Search This Blog

This is where I belong.

I was never intrested in the crap they teach us in college, because it bores me.

Its not about money nor about revenge, its about curiosity

My crime is of curiosity, my crime is of outsmarting you, something that you will never forgive me for.

We explore, We seek knowledge

We exist without skin color, without nationality, without religious bais.

Naive Security – Free internet security suite.

Are you sure you are safe online?

About 2 Lakh Facebook accounts were hacked on 15-NOV-12, 250000 Twitter accounts were hacked on 1-FEB-13 at the same time New York Times was hacked.

Protect yourself and people around you from such threats by using our free internet security solution Naive Security. It will help protect your information and your different accounts while you access them through internet.

Download For free

  • Features:
  • Information Security.
  • Password Security
  • Prevention from scams.
  • Wireless security.
  • Data Encryption.
  • Online banking security.
  • Mobile banking security.
  • Online shopping security.
  • Online privacy.
  • Social account security.
  • Kids security
  • Protection against latest security threats.

Codesortie

Thursday 20 December 2012

Naive Security :: A guide to internet Security.

About Naive Security.


This app will provide tips which will help you to protect your information and your different accounts while you access them on your PC/MAC through internet. What’s the best part? Its free and available at your finger tips for many mobile platforms.


Who should use this?



This app is for everyone who is using a computer with or without internet. I have seen people who teach cyber security getting hacked. So, I won’t say that this app is only for naive user.

Many times things are in front of us but we are not able to identify them. This may happen in a hurry or in excitement or just due to ignorance.

This app is for all the people out there who take their security very seriously.

Why I developed this app?



Many people come to me for recovering their accounts after it has been hacked. I try my best to regain access to their accounts, sometimes I m successful but most of the times it’s not possible.

"Hackers cannot be hacked"




Just imagine, will a person having knowledge about all hacking techniques fall for these techniques? Obviously NO. It’s an old saying “Precaution is better than cure.” It’s time for all people to take precautions beforehand to make ourselves secure.


Free Download at: http://naivesecurity.tk/



Share it if you like it. Dont Foget to say thanks!

Introduction to Naive Security:: A guide to internet security.






hi,
Today we introduce you to a new mobile application which will help you prevent yourself from different threats over the internet. If you take your Security seriously then you are at the right place.

Naive Security - a guide to internet security

This app will provide tips which will help you to protect your information and your different accounts while you access them on your PC/MAC through internet. What’s the best part? Its free.

available free at ::  http://naivesecurity.tk/




Supported platforms :: android, blackberry, Symbian, windows phone, and web OS
coming soon for IOS devices.

Regards
thank you.

Monday 28 May 2012

Free Full version IDM without any patches or cracks.

hi friends,
today i will tell you a trick to crack IDM without any patches or crack files. IDM is the best Internet download manager available on internet but its not free and its cracked or patched versions contains viruses.
This hack also works for trail IDM that means download a trail IDM from there site and register the professional i.e. full version of IDM with your credentials for free using my hack.
Hack or crack IDM manually :

Step 1: Download the IDM trial or If you already have IDM installed Update it by going to Help---}} then to check for Updates.

Step2: Now Go to START => Then go to RUN and type the following text and click enter:
notepad %windir%\system32\drivers\etc\hosts
 Step3: Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now u will be able to edit the hosts file and save changes in it.
Step4: Now a notepad file appears something like this as shown below:


crack IDM

Now copy the below lines of code and add to hosts file as shown above image box :
127.0.0.1 tonec.com
127.0.0.1 www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
127.0.0.1 mirror2.internetdownloadmanager.com

After adding these piece of code, save the notepad file. And exit from there.

Step5: Now open IDM and click on Registration. When you click on registration, Now a new dialog(window) appears that is asking for Name, Last Name, Email Address and Serial Key.

Step6: Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:
RLDGN-OV9WU-5W589-6VZH1
HUDWE-UO689-6D27B-YM28M
UK3DV-E0MNW-MLQYX-GENA1
398ND-QNAGY-CMMZU-ZPI39
GZLJY-X50S3-0S20D-NFRF9
W3J5U-8U66N-D0B9M-54SLM
EC0Q6-QN7UH-5S3JB-YZMEK
UVQW0-X54FE-QW35Q-SNZF5
FJJTJ-J0FLF-QCVBK-A287M
 And click on ok to register.

