This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

The Firefox Extensions thread


all know how good is firefox with it is extensions

making it handy , useful and productive all the more

This thread is to post what extensions you have in your firefox browsers or think are useful
the ones i think really useful are

Ad and edit cookies - Cookie Editor

DOM inspector - Document Object Model Inspector (Default)

FireBug - Web development tool

FireFTP - FTP client for firefox

Grease Monkey - To add javascript features to website

IE tab - Use Internet Explorer in Firefox

Live HTTP Header - HTTP Header analyser

Ref Control - To spoof referrer

Sage - RSS feed reader

Tamper Data - Modify POST and GET varibles with ease

Tor Button - Anonymity with the click of a button

User Agent Switcher - Spoofing User Agents easily

Switch Proxy - To stay anonymous with proxies



AddThis Social Bookmark Button


Email Viruses


The latest thing in the world of computer viruses is the e-mail virus, and the Melissa virus in March 1999 was spectacular. Melissa spread in Mcft Word documents sent via e-mail, and it worked like this:

Someone created the virus as a Word document uploaded to an Internet newsgroup. Anyone who downloaded the document and opened it would trigger the virus. The virus would then send the document (and therefore itself) in an e-mail message to the first 50 people in the person's address book. The e-mail message contained a friendly note that included the person's name, so the recipient would open the document thinking it was harmless. The virus would then create 50 new messages from the recipient's machine. As a result, the Melissa virus was the fastest-spreading virus ever seen! As mentioned earlier, it forced a number of large companies to shut down their e-mail systems.

The I LOVE YOU VIRUS, which appeared on May 4, 2000, was even simpler. It contained a piece of code as an attachment. People who double clicked on the attachment allowed the code to execute. The code sent copies of itself to everyone in the victim's address book and then started corrupting files on the victim's machine. This is as simple as a virus can get. It is really more of a Trojan horse distributed by e-mail than it is a virus.

The Melissa virus took advantage of the programming language built into Mcft Word called VBA, or Visual Basic for Applications. It is a complete programming language and it can be programmed to do things like modify files and send e-mail messages. It also has a useful but dangerous auto-execute feature. A programmer can insert a program into a document that runs instantly whenever the document is opened. This is how the Melissa virus was programmed. Anyone who opened a document infected with Melissa would immediately activate the virus. It would send the 50 e-mails, and then infect a central file called NORMAL.DOT so that any file saved later would also contain the virus! It created a huge mess.

Mcft applications have a feature called Macro Virus Protection built into them to prevent this sort of thing. With Macro Virus Protection turned on (the default option is ON), the auto-execute feature is disabled. So when a document tries to auto-execute viral code, a dialog pops up warning the user. Unfortunately, many people don't know what macros or macro viruses are, and when they see the dialog they ignore it, so the virus runs anyway. Many other people turn off the protection mechanism. So the Melissa virus spread despite the safeguards in place to prevent it.

In the case of the ILOVEYOU virus, the whole thing was human-powered. If a person double-clicked on the program that came as an attachment, then the program ran and did its thing. What fueled this virus was the human willingness to double-click on the executable.



AddThis Social Bookmark Button


Virtualization - Multiple OSs


Virtualisation - your alternative OS

Well most of the people are reluctant in installing another OS on their hard drive as it consumes a lot of space . needs a new partition and has got problems like filesystem incompatibility (ntfs write partially supported in linux and no support of ext3 on windows)

Now here comes virtualisation - the option for you to run multiple OSs in one host operating system. Now to understand virtualisation consider this picture .
I am not good at making pictures but anyways





Now Your host os is the one that currently runs on your computer. You install a virtualisation software like vmware , virtual pc in the software layer of you operating system. in the software layer the the virtualisation software creates guest operating system which furthur have software layer..

