Sunday, April 25, 2010
Most Popular Games : Grand Theft Auto San Andreas
Carl Johnson’s back on the set after five years in Liberty City, returning to his old haunts in San Andreas to mourn for his mother, dead after an act of senseless violence. An already unpleasant homecoming gets worse, though, as crooked cops set him up for the murder of a policeman, he discovers that his neighborhood is falling apart under an influx of drugs, and that his old gang is barely capable of holding their territory. Needless to say, the solution to all of these problems involves a whole lot of violence, as befits the latest and greatest entry in the extraordinarily popular GTA series of games.
Given that Rockstar created a massive game world in Grand Theft Auto: Vice City, with only a year’s worth of development time between that game and Grand Theft Auto III, it should come as no surprise that the world of GTA: San Andreas, with two years of development soaked into it, is one of the biggest worlds ever modeled in an action game. Instead of focus on a mere state, Rockstar has enlarged their focus, this time choosing to model an entire state, with three separate cities and a huge amount of countryside to explore. Everything is bigger and better in San Andreas, so get exploring!
In this guide, we’ll provide you with a rundown of the game’s weapons, a complete walk-through of the game’s many missions, locations for all of the hidden oysters, photo ops, graffiti tags, a listing of weapons, and the proverbial much, much more. Big thanks to the guys from gta-junkies.com for supplying the location maps for this guide.
Most Downloaded Software : AVG Anti-Virus Free Edition 9.0.730 : CNET Review
AVG Free provides the bare necessities when it comes to security, but that should be enough for savvy Windows users. You'll get a combined antivirus and antimalware engine, LinkScanner, and e-mail scanning. AVG Free 9 introduces a few new features, with improvements focused on performance, including claims of faster scan and boot times. One new feature is the Identity Theft Recovery Unit. Only for users in the United States, ITRU is a business partnership with Identity Guard which provides "consumer identity theft solutions," accessible only from the AVG toolbar in Firefox and Internet Explorer.
The interface is nearly unchanged from the last version, and generally it's easy to use. From the main window, though, you must double-click to get further information on any feature, whether virus scanning, LinkScanner settings, or updating. Streamlining this to one click would be helpful. A scheduling utility automates both scans and updates, while the upgrade ad at the screen's bottom can be easily hidden using the Hide Notification button. When starting a scan, a slider makes it easy to jump between Slow, Automatic, and Fast scans: the faster the scan, the less comprehensive it is, so users should take advantage of the scan optimization that is recommended during installation to speed up that first scan. A progress meter for regular scans would've been useful, though. Should a virus create serious problems, AVG creates a rescue disk to scan your computer in MS-DOS mode.
Thursday, April 22, 2010
One Step Ahead : Dual Touch Screen Laptop created by V12 Design
V12 Design, an Italian industrial design agency, developed a similar concept four years ago. Valerio Cometti, the founder and managing director of the firm, came up with a dual LCD laptop called the Canova.
The first-generation Canova had a dual-touchscreen form and Cometti told us, “it was developed for creative types, such as artists.” The first-generation model, of which we have a whole slew of images below, actually existed and was made of stainless steel and carbon fiber, but it didn’t run an operating system or software. It was envisioned to transform from a sketch pad, to a writing pad with an electronic pen, to a newspaper.
Cometti pitched the idea around to laptop manufacturers, who took interest. Which is where the Canova Generation 2 comes in. Cometti said that V12 Designs has been working on a second-gen version of the dual-screen laptop along with a U.S. manufacturer. He believes the laptop, if you can call it that, will be complete in as soon as 16 months and will come to the U.S. market. He could not reveal the name of the U.S.-based company with which V12 is co-developing and designing the system.
“We developed a brand-new style for the second generation. We did stretch the potential of the Canova noticeably, making it able to do things no notebook has been able to do so far,” Cometti told us over the phone. Unfortunately, he could not provide images of the new version.
He did tell us that it will be a portable personal computer that will support multi-touch input. As he designed in the first version, a software keyboard would appear on the screen. He recommends that the keyboard use haptic feedback since typing on this sort of keyboard is less comfortable than using a traditional one.
