Google+ bgs: 2011
Be the reason of someone's happynes, and never be a part of it. Be the part of someone's sadnes, and never be the reason of it...

facebook WORMs...............

Social Networking sites like facebook, google+, twitter is the current destination in the netizen world. Recently we've seen the worm which states 'OMG why iam Tagged in this VID' and 'SICK, I Just Hate Rihanna After Watching this VID'. When we click on these it'll asks us to select the address bar etc.., after that we may end up posting it on our friends walls.

Currently it has six viruses....

#1 ---If you get a notice of a PHOTO TAG ... Do not open it.

#2---If you get a notification that a friend reported you for offensive behavior etc.. Do not open it.

#3 Is a Video saying 99% of People can not watch this for more the 15 Sec. Do not open it is also a virus.

#4 all Messages from your friends via chat saying click this link .. Do not open! 

#5 [VIDEO] Yeah! It happens on Live television.. Do Not Open it its a VIRUS..

#6 [video] Girl Killed Herself after her father posted a Secret of her on fb Wall.
Do Not open it, its a VIRUS.

So try to paste the below matter on your wall and save yourself and your friends from scammers .......

WARNING ~~~PLEASE LISTEN UP !! SCAMMERS ARE BUSY ON FACEBOOK AGAIN!!! They post some insulting messages on the wall of your friends with your regards, without you knowing about it. If you receive one of those messages in my name it wasn't me posting them. Put this on your wall and warn your friends. Also, DONT open the video about a guy with a BIG ZIT. It is a virus.

or share these images



As i already said how to get back your hacked facebook account or if you want to prevent it from posting on your wall, then just do this.....Simply, don’t click on any suspicious links in Facebook but however attractive it may appear! Scammers are just exploiting the curious nature of human mind to good use in doing their job. To avoid getting such malicious wall messages, you may restrict other people (who are NOT your friends and not in your contact list) from posting on your wall. For doing this, choose:

“Account ; Privacy Settings ; How you Connect ; Edit Settings ; 
 Who can Post on your Wall ( Friends / OnlyMe ).”

Take a look at your URL (top box on your screen.) If you see "www" (or http), instead of "https" now, you DO NOT have a secure session. It appears that FB went straight on line to the world wide web now. Go to the drop down from where you log out: Account Settings - Click Security on the left top corner - click Edit next to Secure Browsing, Check box, click Save. FB has automatically set it on the non-secure setting. 

And there are also phising sites which looks like facebook page but do not forget to check that your're entering your details in the www.facebook.com........

Multi Uni-Uploader : Upload files to file hosters by YASSINOV

Multi Uni-Uploader is a small and easy to use application that allows you to quickly upload your files to multiple host websites.

To upload files to file hosters using a desktop program is more comfortable than uploading files by going to their hosters website.It supports popular choices such as rapidshare, mediafire, hotfile, filefactory, megaupload, imageshack, easyshare etc....


The new version 4.0 has an Enable account support option and you can connect it via a proxy server.It supports single file uploads, add files using the browse menu and automatically itself calculates the MD5 hash.When you click start upload it sends the file to the hoster and links are automatically retrieves and displayed in the interface and you can manually copy to clipboard or use the copy button.




Features:
--World First Integrated Features :
--Multi Server Uploader
--Multi Server Types
--Account Support Started with [MultiUpload] Server & more to be added
--Fast Upload Service
--Light Interface
--Upload to : Download Link / Delete Link Generator
--Direct IMAGE Upload + Forum Link Generator
--Added Servers List :

Rapidshare , 2Shared , khaZN , DepositFiles , Imageshack , Pic-Upload , Hotfile , PikiPimp , TurBoShare , MegaVideo , Megaupload , AxiFile , ZippyShare , Linkbucks , File@Email , MultiUpload , UploadSpace , Photo@Email , FileFactory , Netload , SpeedShare , TinyPic , Stooorage , TurboUpload , Herosh , CzShare , ULoz , NippyZip , MegaShares , Badongo , Storage , UploadMb , iFotos , DL.Free , Easy-Share , Extabit , Filefront , Mediafire , Uploading , FileSavr , Kiwi6 , BigUpload , FileHost , GigaSize , 1Fichier , WikiUpload , Localhostr , Turbobit , Easy2Download , YourFileLink , Filetitle , Ziddu , FileDropperSendSpace , TeraFiles , Loadto , Multisiteupload , FlameUpload , ArchiveTo , iFile , Partage-Facile , FileBase , X7to , Wrzuc , FileStorageto , FileServe , FileSonic , Jheberg , WooFiles , GigaUp , GsmFileHosting , Hostuje , JanDown(Torrent) , SlingFile , YourFileSender , UsaUpload , SendSpace(v2MU) , Duckload , Oron , Shareator , Mlfat4arab , MP3Zee , Mozillashare , JumboFiles , EnterUpload , FileServer , Cramit , PutShare , Loombo , GotUpload and more....


