28.9.08

3G is hacked too !




A group from Brazil has managed to unlock Apple's iPhone 3G handset just days after its release.
The unlocked iPhone is displayed and demonstrated in an online video on a Portuguese-language news blog.
An unlocked iPhone can be used with any Sim card and service provider.
IPhone user Bruno MacMasi said in an interview with Gizmodo that the unlocking process involved modifying the Sim hardware so that the International Mobile Subscriber Identity can be overwritten and removed from the original network.
A similar process was used to unlock the original iPhone last year.
Separately, a group of researchers known as the iPhone Devteam has released the first 'jailbreak' software releases for the iPhone 3G and the iPhone 2.0 software update.
The 'jailbreak' term refers to the process of removing the software controls which prohibit users from installing software outside of the iPhone App Store.
The group, which has asked not to be linked to directly for bandwidth purposes, is currently offering a software utility which automatically performs the jailbreak process.
Unlocked and modified handsets have been an issue ever since Apple first released the iPhone. Users initially were eager to remove the strict controls over installing software and run the handset with other carriers.
While the iPhone App Store has allowed for the distribution of third-party applications, there remains a dedicated group of users wishing to run older third-party applications and software which have not been approved for the Store.
Apple has attempted to remain relatively neutral on the matter. The company said that, while the jailbreak processes will void the warranty and possibly cause damage to the phone when new updates are installed, no special efforts will be made to deliberately disable or 'brick' hacked iPhones.

That 's a unlocking Iphone sample :


26.9.08

DIE HARD 4.0

Have u ever realize abt NMAP in die hard 4.0 ! gosh it is in here!



What's that ? Use for ?

Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.
Nmap is ...
Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many
port scanning mechanisms (both TCP & UDP), OS detection, version detection, ping sweeps, and more. See the documentation page.
Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines.
Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more.
Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap from source.
Free: The primary goals of the Nmap Project is to help make the Internet a little more secure and to provide administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is available for
free download, and also comes with full source code that you may modify and redistribute under the terms of the license.
Well Documented: Significant effort has been put into comprehensive and up-to-date man pages, whitepapers, and tutorials. Find them in multiple languages
here.
Supported: While Nmap comes with no warranty, it is well supported by a vibrant community of developers and users. Most of this interaction occurs on the
Nmap mailing lists. Most bug reports and questions should be sent to the nmap-dev list, but only after you read the guidelines. We recommend that all users subscribe to the low-traffic nmap-hackers announcement list.
Acclaimed: Nmap has won numerous awards, including "Information Security Product of the Year" by Linux Journal, Info World and Codetalker Digest. It has been featured in hundreds of magazine articles, several movies, dozens of books, and one comic book series. Visit the
press page for further details.
Popular: Thousands of people download Nmap every day, and it is included with many operating systems (Redhat Linux, Debian Linux, Gentoo, FreeBSD, OpenBSD, etc). It is among the top ten (out of 30,000) programs at the Freshmeat.Net repository. This is important because it lends Nmap its vibrant development and user support communities.

Click here to download NMAP !

19.9.08

Latest Hack News

Hot news :

You can access latest hot hack news every week on : http://worldsecure.blogspot.com

12.9.08

Careful these are just some of the Spy hidden ipcamera !

Smoke detector downward facing CMOS hidden wireless camera
Price: £179.00
This smoke detector enclosure conceals a downward pointing miniature CMOS camera specially designed for locating over a till, desk or kiosk window.It provides a means of monitoring a precise location were money, tickets, or goods are being sold, sorted or checked.The camera focus has been set to 2m which is just about right for most situations of this nature.Can be powered by a lithium PP3 battery or should you prefer a more permanent installation a mains power unit is included.

Red Stiletto land line CMOS hidden wireless telephone spy camera

Price: £159.00
There are not many telephones that stand up like this one does and if it does it's job and provides the evidence you need don't be a bit surprised to find it whizzing past your head when your partner finds out how you did it.