Cometti also stressed that a microphone would be built into the design because “voice recognition will become a more popular and widespread feature in these dual-screen notebooks.” The Canova 2 will also have the ability to transform into an e-book, letting users swipe a finger to turn the page.
Revo on Notebook : Acer TimelineX in Malaysia
Acer Malaysia has just released the new Aspire TimelineX, a slim notebook that features the latest Intel Core i5 processor.
The 14in Aspire TimelineX 4820TG-432G50 offers up to twelve hours of battery life (with the extended battery), Intel Core i5-430M 2.26GHz processor, 1,366 x 768-pixel LED backlit LCD screen, ATI Mobility Radeon HD5470, 2GB RAM, 500GB hard disk and Windows 7 Home Premium.
At just 1in thick, the TimelineX nevertheless offers eight hours of battery life with the slim six-cell battery, while the nine-cell battery will bring the notebook up to twelve hours.
TimelineX features a number of innovations through its PowerSmart Technology that works in combination with the power-saving features of the Core i5 processor.
For example, the hard disk is a new low-power version that goes into a deeper hibernation state when idle, while the LCD screen is LED backlit — both contribute to a power consumption 66% less than the standard required by Energy Star (the international standard for energy efficient products).
On top of that, when plugged in to a wall socket, the AC adapter automatically cuts off when the battery is fully charged, thus saving energy and increasing the useful lifespan of the battery by eliminating overcharging.
While the 14in Aspire TimelineX is the only model in the series presently, Acer is due to introduce a 13in and 15in model some time next month.
The TimelineX 4820TG has a recommended retail price of RM2,999.
iPhone 4G will be released
The new iPhone 4G was leaked by Gizmodo but was missing the iPhone 4.0 software because Apple had performed a remote wipe to prevent anyone from using it. We had no proof as to whether or not the photo gallery posted on Gizmodo was legit but now it’s been confirmed. Apple has sent Gizmodo a legal notice and asked for them to return the iPhone 4G prototype unit that they acquired from someone who stole it from an Apple employee for $5,000.
iPhone 4G Specs that were leaked:
* Front-facing camera – Used for Video Chat
* Back camera – They’re saying it’s improved
* Micro-SIM – , as opposed to the standard SIM in the current iPhone
* Improved display
* Power, mute, and volume buttons are metallic
iPhone OS 4.0 software will be released in June along with the iPhone 4G. I’m not really excited about the iPhone 4G hardware since it still looks like a brick. If iPhone on Verizon becomes a reality, I’m getting it.
Monday, March 1, 2010
FACEBOOK : starts with Mark Zuckerberg
Tuesday, February 9, 2010
ReFOG KeyLogger : Xpress way of Hacking
Who Is It Refog KeyLogger?
Parents worldwide use Refog Keylogger to look after their family members, teenage kids and spouses. Refog Keylogger has everything that’s included into the Free Keylogger, and adds a few valuable features that make Refog Keylogger ideal for family use. Not only can it intercept keystrokes, in addition, the computer surveillance tool logs full screenshot history of what was happening on your PC. It can also record all Web sites visited by your family members, and log all applications they used.
FEATURES :
Invisible and Undetectable
Unlike Free Keylogger that always displays an icon beside system clock, Refog Keylogger can run completely undetected and fully invisible. Even computer-savvy teenagers won’t be able to tell whether it’s running without knowing your Master Password, nor can they stop or uninstall the monitor.
Family-Friendly
Refog Keylogger is ideal for family use. Download your copy, double-click to install, set your Master Password and leave it - Refog Keylogger will do the rest completely automatically. You can leave it running 24x7 with zero maintenance.
Zero Maintenance with Automatic Updates
Refog Keylogger requires no regular maintenance. It can even update itself automatically by periodically checking for a new version, downloading and installing updates the moment they are released. Regular automatic updates help ensure optimal performance and tightest security of your PC.
What’s Recorded
Refog Keylogger logs all key presses and keystrokes typed on your PC, and saves any text pasted from the clipboard. Thanks to periodic screen captures, you will have access to fully illustrated usage history of your PC. Refog Keylogger can also, track Web sites and resources visited by your family members, and log all applications launched on your computer.