--Auto Update software (For new Servers).........

License : Freeware
Price : Free
publisher: YASSINOV

You can Download it from softpedia , Brothersoft , fileserve , hotfile , megaupload , filefactory , badongo , storage , mediafire , uploading........

Google Chrome : Most Secure browser

Antivirus and anti-malware can help prevent an infection, the first line of defense is using a secure web browser. For a person that surfs the internet, comparing and contrasting the security of different web browsers is difficult. 

Accuvant LABS study has says that Chrome occupies as the most secure browser,while IE and Firefox takes the second and third position. With rating to seven firefox filled only three places. The seven points criteria are Sandboxing, Plug-in Security, JIT Hardening, ASLR, DEP, GS, URL Blacklisting. The following chart shows the anti-exploitation measures used by these browsers. Each row represents a different anti-exploitation technology and each rocket represents a browser. The rocket with the highest position represents the browser with the most thorough anti-exploitation measures.






Accuvant compared browsers from a layered perspective, taking into account security architecture and anti-exploitation techniques. The best way to judge browser security is to first look at anti-exploitation measures that each browser has in place. Accuvant looked at the internals of Mozilla Firefox, Google Chrome, Microsoft Internet Explorer, and analyzed the anti-exploitation measures implemented by each.

Anti-exploitation technology can reduce or eliminate the severity of a single vulnerability or an entire class of exploits. Thus, the software with the best anti-exploitation technologies is likely to be the most resistant to attack and is the most crucial consideration in browser security.

If you’d like to see more granular information regarding this conclusion then check for Research Paper, Supporting Tools and Data.......



Download Google Chrome........

New McAfee All Access 2012 : All your devices. All your stuff. All protected.

It's always the best option to choose an all-in-one security suite rather than buying separate protection components by combining together, which may not work well.

As you can see that every anti-virus solution releasing their product by adding an extra feature, but it'll be only for the individual products.

Now McAfee presenting McAfee all access new for 2012 says that "Connect, surf, and socialize online, knowing your computers, smartphone, and tablet are safe from malicious websites, viruses, hackers, scammers, and identity thieves." It says that it'll take you to the next level and comes with a tagline of "All your devices. All your stuff. All protected."

In every AV Solution you'll see antivirus, internet security and total security products.But everyone chooses logically total security products. Coz antivirus products for offline computers, internet security adds an extra layer of firewall and total security products comes with an tools to speedup your pc. McAfee products of internet security comes along with 1GB of backup and total protection with 2GB. Now you can track your stolen components and added a feature called Anti-bot protection. See the below image for the McAfee product comparison. 


McAfee is givingaway it's product McAfee Internet Security 2012 for 90days of Protection. 






























     All your devices. All your stuff. All protected.

Safely enjoy your digital lifestyle on the devices you use to connect. McAfee All Access delivers the security protection you need for the devices you use at home and on the move. You can connect, surf, and socialize online, knowing your computer, laptop, netbook, smartphone, and tablet are safe from malicious websites and hackers, viruses, scammers, cyber bullies, and identity thieves. You can even track, lock, or remotely wipe your missing smartphone or tablet. Our comprehensive protection lets you connect with confidence and enjoy the convenience your digital lifestyle offers.

  • Secure your PC, laptop, and netbook against hackers and identity theft
  • Fend off threats to your Mac
  • Protect your smartphone and the precious information it holds
  • Guard your tablet against attacks and theft

is facebook malware or phising site.....

Wat happend to K7 product, that it was blocking facebook page as Malware/Phising site.......




