This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Thursday 28 February 2013

Base 64 Encode And Decode

<?php
/*
*    By Afnum Vvip
*    in decode you can put <?php or evrything in it like
*    <?php  eval(base64_decode('YWZudW0gaGVuc2Vt'));  ?>
*    it can decode it for you :D
*/
?>
<head>
<title>Base 64</title>
</head>
<body bgcolor="#333">
<style>
a{
    color:#fff;
    font-size:21px
}
a:link{
    color:#FFF;
    font-size:21px
}
a:visited{
    color:#FFF
    font-size:21px
}
h1{
    color:#FFF
   
}

</style>
<table align="center" border="2px" bordercolor="#fff" width="100%" bgcolor="#333">
<center><th><a  href="?do=encode" title="Encode Your Script">Encode</a></th><th><a  href="?" title="Encode Your Script">Home</a></th><th><a href="?do=decode" title="Decode Your Script">Decode</a></th></center></table><br />

<?php
$f = array('<?php', '<?' , 'eval', '(', ')', 'base64_decode', '\'', ';', '?>');

switch($_GET['do'])
{
case encode:
    echo
    '
    <center><h1>Base64 Encode</h1><br />
    <form method="post">
    <textarea name="str" style=" height: 160px;  width: 653px; ">'.htmlentities(stripslashes($_POST["str"])).'</textarea><br /><br />
    <input type="submit" name="submit" value="Encode! " />
    </form><br /></center>
    ';
    $submit = $_POST['submit'];
    $str = $_POST['str'];
   
    doencode($_POST['submit'], $_POST['str']);

   
break;
case decode:
    echo
    '
    <center><h1>Base64 Decode</h1><br />
    <form method="post">
    <textarea name="dec" style=" height: 160px;  width: 653px; ">'.htmlentities(stripslashes($_POST["dec"])).'</textarea><br /><br />
    <input type="submit" name="submitt" value="Decode! " />
    </form><br /></center>
    ';
    $submitt = $_POST['submitt'];
    $dec = $_POST["dec"];
   
    dodecode();
break;
default:
echo
"
<center>
<font color='#FFF' size='5px'><br /><br /><br /><br /><br /><br /><br /><b><pre>
__________                           ________  _____ 
\______   \_____    ______  ____    /  _____/ /  |  |
 |    |  _/\__  \  /  ___/_/ __ \  /   __  \ /   |  |_
 |    |   \ / __ \_\___ \ \  ___/  \  |__\  |    ^   /
 |______  /(____  /____  > \___  >  \_____  |____   |
        \/      \/     \/      \/         \/     |__|
</pre></b></font>
</center>
";


}



function doencode(){
global $submit, $str;
    if($submit && !$str){
        echo "<script>alert('Y U NO Fill The Box ????')</script>";       
    }
    else if ($submit && !empty($str)){
        $strs = htmlentities($str);
        $enc = base64_encode($str);
        echo '<hr /><center><h1>Base64 Encoded</h1><br /><textarea style=" height: 160px;  width: 653px; " readonly>';
        echo "<?php  eval(base64_decode('$enc'));  ?>";
        echo '</textarea></center>';
    }
}

function dodecode(){
global $submitt, $dec, $f;
    if($submitt && !$dec){
        echo "<script>alert('Y U NO Fill The Box ????')</script>";       
    }
    else if ($submitt && !empty($dec)){
        $decode = str_ireplace($f, '', $dec);
        $deco  = base64_decode($decode);
        $html = htmlentities(stripslashes($deco));
        echo '<hr /><center><h1>Base64 Decoded</h1><br /><textarea style=" height: 160px;  width: 653px; " readonly>';
        echo $html;
        echo '</textarea></center>';
    }
}


?>
</body>

Sunday 17 February 2013

MD5 Cracker Web List

 

MD5 Cracker Web List

Just wanna share with you guys. A list of web/services for cracking a md5 hash.
Check it out. r0x d4 n3tw0rk

- md5gle.com

- online md5 cracker,md5 reverse, md5 decrypt (457,354,352,282)

- md5Crack.com | online md5 cracker

- [ md5 crack password crack hash checker ]

- md5cracker.tk (MD5 Search engine by searches a total of 14 on-line crackers.)

- Index of / (5,889,729)

- AP3 Designs

- http://md5-db.com (The database is approximately 70gb)

- md5.rednoize.com - reverse engineer md5 hashes - powered by rednoize.com (56,502,235)

- GData: An Online MD5 Hash Database (3,251,106)

- TMTO[dot]ORG (306.000.000.000)

- milw0rm.com - free md5/lm hash cracking (Milw0rm Cracker db)

- BlackLight's hash cracker (2,456,288)

- .:Shell-Storm.org:. | DataBase MD5 | ( The data base currently contains 169582 passwords )

- Parallels Confixx (Need Account)

- Passwords recovery - MD5, SHA1, MySQL (Register to increase your priority)

- md5ÔÚÏß²éѯÆƽâ|md5½âÃÜ|md5¼ÓÃÜ|salt

- Hashkiller.com

- plain-text.info

- insidepro.com

- md5decrypter.co.uk

- c0llision.net

- md5pass.info

- hashcrack.com

- generuj.pl

- authsecu.com

- md5decryption.com

- chwett.com/md5

- md5this.com

- tmto.org

- kerinci.net

- hash.db.hk

- crackfor.me

- md5hood.com

- neofusion.de

- md5.shalla.de

- md5.my-addr.com

- hashcracking.info <-- API: https://hashcracking.info/check.php?hash= {hash}

- md5.opencracking.info

- md5online.net

- macrosoftware.ro/md5

- netmd5crack.com

- bokehman.com

- hash-database.net

- thoran.eu

- md5-database.net

- web-security-services.com

- bitdelivery.net



-----------------------------------------------------------------
CRACKED PASSWORD LIST
-----------------------------------------------------------------
www.md5oogle.com
[ md5 crack password crack hash checker ]
milw0rm.com - free md5/lm hash cracking
darkc0de.com [ index ]

-----------------------------------------------------------------
MULTI
-----------------------------------------------------------------
md5cracker.org
md5.igrkio.info
hashkiller.com
hashchecker.de
sinhalayo159.07x.net


