Tuesday, July 24, 2012

Russian man accused of launching distributed-denial-of-service (DDOS) attacks on Amazon.com

Dmitry Olegovich Zubakha, a Russian man accused of launching distributed-denial-of-service (DDOS) attacks on Amazon.com, has been arrested this week by authorities in Cyprus based on an international warrant, the Department of Justice revealed.

Zubakha, a native of Moscow, was indicted for two denial of service attacks in 2008 on the Amazon.com website. The indictment, unsealed Thursday, also details denial of service attacks on Priceline.com and eBay.

"Orders from Amazon.com customers dropped significantly, as legitimate customers were unable to access the website and complete their e-commerce transactions during the pendency of the attack," read an indictment unsealed in district court in western Washington on Thursday. The botnet involved requested "large and resource-intensive web pages" on a magnitude of between 600 and 1,000 percent of normal traffic levels, according to the indictment.

The hacker is charged with conspiracy to intentionally cause damage to a protected computer, possession of more than 15 unauthorized access devices, aggravated identity theft, and intentionally causing damage to a computer resulting in a loss of over $5,000 (4,000 EUR).

Zubakha and his friend claimed credit for the attacks on online hacker forums, and law enforcement traced 28,000 stolen credit card numbers to the pair in 2009. For that reason, Zubakha and his partner are also charged with aggravated identity theft for illegally using the credit card of at least one person.

The charges faced by Zubakha carry potential penalties of up to 10 years in prison and a $250,000 (£160,000) fine.

CVE-2012-0217 - Intel SYSRET FreeBSD Privilege Escalation Exploit Released

The Vulnerability reported on 06/12/2012, dubbed as "CVE-2012-0217" - according to that Some 64-bit operating systems and virtualization software running on Intel CPU hardware are vulnerable to a local privilege escalation attack. The vulnerability may be exploited for local privilege escalation or a guest-to-host virtual machine escape.
FreeBSD/amd64 runs on CPUs from different vendors. Due to varying behaviour of CPUs in 64 bit mode a sanity check of the kernel may be insufficient when returning from a system call. Successful exploitation of the problem can lead to local kernel privilege escalation, kernel data corruption and/or crash.

Inj3ct0r team today released related private exploit on their website, which allow normal FreeBSD users to Privilege Escalation. All systems running 64 bit Xen hypervisor running 64 bit PV guests onIntel CPUs are vulnerable to this issue.

However FreeBSD/amd64 running on AMD CPUs is not vulnerable to thisparticular problem.Systems with 64 bit capable CPUs, but running the 32 bit FreeBSD/i386kernel are not vulnerable, nor are systems running on differentprocessor architectures.

Download the relevant patch from the location below:
# fetch http://security.FreeBSD.org/patches/SA-12:04/sysret.patch
# fetch http://security.FreeBSD.org/patches/SA-12:04/sysret.patch.asc
# fetch http://security.FreeBSD.org/patches/SA-12:04/sysret-81.patch
# fetch http://security.FreeBSD.org/patches/SA-12:04/sysret-81.patch.asc

[8.1 if original sysret.patch has been applied]
# fetch http://security.FreeBSD.org/patches/SA-12:04/sysret-81-correction.patch
# fetch http://security.FreeBSD.org/patches/SA-12:04/sysret-81-correction.patch.asc

How to Apply the patch ?
# cd /usr/src
# patch < /path/to/patch

After Recompile your kernel as described and reboot the system and update system
# freebsd-update fetch
# freebsd-update install

DOWNLOAD "FreeBSD Privilege Escalation Exploit"

