Connect With Me In Facebook

Welcome to DefendHackers, If u want to Apply for a Blogroll as a Author , With h4ckfreak Mail me @ suren.click@gmail.com

Mark Zuckerberg tells 8th graders “there’s no shortcuts” and to make friends

By h4ckfreak

Metasploit Quick Start Referennce Guide

Metasploit Quick Start Referennce Guide , By h4ckfreak

IP Security

IP Security By H4ckfreak.

15 Network Admin Apps for Android

15 Network Admin Apps for Android , By h4ckfreak

Break All OS Passwords Using KON

Break All OS Passwords Using KON , By h4ckfreak

Recover Or Reset Ur Windows Pwd Using Ubuntu

Recover Or Reset Ur Windows Pwd Using Ubuntu , By h4ckfreak

Security Blueprint For Ethical Hackers..

By h4ckfreak

Blocking IP Using IPSec

By h4ckfreak

Preventing DDos Attacks, Combat Steps abd Tools...

By h4ckfreak

Monday, November 29, 2010

Leaked U.S. document links China to Google attack

Leaked U.S. document links China to Google attack

The information came from the latest WikiLeaks release


The cache of more than 250,000 U.S. Department of State cables that WikiLeaks began releasing on Sunday includes a document linking China's Politburo to the December 2009 hack of Google's computer systems.
The U.S. Embassy in Beijing was told by an unidentified Chinese contact that China's Politburo "directed the intrusion into Google's computer systems," the New York Times reported Sunday, citing a single leaked State Department cable.
"The Google hacking was part of a coordinated campaign of computer sabotage carried out by government operatives, private security experts and Internet outlaws recruited by the Chinese government. They have broken into American government computers and those of Western allies, the Dalai Lama and American businesses since 2002, cables said," the Times reported.
The cable is another piece of evidence, albeit thinly sourced, linking China to the Google attack. Wikileaks is gradually releasing this latest set of cables, and the document in question was not available on WikiLeaks' Web site at press time. The Times, along with a handful of other newspapers, was given early access to the documents.
Security experts have linked the attacks to servers at a university used by the Chinese military, and both Google and the State Department implied that they thought China was behind the attacks when they were first disclosed in January, but nobody has produced conclusive proof that they were state-sponsored.
Google was one of more than 30 companies targeted in the attacks, known as Aurora. Google said the primary goal of the hackers was to access the Gmail accounts of human rights activists, and that the attack apparently failed.
Within hours of Google acknowledging the Aurora attacks, the State Department issued a statement, saying the attacks were serious and asking the Chinese government for an explanation.
The state documents are the latest blockbuster disclosure to come from the document-leaking organization. Earlier this year, WikiLeaks came under fire from U.S. authorities after releasing hundreds of thousands of military documents relating to the U.S. wars in Afghanistan and Iraq.
Wikileaks and State Department representatives could not be reached immediately for comment Sunday. Earlier this year, the State Department said that it regrets, "all of the activities that WikiLeaks has done, past, present, and future."

Avril Lavigne - Live from The Roxy Theater (2007) 1080p HDTV

Avril Lavigne - Live from The Roxy Theater (2007) 1080p HDTV

   Avril Lavigne - Live from The Roxy 
Theater (2007) 1080p HDTV
Avril Lavigne - Live from The Roxy Theater (2007) 1080p HDTV
HDTV | MPG2 1920x1080 29.97fps 38.810 Mbps | Dolby AC3 48000Hz 384 Kbps | 3.94 GB
Genre: Music Video, Pop, Rock, Pop Rock

Avril Ramona Lavigne (pronounced /ˈжvrɨl ləˈviːn/; born 27 September 1984) is a Canadian singer-songwriter, fashion designer, and actress. She was born in Belleville, Ontario, but spent the majority of her youth in the small town, Napanee, Ontario. By the age of 15, she had appeared on stage with Shania Twain, and by 16, Lavigne had signed a recording contract with Arista, now RCA Records. Record executive Antonio "L.A." Reid offered her a two-album deal worth more than $2 million. When she was 17 years old, Lavigne broke onto the music scene with her debut album, Let Go, released in 2002.
 