-----------------------------------------------------------------
IRC
-----------------------------------------------------------------
plain-text.info (irc.Plain-Text.info #rainbowcrack |||| irc.rizon.net #rainbowcrack)
md5.overclock.ch (irc.rizon.net #md5)
c0llision.net (irc.after-all.org #md5crack |||| ircd.hopto.org #md5crack)



-----------------------------------------------------------------
ICQ
-----------------------------------------------------------------
c0llision.net (427-921-047) <- md5, ntlm
hashkiller.com (405-701-776) <- md5



-----------------------------------------------------------------
LM
-----------------------------------------------------------------
lmcrack.com
plain-text.info


-----------------------------------------------------------------
NTLM
-----------------------------------------------------------------
plain-text.info
md5decrypter.co.uk


-----------------------------------------------------------------
SHA1
-----------------------------------------------------------------
md5.rednoize.com
hash.db.hk
md5decrypter.co.uk


-----------------------------------------------------------------
SHA256
-----------------------------------------------------------------
md5.shalla.de
hash.db.hk


-----------------------------------------------------------------
RAINBOW TABLE
-----------------------------------------------------------------
Free Rainbow Tables » Distributed Rainbow Cracking » LM, NTLM, MD5, SHA1, HALFLMCHALL, MSCACHE
Rainbow Tables . net

Tabnabbing: A New Type of Phishing Attack


Tabnabbing: A New Type of Phishing Attack

The web is a generative and wild place. Sometimes I think I missed my calling; being devious is so much fun. Too bad my parents brought me up with scruples.
Most phishing attacks depend on an original deception. If you detect that you are at the wrong URL, or that something is amiss on a page, the chase is up. You’ve escaped the attackers. In fact, the time that wary people are most wary is exactly when they first navigate to a site.
What we don’t expect is that a page we’ve been looking at will change behind our backs, when we aren’t looking. That’ll catch us by surprise.

How The Attack Works

  1. A user navigates to your normal looking site.
  2. You detect when the page has lost its focus and hasn’t been interacted with for a while.
  3. Replace the favicon with the Gmail favicon, the title with “Gmail: Email from Google”, and the page with a Gmail login look-a-like. This can all be done with just a little bit of Javascript that takes place instantly.
  4. As the user scans their many open tabs, the favicon and title act as a strong visual cue—memory is malleable and moldable and the user will most likely simply think they left a Gmail tab open. When they click back to the fake Gmail tab, they’ll see the standard Gmail login page, assume they’ve been logged out, and provide their credentials to log in. The attack preys on the perceived immutability of tabs.
  5. After the user has entered their login information and you’ve sent it back to your server, you redirect them to Gmail. Because they were never logged out in the first place, it will appear as if the login was successful.
I dub this new type of phishing attack “tabnabbing”.




Targeted Attacks

There are many ways to potentially improve the efficacy of this attack.
Using my CSS history miner you can detect which site a visitor uses and then attack that site (although this is no longer possible in Firefox betas). For example, you can detect if a visitor is a Facebook user, Citibank user, Twitter user, etc., and then switch the page to the appropriate login screen and favicon on demand.

[*] Think looking for the exact error thrown when embedding <script src=”http://gmail.com”/> it will be differ depending on if the user is logged in or logged out.

Even more deviously, there are various methods to know whether a user is currently logged into a service. These methods range from timing attacks on image loads, to seeing where errors occur when you load an HTML webpage in a script tag*. Once you know what services a user is currently logged in to, the attack becomes even more effective.
You can make this attack even more effective by changing the copy: Instead of having just a login screen, you can mention that the session has timed out and the user needs to re-authenticate. This happens often on bank websites, which makes them even more susceptible to this kind of attack.

 

Attack Vector

Every time you include a third-party script on your page, or a Flash widget, you leave yourself wide open for an evil doer to use your website as a staging ground for this kind of attack. If you are the evil doer, you can have this behavior only occur once in a while, and only if the user uses a targeted service. In other words, it could be hard to detect.
You can also use a cross-site scripting vulnerabilities to force the attack to be performed by other websites. And for browsers that do not support changing the favicon, you can use a location.assign call to navigate the page to a controlled domain with the correct favicon. As long as the user wasn’t looking at the tab when the refresh occurred (which they won’t be), they’ll have no idea what hit them. Combine this with look-alike Unicode domain names and even the most savvy user will have trouble detecting anything is amiss.

 

Try it Out

You can try it out on this very website (it works in all major browsers). Click away to another tab for at least five seconds. Flip to another tab. Do whatever. Then come back to this tab.
It’s hard to find, isn’t it? It looks exactly like Gmail. I was lazy and took a screenshot of Gmail which loads slowly. It would be better to recreate the page in HTML.

Update: Many people have reported that the attack doesn’t change the favicon in Chrome. This was due to a bug in Chrome which has been fixed in the version 6.0.408.1. Chrome is fully susceptible to this attack.
You can get the source code here: bgattack.js.

 

The Fix

This kind of attack once again shows how important our work is on the Firefox Account Manager to keep our users safe. User names and passwords are not a secure method of doing authentication; it’s time for the browser to take a more active role in being your smart user agent; one that knows who you are and keeps your identity, information, and credentials safe.

Havij v1.14 Advanced SQL Injection

 

Description:

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.
It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.
The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.
The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

What’s New?

  • Sybase (ASE) database added.
  • Sybase (ASE) Blind database added.
  • Time based method for MsSQL added.
  • Time based method for MySQL added.
  • mod_security bypass added.
  • Pause button added.
  • Basic authentication added
  • Digest authentication added.
  • Post Data field added
  • bugs related with dot character in database name fixed
  • syntax over writing when defined by user in blind injections fixed.
  • mssql database detection from error when using JDBC driver corrected.
  • time out bug in md5 cracker fixed.
  • default value bug fixed
  • string encode bug fixed in PostgreSQL
  • injecting URL rewrite pages added.
  • injecting into any part of http request like Cookie, User-Agent, Referer, etc made available
  • a bug in finding string column fixed. (specially for MySQL)
  • Finding columns count in mysql when input value is non effective added.
  • window resize bug in custom DPI setting fixed.
  • some bugs in finding row count fixed.
  • getting database name in mssql error based when injection type is guessed integer but it’s string fixed.

