Sunday, April 25, 2010

Most Popular Games : Grand Theft Auto San Andreas




Carl Johnson’s back on the set after five years in Liberty City, returning to his old haunts in San Andreas to mourn for his mother, dead after an act of senseless violence. An already unpleasant homecoming gets worse, though, as crooked cops set him up for the murder of a policeman, he discovers that his neighborhood is falling apart under an influx of drugs, and that his old gang is barely capable of holding their territory. Needless to say, the solution to all of these problems involves a whole lot of violence, as befits the latest and greatest entry in the extraordinarily popular GTA series of games.

Given that Rockstar created a massive game world in Grand Theft Auto: Vice City, with only a year’s worth of development time between that game and Grand Theft Auto III, it should come as no surprise that the world of GTA: San Andreas, with two years of development soaked into it, is one of the biggest worlds ever modeled in an action game. Instead of focus on a mere state, Rockstar has enlarged their focus, this time choosing to model an entire state, with three separate cities and a huge amount of countryside to explore. Everything is bigger and better in San Andreas, so get exploring!

In this guide, we’ll provide you with a rundown of the game’s weapons, a complete walk-through of the game’s many missions, locations for all of the hidden oysters, photo ops, graffiti tags, a listing of weapons, and the proverbial much, much more. Big thanks to the guys from gta-junkies.com for supplying the location maps for this guide.

Most Downloaded Software : AVG Anti-Virus Free Edition 9.0.730 : CNET Review






AVG Free provides the bare necessities when it comes to security, but that should be enough for savvy Windows users. You'll get a combined antivirus and antimalware engine, LinkScanner, and e-mail scanning. AVG Free 9 introduces a few new features, with improvements focused on performance, including claims of faster scan and boot times. One new feature is the Identity Theft Recovery Unit. Only for users in the United States, ITRU is a business partnership with Identity Guard which provides "consumer identity theft solutions," accessible only from the AVG toolbar in Firefox and Internet Explorer.

The interface is nearly unchanged from the last version, and generally it's easy to use. From the main window, though, you must double-click to get further information on any feature, whether virus scanning, LinkScanner settings, or updating. Streamlining this to one click would be helpful. A scheduling utility automates both scans and updates, while the upgrade ad at the screen's bottom can be easily hidden using the Hide Notification button. When starting a scan, a slider makes it easy to jump between Slow, Automatic, and Fast scans: the faster the scan, the less comprehensive it is, so users should take advantage of the scan optimization that is recommended during installation to speed up that first scan. A progress meter for regular scans would've been useful, though. Should a virus create serious problems, AVG creates a rescue disk to scan your computer in MS-DOS mode.

Thursday, April 22, 2010

One Step Ahead : Dual Touch Screen Laptop created by V12 Design




V12
Design, an Italian industrial design agency, developed a similar concept four years ago. Valerio Cometti, the founder and managing director of the firm, came up with a dual LCD laptop called the Canova.

The first-generation Canova had a dual-touchscreen form and Cometti told us, “it was developed for creative types, such as artists.” The first-generation model, of which we have a whole slew of images below, actually existed and was made of stainless steel and carbon fiber, but it didn’t run an operating system or software. It was envisioned to transform from a sketch pad, to a writing pad with an electronic pen, to a newspaper.

Cometti pitched the idea around to laptop manufacturers, who took interest. Which is where the Canova Generation 2 comes in. Cometti said that V12 Designs has been working on a second-gen version of the dual-screen laptop along with a U.S. manufacturer. He believes the laptop, if you can call it that, will be complete in as soon as 16 months and will come to the U.S. market. He could not reveal the name of the U.S.-based company with which V12 is co-developing and designing the system.

“We developed a brand-new style for the second generation. We did stretch the potential of the Canova noticeably, making it able to do things no notebook has been able to do so far,” Cometti told us over the phone. Unfortunately, he could not provide images of the new version.

He did tell us that it will be a portable personal computer that will support multi-touch input. As he designed in the first version, a software keyboard would appear on the screen. He recommends that the keyboard use haptic feedback since typing on this sort of keyboard is less comfortable than using a traditional one.