Enjoy wih Us.>>!

Eminem: Live From New York City (2005) 720p BDRip

Eminem: Live From New York City (2005) 720p BDRip

 
Eminem: Live From New York City (2005)
 720p BDRip
Eminem: Live From New York City (2005) 720p BDRip
Video: MKV 1280x720 at 29.970 fps, x264@L4.1, DXVA, 2pass, ~8200 kbps avg
Audio#1: English: 48 kHz, DTS, 3/2 (L,C,R,l,r) + LFE ch, ~1536.00 kbps avg
Audio#2: English: 48 kHz/16-bit, LPCM 2.0, ~1536.00 kbps avg 
Audio#3: English: 48 kHz, AC3, 3/2 (L,C,R,l,r) + LFE ch,  ~640.00 kbps avg
Genre: Music Video, Hip hop, Rap | Size: 6.55 GB

Filmed at Madison Square Garden in 2005, this spectacular show captures the full Eminem live experience. With guest appearances from D12, Obie Trice and Stat Quo, the concert features all Eminem's classic hits including Just Lose It, Cleaning Out My Closet, The Way I Am, Stan, Lose Yourself and many more.

Track list:

01. Evil Deeds
02. Mosh
03. Business
04. Rain Man
05. Ass Like That
06. Puke
07. Kill You
08. Like Toy Soldiers
09. Lodi Dodi
10. Just A Friend
11. Nuthin But A G Thing
12. My Name Is
13. Git Up (with D12)
14. How Come (with D12)
15. Rock Star (Bizarre)
16. 40oz (with D12)
17. My Band (with D12)
18. Stan
19. The Way I Am
20. Just Don't Give A F**k
21. Got Some Teeth (Obie Trice and Eminem)
22. Stay 'Bout It (Obie Trice and Stat Quo)
23. The Set Up (Obie Trice and Stat Quo)
24. Like Dat (Stat Quo and Obie Trice)
25. Cleaning Out My Closet
26. Mockingbird
27. Just Lose It
28. Lose Yourself