Features:


How to use

This tool is for exploiting SQL Injection bugs in web application.
For using this tool you should know a little about SQL Injections.
Enter target url and select http method then click Analyze.
Note: Try to url be valid input that returns a normal page not a 404 or error page.

What Is Doxing? - Doxing And It's Uses

First, let me explain what Doxing is. Doxing is the process of gaining information about someone or something by using sources on the Internet and using basic deduction skills. Its name is derived from “Documents” and in short it is the retrieval of “Documents” on a person or company.

You’re probably thinking, “Okay, so basically it’s getting information from searching someone’s email on Google right?” in a sense yes, but there are actually easier ways to get someone’s information online. The most popular and most common method is to use a website called Pipl (http://www.pipl.com/). Pipl allows you to search for full names, emails, usernames, and even phone numbers, thus making it a very useful tool for hackers. Another source hackers can use is Facebook (http://www.facebook.com). Sure, Facebook allows full name searches, but most hackers aren’t using it for its name search; they’re using it for its email search.

The main goal when Doxing is to find the target’s email (if you don’t have it). Your email is essentially your passport online; you sign up for websites using it, you have personal information on it, and if someone has access to it, they can essentially pretend to be you online. Once the hacker has the email, all he has to do is put it into Facebook or Pipl and he will be able to find you, assuming the email he has is connected to some account you have online. On the flipside of this, in order to find your email, the hacker either has to guess your email, befriend you on Facebook,or, hack one of your vulnerable friends and view your email that way. Once he’s done that, you’re in trouble.

Now, you’re probably thinking, “How’s he going to hack me with just my email?” well, that’s where Doxing comes in handy. If he can view your Facebook account, or he can find some other bit of information about you using Pipl, he can do what’s called reverting. Reverting is the process of using the target’s email’s recovery questions to gain access to the target’s email. Now, you may be thinking, “How’s he gonna guess my recovery question answers?” well, take a second look at your recovery questions and ask yourself, “Can someone find this answer online?” If you answered yes, then you’re vulnerable to reverting.
Any hacker reading this, that didn't previously know about reverting, would probably look at this and say

This would never work!” but you have to remember… we’re all humans, and we all make mistakes. Surprisingly, this method works more often than you’d think, but it is not for anyone who is lazy. Doxers tend to spend a while searching around the web for information that they can use.

Chances are, you’ve made some mistakes online, and if a skilled Doxer finds that mistake, then you’re in trouble. The Doxing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “The more you know about your target, the easier it will be to find his or her flaws.”

How can you insure that you won’t be Doxed?
Well, as the Internet becomes more and more useful and addicting, it will become harder to not get Doxed. The main issue for most victims is their security questions, and their password security. If a victim has a very easy-to-find recovery question, then the victim will be easily reverted within a matter of seconds. Also, if the victim has a simple password, it could get brute forced simply by using a wordlist that applies to the victim’s interests, likes, and fancies (of course, this method is not as popular).

So, the main rule to not getting hacked is: Have secure passwords, and almost impossible to guess recovery questions. The main rule to not getting Doxed is… to just stay off the Internet; but, who wants to do that?

//http://www.rafayhackingarticles.net

Exploitsearch.net - Exploit & Vulnerability Search Engine


This is a online search for currently utilizing data from NVD, OSVDB, SecurityFocus, Exploit-DB, Metasploit, Nessus, OpenVAS, and PacketStorm.Well search engine does the work but this is a specific search engine for better results. There not much to write about just visit the site and all your queries will be answered.
VISIT : http://www.exploitsearch.net/

How To Access The Hidden WIKI?

How To Access The Hidden WIKI?

Easy tutorial video here. I suggest watching it! : http://lnk.co/I1EBH

THIS IS LONG, BUT WORTH THE READ.

For those who don't know, the deep web represents a gargantuan part of the internet which is not accessible through regular searches via google or other search engines.

Searching on the Internet today can be compared to dragging a net across the surface of the ocean. While a great deal may be caught in the net, there is still a wealth of information that is deep, and therefore, missed. The reason is simple: Most of the Web's information is buried far down on dynamically generated sites, and standard search engines never find it.

Here are some facts on The Deep Web:

· Public information on the deep Web is currently 400 to 550 times larger than the commonly defined World Wide Web.

· The deep Web contains 7,500 terabytes of information compared to 19 terabytes of information in the surface Web.

· The deep Web contains nearly 550 billion individual documents compared to the 1 billion of the surface Web.

· More than 200,000 deep Web sites presently exist.

· Sixty of the largest deep-Web sites collectively contain about 750 terabytes of information — sufficient by themselves to exceed the size of the surface Web forty times.

· The deep Web is the largest growing category of new information on the Internet.

· Deep Web sites tend to be narrower, with deeper content, than conventional surface sites.

· Total quality content of the deep Web is 1,000 to 2,000 times greater than that of the surface Web.

· Deep Web content is highly relevant to every information need, market, and domain.

· More than half of the deep Web content resides in topic-specific databases.

· A full ninety-five per cent of the deep Web is publicly accessible information — not subject to fees or subscriptions.

What lies beneath the surface is a who's who of hackers, scientists, drug dealers, astronomers, assassins, physicists, revolutionaries, Government officials, Police, Feds, terrorists, perverts, data miners, kidnappers, sociologists, etc. As you can tell, the party goes across the entire moral spectrum.

I find this subject to be utterly fascinating which needs to be studied further. Whilst there are tons of bad seeds who inhabit this deep web, there's also good seeds who wish to spread their information quickly and most often anonymously, to avoid legal or ethical ramifications.

In order to access the deep web you use the Tor browser in addition to the Tor extension for Firefox. This is a good starting point.

And then access the Hidden Wiki which is a small but useful reference point to start on your journey of the deep web. kpvz7ki2v5agwt35.onion

They got folks who literally can go toe to toe with Anon on there. Dudes who are really dangerous in the sense they are near omnipotent. This is where the serious computer viruses are made and where plots are made. They have security viruses and everything.

