Monday, November 29, 2010

How To Hack Facebook Password Account with Phishing Attack & Fake Page: WARNING New Facebook Phishing Attack

How To Hack Facebook Password Account with Phishing Attack & Fake Page: WARNING New Facebook Phishing Attack by Chintan Gurjar

Readers, beware of a new phishing & fake page attack to hack facebook accounts. Have a look at http://www.faaceb0ok.com/, at first glance it looks like a normal facebook page. But just have a look again, its FACEB0OK not FACEBOOK. The first O is "0" (zero).

If you open the fake page it will show you the below warning message.

Below is the page look like real facebook page

For testing purpose, I simply click on login without giving any username & password. The page redirected to lifehacking.


UPDATE

The Facebook Address Of The Guy Who Has Created / Spreaded This Link :- http://www.facebook.com/profile.php?id=100000885256887

The Page Address Of The Facebook On Which's Wall This Post Has Been Made :- http://www.facebook.com/Club.Hackers.Offiiciel?v=wall


Domain Information :- From www.who.is (Updated 6 Seconds Ago from today's Date)

Registrar: ENOM, INC.
Whois Server: whois.enom.com
Referral URL: http://www.enom.com
Status: clientTransferProhibited

Expiration Date: 2011-11-29
Creation Date: 2010-11-29
Last Update Date: 2010-11-29


Name Servers:
dns1.name-services.com
dns2.name-services.com
dns3.name-services.com
dns4.name-services.com
dns5.name-services.com

Updated: 6 seconds ago
Registration Service Provided By: Namecheap.com
Contact: @namecheap.com
Visit: http://namecheap.com

Domain name: faaceb0ok.com

Registrant Contact:
WhoisGuard
WhoisGuard Protected ()

Fax:
8939 S. Sepulveda Blvd. #110 - 732
Westchester, CA 90045
US

Administrative Contact:
WhoisGuard
WhoisGuard Protected (@whoisguard.com)
+1.6613102107
Fax: +1.6613102107
8939 S. Sepulveda Blvd. #110 - 732
Westchester, CA 90045
US

Technical Contact:
WhoisGuard
WhoisGuard Protected (@whoisguard.com)
+1.6613102107
Fax: +1.6613102107
8939 S. Sepulveda Blvd. #110 - 732
Westchester, CA 90045
US

Status: Locked

Name Servers:
dns1.name-services.com
dns2.name-services.com
dns3.name-services.com
dns4.name-services.com
dns5.name-services.com

Creation date: 29 Nov 2010 21:00:00
Expiration date: 29 Nov 2011 16:00:00

Information Updated: Tue, 30 Nov 2010 06:34:20 UTC

How To Hack Facebook Password Account with Phishing Attack & Fake Page: WARNING New Facebook Phishing Attack

---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

The Indian Hacking Scene: Unofficial Memoirs of the Desi h4x0rs Published by Phrack


The Indian Hacking Scene: Unofficial Memoirs of the Desi h4x0rs Published by Phrack

SOURCE: PHRACK

To know more about PHRACK you can visit its official site http://www.phrack.org/. For more details you can check wikipedia @ http://en.wikipedia.org/wiki/Phrack

Phrack is an ezine written by and for hackers first published November 17, 1985. Described by Fyodor as "the best, and by far the longest running hacker zine, the magazine is open for contributions by anyone who desires to publish remarkable works or express original ideas on the topics of interest. It has a wide circulation which includes both hackers and computer security professionals.

Phrack "has had its finger on the pulse of hacker culture and is considered both a handbook and a manifesto for hackers

During its first 10 years of publication, Phrack has been largely associated with the telecommunications fraud, providing material for phreakers and informing about arrests in this community through the Phrack World News feature articles.

Now the issue : #67 | Release date : 17/11/2010 | Editor : The Phrack Staff has been fully dedicated to The Indian Hacking Scene: Unofficial Memoirs of the Desi h4x0rs
1. Preamble
2. Introduction
3. Hacker Groups
4. Hacker Cons
5. Memoirs of the underground
6. Future


--[ 1 - Preamble


Jai Jawan Jai Kissan
(no it has nothing to do with the song Jai Ho :-P, just felt like writing something in Hindi). This article is a composition of interviews with/text directly taken from the hackers in the Indian underground (and the above-ground :-P). If it offends the reader in anyway.........feel free to
complain to your mom about it:-P.

--[ 2 - Introduction

Before I start I must admit that we have been really really late in the hacking scene as a whole. Some say it has to do with the cultural ethos and the prevalent business culture in India, while some propose that Indians culturally have been known as non aggressive & peace loving (Doh! Yeah right..Like the F#@$ing stereotypical dumb Indian characters in hollywood movies) and focus has been on ethical hacking and creation of software to benefit world at large rather than cause destruction. The activities of hacker groups started to emerge with the beginning of year 2K.

--[ 3 - Hacker Groups

There have been many hacker groups in India since 2k. Some are noted for their notorious behavior.

1. Indian Snakes. Indian snakes was a closed underground community of hackers who were on the top of the scene in the early 2000s. They are also noted for the YAHA worm that they had written.

2. hacking-truths.net (2005-2008) stopped because of personal problems. Restarted in 2010. Activities malware dev/hacking.

3. h4cky0u. It started around 2003 Website: h4cky0u.org. The activities included defacing, exploit dev, botnets etc. It died in 2006 due to some personal differences between the staff. It was reopened as h4ck-y0u, sadly h4ck-y0u also stopped after one year of its existence due to cyber crime activities, financial issues. H4cky0u was started again by an American who went by the handle "Big Boss" and we haven't heard much about it after that.

4. n|u (null security community). It started in 2008 and has spread to 6 cities in India namely Bangalore, Pune, Delhi, Mumbai, Hyderabad and Bhopal. Their activities include vulnerability research, exploit dev, projects, disclosures, nullcon hacker conference. It is more of an OWASP style community sans the limitation of only web app security research. It is also registered with the Govt. Of India as a non-profit organization.

5. Andhra hackers. Started in late 2000s. It is a forum like portal. Activities include sharing security information.

6. ICW (Indian Cyber warriors) is an off-shoot of Andhrahackers and started around 2008. This is a hactivist group with activities including defacing Pakistani websites.

7. Securitytube.net. It is not a group per se. It is a portal that has lots of security videos, question/answer section much like stackoverflow. It was started somewhere around 2008 or 2009.

