Skip to main content

Posts

Showing posts from September, 2011

[Mass Deface] Indian Cyber Force Mass Defaced Pakistani Sites

This Message was Displayed on Multiple Pakistani Sites When People Tried to Access Those Sites ====== HACKED BY INDIAN CYBER FORCE ====== [~] ASHELL - L3Th@L C0d3 - IoN - StR!k3R - BLADE - CoDeD32 [~] [~] 0wned?!![~] [~] You g0t fUcked lyk ChEap B!tch[~] [~]d0nt cry n0w we kn0w h0w must Be iT iS paining[~] [~] indianCyberForce 0wns y0ur A$$[~] [~] greetz: all members   List of Hacked Sites ~ http://tckpk.com/ http://kptourism.com/ http://gandharapakistan.com/ http://abbas.nwfptourism.com.pk/ http://nwfptourism.com.pk/ http://capsrokind.com.pk/ http://jkinstruments.pk/ http://www.knjarral.net/ http://mdamirpur.gok.pk/ http://www.arab-zone.org/mirror/16767/knjarral.net/ http://www.arab-zone.org/mirror/16766/jkinstruments.pk/ http://www.arab-zone.org/mirror/16764/nw...sm.com.pk/ http://www.arab-zone.org/mirror/16765/ca...nd.com.pk/ http://www.arab-zone.org/mirror/16762/ga...istan.com/ http://www.arab-zone.org/mirror/16763/ab...sm.c

NBC Twitter account hacked

[Hacked] NBC Twitter account sending out false reports of Ground Zero terrorist attack The Twitter account of NBC News has been compromised by a hacking group calling themselves the ‘script kiddies’ and has been Tweeting out false messages about a terrorist attack on Ground Zero. The Script Kiddies group is apparently sympathizing with hacking group Anonymous as the name appears to refer to the Department of Homeland Security calling Anonymous ‘just a bunch of script kiddies’ earlier this month. Updated with statements from NBC and Twitter below. The group has just changed the NBC logo to a graphic and altered the ‘about’ section of the account as well. The about info links to a Twitter account that has been suspended. NBC has confirmed the hacking with a Tweet from Ryan Osborn, their Director of Social Media, saying “The @NBCNews account has been hacked. Working on it. Please don’t retweet any misinformation.” Twitter is apparently acting on the matter qui

Hacking Firefox: More Than 150 Hacks, Mods, and Customizations

They dreamed of a better browser . . . and before you could say “explore no more,” Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you’ve always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways to do it. From hacking profile settings to cracking links and cleaning out the cookie jar, this is the stuff that puts you in control. Step-by-step instructions for these hacks and dozens more >Settings, content, and extension hacks >Hacking the interface and themes >Performance boosters >Anti-phishing and security hacks >Toolbar and status bar tweaks >Navigation, download, and search hacks >Hacks for common plugins >Extension and theme creation Download

New Youtube Tips and tricks

  Download

Computer Forensics secrets and sloutions

                                                                Download

How to own an identity

                                                                       Download

Investigating Network and cyber crime

                                                                        Download

Cyber forensics

                                                                    Download

New and Different ways to hack gmail

                                                                          Download

Apple making 1,50,000 iPhone 5 a day

Apple is gearing up to meet the anticipated heavy demand for iPhone 5 following its launch next month. Apple's contract manufacturer Foxconn is reportedly working overtime to produce 150,000 units of iPhone 5 every day, thereby taking the total production to approximately between 5-6 million per month. Industry watchers say this is the highest ever production of any Apple product so far. Apple is hoping bumper sales of its forthcoming latest iPhone. When contacted, a company spokesperson said Apple does not comment on speculative reports. But if the industry speculation is to be believed, Apple is ramping up its production in a bid to stay ahead of an anticipated worldwide frenzy to buy the iPhone 5. Apple is said to be gearing up to launch iPhone 5 in the first week of October, with pre-orders starting as early as 29th September. A DigiTimes report quoted industry sources as saying the shipments of iPhone 5 from the supply chain are expected to reach 5-6

Hacking G mail E-book

                                                                        Download

Network Security Hacks

                                                                           Download

Pakistan Journal of Agricultural Research Site Hacked

Terror revisited the heart of the Capital on Wednesday morning when a powerful bomb ripped through a crowded reception area at one of the entrances to the Delhi High Court, killing at least 11 and injuring 76, 2 among whom are serious. The terror attack, from a sophisticated explosive device, had a precursor less than four months ago – on May 25 – when a low-intensity bomb went off in the same area, though outside a different gate. Questions have been raised in police circles whether that blast was an attempt to gauge the area's preparedness to ward off terror as well as its vulnerability. Police officials said the bomb went off at 10.15 am outside gate 5 which was jampacked with visitors waiting for entry passes. Condemning the "terrorist attack", Home Minister P Chidambaram told the Lok Sabha it was not immediately possible to identify the group behind the High Court blast.  Pakistan Journal of Agricultural Research Site got Hacked by a Patriotic I

Why we need Hackers?

Life would be easier if we didn’t have to patch our operating systems and apps. Patrick Gray explores the real reasons why updating is important. It would be easier if hackers, who say they’re acting in the public interest by releasing information on the vulnerabilities they find, would just get real jobs and stop pointing out the weaknesses in our software, right? Wrong. As most who work in the IT security field will tell you, all the software that we use is shipped in a vulnerable state. The security holes are there from day one, and if the good guys don’t find the bugs, the bad guys will. The only way to defend an operating system or an application against a bug is to know of the existence of the bug in the first place. Just 10 years ago, the bug-hunting community was a mish-mash of hackers, system administrators and programmers. Many were geeks seeking kudos for finding the latest "zero-day" or "fresh" vulnerability. Since then, IT security

India recruiting hackers for elite cyber offensive

  India, one of the fastest growing technology economies in the world along with China, is taking a leaf out of the latter's book by getting together top IT workers and "ethical hackers" from across the country to form an elite "cyber army". The India Times suggests that software professionals are being rounded up and inducted into a small army for the sole purpose of intelligence gathering and defence against attack from both friendly and hostile nations. The 29th of July saw a board meeting chaired by national security advisor Shiv Shankar Menon and attended by the top dog in the Intelligence Bureau, officials of the telecom department, the IT ministry and security agencies. With worries over spying and sabotage from India's neighbours - in particular Pakistan and China - a new initiative was to be drawn up. The government proposal is not just for defence: according to documents obtained by the Economic Times of India, the National