Cometti also stressed that a microphone would be built into the design because “voice recognition will become a more popular and widespread feature in these dual-screen notebooks.” The Canova 2 will also have the ability to transform into an e-book, letting users swipe a finger to turn the page.

Revo on Notebook : Acer TimelineX in Malaysia



Acer Malaysia has just released the new Aspire TimelineX, a slim notebook that features the latest Intel Core i5 processor.

The 14in Aspire TimelineX 4820TG-432G50 offers up to twelve hours of battery life (with the extended battery), Intel Core i5-430M 2.26GHz processor, 1,366 x 768-pixel LED backlit LCD screen, ATI Mobility Radeon HD5470, 2GB RAM, 500GB hard disk and Windows 7 Home Premium.

At just 1in thick, the TimelineX nevertheless offers eight hours of battery life with the slim six-cell battery, while the nine-cell battery will bring the notebook up to twelve hours.

TimelineX features a number of innovations through its PowerSmart Technology that works in combination with the power-saving features of the Core i5 processor.

For example, the hard disk is a new low-power version that goes into a deeper hibernation state when idle, while the LCD screen is LED backlit — both contribute to a power consumption 66% less than the standard required by Energy Star (the international standard for energy efficient products).

On top of that, when plugged in to a wall socket, the AC adapter automatically cuts off when the battery is fully charged, thus saving energy and increasing the useful lifespan of the battery by eliminating overcharging.

While the 14in Aspire TimelineX is the only model in the series presently, Acer is due to introduce a 13in and 15in model some time next month.

The TimelineX 4820TG has a recommended retail price of RM2,999.

iPhone 4G will be released




The new iPhone 4G was leaked by Gizmodo but was missing the iPhone 4.0 software because Apple had performed a remote wipe to prevent anyone from using it. We had no proof as to whether or not the photo gallery posted on Gizmodo was legit but now it’s been confirmed. Apple has sent Gizmodo a legal notice and asked for them to return the iPhone 4G prototype unit that they acquired from someone who stole it from an Apple employee for $5,000.

iPhone 4G Specs that were leaked:

* Front-facing camera – Used for Video Chat
* Back camera – They’re saying it’s improved
* Micro-SIM – , as opposed to the standard SIM in the current iPhone
* Improved display
* Power, mute, and volume buttons are metallic

iPhone OS 4.0 software will be released in June along with the iPhone 4G. I’m not really excited about the iPhone 4G hardware since it still looks like a brick. If iPhone on Verizon becomes a reality, I’m getting it.

Monday, March 1, 2010

FACEBOOK : starts with Mark Zuckerberg





Facebook diluncurkan pertama kali pada tanggal 4 Februari 2004 oleh Mark Zuckerberg sebagai media untuk saling mengenal bagi para mahasiswa Harvard.

Dalam waktu dua minggu setelah diluncurkan, separuh dari semua mahasiswa Harvard telah mendaftar dan memiliki account di Facebook. Tak hanya itu, beberapa kampus lain di sekitar Harvard pun meminta untuk dimasukkan dalam jaringan Facebook. Zuckerberg pun akhirnya meminta bantuan dua temannya untuk membantu mengembangkan Facebook dan memenuhi permintaan kampus-kampus lain untuk bergabung dalam jaringannya. Dalam waktu 4 bulan semenjak diluncurkan, Facebook telah memiliki 30 kampus dalam jaringannya.

Dengan kesuksesannya tersebut, Zuckerberg beserta dua orang temannya memutuskan untuk pindah ke Palo Alto dan menyewa apartemen di sana.

Setelah beberapa minggu di Palo Alto. Zuckerberg berhasil bertemu dengan Sean Parker (cofounder Napster), dan dari hasil pertemuan tersebut Parker pun setuju pindah ke apartemen Facebook untuk bekerja sama mengembangkan Facebook. Tidak lama setelah itu, Parker berhasil mendapatkan Peter Thiel (cofounder Paypal) sebagai investor pertamanya. Thiel menginvestasikan 500 ribu US Dollar untuk pengembangan Facebook.