Date and Time: 12/14/2011 and 6:37PM.....
and within 10min got the update and it went to normal.....

G Data InternetSecurity 2012 -- Free for 120days through FARAVIRUSI

German origin Security solutions G Data giving 120days(4months) of it's product G Data Internet Security 2012. The whole new generation of it's product came up with new features like Doublescan, CloudSecurity with minimum usage resouces.

It's Home Page......
Check the link to qualify for 4months....... 


Source : FARAVIRUSI

FileASSASSIN : can eradicate any type of locked files from your computer.

It's a tool from Malwarebytes Anti-Malware.......


About FileASSASSIN
If you use a computer, you’ve probably come across at least one of the following messages:

  • Cannot delete file: Access is denied.
  • Make sure the disk is not full or write-protected and that the file is not currently in use.
  • The source or destination file may be in use.
  • The file is in use by another program or user.
These messages commonly appear when you’re trying to delete files deposited by a malware infection, though occasionally a file just goes on lockdown. Whatever the reason for the locked file, File ASSASSIN can remove it.

Advanced programming techniques unload modules, close remote handles, and terminate processes in order to remove the particular locked file.

Warning: Please use caution with FileASSASSIN as deleting critical system files may cause system errors.

Usage
  • Start FileASSASSIN and select a file by dragging it onto the text area or select it using the (...) button.
  • Select a removal method from the list.
  • Click Execute and the removal process will commence.
Download FileASSASSIN from one of the links below. If you select the portable build, simply unzip and run the application. Otherwise, run the installer provided.

Download EnglishVersion......
Download SpanishVersion......
Download PortableVersion......

Malwarebytes Anti-Malware : Taking the Byte out of Malware

The authors claim to use a variety of technologies to find malware undetectable by other malware scanners.

Detect and Protect with Byte
Malware is big and malware is bad. Your computer is constantly at risk from infection by malware including viruses, worms, trojans, rootkits, dialers and spyware. Malwarebytes specializes in fighting malware.


If viruses are mischief, malware is mayhem. Malware doesn’t just want to disrupt your network, it wants your keystrokes, logins, passwords, address book, data, credit card information, favorite t-shirt and possibly your cat.

Malware is not going away any time soon. Malware is growing, developing, constantly evolving. Malware is becoming more difficult to detect, and even harder to remove.

Only the most sophisticated anti-malware techniques can detect and remove malicious programs from your computer. Malwarebytes Anti-Malware PRO combines powerful new technologies designed to seek out, destroy, and prevent malware.

Malwarebytes Anti-Malware PRO detects AND protects in an easy-to-use, straightforward, heavy-hitting but lightweight anti-malware application.

Taking the Byte out of Malware
Malwarebytes technology takes the next step in the fight against malware. Malwarebytes Anti-Malware PRO detects and removes malware where even the best known anti-virus and anti-malware applications fail.

Malwarebytes Anti-Malware PRO monitors every process and stops malicious processes before they even start. The Proactive Protection Module keeps your system safe and secure with advanced heuristic scanning technology. The comprehensive Threats Center keeps you up-to-date with the latest malware threats.




There is a free trial with limited options and a supported pro version with the ability to run scheduled scans and more.....



Malwarebytes Anti-Malware PRO Features include:
  • Flash - Lightning fast scan speeds
  • Thorough - Full scans for all drives
  • Works Well With Others - Cooperative functionality
  • Puts YOU first! - Priority database updates
  • Puts Malware in the Slammer - Quarantine function holds threats and lets you restore at your convenience
  • Talk to the hand - Ignore list for both the scanner and Protection Module
  • For Your Pleasure - Customizable settings enhance performance
  • Toolbox - Extra utilities to help remove malware manually
  • Chameleon - Gets Malwarebytes running when blocked
  • Nitty Gritty - Command line support for quick scanning
  • RPP, Yeah You Know Me - Realtime Proactive Protection Module
  • Hablamos Everything! - Multi-lingual support (Klingon still in beta)
  • Support for Windows 2000, XP, Vista, and 7 (32-bit and 64-bit)
Besides anti-malware product there is an inbuild tool called FileASSASSINFileASSASSIN can eradicate any type of locked files from your computer.


