Friday, 28 February 2014

Different Technologies & Their Founders.......

Different Technologies & 

Their Founders.......
























1. Google: Larry Page & Sergey Brin

2. Facebook: Mark Zuckerberg
3. Yahoo: David Filo & Jerry Yang
4. Twitter: Jack Dorsey & Dick Costolo
5. Internet: Tim Berners Lee
6. Linkdin: Reid Hoffman, Allen Blue & Koonstantin Guericke
7. Email: Shiva Ayyadurai
8. Gtalk: Richard Wah kan
9. Whats up: Laurel Kirtz
10. Hotmail: Sabeer Bhatia
11. Orkut: Buyukkokten
12. Wikipedia: Jimmy Wales
13. You tube: Steve Chen, Chad Hurley & Jawed Karim
14. Rediffmail: Ajit Balakrishnan
15. Nimbuzz: Martin Smink & Evert Jaap Lugt
16. Myspace: Chris Dewolfe & Tom Anderson
17. Ibibo: Ashish Kashyap
18. OLX: Alec Oxenford & Fabrice Grinda
19. Skype: Niklas Zennstrom,JanusFriis & Reid Hoffman
20. Opera: Jon Stephenson von Tetzchner & Geir lvarsoy
21. Mozilla Firefox: Dave Hyatt & Blake Ross
22. Blogger: Evan Willams

Thursday, 27 February 2014

HOW TO BECOME A HACKER

ON THE DEMAND OF OUR FANS How to
become a HACKER :-

---------------------------------
1. Learn TCP/IP, Basic Information gathering,
Proxies, Socks, SSL, VPN, VPS, RDP, FTP,
POP3, SMTP, Telnet, SSH.

2. Learn Linux, Unix, Windows - You can do
this using vmware or any virtual desktop
utility.

3. Learn a programming language that's
compatible with all OS - Perl, Python, C .

4. Learn HTML, PHP, Javascript, ASP, XML,
SQL, XSS, SQLI, RFI, LFI

5. Learn Reverse engineering and crack some
programs for serials easy ones like mirc,
winzip, winrar or old games.

6. Code a fuzzer for common protocols - ftp,
pop3, 80, 8080 - Pick some free software like
ftp server, mail server, apache or iis webserver
or a webserver all-in-one pack, or teamspeak,
ventrilo, mumble.

7. Code a tool that uses grep to sort out
unique code in source codes.

8. Make a custom IPtable, IPsec firewall that
blocks all incoming traffic and out going traffic
and add filters to accept certain ports that
your software or scripts use.

9. Pick a kernel in linux or unix, also pick a
Microsoft OS version lets say Winxp pro sp2
put them on the virtual desktops (vmware) and
find and code a new local exploit in those
versions, then install a Apache webserver on
the Linux/Unix and a IIS webserver on the
winxp pro and attempt to find and code a new
local reverse_tcp_shell exploit.

10. Learn Cisco Router and Switch
configuration and setup.

11. Learn Checkpoint Setup and Config

12. Learn Wifi scanning, cracking, sniffing.

13. Pick a person in you phonebook for the
area code you live in or city then ring the
person on a anonymous line like skype or a
payphone or a carded sim and attempt to
social engineer the person for his name,
address, data of birth, city born, country born,
ISP connected with, Phone company connected
with, What bank he/she uses and anything else
you can get. Then Attempt to ring using a
spoof caller ID software with the person's
phone number - call the ISP and try reset the
password to his/her internet connection/
webmail, get access to bank account or ask
them to send out a new *** to a new address
(drop) with a new pin, reset of phone company
passwords.

14. Use your information gathering skills to get
all the information off a website like a shop
then use the spoof callerID software or hack
your phone to show a new number of the
Webserver's Tech Support number then ring
the shop owner and try get the shop site
password.

15. Do the same thing but attempt to use a
web attack against a site or shop to gain
admin access.

16. Once got access upload a shell and
attempt to exploit the server to gain root using
a exploit you coded not someone else s
exploit.

17. Make your own Linux Distro

18. Use your own Linux Distro or use a vanilla
Linux gnome (not kde) keep it with not much
graphics so you can learn how to depend on
the terminal and start from scratch install
applications that you will only need for a
blackbox (Security test box), make folders for
fuzzers, exploits, scanners..etc Then load them
up with your own scripts and other tools ( By
this stage you shouldn't need to depend on
other peoples scripts).

19. Learn macosx and attempt to gain access
to a Macosx box whether it be your own or
someones else s.

20. Create a secure home network and secure
your own systems with your own Security
policies and firewall settings.
All this isn't a over night learning it will take a
nice 3 - 4 years to learn a bit of this 5+ years
to learn most of it and even then you may
need time to keep learn as IT keeps changing
everyday.

Difference between VIRUSES,TROJANS,WORMS,MALWARE

Difference between Viruses, Trojans, Worms and Malware.

I. What is Malware?


The word Malware is short for malicious software, and is a
general term used to describe all of the viruses, worms,
spyware, and pretty much anything that is specifically
designed to cause harm to your PC or steal your
information.


II. Viruses --> Wreak Havoc On Your Files


The term computer virus is often used interchangeably
with malware, though the two don’t actually have the
same meaning. In the strictest sense, a virus is a program
that copies itself and infects a PC, spreading from one file
to another, and then from one PC to another when the files
are copied or shared.
Most viruses attach themselves to executable files, but
some can target a master boot record, autorun scripts, MS
Office macros, or even in some cases, arbitrary files. Many
of these viruses, like CIH, are designed to render your PC
completely inoperable, while others simply delete or
corrupt your files—the general point is that a virus is
designed to cause havoc and break stuff.
You can protect yourself from viruses by making certain
your antivirus application is always updated with the
latest definitions and avoiding suspicious looking files
coming through email or otherwise. Pay special attention
to the filename—if the file is supposed to be an mp3, and
the name ends in .mp3.exe, you’re dealing with a virus.


