Saturday, May 2, 2009

Three Most used Backdoor Programs

There is a general misconception about security today. Most people would love to believe that their firewalls are completely capable to protect them from anything indecent. The sad part, they could not be more wrong. Hungry Hacker aim to prove it with three separate programs that can compromise the security of computers. You have the opportunity to say “What’s a backdoor?” Yes, these programs were created in 1990, but still pose a real threat today. It is the first two that are still being developed.

Using these programs any noob can remotely access your computer without any Authentication and do whatever he wants. I will tell you some of the features rest of them you need to try it and find out. These Programs :

  • Work as a key logger.
  • Send any Information from Victim’s PC to the Hacker’s PC.
  • Run any program on the Victims PC.
  • Display any Violating Image on victim’s Screen.
  • Open the CD Drive of the Victim’s PC.
  • Open any Web page on the Victims Screen.
  • Disable any Specific Key or whole Keyboard.
  • Shutdown Victim’s PC.
  • Start a Song on the Victim’s PC.etc.etc…………..

Back Orifice / Back Orifice 2000

Back Orifice is one of the most common backdoor programs, and one of the most deadly. The name may seem like a joke, but sure, the threat is real. Back Orifice was established in Cult of the Dead Cow group. Back Orifice is an Open Source Program. The main Threat of this software is that by making some changes in the code anybody can make it undetectable to the Anti virus Program running on the Victim’s computer. Apart from the strange title, the program usually gets port 31337, the reference to “Lit” phenomenon is popular among hackers.

Back Orifice uses a client-server model, while the server and client is the victim attacker. What makes Back Orifice so dangerous that it can install and operate silently. There is not required interaction with the user in, meaning you could its on your computer right now, and do not know.

Companies such as Symantec have taken steps to protect computers against programs that they consider dangerous. But even more attacks using Back Orifice 2000. This is due partly to the fact that it is still evolving, as open source. As stated in the documentation the goal is ultimately the presence of the Back Orifice 2000 unknown even to those who installed it.

Back Orifice 2000, developed for Windows 95, Windows 98, Windows NT, Windows 2000 and Windows XP.

Where can I download Back orifice 2000?

Back Orifice 2000 can be downloaded at the following address: http://sourceforge.net/projects/bo2k/

I infected! How do I remove it?

Removing Back Orifice 2000 may require that you change the registry settings. To remove it at 7 simple steps, refer to the diagram below.

How do I delete Back orifice 2000

  1. Click Start> Run, and type “Regedit”(without the quotes)
  2. Follow the path below: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices “
  3. Now looking in the right box: “The umgr32 = ‘c: \ windows \ system \ umgr32.exe”
  4. Right-click on this entry and click Remove. Now restart your computer.
  5. After restarting only open Windows Explorer. Make sure you can see all registered extensions. To do so, select “View Options and configure the appropriate settings.
  6. Go to the WINDOWS \ SYSTEM directory, and find “umgr32.exe” file. Once you find it, delete it.
  7. Exit Windows Explorer and reboot again.

NetBus / Netbus 2.0 Pro

NetBus was established around the same time that the Back Orifice was in the late 1990’s. NetBus was originally designed as a program prank friends and family, of course anything too malicious. However, the program was released in 1998, and is widely used as a backdoor to manage computer.

Like the Back Orifice, NetBus allows attackers to do virtually everything in the computer victim. It also works well under Windows 9x systems, as well as Windows XP. Unlike Back Orifice, the latest version of NetBus regarded shareware is not free. NetBus is also implementing less stealthy operations, as a direct result of criticism and complaints of abusive use.

Where can I buy and download NetBus?

NetBus can be purchased and downloaded at the following address: http://www.netbus.org/

Ok, I am infected. Now what?

Fortunately, the latest version of NetBus is a valid program. It can be removed just like any other program. Previous issuance NetBus is a bit more tricky, however. If you are not lucky enough attacked with the latest version, the withdrawal process and in the Back Orifice.

How do I remove NetBus?

  1. Click Start> Run, and type “Regedit ‘(without the quotes)
  2. Follow the path below: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices “
  3. Now, in the right box, looking as follows: “[Name_of_Server].”Exe Of course, you have to find the actual name of this file EXE-. Usually This” Patch.exe ‘or’ SysEdit.exe “, but may vary.
  4. Reboot and remove all traces of the actual program, which can be left. Additionally, you can set yourself NetBus, and then use its own function disposal.

