Tuesday, August 20, 2013
Thursday, October 22, 2009
Top 5 Hackers of all time
The Black Hat Hackers - Criminals
These hackers are the ones that you've seen in shackles arrested for cybercrimes when they were just getting out of puberty. Some have done it for financial gain others just for fun.
1. Kevin Mitnick.
Mitnick is perhaps synonymous with Hacker. The Department of Justice still refers to him as "the most wanted computer criminal in United States history." His accomplishments were memorialized into two Hollywood movies: Takedown and Freedom Downtime.
Mitnick got his start by exploiting the Los Angeles bus punch card system and getting free rides. Then similar to Steve Wozniak, of Apple, Mitnick tried Phone Phreaking. Mitnick was first convicted for hacking into the Digital Equipment Corporation's computer network and stealing software.
Mitnick then embarked on a two and a half year coast to coast hacking spree. He has stated that he hacked into computers, scrambled phone networks, stole corporate secrets and hacked into the national defense warning system. His fall came when he hacked into fellow computer expert and hacker Tsutomu Shimomura's home computer.
Mitnick is now a productive member of society. After serving 5 years and 8 months in solitary confinement, he is now a computer security author, consultant and speaker.
2. Adrian Lamo
Lamo hit major organizations hard, hacking into Microsoft and The New York Times. Lamo would use Internet connections at coffee shops, Kinko's and libraries to achieve his feats earning him the nickname "The Homeless Hacker". Lamo frequently found security flaws and exploited them. He would often inform the companies of the flaw.
Lamo's hit list includes Yahoo!, Citigroup, Bank of America and Cingular. Of course White Hat Hackers do this legally because they are hired by the company to such, Lamo however was breaking the law.
Lamo's intrusion into The New York Times intranet placed him squarely into the eyes of the top cyber crime offenders. For this crime, Lamo was ordered to pay $65,000 in restitution. Additionally, he was sentenced to six months home confinement and 2 years probation. Probation expired January of 2007. Lamo now is a notable public speaker and award winning journalist.
3. Jonathan James
At 16 years old, James gained enormous notoriety when he was the first minor to be sent to prison for hacking. He later admitted that he was just having fun and looking around and enjoyed the challenge.
James hit high profile organizations including the Defense Threat Reduction Agency, which is an agency of the Department of the Defense. With this hack he was able to capture usernames and passwords and view highly confidential emails.
High on James list, James also hacked in NASA computers and stole software valued at over $1.7 million. The Justice Department was quoted as saying: "The software stolen by James supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." Upon discovering this hack, NASA had to shut dow its entire computer system costing taxpayers $41,000. Today James aspires to start a computer security company.
4. Robert Tappan Morris
Morris is the son of a former National Security Agency scientist named Robert Morris. Robert is the creator of the Morris worm. This worm was credited as the first computer worm spread through the Internet. Because of his actions, he was the first person to be prosecuted under the 1986 Computer Fraud and Abuse Act.
Morris created the worm while at Cornell as a student claiming that he intended to use the worm to see how large the Internet was at the time. The worm, however, reproduced itself uncontrollably, shutting down many computers until they had completely malfunctioned. Experts claim 6,000 machines were destroyed. Morris was ultimately sentenced to three years' probation, 400 hours of community service and assessed a $10,500 fine.
Morris is now a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. His focus is computer network architecture.
5. Kevin Poulsen
Frequently referred to as Dark Dante, Poulsen gained national recognition for his hack into Los Angeles radio's KIIS-FM phone lines. These actions earned him a Porsche among many other items.
The FBI began to search for Poulson, when he hacked into the FBI database and federal computers for sensitive wiretap information. Poulsen's specialty was hacking into phone lines and he frequently took over all of a station's phone lines. Poulson also reactivated old Yellow Page escort telephone numbers for a partner who operated a virtual escort agency. Poulson was featured on Unsolved Mysteries and then captured in a supermarket. He was assessed a sentence of five years.
Since his time in prison, Poulsen has worked as a journalist and was promoted to senior editor for Wired News. His most popular article details his work on identifying 744 *** offenders with Myspace profiles.
These hackers are the ones that you've seen in shackles arrested for cybercrimes when they were just getting out of puberty. Some have done it for financial gain others just for fun.
1. Kevin Mitnick.
Mitnick is perhaps synonymous with Hacker. The Department of Justice still refers to him as "the most wanted computer criminal in United States history." His accomplishments were memorialized into two Hollywood movies: Takedown and Freedom Downtime.
Mitnick got his start by exploiting the Los Angeles bus punch card system and getting free rides. Then similar to Steve Wozniak, of Apple, Mitnick tried Phone Phreaking. Mitnick was first convicted for hacking into the Digital Equipment Corporation's computer network and stealing software.
