Connect With Me In Facebook

Welcome to DefendHackers, If u want to Apply for a Blogroll as a Author , With h4ckfreak Mail me @ suren.click@gmail.com

Mark Zuckerberg tells 8th graders “there’s no shortcuts” and to make friends

By h4ckfreak

Metasploit Quick Start Referennce Guide

Metasploit Quick Start Referennce Guide , By h4ckfreak

IP Security

IP Security By H4ckfreak.

15 Network Admin Apps for Android

15 Network Admin Apps for Android , By h4ckfreak

Break All OS Passwords Using KON

Break All OS Passwords Using KON , By h4ckfreak

Recover Or Reset Ur Windows Pwd Using Ubuntu

Recover Or Reset Ur Windows Pwd Using Ubuntu , By h4ckfreak

Security Blueprint For Ethical Hackers..

By h4ckfreak

Blocking IP Using IPSec

By h4ckfreak

Preventing DDos Attacks, Combat Steps abd Tools...

By h4ckfreak

Showing posts with label Tech Updates. Show all posts
Showing posts with label Tech Updates. Show all posts

Sunday, March 11, 2012

Attention ! We`re Attacking FB from May 1St -By Anonymous


Attention citizens of the world, We are anonymous. The popular social network face book is in the midst of an alternative and long awaited event. Members of anonymous have decide it's time to show the face book corporation and the people of the world that the website is in fact vulnerable and that it's possible to be taken down with little effort. There has been multiple releases of face book related operations but none of them have actually had much of an effect, if any. Unlike the other video's we aren't going to bullshit the public about worthless denile of service attacks against face book, in the very near future anonymous will target face books main server farm in an attempt to cripple the root service computers, power supply system and data systems that control the basic web servers.


This inevitable cyber assault will take place on may the first two thousand and twelve. We will not stop until we have succeeded, we will finally kill face book forever and no one is going to stop us. for too long face book has controlled and manipulated its users, and on this historic yet anarchic day anonymous will prove to the world, that we are no longer playing. We hope, almost pray that you heed this warning. face book the game is over, anonymous wins. on may the first two thousand and 12 face book will systematically fail. We are anonymous, we are legion, we do not forget, we do not forgive, face book, expect us.


LULZ We DDoS'd Facebook https://www.youtube.com/watch?v=p1g6I3h6XBM

https://twitter.com/#!/FawkesSecurity
https://www.facebook.com/FawkesS3curity
https://www.facebook.com/groups/160102654090712/ fawkes_security@hotmail.com
WE ARE ANONYMOUS
WE ARE LEGION
WE DO NOT FORGIVE
WE DO NOT FORGET
EXPECT US.


By
h@ckfr3ak

Saturday, March 10, 2012

Exploring all DNS Records using DIG Commands

Using dig command you can query DNS name servers for your DNS lookup related tasks. This article explains 10 examples on how to use dig command.

1. Simple dig Command Usage (Understand dig Output)

When you pass a domain name to the dig command, by default it displays the A record (the ip-address of the site that is queried) as shown below.

In this example, it displays the A record of redhat.com in the “ANSWER SECTION” of the dig command output.
$ dig redhat.com

; <<>> DiG 9.7.3-RedHat-9.7.3-2.el6 <<>> redhat.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62863
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 3

;; QUESTION SECTION:
;redhat.com.                    IN      A

;; ANSWER SECTION:
redhat.com.             37      IN      A       209.132.183.81

;; AUTHORITY SECTION:
redhat.com.             73      IN      NS      ns4.redhat.com.
redhat.com.             73      IN      NS      ns3.redhat.com.
redhat.com.             73      IN      NS      ns2.redhat.com.
redhat.com.             73      IN      NS      ns1.redhat.com.

;; ADDITIONAL SECTION:
ns1.redhat.com.         73      IN      A       209.132.186.218
ns2.redhat.com.         73      IN      A       209.132.183.2
ns3.redhat.com.         73      IN      A       209.132.176.100

;; Query time: 13 msec
;; SERVER: 209.144.50.138#53(209.144.50.138)
;; WHEN: Thu Jan 12 10:09:49 2012
;; MSG SIZE  rcvd: 164
The dig command output has the following sections:
  • Header: This displays the dig command version number, the global options used by the dig command, and few additional header information.
  • QUESTION SECTION: This displays the question it asked the DNS. i.e This is your input. Since we said ‘dig redhat.com’, and the default type dig command uses is A record, it indicates in this section that we asked for the A record of the redhat.com website
  • ANSWER SECTION: This displays the answer it receives from the DNS. i.e This is your output. This displays the A record of redhat.com
  • AUTHORITY SECTION: This displays the DNS name server that has the authority to respond to this query. Basically this displays available name servers of redhat.com
  • ADDITIONAL SECTION: This displays the ip address of the name servers listed in the AUTHORITY SECTION.
  • Stats section at the bottom displays few dig command statistics including how much time it took to execute this query

2. Display Only the ANSWER SECTION of the Dig command Output

For most part, all you need to look at is the “ANSWER SECTION” of the dig command. So, we can turn off all other sections as shown below.
  • +nocomments – Turn off the comment lines
  • +noauthority – Turn off the authority section
  • +noadditional – Turn off the additional section
  • +nostats – Turn off the stats section
  • +noanswer – Turn off the answer section (Of course, you wouldn’t want to turn off the answer section)
The following dig command displays only the ANSWER SECTION.
$ dig redhat.com +nocomments +noquestion +noauthority +noadditional +nostats

; <<>> DiG 9.7.3-RedHat-9.7.3-2.el6 <<>> redhat.com +nocomments +noquestion +noauthority +noadditional +nostats
;; global options: +cmd
redhat.com.             9       IN      A       209.132.183.81
Instead of disabling all the sections that we don’t want one by one, we can disable all sections using +noall (this turns off answer section also), and add the +answer which will show only the answer section.
The above command can also be written in a short form as shown below, which displays only the ANSWER SECTION.
$ dig redhat.com +noall +answer

; <<>> DiG 9.7.3-RedHat-9.7.3-2.el6 <<>> redhat.com +noall +answer
;; global options: +cmd
redhat.com.             60      IN      A       209.132.183.81

3. Query MX Records Using dig -t MX

To query MX records, pass MX as an argument to the dig command as shown below.
$ dig redhat.com  MX +noall +answer

; <<>> DiG 9.7.3-RedHat-9.7.3-2.el6 <<>> redhat.com MX +noall +answer
;; global options: +cmd
redhat.com.             513     IN      MX      5 mx1.redhat.com.
redhat.com.             513     IN      MX      10 mx2.redhat.com.
You can also use option -t to pass the query type (for example: MX) as shown below.
$ dig -t MX redhat.com +noall +answer

; <<>> DiG 9.7.3-RedHat-9.7.3-2.el6 <<>> -t MX redhat.com +noall +answer
;; global options: +cmd
redhat.com.             489     IN      MX      10 mx2.redhat.com.
redhat.com.             489     IN      MX      5 mx1.redhat.com.

4. Query NS Records Using dig -t NS

To query the NS record use the type NS as shown below.
$ dig redhat.com NS +noall +answer

; <<>> DiG 9.7.3-RedHat-9.7.3-2.el6 <<>> redhat.com NS +noall +answer
;; global options: +cmd
redhat.com.             558     IN      NS      ns2.redhat.com.
redhat.com.             558     IN      NS      ns1.redhat.com.
redhat.com.             558     IN      NS      ns3.redhat.com.
redhat.com.             558     IN      NS      ns4.redhat.com.
You can also use option -t to pass the query type (for example: NS) as shown below.
$ dig -t NS redhat.com +noall +answer

; <<>> DiG 9.7.3-RedHat-9.7.3-2.el6 <<>> -t NS redhat.com +noall +answer
;; global options: +cmd
redhat.com.             543     IN      NS      ns4.redhat.com.
redhat.com.             543     IN      NS      ns1.redhat.com.
redhat.com.             543     IN      NS      ns3.redhat.com.
redhat.com.             543     IN      NS      ns2.redhat.com.

5. View ALL DNS Records Types Using dig -t ANY

To view all the record types (A, MX, NS, etc.), use ANY as the record type as shown below.
$ dig redhat.com ANY +noall +answer

; <<>> DiG 9.7.3-RedHat-9.7.3-2.el6 <<>> redhat.com ANY +noall +answer
;; global options: +cmd
redhat.com.             430     IN      MX      5 mx1.redhat.com.
redhat.com.             430     IN      MX      10 mx2.redhat.com.
redhat.com.             521     IN      NS      ns3.redhat.com.
redhat.com.             521     IN      NS      ns1.redhat.com.
redhat.com.             521     IN      NS      ns4.redhat.com.
redhat.com.             521     IN      NS      ns2.redhat.com.
(or) Use -t ANY
$ dig -t ANY redhat.com  +noall +answer

; <<>> DiG 9.7.3-RedHat-9.7.3-2.el6 <<>> -t ANY redhat.com +noall +answer
;; global options: +cmd
redhat.com.             367     IN      MX      10 mx2.redhat.com.
redhat.com.             367     IN      MX      5 mx1.redhat.com.
redhat.com.             458     IN      NS      ns4.redhat.com.
redhat.com.             458     IN      NS      ns1.redhat.com.
redhat.com.             458     IN      NS      ns2.redhat.com.
redhat.com.             458     IN      NS      ns3.redhat.com.

6. View Short Output Using dig +short

To view just the ip-address of a web site (i.e the A record), use the short form option as shown below.
$ dig redhat.com +short
209.132.183.81
You can also specify a record type that you want to view with the +short option.
$ dig redhat.com ns +short
ns2.redhat.com.
ns3.redhat.com.
ns1.redhat.com.
ns4.redhat.com.

7. DNS Reverse Look-up Using dig -x

To perform a DNS reverse look up using the ip-address using dig -x as shown below
For example, if you just have an external ip-address and would like to know the website that belongs to it, do the following.
$ dig -x 209.132.183.81 +short
www.redhat.com.
To view the full details of the DNS reverse look-up, remove the +short option.
$ dig -x 209.132.183.81

; <<>> DiG 9.7.3-RedHat-9.7.3-2.el6 <<>> -x 209.132.183.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62435
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 3

;; QUESTION SECTION:
;81.183.132.209.in-addr.arpa.   IN      PTR

;; ANSWER SECTION:
81.183.132.209.in-addr.arpa. 600 IN     PTR     www.redhat.com.