Dengan kesuksesannya tersebut, Zuckerberg beserta dua orang temannya memutuskan untuk pindah ke Palo Alto dan menyewa apartemen di sana.

Setelah beberapa minggu di Palo Alto. Zuckerberg berhasil bertemu dengan Sean Parker (cofounder Napster), dan dari hasil pertemuan tersebut Parker pun setuju pindah ke apartemen Facebook untuk bekerja sama mengembangkan Facebook. Tidak lama setelah itu, Parker berhasil mendapatkan Peter Thiel (cofounder Paypal) sebagai investor pertamanya. Thiel menginvestasikan 500 ribu US Dollar untuk pengembangan Facebook.

Tuesday, February 9, 2010

ReFOG KeyLogger : Xpress way of Hacking

Who Is It Refog KeyLogger?

Parents worldwide use Refog Keylogger to look after their family members, teenage kids and spouses. Refog Keylogger has everything that’s included into the Free Keylogger, and adds a few valuable features that make Refog Keylogger ideal for family use. Not only can it intercept keystrokes, in addition, the computer surveillance tool logs full screenshot history of what was happening on your PC. It can also record all Web sites visited by your family members, and log all applications they used.


FEATURES :

Invisible and Undetectable

Unlike Free Keylogger that always displays an icon beside system clock, Refog Keylogger can run completely undetected and fully invisible. Even computer-savvy teenagers won’t be able to tell whether it’s running without knowing your Master Password, nor can they stop or uninstall the monitor.

Family-Friendly

Refog Keylogger is ideal for family use. Download your copy, double-click to install, set your Master Password and leave it - Refog Keylogger will do the rest completely automatically. You can leave it running 24x7 with zero maintenance.

Zero Maintenance with Automatic Updates

Refog Keylogger requires no regular maintenance. It can even update itself automatically by periodically checking for a new version, downloading and installing updates the moment they are released. Regular automatic updates help ensure optimal performance and tightest security of your PC.

What’s Recorded

Refog Keylogger logs all key presses and keystrokes typed on your PC, and saves any text pasted from the clipboard. Thanks to periodic screen captures, you will have access to fully illustrated usage history of your PC. Refog Keylogger can also, track Web sites and resources visited by your family members, and log all applications launched on your computer.

Protected with Master Password

Your Master Password is always required to make changes to Refog Keylogger. No one can uninstall, block or circumvent Refog Keylogger monitoring without knowing your password. Without the password, it’s even impossible to tell whether or not Refog Keylogger is running!

Download Your Copy

Download your free evaluation copy of Refog Keylogger today and see what your family members do online and offline. Refog Keylogger works great with all modern Windows OS releases: Windows XP®, Windows Vista®, Windows 7®.

Monday, February 8, 2010

Folder Guard : Secure Ur File in Public PC


Folder Guard® is a powerful computer security software that you can use to control access to files, folders, and other Windows resources, such as Control Panel, Start Menu, and so on. You can use Folder Guard to lock your personal files and folderswith passwords, to stop other users from peeking into your records. You can even completely hide your private folders from virtually all applications, and such folders would remain invisible until you enter a valid password. You can also protect sensitive system files from modification or destruction, disable access to the removable drives, restrict access to Control Panel, and more.

Why should you choose Folder Guard:

Folder Guard lets you password protect your files and folders.

You can protect with password virtually any folder or file, allowing only the authorized users to open the protected files or folders. You can protect an unlimited number of files and folders, each with its own password, or you can use the Master Password of Folder Guard to unprotect them all at once.

Folder Guard can hide your personal folders from other users.

You can set up Folder Guard to hide your private folders (or make them appear empty). The folder would be hidden from virtually any program, including Windows Explorer, Office, MS-DOS programs, etc.

Folder Guard can restrict access to Control Panel, Start Menu, Desktop, etc.

You can set up Folder Guard to allow only certain users to change the computer settings with Control Panel, while denying that to other users. You can control access to various settings of Start Menu, Desktop, Taskbar, and other Windows resources. You can remove the Run and Search commands on the Start menu, hide specific drives, lock the Internet settings, and more.