Mitnick then embarked on a two and a half year coast to coast hacking spree. He has stated that he hacked into computers, scrambled phone networks, stole corporate secrets and hacked into the national defense warning system. His fall came when he hacked into fellow computer expert and hacker Tsutomu Shimomura's home computer.
Mitnick is now a productive member of society. After serving 5 years and 8 months in solitary confinement, he is now a computer security author, consultant and speaker.
2. Adrian Lamo
Lamo hit major organizations hard, hacking into Microsoft and The New York Times. Lamo would use Internet connections at coffee shops, Kinko's and libraries to achieve his feats earning him the nickname "The Homeless Hacker". Lamo frequently found security flaws and exploited them. He would often inform the companies of the flaw.
Lamo's hit list includes Yahoo!, Citigroup, Bank of America and Cingular. Of course White Hat Hackers do this legally because they are hired by the company to such, Lamo however was breaking the law.
Lamo's intrusion into The New York Times intranet placed him squarely into the eyes of the top cyber crime offenders. For this crime, Lamo was ordered to pay $65,000 in restitution. Additionally, he was sentenced to six months home confinement and 2 years probation. Probation expired January of 2007. Lamo now is a notable public speaker and award winning journalist.
3. Jonathan James
At 16 years old, James gained enormous notoriety when he was the first minor to be sent to prison for hacking. He later admitted that he was just having fun and looking around and enjoyed the challenge.
James hit high profile organizations including the Defense Threat Reduction Agency, which is an agency of the Department of the Defense. With this hack he was able to capture usernames and passwords and view highly confidential emails.
High on James list, James also hacked in NASA computers and stole software valued at over $1.7 million. The Justice Department was quoted as saying: "The software stolen by James supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." Upon discovering this hack, NASA had to shut dow its entire computer system costing taxpayers $41,000. Today James aspires to start a computer security company.
4. Robert Tappan Morris
Morris is the son of a former National Security Agency scientist named Robert Morris. Robert is the creator of the Morris worm. This worm was credited as the first computer worm spread through the Internet. Because of his actions, he was the first person to be prosecuted under the 1986 Computer Fraud and Abuse Act.
Morris created the worm while at Cornell as a student claiming that he intended to use the worm to see how large the Internet was at the time. The worm, however, reproduced itself uncontrollably, shutting down many computers until they had completely malfunctioned. Experts claim 6,000 machines were destroyed. Morris was ultimately sentenced to three years' probation, 400 hours of community service and assessed a $10,500 fine.
Morris is now a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. His focus is computer network architecture.
5. Kevin Poulsen
Frequently referred to as Dark Dante, Poulsen gained national recognition for his hack into Los Angeles radio's KIIS-FM phone lines. These actions earned him a Porsche among many other items.
The FBI began to search for Poulson, when he hacked into the FBI database and federal computers for sensitive wiretap information. Poulsen's specialty was hacking into phone lines and he frequently took over all of a station's phone lines. Poulson also reactivated old Yellow Page escort telephone numbers for a partner who operated a virtual escort agency. Poulson was featured on Unsolved Mysteries and then captured in a supermarket. He was assessed a sentence of five years.
Since his time in prison, Poulsen has worked as a journalist and was promoted to senior editor for Wired News. His most popular article details his work on identifying 744 *** offenders with Myspace profiles.
Sunday, July 26, 2009
10 Minute Email for temporary use
Lets say you want to sign up for a site which requires that you provide an e-mail address to send a validation e-mail to. And maybe you don’t want to give up your real e-mail address and end up on a bunch of spam lists. What do you do ? Head over to this link : 10 Minute Email
This is a real nice and disposable online tool to cater to temporary needs of an email . And it’s free !!
All you have to do is clink on the link provided on the site and voila you have your email address which will be valid for 10 minutes.
This is a real nice and disposable online tool to cater to temporary needs of an email . And it’s free !!
All you have to do is clink on the link provided on the site and voila you have your email address which will be valid for 10 minutes.
www.10minutemail.com
You can also reset the timer if you need more time with the Email address. Once you receive mails, you can either forward it to your original inbox or reply to the mail.
You can also reset the timer if you need more time with the Email address. Once you receive mails, you can either forward it to your original inbox or reply to the mail.
Wednesday, July 22, 2009
How To Find Serial Numbers On Google
if your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it'll bring it up
this works great in google
HOW DOES THIS WORK?
Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.
1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for.
2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
I hope this trick help you finding your ccd keys easily
Enjoy :)
this works great in google
HOW DOES THIS WORK?
Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.
1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for.