Eminem: Live From New York City (2005)
 720p BDRip

Eminem: Live From New York City (2005)
 720p BDRip

Eminem: Live From New York City (2005)
 720p BDRip

Eminem: Live From New York City (2005)
 720p BDRip


More information
http://www.imdb.com/title/tt0495688/


Download Hotfile.Com
http://hotfile.com/dl/43952012/1a6a225/ELFNYC2005.part01.rar http://hotfile.com/dl/43952020/432b500/ELFNYC2005.part02.rar http://hotfile.com/dl/43952021/b3cffb5/ELFNYC2005.part03.rar http://hotfile.com/dl/43952048/f91b439/ELFNYC2005.part04.rar http://hotfile.com/dl/43952133/170500a/ELFNYC2005.part05.rar http://hotfile.com/dl/43952205/b914950/ELFNYC2005.part06.rar http://hotfile.com/dl/43952273/350b5c8/ELFNYC2005.part07.rar http://hotfile.com/dl/43952371/7838e7f/ELFNYC2005.part08.rar http://hotfile.com/dl/43952376/6332d9b/ELFNYC2005.part09.rar http://hotfile.com/dl/43952386/2e4775e/ELFNYC2005.part10.rar http://hotfile.com/dl/43952493/f2be580/ELFNYC2005.part11.rar http://hotfile.com/dl/43952515/bec8683/ELFNYC2005.part12.rar http://hotfile.com/dl/43952546/e1dc236/ELFNYC2005.part13.rar http://hotfile.com/dl/43952588/6317bf3/ELFNYC2005.part14.rar http://hotfile.com/dl/43952699/e10933f/ELFNYC2005.part15.rar http://hotfile.com/dl/43952756/d3279c0/ELFNYC2005.part16.rar http://hotfile.com/dl/43952828/e0e851c/ELFNYC2005.part17.rar http://hotfile.com/dl/43952926/f7b2d8c/ELFNYC2005.part18.rar http://hotfile.com/dl/43952940/bc08352/ELFNYC2005.part19.rar http://hotfile.com/dl/43952945/799f16e/ELFNYC2005.part20.rar http://hotfile.com/dl/43953070/2d5b162/ELFNYC2005.part21.rar http://hotfile.com/dl/43953085/f4da34a/ELFNYC2005.part22.rar http://hotfile.com/dl/43953087/f194ece/ELFNYC2005.part23.rar http://hotfile.com/dl/43953144/053eed3/ELFNYC2005.part24.rar http://hotfile.com/dl/43953283/981dd13/ELFNYC2005.part25.rar http://hotfile.com/dl/43953396/daf583a/ELFNYC2005.part26.rar http://hotfile.com/dl/43953400/2932bef/ELFNYC2005.part27.rar http://hotfile.com/dl/43953526/86dd1dc/ELFNYC2005.part28.rar http://hotfile.com/dl/43953536/473b15a/ELFNYC2005.part29.rar http://hotfile.com/dl/43953538/eaa5348/ELFNYC2005.part30.rar http://hotfile.com/dl/43953769/093cf9f/ELFNYC2005.part31.rar http://hotfile.com/dl/43953788/6443e6f/ELFNYC2005.part32.rar http://hotfile.com/dl/43953798/9cb3bdd/ELFNYC2005.part33.rar http://hotfile.com/dl/43953844/bae2355/ELFNYC2005.part34.rar
Download Rapidshare.Com
http://rapidshare.com/files/389899035/ELFNYC2005.part01.rar
http://rapidshare.com/files/389899074/ELFNYC2005.part02.rar
http://rapidshare.com/files/389898784/ELFNYC2005.part03.rar
http://rapidshare.com/files/389899151/ELFNYC2005.part04.rar
http://rapidshare.com/files/389898882/ELFNYC2005.part05.rar
http://rapidshare.com/files/389899122/ELFNYC2005.part06.rar
http://rapidshare.com/files/389899235/ELFNYC2005.part07.rar
http://rapidshare.com/files/389899491/ELFNYC2005.part08.rar
http://rapidshare.com/files/389899416/ELFNYC2005.part09.rar
http://rapidshare.com/files/389899266/ELFNYC2005.part10.rar
http://rapidshare.com/files/389899765/ELFNYC2005.part11.rar
http://rapidshare.com/files/389899727/ELFNYC2005.part12.rar
http://rapidshare.com/files/389899782/ELFNYC2005.part13.rar
http://rapidshare.com/files/389900291/ELFNYC2005.part14.rar
http://rapidshare.com/files/389900158/ELFNYC2005.part15.rar
http://rapidshare.com/files/389900161/ELFNYC2005.part16.rar
http://rapidshare.com/files/389899974/ELFNYC2005.part17.rar
http://rapidshare.com/files/389900749/ELFNYC2005.part18.rar
http://rapidshare.com/files/389900527/ELFNYC2005.part19.rar
http://rapidshare.com/files/389901283/ELFNYC2005.part20.rar
http://rapidshare.com/files/389901315/ELFNYC2005.part21.rar
http://rapidshare.com/files/389901848/ELFNYC2005.part22.rar
http://rapidshare.com/files/389901980/ELFNYC2005.part23.rar
http://rapidshare.com/files/389901863/ELFNYC2005.part24.rar
http://rapidshare.com/files/389902003/ELFNYC2005.part25.rar
http://rapidshare.com/files/389902075/ELFNYC2005.part26.rar
http://rapidshare.com/files/389902020/ELFNYC2005.part27.rar
http://rapidshare.com/files/389902066/ELFNYC2005.part28.rar
http://rapidshare.com/files/389902233/ELFNYC2005.part29.rar
http://rapidshare.com/files/389902361/ELFNYC2005.part30.rar
http://rapidshare.com/files/389902296/ELFNYC2005.part31.rar
http://rapidshare.com/files/389902596/ELFNYC2005.part32.rar
http://rapidshare.com/files/389902573/ELFNYC2005.part33.rar
http://rapidshare.com/files/389902292/ELFNYC2005.part34.rar
 