Roberts CRD-26 DAB Radio with high resolution low lux Wireless CCD hidden camera
Price: £359.00
Top of the range Digital Audio Broadcast (DAB) Radio receiver with the finest CCD miniture spy camera we can lay our hands on.The camera is cleverly hidden behind the clear plastic front cover making it impossible to detect yet not restricting the low light performance of this superb CCD camera.

Matsui clock radio iPod docking wireless CMOS camera

Price: £199.00

Keep a parental eye on teenage behaviour with this iPod docking station with its built in CMOS wireless camera. Comes complete with iPod adaptors so it can not only charge an iPod's battery but it will also power the iPod while playing back the music via it's sterio speakers. Also receives FM radio broadcasts.The unit is normally mains powered but can be operated on batteries when no mains power is available as can the CMOS camera.

My Word : Spy gadget could be anywhere at your home of office , Clock , TV , Radio , Mirror , Bathroom , Toilet Even on your Shower Gel . I know sometimes it seems to be dream but these technology now are expired çaz all of these cameras just could be covered in 2.4 Ghz ferequency and by this it means just limited coverage could be achieved . So Guys i just let you know how to discover these spy gadget from all of your facilities . Be safe !

Source : http://www.microspy.com/

Sun BlackBoX Amazing DataCenter


One Project Blackbox could provide 7 Terabytes of Memory and also One Project Blackbox could host a configuration that would put it among the top 200 fastest supercomputers globally.

Do you know what Makes it Unique?

-Deployable in 1/10th the time it takes to design, build and deploy a traditional datacentre.A fully configured (and configurable) virtualized datacentre housed in a standard 20' shipping container.Ability to configure mix of servers, storage, software and networking, including Solaris, Sun Fire and x64 systems.Packs more racks tighter than possible in a traditional datacentre.3 times the computing power for equivalent space.Integrated and centralized state-of-the-art cooling, networking and power distribution.Fans and Water-cooled Heat Exchanger provide in-circuit, energy-efficient water cooling that is 20% more efficient.Simple external hookup: chilled water, AC power, networking.Integrated de-humidifier, sensors, alarms, GPS.Floor and ceiling shock absorption system and Top Lock Pin protect installed servers for easier transport using standard shipping methods.Front and rear doors, central service aisle and slide mechanism for maintenance.Single end-to-end solution ownership, service and support.Ability to relocate compute assets near low-power sources to save up to $350,000/year on power costs!

Several patents are pending on Project Blackbox, from the general system and installed rack designs, to various aspects of the highly efficient cooling systems, including its environmental monitoring system that combine to deliver breakthrough economics and energy efficiency.


Tanx from Setareh !

11.9.08

Sun solaris Black Box S20 Data Center

Most Powerful DATA CENTER in performance , cooling , networking ,security and even in Physical Design !

Sun Modular Datacenter S20, widely known as Project Blackbox, is revolutionizing how companies, universities, and governments add datacenter capacity. With its high-density, eco-friendly design that enables rapid deployment, game-changing economics, and unimaginable mobility, Sun Modular Datacenter is reaching new customers world-wide who have been waiting for just this type of break-through solution.





Dimensions and Weight
Length
6.06m (20 feet)
Width
2.44m (8 feet)
Height
2.59m (8 feet 6 inches)
Shipping Weight (no payload)
<8,165 name="Anchor2">

Capacity
Rack Quantity
8 racks: 7 for payload and 1 for network and the Sun Modular Datacenter control equipment
Rack Units (RU)
40 RU per rack for 320 RU total
280 RU available for IT equipment
25 RU available for network equipment
15 RU reserved for the Sun Modular Datacenter monitoring, management, and control equipment
Rack Dimensions
EIA/ANSI (RETMA) standard 19" EIA RS-310-D
Height (usable)
177.9 cm (70 inches)
Depth (usable)
78.1cm (30.75 inches) *Includes cable, bezel, & handle depth
Width (usable)
48.26 cm (19 inches)
Load capacity per rack
862 kg (1900 lb.)
Power per rack
12.5kW standard per rack; 25kW "high power option" for seven payload racks