;; AUTHORITY SECTION:
183.132.209.in-addr.arpa. 248   IN      NS      ns2.redhat.com.
183.132.209.in-addr.arpa. 248   IN      NS      ns1.redhat.com.
183.132.209.in-addr.arpa. 248   IN      NS      ns3.redhat.com.
183.132.209.in-addr.arpa. 248   IN      NS      ns4.redhat.com.

;; ADDITIONAL SECTION:
ns1.redhat.com.         363     IN      A       209.132.186.218
ns2.redhat.com.         363     IN      A       209.132.183.2
ns3.redhat.com.         363     IN      A       209.132.176.100

;; Query time: 35 msec
;; SERVER: 209.144.50.138#53(209.144.50.138)
;; WHEN: Thu Jan 12 10:15:00 2012
;; MSG SIZE  rcvd: 193

8. Use a Specific DNS server Using dig @dnsserver

By default dig uses the DNS servers defined in your /etc/resolv.conf file.
If you like to use a different DNS server to perform the query, specify it in the command line as @dnsserver.
The following example uses ns1.redhat.com as the DNS server to get the answer (instead of using the DNS servers from the /etc/resolv.conf file).
$ dig @ns1.redhat.com redhat.com

; <<>> DiG 9.7.3-RedHat-9.7.3-2.el6 <<>> @ns1.redhat.com redhat.com
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20963
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 4
;; WARNING: recursion requested but not available

;; QUESTION SECTION:
;redhat.com.                    IN      A

;; ANSWER SECTION:
redhat.com.             60      IN      A       209.132.183.81

;; AUTHORITY SECTION:
redhat.com.             600     IN      NS      ns1.redhat.com.
redhat.com.             600     IN      NS      ns4.redhat.com.
redhat.com.             600     IN      NS      ns3.redhat.com.
redhat.com.             600     IN      NS      ns2.redhat.com.

;; ADDITIONAL SECTION:
ns1.redhat.com.         600     IN      A       209.132.186.218
ns2.redhat.com.         600     IN      A       209.132.183.2
ns3.redhat.com.         600     IN      A       209.132.176.100
ns4.redhat.com.         600     IN      A       209.132.188.218

;; Query time: 160 msec
;; SERVER: 209.132.186.218#53(209.132.186.218)
;; WHEN: Thu Jan 12 10:22:11 2012
;; MSG SIZE  rcvd: 180

9. Bulk DNS Query Using dig -f (and command line)

Query multiple websites using a data file:

You can perform a bulk DNS query based on the data from a file.
First, create a sample names.txt file that contains the website that you want to query.
$ vi names.txt
redhat.com
centos.org
Next, execute dig -f as shown below, which will perform DNS query for the websites listed in the names.txt file and display the output.
$ dig -f names.txt +noall +answer
redhat.com.             60      IN      A       209.132.183.81
centos.org.             60      IN      A       72.232.194.162
You can also combine record type with the -f option. The following example displays the MX records of multiple websites that are located in the names.txt file.
$ dig -f names.txt MX +noall +answer
redhat.com.             600     IN      MX      10 mx2.redhat.com.
redhat.com.             600     IN      MX      5 mx1.redhat.com.
centos.org.             3600    IN      MX      10 mail.centos.org.

Query multiple websites from dig command line:

You can also query multiple websites from the dig command line as shown below. The following example queries MX record for redhat.com, and NS record for centos.org from the command line
$ dig redhat.com mx +noall +answer centos.org ns +noall +answer

; <<>> DiG 9.7.3-RedHat-9.7.3-2.el6 <<>> redhat.com mx +noall +answer centos.org ns +noall +answer
;; global options: +cmd
redhat.com.             332     IN      MX      10 mx2.redhat.com.
redhat.com.             332     IN      MX      5 mx1.redhat.com.
centos.org.             3778    IN      NS      ns3.centos.org.
centos.org.             3778    IN      NS      ns4.centos.org.
centos.org.             3778    IN      NS      ns1.centos.org.

10. Use $HOME/.digrc File to Store Default dig Options

If you are always trying to view only the ANSWER section of the dig output, you don’t have to keep typing “+noall +answer” on your every dig command. Instead, add your dig options to the .digrc file as shown below.
$ cat $HOME/.digrc
+noall +answer
Now anytime you execute dig command, it will always use +noall and +answer options by default. Now the dig command line became very simple and easy to read without you have to type those options every time.
$ dig redhat.com
redhat.com.             60      IN      A       209.132.183.81

$ dig redhat.com MX
redhat.com.             52      IN      MX      5 mx1.redhat.com.
redhat.com.             52      IN      MX      10 mx2.redhat.com.

Saturday, January 7, 2012

Indian Hacker group threatens Symantec to release AV source code


Symantec is investigating an Indian hacking group's claims that it accessed source code used in the company's flagship Norton Antivirus program. 


A spokesman for the company on Thursday said that one claim by the group was false, while another is still being investigated.
Meanwhile, the Indian group, which calls itself Lords of Dharmaraja, has threatened to publicly disclose the source code shortly.

On Wednesday, the group posted on Pastebin what it claimed was confidential documentation related to Norton AntiVirus source code. A review of the material showed what appears to be a description of an application programming interface (API) for Symantec's AV product.
The group also posted what it claimed was the complete source code tree file for Norton Antivirus. That document appears to have been taken down.

'Yama Tough,' the hacker who posted the documents, released at least two more on Google+ allegedly related to Symantec source code. One of the documents appears to be a detailed technical overview of Norton Anti-Virus,



The document explains how the software is designed to work, but includes no actual source code, the spokesman said.
"However, a second claim has been made by the same group regarding additional source code and we're currently investigating that," he said. "For that one, we don't have any information to provide as of yet." the spokesman said.
Rob Rachwald, director of security strategy at security vendor Imperva said it is hard to know what to make of the hacking group's claims.
"We don't know how much of this is chest thumping" on the part of the hackers, Rachwald said. The source code tree file posted on Pastebin suggests the group has some potentially useful information related to Symantec's AV product, he said. "It is a good indicator, but not a perfect one.



Wednesday, November 23, 2011

Most Security Proffesional Has ASPERGER Syndrome, Even Adrian Lamo Has it



Last month Adrian Lamo(Who is Adrian Lamo), a man once hunted by the FBI, did something contrary to his nature. He says he picked up a payphone outside a Northern California supermarket and called the cops.
Someone, Lamo says, had grabbed his backpack containing the prescription anti-depressants he’d been on since 2004, the year he pleaded guilty to hacking The New York Times. He wanted his medication back. But when the police arrived at the Safeway parking lot it was Lamo, not the missing backpack, that interested them. Something about his halting, monotone speech, perhaps slowed by his medication, got the officers’ attention.
An ambulance arrived. “After a few moments of conversation, they just kind of exchanged a look and told me to get on the stretcher,” says Lamo.

[Update : We've clarified the headline of this story, and modified the text to clearly attribute the above details to Lamo. Since reporting this story, we've learned from police that Lamo's initial hospitalization in April 2010 came after Lamo's father phoned the Sacramento County Sheriff's department three times in as many days to report that Lamo was over-medicating with his prescription drugs, which may have had a profound impact on his speech and coordination. The Sheriff's office was unable to find a record of Lamo phoning the police himself. Lamo stands by his original explanation of the incident.]
Thus began Lamo’s journey through California’s mental health system — and self discovery. He was transported to a local emergency room and put under guard, and then transferred to the Woodland Memorial Hospital near Sacramento, where he was placed on a 72-hour involuntary psychiatric hold under a state law allowing the temporary forced hospitalization of those judged dangerous or unable to care for themselves. As the staff evaluated him and adjusted his medication, a judicial officer extended his stay, and three days became nine.
When Lamo was finally discharged to his parents’ house on May 7, he left the hospital with a new diagnosis. At 29 years old Lamo learned he has Asperger’s Disorder.

“It’s kind of a surprise that it took me until almost 30 to find I had a particular disorder and get proper treatment for it,” Lamo says.


Sometimes called the “geek syndrome",(Click Me to Find More About Geek Syndrome)” Asperger’s is a mild form of autism that makes social interactions difficult, and can lead to obsessive, highly focused behavior.
There are no reliable figures on how many people have Asperger’s, but anecdotally a lot of them are drawn into the computer field, particularly the logic-heavy world of coding. BitTorrent creator Bram Cohen has diagnosed himself with the disorder, and Microsoft founder Bill Gates is frequently speculated to have it.
Also anecdotally, people with Asperger’s are frequently diagnosed in adulthood, even into their 50s, according to the U.S. Autism and Asperger’s Association. As in Lamo’s case, the diagnosis often follows a run-in with the police, says Dennis Debbaudt, an independent consultant who trains law enforcement agencies on interacting with people on the autistic spectrum.
“They may be living a life where people think they’re odd, they’re unusual, they’re eccentric, whatever you want to call it,” says Debbaudt. “But nobody’s thinking, ‘Oh, by the way, I think they have Asperger’s Syndrome.’ It’s not something that would pop into the mind of the general person or law enforcement. It’s just, ‘There’s something different here. This person communicates different. His body language is different.’”
The Asperger’s diagnosis, though, didn’t come as a complete surprise to Lamo or his family — the therapist Lamo had been seeing for depression had already suggested he visit a specialist to be evaluated for Asperger’s. Now, the new medication prescribed in Woodland has made a positive change in his interactions with other people.
“Talking to strangers was really hard for me,” Lamo says. “I had to script it all in my head and act out normal behaviors in a very conscious way. Essentially, I had to learn how human beings act.”