SubSeven / Sub7

SubSeven or Sub7, has been established for the same purpose was to NetBus pranks. Sub7 actually has more support for pranks, and has more advanced users. Sub7 also widely used by the script kiddies, although that many firewalls and anti-virus software before initialization.

Since Sub7 not supported for several years, the threat is usually very low. Most security programs will not have any problem in ending Sub7 before it has a chance to be started. This shows that the importance to the modernization and security programs is critical, because the money was still there.

Nevertheless, it is widely used by those who have physical access to your firewall, or security programs. If access rights, the tool will work without restrictions.

Where can I buy and download Sub7?

Sub7 not supported more, and hence is not available for download on any legitimate websites. If you were to make a Google search, you would find links to download Sub7. However, this is not the official site, and should be considered dubious and dangerous.

Sounds harmless, How do I remove it?

  1. End of the following processes through the curator: “editserver.exe, subseven.exe”
  2. Delete the following files: “editserver.exe, subseven.exe, tutorial.txt.”

Why these programs is absolutely legitimate?

All the basis behind these programs is that they are designed to help people, not harm. While some like NetBus really were originally created for pranks, they switched routes to avoid legal problems.

These programs claim to be the legitimate remote desktop program, although they certainly easily used for malicious use. These programs really should be used to aid or customer support departments. Why all adolescents is to copy these programs goes beyond us, but leave the content of their networks, while computer is a good idea.

The advent of new technology has made these programs in some respects less effective. However, programs such as Back Orifice 2000, yet still evolving, so do not be surprised to learn that he works in the background, waiting for instructions. Since the best defense is a good offense, be sure to save a sharp eye on what is installed on the network computers. After all, an ounce of prevention is worth a pound of cure.

Best Windows Hacking Tools

This is the Collection of Best Windows Hacking Tools:

1. Cain & Abel - Cain & Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

2. SuperScan - SuperScan is a powerful TCP port scanner, pinger, resolver. SuperScan 4 (Current Version) is a completely-rewritten update of the highly popular Windows port scanning tool, SuperScan.

3. GFI LANguard Network Security Scanner - GFI LANguard N.S.S. is a network vulnerability management solution that scans your network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides you with tools to patch and secure your network. GFI LANguard N.S.S. was voted Favorite Commercial Security Tool by NMAP users for 2 years running and has been sold over 200,000 times!

4. Retina - Retina Network Security Scanner, recognised as the industry standard for vulnerability assessment, identifies known security vulnerabilities and assists in prioritising threats for remediation. Featuring fast, accurate, and non-intrusive scanning, users are able to secure their networks against even the most recent of discovered vulnerabilities.

5. SamSpade - SamSpade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more.

6. N-Stealth - N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as whisker and nikto, but you have to pay for the privilege.

7. Solarwinds - Solarwinds contains many network monitoring, discovery and attack tools. The advanced security tools not only test internet security with the SNMP Brute Force Attack and Dictionary Attack utilities but also validate the security on Cisco Routers with the Router Security Check. The Remote TCP Reset remotely display all active sessions on a device and the Password Decryption can decrypt Type 7 Cisco Passwords. The Port Scanner allows testing for open TCP ports across IP Address and port ranges or selection of specific machines and ports.

8. Achilles - The first publicly released general-purpose web application security assessment tool. Achilles acts as a HTTP/HTTPS proxy that allows a user to intercept, log, and modify web traffic on the fly. Due to a cyber squatter, Achilles is no longer online at its original home of www.Digizen-Security.com…OOPS!

9. CookieDigger - CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications. The tool works by collecting and analyzing cookies issued by a web application for multiple users. The tool reports on the predictability and entropy of the cookie and whether critical information, such as user name and password, are included in the cookie values.

10. Netcat (The Network SwissArmy Knife) - Netcat was originally a Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.

8 in 1 Keylogger with Cracks

  • Sureshot Ghost Keylogger v.3.80
  • Quick Keylogger 2.1.027
  • Embrace
  • Family Key Logger
  • Easy Keyboard Logger v.1.0
  • Blazingtools Perfect Keylogger v.1.6.2.0
  • Ardamax Keylogger v.1.9


Free Download

Download8 in 1 Keylogger with Cracks


Password:ghanshyam_thori

Facebook Hit by Second Phishing Scam in Two Days


The more popular something is, the more people want to use it as a way to scam people. An example would be the recent swine flu related spam attacks, and these are phishing scams that sends Facebook users to fake login sites (today fbstarter.com, yesterday fbaction.net).