Operating Systems: Microsoft ® Windows 2000, XP, Vista, 7 (32-bit and 64-bit).
Languages Available: English, Arabic, Belarusian, Bosnian, Bulgarian, Catalan, Chinese Simplified, Chinese Traditional, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hebrew, Hungarian, Italian, Korean, Latvian, Lithuanian, Macedonian, Norwegian, Polish, Portuguese, Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Turkish, Vietnamese.

It's Homepage.....
Download it here........
Update it Offline.........


Get McAfee Internet Security free for 90 days.......

An Intel Company McAfee giving 3months free of it's product McAfee Internet Security 2012. Get it by signup or signin with your account.......
Check the Link........

Get Back Your hacked Facebook Account

If Someone knows your password or someone manages to break into your account you'll be known by checking your active sessions.
For it Goto Account Settings--Security tab--Active Sessions.


But it's better to enable "Secure Browsing(browse through HTTPS Connection) and Email and Text Notifications".
By enabling email and text notifications each time you logged into your account you'll get a mail to your email-id and text message to your mobile.
For it Goto Account Settings--Security tab.



Before Enabling the notification settings you must change your password.Now comes the headache that the person who managed to break into your account does't change the password, then you can directly go to Account Settings--General--Password then change it. Otherwise Click on forget your password


It will take you to identify your account


Now enter your Details and get it back.
The main things is that to enable secure browsing and enabling the notifications and also check the open sessions.

Bacula - The Open Source Network Backup Solution

Bacula is a set of Open Source, computer programs that permit you (or the system administrator) to manage backup, recovery, and verification of computer data across a network of computers of different kinds. Bacula is relatively easy to use and efficient, while offering many advanced storage management features that make it easy to find and recover lost or damaged files. In technical terms, it is an Open Source, network based backup program.

Items to Note

  • Bacula's Differential and Incremental normal backups are based on time stamps. Consequently, if you move files into an existing directory or move a whole directory into the backup fileset after a Full backup, those files will probably not be backed up by an Incremental save because they will have old dates. This problem is corrected by using Accurate mode backups or by explicitly updating the date/time stamp on all moved files.
  • In older versions of Bacula ( 3.0.x), if you have over 4 billion file entries stored in your database, the database FileId is likely to overflow. This limitation does not apply to current Bacula versions.
  • In non Accurate mode, files deleted after a Full save will be included in a restoration. This is typical for most similar backup programs. To avoid this, use Accurate mode backup.
It's HomePage.....
It's Documentation.......
Download it here.......

w3af : Web Application Attack and Audit Framework

It is used to find and exploit web application vulnerabilities that is easy to use and extend. The w3af core and it's plugins are fully written in python. The project has more than 130 plugins, which check for SQL injection, cross site scripting (xss), local and remote file inclusion and much

Project Dreams and Hopes:-

  • Create the biggest community of Web Application Hackers
  • Become the best Web Application Scanner
  • Become the best Web Application Exploitation Framework
  • Combine static code analysis and black box testing into one framework
  • Become the nmap for the Web
Check it's HomePage and Download it here......
It's UserGuide......

Beware of New Facebook Worm:SICK I Just Hate Rihanna After Watching This Video

Now facebook is currently the happening destination in the online world and recently a new worm was spreading Stating "SICK I Just Hate Rihanna After Watching This Video".



When the user clicks on the video, it seems to be loading in an enlarged video player window.But the real problem starts when the user clicks on the apparently innocent ‘Play’ button on the enlarged video screen. Once you click the Play button, it does not play any video, but instead displays a message that reads, “Select Address bar. Press J. Press Ctrl+V. Press Enter.“

When the user selects the address bar and presses J and CTRL+V (which is the keyboard shortcut for paste) then ENTER he/she ends up posting a similar 
SICK I Just Hate Rihanna After Watching This Video message on one of his/her friend’s Wall.

So to prevent this spam.... Simply, don’t click on any suspicious links in Facebook but however attractive it may appear! Hackers are just exploiting the curious nature of human mind to good use in doing their job. To avoid getting such malicious wall messages, you may restrict other people (who are NOT your friends and not in your contact list) from posting on your wall. For doing this, choose:

“Account ; Privacy Settings ; How you Connect ; Edit Settings ; 
 Who can Post on your Wall ( Friends / OnlyMe ).”