Power Options
Low Voltage Configuration
North America/JapanInput Voltage: 110/190 - 127/220 VAC, 3 Phase, 50/60 Hz, 600a per panelInternally Distributed Voltage: 110 - 127 VAC, 1 Phase and 190-220 VAC, 3 Phase, 50/60 Hz (Internal single phase not accessible)
High Voltage Configuration
InternationalInput Voltage: 220/380 - 240/415 VAC, 3 Phase, 50/60 Hz, 300a per panelInternally Distributed Voltage: 220-240 VAC, 1 Phase and 220/380 - 240/415 VAC, 3 Phase, 50/60 Hz (Internal single phase not accessible)

External Network Connections
Two network panels supported (choice of one option for each side)
Network Panel Options:
RJ-45 network panel (8 x RJ-45 connectors)
LC Fibre network panel (8 x LC fibre connectors - single or multi mode)
RJ-45/LC Fibre network panel (4 x RJ-45 and 4 x LC fibre - single or multi mode)
Bulk cable pass-through panel

Environmental
External temperature and humidity deployment range (doors closed)
-29°C to 54°C (-20°F to 130°F), up to 100% humidity
Internal operating temperature and humidity (doors closed)
10°C to 35°C (50°F to 95°F) and 20% to 80% relative humidity (RH), noncondensing
Altitude
3048 m (10,000 ft) or lower depending on payload maximum
Noise
56.0 dBA (external at 2 m)78.5 dBA (internal at nominal load)


Sun servers
Sun Fire™ E2900, Sun Fire T1000, Sun Fire T2000, Sun Fire T5120, Sun Fire T5220, Sun Fire V125,Sun Fire V210, Sun Fire V215, Sun Fire V245, Sun Fire V440, Sun Fire V445, Sun Fire V480, Sun Fire V490, Sun Fire V1280, Sun Fire X2100 M2, Sun Fire X2200 M2, Sun Fire X4100, Sun Fire X4100 M2, Sun Fire X4150, Sun Fire X4200, Sun Fire X4200 M2, Sun Fire X4450, Sun Fire X4500, Sun Fire X4600 M2, Sun Blade™ 6000, Sun Blade 8000, and Sun Blade 8000 P servers


Sun storage
Sun StorageTek™ 2530, Sun StorageTek 2540, Sun StorageTek 3120, Sun StorageTek 3320,
Sun StorageTek 3510, Sun StorageTek 5310, Sun StorageTek 5320, Sun StorageTek 6130, Sun
StorageTek 6140, Sun StorageTek 6540, Sun StorageTek CSM200, Sun StorageTek D240, and
StorageTek DAT 72 storage


Best Vaio Club

--Get your popcorn ready. The industry's first 16.4" extra-wide display features a unique 16:9 aspect ratio, perfect for viewing widescreen movies in their original cinematic format. Not only do the widescreen proportions minimize those annoying black bars during movies, they also offer an expansive workspace for viewing two pages side-by-side.


Performance
2.26Ghz (P8400) - 2.80Ghz (T9600) Intel® Core™ 2 Duo Processor
Available Intel® Centrino® 2 processor technology
1066Mhz Front Side Bus Speed
Up to 6MB L2 Cache


Memory & Storage
Up to 400GB hard drive, Serial ATA
Up to 4GB DDR2 SDRAM

Power
Estimated Battery Life: Up to 6 hours (standard capacity battery)
Up to 8 hours (large capacity battery)
Power Requirements: 100W + 10%


Communications
Fast Ethernet (RJ-45) Protocol
10Base-T/100Base-TX/1000Base-T
Integrated V.92/V.90 Modem (RJ-11)
Wireless LAN: Intel® WiFi Link 5100AGN (802.11a/b/g/n)
Integrated Stereo A2DP Bluetooth® technology


Graphics
Mobile Intel® Graphics Media Accelerator 4500MHD with Intel® Clear Video technolgy with 1340MB (max) total available graphics memory
Mobile Intel® GM45 Express Chipset
HDMI™ and VGA out

Optical Drive
Built-in DVD-RW drive, Blu-ray Disc RW drive, or BD combo drive.