While fbaction.net has been taken down, go to fbstarter.com and it com sure looks like a lot like some sort of Facebook login page, doesn't it (see attached pic)?

What's happening is people are getting "Facebook messages" supposedly from other users that basically just say "Look at this" and have the link that takes them to fbstarter.com. Once you enter your username / password there, you've basically delivered your login credentials to the scammer.

Now, fbstarter.com sure looks suspiciously like fbaction.net. Personally, if you're alert to the important aspects of watching out for phishing, such as:

  • Don't use links delivered in emails or IM to login to any site
  • If you do, make sure the site's URL looks like what you are expecting
  • Email the site / organization / business in question if you are unsure
then you should be pretty safe.

Of course, while some (not me) store credit cards information in their Facebook account, most of the information for a credit card is redacted anyway (though I suppose a scammer could use your credit card to buy something on the site).

The main reason, I would think, that scammers would want your login info is because many people use the same login info everywhere. Definitely a bad idea, but something many people do.

If you've fallen for either of these phishing scams already, change your Facebook password immediately (if the scammers haven't already locked you out). And, if that's happened and it's the same password you use for your Amazon.com, eBay, or other types of accounts, you could be in big trouble.

Interested in learning about avoiding phishing scams? I wrote earlier about a free online game developed by Carnegie-Mellon that teaches how to avoid it.

Google Search Now Right in Gmail

What took so long, Google? On Thursday, Gmail got another Gmail Labs feature, Google Search right inside your inbox. It's described as follows:

Displays Google search results inside your mail window, letting you quickly find things and use them when you're writing an email.
To enable it, go to Settings, Labs, find Google Search and select the Enable radio button.

I know, I know, there's a Search the Web button above your inbox. But that opens a separate window. What if you don't want to have to switch back and forth between tabs / windows and mail?

Enable the Google Search feature, and you'll get a small edit box on the LHS of your inbox (as above).

Type a query into it, and rather than opening up another window or tab, it pops up a box in the same position as a chat window, but a little bigger. Click a link and it'll open up a tab or window so you can confirm the results.

Bleh, you might say. We're back to the new tab / window. Well, yes, you're right, and more on that later. But now comes the fun part. Go back to the Search Results window, click on the drop-down menu, and you'll get a contextual menu that varies depending on what you're currently doing in Gmail.

  • If you're reading a message, you can start a reply to the message with the search result as the first thing in your reply.
  • If you're writing a message, you can paste the result, or just the URL into your message.
  • If you're chatting with someone, you can send the result via chat.
  • You can also always compose a new message to send the search result.
Oh, and it keeps a history of your searches (clearable) as well.

Yes, it might be better if clicking a link, rather than opening up a new tab / window, would instead open another pop-up, but maybe that's for the future.

If you're like me, the sidebar to the left of your inbox might be getting crowded. Google suggests using another Labs feature, Navbar Drag and Drop to move the Google Search widget whereever you want it.

Friday, May 1, 2009

Microsoft’s WorldWide Telescope: Virtual telescope opens night sky

Where science meets imagination !

Microsoft’s WorldWide Telescope Released. May 12th, 2008

Any Star Wars , Star Trek fan (like me) knows that space travel is not always easy, but Microsoft wants to make traveling the ‘final frontier’ as simple as turning on your computer.

WorldWide Telescope-Explore Joining Google Sky and Stellarium is Microsoft’s entrant to the stars, Worldwide Telescope. I’ve been playing around with it for about an hour and it’s pretty cool. It effectively turns every computer that downloads it into a mini-planetarium capable of displaying high resolution images of millions of stars, planets and other celestial.

First of all I was happy to see that Microsoft has came out of “ ~ ta’s “ naming ( e.g. Vista, Lista, Volta … that “ta” was getting on my nerves ), “Worldwide Telescope” is a bit old skool name, inspired from you know what … I can live with this one.