Biography Bill Gates

Biography Bill Gates




Biography Bill Gates 2009 DVDRip XviD – RiPPERS – 350M
Language: Englis
Release Date: 1
Video: MPEG-4 XviD 512×384 25Fp
Audio: MP3 128Kbps 2Channel
Size: 350M
Runtime: 00:43:3
William (Bill) H. Gates is chairman of Microsoft Corporation, the worldwide leader in software, services and solutions that help people and businesses realize their full potential.
Microsoft had revenues of US$51.12 billion for the fiscal year ending June 2007, and employs more than 78,000 people in 105 countries and regions.
On June 15, 2006, Microsoft announced that effective July 2008 Gates will transition out of a day-to-day role in the company to spend more time on his global health and education work at the Bill & Melinda Gates Foundation. After July 2008 Gates will continue to serve as Microsoft’s chairman and an advisor on key development projects. The two-year transition process is to ensure that there is a smooth and orderly transfer of Gates’ daily responsibilities. Effective June 2006, Ray Ozzie has assumed Gates’ previous title as chief software architect and is working side by side with Gates on all technical architecture and product oversight responsibilities at Microsoft. Craig Mundie has assumed the new title of chief research and strategy officer at Microsoft and is working closely with Gates to assume his responsibility for the company’s research and incubation efforts.
Born on Oct. 28, 1955, Gates grew up in Seattle with his two sisters. Their father, William H. Gates II, is a Seattle attorney. Their late mother, Mary Gates, was a schoolteacher, University of Washington regent, and chairwoman of United Way International.
Gates attended public elementary school and the private Lakeside School. There, he discovered his interest in software and began programming computers at age 13.
In 1973, Gates entered Harvard University as a freshman, where he lived down the hall from Steve Ballmer, now Microsoft’s chief executive officer. While at Harvard, Gates developed a version of the programming language BASIC for the first microcomputer – the MITS Altair.
In his junior year, Gates left Harvard to devote his energies to Microsoft, a company he had begun in 1975 with his childhood friend Paul Allen. Guided by a belief that the computer would be a valuable tool on every office desktop and in every home, they began developing software for personal computers. Gates’ foresight and his vision for personal computing have been central to the success of Microsoft and the software industry.
Under Gates’ leadership, Microsoft’s mission has been to continually advance and improve software technology, and to make it easier, more cost-effective and more enjoyable for people to use computers. The company is committed to a long-term view, reflected in its investment of approximately $7.1 billion on research and development in the 2007 fiscal year.
In 1999, Gates wrote Business @ the Speed of Thought, a book that shows how computer technology can solve business problems in fundamentally new ways. The book was published in 25 languages and is available in more than 60 countries. Business @ the Speed of Thought has received wide critical acclaim, and was listed on the best-seller lists of the New York Times, USA Today, the Wall Street Journal and Amazon.com. Gates’ previous book, The Road Ahead, published in 1995, held the No. 1 spot on the New York Times’ bestseller list for seven weeks.
Top row: Steve Wood (left), Bob Wallace, Jim Lane. Middle row: Bob O’Rear, Bob Greenberg, Marc McDonald, Gordon Letwin. Bottom row: Bill Gates, Andrea Lewis, Marla Wood, Paul Allen. December 7, 1978.
Top row: Steve Wood (left), Bob Wallace, Jim Lane. Middle row: Bob O’Rear, Bob Greenberg, Marc McDonald, Gordon Letwin. Bottom row: Bill Gates, Andrea Lewis, Marla Wood, Paul Allen. December 7, 1978.
Gates has donated the proceeds of both books to non-profit organizations that support the use of technology in education and skills development.
In addition to his love of computers and software, Gates founded Corbis, which is developing one of the world’s largest resources of visual information – a comprehensive digital archive of art and photography from public and private collections around the globe. He is also a member of the board of directors of Berkshire Hathaway Inc., which invests in companies engaged in diverse business activities.
Philanthropy is also important to Gates. He and his wife, Melinda, have endowed a foundation with more than $28.8 billion (as of January 2005) to support philanthropic initiatives in the areas of global health and learning, with the hope that in the 21st century, advances in these critical areas will be available for all people. The Bill and Melinda Gates Foundation has committed more than $3.6 billion to organizations working in global health; more than $2 billion to improve learning opportunities, including the Gates Library Initiative to bring computers, Internet Access and training to public libraries in low-income communities in the United States and Canada; more than $477 million to community projects in the Pacific Northwest; and more than $488 million to special projects and annual giving campaigns.
Gates was married on Jan. 1, 1994, to Melinda French Gates. They have three children. Gates is an avid reader, and enjoys playing golf and bridge.
Some unknown facts
- He has an IQ of 160
- He dropped out (DO) of Harvard University in 1975
- His company, Microsoft, went public on 28 October 1985, his 30th birthday.
- He Became a billionaire (US dollars) at age 31, making him the youngest self-made billionaire in history.
- He has been the richest man in the world consistently every year since 1998.
- As of 2005, his personal fortune was in excess of $46 billion.
- He was diagnosed with Asperger’s Syndrome.
Download
http://hotfile.com/dl/33358353/9538718/bg-RiPPERS.part1.rar_shytex.com.html
http://hotfile.com/dl/33358378/7c5701b/bg-RiPPERS.part2.rar_shytex.com.html
http://hotfile.com/dl/33358408/591536d/bg-RiPPERS.part3.rar_shytex.com.html
http://hotfile.com/dl/33358426/7569ecd/bg-RiPPERS.part4.rar_shytex.com.html
 