Adrian Lamo at the home of his parents in Carmichael, California, five days after his release from an involuntary psychiatric hold.
“Now I no longer feel there’s a surface tension that I have to break through when I talk to somebody, like I’m a fish going after a particularly tasty bug and I have to break through the water to get it,” he continues. “I just talk to somebody, like it’s a natural function.”
To a reporter who’s been covering Lamo for a decade, the diagnosis makes a layman’s instant, intuitive sense.
Lamo made his mark in the early 2000s with a string of brazen but mostly harmless hacks against large companies, conducted out in the open and with a striking naiveté as to the inevitable consequences for himself. In 2001, when he was 20, Lamo snuck into an unprotected content-management tool at Yahoo’s news site to tinker with a Reuters story, adding a made-up quote by then-Attorney General John Ashcroft.
Lamo’s other targets included WorldCom, Excite@Home and Microsoft; he alerted the press to each intrusion, and sometimes worked with the hacked company to close the security holes he’d exploited. Unemployed at the time, and prone to wander the country by Greyhound, he was given the appellation “the Homeless Hacker” by the media.
His hacking career ended around 2002, after Lamo penetrated the internal network of The New York Times and added himself to the paper’s database of op-ed contributors, putting himself in the virtual company of William F. Buckley Jr. and Jimmy Carter. The Times didn’t think it was funny, and the FBI and federal prosecutors in New York charged Lamo under the Computer Fraud and Abuse Act. He pleaded guilty in 2004, and was sentenced to six months of house arrest at his parents’ home in Carmichael, California, followed by two years of probation.
It was around that time that Lamo fell into a deep depression that has dogged him until last month. “I’d associated his depression with what had happened with the FBI,” says his father, Mario Lamo, who describes his son as having had a normal childhood. “As a child he would give speeches to people and entertain visitors and talk about a thousand things, and we didn’t notice anything irregular,” he says.
But as a teenager, Lamo began struggling in social situations. Since his discharge from Woodland, “I’ve noticed an incredible difference,” says the senior Lamo.
Lamo joins a growing list of computer intruders who’ve been diagnosed with Asperger’s, though usually the diagnosis comes when the hacker faces the criminal justice system for the first time, rather than six years later.
In December, a defense psychiatrist concluded that credit card thief Albert Gonzalez exhibited behavior consistent with Asperger’s. A government-appointed psychiatrist rejected the claim, and Gonzalez got 20 years. Earlier, in August, a Los Angeles computer intruder involved in a lucrative fraud scheme received a slightly reduced sentence because of his Asperger’s, which his lawyer argued made him vulnerable to manipulation by the ringleader in the scheme.
In the most high-profile case, the British hacker Gary McKinnon was diagnosed with Asperger’s at the age of 42, shortly after losing a legal challenge to an extradition order that would have sent him to America to face charges of sabotaging unclassified Pentagon computers. The diagnosis opened new legal avenues for McKinnon, who now appears likely to avoid extradition.
For his part, Lamo thinks Asperger’s might explain his knack for slipping into corporate networks — he usually operated with little more than a web browser and a lot of hunch work. “I have always maintained that what I did isn’t necessarily technical, it’s about seeing things differently,” he says. “So if my brain is wired differently, that makes sense.”
But he scoffs at the notion that Asperger’s should mitigate the consequences of illegal behavior. Asperger’s might help explain his success in hacking, but not his willingness to do it, he says. “If, in fact, the diagnosis is accurate, it had zip to do with my actions at that time.”
While Lamo thinks he shouldn’t have been confined against his will, he says most of the hospital staff were well-intentioned and professional, and he’s been happier since the incident. “Many of them were beautiful people who had a great deal of genuine concern for their patients, and I feel that I benefited from their attention,” he says.
He tried to help them, as well. After the staff discovered his hacking past, they began seeking him out for computer advice. “The questions changed from, ‘Do you know where you are? What’s today’s date?,’ to, ‘Hey, I have a Mac.”
“They also untaped the login and password from the state mental health-database terminal at a nurse’s station,” he adds.
Today, he says, “I feel less sedated, more social, and I feel better able to carry out the day-to-day functions of the average member of society.
“I still can’t say if the situation were to be repeated back at the Safeway, that they wouldn’t look at me and say, ‘Yeah, yeah, better get him in.’”


i Guess i have it ..!! Check with yours with the Facts, I Confirmed after reading Wikipedia Article Chek em Out:


Asperger Syndrome

Happy Hacking & Keep Hunting


Monday, October 17, 2011

Mark Zuckerberg Uses Android Phone Finally

If his recent Facebook activity has to be believed, than Facebook’s founder and CEO might have just ditched his iPhone for Android. It was only last month when Mark made the headlines for switching to iPhone (it was 3GS, not iPhone 4) from BlackBerry. But the experience wasn’t all that great as he posted about his frustrations with the device, citing poor battery life, and phone calling quality. He also said that he will get the new iPhone 4 and see if that solves all his problems before switching to Android.
Facebook Zuckerberg on iPhoneMark Zuckerberg Profile on Facebook, June 2010
And now according to his recent Facebook activity, it looks like he has finally gone for an Android phone.
Mark ZuckerbergMark Zuckerberg Profile on Facebook, July 2011
But given the amount of revenues that he generates from the most popular social networking site, I wouldn’t be surprised if he keeps both the iPhone 4 and an Android phone to fulfill all his needs.
Oh and now that Zuckerberg is using an Android phone, we may finally see an update for Facebook for Android app which badly needs to get updated to come on-par with the iPhone version.

Tuesday, August 30, 2011

Facebook Recruits NIT Warangal(India) Student For 45lakh per annum




It's raining lucrative jobs at NIT Warangal which has had the best placement season so far. The 51-year-old institute started its recruitment drive on August 15 and already has a 21-year-old fourth year BTech computer science student securing the highest ever pay package of Rs 45 lakh per annum. The offer, made by Facebook, has created a record of sorts here. The institute confirmed that the student will be joining the technical wing of the social networking giant, as soon as he completes his course in March next year.

This has set a new benchmark at NIT Warangal in that the highest salary any student from the institute had bagged so far was Rs 20 lakh per annum. From the 2010-11 batch as many as three students had got jobs that paid them Rs 20 lakh per annum, sources at NIT said. It is not just the 21-year-old whizkid who has bagged a hefty package this year. According to sources, the salaries offered to students so far range anywhere between Rs 5 to Rs 12 lakh per annum. The recruitment process for this year that started on August 15 is expected to last till March 2012. Sources said that most of the recruiters so far are IT companies.

About 30 students from computer science stream of the institute have already been recruited. Eight companies have come in for recruitment in the first round so far. According to NIT officials, this year other than the usual brand of companies several new ones have expressed interest in hiring. "Companies have now shed the recession blues completely and are looking for fresh candidates to recruit. Many of them like Microsoft, Amazon, Oracle and Google could recruit more number of freshers than they did last year," said a senior professor from the institute. Last year, 92% students from the B Tech batch of the institute and 50 % students from M Tech batch were recruited by companies. The average pay package offered by companies last year was between Rs 6 and Rs 7 lakh per annum. The institute officials are expecting a considerable increase in the pay packages this year. NIT professors said that this year, several companies have been vying for the first interview slots with students.

"Most of the IT companies are willing to pay really well to bright students who get absorbed in the first or second interview. The companies who come for interviews later could offer bigger packages to students. We'll have to wait and watch what the salary trend this year is," said an official from NIT.

Sunday, July 17, 2011

Don’t buy an IPAD, Make one!




When [Liu] decided he wanted one of the new iPads, rather than fork out the cash he decided to build his own tablet Mac. His creation functions just as you would expect any tablet PC with some nice extra features such as running on Windows XP for any of you Microsoft lovers. [Lui’s] tablet apparently only cost him about $300USD, about half the price of the real thing. The two part video shows the entire construction in fast forward including a demonstration of the final working product. It looks like the tablet is built using spare tablet/laptop components and the case is constructed from sheet aluminium before being painted and labelled with apple stickers. The final product is a bit thicker than the real thing but looks great in the laptop style case [Lui] has whipped up. Kudos to the guy for saving a few bucks and making something great in the process, the video after the break is definitely worth a watch.

 PART 1:





PART 2 :


Click Here to Watch part 2 video


Thanks fr watchin guys

Wednesday, July 6, 2011

Google Launches WHAT DO YOU LOVE wdyl.com

Google  without any  announcement or hype, it silently launched a new service or new search page called What do you love? which can be accessed from the webpage




The new What Do You Love? search page lets you access search results from all Google products in a single page.According to Techcrunch, for example if you look for term “love“, you will find pictures of love, patents about love, love on Google Trends, videos about love, how to say love in different languages, books about love and all these results in a single page.Do you think this new search feature is interesting then try it yourself at www.wdyl.com

Monday, July 4, 2011

Reliance Netconnect Broadband Review

ts been a while since i've been using the reliance broadband netconnect plus . I did do a lot of searching on the internet before i decided on this product. Here's more on this :

The reason i wanted a product like this is because i realized that while travelling i needed to get access to the internet either on the go or at my destination . In most cases the places i went to had no internet access so i had to get access by
myself . Hence i decided to go with a 3g data card.


I had two primary options - the reliance netconnect plus and the tata photon plus . I did a lot of searching on the internet you know the typical reliance netconnect vs tata photon google search :) . And after all that hunting i decided to go with
reliance for the following reasons :

1)Reliance is known to have a much better network coverage
2) They were a little more cheaper in terms of costs
3) They had the pay as you use option i.e. 1 Rs/mb which photon did not provide

I was really excited about the 3rd reason because then i dont need to go for any plan or pack where there is a validity.The idea is to use this only while travelling cause at home i have my DSL connection . Whenever i travel its usually over the
weekend or maximum 4-5 days , so getting a monthly pack or plan would be a waste.
Hence postpaid was never an option as i dont want to spend monthly as i dont travel every month. In prepaid to i wasnt looking for any packs/plans which is valid for 15 days etc cause i wont be using it for that long. The best option was pay as you use i.e. 1Rs/mb which only reliance provides . At the most i could go for the 200Rs pack which has a 7 day validity.

My browsing usage while travelling is not much just very light browsing .Mostly email and other such similar sites or even chat . Very less of audio/video chat . So the 1 Rs/mb is suitable or maybe at the most the 7 day validity pack.
So i decided to go for this and went ahead and purchased the device . Put in a top up of around 150 Rs which i can use as 1Rs/mb which means i can use 150mb as and when i want no validity period as such and this is more than enough for email,chat etc .This is also of great use when your DSL line is down for some reason and you need internet access immediately.
Reliance also provides an online interface to check your balance and to do an online recharge incase you find yourself out of balance while you are travelling.
Will hopefully be able to do a how to on how to setup reliance netconnect plus. On the whole i am pretty happy with the service. The coverage of reliance is amazing , they cover a lot of cities across the country and in other cities which it is
not covered you will be connected to the 1X network which is not all that bad. Decent for browsing mail etc.
The reliance customer care is pretty good , very helpful and polite people . On the whole if you are in a similar situation that i am in , reliance netconnect is a good option . You just need to shell out an initial amount of around 2k Rs and after that its like filling petrol for your car :) .

Thursday, June 9, 2011

Disable Facial Recognition in FACEBOOK

I rarely upload photos to my Facebook account and was surprised the other day when, after uploading a few vacation pictures, Facebook had identified the faces of the people in my photos and asked if I wanted to tag them. Of course, it’s not always accurate, but I was impressed at how Facebook got about nine out of 10 matches right, identifying the correct names with the faces. It made my tagging-time much lower, but it also creeped me out a bit. Where did this feature come from, and why wasn’t I notified of it?





