Text

June 23, 2009

Windows 7

Windows 7 (formerly codenamed Blackcomb and Vienna) is an upcoming version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs. Microsoft has stated that it plans to release Windows 7 to manufacturing in July 2009, with general retail availability set for October 22, 2009, less than three years after the release of its predecessor, Windows Vista. Windows 7's server counterpart, Windows Server 2008 R2, is slated for release at the same time.

Unlike its predecessor, which introduced a large number of new features, Windows 7 is intended to be a more focused, incremental upgrade to the Windows line, with the goal of being fully compatible with applications and hardware with which Windows Vista is already compatible. Presentations given by the company in 2008 have focused on multi-touch support, a redesigned Windows Shell with a new taskbar, a home networking system called HomeGroup, and performance improvements. Some applications that have been included with prior releases of Microsoft Windows, including Windows Calendar, Windows Mail, Windows Movie Maker, Windows Photo Gallery, will not be included in Windows 7; some will instead be offered separately as part of the freeware Windows Live Essentials suite.

Download and Try it...




June 21, 2009

BackTrack 4


The Remote Exploit Development Team has just announced BackTrack 4 Beta. BackTrack is a Linux based LiveCD intended for security testing and we’ve been watching the project since the very early days. They say this new beta is both stable and usable. They’ve moved towards behaving like an actual distribution: it’s based on Debian core, they use Ubuntu software, and they’re running their own BackTrack repositories for future updates. There are a lot of new features, but the one we’re most interested in is the built in Pico card support. You can use the FPGAs to generate rainbow tables and do lookups for things like WPA, GSM, and Bluetooth cracking.

Download ISO

June 20, 2009

Antamedia HotSpot Billing


Antamedia HotSpot is Windows PC gateway software which helps you in controlling and billing your customers for the Internet usage. Antamedia HotSpot does not require any Client software installations. It uses captive portal technology to show login page in customer browser. Upon connecting to your network (using wireless cards or UTP cable), customer will be prompted to enter valid username and password to get Internet access. After successful login, your customer will see the remaining time and bandwidth quota, expiration date and other relevant info. HotSpot keeps track of customer account and shows warning message when the account is due to expire, helping a customer to refill the account and continue using your service without interruption. Software includes billing, statistics and reporting with many useful features. It is hardware independent and you can use any type of access points, routers, switches and other equipment to control your WiFi, WiMax, LAN, Cable, DSL, Satellite and other type of network connections.

Official Download
Cracked Download
Download Manual

June 19, 2009

Cain & Abel

The Cain & Abel password recovery tool for Microsoft Operating Systems allows recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force, Cryptanalysis attacks, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. There is a version for Windows 98 and a NT2000/XP version with more features that will be used in this lab. Where Cain is the main analysis tool, the Abel NT service provides a remote console on the target machine, which can dump user hashes from the remote SAM even if it was encrypted using the "Syskey" utility and other features like the LSA Secrets dumper, the route table manager and the TCP/UDP Table Viewer.
An interesting feature of Cain & Abel is APR (ARP Poison Routing) which enables sniffing on switched LANs by hijacking IP traffic of multiple hosts at the same time. The sniffer can also analyze encrypted protocols such as SSH-1 and HTTPS if used with APR and a Man-in-the-middle situation. Cain also comes with routing protocol authentication monitors, route extractors, crackers for all common hashing algorithms and for other various specific authentications, password calculators (Cisco PIX Hashes, RSA SecurID Tokens), decoders (Access Databases, Base64, Cisco Type-7, Enterprise Manager, Dialup, Remote Desktop)
Cisco Config Downloader/Uploader, SiD-Scanner, LSA Secrets Dumper, Protected Storage Passwords Viewer, NT Hash-Dumper, Abel Remote Console, MAC Scanner, Promiscuous-Mode Scanner, Wireless Scanner, and TCP/UDP/ICMP Traceroute + DNS Resolver + Netmask Discovery + WHOIS resolver.

Download
Download Manual

June 17, 2009

Transformer 2 - Revenge of The Fallen

Perang untuk bumi telah selesai, tapi perang untuk alam semesta baru saja dimulai. Setelah kembali ke Cybertron, Starscream memberikan perintah terhadap Decepticon untuk kembali ke bumi dengan kekuatan penuh. Autobots percaya bahwa dengan kematian Megatron bumi bisa damai. Tetapi Skorpinox telah mencuri tubuh Megatron yang mati dari US Military dan menghidupkannya dengan Spark yang dimilikinya. Sekarang Megatron telah kembali untuk balas dendam, bersama Starscream dan pasukan Decepticon-nya. Autobot yang di pimpin Optimus Prime juga dengan pasukan mereka siap menghadapi Decepticon.

The Art of Intrusion - Kevin Mitnick

Seorang Hacker yang sangat luar biasa, Kevin Mitnick. Mengulang kembali kesuksesan sebelumnya dalam buku The Art of Deception. Dalam buku The Art of Intrusion ini, Kevin Mitnick menceritakan tentang seni penyusupan terhadap security system. Buku ini ditulis berdasarkan kisah nyata yang langsung di ceritakan oleh beberapa sumber, salah satunya adalah ne0h. Salah satu bab di buku ini menceritakan tentang beberapa orang yang meng-hack casino (tempat judi), dan menghasilkan jutaan dollar.

Download

The Art of Deception - Kevin Mitnick


Hacker
terkenal sepanjang masa, Kevin Mitnick yang sekarang menjadi konsultan computer security menulis buku tentang seni social engineering. Dalam buku ini, Kevin Mitnick menggambarkan beberapa hacker yang sukses melalui teknik social engineer, yang mampu memanfaatkan faktor manusia untuk dapat menyusup ke dalam information security system sebuah perusahaan dan memanfaatkan informasi yang telah di perolehnya.

Download