SCREENSHOT OF THE HIDDEN WIKI: http://i.imgur.com/Xq7ih.png

The reason the "Deep Web" is the way it is is because only about 10 percent of what's on the internet is generally/commercially interesting. Sure you could dig deep into the annals of the information superhighway but most if it is raw information. It's not packaged and easily digestible like stumbleupon or tumblr. They are websites that purposely don't get pinged to search engines so they are harder to find.

To sum it up, it's basically a private section of server space to share data off record. All that wiki leaks stuffed that leaked a couple months back? That's been on deep web for years. Ever seen a movie and see the bad guy or hacker loggin' into some weird looking private server? that's all real. Generally, terrorist networks, spy agencies, drug dealers, assassins-for-hire, and those looking for child porn lurk around those parts. There's a Hidden Wiki, there, and on the wiki they're categories of links. There are things like blogs, forums (from normal to revolutionary to blatantly illegal), Tor-enabled instant messaging and chat, anonymous file hosting, anonymous financing, anonymous tipping and information exchanges, information on computer security/anonymity, info on warez/cracks/hacking, all the books, music, movies you can possibly imagine, even links to sports betting and trade information, links to international drug markets, prostitution rings, assassin markets, black market products, child pornography, Some of societies most deviant people use this network. Not just those that browse the sites on there but also those who create it and manage them..and it's almost impossible to find either of the offenders.

Even underground fighting tournaments to the death (I'm not joking very real very organized). Very Real trained professional fighters. It may seem surreal but they are guys that train with the best and want no part of UFC or any fight league. Dudes who really enjoy fighting to the death. It's just crazy explaining it it's not some barroom brawl. These things happen and alot of millionaires pay big money to see them. Modern Gladiator battles. I heard there are some with humans vs animals.

However, 0.00000001% of all data on the dark web is stuff normal people will be able to access, understand and use. And even a small fraction of that is illegal stuff.. its not like some hardcore underground network of spies, killers, pedos and criminals. The rest % is used by their respected authorities.

Don't be an idiot and start clicking on links you see on the hiddenwiki, but poke your head in the door you'll see its not modern anarchy in there.

While the information on the deep web is vastly overwhelming, it should not be feared. In most aspects, the information is just there, it's what you choose to do with the information that can lead you to trouble and imprisonment. Producing, storing, exchanging, transferring information.

Before you begin I suggest learning how the deep web works and what you can do to better protect yourself against intruders and anything that can compromise your true anonymity

I'll post how to get on the Hidden Wiki next.


Here is a screenshot of a typical source in the Deep Web: http://i56.tinypic.com/241wnj5.png.

This is like some post apacolyptic world where they only accept the bizarre currency bitcoins and all the websites look like they are from 1990's era geocities.

BTC's are the deep web's form of currency.. bitcoins.
This **** is hilarious, bizarre, and terrifying..
half the time the sites dont work and result in the most cryptic jargon filled errors. the other half, you wait ten minutes for it to load only to see something which shocks you because of how serious it is. this is where the hackers hang out. The can use your own webcam to spy on you. (srs)

I know what you're thinking some of the best hackers around and the server is slow as. The servers are probably used to a pretty small amount of traffic. With the attention deep web has got from niketalk and anon. in the last few days they are probably struggling a bit I reckon. Could be wrong on that but basically patience is a necessity in the deep web.

Now I'm just a cog in the machine. A really big machine. And really just relaying information found on other fora as mentioned already. I'm just trying to find people that are in it already. I want to know what they're saying on current events, Libya, Nasa investigation on that metorite, higher alien life forms, where Adrian Wojnarowski gets his trade information from etc

While the information on the deep web is vastly overwhelming, it should not be feared. In most aspects, the information is just there, it's what you choose to do with the information that can lead you to trouble and imprisonment. Producing, storing, exchanging, transferring information.

Before you begin I suggest learning how the deep web works and what you can do to better protect yourself against intruders and anything that can compromise your true anonymity

Here, you can read up more about the deep web: http://en.wikipedia.org/wiki/Deep_web

This has information on what the .onion network is and how it works: http://en.wikipedia.org/wiki/.onion

Here is where you can read up on TOR: http://en.wikipedia.org/wiki/Tor_(anonymity_network)


GUIDE TO GET ON DEEP WEB

From there, you can get the tor bundle at https://www.torproject.org/download/...d-easy.html.en

Click Start Tor Browser once you have completed the steps.

Firefox will open up with this as the main page

From there, you are now somewhat anonymous and can now access .onion and the hidden web.

Keep in mind that Tor is not 100% anonymous...multiple proxies are needed in addition to tor, of course a firewall and Antivirus as well. I'd disconnect or put tape over my webcam , disable javascript cookies, temp data, use ccleaner...

Hope this helped.


//source: https://thebotnet.com/guides-and-tutorials/49828-how-to-access-the-hidden-wiki/

Maksud Blue Screen

Dapat dari forum devilc0dez.amat berguna information nih.
Selalu terjadi bluescreen tapi kita tatau apa reason..so ni pnjelasannya.




Code:
1. IRQL_NOT_LESS_OR_EQUAL (0X0000000A)
Error yang selalu muncul kalau BlueScreen.
Sebab terjadi;
- driver corrupt atau tak sesuai
- problem pada video card.mungkin video card telah dioverclock terlampau. atau baru tukar video card baru tapi terlupa uninstall driver yg lame dari chipset yg berlainan
- problem pada audio card. terdapat kesalahan config atau bug pada driver sound card anda

Code:
2. NTFS_FILE_SYSTEM atau FAT_FILE_SYSTEM (0X00000024) atau (0X00000023)
- Problem kt partition atau file sistem tapi bukan kat harddisk.
- boleh cek samada kabel yg digunakan SATA or PATA or guna je tool chkdsk

Code:
3. UNEXPECTED_KERNEL_MODE_TRAP (0X0000007F)
Reason dapat error nih
- overclock hardware berlebihan
- ada komponen komputer yg panas
- BIOS corrupt
- Memory dan CPU yg kurengg

Code:
4. DATA_BUS_ERROR
- kemungkinan terjadi sbb memory atau memory slot kt motherboard telah rosak


Code:
5. PAGE_FAULT_IN_NONPAGED_AREA
- possibility ada kerosakan hardware tmasuk memory utama,memory video card atay memory di processor (L2 Cache)

Code:
6. INACCESSIBLE_BOOT_DEVICE
- terdapat masalah atau kesalahan config dalam jumper harddisk,virus boot sector,driver IDE controller yg salah or salah driver chipset.