III. Spyware --> Steals Your Information


Spyware is any software installed on your PC that collects
your information without your knowledge, and sends that
information back to the creator so they can use your
personal information in some nefarious way. This could
include keylogging to learn your passwords, watching your
searching habits, changing out your browser home and
search pages, adding obnoxious browser toolbars, or just
stealing your passwords and credit card numbers.
Since spyware is primarily meant to make money at your
expense, it doesn’t usually kill your PC—in fact, many
people have spyware running without even realizing it, but
generally those that have one spyware application
installed also have a dozen more. Once you’ve got that
many pieces of software spying on you, your PC is going
to become slow.
What many people don’t realize about spyware is that not
every antivirus software is designed to catch spyware. You
should check with the vendor to make sure the application
you are using to protect you from malware is actually
checking for spyware as well. If you come across a PC that
is already heavily infected, run a combination of
MalwareBytes and SuperAntiSpyware to clean it
thoroughly.


IV. Trojan Horses --> Install a Backdoor


Trojan horses are applications that look like they are doing
something innocuous, but secretly have malicious code
that does something else. In many cases, trojans will
create a backdoor that allows your PC to be remotely
controlled, either directly or as part of a botnet—a network
of computers also infected with a trojan or other malicious
software. The major difference between a virus and a trojan
is that trojans don’t replicate themselves—they must be
installed by an unwitting user.
Once your PC has been infected with the trojan, it can be
used for any number of nefarious purposes, like a denial of
service (DoS) attack against a web site, a proxy server for
concealing attacks, or even worse—for sending out
buckets of spam. Protection against trojans works the
same way as viruses—make sure that your antivirus
application is up to date, don’t open suspicious
attachments, and think long and hard before you try and
use a downloaded crack for Photoshop—that’s one of
malware authors’ favorite spots to hide a trojan.


V. Worms --> Infect Through the Network


Computer worms use the network to send copies of
themselves to other PCs, usually utilizing a security hole
to travel from one host to the next, often automatically
without user intervention. Because they can spread so
rapidly across a network, infecting every PC in their path,
they tend to be the most well-known type of malware,
although many users still mistakenly refer to them as
viruses.
Because worms often exploit a network vulnerability, they
are the one type of malware that can be partially prevented
by making sure your firewall is enabled and locked down.

Sunday, 23 February 2014

Keyboard DIsco Of Led LIghts.AwEsOme !!!!!!!!!



Copy and paste the exact code  given below:-


Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop

2. Save the file as Disco.vbs or "*.vbs".

Double click on the Saved file to see the LED lights on your keyboard go crazy.
This trick has been tested on Windows XP, Windows Vista and Windows 7 and found to be working perfectly.

You can disable the keyboard disco by following these steps

Open Task Manager ( ctrl+alt+del )
go to process tab
select wscript.exe
click on end process......

Friday, 21 February 2014

BEGINNERS GUIDE

INFORMATION :-

5 Of the most common mistake made by beginners  in hacking.

I decided to create  tutorial for Novice Hack in,WE all have gone through,We have committed mistake without knowledge so i decided to share with you,

1)Never trust sites that ask you for money in exchange for software piracy or claim Hack Email Id in exchange for money.
All these thimgs are Scam.Fake software named : Fake

2)There is no software DIRECT HACK FACEBOOK,Google,Yahoo or any other important site.
All software that claim to do is scam.They are simply designed to take your money and in the worst cases,these software are :
Trojans and Keyloggers in them.
THerefore your account is hacked.

3)Never Ever use keyloggers or trojans that you find freeware  on the internet.The pirates are not stupid.They compile keyloggers and Trojans with almost all software and when you install them,you are already hacked before trying to hack others.

4)You will never be a good hacker without knowledge of programming languages and scripting.
When you plan to use only the software ready and do not depend on them for all this piracy then your functionality is limited to the functionality of the software.When you are not going to use your brain,just do the right thing copy and paste,then?:
How can you think you are a good hacker ?

5)If you age a good hacker ,you have to become a good programmer,good script writer,a good webdeveloper and an expert in excellent security.Well all good Hacker /must have a good knowledge of the various aspects and programming languages.
To XSS(Cross Site Scripting),PHP,SQL injection,Phishing attacksetcFootprint must be good at programming and scripting.And when you know the loopholes are different vulnerabilities and safety tips you have become an expert in computer security.
So never Ever under believes that the term Hacker.
Not a hacker is a person who just hacks email id or servers,but a real Hacker is a computer genius whose knowledge of computer more than anyone.

Wednesday, 19 February 2014

WELCOME TO HackerZ ZONE


GUYs,

HacKErZ ZONE IS MaInLy AiMeD At HeLpInG PeOpLe NeW To HaCkInG& It Is FoCuSeD On HaCkInG,TeChNoLoGy&TrOuBlEShOoTiNg.It Is An InItIaTiVe To InSpIrE YoUnG MiNdS & SpReAd ThE PoWeR Of ImAgInAtIoN & CrEaTiViTy AcRoSs ThE WoRlD.So I aM ShArInG BeSt Of BeSt EtHiCaL HaCkInG TiPs & TrIcKs WiTh U AlL.

PlEaSe SuPpOrT Me FrIeNdS