8. Indishell. It started in 2009. The main guys behind indishell are Lucky, mr. 52, jackh4xor, silentp0sion. It is again a hacktivist group and majorly into defacing pakistani websites. It was recently stopped due to some unknown issues and has re-emerged at the time of writing this article. Activities include defacing websites.

9. ICA (Indian Cyber army) is an off-shoot of Indishell with mostly the same staff as Indishell. It is also a defacer group. Noted for defacing sites including Pakistani ISP national telecommunication corporation pakistan

(Defaced page http://www.ntc.net.pk/news.html)

10. Fake ICA. There is yet another ICA (cyberarmy.in) which is announced as fake ICA by the actual ICA group. One glance at the website content tells you that there is some truth to what the actual ICA(indishell) guys and other say and reminds you of the infamous plagiarism cases (Ah! Any Indian h4x0r's favourite topic when they feel like bitching
about something :-P)


This so called FAKE ICA ( FAKE INDIAN CYBER ARMY - Cyberarmy.in) not only misguiding the aspiring hackers & the same group particularly Mohit Kumar Vashisht linked with Inj3ct0rs, and Inj3ct0rs are known to be hacktivist as mentioned on their own official website. As in the recent past Inj3ct0rs, were troubling to hide the name of Pakistani Inj3ct0rs, (All the proofs with evidences are with author). Thehackernews is nothing but a core example of hacktivism as same Mohit Kumar Vashisht who used to disguise like a women, but when got exposed he was compelled to reveal his identity.

Due to his misdeeds and bad conduct, he has been evicted from hacker5 & unite hacker project.

This Thehackernews group is not only promoting hacktivist Inj3ct0rs & Pakistani Hackers those who are harming Indian websites but also remains in the bad books of very popular underworld magazine PHRACK. This man is not only promoting wrong deeds of hackers but also promoting hactivism.


When we had word with some of the intelligence agencies, they suggested the author to file RTI under which it become necessary for the government to digg the information and make it public.

As per the official website of Inj3ct0r http://1337db.com/team Inj3ct0r (founder r0073r) is a group of hacktivists.

Read the sensational revolution about Inj3ct0rs with their real photographs, identification and personal information in Cyber Terror book under chapter hactivism.

To read the real meaning of Hacktivism keep your eye on cat techie blog.

--[ 4 - Hacker Cons

1. ClubHack. http://clubhack.com The first in the series of hacker cons. It is held in Pune, one of the software hubs in India. It started in 2007 and is running it's 4th edition this dec (2010).

2. nullcon. http://nullcon.net The first community driven hacking conference, organized and managed by null community members. It started this year and the next edition is in Feb 2011. It is held in Goa. The party hub of India.

3. Cocon. http://www.informationsecurityday.com/c0c0n/ 1st edition held in Aug 2010. earlier held as part of information security day. It is held in Cochin.

4. Owasp + Securitybyte Appsec Asia http://securitybyte.org. More of a corporate conference with the suited people around :-).

--[ 5 - Memoirs of the underground - By dot


=[ Past.. that's where all the nostalgia and fun lies :)


So it all started sometime during late 2001 when a new variant of Yet Another "Hello World" Application spread rapidly via mostly social engineering mails and Outlook Express invalid MIME type exploit (similar to Klez.?). AV technology was not really matured back then, Kaspersky was not there with its PDM modules or its emulation heuristics, Symantec did not conceived SONAR or its Reputation Technology, it was practically open season for anybody with some programming skills to write and spread a successful worm. But amazingly a very nice and simple HTTP ping module was built into the program which used infected systems to ping (simple GET /) certain government website across the border towards the friendly neighbourhood creating a DDoS condition. News !!! News !! News !!! Cyber War between two countries.. Beware! iNDian sNakes are here !!! Hackers hacking each other's websites. Unicode double escape? Front Page is cool, lg7 (but where is the pass? :P)? dtspcd? little they knew, early stage script kids playing with public tools and little common sense without basic
computer science background.

I don't speak for the unknown elites before me who might be able to represent the scene in a much better way than me leaving me to a 1337-wannabe state.. I don't even speak for the Indian Snakes guy(s) who taught me quite a lot during my early days but I think we started quite late. Aleph1 had already written about how to smash the stack, Solar Designer had already found and exploited a heap overflow bug, Format String exploitation technique was also known among multiple circles, the world was filled with 7350*.c.. But fortunately Security Industry was not there yet or at least not so prevalent in this part of the world. We are lucky to be driven by the curiosity hormones to explore the black arts of hacking which ofcourse later turned out to be obvious computer science with a bit of innovation and passion to solve difficult problems. I remember playing with some MSN Trojan to steal passwords, I remember installing Barok in various Cyber Cafes, I remember installing Red Hat 6.2 and feeling elite after I could connect to my dial-up internet and browse the web, infact I remember doing almost everything for being a perfect script kid. I also remember finding myself neglecting everything in life and reading Phrack during all those sleepless nights.. Smashing the stack, Voodoo Malloc Tricks, Once
upon a Free.. Then after sometime actually solving PTP/0xbadc0ded exploitation challenges and hanging around with those awesome and nice people in their IRC.. but that was kind of late, a bit surpassed the prime time for ideal initiation.

So getting back to the history part, here is how it goes: If you write a worm and leave an e-mail address in messages it drops, you are bound to get a lot of fan/hate mails. It is actually a good methodology to build a community of rebels (??) or oh well people who liked Fight Club :) I think
the creators of Yaha did not initially expected to build a community, their entire purpose was to retaliate to web defacer groups like G-Force, AIC etc. but they actually ended up building a small and highly closed/private community and am happy to have known few of them. Although we had some Israeli friends (hi root, hi dak :)) the privateness of the group actually created a problem, we were starved ! Defacing seemed boring, writing exploits for public vulnerabilities were fun but quite challenging at that time, their weapons were old and obsolete. So we decided to look around and the obvious result was #darknet :)) Haha.. dvdman, nolife and the massive
list of ops there. Immediate learning from #darknet was to idle in #phrack as well for possible 0day drops :P.. Next learning was to read ~el8 and be an anti-establishment, anti-security-industry h4x0r !! Armed with newly made l33t friends and their dropped exploits (yo! we had 0days..) it was time to restart the so called cyber war in retaliation to multiple groups spreading anti-India propaganda via defaced websites.. thus born "Indian Hackers Club" :) Along with a new group name, an IRC server was created on a box with 128kbps or so ADSL line at a friend's (hi rex) work place (truly BoFH) which later got shifted to a .il server. We began meeting like minded individuals and groups... came across with Cyber Yoddha, Hindustan Hackers Organization (IIT had massive resources for hacking huh? :P), Emperor (baap
of all h4x0rs? :)), Nirvana (our own govboi :D) and slowly our IRC idlers list grew. Just like any other similar IRC, we began exercising power, control and ego... Ops were considered to be l33t, +v dudes were considered decent and the rest were considered to be wannabe creatures for the
operator's show off needs.

