Gadgets Security

Keep your mobile gadget secure

Wednesday, September 7, 2011

Windows E-Books Reader Server.

Today WhiteCyber Team want to share how to make a simple Windows E-Books Reader Server. To make your old computer become powerfull and meaning full in your library. You could try make E-Book Reader Server from one Personal Computer. Require System Computer with processor Pentium IV or later. Minimum memory 268 Mb. Using Windows XP. We try to make this system in SMAN 1 Salatiga's Library. Tools : 1. XAMP : We will use this program to make Windows XP become a server. download...

Saturday, July 23, 2011

Howto Crack pdf File Password

If you want to crack pdf file passwords use pdfcrack.PDFCrack is a GNU/Linux (other POSIX-compatible systems should work too) tool for recovering passwords and content from PDF-files. It is small, command line driven without external dependencies. The application is Open Source (GPL). pdfcrack Features Supports the standard security handler (revision 2 and 3) on all known PDF-versions Supports cracking both owner and userpasswords Both wordlists and bruteforcing the password is supported Simple...

Top 5 Tips for protecting your mobile from phone hacking

Phone hacking can happen to anyone. Here's how to secure your phone. As you've no doubt heard by now, phone hacking is the new ‘in' thing with newspapers and scrupulous media types. But it's not just celebrities having affairs who need to worry; you too could be the victim of phone hacking. So it's time to tighten up security on your mobile phone and start protecting it in the same way you would protect your PC. Here is PC Advisor's Top 5 Tips for protecting your mobile from phone hacking. 1. Change your voicemail pin  If you have got an old phone or phone contract, then there's a good...

Friday, July 22, 2011

exploitdbee.py – Easily Search For Exploits In BackTrack’s Exploitdb (files.csv).

This is a simple Python tool to help you search for exploits in the BackTrack Exploit Database. Features Search the exploitdb archive Case sensitive & insensitive Change output mode Automatically copy your exploits Requirements python (tested with python 2.7.1 and 2.5.2) local exploitdb (pre-installed on BackTrack Linux) Usage exploitdbee.py [-c] [-d path]exploitdbee.py "windows 7" remoteexploitdbee.py -c Microsoft IIS -d /tmpYou can download exploitdbee.py v1.0 here: exploitdbee...

Wednesday, July 20, 2011

Mengaktifkan & Menonaktifkan Regedit

Kesal kan apabila regedit hilang karena perbuatan virus? Atau mungkin juga teman-teman anda sering mengutak-atik registry anda? Karena itu saya ada sebuah trik nih, yang berfungsi untuk menampilkan dan menyembunyikan regedit, yaitu dengan sebuah sedikit sihiran javascript, simple, bahkan orang awam pun bisa membuat program seperti ini. Caranya?ketik script dibawah ini di notepad. -------------------------------------------------------- // Program Sederhana Mengamankan Regedit // Nama Program: regedit_java.js var vbCancel = 2; var vbYesNoCancel = 3; var vbYes = 6; var vbNo = 7; var vbQuestion...

HD Camcorders: Beginner's Guide to HD Camcorders

High definition (HD) camcorders are a natural fit for the growing number of HDTVs in living rooms across the country. Prices on HD camcorders continue to drop, while more and more camcorder manufacturers are expanding the number of HD models they carry. What's the Difference Between Standard Definition and HD Camcorders?Much like televisions, the difference between standard definition and HD camcorders is the video resolution. The video you see on your television or computer screen is made...

7 free Windows tune-up tools and tips

You don't need to spend money to keep a Windows computer running in top form. Here's how to fix, clean and maintain Windows using programs you can download now for free.  The following software and tips generally apply to Windows 7, Vista and XP, and are listed in the order you should use them for the first time on a computer you suspect may be infected with malware or running slower than it should. 1. Update Windows itself with Windows Update. Though this should be a no-brainer, many Windows users don't install the latest updates for the OS provided by Microsoft (which are usually issued...

PCMAV 5.3 + Update Build 2, Clamav 0.97.1, Link Protector Update 7, PCMAV Juli 2011 - PCMAV Agustus 2011

PCMAV 5.3 kembali hadir bersama diterbitkannya majalah PC Media edisi 07/2011 bulan Juli 2011. Datang dengan serangkain perbaikan dan penyempurnaan dari versi sebelumnya, serta dengan penambahan pengenalan 119 virus baru, PCMAV 5.3 kini mampu mengenali 4.350 virus beserta variantnya yang dilaporkan banyak menyebar di Indonesia. Pengintegrasian removal engine khusus untuk pembersihan virus Ramnit yang sebelumnya telah digunakan pada PCMAV Express for Ramnit (Ramnit Killer) kini telah dilakukan,...