OK, now Check it out if you’re an outer space dork — it includes a bunch of guided tours from astronomers. I liked the “many worlds” tour, which started with Mount St. Helen’s ranges and then flew off to the rest of the planets in our solar system for some hot world-on-world action. A tour called “Dust and Us” walks through the dark regions in galaxies where stars and planets form.

WorldWide Telescope-Tour The software allows users to develop their own guided tours of the universe to share with others or take part a guided tour created by astronomy experts.

The WorldWide Telescope stitches together 12 terabytes - the data of pictures from sources including the Hubble Space Telescope, the Chandra X-Ray Observatory Center and the Spitzer Space Telescope.

The experience is similar to playing a video game, allowing users to pan, zoom in and out of galaxies that are thousands of light years away. It allows seamless viewing of far, far away star systems and rarely-seen space dust in breathtaking clarity.

I can use WorldWide Telescope for 4 different “looks” - Panorama, Sky, Earth, or Planets. Users can see the X-ray view of the sky, zoom into bright radiation clouds, and then cross-fade into the visible light view and discover the cloud remnants of a supernova explosion from a thousand years ago.

Other data sets include the ongoing Sloan Digital Sky Survey, also known as the Cosmic Genome Project, which aims to capture detailed optical images of more than a quarter of the night sky.
By default, WorldWide Telescope is configured to view the night sky as if you were standing at Microsoft Building 99 in Redmond. But you can change your Observing Location very easily via View options.

Experience WWT:

To use the new system, users need to download WorldWide Telescope from the web ( it’s free ). It only runs on Windows operating systems ( M$ strikes back ! … as usual )
The System Requirements does include 2GB of RAM , 3D accelerated card with 128 megabytes (MB) RAM; discrete graphics card with dedicated 256-MB VRAM, but i’m using it on my PC : Windows Vista, intel CTD 2.2 G Hz, 1 GB RAM, no graphics card, and it just works fine.

A test version is available for download at: http://www.worldwidetelescope.org

P.S. - it’s interesting how the site is made using Adobe Flash and not Silverlight. … yehh !!

Other options :

Google Sky, an add-on to Google Earth has been there for some time, but I found WorldWide Telescope’s GUI, and overall experience better than Google sky.

The dance of the planets above Hurricane Ridge, Olympic national park, WA, United States Stellarium is a free open source tool that gives people a chance to access more than 210 million stars, in addition to planets and moons. The project was launched in 2001 and is used in many planetariums.
Like WorldWide Telescope the software allows users to record and play their own tours of the Universe. Stellarium is really good, and Microsoft must continue taking WorldWide Telescope to next levels to stay ahead.

Stellarium is just wonderful. Best of all is that it is not quite the memory and system resource hog that Starry Night Basic and Pro is ( it is one more option ). In fact, I have found that the latest versions of Starry Night often will not run on computers that are a few years old. It gives good view of what the sky would look like from pretty much anywhere on Earth at any time over a wide range of dates. If you want to know what stars and constellations are which, if you are an amateur planning an observing session, or you have any other need for a basic planetarium software, then this seems good.

Future From My View:

- WorldWide Telescope is not bad, but it’s not great either. It would be better as an online app where people can share access to their telescopes. People with better telescopes with the servo system and the drivers and the right CCD. They could sell time on their equipment via the Internet or at least share it with some new Microsoft or Google services.. A virtual space marketplace. I would pay for something like that and so would a lot of people.

- I see social network interaction potential in developing our own guided tours and sharing them. We can have forums facility bundled where people interested in common space topics can interact and share information through custom tours and traditional chat.

- This software will be like having an important educational mission.

- Microsoft will never learn it…
Under download for Mac: ‘Minimum Windows XP SP2 , Vista recommended …with BootCamp”
Guys a Mac running Windows IS NOT A MAC, it’s like a beautiful woman wearing a sack and led boots….
Anyhow, they don’t seem to get it that clinging to their old lady OS doesn’t fly anymore.

- In the hollywood hills we only use telescopes to see into our neighbors houses. let me know when someone comes out with that one.

Saturday, April 11, 2009

Find the Sender's Local Time in Gmail

Gmail Labs added a very useful feature for those who receive messages from all over the world. "Sender Time Zone" shows a green phone icon if it's appropriate to call the sender and a red phone icon if it's not a good time for calling (the icon is actually an Unicode character). Click on "show details" and you'll also see the local time of the sender.