Step7: After you click ok, it will show an message that you have registered IDM successfully.

Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire.

It will remain full version for life time and you can update it without any problem in future.
Note : To update idm you have to remove those websites added in the host file, after removing those website,save that Hosts file and update IDM software. After succesfull updation again follow above steps to crack Internet Download manager.

 Windows 7 users who don't have a access to Admin account follow following procedure.
For Windows 7 users, due to security reasons you will not be able to save hosts file.so follow this steps :
First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file.


Now right click on hosts file and go to its properties then go to Security tab select Users under Group or user names and click on edit button,Permission For Host Window will get open, in that window select Users account and grant permission in bellow section which is "Permission for SYSTEM" by clicking all checkbox under "Allow" Name and press Ok.Dnt click on any Deny check box.
 hope this article is useful for you...
enjoy
stay online..... stay safe...!!!!

Monday 7 May 2012

Get IP address of any remote computer.

Hey friends, today i will explain you how to get IP address of any computer remotely. 
There are several methods to get an IP address of the victim but i will share few and specially the best one's that can tell you IP address in just few clicks and also all are free methods and special thing is about it is all are manual methods that means you did not require any tool.
how to find ip address of another computer remotely
How to find or get Ip address of somebody else remotely

4 ways to get the IP address of the Victim or another Computer:
1. Using PHP notification Script
2. Using Blogs and Websites
3. Using Read Notify service
4. Sniffing during Gmail and yahoo chat  sessions

As we are here to learn concepts so i will first explain what is an IP address and what's its importance. So friends very basic question What is an IP address? Why its important for hackers and security professionals?

What is an IP address? 
Basically IP address (Internet Protocol address) is a unique numerical value that is assigned to any computer or printer on a computer network that uses an internet protocol for communication purpose. Protocol is basically rules( for Network its rules for communication). 
IP address serves for two basic purposes:
1. Host or network interface identification
2. Location Addressing

For exploring more about IP addressing read on wikipedia.


How to Find IP address of another computer?

1. Using PHP notification Script
Using this Notification script you can get the IP address in just seconds. Steps of using this PHP script:
a. Download the PHP notify script and extract files.
b. Now you will get two files IP.html and index.php . You need to upload these two files to any free Web hosting server.
Example: i used www.my3gb.com to upload these two files. Create an account there and upload these two files there as shown below.


c. Now you will need to send the link of index.php to the victim whose password you want to get. to get the link click on index.php shown in above snapshot. Now a new window will open copy the link in the address bar and send to the victim whose IP address you want.
d. Now when the victim opens the above link nothing will open but his Ip address is written into the ip.html file. So open the ip.html file to get his IP address.
e. That's all this method... I hope you liked it.


2. Using Blogs and Websites
This method is for those who have their blogs or websites. Normal users can also do this as blog is free to make. Make a new blog and use any stats service like histats or any other stats widget. Just add a new widget and put histats code there and save template. And send the link of your blog to your friend and get his IP.
That's only.


3. Using Read Notify service
This is an email based service. Steps to use Read Notify service:
a. First open the Read Notify website : RCPT
b. Now register on this website and then it will send you confirmation mail. Verify your account.
c. Once your account is activated. 
Do the following steps use this service:

  1. Compose your email just like you usually would in your own email or web email program
  2. Type:   .readnotify.com   on the end of your recipients email address (don't worry, that gets removed before your recipients receive the email). Like this: xyz@gmail.com.readnotify.com  
  3. Send your email
Some things to remember: 
  • don't send to and from the same computer
  • if your email program 'auto-completes' email addresses from your address book, you'll need to keep typing over the top of the auto-completed one to add the .readnotify.com
  • if you are cc-ing your email to other readers, you must add tracking to all of them 


4.  Sniffing Yahoo and Gmail Chat sessions
With the help of Sniffers like ethereal, wireshark etc we can sniff the Gmail, and yahoo chat sessions while we are chatiing to any our friend and extract the IP address from there.


5. Bonus Method for Online Gamers
We can also get the IP address from online games like counter strike, age of empires in Game ranger etc.. Many counter strike servers use amx mode. Just view which people are connecting and whats their IP addess as plugins show the IP address of people connecting to the game server.  If you have more access to counter strike server you can use status command in console. Just go to console and type "status"(without quotes) and press enter there you can see all players details his steam ID and much more depending upon server.