2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
I hope this trick help you finding your ccd keys easily
Enjoy :)
Solution to ‘You may be a victim of software counterfeiting’ Problem
Solution to ‘You may be a victim of software counterfeiting’ Problem
Microsoft has started bugging the users of non genuine copies of Windows. If you are also running a non genuine or pirated copy of Windows then there is a full chance of you getting this notification one day or the other.
The problem was reported by one of our viewers that when she updated her copy of Windows with Windows Update then her system started showing this notification that reads “You may be a victim of software counterfeiting” and “This copy of windows does not pass genuine Windows validation”.
These notifications start coming back again after some time and do not feel good. Though I never encourage piracy but here is how you can remove this problem:
1. Before doing anything serious try restoring your system. If the problem is occurring after the Windows Update then System Restore will surely help.
2. But if it does not then do try this, launch Windows Task Manager.
3. Locate the process “wgatray.exe” and end it.
4. Log in into the Safe Mode and delete the file WgaTray.exe from c:\Windows\System32
5. Also delete the WgaTray.exe from c:\Windows\System32\dllcache
6. Type regedit in Run to open Registry Editor, navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify key.
7. Delete the folder WgaLogon and all of its contents.
8. Restart the PC normally.
Monday, July 13, 2009
Google Chrome Operating System
Direct From GOOGLE :-
It's been an exciting nine months since we launched the Google Chrome browser. Already, over 30 million people use it regularly. We designed Google Chrome for people who live on the web — searching for information, checking email, catching up on the news, shopping or just staying in touch with friends. However, the operating systems that browsers run on were designed in an era where there was no web. So today, we're announcing a new project that's a natural extension of Google Chrome — the Google Chrome Operating System. It's our attempt to re-think what operating systems should be.
Google Chrome OS is an open source, lightweight operating system that will initially be targeted at netbooks. Later this year we will open-source its code, and netbooks running Google Chrome OS will be available for consumers in the second half of 2010. Because we're already talking to partners about the project, and we'll soon be working with the open source community, we wanted to share our vision now so everyone understands what we are trying to achieve.
Speed, simplicity and security are the key aspects of Google Chrome OS. We're designing the OS to be fast and lightweight, to start up and get you onto the web in a few seconds. The user interface is minimal to stay out of your way, and most of the user experience takes place on the web. And as we did for the Google Chrome browser, we are going back to the basics and completely redesigning the underlying security architecture of the OS so that users don't have to deal with viruses, malware and security updates. It should just work.
Google Chrome OS will run on both x86 as well as ARM chips and we are working with multiple OEMs to bring a number of netbooks to market next year. The software architecture is simple — Google Chrome running within a new windowing system on top of a Linux kernel. For application developers, the web is the platform. All web-based applications will automatically work and new applications can be written using your favorite web technologies. And of course, these apps will run not only on Google Chrome OS, but on any standards-based browser on Windows, Mac and Linux thereby giving developers the largest user base of any platform.
Google Chrome OS is a new project, separate from Android. Android was designed from the beginning to work across a variety of devices from phones to set-top boxes to netbooks. Google Chrome OS is being created for people who spend most of their time on the web, and is being designed to power computers ranging from small netbooks to full-size desktop systems. While there are areas where Google Chrome OS and Android overlap, we believe choice will drive innovation for the benefit of everyone, including Google.
We hear a lot from our users and their message is clear — computers need to get better. People want to get to their email instantly, without wasting time waiting for their computers to boot and browsers to start up. They want their computers to always run as fast as when they first bought them. They want their data to be accessible to them wherever they are and not have to worry about losing their computer or forgetting to back up files. Even more importantly, they don't want to spend hours configuring their computers to work with every new piece of hardware, or have to worry about constant software updates. And any time our users have a better computing experience, Google benefits as well by having happier users who are more likely to spend time on the Internet.
We have a lot of work to do, and we're definitely going to need a lot of help from the open source community to accomplish this vision. We're excited for what's to come and we hope you are too. Stay tuned for more updates in the fall and have a great summer.
It's been an exciting nine months since we launched the Google Chrome browser. Already, over 30 million people use it regularly. We designed Google Chrome for people who live on the web — searching for information, checking email, catching up on the news, shopping or just staying in touch with friends. However, the operating systems that browsers run on were designed in an era where there was no web. So today, we're announcing a new project that's a natural extension of Google Chrome — the Google Chrome Operating System. It's our attempt to re-think what operating systems should be.
Google Chrome OS is an open source, lightweight operating system that will initially be targeted at netbooks. Later this year we will open-source its code, and netbooks running Google Chrome OS will be available for consumers in the second half of 2010. Because we're already talking to partners about the project, and we'll soon be working with the open source community, we wanted to share our vision now so everyone understands what we are trying to achieve.