Now since there is no direct interaction between guest os in host os so you can install anything like a mac osx , a linux , or other windows install your current operating system

Uses of making a Virtual Machine
No hassles of disk partitioning , boot manager configuring etc.
Multiple OSs can be run at a same time . making your computer a mini LAN . Very suitable for making a pentest lab
There is no interaction between host and the guest os so you can test your virii ,trojan ,other malware without damaging the host

Now how to create a Virtual machine :-
Tools needed :-
vmware player - www.vmware.com/download/player/
vmx wizard - http://rhysgoodwin.orcon.net.nz/vmxwizard

IF you can buy/download vmware workstation i'd recommend that

Now creating virtual machines :- Use vmx wizard - to create VMX files

Choose the operating system type (windows ,linux,other)



Allocate the disk space


Specify the installation drive or cd image




Choose networking options



Save your virtual machine made




Running virtual machine :- use vmware player
Open .vmx file in vmware player



Now you are running a linux inside windows :- Click inside the machine to get inside virtual machine and work in there
Press Ctrl+Alt to get out of it


Well thats how you can run different OS within one OS
There are other feature in Vmware like :-

Snapshot :- just like system restore (but better and complete)
Suspend :- saves current configuration and stops vm (like hibernate ,but again lot better)
Poweroff :- no need to shut down . just cross the vmware player (faster shutdown)
Installing Vmware tools makes your Virtual machine really good :- better graphics support. File transfer between guest and host OS is simplifies (drag and drop) , and mouse change between guest and host OS is dramatically improved



AddThis Social Bookmark Button


IP


this is a software to find the location of the ip

link:
http://www.4shared.com/file/25808579/5856eca5/iplocator.html



AddThis Social Bookmark Button


Hundreds of Hacking Tools


well if you are looking tools for hacking ,cracking, network seurity i think you may want to try http://www.leetupload.com

they have got a huge database

well some direct links are

Selecting tools according to OS

http://www.leetupload.com/dbindex2/index.php?dir=

Windows Users
try this
http://www.leetupload.com/dbindex2/index.php?dir=Win32/

if you unpack a archive and it asks you for a password you can find it here


http://www.leetupload.com/database/%...0in%20here.txt



AddThis Social Bookmark Button


virus codes

WormGen
WormGen , as its name describe,its a Worm Generator.Use this tool to creat a Worm.Use your custom messages and infections for lammers.Click the download link below to download it. Remember to disable your anti virus software (at your pc).Otherwise your antivirus would`nt allow to use it.
http://www.geocities.com/darfun_victims/wormgen.zip

Worm Gen 2.0
Its also Worm Generator ,its verision 2.0,updated. Try it.
http://www.geocities.com/darfun_victims/wormgen2.zip

Norton Killer
Here is software that disables victim`s anti virus if its Norton AV.Useful for those who are trying to send Trojans to the victim, send this file to the victim before sending a Trojan so your Trojan will not be detected.
http://www.geocities.com/darfun_victims/norton_killer.zip.zip

To Hack Gmail-Yahoo-Hotmail Orkut Account

STEP:1 open he website of ORKUT or HOMAIL or REDIFF MAIL or YAHOOMAIL, its your wish. if you want to HACK yahoo id, then go o www.yahoomail.com

STEP2: Now press "CTRL+U", you will get the source code of yahoo page. NOw press "CTRL+A" copy all the text.

step3: Open NOTEPAD, now paste it here. SAVE it as YAHOOFAKE.HTML

STEP4: Now open the the file yahoofake.html using noepad, here you ll find a code which starts with (form action="xxxxxxxxxxxxxxxxxxxxxxxxxxxxx")
delete the above code and paste the yr id
step6: NOw save the file.

you can test whether its working or not. just open the yahoofake.html file and in the place of user name and password, type some thing and sign in. you will get the passwords in your mail id.. check out..

STEP7: NOW UPLOAD the yahoofake.html page using GOOGLE PAGE Creator or using www.50webs.com

step7: after uploading i give the link to your friends, once they sign in you ll get the passwords of your friends id.