The facial recognition feature, called Tag Suggestions, is selected as the default on Facebook, which, not surprisingly, has a lot of people upset. It’s really not hard to change the settings, but it’s a little annoying that you have to opt out instead of opt in. If you’d prefer to opt out and turn off facial recognition, here’s how:
    1. Look to the upper-right-hand corner of your screen and click the Account drop-down menu. 2. Click Privacy Settings. 3. Select the Custom tab on the left-hand side of the column towards the bottom of the page. 4. Select the Customize Settings option at the bottom. 5. The second set of options on this page is “Things others share.” Click on the Edit Settings button under “Suggest photos of me to friends.” 6. Here, you’ll see a dropdown menu on the right selected as “Enabled.” Click that and change to Disabled.
And that’s it! Once you disable the Tag Suggestions feature your friends won’t be able to automatically tag you in any photos. You may not see the option yet, but it’s coming. Facebook is in the process of rolling it out worldwide, so make sure to check back if you’re concerned about being tagged. If not, don’t worry about it and wait for the slew of email notifications from your Facebook friends telling you that you’ve been tagged in 30 photos.

Wednesday, June 8, 2011

Mark Zuckerberg Kills What he Eats




Mark Zuckerberg leaned Chinese last year. This year Mark Zuckerberg is pursuing a new “personal challenge”, when he’s not busy connecting people across the world. Its about food. Mark Zuckerberg only eats what he kills. It includes a lobster, chicken, pig and a goat. Zuckerberg even posted a message on his private Facebook page on May 4 saying:
“I just killed a pig and a goat.”

Mark takes a personal challenge each year (in 2009, he wore a tie every day), and this year is about animals and meat.
“This year I’ve basically become a vegetarian since the only meat I’m eating is from animals I’ve killed myself,” Zuckerberg wrote in an email to Fortune.
He told Fortune in an email that:
I spend almost all of my time building Facebook, so these personal challenges are all things I wouldn’t normally have the chance to do if I didn’t take the time. Last year, for example, my personal challenge was to learn Chinese. I blocked out an hour every day to study and it has been an amazing experience so far. I’ve always found learning new languages challenging, so I wanted to jump in and try to learn a hard one. It has been a very humbling experience. With language, there’s no way to just “figure it out” like you can with other problems — you just need to practice and practice. The experience of learning Mandarin has also led me to travel to China, learn about its culture and history, and meet a lot of new interesting people


This year, my personal challenge is around being thankful for the food I have to eat. I think many people forget that a living being has to die for you to eat meat, so my goal revolves around not letting myself forget that and being thankful for what I have. This year I’ve basically become a vegetarian since the only meat I’m eating is from animals I’ve killed myself. So far, this has been a good experience. I’m eating a lot healthier foods and I’ve learned a lot about sustainable farming and raising of animals.
I started thinking about this last year when I had a pig roast at my house. A bunch of people told me that even though they loved eating pork, they really didn’t want to think about the fact that the pig used to be alive. That just seemed irresponsible to me. I don’t have an issue with anything people choose to eat, but I do think they should take responsibility and be thankful for what they eat rather than trying to ignore where it came from.

Thursday, June 2, 2011

35 Funnaeh Statistics About Email One Should Know



Back with a New Job, Gottaa tell you all My Job Gonna Keep me Busy Hereafter, And i am learning Alot  and enjoy learning and i Love My JOB...!!     Ok  Come Back to trackWhether you are gathering research for marketing, trying to support a project or just making a point the use of statistics always helps build a stronger argument. The following list of statistics were put together regarding email and fall under a variety of subjects such as general email, email marketing and, of course, email security.
  1. In 2011  there were 1.9 billion email users worldwide. That is projected to grow to 2.5 billion users by the year 2014.
  2. In 2010 there were an estimated 2.9 billion email mailboxes. 730 million of them are business email inboxes.
  3. There was an estimated 294 billion emails sent every day in 2010 totaling over 90 trillion emails sent every year, or 2.8 million emails sent every second.
  4. The average number of emails sent by a typical business user each day is 43. That same user receives an average of 130 emails each day.
  5. Of those 294 billion email messages sent every day it is estimated that 90% of them are spam or malicious.
  6. The average corporate employee spends 25 percent of their work day on email related tasks. This is compared to 14 percent spent on face to face meetings and 9 percent spent on the phone.
  7. The amount of spam is increasing at a rate of 20 to 25 percent every year.
  8. 74% of all adults online state that email is the preferred method of communication.
  9. A Yahoo! survey found that one third of all people would rather clean their toilets than clean out their email inbox.
  10. The average size of an email message is 75 KB which is about 7000 words in plain text.
  11. The average size of a spam message is less than 5 KB in size.
  12. The average user spends about 1 hour and 47 minutes using email.
  13. One third of all people aged 18 to 34 check their email when they first wake up.
  14. 62 percent of people admit that they regularly check work email over the weekend and 50 percent admit to checking work email while on vacation. 78 percent of this is done using mobile devices.
  15. Lost productivity due to dealing with spam costs businesses approximately $897.86 per user every year.
  16. 26 percent of Small and Medium Sized Businesses will suffer around 30 minutes of unplanned downtime every month when it comes to email services.
  17. In 2008 there were 158 billion marketing emails sent by US retailers and wholesalers. By 2013 that number is expected to grow to 258 billion.
  18. 91 percent of all spam contains some sort of link.
  19. 18 percent of all spam makes use of a URL link shortening service.
  20. Out of the 76 billion spam messages sent with a Bit.ly shortened URL, 168,000 where clicked at a rate of .0002 percent.
  21. 64 percent of all spam messages are related to a pharmaceutical product. Other popular topics include Casinos at 7 percent and watches at 6.5 percent.
  22. 1 in 284 emails contain malware.
  23. 1 in 445 emails are phishing attempts.
  24. Only .7 percent of spam comes from free webmail services like Gmail or Hotmail.
  25. 1.1 percent of spam were forged to look like they were sent from legitimate webmail accounts.
  26. Botnets account for 88.2 percent of all spam sent to your inbox.
  27. A single bot sends approximately 77 spam emails per minute.
  28. In 2010 there were over 339,600 different malware strains identified in emails that were blocked as being malicious.
  29. In 2010 Italy intercepted the highest percentage of spam at 93.5 percent.
  30. The continent responsible for sending the highest percentage of spam in 2010 was Europe at 39.3 percent.
  31. Before it was brought down, Rustock was responsible for 47.5 percent of all spam, or 44.1 billion spam messages sent out every day.
  32. The second most productive spam botnet in 2010, the Grum botnet, was responsible for 9 percent of all spam equaling 7.9 billion messages a day.
  33. Roughly 93 percent of all spam in 2010 was sent in English. 5.7 percent of these messages were considered to be unknown.
  34. Only 33 percent of all spam messages sent to Brazilian email addresses was sent in Portuguese.
  35. In 2010 Outlook was the most popular email client with 36.71 percent of the market share. Hotmail was second with 16.23 percent.

Thursday, May 12, 2011

Recent Facebook XSS Attacks (A Small Research)

A few weeks ago, three separate cross-site scripting (XSS) vulnerabilities on Facebook sites were uncovered within a period of about 10 days. At least two of these holes were used to launch viral links or attacks on users – and it’s clear that attacks against Facebook users are becoming increasingly sophisticated.



The first issue came from a page on the mobile version of Facebook’s site. The interface was a prompt for posting stories to a user’s wall, and the parameter for the text of the prompt did not properly escape output. On March 28, a blogger identifying themselves as “Joy CrazyDaVinci” posted code that demonstrated how the vulnerability could be used to spread viral links:
<iframe id=”CrazyDaVinci” style=”display:none;”
src=”http://m.facebook.com/connect/prompt_feed.php?display=wap&user_message_prompt=’<script>window.onload=function(){document.forms[0].message.value=’Just visited http://y.ahoo.it/gajeBA Wow.. cool! nice page dude!!!‘;document.forms[0].submit();}</script>”></iframe>
This bit of HTML would be included in a viral page. The code sets the content of the wall post to a message that includes a link to a viral page, then submits the prompt automatically. Anyone clicking the link would get the same code executed on their account. The viral page could be used for malware distribution or phishing attacks, but in most cases where I saw this trick used, the page simply loaded advertisements or “offer spam”.



By the next day, several links were spreading virally and caught the attention of security researchers. Facebook moved quickly to patch the issue, and Crazy DaVinci issued an apology for the example code, explaining that versions of it had actually been circulating for several days prior and that the demonstration was intended to push Facebook for a fix.
On April 3, another XSS problem came to light, this time with a Facebook “channel” page used for session management. Both another security researcher and I had previously looked at this interface and found it properly escaped, so it’s likely a code update mistakenly changed the page’s behavior. Facebook again patched the problem soon after news of it spread.
I didn’t observe any viral exploitation of the second vulnerability in the wild, but after the first problem came to light, I noted that it was mostly used to submit a form already on the page for posting links. The payload made use of functionality within the vulnerable page, but XSS allows an attacker to do far more. I wondered when we might see a Facebook attack that made greater use of cross-site scripting’s potential.

What a Difference a Space Makes

I didn’t have to wait long. On April ,I got word via Twitter of a Facebook app that had live XSS, but the app had disappeared before I got to see it in action. At first, I thought this was yet another case of XSS within the context of a Facebook app. But I soon found other version of the app which were still online, and I quickly realized this was actually an XSS problem with the Facebook Platform. Also, the XSS payload being used did much more than submit a form.
The attack used FBML-based Facebook apps, which render in the context of an apps.facebook.com page. Normally, Facebook filters code to prevent any scripts from directly modifying the page’s DOM, but the XSS problem gave attackers a bypass. When a user visited the app page, they would see what appeared to be a fairly benign page with a popular video.

Unlike many Facebook page scams, the promised video actually works – if you click play, the video will load and nothing unusual seems to happen. But as the code screenshot below reveals, that click does much more than load the video.





When the page first loads, the “video” is actually just an image placeholder with a link. Part of the href parameter for that link is shown above. Note the space after the opening quotation mark – that’s where the XSS comes in. Normally, Facebook would block a link to a javascript: URL. Adding the space worked around Facebook’s filters, but the browser would still execute the rest of parameter.


According to Facebook, it turned out that some older code was using PHP’s built-in parse_url function to determine allowable URLs. For example, while parse_url(“javascript:alert(1)”) yields a scheme of “javascript” and a path of “alert(1)”, adding whitespace gives a different result: parse_url(” javascript:alert(1)”) does not return a scheme and has a path of “javascript:alert(1)”. Other PHP developers should take note of the difference if parse_url is being used in security-related code.