Then came the day of IIS WebDAV vulnerability: Kralor probably wrote the first public exploit which we took, modified it to support different shellcodes, tested it extensively and developed an internal kiddie friendly version and so began a moderate scale defacing of friendly neighbourhood websites and confrontation with FBH (Federal Bureau of Hackers later turned
Federal Black Hats (too much PHC influence?)). Netcraft was used to find suitable targets then instant connect back shells and tftp in the backdoor and defacement page :) Later I learned FBH guys also used the similar vulnerability to deface Indian websites during that time however they
either wrote or managed to obtain a mass rooter version of it. Unfortunately (perceptions change with age though) we didn't really have a lot of CVV2s back then else we could have also used techniques like: buy a shared web space on target box and use kernel exploits (ptrace_kmod fun!) to root and deface for l33t show off. But yes, we would like to laughingly say we pwned r4t's brand new shell server before the h0no guys using trojaned exploits.. err oh well, we pwned a lot of funny people with trojaned/fake exploits. I remember once dec0der @ #ukr (or something i
forgot) told me that I change boxes like he change underwares considering I was logging in from brand new boxes every other day.

Later on many of us made friends with people at #darknet, #m00, #c/c++ and even some old timers from #phrack. One of the funny moments happened when I was working for an .eu company along with another guy hired by them and after working for a few days I found that guy is dvorak.. and we had a nice laugh.

So all in all, during my time, the underground here in India was very small and pretty much a closed group. Although we saw a couple of guys popping up with security forums or websites once in a while we never really interacted too much. We made a lot of friends world wide but the state of underground here during those days was no way significant compared to .eu or .us.

=[ The evolution.. Towards sanity

The Last Stage of Delirium (LSD-PL) changed many of us! The 5th Argus Hacking challenge, the Solaris LDT bug (reminds me of http://git.kernel.org /?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=dc63b52673d71f9d 49b9d72d263a9f32df18c3ee) exploitation writeup, Win32/Unix Assembly Component Development, JVM Vulnerabilities etc were awesome and inspiring (yea I remember GOBBLES too :)) We decided its time to grow up and learn something real. Enough of (0xc0000000 - blah blah) type local stack overflows, enough of exploitation challenges (PTP was good.. ok!) and thus we created a so called Research Team with a website and a bunch of exploits written for public vulnerabilities. Proving lighthttpd header folding bug
to be exploitable was an interesting achievement (Securityfocus initially ranked it as DoS only). Learning about exploitation techniques for NULL pointer dereference kernel bugs from an .eu friend and realizing the obvious sometime before the first public exploit posted on DailyDave list
was also something to remember. Goin a bit back in the history, one of us worked on a hobby OS project (based on Bach's Design of Unix OS) which actually made rest of us (at least me) learn a lot and spend a lot of time on websites like osdever.net etc to learn something real, learning to debug an OS kernel was something which helped me solve a lot of problems in later days. Finally reached a state where the Intel Manuals seemed to be useful.

Starting from 2005 onwards or so, Security Companies started getting prevalent here, through various contacts an IPS startup contacted many of us for job offers. It was my early college days back then so I could not consider but others went ahead and that was probably the first time many of us learned to go ahead with bigger and better things in life like having a full time security job or in other words hack even when it doesn't makes you happy, although yes much later we learned hacking at workplace on a daily basis is an opportunity which is not easily achievable not just in India but throughout the world... oh I must also mention, by now we learned to use the word "hack" in a bit more "generic" and "abstract" sense :D

=[ Present.. The era of selling out..

Just like anywhere else, Security Industry is pretty much here now. A lot of security startups and moderately matured companies has been developed here working on consultant driven pentesting to security products development etc. Most of the old guys are either working either for some Security company or working as programmers in some software development
company. As far as I know, there is no significant underground here although there are people who are pretty much involved in interesting stuff but at a different scale in multinational groups. Web Application Security is so hot these days that I see most of the younger people are focusing
totally on Web Application security vulnerabilities without looking into lower level software security.

--[ 6 - Future

The recent shift in the mind set of some of the Govt. intel agencies towards opening up to the hacker community has brought about a lot of changes in the hacker scene in India. This collaboration is only going to increase the moral of the hacker community and thereby also helping the govt. in it's own way. As I mentioned we started a little late which is applicable for the Govt. as well, but as they say - better late than never. Things have started to pick up and we will see more of intel-hacker collaboration in the future which may prove to be good/bad for some, but yes the intent is to establised cyber warfare strategies and action plans,
which we will start to see in the next 5 years.

---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Hackers to Become Real Heroes: Cyber Terror Book to be Adapted into Movie

Hackers to Become Real Heroes: Cyber Terror Book to be Adapted into Movie


Hackers to Become Real Heroes: Cyber Terror Book to be Adapted into Movie

With the growing popularity of the initiative taken by the Newsmakers Broadcasting & Communication Pvt. Ltd. to unite the hackers and bestow a positive light in the world of hacking, people from all over the world have started recognizing the significance. A Jewish Director named Timmi Aboodi, 25, has shown immense pleasure in converting the book ‘Cyber Terrors’ written by Vaidehi into a full-fledged movie Titled ‘Hackers - the Modern Day’s Robinhood’. Timmi Aboodi a documentary maker making his first directorial debut with this film. The author already has given Timmi the rights to go ahead with his directorial venture. The movie will have many of real hackers acting for reel screen. Besides this, several youths aged18 to 22 belonging to the theater background will be playing the supporting roles.

The highlight of the movie is that both the director and the actors will be making their debut with this venture. The movie will be commercial venture same on the likes of mainstream Indian cinema. Even though Timmi has only made art films till date, he will now fulfill his directorial dreams by making fiction movie. Greek musician Sanoria will be composing the music for this film. The film will be produced under the banner of Veronica motion pictures and NBC pvt lts.

