///////////////////////////////////////////
The Best Operating System for Hackers
There are a couple of things that are essential to any hacker’s walk of
life. To name a few, there’s the ubiquitous flash drive for data transfer.
You have the crossover cable for even faster data transfer. There’s the
Wi-Fi antenna for high gain and strong amplification. Possibly, you might
find a video capture card in the computer. Of course, there’s the
ubiquitous laptop and desktop computer. But what software is on these
computers? Undoubtedly, you will find at least two operating systems, most
often Windows and Linux. But with Linux, there are several different
distributions. Is there a specific one? With hackers and crackers, there is
only one Linux distro out there. It is called Backtrack.
BackTrack is a Linux-based penetration testing arsenal that aids security
professionals in the ability to perform assessments in a purely native
environment dedicated to hacking.
Regardless if you’re making BackTrack your primary operating system,
booting from a Live DVD, or using your favourite thumb drive, BackTrack has
been customized down to every package, kernel configuration, script and
patch solely for the purpose of the penetration tester.
BackTrack is intended for all audiences from the most savvy security
professionals to early newcomers to the information security field.
BackTrack promotes a quick and easy way to find and update the largest
database of security tool collection to-date.
Back Track is quite possibly the most comprehensive Linux distribution of
security tools. Both hackers and crackers can appreciate the features of
this distribution. For black-hatters, it is an easy access to software that
facilitates exploitations of secure system. For white-hatters, it is a
penetration tester that finds holes in a security scheme. See, everybody
wins!
Major Features
BackTrack features the latest in security penetration software. The current
Linux kernel is patched so that special driver installation is unnecessary
for attacks. For example, an Atheros-based wireless networking adapter will
no enter monitor mode or inject packets without the MadWiFi driver patch.
With BackTrack, you don’t need to worry about that. It’s just plug-and-play
ready-to-go!
What’s great is that this Linux distribution comes Live-on-CD. So, no
installation is needed. However, what you experience BackTrack, you will
realize that it is a must to download this operating system and install it
on your Laptop. At the very least, download the VMWare Virtual Appliance
for Backtrack. Make sure you also install the VMWare Tools for Linux as
well. Many features will still work in VMWare mode.
Based on: Debian, UbuntuOrigin: SwitzerlandArchitecture: i386Desktop:
Fluxbox, KDECategory: Forensics, Rescue, Live MediumCost: Free
Tools:
BackTrack provides users with easy access to a comprehensive and large
collection of security-related tools ranging from port scanners to password
crackers. Support for Live CD and Live USB functionality allows users to
boot BackTrack directly from portable media without requiring installation,
though permanent installation to hard disk is also an option.
BackTrack includes many well known security tools including:
Metasploit integrationRFMON Injection capable wireless
driversKismetNmapEttercapWireshark (formerly known as Ethereal)BeEF
(Browser Exploitation Framework)
A large collection of exploits as well as more common place software such
as browsers. BackTrack arranges tools into 11 categories:
Information GatheringNetwork MappingVulnerability IdentificationWeb
Application AnalysisRadio Network Analysis (802.11, Bluetooth,
Rfid)Penetration (Exploit & Social Engineering Toolkit)Privilege
EscalationMaintaining AccessDigital ForensicsReverse EngineeringVoice Over
IP,downloads and documentation. . .
Regards kid. .
Monday, September 27, 2010
Tuesday, September 21, 2010
"BLOCK YOUR ENEMY'S SIM CARD"
HOW TO BLOCK YOUR ENEMY'S SIM CARD :
Here i'm going to share a simple trick for block your enemy's sim card,blocking a sim card is too simple.What you've to do is just enter the below code in the desired phone. . .
**04*3814*7529*68243#
Entering of above code will ask you to enter the PUK code.To solve this issue just call customer care and get your PUK code.
NOTE-Entering of invalid PUK will cause permanent blocking of the sim. . . .
Here i'm going to share a simple trick for block your enemy's sim card,blocking a sim card is too simple.What you've to do is just enter the below code in the desired phone. . .
**04*3814*7529*68243#
Entering of above code will ask you to enter the PUK code.To solve this issue just call customer care and get your PUK code.
NOTE-Entering of invalid PUK will cause permanent blocking of the sim. . . .