Folder Guard can protect access to the floppy, CD-ROM and other removable drives

You can configure Folder Guard to allow or deny access to the removable drives, restricting the user's ability to run or install unauthorized programs on your computer.

Folder Guard is suitable for a wide range of the computer security tasks.

You can stop other users of your computer from peeking into your personal files. You can protect the system files and folders from destruction by cyber-vandals. You can allow specific users to run a program while deny it to others. You can allow users to use the removable drives to store their documents while prevent them from running unauthorized programs from the removable disks. The possibilities are endless:

How to:

Folder Guard protects your files without encrypting them.

There is no risk of losing your documents if you lose your encryption key: with Folder Guard all your files remain intact, without modification of any kind.

Folder Guard lets you quickly enable or disable the protection via a "hot key".

You can choose a specific keyboard combination as the hot key of Folder Guard, to be able to quickly enable or disable the protection of your computer. Of course, the "hot key" is protected with your password, too, only you can use it!

Folder Guard can operate in the "stealth mode".

You can set up Folder Guard to operate in the stealth mode, to hide its own files and shortcuts from being seen by other users. You would still be able to control Folder Guard via the "hot key".

Folder Guard supports easy recovery in case of emergency.

If you forget your password, or experience other problems, simply use theEmergency Recovery Utility (free download) to quickly restore access to your protected folder.

Folder Guard works with drives of any format.

If your computer can handle it, Folder Guard can protect it. You don't have to format your hard drive with the NTFS file system: Folder Guard can protect files and folders on both NTFS and FAT/FAT32 disks.

Folder Guard runs on a wide range of Windows platforms.

From Windows 2000 to Windows XP to Windows 7 and later, with all service packs and hotfixes, all are supported by Folder Guard.

Folder Guard is easy to use.

Folder Guard sports one of the most intuitive user interfaces, that makes it easy to use for both novice users and computer professionals.

Folder Guard "speaks" plain English.

You don't have to be a computer professional to understand how to use Folder Guard. The Quick Start Wizard can guide you through the steps necessary to set up the password protection of your personal folders. Folder Guard Advisor warns you about situations that may require your attention and offers possible workarounds. Folder Guard User's Guide describes its commands and operation in plain English, without "pseudo-techno" or "geeky" talk. (And it does not baby-sit you either).

Folder Guard is not a toy.

Folder Guard is used by large corporations and small businesses, schools and police departments, universities and correctional facilities, libraries and hospitals (to name a few).

Folder Guard is widely used.

Hundreds of thousands of copies of Folder Guard have been downloaded by computer users from virtually all countries of the world.

Folder Guard offers the best value for the money.

Folder Guard is flexible.

Although Windows lets you restrict access to folders located on a NTFS drives, it cannot hide them. With Folder Guard, you can not only restrict access to, but also hide folders, or make them look empty. Unlike Windows, Folder Guard lets you protect only some files within a folder, and keep the rest of the files visible and accessible, if you wish. Or, you can protect files and folders each with its own individual password, and then unlock them separately from each other (Windows cannot do that).

Folder Guard can be used with other disk tools.

You can designate your anti-virus and other disk maintenance tools to be the "trusted" programs, to make them able to work with your protected disks without restrictions.

Folder Guard is extensible.

You can fine-tune the access rules to the files and folders of your computer by creating appropriate filters.

Folder Guard will save you hours of learning time.

You don't have to learn how to use the Group Policies, user groups, Access Control Lists, privileges, and other built-in security features of Windows, because Folder Guard does the hard work for you: its visual and intuitive user interface lets you manage the restrictions with ease.

Folder Guard is enterprise-ready.

For the corporate customers we offer a separate build of Folder Guard that does not require license validation over the Internet. The Folder Guard Administrator's Kit contains the installation files in both the EXE and MSI formats, allowing the system administrators to quickly deploy Folder Guard to a large number of computers. The Kit also contains a Group Policy template that you can use to automatically deliver the license key to a large number of the client computers.

Folder Guard is actively maintained.

Since its first release back in 1997, we've been continuously extending, enhancing, and improving Folder Guard. Now in version 8.2, Folder Guard gives you more power than ever.