Tuesday, July 19, 2011

Google plus Project A New Social Networking World Starts

As I wrote before on Google + Here Now at some more feature of the Google +

What is Google+? It’s the super top-secret social project that Google has been working on for the past year. You know, the one being led by General Patton (Vic Gundotra) and General MacArthur (Bradley Horowitz). Yes, the one Google has tried to downplay as much as humanly possible — even as we got leak after leak after leak of what they were working on. Yes, the one they weren’t going to make a big deal about with pomp and circumstance. It’s real. And it’s here.
Sort of.
You see, the truth is that Google really is trying not to make a huge deal out of Google+. That’s not because they don’t have high hopes for it. Or because they don’t think it’s any good. Instead, it’s because what they’re comfortable showing off right now is just step one of a much bigger picture. When I sat down with Gundotra and Horowitz last week, they made this point very clear. In their minds, Google+ is more than a social product, or even a social strategy, it’s an extension of Google itself. Hence, Google+.
How’s that for downplaying it?
“We believe online sharing is broken. And even awkward,” Gundotra says. “We think connecting with other people is a basic human need. We do it all the time in real life, but our online tools are rigid. They force us into buckets — or into being completely public,” he continues. “Real life sharing is nuanced and rich. It has been hard to get that into software,” is the last thing he says before diving into a demo of Google+.
What he proceeds to show me is a product that in many ways is so well designed that it doesn’t really even look like a Google product. When I tell Gundotra and Horowitz this, they laugh. “Thank you,” Gundotra says very enthusiastically. Clearly, they’ve put a lot of work into both the UI and UX of Google+.








Speaking of this black toolbar, which was codenamed the “Sandbar” as Google was working on it, Horowitz explains that it arose from the fact that sharing models on different sites are all different. The toolbar is an attempt to unify them. This toolbar will exist across all Google properties (though it may take some time to fully roll out). And down the road, you can imagine browser extensions, mobile versions, etc. But again, we’re on step one here.

Next, Gundotra showed off a feature called “Sparks”. He was quick to note that even though it’s a search box, this is not some sort of new search engine. Instead, he calls is a “sharing engine”. “Great content leads to great conversations,” he says. With Sparks, you enter an interest you have and Google goes out and finds elements on the web that they think you’ll care about. These can be links to blog posts, videos, books — anything that Google searches for. If you find something you like, you can click on an item to add it to your interest list (where it will stay for you to quickly refer to anytime you want). Or you can see what others are liking and talking about globally in the “Featured interests” area.

With that in mind, Google+ Hangout attempts to solve the social problem of video chat by making it easy for you to let others know that you’re interested in chatting. And if you’re already chatting with a Circle, everyone else in that Circle will get an alert to come hang out. This works for up to 10 people. And seeing it in action is a bit magical. Gundotra starts a Hangout with some co-workers and as they join, conversations start between multiple people. But the Google+ system is smart enough to focus on who is controlling the conversation in any given minute. This makes the conversation easy to watch. It was almost as if an editor is working behind the scenes, cutting between people.

Even cooler is that you can share a piece of content, like a YouTube clip, and everyone in the Hangout can watch it together while talking about it. It sounds a bit cheesy, but it’s really pretty great.
After the rundown of all of these features, Google+ may sound a bit convoluted. But the key to the project is the attempt to unify everything. This is done via the toolbar (which features a drop-down showing you all of your relevant Google+ activity), but also on the mobile apps (again, Android and iPhone), and, of course, on the web. The Google+ site is the main stream on which you’ll find everything. From here, you can easily switch between all of your Circles, share content with any of them, start a Hangout, look up Sparks, etc.


Speaking of Buzz, one thing that strikes me about Google+ is that it seems a bit like Google Buzz done right. When I asked if Google+ would be the official death of Buzz, Horowitz declined to say, but did note that it was still being decided how those pieces will play together.

What is Google Plus One?


Google+ is a social networking service operated by Google Inc. The service launched on June 28, 2011, in an invite-only testing phase. The following day, existing users were allowed to invite friends, who are above 18 years of age, to the service to create their own accounts. However, this was quickly suspended in a day after there was "insane demand" for accounts. Google+ will be built as a layer that not only integrates different Google social services, such as Google Profiles and Google Buzz, but also introduces many new features including Circles, Hangouts, Sparks and Huddles. Google+ will also be available as a desktop application and as an application on Android and iOS operating systems. Sources such as The New York Times have declared it Google's biggest attempt to rival the social network Facebook, which had over 750 million users in 2011.
The introduction of Google+ has had an impact on the design of Google's web search service, due to the graphical redesign (mistakenly...

The following video will give you more information about Google Plus one


Thursday, June 2, 2011

Facebook is not a Friend of Bank Robbery Suspects

The news media have been reporting about some people who used the social mediaFacebook to take advantage of other people.

There were stories about young girls who were abducted or seduced by their male friends whom they met in Facebook, there were other stories about people losing money because they deal with the people they met in Facebook, etc.

However, there were also good stories about Facebook, for example an article byPaula Martersteck in Legal Blog Watch tells us about two bank robbery cases in theU.S whose suspects were arrested by the Police based on information available inFacebook.

In the first case, two bank tellers and their acquaintances were indicted this month in connection with a Texas bank robbery that netted US$ 62,000.00.