Friday, September 17, 2010
MOVE FILEs OF C Drive
“How to Move Installed Applications from Default C Drive to other Drives”
///////////////////////////////////////////
How to Move Installed Applications from Default C Drive to other Drives
http://www.blogsolute.com/move-installed-applications-from-default-c-drive-to-other/10851/
Generally it is observed that once an application is installed on any drive
and if later moved or copied to other drives the application becomes
useless and does not work. By default Windows installs all applications in
C:\ drive but with passage of time we require more and more space on this
drive to fulfill our software requirements.
The only way left in this situation is to uninstall some applications. But
what if you are using all the installed applications. In situations like
this Stream Mover comes handy.
Stream Mover is a portable freeware application for windows that can move
installed applications from default installed drive to other drive without
any side effects. Working with Stream Mover is easy and you do not have go
through any special and tiring configurations. Only thing that you have to
do is point the folder where the application you want to use is installed.
For instance, in default cases you can point the source folder to
C:\Program files. The other thing is the destination, you can set any other
drive as destination where the application will be moved. Once these are
selected you can press the blue arrow icons in front of respective
applications to move them.
My Verdict: This is an extremely useful application but it only works on
NTFS formatted drives and is tested on Windows 7. It can move almost all
applications but may fail in some cases.
Download Stream Mover (1.1 MB)
How to Move Installed Applications from Default C Drive to other Drives .
///////////////////////////////////////////
SEO: Importance of One way Backlinks and How to earn them?
http://www.blogsolute.com/how-to-earn-one-way-backlinks/10859/
Being a webmaster you would like to build up One way backlinks for your
Blog or website appropriate to make a point that you growth your search
engine rankings. One way backlinks are the strongest backlinks to acquire
as they affect the almost quantity of figure out to catch, only this is
wherefore theyre worthy in the search engines and extremely sought aside
webmasters.
There are lots of ways you are able to realize One way backlinks to your
web site or blog and they are whole generally valuable in some manner only
on that point is a few that will rank sounder then others.
The better type of One way link to pick up is through with a different
internet site or blog related to your blog where they feed you an
in-content One way link.
These could materialize through your gravid posting that is gravid content
and occasionally you may also expect to be adverted along a blog
reciprocally for articles or links on a different website of yours. These
could also growth human relationship between bloggers.
Whenever you are able to build your links these ways so you abide an
awesome opportunity at aiming lots of search engine rankings eventually.
How to earn One Way Backlinks?
Single of the most lenient acknowledged ways to catch quality, one way
links is through determining free internet site directories and so
submitting your blog to them. I recognize, this can make up a really boring
and slow process, but at the same time really honoring.
You could as well use different absolve Directory Submitter services on the
net a few of them are absolve but not assured but a few needs to be paid up
and could be a insured product.
At last, I would like to say that one time you have accomplished the
rankings, never always stop building up One Way backlinks as ‘search engine
optimization’ is a matter that youve to execute endlessly to campaign with
other blogs who are attempting to get the rankings in search engines.
SEO: Importance of One way Backlinks and How to earn them?
///////////////////////////////////////////
StandAlone Aero Gadgets Pack: All in One Desktop Gadget Installer
http://www.blogsolute.com/standalone-aero-gadgets-all-in-one-pack/10854/
Earlier we have written about HTC Home, a beautiful HTC Sense Clock and
Weather Gadget for Windows 7 and Vista. If you liked this gadget and want
more beautiful gadgets specially suiting Windows 7 Aero glass effects then
Stand Alone Gadgets Pack will be a nice option to look for.
StandAlone Gadgets Pack is a windows freeware application that will you to
add more than 10 gadgets on your desktop. All these gadgets match Aero
glass standards and will give your desktop a new look. Using this
application is easy, for using it you have to activate the application
which is free of cost. To activate the application you have to be online
and click on a advertisement given in application window.
This gadget pack provides gadgets like battery meter, email notifier,
weather updates, CPU usage meter, network meter, digital clock etc. This
gadget pack will also work on Xp and Vista but you will get maximum visual
suitability with Windows 7.