PCMAV 5.3 + Update Build 2, Clamav 0.97.1, Link Protector Update 7, PCMAV Juli 2011 - PCMAV Agustus 2011

PCMAV 5.3 kembali hadir bersama diterbitkannya majalah PC Media edisi 07/2011 bulan Juli 2011. Datang dengan serangkain perbaikan dan penyempurnaan dari versi sebelumnya, serta dengan penambahan pengenalan 119 virus baru, PCMAV 5.3 kini mampu mengenali 4.350 virus beserta variantnya yang dilaporkan banyak menyebar di Indonesia. Pengintegrasian removal engine khusus untuk pembersihan virus Ramnit yang sebelumnya telah digunakan pada PCMAV Express for Ramnit (Ramnit Killer) kini telah dilakukan,...

PCMAV 5.3 + Update Build 2, Clamav 0.97.1, Link Protector Update 7, PCMAV Juli 2011 - PCMAV Agustus 2011

PCMAV 5.3 kembali hadir bersama diterbitkannya majalah PC Media edisi 07/2011 bulan Juli 2011. Datang dengan serangkain perbaikan dan penyempurnaan dari versi sebelumnya, serta dengan penambahan pengenalan 119 virus baru, PCMAV 5.3 kini mampu mengenali 4.350 virus beserta variantnya yang dilaporkan banyak menyebar di Indonesia. Pengintegrasian removal engine khusus untuk pembersihan virus Ramnit yang sebelumnya telah digunakan pada PCMAV Express for Ramnit (Ramnit Killer) kini telah dilakukan,...

Learn Python The Hard Way, 2nd Edition

Welcome to the 2nd Edition of Learn Python the hard way. You can visit the companion site to the book at http://learnpythonthehardway.org/ where you can purchase digital downloads and paper versions of the book. The free HTML version of the book is available at http://learnpythonthehardway.org/book/. The Hard Way Is Easier Exercise 0: The Setup Exercise 1: A Good First Program Exercise 2: Comments And Pound Characters Exercise 3: Numbers And Math Exercise 4: Variables And Names Exercise 5: More...

Tuesday, July 19, 2011

EC-Council Certified Ethical Hacker v7 - FILELIST | 15,51 Gb

EC-Council Certified Ethical Hacker v7 - FILELIST | 15,51 Gb EC-Council releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and security researchers. CEH v7 is a revolutionary training program that combines class metrics, advance lab environment, cutting edge hacking techniques and excellent presentation materials. EC-Council has spent several years in developing this version. The Certified Ethical Hacker courseware has...

Friday, July 15, 2011

DNS Attack Downs Internet in Parts of China

An attack on the servers of a domain registrar in China caused an online video application to cripple Internet access in parts of the country late on Wednesday. Internet access was affected in five northern and coastal provinces after the DNS (domain name system) attack, which targeted just one company but caused unanswered information requests to flood China's telecommunications networks, China's IT ministry said in a statement on its Web site. The DNS is what computers use to find each other on the Internet. The incident revealed holes in China's DNS that are "very strange" for such...

European Banks Seeing New Wave Of ATM Skimming

ATM hacking and skimming were often in the news a few years back, but since the banks ramped up the security on ATM machines – including anti-skimming devices – ATM fraud activities seemed to drop off. Remember the Pro ATM Hacker ‘Chao’ Gives Out ATM Hacking Tips and a bunch of people getting busted not long after that. Well it seems ATM skimming has resurfaced with the clever criminals finally gaining the ability to remove the anti-skimming devices and modify them to their own nefarious ends. The advantage of ATM skimming rather than just plain old hacking the data online is that with...

The Social-Engineer Toolkit (SET) – Computer Based Social Engineering Tools

The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the http://www.social-engineer.org launch and has quickly became a standard tool in a penetration testers arsenal. SET was written by David Kennedy (ReL1K) and with a lot of help from the community it has incorporated attacks never before seen in an exploitation toolset. The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test. SET is a menu driven...