When AV spoke to Timmi about his directorial debut, he sounded very optimistic about the movie and said “It’s too early to say anything about this project. I am sure that youths will like this film.” By edn of this month we may physically enter into the venture.”

The movie will be a first of its kind which is all about unexplored subject ‘Hacking’. Indian audience is unaware about Hacking and hence this movie will introduce them about Hackers and their world. However, youths will enjoy this film as some of them are already techno savvy. Hacking may be considered as a cyber crime but if used effectively can solve many problems like securing one’s important information on the cyberspace, safeguarding it. Hackers possess exceptional brains and can also safeguard important websites of a country from potential cyber terror attack. Few years back hacking was considered as a cheap crime committed by techno savvy youths who indulged in such activities to become popular in the cyber space. Not anymore, the term hacking has undergone a metamorphosis and nowadays even top-notch software companies are hiring hackers to keep an eye on their competitors. Some of them even also extract vital information about the rival companies.


Newsmakers will launch a book named Cyber Terrors on 30th October at Police Gymkhana, Marine Lines, Mumbai. The book is written by Vaidehi Sachin, Editor-in-Chief of Newsmakers Publications and co-researched by Amarjit Singh and speaks about hacker culture.

In the book, Vaidehi describes about the people, the machines, and the events that defined the Hacker Culture and the Hacker Ethic, from the early mainframe hackers at MIT, to the self-made hardware hackers and game hackers. Immediately following is a brief overview of the issues and ideas that are brought forward by her book, as well as a more detailed interpretation of each chapter of the book, mentioning some of the principal characters and events. The hacker ethic deals with the idea that individuals are performing a duty for the common good, an analogy to a modern day 'Robin Hood'.

The hacker communities as a result are prided on the fact that they are the rebellion against authority figures that restrict this level of computer freedom. Hackers are only judged by their ability as opposed to the various systems in place that currently dictate authority, such as schools and universities. Mostly the hacker ethic idealizes the notion of hacking being an art-form, something revered as opposed to disputed and frowned upon. Popularized by 'phreakers' in the 1970s and 80s, this is something that is not only evident, but also widespread among the growing community.

In the field of computing, it is something that reflects not only on this community, but also about the wider social, political and financial world. In a sense, hacking is something that should affect everyone, but it is whether or not the interpretation that is given to hackers by Vaidehi compared with negative stereotypes of the media that dictate this perception. This book also expresses her pain and trauma handling hackers at all level. The book is evident script on Good Bad and Ugly hacker’s behavioural disorders. This book is combination of fictions and practical life style of hackers.

---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Movie on Hackers by Newsmakers Broadcasting & Communication Pvt. Ltd | The Auditions are on in Mumbai

Movie on Hackers by Newsmakers Broadcasting & Communication Pvt. Ltd | The Auditions are on in Mumbai


---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Forget the Forgotten Inj3ct0r'S, Wait for CATZ Arrival version 2.0...Updated | Added Leo King This Time

Forget the Forgotten Inj3ct0r'S, Wait for CATZ Arrival version 2.0...Updated | Added Leo King This Time


---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Cain & Able Windows Password Cracking Video Tutorial

Cain & Able Windows Password Cracking Video Tutorial By Chintan & Anant



Cain & Able Windows Password Cracking Video Tutorial By Chintan & Anant

---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Cat Techie First Seminar on Ethical Hacking | Hacker5 Team Rocks the Entire College

Cat Techie First Seminar on Ethical Hacking Successfully held at Mukesh Patel School of Technology Management & Engineering | Hacker5 Team Rocks the Entire College


Cat Techie First Seminar on Ethical Hacking Successfully held at Mukesh Patel School of Technology Management & Engineering | Hacker5 Team Rocks the Entire College

---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Friday, November 26, 2010

LUCKY(c0debreaker) to Lead Unite Hackers Project

LUCKY(c0debreaker) to Lead Unite Hackers Project

We are happy to announce that our core project ‘Unite Hacker’s’ would be solely lead by LUCKY(c0debreaker). He is the, Incharge of this prestigious venture. For further queries you can contact Lucky at heartsnacherz@yahoo.com

And for official inquires mail us at - cattechie@gmail.com

Lucky is heartthrob of Indian aspiring hackers, and one of the key holders of Indishell. He is known as patriotic hacker and presently training students learning ethical hacking.


---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Download Book Cyber Terror By Vaidehi Sachin & Amarjit Singh PDF Format

Download Book Cyber Terror By Vaidehi Sachin & Amarjit Singh PDF Format

India's First Book on Cyber Terrorism



---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Download Hacker5 Magazine First Edition Free PDF Here

Download Hacker5 Magazine First Edition Free PDF Here

Hacker5 is India's First Hackers Magazine



---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Dedicated to The Heroes of Indian Cyber Army on 26/11 Mumbai Terror Attack: Presented by NBC & C@7 T3chi3

Dedicated to The Heroes of Indian Cyber Army on 26/11 Mumbai Terror Attack: Presented by NBC & C@7 T3chi3


---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Thursday, November 25, 2010

L0rd Crusad3r Inj3ct0r Audio Interview is Out With Amarjit Singh: Exclusively Available on Freehacking Only

L0rd Crusad3r Inj3ct0r Audio Interview is Out With Amarjit Singh: Exclusively Available on Freehacking Only

This audio interview and chat has been published on the request of L0rd Crusad3r from Inj3ct0r






---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Forget the Forgotten Inj3ct0r'S, Wait for CATZ Arrival

Forget the Forgotten Inj3ct0r'S, Wait for CATZ Arrival



About Me

Basic Info
Sex:Female

Relationship Status:It's Complicated

Looking For:Networking

Political Views:its between politicians and me
Religious Views:oops..!!

BioCat from Cyber world, chasing R@Ts of Hacking..#
workoholic,i am on work desk24/7. rest at desk if time permits and body protests, love to enjoy weekends at pub,love to dance on soothign music, hate laud and meanless numbers, my favourste time pass palying Volleyball and Defeating boys around me. Rest of the time i am shooting for documentaries and very little time i spend for learning hacking..

Favorite QuotationsHack me if U c@n..!!
so far no man is born to hack cat....