Download StandAlone Gadgets Pack (2.29MB)
StandAlone Aero Gadgets Pack: All in One Desktop Gadget Installer is an
article on: Blogsolute
REGARDS Kid. . . .
///////////////////////////////////////////
How to Move Installed Applications from Default C Drive to other Drives
http://www.blogsolute.com/move-installed-applications-from-default-c-drive-to-other/10851/
Generally it is observed that once an application is installed on any drive
and if later moved or copied to other drives the application becomes
useless and does not work. By default Windows installs all applications in
C:\ drive but with passage of time we require more and more space on this
drive to fulfill our software requirements.
The only way left in this situation is to uninstall some applications. But
what if you are using all the installed applications. In situations like
this Stream Mover comes handy.
Stream Mover is a portable freeware application for windows that can move
installed applications from default installed drive to other drive without
any side effects. Working with Stream Mover is easy and you do not have go
through any special and tiring configurations. Only thing that you have to
do is point the folder where the application you want to use is installed.
For instance, in default cases you can point the source folder to
C:\Program files. The other thing is the destination, you can set any other
drive as destination where the application will be moved. Once these are
selected you can press the blue arrow icons in front of respective
applications to move them.
My Verdict: This is an extremely useful application but it only works on
NTFS formatted drives and is tested on Windows 7. It can move almost all
applications but may fail in some cases.
Download Stream Mover (1.1 MB)
How to Move Installed Applications from Default C Drive to other Drives .
///////////////////////////////////////////
SEO: Importance of One way Backlinks and How to earn them?
http://www.blogsolute.com/how-to-earn-one-way-backlinks/10859/
Being a webmaster you would like to build up One way backlinks for your
Blog or website appropriate to make a point that you growth your search
engine rankings. One way backlinks are the strongest backlinks to acquire
as they affect the almost quantity of figure out to catch, only this is
wherefore theyre worthy in the search engines and extremely sought aside
webmasters.
There are lots of ways you are able to realize One way backlinks to your
web site or blog and they are whole generally valuable in some manner only
on that point is a few that will rank sounder then others.
The better type of One way link to pick up is through with a different
internet site or blog related to your blog where they feed you an
in-content One way link.
These could materialize through your gravid posting that is gravid content
and occasionally you may also expect to be adverted along a blog
reciprocally for articles or links on a different website of yours. These
could also growth human relationship between bloggers.
Whenever you are able to build your links these ways so you abide an
awesome opportunity at aiming lots of search engine rankings eventually.
How to earn One Way Backlinks?
Single of the most lenient acknowledged ways to catch quality, one way
links is through determining free internet site directories and so
submitting your blog to them. I recognize, this can make up a really boring
and slow process, but at the same time really honoring.
You could as well use different absolve Directory Submitter services on the
net a few of them are absolve but not assured but a few needs to be paid up
and could be a insured product.
At last, I would like to say that one time you have accomplished the
rankings, never always stop building up One Way backlinks as ‘search engine
optimization’ is a matter that youve to execute endlessly to campaign with
other blogs who are attempting to get the rankings in search engines.
SEO: Importance of One way Backlinks and How to earn them?
///////////////////////////////////////////
StandAlone Aero Gadgets Pack: All in One Desktop Gadget Installer
http://www.blogsolute.com/standalone-aero-gadgets-all-in-one-pack/10854/
Earlier we have written about HTC Home, a beautiful HTC Sense Clock and
Weather Gadget for Windows 7 and Vista. If you liked this gadget and want
more beautiful gadgets specially suiting Windows 7 Aero glass effects then
Stand Alone Gadgets Pack will be a nice option to look for.
StandAlone Gadgets Pack is a windows freeware application that will you to
add more than 10 gadgets on your desktop. All these gadgets match Aero
glass standards and will give your desktop a new look. Using this
application is easy, for using it you have to activate the application
which is free of cost. To activate the application you have to be online
and click on a advertisement given in application window.
This gadget pack provides gadgets like battery meter, email notifier,
weather updates, CPU usage meter, network meter, digital clock etc. This
gadget pack will also work on Xp and Vista but you will get maximum visual
suitability with Windows 7.
Download StandAlone Gadgets Pack (2.29MB)
StandAlone Aero Gadgets Pack: All in One Desktop Gadget Installer is an
article on: Blogsolute
REGARDS Kid. . . .