A More Advanced Attack

Clicking the link executed an inline script that in turn added a script element to the page. This loaded more code from a remote address and included several parameters in the GET request. The parameters set variables within the remote code that specified what video to load, what URLs to use for viral posts, and so on. Multiple Facebook apps and domains were used for the viral links, but the main script always came from the same host. This helped the attack persist, since blocking one site would not stop it and the central code was loaded dynamically.
The remote code handled actually loading the video, but also included a number of functions which make use of having script access in a facebook.com context. The script would set the user as attending spam events, invite friends to those events, “like” a viral link, and even send IMs to friends using Facebook Chat.
When I came across the attack, one block of code had been commented out, but one blogger discovered a version of the attack a few days prior and saw it in action. This part loaded a fake login form which actually sent the entered username and password to a log interface on the attacker’s server. (Remember, this phishing form would appear in the context of a page with typical Facebook chrome.) Since the attack page would load even if a user was not logged in to Facebook, this could have also been a way to make sure a session was available before launching the other functions.
Fake videos and viral links are nothing new on Facebook, but most of these scams tend to be fairly simple. In fact, it’s not hard to find forums where people offer boilerplate code for launching such schemes – much like the first XSS worm above which simply submitted a form. But the April XSS attack involved multiple domains, multiple user accounts, and multiple methods for spreading and hijacking user accounts. And it still only scratched the surface of what’s possible with an XSS vulnerability. I expect we’ll see more XSS-based attacks and more powerful payloads in the future.

Postscript on Real-Time Research

I came across the April attack late one afternoon as I was preparing to leave work… so I could present on XSS at a local OWASP meeting! Those following me on Twitter saw a somewhat frantic stream of tweets as I tried to find live examples of the attack and sorted through the code while closely watching the clock and wrapping up last-minute presentation details. Earlier this week, I did some searching to review information for this post, and I came across this article from eWEEK: “Facebook Bully Video Actually an XSS Exploit“.



I was a bit surprised by it, as I hadn’t known about it before and saw that it quoted me. I then realized it was quoting my tweets! I then read that I had “confirmed to eWEEK on Twitter” one aspect of the story. At first I was confused, but then remembered that during my flood of tweeting, another user had sent an @ reply asking about the very detail the story talked about. Checking that tweet again, I found out the question had come from the article’s author.
I relate all this not because any of it bothered me, simply because
(1) I found it somewhat fascinating that a few quick Twitter updates could become the primary source for a news article and

(2) I was humbled to realize that a few quick Twitter updates could become the primary source for a news article! While it’s great that a story can spread so fast, it was certainly gave me a reminder to be careful when discussing topics of interest on a public forum.


But I’m glad I can do my part in helping raise awareness of online dangers, particular the implications of XSS.

Wednesday, May 11, 2011

How one man tracked down Anonymous—and paid a heavy price

 Aaron Barr believed he had penetrated Anonymous. The loose hacker collective had been responsible for everything from anti-Scientology protests to pro-Wikileaks attacks on MasterCard and Visa, and the FBI was now after them. But matching their online identities to real-world names and locations proved daunting. Barr found a way to crack the code.
In a private e-mail to a colleague at his security firm HBGary Federal, which sells digital tools to the US government, the CEO bragged about his research project.
"They think I have nothing but a heirarchy based on IRC [Internet Relay Chat] aliases!" he wrote. "As 1337 as these guys are suppsed to be they don't get it. I have pwned them! :)"
But had he?

"We are kind of pissed at him right now"


Barr's "pwning" meant finding out the names and addresses of the top Anonymous leadership. While the group claimed to be headless, Barr believed this to be a lie; indeed, he told others that Anonymous was a tiny group.
"At any given time there are probably no more than 20-40 people active, accept during hightened points of activity like Egypt and Tunisia where the numbers swell but mostly by trolls," he wrote in an internal e-mail. (All e-mails in this investigative report are provided verbatim, typos and all.) "Most of the people in the IRC channel are zombies to inflate the numbers."
The show was run by a couple of admins he identified as "Q," "Owen," and "CommanderX"—and Barr had used social media data and subterfuge to map those names to three real people, two in California and one in New York.
Near the end of January, Barr began publicizing his information, though without divulging the names of the Anonymous admins. When the Financial Times picked up the story and ran a piece on it on May 4, it wasn't long before Barr got what he wanted—contacts from the FBI, the Director of National Intelligence, and the US military. The FBI had been after Anonymous for some time, recently kicking in doors while executing 40 search warrants against group members.
Confident in his abilities, Barr told one of the programmers who helped him on the project, "You just need to program as good as I analyze."
Aaron Barr
But on may 5, one day after the Financial Times article and six days before Barr's sit-down with the FBI, Anonymous did some "pwning" of its own. "Ddos!!! Fckers," Barr sent from his iPhone as a distributed         denial of service attack hit his corporate network. He then pledged to "take the gloves off."






When the liberal blog Daily Kos ran a story on Barr's work later that day, some Anonymous users commented on it. Barr sent out an e-mail to colleagues, and he was getting worked up:  "They think all I know is their irc names!!!!! I know their real fing names. Karen [HBGary Federal's public relations head] I need u to help moderate me because I am getting angry. I am planning on releasing a few names of folks that were already arrested. This battle between us will help spur publicity anyway."
Indeed, publicity was the plan. Barr hoped his research would "start a verbal braul between us and keep it going because that will bring more media and more attention to a very important topic."
But within a day, Anonymous had managed to infiltrate HBGary Federal's website and take it down, replacing it with a pro-Anonymous message ("now the Anonymous hand is bitch-slapping you in the face.") Anonymous got into HBGary Federal's e-mail server, for which Barr was the admin, and compromised it, extracting over 40,000 e-mails and putting them up on The Pirate Bay, all after watching his communications for 30 hours, undetected. In an after-action IRC chat, Anonymous members bragged about how they had gone even further, deleting 1TB of HBGary backup data.
They even claimed to have wiped Barr's iPad remotely.
The situation got so bad for the security company that HBGary, the company which partially owns HBGary Federal, sent its president Penny Leavy into the Anonymous IRC chat rooms to swim with the sharks—and to beg them to leave her company alone. (Read the bizarre chat log.) Instead, Anonymous suggested that, to avoid more problems, Leavy should fire Barr  and "take your investment in aaron's company and donate it to BRADLEY MANNINGS DEFENCE FUND." Barr should cough off up a personal contribution, too; say, one month's salary?
As for Barr's "pwning," Leavy couldn't backtrack from it fast enough. "We have not seen the list [of Anonymous admins] and we are kind of pissed at him right now."
Were Barr's vaunted names even correct? Anonymous insisted repeatedly that they were not. As one admin put it in the IRC chat with Leavy, "Did you also know that aaron was peddling fake/wrong/false information leading to the potential arrest of innocent people?" The group then made that information public, claiming that it was all ridiculous.
Thanks to the leaked e-mails, we now have the full story of how Barr infiltrated Anonymous, used social media to compile his lists, and even resorted to attacks on the codebase of the Low Orbit Ion Cannon—and how others at his own company warned him about the pitfalls of his research.

Sunday, April 17, 2011

Serious Vulnerability in GMAIL ( Still Not Fixed)

 I really Don kno wen the big guys gonnna listen to those such bugs (Hackersbay.in == h4ckolic) already Reported a serious bug in Facebook API, Still no response and (Amarjit.info==> Amarajit singh has also reported about iframe Bug In Google , Still the ..same) And As We all kno the FAMOUS Bug in Google that is Gmail Accepts the dots in between the username Still no answer for the same, And Up Again GMAIL Has exposed with new Bug that we gonnna talk about..

Gmail is NUMBER one of the major webmail service provider across the globe. But as we all know Gmail still carries that 4 letter word [""BETA""]. Sometimes we may wonder, why Gmail is still in the testing stage even after years of it’s emergence. Here is one small reason for that.(In tha middle i guess Each Org like Facebook , Yahoo , Google , Have to listen actively to the Feedback Dept..Coz They cant hire lobby testers to test each tiers, Instead They can Look at the Bugs Reported by tha Patriotic Hackers Or Security Proffessionals)

Gmail follows a strict rule that doesn’t allow it’s users to have their first or the last name contain the term Gmail or Google. That is, while signing up for a new Gmail account the users cannot choose a first or last name that contains the term Gmail or Google. You can see this from the below snapshot.

Google or Gmail cannot be used as first or last name



This rule is implemented by Gmail for obvious reasons, because if the users are allowed to keep their first or the last name that contains the term Gmail or Google, then it is possible to easily impersonate the identity of Gmail (or Gmail Team) and engage themselves in phising or social engineering attacks on the innocent users. This can be done by simply choosing the first and last name with the following combinations.

First Name    Last Name

Gmail                Team

Google             Team

Gmail               Password Assistance

From the above snapshot we can see that, Gmail has made a good move in stopping the users from abusing it’s services. However this move isn’t just enough to prevent the malicious users from impersonating the Gmail’s identity. Because Gmail has a small vulnerability that can be exploited so that the users can still have their name contain the terms Gmail or Google. You may wonder how to do this. But it’s very simple.

1. Login to your Gmail account and click on Settings.

2. Select Accounts tab

3. Click on edit info

4. In the Name field, select the second radio button and enter the name of your choice. Click on Save Changes and you’re done!

Now, Gmail accepts any name even if it contains the term Google or Gmail. You can see from the below snapshot


gmailhack



Allowing the users to have their names contain the terms Gmail or Google is a serious vulnerability even though it doesn’t seem to be a major one. This is because a hacker or a malicious attacker can easily exploit this flaw and send phishing emails to other Gmail users asking for sensitive information such as their passwords. Most of the users don’t even hesitate to send their passwords since they believe that they are sending it to Gmail Team (or someone authorized). But in reality they are sending it to an attacker who uses these information to seek personal benefits.

So the bottomline is, if you get any emails that appears to have come from the Gmail Team or similar, don’t trust them! Anyone can send such emails to fool you and take away your personal details. Hope that Gmail will fix this vulnerability as soon as possible to avoid any disasters.