Education and Work

---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Milw0rm: The Hidden Underground Truths Revealed

FOR FULL STORY CLICK HERE

JF who is CEO of this group, holds big team of black hat hackers, the other key holder injectors are form India and Pakistan. Milworms all published exploits were posted on injector, one of the amature injector, who is young and sill studying, has taken undue advantage of the situations that who the Injector came in existance, R00ter a pakistan based injector is one of the most brillient and strongest admin of this group,Microsoft is the biggest sponsor and one of the financial supports for this group….

Read more details in my book ‘Cyber Terror"

As a journalist it's my right to discover and publish ...I know all the Hacker and injectors are pro..And the biggest irony is that they have their own private exploits what they have never published anywhere, just core impact (an exploiting software) has that exploits. Injector guys can be defined as pure cyber criminals.. Some of them are former member of PHC.. Pakistan hackers club, now this group have dissolved and is no more .and some of them are the members of ICW which is vanished recentely.. most of members are working in very good companies and different sectors and having good family life. These hackers have tremendous unity when it comes for wrong things, I am sure they will find their own ways to sabotage me and my interest. What I am doing is my profession, what they are doing is their passion.. I respect them from the bottom of my heart and do not expect the same.

FOR FULL STORY CLICK HERE

---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Download Book for Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code

Download Book for Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code

Michael Erbschloe, «Trojans, Worms, and Spyware, First Edition : A Computer Security Professional's Guide to Malicious Code»

Butterworth-Heinemann | ISBN: 0750678488 | 2004 | PDF | 232 pages | 1.31 MB

This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats new and advanced variants of Trojans, as well as spyware (both hardware and software) and bombs and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.

DOWNLOAD HERE

---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Norton Internet Security 2011 & Antivirus Download Free


Norton Internet Security 2011 & Antivirus Download Free

Norton Internet Security 2011 & Antivirus + Trial Reset 3.1.0 (Updated 25/11/2010) | 200MB

Norton Internet Security runs quietly in the background to detect and block today's complex threats and to protect your identity when you buy, bank, or browse online. The friendly and efficient product design helps minimize confusing security alerts and system slowdowns that can get in the way of your online experience. Norton Internet Security™ provides essential protection from viruses, hackers, spyware, spam and other privacy threats. A comprehensive set of security tools, Norton Internet Security helps keep you safe online as you surf and email, swap files, download programs, and chat. In addition to protecting against viruses and unwelcome intrusions from the Internet.

NIS also allows you to automatically block annoying banner ads and pop-up windows, set up parental site blocking options for restricting access to specific Web sites, and selectively determine which, if any, Java applets and ActiveX controls should be allowed to download and execute on your computer. Enjoy the Internet with award-winning protection!

Key Technologies:
• Anti Virus
• Anti Rootkit
• Bot Protection
• Norton™ Safe Web
• Smart Firewall
• NEW! SONAR™ 2 Behavioral Protection
• NEW! Norton System Insight
• NEW! Norton Insight Network AntiSpam
• NEW! Norton Download Insight
• NEW! Norton Threat Insight
• Spyware Protection
• Identity Protection
• Pulse Updates
• Network Monitoring
• Parental Controls
• Vulnerability Protection
• NEW! Professional Strength AntiSpam
• NEW! Norton File Insight

Key Benefits:
• NEW Delivers clear threat and performance explanations—Gives you greater insight into downloaded applications and files by telling you where they came from, if they can be trusted, and how they may impact your PC’s resources and performance.
• NEW Identifies unsafe web sites right in your search results—Warns you of dangerous web sites and suspicious sellers so you can surf and shop online with confidence.
• IMPROVED! Stops online identity theft, viruses, spyware, bots and more—Guards your PC, online activities, and your identity against all types of Internet threats.
• IMPROVED! Stops attacks before they get on your PC—Proactively blocks hackers and prevents dangerous software from downloading to your computer when you surf the web.
• Uses intelligence-driven Norton Insight Network for faster, fewer, shorter scans—Detects and eliminates dangerous software with the shortest scan times of any security product.

Norton Internet Security 2011 Features:

Intelligent Protection
• IMPROVED! Norton Protection System delivers multiple layers of security that work together to provide comprehensive Internet threat protection.
• NEW! Norton Safe Web identifies unsafe and dangerous web sites right in your search results.
• IMPROVED! Norton IdentitySafe offers one-click log-ins and automatic form filling to prevent key loggers from stealing your information as you type.
• NEW! Norton IdentitySafe On-the-Go lets you access your most up-to-date log-ins and passwords on any Norton Internet Security 2010 protected PC.
• Industry-leading anti-phishing technology authenticates safe sites and protects you from visiting unsafe and fraudulent web sites.
• NEW! Analyzes downloads, files and applications and tells you if they can be trusted before you install and use them.
• IMPROVED! Vulnerability Protection guards security holes in your operating system, applications, browsers and browser plug-ins.
• IMPROVED! Detects and gets rid of even the hardest to find Internet Explorerf and Firefox cookies.
• Smart Firewall stops hackers and makes intelligent security decisions for you.
• NEW! Parental Controls give you insight into your kids' online activities so you can teach them good Internet habits and help keep them safe.
• IMPROVED! Norton Bootable Recovery Tool repairs, restores and boots severely infected, unbootable PCs.
• NEW! Professional-strength antispam protection uses the same technology as many large businesses to effectively block unwanted emails.

Engineered for Speed
• IMPROVED!Proven fastest, lightest security suite for protection that won't slow you down, get in your way, or swallow up system resources. More info
• IMPROVED! Norton Insight scans only files at risk for fewer, shorter scans and the fastest scanning times in the industry. More info
• Won't slow you down when you download, copy, or edit files, or install applications. More info

Combats today's rapid-fire attacks
• NEW! Norton Insight Network uses Symantec's global security network to provide real-time protection from the latest-breaking threats.
• NEW! SONAR 2 (Symantec Online Network for Advanced Response) uses online intelligence and proactive monitoring to detect and stop new threats.
• Norton Pulse Updates provide rapid mini updates every 5 to 15 minutes for up-to-the-minute local protection against the latest threats.
• Prevents bots from taking control of your PC.
• Finds and removes rootkits.
• Prevents Internet worms from getting on your PC.
• Tells you which application processes currently running on your PC are safe and which are at risk.
• Norton Bootable Recovery Tool provides a deep level of cleaning for heavily infected PCs.