Code:
7. VIDEO_DRIVER_INIT_FAILURE
- error ini berkemungkinan ada kesilapan masa installation driver video card contoh install xlengkap,restart b4 complate installation or driver tu sdri problem

Code:
8. BAD_POOL_CALLER
- ini ada masalah dengan driver yg xsesuai..selalu terjadi bila install XP semasa upgrade

Code:
9. PEN_LIST_CORRUPT
- possibility RAm rosak

Code:
10. MACHINE_CHECK_EXCEPTION
- ada problem dengan CPU
- overclock yg agresif
- power supply yg dah nazak or rosak


kredit to lintang27 dari devilc0dez dan BinusHacker

Universal USB Installer - Easy Way to Make Bootable USB

I want to share with all how to make USB bootable linux using Universal USB Installer.

What you need?
- Any Linux image(.iso) that you want to make it bootable using USB.
- Flashdrive,thumbdrive minimum with 1Gb size.
- And make sure your PC have the USB port :)

How to use?

1 - Download the installer from here

http://www.pendrivelinux.com/downloads/Universal-USB-Installer/Universal-USB-Installer-1.8.3.5.exe

2 - After that, just run the file.
a) I agree. Then choose your preferred.
b) find the location to the image.
c) In my case, the installer cant detect my image's location automatically,so I just put the full path manually in the location box. As example I put my Fedora at Desktop. So the full path will be
C:\Users\p0pc0rn\Desktop\Fedora-14-i686-Live-Desktop.iso

3 - Then choose your USB Drive. Tick format so it will format your USB to FAT32.

4 - And then you just need to wait until it complete.

Have a try! :)

credit to : http://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/

other recommended software
- unetbootin
- linuxliveusb

H0w2D0x???



Although this may not be Social Engineering, its good to know if you plan on d0xing or using someones info to possibly social engineer information or items from said person.

1. Pipl (great for searching people around the world)
http://pipl.com/
What does it do: Pipl is also one of the best free people search engines. Gets data from various sources and displays them on one page where you can see online profiles, blog posts that person made, archives and other valuable information.

2. AddressSearch
http://addresssearch.com/
What does it do: This is a pretty new people search service. You can search by name and find the email of someone. However, there’s a (nice) catch: you cannot view the full email but can always send a message to the person via their system. The best thing: unlike many of the sites here, this one is (so far) 100% free.

3. Facebook Friend Search and Friend Browser (login required)
https://www.facebook.com/srch.php
What does it do: Facebook is free to search and also free to register (I bet you didn’t know this). They recently introduced a new feature called “Friend Browser” (link above, you need to be logged in to access this feature) where you can easily find friends from high school, your previous workplace and so on. You can also use the standard “Friend Search” (first link above) and browse over 500 million active members.

4. KGBPeople
http://www.kgbpeople.com/search-settings
What does it do: KGBPeople is a very robust engine for finding people and their social networking accounts, web data, pictures and so on.

5. Tweepz
http://tweepz.com/
What does it do: Search for people on Twitter by name, profession, religious background and many other criteria. Twitter grows every day and so the number of people registered there.

6. Spokeo
http://www.spokeo.com/
What does it do: Spokeo supports locating individuals by name and username. Unfortunately, searching by phone and email is not free (but there are many othere which do that!)

7. Lullar (great for reverse email lookup)
http://com.lullar.com/
What does it do: Lullar is a seldom-known reverse email and username search engine. They have a good ability to do a reverse email lookup (using the 16 most popular social networking sites) and there isn't any free website doing a better job on this.

8. Username Check
http://checkusernames.com/
What does it do: If you know that the person you’re searching for has an unique username you can use this tool to search by that criteria and see where is he registered. Browses over 160 social networks.

9. TinEye
http://www.tineye.com/
What does it do: With TinyEye you can search by PICTURE. Yeah, seriously. If you have a picture of a person and you want to see where that picture appears elsewhere on the web this is a great tool. They currently index 1 billion images and although this is a very small portion of the web but the index grows rapidly every month. Use this tool only if you have a lot of pictures of the individual.

10. Yasni
http://www.yasni.com/
What does it do: Yasni is a mind-blowing resource that you can use to find people by name. Pretty decent resource.
Find Classmates & Workplace and Military Friends

11. Jigsaw
http://www.jigsaw.com/
What does it to: Do you know where the person you’re looking for was/is currently working at? In that case, you can use Jigsaw (which is probably the biggest business directory) to search by company and find that person’s phone number.

12. Alumni.net
http://www.alumni.net/
What does it do: Alumni provides a list of alumni websites all over the world to help find your classmates. It is the biggest website on the internet of its kind. Often updated with current information on individuals.

13. Classmates
http://www.classmates.com/
What does it do: Classmates is a big people search engine to help you find your friends from college, workplace and military.

14. ZoomInfo
http://www.zoominfo.com/
What does it do: Zoominfo will search for large range of employees for different companies. Use this site to find professionals and workplace friends.


Find People using White Pages Directories

15. White Pages
http://www.whitepages.com/
What does it do: White Pages is the most popular directory to search for a person’s address and phone numbers. You can also do a reverse phone and address search so if you know the address or the phone, you can easily find the name.

16. AnyWho
http://www.anywho.com/whitepages
What does it do: Although it has a smaller database to WhitePages, it contains some information about people that White Pages does not currently have. Use them in a combination.

17. ZabaSearch
http://www.zabasearch.com/
What does it do: This is a bit of a different website than the previous two. Here you can also find addresses and phone numbers like in Anywho and Whitepages. Sometimes they display different data than White Pages, but that is not often.