Protected with Master Password
Your Master Password is always required to make changes to Refog Keylogger. No one can uninstall, block or circumvent Refog Keylogger monitoring without knowing your password. Without the password, it’s even impossible to tell whether or not Refog Keylogger is running!
Download Your Copy
Download your free evaluation copy of Refog Keylogger today and see what your family members do online and offline. Refog Keylogger works great with all modern Windows OS releases: Windows XP®, Windows Vista®, Windows 7®.
Monday, February 8, 2010
Folder Guard : Secure Ur File in Public PC
Why should you choose Folder Guard:
Folder Guard lets you password protect your files and folders.
- You can protect with password virtually any folder or file, allowing only the authorized users to open the protected files or folders. You can protect an unlimited number of files and folders, each with its own password, or you can use the Master Password of Folder Guard to unprotect them all at once.
Folder Guard can hide your personal folders from other users.
- You can set up Folder Guard to hide your private folders (or make them appear empty). The folder would be hidden from virtually any program, including Windows Explorer, Office, MS-DOS programs, etc.
Folder Guard can restrict access to Control Panel, Start Menu, Desktop, etc.
- You can set up Folder Guard to allow only certain users to change the computer settings with Control Panel, while denying that to other users. You can control access to various settings of Start Menu, Desktop, Taskbar, and other Windows resources. You can remove the Run and Search commands on the Start menu, hide specific drives, lock the Internet settings, and more.
Folder Guard can protect access to the floppy, CD-ROM and other removable drives
- You can configure Folder Guard to allow or deny access to the removable drives, restricting the user's ability to run or install unauthorized programs on your computer.
Folder Guard is suitable for a wide range of the computer security tasks.
- You can stop other users of your computer from peeking into your personal files. You can protect the system files and folders from destruction by cyber-vandals. You can allow specific users to run a program while deny it to others. You can allow users to use the removable drives to store their documents while prevent them from running unauthorized programs from the removable disks. The possibilities are endless:
How to:
- Hide folders from prying eyes
- Hide files without encrypting them
- Lock files and folders with passwords
- Use Quick Start Wizard of Folder Guard
- Restrict access to Control Panel and other resources
- Set up user-specific restrictions
- Prevent users from installing unauthorized programs
- Prevent users from running programs from the removable disks
- Restrict downloading programs from the Internet with Internet Explorer
Folder Guard protects your files without encrypting them.
- There is no risk of losing your documents if you lose your encryption key: with Folder Guard all your files remain intact, without modification of any kind.
Folder Guard lets you quickly enable or disable the protection via a "hot key".
- You can choose a specific keyboard combination as the hot key of Folder Guard, to be able to quickly enable or disable the protection of your computer. Of course, the "hot key" is protected with your password, too, only you can use it!
Folder Guard can operate in the "stealth mode".
- You can set up Folder Guard to operate in the stealth mode, to hide its own files and shortcuts from being seen by other users. You would still be able to control Folder Guard via the "hot key".
Folder Guard supports easy recovery in case of emergency.
- If you forget your password, or experience other problems, simply use theEmergency Recovery Utility (free download) to quickly restore access to your protected folder.
Folder Guard works with drives of any format.
- If your computer can handle it, Folder Guard can protect it. You don't have to format your hard drive with the NTFS file system: Folder Guard can protect files and folders on both NTFS and FAT/FAT32 disks.
Folder Guard runs on a wide range of Windows platforms.
- From Windows 2000 to Windows XP to Windows 7 and later, with all service packs and hotfixes, all are supported by Folder Guard.
Folder Guard is easy to use.
- Folder Guard sports one of the most intuitive user interfaces, that makes it easy to use for both novice users and computer professionals.
Folder Guard "speaks" plain English.
- You don't have to be a computer professional to understand how to use Folder Guard. The Quick Start Wizard can guide you through the steps necessary to set up the password protection of your personal folders. Folder Guard Advisor warns you about situations that may require your attention and offers possible workarounds. Folder Guard User's Guide describes its commands and operation in plain English, without "pseudo-techno" or "geeky" talk. (And it does not baby-sit you either).
Folder Guard is not a toy.
- Folder Guard is used by large corporations and small businesses, schools and police departments, universities and correctional facilities, libraries and hospitals (to name a few).