Provides info on threats, downloads and files
• NEW! Norton Download Insight warns you of dangerous downloads before you install and use them.
• NEW! Norton Threat Insight tells you if threats were detected, what actions the threats attempted to perform on your system, and how Norton Internet Security eliminated those threats.
• NEW! Norton File Insight tells you where files and applications came from, if they're trusted, and how they may be impacting your PC's speed.

Helps keep your PC running at top speed
• NEW! Norton System Insight helps you improve and maintain PC and application performance.
• NEW! Automatic and on-demand application optimization improves application performance.
• NEW! Norton System Insight gives you an overview of recent events on your PC such as installs, downloads, scans and detected threats, so you can see what events may have impacted your PC's performance.
• NEW! Norton System Insight resource usage graphs help you pinpoint what's causing your PC to slow down.
• NEW! Tells you how files and applications impact your PC's performance.

Protection without disruption
• Smart Scheduler conducts scans and other tasks only when your PC is idle.
• Automatically switches to Silent Mode (no alerts, updates or scans) when watching movies or playing games in full-screen mode.
• NEW! Automatically delays product updates and other tasks if you're watching TV or burning CDs/DVDs.
• NEW! Power Saver Settings help extend portable PC battery life by putting off power-intensive activities until your computer is plugged in.

Additional Features
• NEW! Monthly report tells you what Norton Internet Security has done in the past month to protect you and your PC.
• Free 24x7 support by phone, email, live chat or online knowledge base.**
• Automatically scans emails and IMs for infections.
• Maps and monitors your home wireless network so you can see everything connected to it — even unauthorized visitors like the PC next door.
• Automatically downloads protection updates and new product features as they become available during your service period.
• With the Norton Automated Renewal Service your yearly subscription can be automatically renewed for uninterrupted protection.

Download links:
http://hotfile.com/dl/84808436/d2be98c/Norton.part1.rar.html
http://hotfile.com/dl/84808014/4d793f7/Norton.part2.rar.html

---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Download VMware Workstation 7.1.3 Build 3242.85 with.key


VMware Workstation 7.1.3 Build 3242.85 with.Keygen | 587MB
Genre: SYSTEM Tools

VMware Workstation is powerful desktop virtualization software for software developers/testers and enterprise IT professionals that runs multiple operating systems simultaneously on a single PC. Users can run Windows, Linux, NetWare, or Solaris x86 in fully networked, portable virtual machines with no rebooting or hard drive partitioning required. VMware Workstation delivers excellent performance and advanced features such as memory optimization and the ability to manage multi-tier configurations and multiple snapshots. With millions of customers and dozens of major product awards over the last six years, VMware Workstation is a proven technology that improves productivity and flexibility. An indispensable tool for software developers and IT professionals worldwide.

Homepage: http://www.vmware.com

Download from [Hotfile]

http://hotfile.com/dl/84610368/b0527a5/VMW.7.1.3.Linux.x86.part1.rar.html
http://hotfile.com/dl/84610745/c685f97/VMW.7.1.3.Linux.x86.part2.rar.html
http://hotfile.com/dl/84611149/42c042a/VMW.7.1.3.Linux.x86.part3.rar.html
http://hotfile.com/dl/84611177/e3949c2/VMW.7.1.3.Linux.x86.part4.rar.html

Download from [Fileserve]

http://www.fileserve.com/file/5UZY2ym/VMW.7.1.3.Linux.x86.part1.rar
http://www.fileserve.com/file/HmUnFvn/VMW.7.1.3.Linux.x86.part2.rar
http://www.fileserve.com/file/cxuAHQ9/VMW.7.1.3.Linux.x86.part3.rar
http://www.fileserve.com/file/6SNYsAz/VMW.7.1.3.Linux.x86.part4.rar


---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Facebook "news feed" are actually malware


Facebook "news feed" are actually malware

Security company BitDefender has said today that 20 percent of posts that Facebook users see on their "news feed" are actually malware.

60 percent of those attacks come from third-party apps.

22 percent of the malware apps say they will help you see who has been viewing your profile, 15 percent offer "extras" for games you might have like FarmVille, 11 percent offer a "dislike" button (it doesn't exist) and another 7 percent offer links to games.

BitDefender collected its data through the SafeGo Facebook app, which scans user's accounts for malware. SafeGo was launched last month and has 14,000 users.

So far, the software has scanned 17 million posts.

Websense's security tool Defensio says that 1 in every 10 updates that have a link lead to malware.

---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Wednesday, November 24, 2010

Sextortion on Cyber Space: New Technique of Blackmail & Threatening Young People

Sextortion on Cyber Space: New Technique of Blackmail Threatening Young People

Who’s watching your child on her or his PC Webcam -- just friends? Don't be too sure.

Age-old crimes take on a new twist in the cyber-world of today. Not least of these is “sextortion,” where in a recent high-profile case, the FBI uncovered 200 victims in just one incident, many of whom were young or even underage.

As a term, sextortion has been around longer than most of us probably realize and way before the Web was around. An early use of the term was in a headline of a 1950 article, but no one can be in any doubt that sexual extortion itself has even older origins.

In the cyber-world of today, however, sextortion appears to have reached a whole new level. It is perpetrated through a form of social engineering, wherein enough information can be gathered about an individual to hold that victim to ransom.

Social networking makes compromising situations easily available to those searching. In the FBI case, the hacker used spear phishing techniques, an email spoofing fraud that targets a specific person, seeking unauthorized access to confidential data. This kind of spoof is accomplished by the hacker posing as a trusted source of the intended victim, such as a FaceBook Friend.

Once tricked into opening an attachment from the “trusted source,” a virus in the FBI case compromised the recipient’s computer, including its Webcam, microphone, and every keystroke. In examples of sextortion, the hacker, successfully reaching his target, is then able to spy on his victim through his or her own Webcam. In the case under discussion, the hacker was only discovered when he contacted one victim in an attempt to obtain an explicit video in exchange for not telling her parents. Luckily, the intended victim told her parents, who contacted their local FBI.

There are numerous viruses around that can take over Webcams. It is not new technology at all. Probably the best known virus of all is W32/R-bot-GR, which has hundreds of variants. Viruses such as this can actually turn on the Webcam remotely and the victim doesn’t even know she is being watched. Over the last 10 years cases have regularly popped up.