Password default : Top2Read.info

 

Improving Firefox

Improving Firefox



FireFox is a full-featured rich and fast alternative to Microsoft Internet Explorer. It is also highly customizable and can greatly improve your browsing experience to indulge in a few modifications. The following tweaks are described to the best of my ability, taken from a number of documents, my and my own hacking of the browser to come up with an aggregated list of enhancements.

Speed up FireFox:
    There are a number of docs out there on how to speed up firefox using pipelining and other kinds of minor tweaks that can be time consuming and error prone. Fortunately for you I found a much quicker way to do this (here's an example of the hard way for the masochists):
    • Step 1: go download Fasterfox
    • Step 2: install it, shut down your browser, and re-open it.
    • Step 3 (optional): uninstall it by going to Tools -> Extensions -> Fasterfox and highlight it and delete it.
    • Step 4 (optional): shut down your browser and re-open it.
    "Why would I want to delete Fasterfox? Why did I download it in the first place?" you are now asking. Well let me explain first why you downloaded it. You wanted to turn on all the cool features that you would have had to otherwise do by hand by typing "about:config" into the URI field and then switching them one by one. Fasterfox has one major flaw though, which is why I personally uninstall it after it makes these changes. It has a prefetch feature similar to Opera's built into it, to speed up the next page you are about to go to by caching it. That unfortunately means it actually performs functions that otherwise should not be performed. I don't use Opera for a reason, so I uninstal Fasterfox for the same reason. Asa Dotzler has a good write-up on the downsides to these speed enhancements.

Reduce what JavaScript can do in Firefox:
    Lots of sites attempt to take control over your browser by spawning new windows or resizing them or other annoying things that you probably don't want. It also eats up CPU time to have a page repaint itself, which can slow your browsing experience. Here's how to stop that:
    • Go to Tools -> Options -> Web Features
    • Click "Advanced"
    • Uncheck "Move or resize existing windows"
    • Uncheck "Raise or lower windows"
    • Uncheck "Disable or replace context menus"
    • Uncheck "Hide the status bar"
    • Uncheck "Change status bar text"
    You probably want to keep the last option checked "Change images" because this allows for onmouseover rollover effects, and other things that make sites more esthetically pleasing.