Display
16.4" Screen
1600 x 900 Resolution
XBRITE-ECO™ or XBRITE-HiColor Technology




part 2 : Scanning



One of the three components of intelligence gathering for an attacker
􀁾 The attacker finds information about the
• specific IP addresses
• Operating Systems
• system architecture
• services running on each computer


The various types of scanning are as follows:


􀁾Port Scanning
• A series of messages sent by someone attempting to break into a computer to learn about the computer’s network services
• Each associated with a "well-known" port number


􀁾Network Scanning
•A procedure for identifying active hosts on a network
•Either for the purpose of attacking them or for network security assessment

􀁾Vulnerability Scanning
•The automated process of proactively identifying vulnerabilities of computing systems present in a network


Most wanted software for this part :

Advance Administrative Tools.zip
AntiFirewall
backstealth
firewalk
firewalk.pdf
firewar
Friendly Pinger.exe
genius
hping2 Tutorial.htm
httport3snf.exe
httrack Website Copier.exe
icmpquery.c
ipeye.exe
ipsecscan.exe
KingPing-1.0
Linux Tools
Lite-SOCKS
modem
ModemScan.msi
NeoWatchTrial24.exe
NetScanToolssetup.exe
Network Utilities
nmapwin.exe
PhoneSweep War Dialer
pinger
portscan.pdf
ProxyCap.msi
scanlogd
SNMPscanner
snort.exe
sockschain_setup.exe
SolarWinds Network Tools.exe
stealther_setup.exe
SuperScan
TeleSweep
thc-ts20
Tiny TCP Firewall
tunneld2
War Dialer Hacking techniques.mht
yaph
Zone Alarm Pro.exe
با سلام
دوستان عزیز ایرانی این وبلاگ کلیه مطالب در زمینه مختلف امنیتی و کامپیوتری را در اختیار شما قرار می دهد
در صورتی که به هر گونه نرم افزار یا سخت افزار خاصی نیاز داشتید میتوانید انرا به ادرس الکترونیکی ارسال کنید تا لینکهای مربوطه دراختیار شما قرار گیرد .این وبلاگ به تمامی فروشگاهها و مراکز خرید بزرگ دنیا دسترسی دارد که شما میتوانید به سادگی از این امکانات استفاده کنید

9.9.08

Part One : Footprinting


Introduction :
Footprinting is the first and most convenient way that hackers use to gather information about computer systems and the companies they belong to. The purpose of footprinting is to learn as much as you can about a system, its remote access capabilities, its ports and services, and the aspects of its security. Footprinting begins by determining the location and objective of an intrusion. Once this is known, specific information about the organization is gathered using non-intrusive methods. For example, the organization's own Web page may provide a personnel directory or employee bios, which may prove useful if the hacker needs to use social engineering to reach the objective. Conducting a whois query on the Web provides the domain names and associated networks related to a specific organization.
Other information obtained may include learning the Internet technologies being used; the operating system and hardware being used; IP addresses; e-mail addresses and phone numbers; and policies and procedures.
MoSt powerful footprinting sofware
e-Mail Tracking.exe , NeoTracePro.exe , Sam Spade.exe , Smart Whois , Visual Lookout.exe , Visual Profile.exe ,Visual Pulse.exe ,Visual Response.exe ,Visual Route.exe also Googling and some other website http://whois.ws/ , http://arin.net/ , http://whois.sc/

Please contact to recieve download Link : Worldsecure@hotmail.co.uk