Perhaps one of the most worrying related cases was earlier this year in the Robbins v. Lower Merion School District case known as "WebcamGate." This is where spyware was installed on laptops issued by the school in what was a misguided attempt to oversee Web activities by students. Of course, this spyware could have been used by a hacker as well. Lower Merion District was accused of installing spyware on laptops used by its students, and recently settled with the school district by agreeing to pay $610,000 in compensation.

Around the same time was the case of a Wisconsin 12th grader sentenced to 15 years in prison after a high school sextortion scandal. The boy pretended to be a girl on FaceBook and used naked pictures fellow students sent him to blackmail the boys into having sex with him.

More recently, a mixture of sextortion and cyber-bullying led to tragic consequences. When a young student found that his roommate had allegedly plastered a live streamed video of him in a sexual encounter, he posted a message on Facebook and then deliberately plunged to his death off the George Washington Bridge.

So can we escape the clutches of the seemingly ever-present video recording of our every movement, be it Webcams, CCTV, or even that seemingly innocent little add-on gadget that may be the choice of someone close to you for Christmas this year? There are several of them around, they can easily move in any direction, come complete with a WiFi-enabled robotic Webcam, speaker, and microphone. They enable you -- or perhaps that friendly hacker and sextortionist just down the road -- to access your home from anywhere in the world.

Not wishing to put the damper on anyone who may have already picked this out for this Christmas, but perhaps a little additional PC security may be a good idea, to prevent the spear phishing in the first place. However, the obvious comes to mind in most of these cases: Do you know who your children are conversing with online? And, even more importantly, can they approach you if there is a problem?
SOURCE — Jart Armin, Editor of RBNexploit.com, a watch blog on the infamous RBN (Russian Business Network), and HostExploit.com

---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Search Engine Optimization Secrets Tips & Tricks: Download Free Ebook

SEO For 2010: Search Engine Optimization Secrets
lulu.com| 2009 | ISBN: 0557161339 | MOBI, PDF | 252 pages | 31 MB

A very well-designed web site is useless if no one can find it on the web. If your company is going to succeed on the web, optimizing your site for search engine visibility is a must. Especially since it is the telephone book of the now, not the future. This book is written by the two most noted and accomplished experts in the field of search engine optimization (SEO) and provides you with proven guidelines, cutting-edge techniques, tips, and the how-to's for planning and executing a comprehensive SEO strategy.This is the first book to cover the Bing search engine in-depth. It tackles how to submit your website to the search engines, basic to advanced optimization techniques, learn how to determinetrophy keywords, keyword density, little known tricks and methods pros use, learn how to increase your rankings, and learn from those who started the entire SEO industry.This is the only guide you need!

Download Depositifiles.com


Download Hotfile.com

---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Video Tutotial: Wordpress For Designers in 18 days

Wordpress For Designers in 18 days
Flash Video | English | 640 x 480 | 29.970 fps 666 kbps | AAC 96.5 kbps | 1.93 GB

If you want to get into the WordPress community, we’ve got a great way to start: the WordPress for Designers series, from the old Themeforest Blog. You’ll learn everything from installing the platform to slicing a PSD file and turning it into a complete theme.

The Complete Series:

Day 1: Installation
Day 2: The Admin Panel
Day 3: Creating a Theme from Scratch
Day 4: The WordPress Loop
Day 5: The Sidebar
Day 6: Single Pages
Day 7: Widgetize!
Day 8: Comments
Day 9: Tweaking the Comments
Day 10: Your First Plugin
Day 11: PSD Slicking
Day 12: PSD Slicing
Day 13: Theme Coding
Day 14: Home Page
Day 15: jQuery Slider
Day 16: Custom Fields
Day 17: jQuery Slider
Day 18: Creating an AJAX Contact Form

::::::::::::::::::::::::::::::: DOWNLOADS :::::::::::::::::::::::::::::::


Download from Hotfile:

http://hotfile.com/dl/84582242/efbcdef/WordPress_for_Designers.part01.rar.html
http://hotfile.com/dl/84582322/b6fe1e6/WordPress_for_Designers.part02.rar.html
http://hotfile.com/dl/84583255/ccac0cb/WordPress_for_Designers.part03.rar.html
http://hotfile.com/dl/84583433/43b00e4/WordPress_for_Designers.part04.rar.html
http://hotfile.com/dl/84583691/50914b8/WordPress_for_Designers.part05.rar.html
http://hotfile.com/dl/84583906/4e33d94/WordPress_for_Designers.part06.rar.html
http://hotfile.com/dl/84584274/3eb3f57/WordPress_for_Designers.part07.rar.html
http://hotfile.com/dl/84584342/5928791/WordPress_for_Designers.part08.rar.html
http://hotfile.com/dl/84585090/0e63dea/WordPress_for_Designers.part09.rar.html
http://hotfile.com/dl/84585179/9bcf54a/WordPress_for_Designers.part10.rar.html
http://hotfile.com/dl/84591530/8a1321c/WordPress_for_Designers.part11.rar.html
http://hotfile.com/dl/84593607/01a5b4b/WordPress_for_Designers.part12.rar.html
http://hotfile.com/dl/84585414/5fdbca0/WordPress_for_Designers.part13.rar.html
http://hotfile.com/dl/84593720/9379229/WordPress_for_Designers.part14.rar.html

fileserve
http://www.fileserve.com/file/qPQD4QW/WordPress_for_Designers.part01.rar
http://www.fileserve.com/file/SBMC6dF/WordPress_for_Designers.part02.rar
http://www.fileserve.com/file/KBnfrJD/WordPress_for_Designers.part03.rar
http://www.fileserve.com/file/9qsaT9a/WordPress_for_Designers.part04.rar
http://www.fileserve.com/file/eeu2a9B/WordPress_for_Designers.part05.rar
http://www.fileserve.com/file/e8uA2se/WordPress_for_Designers.part06.rar
http://www.fileserve.com/file/p7w6Wpy/WordPress_for_Designers.part07.rar
http://www.fileserve.com/file/bAnEeF8/WordPress_for_Designers.part08.rar
http://www.fileserve.com/file/yun3a8d/WordPress_for_Designers.part09.rar
http://www.fileserve.com/file/Cu5cSbg/WordPress_for_Designers.part10.rar
http://www.fileserve.com/file/4Xwrs74/WordPress_for_Designers.part11.rar
http://www.fileserve.com/file/B5M2F5P/WordPress_for_Designers.part12.rar
http://www.fileserve.com/file/cR6gx5Q/WordPress_for_Designers.part13.rar
http://www.fileserve.com/file/CmHby96/WordPress_for_Designers.part14.rar