Folder Guard is widely used.
- Hundreds of thousands of copies of Folder Guard have been downloaded by computer users from virtually all countries of the world.
Folder Guard offers the best value for the money.
Folder Guard is flexible.
- Although Windows lets you restrict access to folders located on a NTFS drives, it cannot hide them. With Folder Guard, you can not only restrict access to, but also hide folders, or make them look empty. Unlike Windows, Folder Guard lets you protect only some files within a folder, and keep the rest of the files visible and accessible, if you wish. Or, you can protect files and folders each with its own individual password, and then unlock them separately from each other (Windows cannot do that).
Folder Guard can be used with other disk tools.
- You can designate your anti-virus and other disk maintenance tools to be the "trusted" programs, to make them able to work with your protected disks without restrictions.
Folder Guard is extensible.
- You can fine-tune the access rules to the files and folders of your computer by creating appropriate filters.
Folder Guard will save you hours of learning time.
- You don't have to learn how to use the Group Policies, user groups, Access Control Lists, privileges, and other built-in security features of Windows, because Folder Guard does the hard work for you: its visual and intuitive user interface lets you manage the restrictions with ease.
Folder Guard is enterprise-ready.
- For the corporate customers we offer a separate build of Folder Guard that does not require license validation over the Internet. The Folder Guard Administrator's Kit contains the installation files in both the EXE and MSI formats, allowing the system administrators to quickly deploy Folder Guard to a large number of computers. The Kit also contains a Group Policy template that you can use to automatically deliver the license key to a large number of the client computers.
Folder Guard is actively maintained.
- Since its first release back in 1997, we've been continuously extending, enhancing, and improving Folder Guard. Now in version 8.2, Folder Guard gives you more power than ever.
Friday, February 5, 2010
BACKDOOR : ALTERNATIVE WAY OF HACKING
Tuesday, January 12, 2010
SQL injection
What is SQL Injection
SQL injection refers to the act of someone inserting a MySQL statement to be run on your database without your knowledge. Injection usually occurs when you ask a user for input, like their name, and instead of a name they give you a MySQL statement that you will unknowingly run on your database.
SQL Injection Example
Below is a sample string that has been gathered from a normal user and a bad user trying to use SQL Injection. We asked the users for their login, which will be used to run a SELECT statement to get their information.
MySQL & PHP Code:// a good user's name
$name = "timmy";
$query = "SELECT * FROM customers WHERE username = '$name'";
echo "Normal: " . $query . "
";
// user input that uses SQL Injection
$name_bad = "' OR 1'";
// our MySQL query builder, however, not a very safe one
$query_bad = "SELECT * FROM customers WHERE username = '$name_bad'";
// display what the new query will look like, with injection
echo "Injection: " . $query_bad;
Display:
Normal: SELECT * FROM customers WHERE username = 'timmy'Injection: SELECT * FROM customers WHERE username = '' OR 1''
The normal query is no problem, as our MySQL statement will just select everything from customers that has a username equal to timmy.
However, the injection attack has actually made our query behave differently than we intended. By using a single quote (') they have ended the string part of our MySQL query
username = ' '
and then added on to our WHERE statement with an OR clause of 1 (always true).
username = ' ' OR 1
This OR clause of 1 will always be true and so every single entry in the "customers" table would be selected by this statement!
More Serious SQL Injection Attacks
Although the above example displayed a situation where an attacker could possibly get access to a lot of information they shouldn't have, the attacks can be a lot worse. For example an attacker could empty out a table by executing a DELETE statement.
MySQL & PHP Code:$name_evil = "'; DELETE FROM customers WHERE 1 or username = '";
// our MySQL query builder really should check for injection
$query_evil = "SELECT * FROM customers WHERE username = '$name_evil'";
// the new evil injection query would include a DELETE statement
echo "Injection: " . $query_evil;
Display:
SELECT * FROM customers WHERE username = ' '; DELETE FROM customers WHERE 1 or username = ' '
If you were run this query, then the injected DELETE statement would completely empty your "customers" table. Now that you know this is a problem, how can you prevent it?
For more info, please visit http://www.tizag.com/