Anyway they Not gonnna listen..Frigggin up

Thursday, March 10, 2011

Obama Wants New Taxes for National Broadband Network

Wow,Long time Noo See.. okay, in the U.S. ,a huge national broadband plan the FCC proposed creates a national policy for the taxation of digital goods and services imposing a fee to create a national public safety wireless broadband network. Being a network guy, Especially Grey Hat expert(Well I have atleast talk about myself in this corner little..Lol), I am all for expanding the wireless networks!
However, the Obama administration has a plan to do it with more taxes and higher fees. Nice.. new taxes and fees, couldn’t be better timing.
What I don’t understand is why this new ridiculous plan proposes a new tax to create this safety wireless broadband network - I thought this is why we pay taxes in the first place? This reminds me of my homeowner  adding Xtra Room Charges  and surcharges for Pain tha Building,and Maintanence Blah blah, which is the reason I was told why we pay HOA fees in the first place.

The FCC defends itself by saying this “new” national tax would eliminate the headaches that come with varying state and local taxes on digital goods and services. And the public safety network would help avoid the communication failures among first responders to the Sept.  terrorist attacks and Hurricanes Katrina and Rita. Always in the name of safety…if I could only sell HACKING books in the name of “keeping the U.S. safe”!
Okay, I am trying as hard as I can to make this blog politics free, but come on! America is in a deep recession and now the Obama policies want to RAISE taxes on taxes that are already being raised to pay for healthcare, bank bailouts, the housing crisies, ad nasum….insert your reason here….But wait, is this just a U.S issue? Far from it! This started in the U.K in 2008 and we’re just seeing it here with net neutrality issues, and add the IPv4 address allocation issues – I am getting exahusted from thinking about it


h4ckfreak

Wednesday, January 26, 2011

Mark Zuckerberg FB fan page hacked On 26/1/2011 (Shocked News)

 Yesterday
There are some clues left by the person who hacked Mark Zuckerberg's Facebook fan page on Wikipedia – but what do they add up to ? 

Who Will Trace the Guy ?




Facebook CEO Mark Zuckerberg Facebook chief Mark Zuckerberg's fan page was hacked.

Let's follow up some of the trail left in the Mark Zuckerberg Facebook fan page hacking incident.

The only – and best clue – is the link left by the hacker in the status update posted on Zuckerberg's wall, which reads "Let the hacking begin: if facebook needs money, instead of going to the banks, why doesn't Facebook let its user invest in Facebook in a social way? Why not transform Facebook into a 'social business' the way Nobel Price [sic] winner Muhammad Yunus described it? http://bit.ly/f26rT3 What do you think? #hackercup2011"

That contains a bit.ly link. Well, you can find out what the original URL is by adding a plus on the end, so: http://bit.ly/fs6rT3+ From which we can see that about 17,000 people clicked the link. Not bad (though we have to say that Julian Assange gets more clicks when he appears on the Guardian ... but we digress).

The original, shortened link was actually: http://en.wikipedia.org/wiki/Social_business?h=d044aeb71f4e466a552708fc6e3863ef&thanksforthecup=https://www.facebook.com/photo.php%3Fpid%3D393752%26id%3D133954286636768%26fbid%3D170535036312026

Let's begin with the second part of the long link – the part that starts "thanksforthecup": it's URL-encoded (so "%3D" actually stands for the character "=", "%26" for "&") and leads to a Facebook photo page for the Hacker Cup, a competition run by Facebook itself. So the hacker is saying he thinks he should get the cup. OK, we get it.

Now, back to the first part. If you just click the link, you'll be taken to Wikipedia's page about social business. But not the latest version – to a specific version in its edit history. That is, to http://en.wikipedia.org/wiki/Social_business?h=d044aeb71f4e466a552708fc6e3863ef – which is not the same, now, as http://en.wikipedia.org/wiki/Social_business. If you open them in two tabs, or just open the first in a tab and click on the "Article" link in the top left, you'll see it. Go back and forth a couple of times and you might spot the difference. Yes? No? Have a look at this difference page, then. (And look at how it was before that edit.)

Yup, the difference is the addition in the first sentence. Usually, that reads:



"A '''social business''' is a non-loss, non-dividend company designed to address a social objective"

. But in the edited (older) version that you get sent to, the phrase

" much like [http://www.romanstwelve.net www.romanstwelve.net]"

has been added. (The square brackets turn the text into a link going out to romanstwelve.net). And what does that site do? It offers "total web consulting" and is based in Pickerington, Ohio.

Crucially, as the picture shows, that edit was only on Wikipedia for two minutes on Tuesday 25 – between 19.17EST and 19.19EST – indicating that the hacker must have created the edit with the link and then deleted it straight afterwards, but kept the link to the version he had edited. Then he encoded the link for the photo and attached it to the Wikipedia link, and stuffed the whole lot into bit.ly. Then, having got the shortened link, he went and updated the status on the fan page. The timing of the change, and its reversion, indicates that this was the same person. You don't accidentally link to an old version of a page; you'd link to the generic version.

In other words, we might be able to find the hacker if we can find out who changed the Wikipedia page. Unfortunately, it wasn't done by a registered user. But because of Wikipedia's clever tracking system, you can see the IP of non-registered users: there it is at the top of the edit page in the screenshot: 131.74.110.168. You can also see what articles machines at that IP address have edited – a very mixed bag–- and also how edits from that IP have been increasingly smacked down by Wikipedia editors (latest on that page coming from October 2009: "Please stop your disruptive editing. If you continue to vandalise Wikipedia, as you did at Lyoto Machida, you will be blocked from editing."

So who's behind 131.74.110.168? A quick whois query tells you that it... the US department of defence in Williamsburg.

In other words: this might be someone in the military. Most likely those edits don't come from one person – they come from all sorts of people in the Williamsburg location. Or, just as possible, it was someone who had hacked into the computers there from outside (not as difficult as you'd hope it would be) and is using them as a proxy to make the Wikipedia edit, and, quite possibly, hack Zuckerberg's page. (We've asked Facebook whether Zuckerberg's page was accessed from that IP, but haven't had an answer yet.)

That's about all the clues we have: a US DOD IP, a transient Wikipedia page, and a link to a web consulting business. We asked Jeremy Reger, of Romanstwelve, if he was involved with or knew who was behind the hacking. His answer is an emphatic no: "Hackers don't link to pages who then link to pages. I do not have any idea who did the hack." He added: "I'm sure Facebook would confirm that the IP [address] in the wiki history in not the same IP that "hacked" the fan page."

Saturday, January 22, 2011

WIKILEAKS HIRING HACKERS

Hey Niggas , Wondering While u read, Everything is truth, As u r seeing it..Believe..! We all have been known that WIKILEAKS has Tored the Fake face of America, And America Tryin To DDOS the Wikileaks And Successfully have done it..!! now www.wikileaks.org has been moved to mirror.wikileaks.org,
“JULIAN ASSANGE IS THE ONE MAN ARMY I GOTTTA SAY” Wikileaks has Showcased all the Drama of United States




Few Revealled Stuffs by WIKILEAKS:
1. IRAQ WAR LOGS
2. Calling tha Bessst World leaders in a NICK NAME.
3. Intruded in all governments Personal Stuff.
4. Spying on all Countries activites
5. SRILANKA WAR LOGS AGAINST Tamilian

Like all the Secrets has been revelaed With facts and Proffs,

Wikileaks Officialy Said Still they are having 2.5 Laks Of Confidential Notes From U.S Embassey
Hilary Clinton also warned there should not be Any post Regarding About one Secrets, If IT Happpens, Will be taken Series Account Leads to immediate action, (Ho HILARY am jus Askin Do u think Julian Assange(WIKILEAKS TEAM) India Or Wat…Watever u Say, To Nodding up Head Right and left)
This is WIKILEAKS..
Lets See Wat the steps Has taken Still So Far..
This Case has Been Movved To F.B.I , With Few Hired Hackers And Security Proff They DDosed And Main Site Has Been Shut Down…!! But Mirror Site (Backup Site) is still Active Upon now ..!!




( EVERYDNS.NET ) Wikileaks Has been hosted by this Provider F.B.I Forced to remove the Registration Entries..And Finally they Acted Upon..!
Now WIKILEAKS Has Come up With 729 Websites , Like( Replication in tha ROBOT Movie,If u have Seen tha Climax of tha movie u can understand it better)..So Now its hard for FBI To Identify tha Targeted Server Because Each Server From Different Location they hav hosted , And Wikileaks Are Looking to Take it 7000 Websites..!! And Hell Ya..!! NO WAY TO FIND…




And Here are the 729 Websites , Now Wikileaks CABLE Datas are available..! This Information is Strictly Confidential And Have Got Permission to Publish In Hackersbay.in