filesonic
http://www.filesonic.com/file/35087371/WordPress_for_Designers.part01.rar
http://www.filesonic.com/file/35087185/WordPress_for_Designers.part02.rar
http://www.filesonic.com/file/35088509/WordPress_for_Designers.part03.rar
http://www.filesonic.com/file/35087189/WordPress_for_Designers.part04.rar
http://www.filesonic.com/file/35088505/WordPress_for_Designers.part05.rar
http://www.filesonic.com/file/35087199/WordPress_for_Designers.part06.rar
http://www.filesonic.com/file/35087205/WordPress_for_Designers.part07.rar
http://www.filesonic.com/file/35087219/WordPress_for_Designers.part08.rar
http://www.filesonic.com/file/35106795/WordPress_for_Designers.part09.rar
http://www.filesonic.com/file/35088111/WordPress_for_Designers.part10.rar
http://www.filesonic.com/file/35087187/WordPress_for_Designers.part11.rar
http://www.filesonic.com/file/35088507/WordPress_for_Designers.part12.rar
http://www.filesonic.com/file/35087181/WordPress_for_Designers.part13.rar
http://www.filesonic.com/file/35084621/WordPress_for_Designers.part14.rar
http://www.filesonic.com/file/35087055/WordPress_for_Designers.part14.rar

---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

THIS IS JUST A BEGINNING: Nothing beyond the welfare of hackers

This is very SAD to express here on the blog that both the writers (Cat & Myself) have contacted by several hackers & hacking groups yesterday. Every body was giving their own excuses to remove the post Where Are Hero Hackers?? Forgotten Hero Hackers By Cat Techie from this blog. They suggest us to post some good good about those hackers. We are in very confused mindset that how all of this sudden is happening as none of the hacker has gave us a genuine reason to remove the post except to say..."remove real names", "post only good good about hackers", "remove the post", " every hacker will go against you" and many more...blah blah.

The hilarious part here I would like to share is, one of well known hacker on cyber space who wanted to show how poor we are in investigation and we are foolish, he confessing his friends to convey that he is the one who provided all the information but finally he fallen into his own pit. The person who claimed high, finally has beg us to remove the post...BUT THIS IS JUST A BEGINNING. Only wait for next 2 days and will tell you why the post was published and what was the motto behind it.

I am sure the all our hacker friends will be overwhelming with the thought which we posses now. This information neither provided by any hacker nor by any sources. This is our pure research work. If any hacker is claiming that he has provided us that information, I am very sorry becoz that hacker has to face abusing from his own hackers community. But under any circumstances we are not going to remove the post becoz we have not written any thing wrong, incorrect or in genuine. The coded names which we have exposed, if you Google are available on internet easily every where.

Its CAT & Amar or Amar & CAT blog so on good relations and terms we can remove the post, what about other blogs picked the article and published it. There are several blogs picking articles from our blog and posting it. How can you maintain to remove from that blogs also.

I seriously feel sorry for impotency of hackers as they are claiming to hack so many of the things like servers and sites then why don't they claim to hack my blog and remove the post ?? It should be very easy for them as all are ACEKA hackers. I want tell every hacker that to deface a site is very very easy but to hack a blog is not a child's play.

We are not against any hacker but we want to request all my hackers friend, as cattie has already posted this on her blog, that give us valid reasons WHY CAT SHOULD NOT DO THIS OR WHY I SHOULD NOT DO IT so that we will drop the plan to bringging out the book CYBER TERROR if it is dead favor of hackers.

Nothing beyond the welfare of hackers. Every thing is only for the hackers and hacker community but they should approach us and convience us.
We have freedom of expression is we have not published anything on story telling base.

Who the Inject0r are, Why Inject0r closed, Where they gone. How Inject0r getting money...all this is big story telling. Keep visit and read sansational underground truth everyday. The Good, Bad & Ugly of Inject0r will be published soon here. Till then keep commenting & visiting.

---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

Tuesday, November 23, 2010

How to Hack Facebook Chat Application: Facebook Chat Trick

How to Hack Facebook Chat Application: Facebook Chat Trick

By Chintan Gurjar & Anant Shah


---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

How to Scan Open Ports: Port Scanning Video Tutorial

How to Scan Open Ports: Port Scanning Video Tutorial
By Chintan Gurjar & Anant Shah


---Do you want to share you views?? Just leave a comment here. you can also drop an email on amarjit@freehacking.net

FACEBOOK LIKE WEBSITE NOW IN MARATHI

CLICK ON THE PIC TO ENLARGE

Social networking sites are continuously gaining prominence in India and everyday thousands of people are becoming members of popular websites like Facebook, Orkut, Twitter, Hi5 etc. There have been many technological advancements taking place in our country and now with globalization, knowledge of English language has become a necessity. With this, many Indian languages like Mararthi has taken a back seat. Looking at this issue, Sachin vaze, former encounter specialist has developed a social networking site laibhaari in Marathi on the lines of Facebook for catering to needy Marathi speaking population.

Maharashtra is an industrial state and is hub for traders, exporters and other business participants. Though there are many scholars, highly skilled persons, well literate Marathi speaking population, just owing to lack of English knowledge many of them remain behind and fail to compete with the world. Hundreds of youngsters are addicted to social networking sites and since it has become a medium of communication for various reasons like trade and commerce, friendship and relations, discussion on various topics. Speaking to AV, Sachin Vaze, founder of website Laibhaari said, “To bring in more and more Marathi people together and provide them a platform for socially interaction, Laibhari has been brought into existence.” The website have many features like other popular social networking sites and also it allows people to share Marathi culture, literature, songs, photos, videos and etc. The trial run of this website was started on November 10, 2010 and it will be official launched today at Hotel Kohinoor (opp. Siddhivinayak Temple). In just a couple of days since its trial run, the number count of members has reached 14000. “Worldwide, people work towards developing their language. But in India alone, non-Hindi people have to work towards preserving their language as it is on the decline after invasion of Hindi language and culture. This initiative will surely help Marathi people to be informed and be socially sounded,” said Mahesh Kulkarni, a college student

---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net