A Profile To Share Web Pages with Toolz.me......





Check the Link.........

Audio -- Splitter/Joiner/Converter......

Helium Audio Splitter is a free, fully functioning, application that enables you to split one audio file into multiple tracks.
It provides comprehensive support for a large range of source and destination formats:


  • AAC
  • FLAC
  • M4A
  • M4B
  • MP3
  • MP4
  • MPC
  • Ogg Vorbis
  • Wave
  • WAVPack
  • WMA



To split files, you simply:

  1. Open the source file by clicking the Open file... button.
  2. Define the resulting tracks either by loading them from a pre-defined CUE file or by clicking Add tracks...
  3. Enter tag contents for artist, title, album and other relevant fields in the in-place tag editor.
  4. Select the desired output format and optionally set encoder options Click Split files...
Helium Audio Splitter has the following language translations available:
  • English, German, Czech, Japanese, Hungarian and Swedish.

Click Here To Download Splitter......
----------------------------------------------------------------------------------------------------------------
Helium Audio Joiner is a free, fully functioning, helper application that enables you to join multiple audio files into one single file.

It provides comprehensive support for a large range of source and destination formats:
  • AAC
  • FLAC
  • M4A
  • M4B
  • MP3
  • MP4
  • MPC
  • Ogg Vorbis
  • Wave
  • WAVPack
  • WMA


To join files, you simply: 
  1. Add files to the list and optionally reorder them
  2. Select the desired output format and optionally set encoder options
  3. Optionally fill in tag information for the resulting file in the Tag information pane on the right hand side. Note that some of these fields are autofilled when adding tracks
  4. Click Join files...
Helium Audio Joiner has the following language translations available:
  • English, German, Spanish, Czech, Swedish, Portuguese, Hungarian and Japanese

Click Here To Download Joiner.......
----------------------------------------------------------------------------------------------------------------
Helium Audio Converter is a free, fully functioning, helper application that enables you to convert your audio files into many different formats.
It provides comprehensive support for the conversion from and to a large variety of lossless and lossy music file formats, namely:
  • AAC
  • FLAC
  • M4A
  • M4B
  • MP3
  • MP4
  • MPC
  • Ogg Vorbis
  • Wave
  • WAVPack
  • WMA




In addition, the music file tag content (meta data) is also converted.DRM (copy protected) music file conversion is not supported.

To convert files, you simply:
  1. Specify where you want your converted files saved (or select to output to the same folder as source files)
  2. Select desired output format and optionally set encoder options
  3. Click Convert..
 Click Here To Download Converter.....

How to test your hard disk Speed in Mac OS X

Yes now you can test your hard disk read/write speed by using Blackmagic Disk Speed Test.
Disk Speed Test is an easy to use tool to quickly measure and certify your disk performance for working with high quality video! Simply click the start button and Disk Speed Test will write test your disk using large blocks of data, and then display the result. Disk Speed Test will continue to test writes and reads from your disk so you can evaluate both performance and readability over time.


Configuring a high speed disk array for high speed uncompressed high definition video is getting easier. Even SATA disks can be connected together for low cost arrays with amazing speed and capacity. Use Disk Speed Test to get a great real world indication of your disk array performance. Reported in a simple frames per second count, Disk Speed Test uses long sustained block transfers just like capturing and playing video, so it's more accurate than generic disk test utilities.

ScreenShot:-


Click here to Download......

Encryption and Decyption : CTI Text Encryption

CTI Text Encryption is a free encryption and decryption software which codes and decodes text both. There are times when you would like to use a code to hide sensitive information. CTI can perform both encoding and decoding in multiple formats. CTI text encryption can perform one way or two-way text encryption and decryption. You can encrypt it using multiple keys.Able to encrypt with multiple keys. Light weight, portable in pendrive, efficient and easy to use. Hide your sensitive information from others when it is exposed.