BANK SERVER GAMING
WARNING-Its only for your knowledge purpose to make your account safer from hackers. . . . If try,with your own risk. . . I'm not responsible for it. .
HOW TO HACK A BANK SERVER:
1.Get a VOICE ANALYZER.
Costs-5000c,Size-4Gq
2.Go to the corporations public ACCESS SERVER.
3.Press the (+) button in the Admin's name or there,
4.Ready the VOICE ANALYZER.
5.Call the admin,then the voice analyzer and record his voice,.
6.Do not shut the voice analyzer,.
7.Go to the place where you need to use it. . . (A bank if i'm correct).
8.Goto the Admin's section,then select the voice recognition or that.
9.Rewind the message you recorded and play it. . .
10.Now,the bank server is hacked. . . . Start Gaming. . . .
HOW TO HACK A BANK SERVER:
1.Get a VOICE ANALYZER.
Costs-5000c,Size-4Gq
2.Go to the corporations public ACCESS SERVER.
3.Press the (+) button in the Admin's name or there,
4.Ready the VOICE ANALYZER.
5.Call the admin,then the voice analyzer and record his voice,.
6.Do not shut the voice analyzer,.
7.Go to the place where you need to use it. . . (A bank if i'm correct).
8.Goto the Admin's section,then select the voice recognition or that.
9.Rewind the message you recorded and play it. . .
10.Now,the bank server is hacked. . . . Start Gaming. . . .
HACKING GUIDE-BANK GAMING
WARNING-Its only for your knowledge purpose to make your account safer from hackers. . . . If try,with your own risk. . . I'm not responsible for it. .
BANK HACKING GUIDE:
ORIGINAL - The Ultimate Guide
Despite the risks involved,hacking a bank is relatively easy,as long as you're fast,by following this guide you should have on problems.Before you start,you'll need to know an account number at the bank you want to hack,your uplink bank account number,and the INTERNET PROTOCOL of uplink International bank. . . .
1.Connect to the bank,with InterNIC as your first bounce,and Bypass the monitor and PROXY with LEVEL 5 BYPASSERS.
2.Break into the account you want to steal from using the account number as the user name and the PASSWORD BREAKER to get the password.You shouldn't have a trace on you because of the MONITOR BYPASS.
3.Enter the transfer screen and transfer money to your UPLINK BANK ACCOUNT.
4.Delete the statement logs from the account,you stole from saying you just transferred money.
5.Connect to uplink bank,log into your Account,BYPASS Monitor and Proxy,then delete the log saying you received money.
6.Connect to InterNIC and Delete the Bounce Logs.
7.Start spending.You don't have to wait before you can spend the money you just stole.
NOTE:+
Once you have a password of an account,you don't need the Monitor Bypass to access it,the Bank doesn't trace Normal Bank Account entries. . . . . . . .
BANK HACKING GUIDE:
ORIGINAL - The Ultimate Guide
Despite the risks involved,hacking a bank is relatively easy,as long as you're fast,by following this guide you should have on problems.Before you start,you'll need to know an account number at the bank you want to hack,your uplink bank account number,and the INTERNET PROTOCOL of uplink International bank. . . .
1.Connect to the bank,with InterNIC as your first bounce,and Bypass the monitor and PROXY with LEVEL 5 BYPASSERS.
2.Break into the account you want to steal from using the account number as the user name and the PASSWORD BREAKER to get the password.You shouldn't have a trace on you because of the MONITOR BYPASS.
3.Enter the transfer screen and transfer money to your UPLINK BANK ACCOUNT.
4.Delete the statement logs from the account,you stole from saying you just transferred money.
5.Connect to uplink bank,log into your Account,BYPASS Monitor and Proxy,then delete the log saying you received money.
6.Connect to InterNIC and Delete the Bounce Logs.
7.Start spending.You don't have to wait before you can spend the money you just stole.
NOTE:+
Once you have a password of an account,you don't need the Monitor Bypass to access it,the Bank doesn't trace Normal Bank Account entries. . . . . . . .
Bank Gaming
WARNING-its only for your knowledge purpose to make your account safer from hackers. . . . If try,with your own risk. . . I'm not responsible for it. .
