since most people would not know how to check or fix this, I suggest reading the image to your Hard Drive and then burning from there. *A little useful trick*, If the DVD backup "image" is small enough in size you can fit it onto a CD-R (80 minute or larger if need be) instead of using a more expensive DVD-R. I have done this succesfully using Prassi and the first tutorial for it below. In addition a DVD Movie backup will play on a PS2/Xbox without a chip. As I get more info I will update.

PS1/PS2 CD backup tutorial

Using CloneCD (v4.x.xx) for PS1/PS2

  • Start CloneCD

  • Select "Copy CD"

  • Select your Reader, press Next

  • Select "Game CD", press Next

  • Select/Deselect your options here (on the fly, cue or delete) then press Next

  • Select your Writer, press Next

  • Select your burn speed and "Game CD"

  • Press "OK" to begin

Using Alcohol 120% for PS1/PS2

  • Start Alcohol 120%

  • Select Copy Wizard

  • Select your Reader & Read Speed

  • Select or Deselect Copy current disc on the fly

  • For Datatype select which console PS1 or PS2, press Next

  • Select your Image location and Name for it, press Next

  • Select you Writer, Write Speed and anything else you feel you might need

  • Make sure the Datatype selected is the same you chose above

  • Press Start to begin

PS2 DVD backup tutorials (Using Prassi Primo )

  • Start Primo

  • Select "go to full application"

  • Right Click the drive that has your original in it

  • Select "build global image" and choose a path for the image (preferably on an NTFS opsys)

  • After the image is extracted go to next step

  • Choose the 3rd disc icon from the left *or* click file, new job, Global/Other Image

  • Then just burn the .gi (global image) of the game

This next way has one less step which saves some time because once you press record it does everything by itself (if you have a DVD reader and DVD Writer)

  • Start Primo

  • Use the "PrimoDVD Starter" (it's easier, and less confusing)

  • Choose "disc copy"

  • Select your Reader and Also your Writer

  • Select "make a temp image on HD..."

  • Select your burn speed and then record to begin

Using Nero

  • Start Nero, Use the Wizard (for easy use)

  • Select "DVD" then select Next

  • Select "Copy a DVD" then select Next

  • Select your source drive

  • Check OFF "copy on the fly" then select next

  • Select your write speed

  • Select either "Test", "Test and Burn" or "Burn"

  • Press "Burn" to begin

This next way is without the Wizard

  • Start Nero, and select "File" then "New..."

  • On upper left side of the window from the drop down menu select "DVD"

  • Select "DVD Copy" Icon

  • Select "Copy options" tab

  • Check OFF "copy on the fly"

  • Select source drive and read speed

  • If needed Select "Image" tab to choose image directory and select/deselect "delete image..."

  • Select "Burn" tab and choose your settings

  • Press "Copy" to begin

Using Alcohol 120%

  • Start Alcohol 120%

  • Select Copy Wizard

  • Select your Reader

  • For Separate Image file every:choose Never Separate

  • Select or Deselect Copy current disc on the fly, press Next

  • Select your Image location and Name for it, press Next

  • Select you Writer, Write Speed and anything else you feel you might need

  • Select or Deselect Delete image file after recording

  • Press Start to begin

XBOX backup tutorials

Xbox original games are burned from the outside in. The only way to backup a title is to have a modchip like X-exuter (best), Enigma, or Xodus/Matrix. You also have to flash the bios and have a CD program inserted or installed into the X-Box named EVO-X (this allows you to assign the X-Box an IP address). The game has to be stored on the X-Box's HD, this allows you to file transfer the title to your PC using an ftp program like FlaxhFXP (best) or similar. From there you use a burning application to make the backup. Some applications allows you to "drag & drop" right from the Xbox or you can build an ISO of the image then burn to CD-R/W or DVD-R/W backup. (I will update this to show steps as soon as I have a minute)

Modded PS2 with or without Action Replay/GameShark CD & DVD backup booting methods.

PS2 with NeoKey/Sbox & AR/GS, PS1 CD backup booting

  • Turn on PS2 and NeoKey/Sbox

  • Press Eject

  • Insert PS1 CD backup

  • Press reset

  • PS2 tray will close

  • PS1 CD backup will now boot

PS2 with NeoKey/Sbox & AR/GS, PS2 CD backup booting

  • Have AR/GS dongle in a memory card slot

  • Power on your PS2

  • Insert AR/GS disc

  • At the AR/GS menu, select Start Game, With/Without codes

  • Eject and swap to your PS2 CD backup and press X.

  • Screen will change and game will now boot

Note - Neokey will not play DVD-R!

Note - Old versions of AR2/GS2 you might need to press R1+O instead of X to boot games

PS2 with Neo 2.2, PS1 CD backup booting

  • Turn on PS2

  • Press Eject

  • Insert PS1 CD backup

  • Press reset

  • PS2 tray will close

  • PS1 CD backup will now boot

PS2 with Neo 2.2 & AR/GS, PS2 CD backup booting

  • Have AR/GS dongle in a memory card slot

  • Power on your PS2

  • Insert AR/GS disc

  • At the AR/GS menu, select Start Game, With/Without codes

  • Eject and swap to your PS2 CD backup and press X.