Features: 
        Support Multi-Language Input Text
Two Way Encryption

  • Encrypt and decrypt large paragraphs of text into meaningless code.
  • Each encrypted result is not the same. Harder for others to guess the original text.
  • Encrypt with multiple keys. (Included Processor ID and Hard Disk Serial No)
  • Friendly user, easy to use, light weight, standalone, portable.
One Way Encryption
  • Encrypt any text (username, password) or sentences into random code
  • Generated code is not reversible.
  • Able to encrypt with multiple key
  • Able to encrypt with Processor (CPU) ID and Hard Disk Serial No
  • Able to separate the Encrypted Code into several blocks (sections, partitions).
  • Able to customize the separator (Used to separate each blocks)
  • Able to generate various output format
  • Able to enable type-safe character. (exclude "I", "i", "l", "1", "o", "O", "0")
(Note: If user choose "Numbers" only as output format, type-safe will be deactivate)

List of Available Output Format:
  • Mix Case Text
  • Mix Case Text and Numbers
  • Mix Case Text and Symbols
  • Upper Case Text
  • Upper Case Text and Numbers
  • Lower Case Text
  • Lower Case Text and Numbers
  • Numbers
  • Numbers and Symbols
  • Symbols


Examples of One Way Encryption:

Main Input Text: password
Encrypted Code Length: 30
Enable type-safe: True

Free or Paid = Free...
Download it here...

java mobile apps to overcome the restriction of TRAI......

Recently TRAI has put a restriction to send 100 sms / day / sim.....
So here are the few apps to overcome the restriction and send ad free sms throught india, but here you'll send sms through your mobile but not through the websites......
1.WhatsApp
WhatsApp Messenger is a cross-platform mobile messaging app which allows you to exchange messages to anyone who also has the application installed without having to pay for SMS. WhatsApp Messenger is available for iPhone, BlackBerry, Android and Nokia.
2.Whozzat...
Viber is an application for iPhone and Android phones that lets you make free phone calls and send text messages to anyone who also has the application installed.

Print Plus chrome extension .....

Print plus chrome extension prints only the selected parts of webpages.......


Print only what matters! Make quick selections on a page and print only relevant sections of a web page. Save ink and paper.

Aside from the unnecessary waste of ink and paper, there’s also the considerations of readability and time.

Get rid of ads, links, charts, navigation etc....

1.Choose a webpage..

2.Select what you want....

3.Ready for the Print..

Download it here..........

Disposable e-mail address

Disposable e-mail addressing (DEA) refers to an alternative way of sharing and managing e-mail addressing.

Every time you give your e-mail address to a Web site, you risk the chance that it will be sold to a rabid spam monger. You can reduce this risk by using disposable e-mail addresses (DEAs). 

When you want to download something, for example an application from a Web site, nine times out of 10 you are asked for your e-mail address. While a few sites perform no e-mail address verification whatsoever, most smart sites either send a custom generated short term download link or some kind of activation key that is confirmed on installation to cross reference to a given address.

Depending on the way your e-mail is handled, you may be able to create your own DEAs without paying for the service. Many e-mail servers ignore certain additional characters in e-mail addresses and deliver the messages regardless and few DEA's ask for the registration.

Here are the list of few DEA's....

DVDFab DVD Copy.......

DVDFab DVD Copy has the ability to copy discs that are badly scratched or damaged. Even if the IFO files can't be read, it will allow you to make a copy of the movie content using Main Movie or Customize copy modes. It can recover from most VOB read errors and supports NTSC and PAL content (but does not convert from NTSC to PAL or vice versa). In addition, multi-core CUPs are supported by DVDFab DVD Copy, so the copy speed is super fast.





  • Copy any DVD
Remove all known DVD copy protections, like CSS, CPPM, RC, RCE, APS, UOPs, ARccOS, RipGuard, etc., to freely copy any DVD.


  • Copy DVD to hard drive
You can copy DVD to hard drive as ISO image file or DVD file folder for DVD backup with DVDFab DVD Copy. So if you don't have blank disc at hand for burning, doesn't matter, just save your DVD movie on your hard drive for later burning. Or you just want to watch the DVD movie on your computer without swapping discs, it's OK, just copy it to your computer then play.


  • Burn to any blank DVD disc
Burn DVD or ISO file / DVD folder on your computer to any blank DVD disc, including DVD+R/RW, DVD-R/RW, DVD+R DL and DVD-R DL.


  • Clone DVD in 1:1 ratio, or copy with compression
You can use DVDFab DVD Copy to copy DVD-9 to DVD-9, copy DVD-5 to DVD-5 in 1:1 ratio without any loss, and compress DVD-9 to a single DVD-5 completely with outstanding quality.