Transfer Money with in one and the same bank.(i,e)If you want to steal money from account in PDR bank,create your own account in PDR bank,so you can steal money and delete the statement logs fast on both access,without having to rearrange ROUTER JUMPS chain and BY-PASSING Monitor and PROXY again.
This saves time and Agent's another hind,Hacking a bank is pretty easy and doesn't depend much on the gateway,you're currently using..
Bank hacking done numerous time using the default gateway i got when registering,without investing a rupee to hardwary..
All you need is,
HUD-Connection Analysis,
MONITOR BYPASS v5
&
PROXY DISABLE v5
(Its 10k cheaper than bypass v5 but just the same effective)
If you're getting money using "I WANT ALL THE MONEY NOW",mission option while folks are singing you to hack INT academic or SOCIAL SECURITY DATABASE,those 10k worth 3 min of your time,and after you'Ve stolen 1M from bank account you can buy any hardware and software you like. . . .
VOICE ANALYZER is pretty useful,because hacking admin's access to bank gives you all account numbers of the bank.Make a list of em(yeah,paper and pen rocks!),hack each one. . .
You can hack all accounts in ALL BANKS (except for uplink bank) in roughly 40 min.After that you'll know how to steal upto 4M easily.Besides,if you check the accounts and PWS you already know 2-3 month of "UPLINK INNER TIME".You're likely to find out some of them are already restoked with cash,so you can do the old trick again. . . . . Happy Gaming. .
Transfer Money with in one and the same bank.(i,e)If you want to steal money from account in PDR bank,create your own account in PDR bank,so you can steal money and delete the statement logs fast on both access,without having to rearrange ROUTER JUMPS chain and BY-PASSING Monitor and PROXY again.
This saves time and Agent's another hind,Hacking a bank is pretty easy and doesn't depend much on the gateway,you're currently using..
Bank hacking done numerous time using the default gateway i got when registering,without investing a rupee to hardwary..
All you need is,
HUD-Connection Analysis,
MONITOR BYPASS v5
&
PROXY DISABLE v5
(Its 10k cheaper than bypass v5 but just the same effective)
If you're getting money using "I WANT ALL THE MONEY NOW",mission option while folks are singing you to hack INT academic or SOCIAL SECURITY DATABASE,those 10k worth 3 min of your time,and after you'Ve stolen 1M from bank account you can buy any hardware and software you like. . . .
VOICE ANALYZER is pretty useful,because hacking admin's access to bank gives you all account numbers of the bank.Make a list of em(yeah,paper and pen rocks!),hack each one. . .
You can hack all accounts in ALL BANKS (except for uplink bank) in roughly 40 min.After that you'll know how to steal upto 4M easily.Besides,if you check the accounts and PWS you already know 2-3 month of "UPLINK INNER TIME".You're likely to find out some of them are already restoked with cash,so you can do the old trick again. . . . . Happy Gaming. .
Thursday, September 16, 2010
Bank Gaming 2
WARNING-its only for your knowledge purpose to make your account safer from hackers. . . . If try,with your own risk. . . I'm not responsible for it. .
BANK HACK 2
Follow the below things,
1.Call the admin
2.Record his voice
3.Go into the admin part of the bank
4.Put on the level 5 monitor and proxy disable
5.Hack his password
6.Hack his voice in voice recorder
7.Dechpyer
8.Disconnect
9.Put on level 5 monitor and proxy disable
10.Go into the target bank account
11.Transfer the money and into my new bank(in same internet protocol)
12.Delete the transfer log in their bank(with level 5 log deleter)
13.Log into your bank account and delete the transfer log
14.Disconnect and connect again to go into admin
15.Stick on the monitor and proxy disable
16.Log straight in(because of what i did before)
17.Delete the days log
18.Disconnect
19.Goto into InterNIC and delete the logs
20.Get caught. . . . . Why?What i have missed?Yeah. . . Your correct.. . . The time consumption and also obviously routing through InterNIC every time. . . . . .
