Showing posts with label Hackers Lab. Show all posts
Showing posts with label Hackers Lab. Show all posts

Wednesday, September 7, 2011

Top 10 Hacks of all time

1990
When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city's telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.

November 2002
Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. The next hearing in the case is slated for today.

1995
Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online - he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the US, Finland, Holland, Germany and Israel.

1990
When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city's telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.

1983
Kevin Poulsen again. A little-known incident when Poulsen, then just a student, hacked into Arpanet, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network.

1996
US hacker Timothy Lloyd planted six lines of malicious software code in the computer network of Omega Engineering which was a prime supplier of components for NASA and the US Navy. The code allowed a "logic bomb" to explode that deleted software running Omega's manufacturing operations. Omega lost $10 million due to the attack.

1988
Twenty-three-year-old Cornell University graduate Robert Morris unleashed the first Internet worm on to the world. Morris released 99 lines of code to the internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990.

1999
The Melissa virus was the first of its kind to wreak damage on a global scale. Written by David Smith (then 30), Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly $400 million. Smith was arrested and sentenced to five years in prison.

2000
MafiaBoy, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including eBay, Amazon and Yahoo between February 6 and Valentine's Day in 2000. He gained access to 75 computers in 52 networks, and ordered a Denial of Service attack on them. He was arrested in 2000.

1993
They called themselves Masters of Deception, targeting US phone systems. The group hacked into the National Security Agency, AT&T, and Bank of America. It created a system that let them bypass long-distance phone call systems, and gain access to the pbx of major carriers.

Monday, January 17, 2011

How to gain access to system account the most powerful account in Windows


How to gain access to system account the most powerful account in Windows.

There is an account in Microsoft Windows that is more powerful than the Administrator account in Windows Operating Systems. That account is called System account it is similar to the root OR super user in the Linux/Unix world . I will show you how to access this system account in this article.
You can use this facility for removing programs that are causing problems to your system, malware etc.
Introduction
If you look at the task manager (which can be launched by pressing [CTRL]+[ALT]+[DEL]) you will see some processes that are running with System level privileges. Even the Administrator account is unable to do some of the things a system account can do.
System is the highest account in Windows (like root),You can be a super power user by accessing the system account (even while you are logged in as a restricted user)
Note: Accessing system account may cause serious problems.
Leave this tread and don’t follow the rest of this topic
if you don’t know what you are doing. I am not liable for any problems caused by accessing the system account
Local system differs from an administrator account in that it has
full control of the operating system, similar to root on a Unix
machine. Most system processes are required by the operating
system, and cannot be closed, even by an administrator account;
attempting to close them will result in an error message.
In Windows NT and later systems derived from it (windows 2000,
Windows XP, Windows servers 2003 and Windows Vista), there may
or may not be a superuser. By default, there is a superuser named
Administrator, although it is not an exact analogy of the Unix
root superuser account. Administrator does not have all the
privileges of root because some superuser privileges are assigned
to the Local System account in windows NT/XP.
What you gain by accessing System account?
Local privilege escalation is useful on any system that a hacker
may compromise; the system account allows for several other
things that aren’t normally possible (you can reset passwords, resetting administrator passwords is also possible)
You can even login to System and lock administrator account out by
editing group policy or other tools in windows.
How to access System:
Note : Don’t follow the procedure bellow if you don’t know what you
are doing. You may harm your PC. If you follow, Do it on your own risk.
  1. Check the name of the account you’ve logged into (Click start. You
    will see the name of the account you’ve logged in.)
  2. Launch the command prompt. (Start | Run | cmd | [Enter] )
    in command prompt, create a schedule to run cmd.exe.
    To create a schedule type the following line and hit enter.
    at 10:41 /interactive “cmd.exe”
    this will create a schedule to run cmd.exe at 10:41.
    (Since you are testing, check the time in your system try and add two or three minutes.)Change this time according to your local time
    Hint: you can check if the schedule is placed by typing “at
    and hitting enter after the above step.
  3. Wait for the time you set for the schedule.
    cmd.exe would be launched at the specified time.
  4. After cmd.exe is launched by the scheduled time, press [CTRL] + [ALT] + [DEL] and launch task manager.
    Select “Process” tab, select explorer.exe in the process list and click “End Process” button.
    You will receive a confirmation dialogue. Click “Yes” to end the process.
  5. Close task manager by clicking the close (X) button.
    Close the first cmd window (be careful to close the first one not the second one.)
  6. Now you have only the second command prompt window and an empty desktop.
    In command prompt type the following line and hit “Enter”
    cd ..
  7. In command prompt type the following line and hit “Enter”
    explorer.exe
    If this is the first time you do it, windows creates the necessary
    components for you to access System ( Desktop, start menu,
    My document)
    when it’s finished you will have a new desktop.
  8. Close command prompt window. Click start and check your username.
    It’s changed to System.
    Now you are a super-power user. Be careful not to harm your PC and delete or modify system files if you don’t know what you are doing.
Am once again saying, don’t attempt accessing system account, unless you are an experienced Windows user.