wikileaks.as50620.net wikileaks.tard.is ipv6 freeus.jsdev.org
wikileaks.enzym.su freeus.jsdev.org wikileaks.cellue.de
wikileaks.kafe-in.net wl.opsec.eu ipv6 wl.donatepl0x.com
wikileaks.challet.eu wikileaks.kister.org wl.gernox.de
wikileaks.morningtime.com wikileaks.renout.nl wikileaks.fdn.fr
wikileaks.gonte.se wikileaks.kaptenkong.se
wikileaksmirror.proxelsus-hosting.de ipv6 leaks.gooby.org
wikileaks.dubronetwork.fr ipv6 wikileaks.perry.ch wikileaks.sbr.im
wikileaks.u0d.de
wikileaks.81-89-98-125.blue.kundencontro...
www.fuckip.de wikileaks.psytek.net wl.mrkva.eu wikileaks.joworld.net
www.wlmirror.com wikileaks.chiquitico.org wikileaks.rout0r.org
www.gruiiik.org wikileaks.adhelis.com wikileaks.high-color.de
wikileaks.holarse-linuxgaming.de wl.alfeldr.de wikileaks.jikan.fr
wikileaks.huissoud.ch wikileaks.geekview.be wikileaks.fs-cdn.net
wikileaks.burnzone.de wikileaks.dysternis.de wikileaks.nulset.net
wikileaks.franslundberg.com wikileaks.krkr.eu ipv6 wl.yoltie.net
wikileaks.gnourt.org wikileaks.theunfamiliar.co.uk wikileaks.zeitkunst.org
wikileaks.aelmans.eu wikileaks.serverius.net wikileaks.synssans.nl
wl.ernstchan.net wikileaks.yasaw.net zwartemarktplaats.com
wikileaks.dena-design.de wikileaks.zone84.net wikileaks.subastas-xxx.com
wikileaks.iuwt.fr wikileaks.fernandoramirez.com.ar wikileaks.chmod.fi
wlmirror.wildeboer.net www.wikileaks.freelists.com.au leaked.rndm.ath.cx
wikileaks.splichy.cz wleaks.3sge.pulsedmedia.com
wleaks.hellfire.pulsedmedia.com wikileaks.palisades-berlin.de
wikileaks.razor1911.com wikileaks.dokansoft.com.ar
wikileaks.thinkfurther.de wikileaks.trankil.info wikileaks.gonte2.nu
leaks.stumcomie.com wikileaks.timburke.org wikileaks.ehcdev.com
wikileaks.zurk.org wikileaks.myscripts24.de wikileaks.breit.ws
wikileaks.emilts.com wikileaks.ruicruz.pt wikileaks.now-pages.com
wikileaks.ego-world.org wikileaks.nerdpol.org ipv6 cablegate.r3blog.nl ipv6
wikileaks.footboot.net www.wikileakz.eu wikileaks.realprogrammer.org
wikileaks.the-secret-world.info wikileaks.superjoesoftware.com
wikileaks.rtjuette.de wikileaks.rustigereigers.nl mirror1.wikileaks.lu
mirror2.wikileaks.lu wikileaks.emptyflask.net internaluse.net
wikileaks.r00t.la wikileaks.cordover.id.au brd.mcbf.net
wikileaks.merciful.nl wikileaks.spurious.biz wikileaks.1407.org
wl.datendetektei.de ipv6 wikileaks.mollar.me azow.selb.us
wikileaks.furdev.org wikileaks.datkan.net ipv6 wikileaks.nortemagnetico.es
wikileaks.threefingers.ca wikileaks.brenne.nu ipv6 www.anontalk.com
wikileaks.hutonline.nl vm8157.vps.tagadab.com nl1.wikileaksmirror.nl
wikileaks.noomad.org wikileaks.xcplanet.com www.wikileaks.nw-ds.com
wikileaks.infinium.org.uk wikileaks.piratskasit.cz peoplerule.info
wikileaks.sirobert.com wikileaks.solvare.se wikileaks.marktaff.com
wikileaks.hmaks.com im.wikileak.im wikileaks.aamjanata.com
www.wikigoteo.dialetheia.net wikileaks.dft-labs.eu
wikileaks.julietvanree.com wikileaks.argenton.ch wikileaks.i0i.co
wikileaks.lionelwood.com wikileaks.antifan.de ipv6 wasiutynski.net
wikileaks.diedx.nl wikileaks.chram.net wikil3aks.dyndns.org
wikileaks.encgmail.com wikileaks.yoerin.nl wikileaks.mcpond.co.nz
wikileaks.siwhine.org wikileaks.schroth.cx wikileaks.delight.ch
wikileaks.moochm.de wikileaks.syncaddict.net www.hallitus.info
info.patourie-systems.com wikileaks.softic.cz wikileaks.redhog.org
wikileaks.brokenbydesign.org wikileaks.nisd.dk wikileaks.sentientrobot.net
wikileaks.kronoss.org wikileaks.s4ku.com wikileaks.glembotzky.com
wikileaks.nperfection.com wikileaks.laquadrature.net
wikileaks.legrandsoir.info wikileaks.artwww.net wikileaks.39mm.net
leaks.uaqv.com wikileaks.krtek.net www.emilts.com leaks.3nglish.co.uk
wikileaks.explain-it.org wikileaks.dunnewind.net wl.fcharlier.net
wikileaks.poete.eu.org wikileaks.datenscheibe.org wikileaks.kapitein.org
www.wikileaks.djity.net wikileaks.nodemaster.de wikileaks.listepik.net
wikileaks.explain-it.org wikileaks.sedrati-dinet.net wikileaks.rigacci.org
wikileaks.ratm.ch wikileaks.tonbnc.fr cablegate.sentientrobot.net
wikileaks.ist-bremer.de wikileaks.spinrise.com wikileaks.rothnet.org
wikileaks.webtito.be ipv6 wikileaks.lainconscienciadepablo.net
wikileaks.g33kthug.co.uk wikileaks.b166er.net
wikileaksmirror.matstace.me.uk 87.106.58.253 wikileaks.virii.lu
wikileaks.junkle.org leaks.iamfos.co wikileaks.wass-media.com
wikileaks.karlsen.co wikileaks.lupine.me.uk ipv6 wikileaks.webprofiles.org
wikileaks.azatoth.net wl.unbloggbar.org santocristo.info
wikileaks.back2hack.cc wikileaks.supercrapule.com wl.treymassingill.com
wikileaks.poliisi.mobi wikileaks.karlsen.co wikileaks.rickfalkvinge.se
wikileaks.amette.eu wikileaks.batsh.it wikileaks.freei.me
wikileaks.chsdl.de last.to wikileaks.iheartfreedom.ca
wikileaks.rackstack.com wikileaks.serverlicious.org wikileaks.excds.se
wikileaks.under.ch leaks.kooll.info wikileaks.nldla.com
cablegate.dyndns.info wikileaks.afturgurluk.org wikileaks.phasebook.net
wikileaks.emquadat.com wikileaks3.no-ip.org wikileaks.hermans.net
wikileaks.urli.eu wikileaks.laotracarboneria.net wikileaks.datapusher.net
wleaks.shellmix.com wikileaks.citizen-boycott.org wikileaks.in-edv.de
wl.hor.de wl.rekursion.ch naixt-genne.com wikileaks.aircraftdispatch.net
wikileaks.cimeterre.info wikileaks.2qt.us wikileaks.rhgnet.de
wikileaks.crypton-technologies.net wikileaks.xgstatic.fr
wikileaks.medienfuzzis.com wl.creative-guerillas.com wikileaks.philpep.org
ipv6 wikileaks.para-dice.de wikileaks.outcast.no wikileaks.bandsal.at ipv6
wikileaks.concretedonkey.cz.cc wikileaks.oualid.net
wikileaks.webterrorist.net wl.22web.net wikileaks.deepdata.de
wikileaks.theano.de wikileaks.buzzworkers.com wikileaks.electric-castle.net
wikileaks.caseid.org wikileaks.luchaspopulares.org wikileaks.paysen.net
wikileaks.atpolitics.com wikileaks.otnf.tk wikileaks.nslu2-info.de
leaks.letsneverdie.net wikileaks.yasaw.net wikileaks.atpolitics.com mhym.de
www.wikileaks.videoteppista.net wikileaks.deutero.org wikileaks.grokia.se
wikileaks.tamcore.eu wikileaks.youfailed.de wikileaks.stephaneerard.fr
wikileaks.jotocorp.com wikileaks.canariaswireless.net
wikileaks.thearksakura.com wikileaks.org.org wikileaks.thefrackin.info
wikileaks.maero.dk wikileaks.metrogeek.fr wikileaks.simplaza.net
gouv.delation.org wikileaks.fellr.net wikileaks.mindfreakonline.de
wl.dixon.pl wikileaks.zombix.pcriot.com wikileaks.wkellner.com wl.thj.no
wikileaks.sodom.se wikileaks.macventure.de wikileaks.damn1337.de
wikileaks.bitciple.com wl-mirror.sokoll.com wikileaks.224charenton.net
help.majestan.com wikileaks.giggsey.com wl.kallix.net ipv6
wikileaks.unknowntruth.net wl.kaizer.se wikileaks.legalsutra.org
wikileaks.kitara.nl wikileaks.kyak106.com wikileaks.marpeck.net
wikileaks.leech.it wikileaks.pamphleteer.de wikileaks.return0.de
wikileaks.0x04.com wikileaks.mirror.jfet.org wikileaks.nerdhero.org
wikileaks.3ofcoins.net wikileaks.g0rn.com wikileaks.chpwn.com
wikileaks.fuck.cc wikileaks.hoppipolla.net wikileaks.slackdev.com
wikileaks.openmafia.org wikileaks.paper.st wikileaks.efremigio.es
wikileaks.zanooda.com wikileaks.wtfstfu.org wikileaks.freedomofspee.ch
www.elajt.info wikileaks.chuso.net wikileaks.letras.net wikileak.eicat.ca
wleaks.fryking.se wikileaks.0xff.it wikileaks.apileofbytes.com
wikileaks.revspace.nl leaks.curaj.tv wikileaks.mumu.cz wikileaks.kassala.de
wikileaks.mairipa.com wikileaks.crome.us wikileaks.chpwn.com
wikileaks.waixan.se wikileaks.k-ribou.com wikileaks.stasi.fi
wikileaks.milchi.de wl.kollegstufe.org leaks.freudian.sl wikileaks.laez.nl
wikileaks.dexite.de 74.63.248.219 wl.ownage4u.nl wikileaks.peer7.de
wikileaks.infinityloop.es wikileaks.orfeu.es wikileaks.myke.us
wikileaks.noova.de ipv6 wikileaks.leckerbits.com wikileaks.jikbag.net
wikileaks.pesqair.com wikileaks.nicolbolas.org ipv6 wikileaks.vixns.net
wikileaks.byteserv.de wikileaks.zro.co wikileaks.popcnt.org
wikileaks.acm.jhu.edu raubmordkopiert.ws wikileaks.adoutte.com
wikileaks.iodev.org wikileaks.ludost.net wikileaks.roethof.net ipv6
wikileaks.thespinlight.com wikileaks.apathie.net wl.mimamau.de
www.wikileaks.ufone.de wikileaks.mooo.se wikileaks.neofosis.com
wikileaks.eglin.net kileaks.byethost6.com www.mistermikileaks.com
wikileaks.pwnt.nl majjj.com wikileaks.antoniojperez.info
wikileaks.ig33k.com wikileaks.extensity.co.nz wikileaks.rudemusic.net
wikileaks.adoutte.com dgmx2k.dyndns.org:800 wl.fuldaecho.de