Malware Analyser v3.0 – A Static & Dynamic Malware Analysis Tool

Malware Analyser is freeware tool to perform static and dynamic analysis on malware executables, it can be used to identify potential traces of anti-debug, keyboard hooks, system hooks and DEP setting change calls in the malware. This is a stepping release since for the first time the Dynamic Analysis has been included for file creations (will be improved for other network/registry indicators sooner) along with process dumping feature. Features String based analysis for registry, API calls, IRC Commands, DLL’s called and VM Aware. Display detailed headers of PE with all its section details,...

Ophcrack 3.3.1 & LiveCD – Free Rainbow Table Password Cracking Tool

Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms. It works based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman’s original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds. We mentioned it in our RainbowCrack and Rainbow Tables article, definitely one of the best free options for Rainbow Cracking. Features Runs on Windows, Linux/Unix,...

Wophcrack – Web Based Interface For Ophcrack Password Cracking Tool

I’m assuming everyone reading already knows about Ophcrack – the awesome time/memory trade-off password cracker. Well here is a nifty web-based interface for it. Rainbow Tables are really useful when cracking password hashes, but one major disadvantage of these tables is their size which can be hundreds of gigs for complex tables. The author thought it would be extremely useful to have a personal web interface for your rainbow tables which you can access from anywhere on the web anywhere without...

Mac security firm ships first-ever iPhone malware scanner

A French security company known for its Mac OS X antivirus software today released the first malware-scanning app for the iPhone and iPad and iPod Touch. Intego's VirusBarrier for iOS has been approved by Apple, and debuted on the App Store Tuesday for $2.99. Because iOS prevents the program from accessing the file system or conducting automatic or scheduled scans -- as do virtually all Mac and Windows antivirus software -- VirusBarrier must be manually engaged, and then scans only file attachments and files on remote servers, said Peter James, a spokesman for Intego. "Because of the...

ksymhunter – Routines For Hunting Down Kernel Symbols

Routines for hunting down kernel symbols from from kallsyms, System.map, vmlinux, vmlinuz, and remote symbol servers. Examples: $ ./ksymhunter prepare_kernel_cred [+] trying to resolve prepare_kernel_cred... [+] resolved prepare_kernel_cred using /boot/System.map-2.6.38-gentoo [+] resolved prepare_kernel_cred to 0xffffffff81061060And.. $ ./ksymhunter commit_creds [+] trying to resolve commit_creds... [+] resolved commit_creds using /boot/System.map-2.6.38-gentoo [+] resolved commit_creds to 0xffffffff81060dc0You can download ksymhunter v1.0 here: ksymhunter.tar...

Metasploitable – Test Your Metasploit Against A Vulnerable Host

Ok so you’ve got Metasploit loaded up, you’ve read the Metasploit Tutorials & Watched the Videos – but you’ve still got no idea what to do next and don’t have anything to test against. It’s not exactly new, but I guess a lot of people still don’t know about it. Basically if you don’t know what to do next, this is where Metasploitable comes in! One of the questions that the Metasploit developers often hear is “What systems can I use to test against?” Based on this, they thought it would be a good idea throw together an exploitable VM that you can use for testing purposes. Metasploitable...

RSA finally comes clean: SecurID is compromised

RSA Security will replace virtually every one of the 40 million SecurID tokens currently in use as a result of the hacking attack the company disclosed back in March. The EMC subsidiary issued a letter to customers acknowledging that SecurID failed to protect defense contractor Lockheed Martin, which last month reported a hack attempt. SecurID tokens are used in two-factor authentication systems. Each user account is linked to a token, and each token generates a pseudo-random number that...

Inguma Is Back – The Penetration Testing & Vulnerability Research Toolkit

Inguma is back and being actively developed again. It’s been quite a long time, far too long in fact. We first reported about Inguma way back in 2007 and our latest mention of it was in March 2008. A new version has just been released almost 3 years later with some major changes and a big GUI revamp. Inguma is a penetration testing toolkit entirely written in python. The framework includes modules to discover hosts, gather information about, fuzz targets, brute force user names and passwords and, of course, exploits. While the current exploitation capabilities in Inguma may be limited, this...

sqlmap 0.9 Released – Automatic Blind SQL Injection Tool

It’s been a while since we’ve written about sqlmap, the last time was when 0.7 was released back in July 2009 – sqlmap 0.7 Released – Automatic SQL Injection Tool. Well sqlmap 0.9 has been released and has a considerable amount of changes including an almost entirely re-written SQL Injection detection engine. For those that aren’t familiar with the tool, sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate...

Page 1 of 7412345Next