Find Maiden Names and Relatives

18. PeopleFinders.ws
http://www.people-finders.ws/processor.asp
What does it do: If you go on PeopleFinders.ws and start searching, you’ll find the potential relatives of the person you’re looking for and their approximate age. You will also see the possible roommates/associates. Powerful stuff.

19. US Search
http://www.ussearch.com/consumer/index.jsp
What does it do: This is a website for background checks *(not free)*. However there are some excellent free functions they provide. If you type a person’s name, in the results you’ll see previous names of the person. Often if you’re looking for a married female you can find her maiden name this way (or if you don’t know her married but know the maiden name.) You will also see previous locations.

Find People using Public Records

20. Public Records Finder
http://www.publicrecordfinder.com/
What does it do: If you scroll down below you’ll see a list of public records by state. There you have thousands of websites that provide free public records.

21. Infobel
http://www.infobel.com/en/world/index.aspx
What does it do: Infobel is by far the world’s largest directory of white pages resources. Use it for international people search.

22. Ancestry – Social Security Death Index
http://search.ancestry.com/search/db.aspx?dbid=3693
What does it do: Search people by their social security number and see if they’re still alive. Or you can use this search engine to find deceased people and do further research.

23. Criminal Searches
 http://www.criminalsearches.com/
What does it do: This was the only free criminal records engine. You can search for a person and see if they has a criminal record.
Find People Using General Search Engines

24. Google People Search
http://websearch.about.com/od/peoplesearch.htm
What does it do: You can use Google to enter a phone number (this is only for United States) and it will give you the owner of that number. You can also search for a person using Google. Just make sure you surround the first and last name in quotes. So, write “John Smith” instead of John Smith.

25. Yahoo People Search
http://people.yahoo.com/
What does it do: Yahoo uses their search engine to find people for you. It is a great resource.

26. You Get Signal
http://www.yougetsignal.com/
What does it do: Network location tools, Reverse IP, Whois lookup. You name it, they got it.

Wednesday 13 February 2013

Kilobytes(KB), Megabytes (MB), Gigabytes (GB), Terabytes (TB) and more..

Megabytes (MB), Gigabytes (GB), Terabytes (TB)
- Istilah yang biasanya digunakan dalam dunia pengkomputeran untuk
menerangkan ruang cakera keras atau ruang simpanan data dan sistem
memori.

Jika beberapa tahun lalu Megabyte (MB), namun kini Gigabyte (GB) adalah
istilah yang biasa digunakan untuk menerangkan saiz atau kapasiti ruang
cakera keras (hardisk). Tidak lama lagi, Terabyte (TB) pula akan menjadi satu istilah yang biasa bagi pasaran hardisk pada masa akan datang.

Berikut ialah jadual/carta pengiraan bagi menerangkan perbezaan antara Bit, Byte, Kilobyte, Megabytes, Gigabytes dan Terabytes:

Disk Storage
  • 1 Bit = Binary Digit
  • 8 Bits = 1 Byte
  • 1000 Bytes = 1 Kilobyte
  • 1000 Kilobytes = 1 Megabyte
  • 1000 Megabytes = 1 Gigabyte
  • 1000 Gigabytes = 1 Terabyte
  • 1000 Terabytes = 1 Petabyte
  • 1000 Petabytes = 1 Exabyte
  • 1000 Exabytes = 1 Zettabyte
  • 1000 Zettabytes = 1 Yottabyte
  • 1000 Yottabytes = 1 Brontobyte
  • 1000 Brontobytes = 1 Geopbyte

Processor or Virtual Storage
  • 1 Bit = Binary Digit
  • 8 Bits = 1 Byte
  • 1024 Bytes = 1 Kilobyte
  • 1024 Kilobytes = 1 Megabyte
  • 1024 Megabytes = 1 Gigabyte
  • 1024 Gigabytes = 1 Terabyte
  • 1024 Terabytes = 1 Petabyte
  • 1024 Petabytes = 1 Exabyte
  • 1024 Exabytes = 1 Zettabyte
  • 1024 Zettabytes = 1 Yottabyte
  • 1024 Yottabytes = 1 Brontobyte
  • 1024 Brontobytes = 1 Geopbyte

Kenali USB & Jenisnya

 
USB atau nama penuhnya Universal Serial Bus. USB
dibangunkan pada pertengahan 1990-an. USB direka bentuk untuk
menyeragamkan semua peralatan yang disambungkan pada sesebuah komputer
seperti papan kekunci (keyboard), tetikus (mouse), kamera digital,
telefon dan lain-lain. Sebagai contoh jika dahulu beberapa perkakasan
komputer menggunakan port jenis PS/2 dan kini ianya telah diseragamkan
bagi menjimatkan ruang. Pembangunan USB ini bermula apabila 7 syarikat
iaitu Compaq, DEC, IBM, Intel, Microsoft, NEC dan Nortel yang bertujuan
untuk menyeragamkan kesemua sambungan peranti kepada komputer. Dan
sehingga hari ini terdapat 3 versi USB iaitu USB 1.0, USB 2.0, dan USB
3.0.
[Image: Ps-2-ports.jpg?resize=400%2C150]
Contoh Port PS/2
USB 1.0


[Image: usb.png?resize=374%2C126]

USB 1.0 diperkenalkan pada Januari 1996. Pada versi ini, kadar permindahan data
sebanyak 1.5 MBit/s untuk kelajuan rendah (Low Speed) dan
12Mbit/s untuk kelajuan tinggi (Full Speed).
Untuk versi ini ianya agak terhad dan terbatas. Akhirnya pada September
1998
, USB 1.1 diperkenalkan secara meluas dan telah dapat mengatasi
masalah yang terdapat pada versi sebelum ini. Untuk versi kelajuan
tinggi, ianya digunakan untuk peranti berkelajuan tinggi seperti pemacu
cakera keras (Hard Disk Drive), dan kelajuan rendah untuk
peranti seperti joystick. Dan bermula dari saat ini, tujuan
menyeragamkan untuk sambungan perkakasan komputer telah hampir
sepenuhnya berjaya.

