Monday, October 25, 2010
Vulnerability:- Adobe Shockwave Player
WiFi Alliance now certifies WiFi Direct products
First demonstrated at CES 2010, Wi-Fi Direct has taken another step to become part of the Wi-Fi usage spectrum.
The Wi-Fi Alliance, the group that tests and certifies Wi-Fi products to make sure they interoperate, announced today that it has begun certifying products capable of making Wi-Fi-based device-to-device connections and designating them Wi-Fi Certified Wi-Fi Direct.
Traditionally, Wi-Fi clients need to connect to a central place, called an access point, before they can connect to one another in their "infrastructure" mode. Other than that, they can also connect in pairs via a mode called "ad-hoc," which is limited both in range and throughput speed.
Wi-Fi Direct, on the other hand, allows Wi-Fi devices to connect to one another without an access point at the same speed and range of the infrastructure mode. They can also establish a connection much faster via Wi-Fi Protected Setup, a method that enables connecting devices by pressing a button. In other words, Wi-Fi Direct allows Wi-Fi products to connect much like Bluetooth devices but at a much faster speed and a much longer range.
With this flexibility, Wi-Fi Direct devices fill an important hole in daily usage: directly connecting devices for applications such as content sharing, synching, printing, and gaming anywhere, without users having to carry along an access point.
According to the Wi-Fi Alliance, another advantage of Wi-Fi Certified Wi-Fi Direct devices is the fact that they can work with traditional Wi-Fi Certified devices, as they act as a mini access point, to which traditional Wi-Fi products can connect.
The Wi-Fi Alliance say that it formed the test suite for the certification program by using the following products, which are also the first that are designated Wi-Fi Certified Wi-Fi Direct:
- Atheros XSPAN dual-band 802.11n PCIe mini card (AR928x)
- Broadcom BCM43224 dual-band 802.11n 2x2 MIMO PCIe half mini card
- Intel Centrino Advanced-N 6200
- Ralink MIMObility 802.11n 2x2 PCIe half mini card
- Realtek RTL8192CE-VA4 HM92C00 PCIe mini card
The group used the Cisco 2106 Wireless LAN Controller and Cisco Aironet 1240 Series Access Points for the certification test suite.
Source: http://news.cnet.com/8301-1035_3-20020539-94.html?part=rss&subj=news&tag=2547-1_3-0-20#ixzz13OTTmF00
Wednesday, October 20, 2010
Print a message as many times you like!
Tuesday, October 19, 2010
Public computers are now secure for Facebook
So, if you wish to re-login then you'll have to send the text message again.
Another feature that has been enabled is similar to a feature provided by Gmail. It displays details about all the "Active Sessions" that you may have from other computers. This happens if you had selected the "Stay Signed In" box while logging-in.
Facebook is rolling the feature out gradually, and it should be available to everyone in the coming weeks.
Saturday, October 16, 2010
PASSWORD REVEALER
Thursday, October 14, 2010
MAC SPOOFING
Airtel 3G
Wednesday, October 13, 2010
Fun Hack cont...
Type :
Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Save it as "anyname.VBS" and send it.
Strong password
1.IT SHOULD BE A COMBINATION OF ALPHABETS CHARACTERS(LOWER & UPPER CASES)AND NON ALPHABETIC CHARACTERS(*&^$).
2.SHOULD NOT BE YOUR NAME RELATIVES (GF/BF).
3.IT SHOULD NOT BE TOLD TO ANYONE.
Tuesday, October 12, 2010
Password hacking
Many a times we want to hack the password of some person 'xyz' and we keep thinking of the ways we can do it. And there may be is a chance that this person uses your laptop / computer at times to check his/ her email/facebook or orkut or any of it. We also want to see the details or the chat history i.e. who did he chat with and what did he chat.
Now how do we do to get these information ? Just go and ask him...
No, he will to tell you all this. Now to know all this secretly and without his/her knowledge we can use certain third party tools named the "KEYLOGGERS" these are the tools which help you can make the logs of the things done on the computer by him or her,the best part of these monitoring tools is that they can be easily be hidden and the user cannot come to know that they are present.And one more thing few of these tools also work on remote systems.
How to look for them :: just go to google and type keyloggers and you find a large range of them. But the few, which are working properly and We personally have worked with are:
1. Ardamax Keylogger: This is a very good and effective tool in the case of key loggers. Easily available on the Internet. This works on remote systems also. But this is a paid version, And we all know how to use torrent .
2. Child safe: This is also equivalent to Ardamax but works only on a personal system. This has a very effective snapshot feature. They are easily available on the Internet.
3. Actual spy: It is just a key logger but very effective and easy to use. This is a freeware available on the Internet.
4.Perfect keylogger: This has an advance feature of taking snapshot at every mouse click. Not a freeware .Available on the Internet.
How to use them ??
step 1: Download any one of them.
step 2: Install it on the system where you want it to log the data from(if remote system attach it to a file and send it to your friend and as soon as he clicks on the file at the background it will get installed) we will make another post about "How to attach a keylogger to a file".
step 3:Look at the instructions and carefully configure the logger as required.
step 4: Be careful because it might log your data also, If installed on your system.
This way you you can log the data ...
Monday, October 11, 2010
Fun Hack
Fun Hack cont...
Email Spoofing
There are two ways of doing this :
1. Via telnet
2. Via online websites
1.TELNET ::
Step 1. Goto command prompt and type
HELO hotmail.com //(this will confirm your connection)
MAIL FROM : (senders address)
RCPT TO: (receivers person)
DATA
2. Via Online Web-site::
This is a really easy method of spoofing a mail.
Step1: Google for a site which can spoof a mail for you.
-->http://mailz.funmaza.co.uk/
-->http://www.anonymailer.net/
-->http://www.sendfakemail.net/fakemail/