  • Screen will change and game will now boot

PS2 with Neo 2.2 & AR/GS, PS2 DVD backup booting

  • 1. Have AR/GS dongle in a memory card slot

  • 2. Power on your PS2

  • 3. Insert AR/GS disc, close tray

  • 4. Power off your PS2, wait a few seconds

  • 5. Press and Hold Reset button to load AR/GS

  • 6. At the AR2/GS2 menu, press EJECT while still holding Reset

  • 7. Swap AR/GS disc for an Original-TOC-DVD* and wait 10 seconds

  • 8. Select "AR/GS Codes"

  • 9. Highlight "Add new code" and press X to get to the next screen

  • 10. Press X three times. You will see "Updating code list please wait" each time)

  • 11. Press "Start" on controller

  • 12. Select "Without codes", press X

  • 13. Then Press X again, and immediately release the Reset button, you will see "Updating code list please wait"

  • 14. The PS2 tray will eject allowing you to swap Original-TOC-DVD* for DVD backup and then close on it?s own

  • 15. Screen will change and game will now boot

Note - "Original-TOC-DVD" is an original DVD that is a larger file size than the backup

PS2 with Messiah

  • PSX Backups will boot directly.

  • PS2 CD-R Backups will boot directly.

  • PS2 Unpatched EA backups will boot directly.

  • PS2 DVD-R Backups will boot directly.

PS2 with Magic 2, 3 or 3.5

  • PSX Backups will boot directly.

  • PS2 CD-R Backups will boot directly.

  • PS2 Unpatched EA backups will boot directly.

  • PS2 DVD-R Backups will boot directly.

Ps2 with Apple Mod

  • PSX Backups will boot directly.

  • PS2 CD-R Backups will boot directly.

  • PS2 Unpatched EA backups will boot directly.

  • PS2 DVD-R Backups will boot directly.



Downloads / Software you need

Get the hardware from the nearest radioshack :)

Microsoft Warns of Serious MS-SQL 2000 & 2005 Vulnerability

Another big flaw has been discovered in Microsoft software just a few days after they broke their patch cycle to issue a patch for the IE bug that allowed remote code execution.

This time however it doesn’t really effect home users or the general consumer, it’s a more specific server side vulnerability affecting Microsoft SQL Server 2000 and 2005 versions. It seems pretty serious though as it also appears that this vulnerability if exploited properly could lead to remote code execution.



Just days after patching a critical flaw in its Internet Explorer browser, Microsoft is now warning users of a serious bug in its SQL Server database software. Microsoft issued a security advisory late Monday, saying that the bug could be exploited to run unauthorized software on systems running versions of Microsoft SQL Server 2000 and SQL Server 2005.

Attack code that exploits the bug has been published, but Microsoft said that it has not yet seen this code used in online attacks. Database servers could be attacked using this flaw if the criminals somehow found a way to log onto the system, and Web applications that suffered from relatively common SQL injection bugs could be used as stepping stones to attack the back-end database, Microsoft said.

Desktop users running the Microsoft SQL Server 2000 Desktop Engine or SQL Server 2005 Express could be at risk in some circumstances, Microsoft said.
Again I wonder how far behind the curve Microsoft is with this? Usually these kind of bugs have been discovered by the more malicious parties way before Microsoft has any idea that their software is vulnerable.

It claims that the code hasn’t been used in online attacks, but honestly if it was used well by a smart party who would even know? SQL injection could lead to this attack being executed and the code is published online so I find it unlikely that it hasn’t been used.



The bug lies in a stored procedure called “sp_replwritetovarbin,” which is used by Microsoft’s software when it replicates database transactions. It was publicly disclosed on December 9 by SEC Consult Vulnerability Lab, which said it had notified Microsoft of the issue in April.

“Systems with Microsoft SQL Server 7.0 Service Pack 4, Microsoft SQL Server 2005 Service Pack 3, and Microsoft SQL Server 2008 are not affected by this issue,” Microsoft said in its advisory.

This is the third serious bug in Microsoft’s software to be disclosed in the past month, but it is unlikely to be used in widespread attacks, according to Marc Maiffret, director of professional services, with The DigiTrust Group, a security consulting firm. “It is rather low risk given other vulnerabilities that exist,” he said via instant message. “There are a lot of better ways to currently compromise windows systems.”
The bug was discovered by someone in April this year, so that’s at least 7 months someone has known about it..but only know when the vendor discloses it then Microsoft chooses to say something about it.

It is a fairly low risk vulnerability due to the requirements needed to execute it effectively, but still it’s another chink in the Microsoft armour to add to the (long long) list.

Source: Network World