Friday, January 14, 2011

FireFox Addons to Easier Copy Links and Anchor Texts


FireFox Addons to Easier Copy Links and Anchor Texts

Do you copy-paste links a lot? Most of our readers are most likely to.
This post offers a few useful FireFox addons that will let you copy links from the web easier and faster. Enjoy!

Do you copy-paste links a lot? Most of our readers are most likely to.
This post offers a few useful FireFox addons that will let you copy links from the web easier and faster. Enjoy!

1. Copy Links


Copy Links addon allows to quickly copy all or selected URLs with anchors to clipboard


A very similar addon: Copy Link URL: this addon lets you select a few links on a page and copy the URLs of them to clipboard (unlike in the above addon, there’s no option to copy ALL URLs on the current page):
 

With either of the two, if you copy the selected URLs in the above screenshots, you’ll get the following



Download from here:-https://addons.mozilla.org/en-US/firefox/addon/10552/



Copy Link Text

Unlike with the above two, this addon lets you copy the visible text of the selected link (one link only). With it, you won’t have to use your mouse to highlight the link to copy its text (If you are a heavy FireFox user, you may have noticed that highlighting links there is pain): this tool adds an option to the context menu so that when right-clicking a link, its text can be immediately copied – without the trouble of using the mouse to highlight the text exactly or the annoyance of unintentionally visiting the page of the link.

 

Copy URLs and Text for Multiple Links

If you copy links a lot, consider MultiLinks which adds plenty of possible actions for multiple links. It seems to be primarily used for opening multiple links but can as well be configured to copy multiple links. From addon options, click “Actions” tab and choose what you want to do with the selected links. In our case we may want to select one of the three options:
  1. Copy URLs and titles of the selected links
  2. Copy only URLs of the selected links
  3. Copy only titles (link text) of the selected links

 



Links are selected with the set combination of keys and mouse buttons: you can customize these in the options as well. In my options these are:
 



After all the settings are customized, you will be able to select your links using the combination of keys and buttons you have created:
 
 

Extract Firefox Addon Source Code

This instruct table will show you how to extract the source code from any Firefox addon. It requires nothing more than a ZIP extraction utility and a text editor if you choose to edit and repack the source.

NOTE : Some addons require a license agreement to be accepted beforehand. In that case, the XPI file can be saved from the button on the license acceptance page, and not the addon page itself.

Instead of just clicking the button and having Firefox take over, right click and choose "Save Link As...". Once the file transfer is done, you will have the addon package right on your computer.

step 2Extracting XPI File
Now that the file is on your computer, open up your personal ZIP extraction utility, and point it to the XPI file. In reality, XPI files are merely ZIP files renamed, so you can go ahead and extract the contents to a folder someplace. Common files outputted are...

install.js
install.rdf
/chrome/
/defaults/

With these files present, you're ready to move on.


step 3Extracting the Main JAR Code
Most of the core addon code is present in a JAR file found in the /chrome/ directory. You'll find that just as XPI is a rename of ZIP, so is JAR (but to a lesser extent). Using the same extraction utility, you should be able to extract the main addon files from the JAR.


step 4That's It!
What you have now are most of the raw source files from the addon. You can modify them as you wish, and repackage them with the modifications. Opening XPI files in Firefox will install them for you.

Always respect an authors work, and make sure they allow you to use their code. Don't just take a popular addon, change the credits, and rehost it. That is just simply stealing.




Monday, October 18, 2010

tutorial of telnet session with gmail to send mail via smtp protocol

hi friends here is working tutorial of telnet session with gmail to send mail via smtp protocol


basic
go to
http://www.motobit.com/util/base64-decoder-encoder.asp
convert your username and password to hex string
then

go to command prompt
type
telnet smtp.gamil.com 587
then


##########################################3


250 mx.google.com at your service
auth login
334 VXNlcm5hbWU6
uuuuuuuuuuuuuuu1111111111<-------user name hex string
334 UGFzc3dvcmQ6
pppppppppppppppp222222222<-------password hex string
235 2.7.0 Accepted
MAIL FROM:
250 2.1.0 OK f14sm12564610wbe.20
RCPT TO:
250 2.1.5 OK f14sm12564610wbe.20

data i lake this telnet stuff
354  Go ahead f14sm12564610wbe.20
subject: smtp
.
250 2.0.0 OK 1287428373 f14sm12564610wbe.20
quit
221 2.0.0 closing connection f14sm12564610wbe.20


Connection to host lost.