Happy gaming. . .Dear
BANK HACK 2
Follow the below things,
1.Call the admin
2.Record his voice
3.Go into the admin part of the bank
4.Put on the level 5 monitor and proxy disable
5.Hack his password
6.Hack his voice in voice recorder
7.Dechpyer
8.Disconnect
9.Put on level 5 monitor and proxy disable
10.Go into the target bank account
11.Transfer the money and into my new bank(in same internet protocol)
12.Delete the transfer log in their bank(with level 5 log deleter)
13.Log into your bank account and delete the transfer log
14.Disconnect and connect again to go into admin
15.Stick on the monitor and proxy disable
16.Log straight in(because of what i did before)
17.Delete the days log
18.Disconnect
19.Goto into InterNIC and delete the logs
20.Get caught. . . . . Why?What i have missed?Yeah. . . Your correct.. . . The time consumption and also obviously routing through InterNIC every time. . . . . .
Happy gaming. . .Dear
Bank gaming 1
WARNING-its only for your knowledge purpose to make your account safer from hackers. . . . If try,with your own risk. . . I'm not responsible for it. .
Why are you breaking into the admin account?
All you need to do is,
1.Go into Target Bank Account,Bypass the Monitor and Proxy.
2.Transfer the money to your account.
3.Delete the transfer log in their bank.(with v4 log deleter)
4.Log into your bank account,Bypass the monitor and proxy and Delete the transfer log(with v4 log deleter)
5.Disconnect
6.Go into InterNIC and delete the logs. . . . . . . . Happy Gaming. . .
Why are you breaking into the admin account?
All you need to do is,
1.Go into Target Bank Account,Bypass the Monitor and Proxy.
2.Transfer the money to your account.
3.Delete the transfer log in their bank.(with v4 log deleter)
4.Log into your bank account,Bypass the monitor and proxy and Delete the transfer log(with v4 log deleter)
5.Disconnect
6.Go into InterNIC and delete the logs. . . . . . . . Happy Gaming. . .
BANK/ATM GAMING
WARNING-use it in your own risk.. . . I'm not responsible for anything happening to you or anyone. . . . .This is only for your knowledge purpose,dont took is serious. . . Avoid your account from hackers. .
Bank hacking is pretty easy once you get the hang of it.All you need is,
1.LOG DELETER v4
2.PROXY DISABLE v5
3.PASSWORD CRACKER
4.DECYPHER v3
5.VOICE RECORDER
6.Paper/pen(To make sure the numbers and passer are exact.)
1).Get a mission to trace a recent balance transfer.Hack this bank(Get voice recording,Crack Password,Decypher).Just to get the bank/account of the recipient of money in the log.
2).Delete log in InterNIC.
3).Bounce around and hack into recipient's bank to get his access.Get pass,disconnect.
4).Delete log in InterNIC.Fast forward an hour or two.
5).Use the launch of machines to save a good bounce.I suggest using all the banks,as well as atleast 15 other machines.Do not use the bank you're about to hack or uplink's bank.
6).Load the bounce,go into the bank again and log into recipient's account.There should be no traces at this point.(if there is,log back out,delete the InterNIC log again,FF longer and try again).Put in the transfer into and use the proxy disable v5.Once it's finished,delete the transfer log in this account.After thats done disconnect.
7).Load the bounce and log into the uplink bank.Use proxy disable and delete the log in your own account.(Not sure if this is absolutely necessary,but i don't get caught,...Ever)then disconnect.
8).Delete logs for 6 and 7 in the InterNIC.
9).Fast forward and you should go way up in rating.
Normally upgrade the above implement to the couple of CPU'S gateway,(60GHZ+200GHZ),.
Its simple. . .
Trace Tracker helps(obviously),but normally turn it on after getting admin access.This will get you a ton of cash before the story even starts.This way is harder than using the bypassers,but you can do it a lot earlierr in the GAME.
Happy Gaming.
Bank hacking is pretty easy once you get the hang of it.All you need is,
1.LOG DELETER v4
2.PROXY DISABLE v5
3.PASSWORD CRACKER
4.DECYPHER v3
5.VOICE RECORDER
6.Paper/pen(To make sure the numbers and passer are exact.)
1).Get a mission to trace a recent balance transfer.Hack this bank(Get voice recording,Crack Password,Decypher).Just to get the bank/account of the recipient of money in the log.
2).Delete log in InterNIC.