Get rid of unwanted search engines:
    Firefox does an extremely good job of helping you add search engines into the upper right hand corner of your screen, but it doesn't do a particularly good job of helping you delete them. They have a tendancy to clutter and if you don't use one or more search engines they just sit there and annoys you. I'll show you how to get rid of them:
    • Step 1: browse to your Firefox searchplugins directory. Mine was located in C:\Program Files\Mozilla Firefox\searchplugins
    • Step 2: find the search engine you want to remove and remove both of the files associated with it. IE: google.gif and google.src
    • Step 3: shut down your browser and restart it and they will be gone.

Pornzilla bookmarklets:
    Pornzilla is a site that has a series of tools to help your porn surfing. As a happen stance these same bookmarklets can actually help your day to day needs as well. Here are the bookmarkets that are useful for every day use. To install these, click and drag the boxes up to your toolbar window and release them:
    • Step 1: zoom images in, zoom images out These allow you to increase and decrease the size of images, which is often useful when you are having a hard time seeing something.
    • Step 2: linked images this is highly useful when you know you want to look at every picture that is linked from a page (where you have to click to view it) but don't want to manually click on each link. This spawns a new window.
    • Step 4: increment and decrement these allow you to navigate up and down html files or images that have a number in them without going back and clicking on each one by hand. This is a big time saver.
    • Step 5: numbered list This creates a list of all pages that have a number in them in a directory. After creating the new page you can use the linked images bookmarklet to further speed up the time it takes to review the images.
    • Step 6: Yahoo site search this can be useful when you want to find more things on a site but there are no obvious links to it. Let the search engines do the work for you.

Adblock:
    Adblock removes pestering advertizements from showing up. You can block specific images, iframes, flash files, etc... There are some interesting bugs with it, so please read this before installing it:
    • Step 1: Go to Adblock
    • Step 2: Install it and shut down your browser and restart it
    • Step 3: Go to Tools -> Extensions -> highlight Adblock and click Options -> Adblock Options. Then unselect Obj-Tabs. This is important or it will cause certain macromedia files to die.
    Now go about your business surfing. When you find something you don't like right click on it and Adblock it and your life will be a lot better.

Windows hosts file:
    This is only relevant to Microsoft and effects both IE and Firefox. Windows hosts file control which domains go to which pages. This can also perform adblocking if you remove domains that you don't want:
    • Step 1: browse to your hosts file. Mine was located in: C:\WINDOWS\system32\drivers\etc\hosts
    • Step 2: open the file using notepad Step 3: go to my hosts file and copy the contents and paste them over what you have in there currently. If you have already modified your current hosts file before make sure not to overwrite any changes you made.
    • Step 3: edit the document to change whatever host you want to point to localhost which will make it fail to render. Save and quit.
    This may cause Microsoft Anti-Spyware to alert you that your hosts file has changed. Click through the warning and you should be good to go. Instead of seeing ads you will now see an error message and your surfing should be significantly improved. Feel free to modify the hosts file in the future to add more domains. This is nowhere near a complete list, so feel free to update it.

Stop Animated Gifs:
    Ever wanted to stop those animated gifs from animating? They're like the modern day version of the <BLINK> tag. They also eat up CPU time as your computer has to paint and re-paint them. Why not shut them off?
    • In the URL bar, type in "about:config"
    • In the filter bar type "anim"
    • Double click on image.animation_mode and in the window that pops up change the setting from "normal" to either "none" or "once".

Stop blink:
    Speaking of blink, if you want to turn off the <BLINK> tag in Firefox it's as easy as this:
    • In the URL bar, type in "about:config"
    • In the filter bar type "blink"
    • Double click on browser.blink_allowed so it is set to "false".

Modify your default search:
    I've wanted to change my default search engine in Firefox before but it's not very well documented on how to do that. Here's how:
    • In the URL bar, type in "about:config"
    • In the filter bar type "defaulturl"
    • Change the value there to take whatever search engine with whichever parameters you want.