Investigators determined that the robbery was an inside job in part because of an anonymous Crime Stoppers tip that led them to two suspects' Facebook pages.

Two days prior to the bank robbery, one of the tellers posted a Facebook status update that read: "Get $$$." And two days after the crime, she posted, "I M RICH".

Meanwhile, the teller's boyfriend, who is apparently prone to similar celebratory online outbursts, allegedly posted the day after the robbery: "WIPE MY TEETH WITH HUNDEREDS." 

In the second case, a Michigan man was indicted after an informant told the FBI about the suspect's Facebook account, which was registered under the name of  "Anthony Mrshowoff Wilson."

According to U.S Federal Court records, Wilson's Facebook photos show him wearing attire (some with Polo emblems) that matches the clothing worn by the suspect in at least two bank robberies.

Facebook gave Wilson's birth date, cell phone number, photos, messages and friends information to the FBI, which compared the Facebook photos to images taken from a bank surveillance video.

This is a good news, and I hope that Facebook will keep on supporting our society in the future.

Monday, May 23, 2011

What is PageRank

As I already mention Here  about how to create backlinks now today I am gonna discuss Page rank with you people..

PageRank is a link analysis algorithm, named after Larry Page[1] and used by the Google Internet search engine, that assigns a numerical weighting to each element of a hyperlinked set of documents, such as the World Wide Web, with the purpose of "measuring" its relative importance within the set. The algorithm may be applied to any collection of entities with reciprocal quotations and references. The numerical weight that it assigns to any given element E is referred to as the PageRank of E and denoted by PR(E).
The name "PageRank" is a trademark of Google, and the PageRank process has been patented (U.S. Patent 6,285,999). However, the patent is assigned to Stanford University and not to Google. Google has exclusive license rights on the patent from Stanford University. The university received 1.8 million shares of Google in exchange for use of the patent; the shares were sold in 2005 for $336 million..


Mathematical PageRanks (out of 100) for a simple network (PageRanks reported by Google are rescaled logarithmically). Page C has a higher PageRank than Page E, even though it has fewer links to it; the link it has is of a much higher value. A web surfer who chooses a random link on every page (but with 15% likelihood jumps to a random page on the whole web) is going to be on Page E for 8.1% of the time. (The 15% likelihood of jumping to an arbitrary page corresponds to a damping factor of 85%.) Without damping, all web surfers would eventually end up on Pages A, B, or C, and all other pages would have PageRank zero. Page A is assumed to link to all pages in the web, because it has no outgoing links.

Saturday, February 26, 2011


I made this TuT Because many free crypting services are going around in this section. So many new members may get infected by others binding their Rats on their Server.


The point of This thread is to show you how you can find out if someone that has crypted your server has binded his server too.
So in this TUT we will be using Sandboxie to find out
You can find sandboxie here:
Spoiler (Click to Hide)
http://www.sandboxie.com/index.php?DownloadSandboxie
What sandboxie does is that it shoes you what a file opens and drops on your computer.It is secure cause it opens the files on an isolated space of your disc.

Before all We need to secure Our data Incase that he binded any Stealer that can steal our data and send them imediately
Pictures Below will explain

Supose we made our server and is all working good and we need to crypt it(making it FUD so Antiviruses wont detect it as a malicious program)
Here is Our server We chose to Inject Our server in Default Browser
[Image: 68785899.png]

Uploaded with ImageShack.us

We will now Open it in Sandboxie to see What does it execute and what does it drop
Here we see that Our Server Is runing and tha tit injects its self in Default browser as we Selected Before

Lets say we sent Our server to the guy that its gona crypt our server and gave us this file as the crypted fileNow IF you get any error Here He probably Used Antis ANd its probably Infected by his server

Now if we didnt Got any error how do we know that he didnt bind his server on ours ? This is what we are going to find out next. We are going to open the crypted file in Sandboxie again.We should again see Sandboxie runing,Our server,And that its gonna be injected in default Browser
[Image: werethefckthese2apeared.png]

Uploaded with ImageShack.us
This Means that he binded his Server on our server cause we see that it opens another 2 files that it shouldnt.

This is the end of the TUT Hope i helpedBlack Hat

Unleash the Power of AI: AMD Ryzen 8000 Pro Processors Take Productivity to the Next Level

Get ready to supercharge your professional workflow with the arrival of the all-new AMD Ryzen 8000 Pro processors! Building upon the foun...