3).Bounce around and hack into recipient's bank to get his access.Get pass,disconnect.
4).Delete log in InterNIC.Fast forward an hour or two.
5).Use the launch of machines to save a good bounce.I suggest using all the banks,as well as atleast 15 other machines.Do not use the bank you're about to hack or uplink's bank.
6).Load the bounce,go into the bank again and log into recipient's account.There should be no traces at this point.(if there is,log back out,delete the InterNIC log again,FF longer and try again).Put in the transfer into and use the proxy disable v5.Once it's finished,delete the transfer log in this account.After thats done disconnect.
7).Load the bounce and log into the uplink bank.Use proxy disable and delete the log in your own account.(Not sure if this is absolutely necessary,but i don't get caught,...Ever)then disconnect.
8).Delete logs for 6 and 7 in the InterNIC.
9).Fast forward and you should go way up in rating.
Normally upgrade the above implement to the couple of CPU'S gateway,(60GHZ+200GHZ),.
Its simple. . .
Trace Tracker helps(obviously),but normally turn it on after getting admin access.This will get you a ton of cash before the story even starts.This way is harder than using the bypassers,but you can do it a lot earlierr in the GAME.
Happy Gaming.
Wednesday, September 15, 2010
YOUR NOKIA 1100 MAY EARN YOU MORE THAN €5000,BELIEVE IT. . ?
CRIMINALS PAY TOP MONEY FOR HACKABLE NOKIA 1100 MOBILE PHONES:
criminals're willing to pay thousands of €'s for discontinued nokia mobile phone with the software problem that can be exploited to hack into online bank accounts,according to fraud investigator in the Netherlands.
About 10 days ago,investigators observed someone transfers €25,000(32,413US$)for a nokia 1100 phone,said Frank Engelsman of Ultrascan advanced global investigations.The candy-bar style nokia model mobile is the all time selling best mobile in the world,and originally sold for below €100.
Police contacted this lab for an investigation that 'WHY these bar phones are in demand'.Since then,this lab seen that the price of nokia 1100 is rise around €5000 to the latest figures.
"we thought that what could be the special of that phone?"said Engelsman.
The nokia 1100 is a low-cost phone released in the late 2003 and aimed at developing markets.Nokia has sold over 200 million of the nokia 1100 mobile phones and its successors.
However the high price are only being paid for nokia 1100 mobile phones that were made in a factory in bochum,Germany.Engelsman said,citing an ultrascan informant.Those phones contains nokia software from 2002 that's apparently vulnerable to tampering.
Investigators don't have the complete picture of the technical problem.However ultrascan's informant said the phones can be used to intercept one time passwords needed to complete ONLINE BANKING TRANSACTION. . . ,Engelsman said.
It appears that a known Russian and Morroccan cybercrime gang,as well as other Romanian gangs,are trying to obtain the Nokia 1100 phones with the vulnerable software,said Engelsman.
Nokia officials contacted monday morning did not have any immediate comment.
Engelsman said,'cybercriminals have collected thousands of user names and passwords for online banking accounts in countries such as GERMANY and HOLLAND.Banks in those countries also requests TAN(Transaction Authentication Number) code or one-time password to complete a transaction.
Those banks previously issued list of TAN codes to customers.
During the transaction,the bank would request one of the codes to complete the transaction. Due to successful phishing attacks where the people have been tricked into revealing some TAN codes,the banks are now sending the codes by sms's(SHORT MESSAGE SERVICES) to a person's mobile phone,said Engelsman.
The BOCHAm-made nokia 1100 can apparently be re-programmed to use someone's else phone number,thus intercepting the TAN code and enabling illegal money transfer into criminal's bank accounts.,said Engelsman.
Ultrascan trying to obtain the affected Nokia 1100 model to verify if attacks works as described, he said.
The Nokia 1100 also had other software problems.A drug-related criminal case in Netherlands in late 2005 detailed how the police difficulty linking sms's sent from Nokia 1100 phones to a specific phone number.Police were,however,able to use other means to identify the general areas in which the phones were used,which helped BOLSTER and their case,said Engelsman. . . . .
Regards Kid.
criminals're willing to pay thousands of €'s for discontinued nokia mobile phone with the software problem that can be exploited to hack into online bank accounts,according to fraud investigator in the Netherlands.