C:\Documents and Settings\omie>

rock on ...........check your inbox you have mail now...how to put data u work out...

Saturday, October 16, 2010

Hacker’s Laws

Hacker’s Laws

LAWS OF COMPUTER PROGRAMMING
—————————-
1. There is always one more bug.
2. Any given program, when running, is obsolete
3. If a program is useless, it will have to be documented.
4. If a program is useful, it will have to be changed.
5. Any program will expand to fill all available memory.
6. The value of a program is proportional to the weight of its output.
7.Program complexity grows until it exceeds the capability of the programmer to maintain it.
8. Make it possible for programmers to write in English and you will find out that programmers cannot write in English.

WEINBERG’S LAW
————–
 If builders built buildings the way programmers wrote programs, then the first woodpecker that came along would destroy civilization.

HARE’S LAW OF LARGE PROGRAMS
—————————-
 Inside every large program is a small program struggling to get out.

TROUTMAN’S PROGRAMMING LAWS
—————————
1.If a test installation functions subsequent systems will malfunction.
2. Not until a program has been in production for at least six months will the most harmful error then be discovered.
3. Job control cards that cannot be arranged in improper order will be.
4. Interchangeable tapes won’t
5. If the input editor has been designed to reject all bad input,an ingenious idiot will discover a method to get bad data past it.
6.Machines work, people should think.

GOLUB’S LAWS OF COMPUTERDOM
—————————
1. A carelessly planned project takes three times longer to completed than expected; a carefully planned project will take only twice as long.
2. The effort required to correct the error increases geometrically with time.

BRADLEY’S BROMIDE
—————–
 If computers get too powerful, we can organize them into a committee – that will do them in.

Wednesday, September 29, 2010

chatbot example Alicebot

A chatbot (or chatterbot, or chat bot) is a computer program designed to simulate an intelligent conversation with one or more human users via auditory or textual methods. Traditionally, the aim of such simulation has been to fool the user into thinking that the program's output has been produced by a human (the Turing test). Programs playing this role are sometimes referred to as Artificial Conversational Entities, talk bots or chatterboxes. More recently, however, chatbot-like methods have been used for practical purposes such as online help, personalised service, or information acquisition, in which case the program is functioning as a type of conversational agent. What distinguishes a chatbot from more sophisticated natural language processing systems is the simplicity of the algorithms used. Although many chatbots do appear to interpret human input intelligently when generating their responses, many simply scan for keywords within the input and pull a reply with the most matching keywords, or the most similar wording pattern, from a textual database. (or chatterbot, or chat bot) is a computer program designed to simulate an intelligent conversation with one or more human users via auditory or textual methods. Traditionally, the aim of such simulation has been to fool the user into thinking that the program's output has been produced by a human (the Turing test). Programs playing this role are sometimes referred to as Artificial Conversational Entities, talk bots or chatterboxes. More recently, however, chatbot-like methods have been used for practical purposes such as online help, personalised service, or information acquisition, in which case the program is functioning as a type of conversational agent. What distinguishes a chatbot from more sophisticated natural language processing systems is the simplicity of the algorithms used. Although many chatbots do appear to interpret human input intelligently when generating their responses, many simply scan for keywords within the input and pull a reply with the most matching keywords, or the most similar wording pattern, from a textual database.



here is the Alicebot for your service Galaia Project.
visit http://mysamsungstar3g.blogspot.com/
due to bandwidth problem i moved from my blog

hi friends check out new hackers lab experimets

Earth tracking Program By http://hackerslabrotary.blogspot.com


Mapping The Earth Program By http://hackerslabrotary.blogspot.com



at the end of blog...

Tuesday, September 28, 2010

hi friends check out new hackers sphere

hi friends we are no less than google
check out my hacker sphere
at
http://moneyguru.clanteam.com/hp/hackers%20Sphere.htm

Comment if you like it.............................

hi friends check out new hackers sphere technology

hi friends we are no less than Google
check out my hacker sphere
at

http://moneyguru.clanteam.com/hp/hackers%20Sphere.htm


check out you will love this experiment....