"Message headers always include the time sent and often include time zone info too. We use that information to show you these icons. If the time zone isn't included for a given message, this Labs feature won't display anything," explains Gmail's blog. Google saves your timezone in your Google Account and it can be changed from this page.

Saturday, March 21, 2009

Now Google Ocean from Google


Google Ocean Introduced in version 5.0 (February 2009), the Google Ocean feature allows users to zoom below the surface of the ocean and view the 3D bathymetry beneath the waves. Supporting over 20 content layers, it contains information from leading scientists and oceanographers.

With ocean in Google Earth, you can:
Dive beneath the surface and visit the deepest part of the ocean, the Mariana Trench
Explore the ocean with top marine experts including National Geographic and BBC
Learn about ocean observations, climate change, and endangered species
Discover new places including surf, dive, and travel hot spots and shipwrecks.

The virtual ocean is available for free by downloading the latest version of Google Earth from the Google homepage.

Google Earth lets people hover over a virtual world, created by piecing together tens of thousands of satellite maps.

The new version includes a three dimensional map of the sea floor, including the Mid Ocean Ridge, the world’s longest underwater mountain range stretching 30,000 miles.

Most of the sea bed is shown in relatively low resolution. But some areas - such as the Pacific Ocean around Hawaii are highly detailed.

Watch footage of Google Ocean here...








Google removes some street view images

From Wikinews.
Google’s release of Google Street View, which is a panoramic street-mapping tool, has sparked complaints which have forced the company to remove some images.

Some of the images that were removed have been said to depict individuals, such as a man entering a sex shop, a person throwing up, and people being arrested.

Google has stated that if anyone wanted their picture removed, they would do so. "We've got millions of images, so the percentage removed was very small," said Laura Scott, a spokesperson for Google, to the BBC. "We want this to be a useful tool and it's people's right to have their image removed. The fact there are now gaps [in Street View] shows how responsive we are," she added.

Street View was released on May 25, 2007, and is available in many different countries, including United States, Japan, Australia, New Zealand, France, Spain and Italy.

Google Inc. launches new 'Undo Send' email feature for Gmail users

Ever cranked out an email in a fit of rage, only to regret it later? Hit 'reply all' when you only meant to hit 'reply'? Sent an email to a VIP only to realize seconds later that you didn't attach the file?

These and myriad other email 'situations' can be extradinarily unpleasant. But for Gmail users, many of them can now be a thing of the past.

So those of you who tend to get yourselves into unpleasant email 'situations' every now and then, take note: Gmail has launched an 'undo send' feature.

But there's a catch - you only get five seconds to hit 'undo send.' After that time window, well, you're on your own.

To enable this feature, Turn on 'Undo Send' option in 'Gmail Labs' under 'Settings.'

Now, if the geniuses at Google could only create an 'Undo Send' for all those times you say something that doesn't quite come out right...

Thursday, March 12, 2009

Release of Google Voice



Google Voice is a service that gives you one number for all your phones, voicemail that is easy as email, and many enhanced calling features like call blocking and screening, voicemail transcripts, call conferencing, international calls, and more.

Google number - One number for all your calls and SMS
* Call screening - Announce and screen callers
* Listen in - Listen before taking a call
* Block calls - Keep unwanted callers at bay
* SMS - Send, receive, and store SMS
* Place calls - Call US numbers for free
* Taking calls - Answer on any of your phones
* Phone routing - Phones ring based on who calls
* Forwarding phones - Add phones and decide which ring



Google voicemail - Voicemail as easy as email, with transcripts

* Voicemail transcripts - Read what your voicemail says
* Listen to voicemail - Check online or from your phone
* Notifications - Receive voicemails via email or SMS
* Personalize greeting - Vary greetings by caller
* Share voicemail - Forward or download voicemails

Voice features - More cool things you can do with Google Voice

* Conference calling - Join people into a single call
* Call record - Record calls and store them online
* Call switch - Switch phones during a call
* Mobile site - View your inbox from your mobile
* GOOG-411 - Check directory assistance
* Manage groups - Set preferences by group


Google Voice is currently open only for GrandCentral users

Call phones from Gmail- Calls from PC to Phone with Google Talk ~~~~ Now in India ~~~~

Free International Calls from PC to Phone with Google Talk and Talkster (GTalk-to-VoIP) Google has officially unveiled its new Google Mai...