New Smiley Code for Facebook

Hey friends, i m back.
Here are some facebook chat smileys which you can use....
To insert the new smileys is simply type or paste the code on your message or chat box at facebook. Here are the chat codes :
laugh   [[f9.laugh]]
sad   [[f9.sad]]
angry   [[f9.angry]]
sleepy
  [[f9.sleepy]]
shock
  [[f9.shock]]
kiss
  [[f9.kiss]]
inlove
  [[f9.inlove]]
pizza
  [[f9.pizza]]
coffee
  [[f9.coffee]]
rain
  [[f9.rain]]
bomb
  [[f9.bomb]]
sun
  [[f9.sun]]
heart
  [[f9.heart]]
heartbreak
  [[f9.heartbreak]]
doctor
  [[f9.doctor]]
ghost
  [[f9.ghost]]
brb
  [[f9.brb]]
wine
  [[f9.wine]]
gift
  [[f9.gift]]
adore
  [[f9.adore]]
angel
  [[f9.angel]]
baloons
  [[f9.baloons]]
bowl
  [[f9.bowl]]
cake
  [[f9.cake]]
callme
  [[f9.callme]]
clap
  [[f9.clap]]
confused
  [[f9.confused]]
curllip
  [[f9.curllip]]
devilface
  [[f9.devilface]]
lying
  [[f9.lying]] 
i will provide more soon....
tell then stay online stay safe..........
Enjoy

Saturday 18 February 2012

Use Firefox as Hack tool

hey friends,
 
Today I am posting about Firefox add-on.

I assume every one Is aware of Fire fox add-on installation procedure.

as per above statement below are links for add-on and usage respectively.




XSS Me




Cross-Site Scripting (XSS) is a common flaw found in todays web applications. XSS flaws can cause serious damage to a web application. Detecting XSS vulnerabilities early in the development process will help protect a web application from unnecessary flaws. XSS-Me is the Exploit-Me tool used to test for reflected XSS vulnerabilities.


Xss Me :- https://addons.mozilla.org/en-US/firefox/addon/xss-me/

SQL Inject Me 


SQL Injection vulnerabilites can cause a lot of damage to a web application. A malicious user can possibly view records, delete records, drop tables or gain access to your server. SQL Inject-Me is Firefox Extension used to test for SQL Injection vulnerabilities.

Sql Inject Me :- https://addons.mozilla.org/en-US/firefox/addon/sql-inject-me/


Access Me

Access vulnerabilities in an application can allow an attacker to access resources without being authenticated. Access-Me is a Firefox extension used to test for Access vulnerabilities.

Tamper Data tutorial


Tamper Data is a Firefox Extension which gives you the power to view, record and even modify outgoing HTTP requests. This is extremely useful when trying to answer questions like:
  • What cookies are being sent to the browser, and what is the browser returning?
  • Are the Cookies marked "secure"?
  • When a redirect happens, is it an HTTP 302?
  • What kind of HTTP Authentication is happening?
Tamper Data can help answer each of these and other puzzling website behavior questions.

Contents


  • 1 Getting Started
  • 2 Recording Transactions
  • 3 Graphing Results
  • 4 Tampering
  • 5 Summary
  • 6 License
  • 7 Comments

Getting Started

Since it's a Firefox extension, you'll first need to download and install Firefox (if you haven't already). Then visit the Tamper Data project page and click the link that reads "Install Now".
Finally, restart Firefox and open Tools → Tamper Data. This will bring up the "Tamper Data - Ongoing Requests" window.

Enlarge

Recording Transactions

As soon as the Ongoing Requests window is up, Tamper Data will start recording HTTP requests. Here's what the window looks like after requesting blogger.com's main page.

Enlarge
The columns in the main window pane are:
  • Time - When the request happened.
  • Duration - How long it took to be retrieved.
  • Total Duration - How long it took to render (includes response download time of item and all sub-items)
  • Size - Size of received content (-1 indicates the item was loaded from the cache)
  • Method - The HTTP method issued (GET or POST)
  • Status - HTTP Status code received or "Loaded from cache"
  • Content Type - Type of data received (aka Mime-Type)
  • URL - Fully qualified URL of request.
  • Load Flags - Additional HTTP information used in retrieving or rendering content.
Selecting an item brings its HTTP Request and Response information to the lower two left and right panes respectively.