About 10 days ago,investigators observed someone transfers €25,000(32,413US$)for a nokia 1100 phone,said Frank Engelsman of Ultrascan advanced global investigations.The candy-bar style nokia model mobile is the all time selling best mobile in the world,and originally sold for below €100.
Police contacted this lab for an investigation that 'WHY these bar phones are in demand'.Since then,this lab seen that the price of nokia 1100 is rise around €5000 to the latest figures.
"we thought that what could be the special of that phone?"said Engelsman.
The nokia 1100 is a low-cost phone released in the late 2003 and aimed at developing markets.Nokia has sold over 200 million of the nokia 1100 mobile phones and its successors.
However the high price are only being paid for nokia 1100 mobile phones that were made in a factory in bochum,Germany.Engelsman said,citing an ultrascan informant.Those phones contains nokia software from 2002 that's apparently vulnerable to tampering.
Investigators don't have the complete picture of the technical problem.However ultrascan's informant said the phones can be used to intercept one time passwords needed to complete ONLINE BANKING TRANSACTION. . . ,Engelsman said.
It appears that a known Russian and Morroccan cybercrime gang,as well as other Romanian gangs,are trying to obtain the Nokia 1100 phones with the vulnerable software,said Engelsman.
Nokia officials contacted monday morning did not have any immediate comment.
Engelsman said,'cybercriminals have collected thousands of user names and passwords for online banking accounts in countries such as GERMANY and HOLLAND.Banks in those countries also requests TAN(Transaction Authentication Number) code or one-time password to complete a transaction.
Those banks previously issued list of TAN codes to customers.
During the transaction,the bank would request one of the codes to complete the transaction. Due to successful phishing attacks where the people have been tricked into revealing some TAN codes,the banks are now sending the codes by sms's(SHORT MESSAGE SERVICES) to a person's mobile phone,said Engelsman.
The BOCHAm-made nokia 1100 can apparently be re-programmed to use someone's else phone number,thus intercepting the TAN code and enabling illegal money transfer into criminal's bank accounts.,said Engelsman.
Ultrascan trying to obtain the affected Nokia 1100 model to verify if attacks works as described, he said.
The Nokia 1100 also had other software problems.A drug-related criminal case in Netherlands in late 2005 detailed how the police difficulty linking sms's sent from Nokia 1100 phones to a specific phone number.Police were,however,able to use other means to identify the general areas in which the phones were used,which helped BOLSTER and their case,said Engelsman. . . . .
Regards Kid.
Tuesday, September 14, 2010
Block your internet protocol
Here is the most important hack for your pc . . . . . . . .
Did you think that if you.re not in home anyone might use your data.. . . . ? . . . Nothing problem here i give you the internet protocol blocker. . . .
This may block your pc's internet protocol,from any unwanted users. . .
Simply do it. . .
@echo off
echo ipconfig/flushdns
ipconfig/flushdns
echo ipconfig/release
if you wanna solution for this please send your request to kidpaddle1990@gmail.com
i'll send you the solution. . . .
Did you think that if you.re not in home anyone might use your data.. . . . ? . . . Nothing problem here i give you the internet protocol blocker. . . .
This may block your pc's internet protocol,from any unwanted users. . .
Simply do it. . .
@echo off
echo ipconfig/flushdns
ipconfig/flushdns
echo ipconfig/release
if you wanna solution for this please send your request to kidpaddle1990@gmail.com
i'll send you the solution. . . .
DEADLY HACKS
Hack your system's logging disable. . . . . . . Its very simple. . .
Follow the steps below,.
1.DISABLE LOGGING:-
use c:\>audipol\\192.168.10\
disable auditing disabled.
2.CLEAR THE LOG FILE:-
Elsave-s\\192.168.13.10-1"security"-c
This'll disable the stranger's loging in your pc. . . . .
Follow the steps below,.
1.DISABLE LOGGING:-
use c:\>audipol\\192.168.10\
disable auditing disabled.
2.CLEAR THE LOG FILE:-
Elsave-s\\192.168.13.10-1"security"-c
This'll disable the stranger's loging in your pc. . . . .
Subscribe to:
Posts (Atom)