USB 2.0
[Image: usb2.0.jpg?resize=400%2C187]

Selepas hampir 2 tahun iaitu pada April 2000, Hewlett-Packard, Intel,
Lucent Technologies (now Alcatel-Lucent), NEC dan Philips bersama
mengetuai inisiatif untuk membangunkan USB yang mempunyai kadar
permindahan data lebih tinggi. Untuk versi 2.0, mereka berjaya
meningkatkan sehingga 40 kali ganda kadar pemindahan data berbanding
versi USB 1.1. Untuk versi 2.0, ianya mencapai kadar pemindahan data
sebanyak 480Mbit/s atau 60MB/s
. USB 2.0 terus berkembang pada Disember
2006
kerana berjaya berhubung dari satu peranti kepada peranti lain
tanpa menggunakan host utama dan ianya dikenali sebagai USB On-The Go.
Pada tahun berikutnya (Mac 2007) USB 2.0 memperkenalkan fungsi yang amat
berguna dengan membolehkan proses pengecasan berlaku. Dan pada saat
inilah kabel sambungan mikro-USB diperkenalkan. Dan semakan terakhir
untuk versi USB 2.0 dilepaskan pada Disember 2010 dan menetapkan kuasa
sebanyak 1.5A pada port pengecas untuk peranti yang tidak
dikonfigurasikan, membenarkan sambungan kelajuan tinggi disamping
mempunyai nilai arus sebanyak 1.5A dan kadar arus maksimum sebanyak
5.0A
.

USB 3.0
[Image: usb3.0.png?resize=400%2C210]

USB 3.0 telah diperkenalkan sejak
November 2008
. Spesifikasi ini membenarkan kadar pemindahan data pada
kadar maksimum iaitu sehingga 5Gbit/s atau 635MB/s)
. Dengan kadar
pemindahan data itu, ianya mengurangkan tempoh penghantaran data dan
penggunaan kuasa. Untuk versi 3.0 ini, ianya dikenali sebagai
SuperSpeed”. Port untuk USB 3.0 kelihatan sama seperti port USB 2.0,
tetapi untuk versi 3.0 ianya menggunakan 9 pin berbeza dengan versi 2.0
yang hanya menggunakan 4 pin
. USB 3.0 dapat beroperasi dalam mode
full-duplex (USB 2.0 – half-duplex), dimana proses memuat naik data dan
memuat turun data dapat dilakukan serentak tanpa merendahkan kadar
pemindahan data. Pada permulaannya, Intel dan Apple tidak menggunakan
USB 3.0 ini sehingga tahun 2011 dan akhirnya apabila 2 syarikat besar
ini menggunakan USB 3.0 pada peranti mereka ianya telah berkembang
dipasaran hingga ke hari ini.
Untuk maklumat semua, USB 3.0 masih
boleh digunakan pada port 2.0 dan vice versa tetapi kadar pemindahannya
terhad. Selain dari itu, penggunaan USB 3.0 mempunyai masalah pada
driver
dan Windows 7 yang secara amnya tidak menyokong USB 3.0. Tetapi,
untuk versi Windows 8 ianya menyokong USB 3.0 sepenuhnya. Jadi disini
aku sarankan pada mereka yang mahu membeli laptop/peranti komputer,
pastikan ianya berkemampuan menyokong USB 3.0 kerana satu hari nanti
ianya akan digunakan secara meluas.

