Category: Hacking Tricks


S60 mobiles:
rtsp://115.248.246.156:554/DD_
QVGA.sdp
S40 mobiles:
rtsp://121.241.249.130:554/2G/
LIVE/DD_QCIF.sdp

S40 mobiles:
rtsp://59.162.166.216:554/2G/
LIVE/DD_QCIF.sdp

http://serials.ws
here u can find othr sites also.
 
. http://keygenguru.com
just go to
http://www.findserialnumber.com
open it and search with software name 
.

Now u can download jar file in ur phone 100%.. 
Use ucweb and download any jar from any site..
First select any jar file to download then
click on download..agle screen me puchhega- insall,save,cancel..
click on save..agle screen me *”file name”* , file saving place aur download… Main
trick hai ki ab *”file name”* change karna hai.. Means “xxx_jar” se “xxx.jar” karna hai… Phir download pe click karo… 
File “name_unknow_file_[185]_jar” jaisa kuch name se save hoga… Save hone par ucweb se exit karke us file ko jo “name_unknow_file_[185]_jar” se save hai,use rename karna hai.. “name_unknow_file_[185]_jar” se “name_unknow_file_[185].jar”,bas wo file jar me convert ho jayega..
Maine khud try kiya hai.. If any problem,write here..
Just click here http://www.sms.wapscriptphp.com/index.php send all over world msgs widout knwing ur name. 
Here is another one
http://smstexter.com 
Try nd njoy.
HEY FRIENDS AS ALL OF YOU KNOW THAT IF A NON PREMIUM USER UPLOAD ANY FILE AT PLUNDER.COM AND GIVE US THE LINK THEN WE CAN’T DOWNLOAD IT WITHOUT COMPLETING THE SURVEYS.
AND ALL OF US HATE TO COMPLETE THOSE SURVEYS WHICH TAKES VERY MUCH TIME OF US.

SO, HERES THE SOLUTION.

GO TO 
http://epicgamehacks.info/plunder and paste the link of plunder and click on create direct link.

then they give you the link of tiny url.
then click on it.

YIPEE IT IS THE DIRECT DOWNLOAD LINK.

ENJOY !!!!

George Bronk was hacked into more than 3,200 email accounts looking for nude or compromising photos. He then posted many of these photos to his victims’ Facebook pages. George Bronk is just the 23-year old and live in California, has pleased guilty to hacking into the email accounts of 3,200 girls and posting the nude pictures to their public Facebook profiles. 

George Bronk was arrested in late October 2010 after he used the same technique that was popularized by hacker David Kernell to break into Sarah Palin’s email. Namely, Bronk scoured his victims’ Facebook accounts looking for the answers to security questions used for password recovery by services like Gmail and Yahoo Mail. 
Once he had access to an email account, he search for nude photographs sent by the account holder, then trigger a Facebook password recovery to get into their account and post the pictures live to their profiles. He post nude photographs to over 172 women. He even convinced one woman to send him even more explicit photos of herself by threatening to post the ones he’d already stolen if she didn’t.


Court charge six years in prison to George Bronk for felony hacking, child pornography as several of the girls were minors and identity theft charges. 

In back days the most popular account password was “12345.” Today, it’s one digit longer but still not safer: “123456.” Despite all the reports of Internet security breaches over the years, including the recent attacks on Google’s e-mail service, many people have reacted to the break-ins with a shrug. According to a new analysis, one out of five Web users still decides to leave the digital equivalent of a key under the doormat: they choose a simple, easily guessed password like “abc123,” “iloveyou” or even “password” to protect their data. “I guess it’s just a genetic flaw in humans,” said Amichai Shulman, the chief technology officer at Imperva, which makes software for blocking hackers. “We’ve been following the same patterns since the 1990s.”

Mr. Shulman and his company examined a list of 32 million passwords that an unknown hacker stole last month from RockYou, a company that makes software for users of social networking sites like Facebook and MySpace. The list was briefly posted on the Web, and hackers and security researchers downloaded it. (RockYou, which had already been widely criticized for lax privacy practices, has advised its customers to change their passwords, as the hacker gained information about their e-mail accounts as well.)

The trove provided an unusually detailed window into computer users’ password habits. Typically, only government agencies like the F.B.I. or the National Security Agency have had access to such a large password list.

“This was the mother lode,” said Matt Weir, a doctoral candidate in the e-crimes and investigation technology lab at Florida State University, where researchers are also examining the data.

Imperva found that nearly 1 percent of the 32 million people it studied had used “123456” as a password. The second-most-popular password was “12345.” Others in the top 20 included “qwerty,” “abc123” and “princess.”

More disturbing, said Mr. Shulman, was that about 20 percent of people on the RockYou list picked from the same, relatively small pool of 5,000 passwords.

That suggests that hackers could easily break into many accounts just by trying the most common passwords. Because of the prevalence of fast computers and speedy networks, hackers can fire off thousands of password guesses per minute.

“We tend to think of password guessing as a very time-consuming attack in which I take each account and try a large number of name-and-password combinations,” Mr. Shulman said. “The reality is that you can be very effective by choosing a small number of common passwords.”