wikileaks.nc23.de www.wikileaks-backup.com wikileaks.bynoob.com
wl.mrblue.name wikileaks.martindv.es mirror.friendsofwikileaks.org.uk
wikileaks.disknode.org wikileaks.adundo.com wikileaks.lazzurs.net
wikileaks.deathserv.net wikileaks.tollofsen.se wikileaks.brokenco.de
wikileaks.buckyslan.com wikileaks.moell.us wikileaks.classcast.de
wikileaks.datenwelten.de www.priv.us wikileaks.neopt.org
wikileaks.samhargreaves.eu www.finngaria.de wikileaks.skvorsmalt.cz
wikileaks.neurd.org wlmirror.cosego.com leaks.boerdy.net
wikileaks.gundam.eu ipv6 novgorod.zunedevwiki.org ipv6 wikileaks.biz.tm
wikileaks.k4hosting.com wl.i2pbote.net leaks.underrun.org
wikileaks.simleb.cc wl.stefanpopp.de wikileaks.tejero.ca
www.keepinformationfree.com whatever.grillcheeze.com wikileaks.olivu.com
wikileaks.jieji.org wikileaks.zakulisa.org wlm.flooble.net
wikileaks.eondream.com www.shamanhouse.com wikileaks.galama.net
wikileaks.eondream.com wikileaks.goodlifebikes.ca wl.newscenterx.de
wikileaks.kofuke.org ipv6 wikileaks.xr3.cc dev.quadodo.net
wikileaks.cybertroops.com wikileaks.yacy.info wikileaks.anarka.nl
wikileaks.happyforever.com wikileaks.data-get.org wikileaks.humanpets.com
wikileaks.spectle.com wikileaks.hellopal.biz wleaks.verymad.net
whitenetdownloads.com WL.sanvicentemedia.com
wikileaks.lotek.org wikileaks.profithost.net wikileaksmirror.eu
wikileaks.chronzz.co wikiconstitution.info wikileaks.tinychan.org
wikileaks.holy.jp leaks.no.net www.wikileaks.angelbeast.org
www.wikileaks.angelbeast.org wikileaks.drewhavard.com wikileaks.keladi.org
wikileaks.awardspace.us wikijm.com wikileaks.pandas.es
wikileaks.mustashwax.com wikileaks2.info wikileaks.artwww.net
wikileaks.oneeyedman.net wikileaks.openconnector.net wikileaks.jordanroy.net
wikileaks.crazzy.se wikileaks.moo2ah.com wl.udderweb.com
www2181u.sakura.ne.jp wikileaks.blackwire.com wikileaks.rlsjrnl.info
wikileaked.jamestheawesome.kicks-ass.net wikileaks-in.ganesh.me 80.70.1.168
wikileaks.luotettu.net wikileaks.xakep.name wikileaks.jejaring.org
wikileaks.mahut.sk wl2.gernox.de wikileaks.mine-server.info
wikileaks.revoleaks.com bonsainetz.de www.spacemission.org
wikileaks.media.pl wikileaks.imrof.li wikileaks.hoper.dnsalias.net
wikileaks.escism.net wikileaks.lelapinblanc.eu wikileaks.tryptamine.net
wikileaks.piratenpartei-nrw.de wikileaks.cancamusa.net wikileaks.skarta.net
wikileaks.is-back.de wikileaks.radiopark.biz ipv6 wikileaks.nexiom.net
wikileaks.matschbirne.com www.extremesocial.biz wikileaks.blokovi.com
wikileaks.mooselook.de wikileaks.minibofh.org wikileaks.lengua.fr
wlmirror.riepernet.org wikileaks.aamjanata.com wikileaks.joevr.org
wikileaks.toile-libre.org wikileaks.parano.me wikileaks.slite.org
wikileaks.zvdk.nl wikileaks.picturesbyphilipk.de wikileaks.hostingjuice.com
wikileaks.editia.info wikileaks.renout.nl wikileaks.phoeney.de
wikileaks.msga.se wikileaks.infotubo.com wikileaks.adzi.net www.example.sk
wikileaks.wazong.de RealnoeBlinDelo.com
wikileaks.redandblack.cz ipv6 wikileaks.matschbirne.com wikileaks.aadnoy.no
wikileaks.erfassungsschutz.net wikileaks.aleph-0.net
wikileaks.oliverbaron.com wikileaks.vyus.de wikileaks.ladstaetter.at
wikileaks.willjones.eu wikileaks.anti-hack.net wikileaks3.piratenpartij.nl
wikileaks.ninanoe.net wikileaks.g0tweb.com 74.207.247.66
wikileaks.schuijff.com wikileaks.venix.eu wikileaks.iqaida.de
fremont.ca.us.wikileaks-mirror.com wikileaks.version2.nl
newark.nj.us.wikileaks-mirror.com london.uk.eu.wikileaks-mirror.com
dallas.tx.us.wikileaks-mirror.com zurich.ch.wikileaks-mirror.com
wikileaks.zici.fr wikileaks.tunny.ch wikileaks.boneputra.net
wikileaks.breit.ws wikileaks.weltgehirnmaschine.de wikileaks.csbnet.se
wikileaks.digital-revolution.at wl.dyndns-wiki.com wikileaks.nijhofnet.nl
ipv6 leaks.mooninhabitants.org wikileaks.ralforolf.com
wikileaks.pancake-pirates.org wl.farhad.su 93.90.28.65 wl.it.cx
wikileaks.lickmychip.com wikileaks.kimori.org wikileaks.beispieldomain.org
wikileaks.topdownmedia.nl wikileaks.webpagearts.com wikileaks.noreply.to
wl.openbotnet.eu wikileaks.univers-libre.net wikileaks.queralt.me
wikileaks.loutre.ch gatw.nl wikileaks.yourhero.de
wikileaks.disruptive.org.uk wl.scottymeuk.co.uk wikileaks.interblag.org
wikileaks.euridies.com wl.farhad.su wikileaks.jesolo-wants-adsl-back.info
wikileaks.ansible.fr wikileaks.violetsky.ch
wikileaks.dieinternetprofis.info wikileaks.daphne-dionys.com
wlmirror.dyndns.org whistleblower.futtta.be wikileaks.beraldoleal.com
newfagscanttriforce.com wikileaks.xen.no wikileaks.trylle.no
wikileaks.groissgroissgroiss.com wikileaks.nervsoft.com.ar
wikileaks.facenews.ru wikileaks.orientanet.es wikileaks.my-niap.org
wikileaks.phpdata.org wikileaks.nekochan.ch wklks.dyndns.org
wikileaks.uenota.org.ua wikileaks.4574.co.uk wikileaks.silverbullion.jp
wikileaks.gentlehost.net wikileaks.gonades.org wkl.fdumas.fr
wikileaks.gvoice.eu wikileaks.wiki-mirror.de wikileaks.socketubs.net
wikileaks.network-13.com wikileaks.sety.cz wikileaks.uruknet.com
wikileaks.brechi.com beatriceask.se wikileaks.uenota.org.ua
cablegate.dev-null.biz wikileaks.aditam.org wikileaks.bitplay.ru
wl.razor1911.com wlmirror.hopto.org:8000 wikileaks.mserverz.de
wikileaks.mazej.net:8080 wikileaks.com.hr wikileaks.bcweb.co.uk
wikileaks.weis.tk cablegate.technoaddict.fr wikileaks.jsphoto.at
wikileaks.africanaristocrat.com wikileaks.walgemoed.net
wikileaks.michaelkesler.info wikil.dyndns.org wikileaks.equal.cluenet.org
ipv6 wikileaks.bennyjacobs.nl wikileaks.kor.de
wikileaks.creativereasons.co.uk wikileaks.2114.su wikileaks.blazor.org
wl.shathor.com wikileaks.arulns.com wikileaks.fuxter.ru wiki.arrr.tv
wikileaks.synful.us wikileaks.nodehost.co.uk wikileaks.pod.cvut.cz
wikileaks.ihide.in wikileaks.nukezone-cnd.com wikileaks.key-server.de
wikileaks.silenceisdefeat.com wikileaks.reezer.org wikileaks.evilsocket.net
wikileaks.u35.dk wikileaks.felixbecker.name wikileaks.3g.de
wikileaks.tbotcotw.com wikileaks.b0x.lv wikileaks.sekil.fr
wikileaks.ebsserver.nl www.mirrorleaks.com partyboy.me
wikileaks.dashavoo.com 178.77.79.170 wikileaks.runlevel3.org
wikileaks.txapelbeltz.net wikileaks.av3s.net wikileaks.soft-creation.de
wikileaks.foetusproducts.com leaks.hw.is wikileaks.kiney.de
wikileaks.prismation.com wikileaks.brunogola.com.br
wikileaks.spiltirsdag.dk wikileaks.gehostet.de wikileaks.dennix.eu
wlm.hor.de iwikileaks.co.cc ewikileaks.co.cc wikileaks.sebastianbartsch.eu
wikileaks.bodji.net leaks.freecooki.es wikileaks.ecobytes.net
wikileaks.rolamasao.org cablegate.dyndns-remote.com
wikileaks.karimhossen.fr wikileaks.hlubina.com the-loser.net
wikileaks.tancee.com wl-tdl.ath.cx wikileaks.kermsware.net
wikileaks.kutxa.homeunix.org geheimnisse.taegli.ch www.swisswikileaks.ch
wikileaks.scratchbook.ch wikileaks.extranet.ee wikileaks.event-lan.net
wikileaks.bosna-i-hercegovina.info december.freez.in ipv6
wikileaks.mein-le.de wikileaks.mretc.net wikileaks.i-caramba.de
wikileaks.uwe.gd wikileaks.co.nl wikileaks.robsayers.com
wikileaks.i-caramba.de wikileaks.otherreality.net ipv6
wikileaks.hostalis.net wikileaks.maketo.se wikileaks.sharea.tk
wkleak.tartiflettes.com wikileaks.varchar.nl wikileaks.anavallasuiza.com
wikileaks.plixup.fr wikileaks.imrof.li freedomisimportant.org
wleaks.ddsd.de wikileaks.archive-one.us wikileaks.delovayakolbasa.ru
wikileaks.german-radio.net wikileaks.rootssh.net wikileaks.itos.pl
wikileaks.hackerheaven.org ipv6 wl.paranoidsecurity.nl
wikileaks.jugendverein.nl wikileaks.redcube.nl www.pucawo.net
wikileaks.neodox.org wikileaks.besthost.nl wikileaks.hinin.fr
wikileaks.WhoTheFox.com
wikileaks.capitanruby.es wikileaks.rorbuilder.info wikileaks.ce.tc
109.109.225.178 www.netur.net wleak.de ipv6 wikileaks.insultant.nl ipv6
wikileaks.eldaria.net wikileaks.dennix.eu wikileaks.spacedigital.eu
wikileaks.vanwoudt.com wikileaks.ypanema.de wikileaks.mindfarming.de
wikileaks.feh.name wikileaks.a-dit.fr wikileaks.jcowboy.org
wikileaks.diario-geek.com


-- Wikileaks Hiring Hackers Security Proffessional To Manage their Site,ur Original Information is Handled With tighten security Wen registering Domain For u On tha behalf of wikileaks, Your Job is to receive the Documents and Keeeps Postin on it as it Comes, Owner Can be a single person , Security Geek , Corporation , Security Consultant Firm….E.t.c
For More regarding Visit tha Main ..(Mirror sire) Site Of Wikileaks.org

ENJOY THA UPDATES WITH US…