Enlarge
This gives you a more detailed view into what the request is doing. If the request you selected happened to contain Cookie information, you'll see a Cookie line in the left-hand pane or a Set-Cooke line in the right hand pane or both.
Double-clicking an entry will bring up the "Tamper Details" window, which provides easy access to that request element's data. Here, I've opened the Tamper Details for the Cookie header of the initial blogger.com home page request.

Enlarge
Using the process outlined above, it's easy to inspect what's going on during a browsing session.
Though the data is pretty to look at inside the Tamper Data shell, it's often convenient to move that data into an external file for viewing. To do this, return to the Ongoing requests window, right-click and choose "Copy all".
This will place all the request information into your clipboard so you can paste it into your favorite text editor.

Graphing Results

To graph the recorded results, in the Ongoing Requests window, select the desired results, right-click and choose "Graph selected" or "Graph all".

Enlarge
The columns of the graph are:
  • URL - Fully qualified URL for the Item
  • Status - HTTP Stats Code
  • Duration - How long it took to download
  • Time - A Gantt chart of requests.
In the Time chart, you'll notice dark-blue and light-blue bars. The darker blue bars represent the Duration, while the lighter blue signifies the duration of all included components. For example, an HTML page would have a light-blue bar spanning all of its CSS, JavaScript and Image inclusions.
Mousing over a URL reveals more information about that component.

Enlarge
Clicking the URL link opens a tab with that item's contents.

Enlarge

Tampering

"Tampering" is the act of modifying request parameters before request submission. To begin Tampering, in the Ongoing Requests window, click the "Start Tamper" button in the upper-left corner.
From here on out, whenever a top-level request is issued, you'll be prompted to tamper with the request. Selecting the Tamper button will launch the Tamper Popup.

Enlarge
Traditional HTTP header fields are to the left, while any POST data is to the right. If the request uses the GET method, then the right-hand side of the dialog will be empty.
After changing any request parameters, clicking OK will execute the request. In the Tamper Popup window, right-clicking a field reveals shortcut methods for a number of neat tricks such as URL encoding/decoding, Base64 encoding/decoding and HTML character removal.

Summary

Tamper Data is an excellent Firefox extension that matches IBM Page Detailer in features and utility. When Firefox is a permissible browser, Tamper Data is the clear choice between the two. However, there are cases when a non-Mozilla based browser is required (read: IE). In those rare instances, IBM Page Detailer is the way to go.


11 Firefox Extensions for Managing Cookies

Cookie Monster :- In a nutshell, Cookie Monster allows for easier managing of what sites a user allows to set cookies and what sites cannot. It works best for users who do NOT accept cookies by default, although this is not necessary. It helps with Cookie Management, especially when you reject cookies by default.

Stealther If there are times you want to surf the web without leaving a trace in your local computer, then this is the right extension for you. What it does is temporarily disable the following:
·         History
·         Downloads
·         Cookies
·         Disk Cache
·         Saved Form Information
·         Referrer Heade
Add & Edit Cookies The main diffirence is that this extension edits and adds cookies not just displays them. it also has a handy filter feature, you can filter for a specific host in the cookies list and the search result will be saved even if you close the browser. See Screenshots.

Cookie Whitelist With Buttons – Gives you a whitelist for all cookie issuing sites.  Use the buttons in the status bar to temporarily accept cookies from the site you are on, or click the add button to quickly add the current site to your list.
CookieCuller – A very straightforward extension that allows you to delete any unwanted cookies and keep the others.
CookieMan Context – Allows you to access a context menu for your cookies via the options privacy menu.  It will allow you to search for desired sites, right click on the site name and quickly change your cookie options.
CookieSwap – A nice extension that will allow you to swap cookies so you can be logged into multiple email accounts at once.  For Web designers, it will allow you to act like different visitors for site testing.
Extended Cookie Manager – Extended Cookie Manager will inform you via the status bar if a cookie was received from a site and then will notify you if it was blocked, allowed, or allowed only for the current session.
Firecookie – Works with Firebug to create cookies, delete them, edit, see all of the current cookies for a site and more.
HttpFox – You can monitor all of the traffic between your browser and a given website, including what cookies it is delivering and receiving.
View Cookies – Adds a tab in the Page Info area so you can easily view what cookies are on your system.