Tips 100+ Collection of Useful Website


0

1. screenr.com – merakam filem dari desktop anda dan menghantarnya terus ke YouTube.
02. bounceapp.com – untuk menangkap screenshot panjang penuh laman web.
03. goo.gl – memendekkan URL yang panjang dan menukar URL ke kod QR .
04. untiny.me – mencari URL asli yang bersembunyi di balik URL pendek.
05. localti.me – tahu lebih daripada sekadar waktu bandar tempatan
06. copypastecharacter.com – copy aksara khas yang tidak pada keyboard anda.
07. topsy.com – sebuah mesin carian yang lebih baik untuk twitter.
08. fb.me / AppStore- IOS app carian tanpa melancarkan iTunes.
09. iconfinder.com – tempat terbaik untuk mencari ikon dari semua saiz.
10. office.com – download template, clipart dan gambar untuk Office dokumen anda.
11. woorank.com – semua yang anda ingin tahu tentang sebuah website.
12. virustotal.com – scan setiap fail yang mencurigakan atau lampiran e-mel untuk virus.
13. wolframalpha.com – mendapat jawapan terus tanpa mencari.
14. printwhatyoulike.com – laman web cetak tanpa kekacauan.
15. joliprint.com – berita-format dan kandungan blog sebagai akhbar.
16. isnsfw.com – ketika anda ingin berkongsi laman NSFW tapi dengan amaran.
17. e.ggtimer.com- timer online sederhana untuk keperluan sehari-hari anda.
18. coralcdn.org- jika sebuah laman sedang down karena lalu lintas yang padat, cuba akses melalui CDN karang.
19. random.org- memilih nombor rawak, syiling flip, dan banyak lagi.
20. mywot.com- menyemak tahap kepercayaan dari setiap laman web
21. viewer.zoho.com – Preview PDF dan Presentasi langsung di browser.
22. tubemogul.com – bersamaan upload video ke YouTube dan halaman video lainnya .
23. truveo.com – tempat terbaik untuk mencari video web.
24. scr.im – berkongsi alamat e-mel anda secara online tanpa bimbang tentang spam.
25. spypig.com – SpyPig adalah sistem pengesanan email sederhana yang menghantar notis melalui e-mel apabila penerima membuka mesej anda.
26. sizeasy.com – memvisualisasikan dan membandingkan saiz dari setiap produk.
27. whatfontis.com – dengan cepat menentukan nama font dari sebuah gambar.
28. fontsquirrel.com – koleksi baik fon – percuma untuk kegunaan peribadi dan komersial.
29. regex.info- mencari data tersembunyi dalam foto anda .
30. tineye.com- ini adalah seperti versi online dari Google Googles.
31. iwantmyname.com- membantu anda mencari domain di seluruh TLD.
32. tabbloid.com – blog kegemaran anda dihantar sebagai PDF.
33. join.me – berkongsi skrin anda dengan siapapun melalui web.
34. onlineocr.net – mengenali teks dari scan PDF dan gambar – lihat yang lain perkakas OCR .
35. flightstats.com – Tracking status penerbangan di lapangan terbang di seluruh dunia.
36. wetransfer.com- untuk berkongsi benar-benar fail-fail besar dalam talian.
37. pastebin.com- clipboard online sementara untuk teks anda dan potongan kod.
38. polishmywriting.com – cek tulisan anda untuk kesalahan ejaan atau tata bahasa.
39. awesomehighlighter.com – mudah menyerlahkan bahagian-bahagian penting dari suatu laman web.
40. typewith.me – bekerja pada dokumen yang sama dengan beberapa orang.
41. whichdateworks.com- perancangan acara? mencari tarikh yang bekerja untuk semua.
42. everytimezone.com – membingungkan pandangan yang kurang dari zon waktu dunia .
43. warrick.cs.odu.edu – anda akan memerlukannya saat bookmark anda laman web akan dihapuskan .
44. gtmetrix.com – alat yang sempurna untuk mengukur anda prestasi laman online.
45. imo.im – bual dengan rakan-rakan-rakan anda di Skype, Facebook, Google Talk, dll dari satu tempat.
46. translate.google.com – menterjemah laman-laman web, PDF dan Office dokumen.
47. youtube.com / leanback – menikmati aliran tidak pernah berakhir video YouTube dalam skrin penuh.
48. similarsites.com – mencari tapak baru yang mirip dengan apa yang anda sukai sudah.
49. wordle.net – cepat potongan panjang meringkaskan teks dengan awan tag.
50. bubbl.us – membuat fikiran-peta idea-idea brainstorming, dalam pelayar.
51. kuler.adobe.com – mendapatkan idea-idea warna, juga ekstrak warna dari foto.
52. followupthen.com – setup cepat peringatan melalui e-mel itu sendiri.
53. lmgtfy.com- ketika teman-teman anda terlalu malas untuk menggunakan Google sendiri.
54. tempalias.com- menghasilkan alias e-mel sementara, lebih baik daripada e-mel pakai buang .
55. pdfescape.com – membolehkan anda dengan cepat boleh mengedit fail PDF dalam pelayar itu sendiri.
56. faxzero.com – menghantar faks online secara percuma .
57. feedmyinbox.com- mendapatkan RSS feed sebagai newsletter email.
58. isendr.com- memindahkan fail tanpa meng-upload ke server.
59. tinychat.com – setup ruangan chat peribadi di mikro-second.
60. privnote.com – membuat nota teks yang akan merosakkan diri sendiri setelah dibaca.
61. flightaware.com – untuk trace perkhidmatan penerbangan untuk lapangan terbang di seluruh dunia.
62. boxoh.com – mengesan status dari setiap penghantaran di Google Maps – alternatif .
63. chipin.com – ketika anda perlu untuk mengumpul dana secara online untuk sebuah acara atau penyebab.
64. downforeveryoneorjustme.com – mencari jika laman kegemaran anda sedang offline atau tidak?
65. example.com – website ini boleh digunakan sebagai contoh di dalam dokumentasi.
66. whoishostingthis.com – mencari web host dari setiap laman web.
67. google.com / sejarah – sesuatu yang ditemui di Google tetapi tidak dapat ingat sekarang?
68. errorlevelanalysis.com – mencari apakah imej yang nyata atau yang photoshopped.
69. google.com / kamus- mendapatkan erti kata, sebutan dan contoh penggunaan.
70. urbandictionary.com – mencari definisi slangs dan kata-kata formal.
71. seatguru.com – berunding dengan laman web ini sebelum memilih tempat duduk untuk penerbangan anda selanjutnya.
72. sxc.hu – stok foto download percuma.
73. zoom.it- pandangan yang sangat tinggi resolusi gambar di pelayar anda.
74. wobzip.org – unzip file tzip anda secara online.
75. vocaroo.com – merakam suara anda dengan klik.
76. scribblemaps.com – membuat Google Maps tersuai mudah.
77. buzzfeed.com – pernah ketinggalan meme lain Internet atau video virus.
78. alertful.com – setup email peringatan untuk acara penting.
79. encrypted.google.com- menghalang anda ISP dan bos dari membaca permintaan carian anda.
80. formspring.me- anda boleh bertanya atau menjawab soalan peribadi di sini.
81. snopes.com- mencari jika yang menawarkan e-mel yang anda terima itu nyata atau hanya scam yang lain.
82. typingweb.com – master sentuhan-menaip dengan sesi latihan.
83. mailvu.com – menghantar e-mel video ke siapa saja yang menggunakan cam web anda.
84. ge.tt- dengan cepat menghantar fail kepada seseorang, mereka dapat bahkan pratonton sebelum men-download.
85. timerime.com – membuat jadual dengan audio, video dan gambar.
86. stupeflix.com – Suntingan video secara online yang sangat cool dan best.
87. aviary.com / myna- audio editor online yang membolehkan rakaman, dan remix klip audio online.
88. noteflight.com – cetak lembaran muzik, menulis muzik sendiri secara online.
89. disposablewebpage.com – membuat laman web sementara yang merosakkan diri sendiri.
90. namemytune.com – apabila anda perlu untuk mencari nama sebuah lagu .
91. homestyler.com – desain dari awal atau kembali model anda rumah di 3d .
92. snapask.com – menggunakan e-mel di telefon anda untuk mencari skor sukan, baca Wikipedia, dll
93. teuxdeux.com-Jika anda membuat to do list tentu anda anda menyukai teuxdeux.com
94. livestream.com- siaran acara secara langsung melalui web, termasuk skrin desktop anda.
95. bing.com / gambar – secara automatik mencari sempurna berukuran wallpaper untuk telefon .
96. historio.us- memelihara laman web lengkap dengan semua format.
97. dabbleboard.com – papan tulis virtual anda.
98. whisperbot.com- menghantar e-mel tanpa menggunakan akaun anda sendiri.
99. sumopaint.com – gambar lapisan yang berpusat editor online yang sangat baik.
100. lovelycharts.com- membuat diagram alur, diagram rangkaian, peta laman web, dll
101. nutshellmail.com – Dapatkan Facebook dan Twitter di peti masuk anda.