It's Homepage.......
Download it Here.......

THC-HYDRA - fast and flexible network login Cracker


THC-Hydra New Version 7.0 released..... 
A very fast network logon cracker which support many different services.
This tool is a proof of concept code, to give researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system.

CHANGELOG for 7.0 =================

  • New main engine for hydra: better performance, flexibility and stability 
  • New option -u - loop around users, not passwords 
  • Option -e now also works with -x and -C 
  • Added RDP module, domain can be passed as argument 
  • Added other_domain option to smb module to test trusted domains* Small enhancement for http and http-proy module for standard ignoring servers 
  • Lots of bugfixes, especially with many tasks, multiple targets and restore file 
  • Fixes for a few http-form issues 
  • Fix smb module NTLM hash use 
  • Fixed Firebird module deprecated API call 
  • Fixed for dpl4hydra to work on old sed implementations (OS/X ...) 
  • Fixed makefile to install dpl4hydra (thx @sitecrea) 
  • Fixed local buffer overflow in debug output function (required -d to be used) 
  • Fixed xhydra running warnings and correct quit action event 


Screenshots:-




  
(1) Target selection




  
(2) Login/Password setup

 
(3) Hydra start and output

Check here for HomePage......


Update:
THC-HYDRA has got updated to v7.2. It's license is made available under GPLv3.

CHANGELOG for 7.2 ================= 


  • Speed-up http modules auth mechanism detection 
  • Fixed -C colonfile mode when empty login/passwords were used (thanks to will(at)configitnow(dot)com for reporting)
  • The -f switch was not working for postgres, afp, socks5, 
  • firebird and ncp, thanks to Richard Whitcroft for reporting!  
  • Fixed NTLM auth in http-proxy/http-proxy-url module 
  • Fixed URL when being redirected in http-form module, thanks to gash(at)chaostreff(dot)at 
  • Fix MSSQL success login condition, thanks to whistle_master(at)live(dot)com 
  • Fix http form module: optional headers and 3xx status redirect, thx to Gash 
  • Fix in configure script for --prefix option, thanks to dazzlepod 
  • Update of the dpl4hydra script by Roland Kessler, thanks! 
  • Small fix for hydra man page, thanks to brad(at)comstyle(dot)com 

    You can also take a look at the full CHANGES file
Check to Download THC-HYDRA v7.2........

UpDate........

Current Version: 7.4.1 
Last update 2012-12-24 

Check to Download THC-HYDRA v7.4.1........

kookoo - Telephony In The Cloud......

Build Voice Apps Using Existing Web Development Skills.......
KooKoo is the simplest and easiest way to build telecom applications IVRs, office PBX and outbound campaigns.You name it.You build it.


KOOKOO CONNECTS THE WEB WORLD TO THE TELECOM WORLD.


What is KooKoo?

KooKoo is an interface between your web application and the caller. It takes phone commands from you and executes them on your behalf to the caller.The best way to think of KooKoo is as just another web page in your application. Only difference is, the web page is accessible from the phone rather than the browser.

 Why does Kookoo exist?

  • To make it easier to build telecom applications 
  • To reduce setup costs for telephony applications 
  • To allow developers to connect their data to phone systems 
  • To hide telecom jargon from developers 
Check the link........

Goggle+ Windows7 Desktop Gadget....


G+7 - Google+ Stream
  • Google+ (googleplus) is a new hot social network from Google.
  • G+7 brings Google+ to your Windows desktop. With it, you can view live stream of updates from your Google+ friends without opening the browser.
Check the developer Link.........

Grooveshark-For Music Lovers....

If you have anything, hit me at bgsngi@zoho.com.........


Grooveshark is an internationally private online music search engine, music streaming service and music recommendation web software application, allowing users to search for, stream, and upload music for a charge that can be played immediately or added to a playlist.
Listen to any song in the world for free. Create free internet radio stations. Search for free mp3's to stream.


Add-on for Firefox , and for Chrome.....

BackBox linux-Penetration Testing Distribution...

BACKBOX linux OS for penetration..


BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, and best known ethical hacking tools.


Download it here......
See the list of Tools.....