Friday, February 5, 2010

BACKDOOR : ALTERNATIVE WAY OF HACKING





This time, i would like to share a new lesson of hacking..It's a backdoor. The example of backdoor program is SubSeven. A software that use to steal information and control all the authorities of other Personal Computer. Download SubSeven Sub7 Client Server Program Backdoor Full Download

By the way,Sub 7 is a backdoor trojan horse that you can connect to a victims computer. Download it at the download center.

Here our 2 tutoirlas
The first one will tell you how to use it
The second one will tell you how to give the vicitm the virus.
READ BOTH IF YOU WANT TO KNOW HOW TO USE SUB7!!!

This tutorial will include:


1) Contents of the SubSeven 2.1.5 Package
2) Explanation of the files
3) How to configure a server.exe properly using Editserver.exe
4) The features of SubSeven 2.1.5 and what they do



This package includes:

1) SubSeven.exe (CLIENT)
2) server.exe (SERVER)
3) EditServer.exe
4) ICQMAPI.DLL*

The Features of SubSeven 2.1.5


**) New Feature: under "Local Options - Advanced" section of the
client theres a button "Test on Local Machine" which runs the server
with special restrictions (accepts localhost connections only)


1) Connection:

A) IP Scanner - Scans for IPs with an open port you specify
B) Get PC Info - All PC info, including Disk Size, Space, User etc
C) Get Home Info - Gets all Home Info the vic specifies for their
Windows Registration ( not always availible)
D) Server Options - Options pertaining to removing, changing port,
updating server, etc.
E) IP Notify - Adds a new notify method or changes the current
method on the current server

2) Keys/Messages:

A) Keyboard - Open Keylogger, get offline keys, disable keyb. etc
B) Chat - Chat with the Victim
C) Matrix - Chat with the vic matrix style (black & green design)
D) Message Manager - Sends a popup message to the vic
E) Spy - ICQ, AIM, MSN, YAHOO Instant Messenger Spies
F) ICQ Takeover - displays all installed UINs on the pc, and u can
take each one over at the click of a button

3) Advanced:

A) FTP/HTTP - turns the vic into an FTP server, ready for files to
be downloaded via ur FTP client or browser
B) Find Files - searches for a specified file type or file in the
vics pc
C) Passwords - retrieves Cached, Recorded, RAS, and ICQ/AIM Passes
D) RegEdit - Opens the vics Registry so u can fuck with it >:)
E) App Redirect - Lets you run a DOS command on the vic and shows
you the output
F) Port Redirect - adds an open port to the vic so you can "bounce"
from it using the vics host as your own, E.G.: proxy type of
contraption via IRC

4) Miscellaneous:

A) File Manager - Upload, Download, Run, and do alotta other cool
shit via this client
B) Windows Manager - Displays open windows which you can close,
disable, etc.
C) Process Manager - Shows all processes you can kill, disable,
prioritize etc.
D) Text-2-Speech - Messes with the Text2Speech engine on the vics
pc, you type, it talks
E) Clipboard Manager - View, change, empty the vics clipboard
F) IRC Bot - Connects an IRC bot from the vic to an IRC server of
choice

5) Fun Manager:

A) Desktop/Webcam - Views Webcam continuous capture, a desktop
continuous preview and full screen capture
B) Flip Screen - Flips victims screen upside down, and sideways
C) Print - Prints on victims screen
D) Browser - Opens victims browser with the webpage you specify
E) Resolution - Changes victims pc resolution
F) Win Colors - Changes the victims computer colors

6) Extra Fun:

A) Screen Saver - Changes the Vics Screensaver
B) Restart Win - Shuts down, reboots, or logs off the victim
C) Mouse - Set Mouse trails, reverse buttons, hide curson etc
D) Sound - Record from vics mic, change volume settings
E) Time/Date - Changes system time
F) Extra - A whole buncha extra shit like hide desktop, hide start
button, hide taskbar, open cd-rom etc.

7) Local Options:

A) Quality - Adjusts the quality of the Webcam/Desktop
B) Local Folder - Changes the Sub7 Local Folder
C) Skins - Skin manager for Sub7
D) Misc Options - Misc shit like toggling animation of windows etc
E) Advanced - Messes with ports used for some Sub7 Functions Dont
bother messing around
F) Run EditServer - Hmm..i wonder what this does...