Some Web sites try to thwart the attackers by freezing an account for a certain period of time if too many incorrect passwords are typed. But experts say that the hackers simply learn to trick the system, by making guesses at an acceptable rate, for instance.

To improve security, some Web sites are forcing users to mix letters, numbers and even symbols in their passwords. Others, like Twitter, prevent people from picking common passwords.

Still, researchers say, social networking and entertainment Web sites often try to make life simpler for their users and are reluctant to put too many controls in place.

Even commercial sites like eBay must weigh the consequences of freezing accounts, since a hacker could, say, try to win an auction by freezing the accounts of other bidders.

Overusing simple passwords is not a new phenomenon. A similar survey examined computer passwords used in the mid-1990s and found that the most popular ones at that time were “12345,” “abc123” and “password.”

Why do so many people continue to choose easy-to-guess passwords, despite so many warnings about the risks?

Security experts suggest that we are simply overwhelmed by the sheer number of things we have to remember in this digital age.

“Nowadays, we have to keep probably 10 times as many passwords in our head as we did 10 years ago,” said Jeff Moss, who founded a popular hacking conference and is now on the Homeland Security Advisory Council. “Voice mail passwords, A.T.M. PINs and Internet passwords — it’s so hard to keep track of.”

In the idealized world championed by security specialists, people would have different passwords for every Web site they visit and store them in their head or, if absolutely necessary, on a piece of paper.

But bowing to the reality of our overcrowded brains, the experts suggest that everyone choose at least two different passwords — a complex one for Web sites were security is vital, such as banks and e-mail, and a simpler one for places where the stakes are lower, such as social networking and entertainment sites.

Mr. Moss relies on passwords at least 12 characters long, figuring that those make him a more difficult target than the millions of people who choose five- and six-character passwords.

“It’s like the joke where the hikers run into a bear in the forest, and the hiker that survives is the one who outruns his buddy,” Mr. Moss said. “You just want to run that bit faster.”

Google now offers a security checklist for Gmail users. Google is advising Gmail users on how to secure their accounts by having them go through a checklist of tasks that involve following basic security principles and verifying Gmail specific options. Its a five-part process with multiple steps in each designed to reclaim the feeling that nobody can get into your inbox. It starts out obvious (security updates, plug-ins, passwords) then gets into trickier tactics.  Google has shown an increased concern over the security of Gmail users after a spying attack has targeted its network earlier this year. The list is split into five parts, each containing several tasks. As the users go through them and check the completed items, they are kept informed about their progress.  Part 1: Your computer: The first part concerns general computer security and instructs people to scan for malware, update their operating system and install updates for third party popular applications, like Adobe Reader, Flash Player and Java. Part 2: Your browser: The second part refers to the security of the browser used to access the Gmail account. Google advises users to keep their browsers up to date and to be very careful about add-ons that require their Google Account credentials. Part 3: Your Google Account: The 3rd part, users are asked to change their password twice a year, review the websites that have access to their account from the “My Account > Change authorized websites” menu and also update password recovery options like alternate email, mobile phone or secret question. Part 4: Your Gmail settings: In part four deals with actual Gmail settings. These include enabling the “always use HTTPS” option, as well as checking the “Filters” and the “Forwarding and POP/IMAP” settings to make sure that emails are not being forwarded to other accounts. The company also suggests verifying the “Send Mail As”, “Get mail from other accounts”, and “Grant access to your account” options, as well as checking the “Last Account Activity” list for suspicious IP addresses. Part 5: Final Reminders: This is last part of the checklist is called “Final Reminders” and contains general advices like not giving out login information to other websites, always logging out after reading email or clearing browser cookies, cache, stored passwords and autocomplete data periodically. The Gmail security checklist can be accessed by clicking on the Help link from the email account and then the checklist one in the left menu or visit directly Gmail Security Checklist.

You may owned multiple Google accounts for various reasons but unfortunately you can’t login on them at a same time coz Google or like practically any other website out there, doesn’t provide for this feature. Sometime it can be a headache to manage the different accounts. But now looks like that Google is working on a new feature which will enable users to be logged into several accounts at a time in the same browser.

As you know that Google account is most famous coz one of the best parts of having a Google account is that it works for all of the company’s products and can also be used to log into third-party sites in plenty of places. According the unofficial Google Operating System blog, Google is testing the functionality with a few users with the likely intent of releasing it for everyone in the future. For now, those can access it will be able to turn on the feature through their Google Accounts page.


This feature will allow users to sign into different accounts in different tabs on same
browser. For example, they can have two Gmail accounts opened concomitantly without one interfering with the other. The feature only works for a handful of Google sites for now, Calendar, Code, Docs, Gmail, Reader and Sites. There is a caveat for Gmail users, they won’t be able to use the offline feature if they enable multiple-account logins. Right now, you have to log out before logging in to a different account. 

Google advices users that want to sign in with different accounts for the services that don’t support the feature yet to either log out of all their accounts and then login with the one they want or use a different browser. Of course, there is also the option of using the private browsing features in Chrome, Firefox and most other web browsers, as Google Operating System points out. I hope this feature will very helpful to users like me.