Speed, simplicity and security are the key aspects of Google Chrome OS. We're designing the OS to be fast and lightweight, to start up and get you onto the web in a few seconds. The user interface is minimal to stay out of your way, and most of the user experience takes place on the web. And as we did for the Google Chrome browser, we are going back to the basics and completely redesigning the underlying security architecture of the OS so that users don't have to deal with viruses, malware and security updates. It should just work.
Google Chrome OS will run on both x86 as well as ARM chips and we are working with multiple OEMs to bring a number of netbooks to market next year. The software architecture is simple — Google Chrome running within a new windowing system on top of a Linux kernel. For application developers, the web is the platform. All web-based applications will automatically work and new applications can be written using your favorite web technologies. And of course, these apps will run not only on Google Chrome OS, but on any standards-based browser on Windows, Mac and Linux thereby giving developers the largest user base of any platform.
Google Chrome OS is a new project, separate from Android. Android was designed from the beginning to work across a variety of devices from phones to set-top boxes to netbooks. Google Chrome OS is being created for people who spend most of their time on the web, and is being designed to power computers ranging from small netbooks to full-size desktop systems. While there are areas where Google Chrome OS and Android overlap, we believe choice will drive innovation for the benefit of everyone, including Google.
We hear a lot from our users and their message is clear — computers need to get better. People want to get to their email instantly, without wasting time waiting for their computers to boot and browsers to start up. They want their computers to always run as fast as when they first bought them. They want their data to be accessible to them wherever they are and not have to worry about losing their computer or forgetting to back up files. Even more importantly, they don't want to spend hours configuring their computers to work with every new piece of hardware, or have to worry about constant software updates. And any time our users have a better computing experience, Google benefits as well by having happier users who are more likely to spend time on the Internet.
We have a lot of work to do, and we're definitely going to need a lot of help from the open source community to accomplish this vision. We're excited for what's to come and we hope you are too. Stay tuned for more updates in the fall and have a great summer.
Sunday, July 12, 2009
What is full form of RSVP written on invitation cards
The full form is repondez s'il vous plait. It's French for reply (if you) please.
However, it is never written out in full on invitations in English-speaking countries, and the full version might leave some people puzzled, whereas RSVP is understood.
(Incidentally, the French use a slightly different version: Répondre SVP).
In INDIA Its Like ,, Respond To An Invitation ,, Very Urgent ,, Please Reply ..
However, it is never written out in full on invitations in English-speaking countries, and the full version might leave some people puzzled, whereas RSVP is understood.
(Incidentally, the French use a slightly different version: Répondre SVP).
In INDIA Its Like ,, Respond To An Invitation ,, Very Urgent ,, Please Reply ..
Friday, May 01, 2009
Who Is Orkut????~~Read on~~
Who Is Orkut ??
Who Is
Orkut????
A guy lost his girlfriend in a train accident.... but
the gal's name nowhere appeared in the dead list. This guy grew up n
became IT technical architect in his late 20's, achievement in itself!!
He hired developers from the whole globe and plan to make a software where he could search for his gf through the web..
Things went as planned...
n he found her, after losing millions of dollars and 3 long years!!
It was time to shut down the search operation, when the CEO of Google had a
word with this guy n took over this application,
This Software made a whopping 1 billion dollars profit in its first year,
which we today know as ORKUT.
The guy's name is Orkut Büyükkökten Yes
it's named after him only. Today he is paid a hefty sum by Google for
the things we do like scrapping. He is expected to b the richest person by 2009..
Orkut Büyükkökten today has 13 assistants to monitor his scrapbook & 8 to
monitor his friends-list. He gets around 20,000 friend-requests a day & about 85,000 scraps!!!
Some other Cool Facts about this guy:
* He gets $12 from Google when every person registers to this website.
* He also gets $10 when you add somebody as a friend.
* He gets $8 when your friend's friend adds you as a friend & gets $6 if
anybody adds you as friend in the resulting chain.
* He gets $5 when you scrap somebody & $4 when somebody scraps you.
* He also gets $200 for each photograph you upload on Orkut.
* He gets $2.5 when you add your friend in the crush-list or in the hot-list.
* He gets $2 when you become somebody's fan.
* He gets $1.5 when somebody else becomes your fan.
* He even gets $1 every time you logout of Orkut.
* He gets $0.5 every time you just change your profile-photograph.
* He also gets $0.5 every time you read your friend's scrap-book & $0.5 every time you view your friend's friend-list
Fastest Internet Connection...60dvd/sec...breaking all records..
Fastest Internet Connection...60dvd/sec...breaking all records..
2,560,000,000,000 bits are equivalent to the contents of 60 DVDs.
By comparison, the fastest high-speed links currently carry data at a maximum 40 Gbit/s, or around 50 times slower.
The research was carried out at Fraunhofer Institute which also developed computers with Emotion sense.
Subscribe to:
Posts (Atom)