How to give your victim Sub7 ??????

First try and get a victim on ICQ as you can get there IP address straight

away! Now once you have found someone, just chat to them and find out if

they have a virus scanner [if so check the below paragraph, if not just jump

that paragraph] don't jump straight into it first just give them easy

questions like "A/S/L, how are you, Do you have a pic"

then ask them about the Virus Scanner, if they say why just say becuase

about all the worms and viruses on the net, your just wondering what they

are using as you might get some! now once you know that you are ready to

give them the trap!

================================

How to disable the Virus Scanner ????????

================================



There are two ways:

1] this si the easy way, you find out what virus scanner they use, then find

the apporpriate "DAT Killer.exe" you can say it's a pic, or even a patch you

kno about for the virus scanner they have! Once they have clicked on it then

the Virus Scanner is F***ed! Now just say you have [another] pic for them

that you hope will work! or course it's the sub7 server you have created

[remember to change the icon to the Paint Shop Pro Pallet icon] now once

they double click on it "bang!" they are caught!

2] Just give them the server straight away as a pic, once they say it's a

Virus. Blag your way around it. Say it must of become corrupt! on the

download but it should still work!

==================================

How to connect ???????

==================================

Ok now you've done the hard part of giving them the Sub7 server saying it's

a pic [remember to change the icon to the Paint Shop Pro Pallet icon]! now

go into Sub7 and click on the IP button type on the line that says "ICQUIN"

type the victims ICQ number, then press "resolve UIN" and it will give you

there IP number, go back to the main screen and put in the IP on the "IP/UIN

box" now in the box next to that put in the port you set the server to

[27374 is the default] now click connect and your should be in!



Have fun!

Tuesday, January 12, 2010

SQL injection



What is SQL Injection
SQL injection refers to the act of someone inserting a MySQL statement to be run on your database without your knowledge. Injection usually occurs when you ask a user for input, like their name, and instead of a name they give you a MySQL statement that you will unknowingly run on your database.


SQL Injection Example
Below is a sample string that has been gathered from a normal user and a bad user trying to use SQL Injection. We asked the users for their login, which will be used to run a SELECT statement to get their information.



MySQL & PHP Code:// a good user's name
$name = "timmy";
$query = "SELECT * FROM customers WHERE username = '$name'";
echo "Normal: " . $query . "
";
// user input that uses SQL Injection
$name_bad = "' OR 1'";
// our MySQL query builder, however, not a very safe one
$query_bad = "SELECT * FROM customers WHERE username = '$name_bad'";
// display what the new query will look like, with injection
echo "Injection: " . $query_bad;



Display:
Normal: SELECT * FROM customers WHERE username = 'timmy'Injection: SELECT * FROM customers WHERE username = '' OR 1''
The normal query is no problem, as our MySQL statement will just select everything from customers that has a username equal to timmy.
However, the injection attack has actually made our query behave differently than we intended. By using a single quote (') they have ended the string part of our MySQL query
username = ' '
and then added on to our WHERE statement with an OR clause of 1 (always true).
username = ' ' OR 1
This OR clause of 1 will always be true and so every single entry in the "customers" table would be selected by this statement!


More Serious SQL Injection Attacks
Although the above example displayed a situation where an attacker could possibly get access to a lot of information they shouldn't have, the attacks can be a lot worse. For example an attacker could empty out a table by executing a DELETE statement.
MySQL & PHP Code:$name_evil = "'; DELETE FROM customers WHERE 1 or username = '";
// our MySQL query builder really should check for injection
$query_evil = "SELECT * FROM customers WHERE username = '$name_evil'";
// the new evil injection query would include a DELETE statement
echo "Injection: " . $query_evil;
Display:
SELECT * FROM customers WHERE username = ' '; DELETE FROM customers WHERE 1 or username = ' '
If you were run this query, then the injected DELETE statement would completely empty your "customers" table. Now that you know this is a problem, how can you prevent it?


For more info, please visit http://www.tizag.com/