Auto Copy:
    Auto copy allows you to copy things just by selecting them with your mouse (which is more like Linux/Unix, Trillian, MIRC, and PuTTY). This speeds things up considerably if you do a lot of work on the net:
    • Step 1: Go to Auto Copy
    • Step 2: Install it and shut down your browser and restart it
    • Step 3: Click on the checkbox on the lower right hand corner and make sure that "Enable in text boxes" is unselected. This can have undesirable results when you are trying to highlight something to paste over it where it will copy the information you just highlighted and paste them back over itself having no net effect.

IE View:
    IE View allows you to get around compatibility problems with FireFox by allowing you to open a page in IE or to always open a page in IE if you know you'll want to do so in the future. It's highly useful for bridging the gap while Firefox works out it's bugs and websites learn to code for both browsers. I know some Firefox zealots will scoff at this, but it really does make life easier which is what this page is all about:
    • Step 1: Go to IE View
    • Step 2: Install it and shut down your browser and restart it
    • Step 3: When you get to a site that doesn't work in Firefox, right click and open in IE.

Greasemonkey:
    Iframes are the root of many an evil banner advertizement that you don't want. Using Adblock you can get rid of them but only if you've seen them before. Using the hosts file also helps. But what really helps do a great job of removing a ton of them is to remove them at their source; the raw HTML itself. By actually removing one of the main ways "rich" banner ads using flash get onto the page - iframes - you can kill a huge percentage of annoying ads. Install this plugin with the remove iframe user script and see your speed increase:
    • Step 1: Go to Greasemonkey
    • Step 2: Install it and shut down your browser and restart it
    • Step 3: Go to Hide iframes
    • Step 4: Go to Tools -> Install this user script
    This will install the iframe blocking function. This gets rid of most ads. Beware though, this does it totally blindly, and although it will speed up your user experience slightly and it will remove unsightly movies and things you don't want, it will also remove a certain amount of good things. So to add those domains you want to be ignored from this, go to Tools -> manage user scripts and add in those domains. For instance. As soon as you do this, the images at the top and bottom of the page may stop working. You'll have to whitelist http://ha.ckers.org/* to see those images again.

Customize Google:
    If you are a Google user this plugin is nice because it removes a lot of the supurfluous data on each page. Google's ads have begun to completely overwhelm most of it's pages and this can help reduce the clutter:
    • Step 1: Go to CustomizeGoogle
    • Step 2: Install it and shut down your browser and restart it
    • Step 3: Go to Tools -> Extensions -> highlight CustomeGoogle and click on Options
    • Step 4: Go through each tab and click on Remove ads.
    One other handy thing this does is it re-write the images on http://images.google.com so you can click directly on them and see the image, rather than digging around a page to find what you are looking for.

DDoS Attacks and Torrent Sites

DDoS Attacks and Torrent Sites

If anyone has been following the recent news about anti-piracy companies trying to take torrent sites offline by DDoSing them, then you’ll know that this was a bad idea from the start, if not here’s a brief recap.
Aiplex Software is a company that has been trying to take down torrent sites for a while now. As they weren’t getting anywhere, they decided to take on a new approach, and DDoS the torrent sites instead. It was suspected that this was the case for a while, but then to save everyone the effort, the nice guys over at Aiplex Software openly admitted that they were doing it, big mistake!

As the Internet is a wonderful medium for communication, there was a scheduled DDoS attack against Aiplex Software which took their site offline for a fair amount of time, until all the attackers then decided that moving onto the MPAA website was a better idea. The MPAA was forced to move it’s site to a new IP address after being down for 18 hours.

An attack was launched against the RIAA in the same manner, and knocked the web site of the Internet for a good few hours.

All this was done via various means of communication, using the tool LOIC (Low Orbit Ion Cannons) and a bunch of anonymous supporters that weren’t afraid to stand up for what they believed in.


Whether these attacks were right or wrong is purely a matter of opinion, but more to the point is the amount of damage that can be done.

In the past, if people wanted to protest, they would all gather in groups with placards and march around yelling various slogans, this usually happened outside the offending parties premises. If it got out of hand, the police would be called in to disperse the crowd, and everything was back to normal. However now in the age of the Internet, people are free to participate from the comfort of their own homes, just by downloading a program, typing in an IP address or hostname and clicking “Attack”. These people won’t be traced if the attack is coordinated properly, as it’s next to impossible to trace where all the packets are coming from if you have a large amount of people doing this at the same time. Even if people were traced, there is always the “Botnet defense” (My PC must have been infected by something and become part of a botnet, I ran my anti-virus program and removed some things, and now it all seems fine).

As security professionals we need to look at this as the shape of things to come, what if an online retailer annoyed a few of it’s customers, or if an online gambling or finance site was just “asking for it”. All it takes is the right form of communication and a few thousand people, and poof, the site is off the Internet if it doesn’t have the correct protection mechanisms in place.

As security professionals, do you do your best to protect your companies online assets from DDoS attacks? Or are you mainly concentrating on making sure the web sites are coded securely, that the web servers have been hardened and patched up to date…

I’m really interested to hear everyone’s comments on this one, so please leave them below.

Cookie Poisoningla






Subjected to Defend Hackers
 Cookie Poisoning
Guys ..today we gonnna discuss about Web Application Security..!!
As I think u people Would Kno The Diff between Web n Network Security..
Cookie Poisoning attacks involve the modification of the contents of a cookie (personal information stored in a Web user's computer) in order to bypass security mechanisms. Using cookie poisoning attacks, attackers can gain unauthorized information about another user and steal their identity.

Details
Many Web applications use cookies to save information (user IDs, passwords, account numbers, time stamps, etc.). The cookies stored on a user's hard drive maintain information that allows the applications to authenticate the user identity, speed up transactions, monitor behavior, and personalize content presented to the user based on identity and preferences. For example, when a user logs into a Web site that requires authentication, a login CGI validates his username and password and sets a cookie with a numerical identifier in the user's browser. When the user browses to another page, another CGI (say, preferences.asp) retrieves the cookie and displays personalized content according to the values contained in the cookie.

 Cookie poisoning is in fact a Parameter Tampering attack, where the parameters are stored in a cookie. In many cases cookie poisoning is more useful than other Parameter Tampering attacks because programmers store sensitive information in the allegedly invisible cookie. For example, consider the following request:
GET /store/buy.asp?checkout=yes HTTP/1.0 Host: www.onlineshop.com
    Accept: */* Referrer: http://www.onlineshop.com/showprods.asp
    Cookie: SESSIONID=570321ASDD23SA2321; BasketSize=3; Item1=2892;
    Item2=3210; Item3=9942; TotalPrice=16044;



Add Yield Manager (DefendHackers)
In this example, the dynamic page requested by the browser is called buy.asp and the browser sends the parameter checkout to the Web server with a yes value, indicating that the user wants to finalize his purchase. The request includes a cookie that contains the following parameters: SESSIONID, which is a unique identification string that associates the user with the site, BasketSize (how many items are in the purchase), the price of each item and the TotalPrice. When executed by the Web server, buy.asp retrieves the cookie from the user, analyzes the cookie's parameters and charges the user account according to the TotalPrice parameter. An attacker can change, for example, the TotalPrice parameter in order to get a "special discount".
Since programmers rely on cookies as a location for storing parameters, all parameter attacks including SQL Injection, Cross-Site Scripting, and Buffer Overflow can be executed using cookie poisoning.

Prevention

Detection of cookie poisoning attacks involves compound HTTP statefulness. The intrusion prevention product must trace down cookies "set" commands issued by the Web server. For each set command the product should store important information such as the cookie name, the cookie value, the IP address and the session to which that cookie was assigned as well as the time it was assigned. Next the product needs to intercept each HTTP request sent to the Web server, retrieve the cookie information out of it and check it against all stored cookies. If the attacker changes the content of a cookie the product should be able to identify that using the information it stores on the specific user. The product must trace application-level sessions and not just IP addresses in order to provide accurate results. 



A Scenario From Use Case Model Tool(Defend Hackers)

Intrusion Detection and Prevention Systems which are not Web application oriented simply do not provide this functionality.
Researchers Working Around this flaw and Often Tools are available Google it ..!! 
Like It..Drop Comments..!!