Sharon

Sharon
Your Place For Ultimate Downloads

Results

DOWNLOADS - Games

Links From Rapidshare

NBA Live 08 - 283 MB


RAR Password :www.maxgrab.org
NBA Live 08 was released on October 2, 2007 for the PlayStation 3, PlayStation 2, PlayStation Portable, Xbox 360, Wii and PC.

Pirates Of The Caribbean - At World's End - 138 MB


RAR Password: www.maxgrab.org
Pirates Of The Caribbean - At World's End was released on May 24, 2007 for the PlayStation 3, PlayStation 2, PlayStation Portable, Xbox 360, Wii and PC.

DOWNLOADS - Softwares

Links From Rapidshare

Microsoft Windows Vista Ultimate

Spyware Doctor 5.5 with Anti Virus

Hacks

Things you should know

Access Data of a Password Protected User in Windows XP in Case the PC Fails to Boot

You may come across a situation in which your windows XP PC fails to reboot, and the most accepted solution to that problem is to re-format the Hard Disk. Before formatting, you should backup your files. If your computer is password protected, you

won't be able to access them from outside, so here is a method for getting around this.
Steps Boot the machine from Windows XP bootable CD. At the setup screen, select R to repair using Recovery Console. Now the console program will prompt you to select the Windows folder (eg. C:\WINDOWS) where the Windows is installed (you need to enter a number from the list of folders shown to you). Type 'HELP' (without single quotes) and press enter for available commands. This is like a DOS program, but some features are not available.
Change the current directory to the user's directory where you want to backup. Type 'CD "C:\Documents and Settings\X"' (without single quotes) and press enter. Where X is the username.
Now the current directory will change to "C:\Documents and Settings\X". Now change the directory to Desktop by entering 'CD Desktop' (without single quotes) and press enter to go to the desktop folder. Type 'DIR' (Without single quotes) and press enter, you will be listed all the available files in Desktop. Type 'COPY a.doc D:\BACKUP' (without quotes) and press enter, where a.doc is a file available in Desktop and the folder D:\BACKUP available to copy the files. As in step 7,8,9,10 you can backup other folders like "My Documents", "My Music", etc. Note that you cannot use wildcards for COPY. I.e, you cannot copy all the files in a folder at once. You must copy one file by one. Tips Before doing this, try changing the password to blank so that you can access the data from another machine to easily drag and drop to copy your data. Warnings Any data not backed up will be permanently deleted when you re-format the hard drive, so make sure you back up any thing you want to keep. Things You'll Need A bootable Windows XP CD

Basic Sniffer Attacks

This is a small paper i wrote up on Sniffer Attacks. Hopefully the
reader will get a better idea of how hackers can use this method to steal
data from a network and how it may be prevented. In no way was this paper
written in a technical manner. It was written for the newbie in mind. :)


---------> Users Basic Security Guide : Sniffer Attacks

1. Introduction To Sniffing Attacks
2. Sniffer Attack against TCP
3. Prevention of Sniffer attacks
4. The Masquerade Attack



Section 1: -> Introduction To Sniffing Attacks

"Sniffing" is observing packets passing by on a network. Sniffing is a
popular way to steal data from a network, usually in form of passwords,
ID names, etc. Passive attacks using this method has become frequent on
the internet. The person who is sniffing a network obtains data by
actually sniffing the network for packets. The data is usually cached
thus hackers look for user ID and the password of a legitimate user and
uses the user's information to log on to the network.Once logged into the
network, the hacker sniffs transmissions of packets. With this method the
hacker can gather needed information about the network.

Section 2: -> Sniffer Attack against the Transport Control Protocol

There is a method hackers use in which the attack lets a hacker redirect
the TCP stream through the hacker's machine. Once the hacker has
redirected the TCP stream, the hacker can bypass a systems protection.
(eg: one-time password, Ticketing auth). Remember that a Transport Control
Protocol packet may travel over many systems before reaching the
destination system. With a sniffer and a generator a person could easily
access many packets.

Section 3: -> Prevention of Sniffer attacks

Some ways System Administrators can prevent this kind of attack is to be
tight on security. Identification schemes is one way. one-time password or
ticketing authentication are some. They ensure corporate systems are
protected from Internet attacks. Deploy a firewall between these systems
and the Internet to guard against network scans and intrusions. Although
these methods may make it more difficult for the hacker, both methods
risk attack. My advice is to encrypt and sign the data stream. There are
programs out there that provide encrypted TCP streams.

Section 4: -> The Masquerade Attack

The Masquerade attack is when a hacker initiates a session by sending a
SYN packet to a server using the clients IP address as the source address.
If it is a trusted host the server will acknowledge the SYN packet with a
SYN/ACK packet. The hacker will then acknowledge the servers SYN/ACK packet
with his own. As long as the hacker can predict the SYN/ACK packet it
therefore can acknowledge it. The hacker cannot recieve the data from the
server but he can send data which is enough to compromise the host.

Also if the host is offline the hacker cannot use this attack to establish
a full TCP connection with the server. This method is good because the
attack is invincible to the user.

Hack IE Title Bar

This can be an impressive bit of personalization. Use your name or moniker to brand Internet Explorer. Go to HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\ and left-click on Main to change the string "Window Title" to whatever you wish.

The Most Common Online Credit Card Scams

Without a doubt, one of the worst things that can happen to a credit card owner is to be scammed online. It may take a while for you to notice it; and by then, the credit card will be totally maxed out, leaving you in a deep hole.

There are, of course, ways to claim that you never made those purchases that happened all the way in Hong Kong, but it could seriously dent your confidence in online purchases.

Receiving an e-mail is the most common way that people get caught out. The e-mails look so convincing, which is why so many people get scammed. These are called "phishing" scams. The e-mails may have a website link that, when you click it, will take you to a fake website that the scammer has prepared.

Upon entering your details, the scammer will learn your password for the website and will know every bit of information about you. Therefore being able to gain a new credit card in your name; and will use it till it’s maxed out and then throw it away.

The most sensible option to do is to not click the link in the e-mail, even if the e-mail states that your account will be suspended or closed. This is what the scammers do to scare you and to make you believe that the e-mail is real. Legitimate companies will never ask you for any personal information, especially not through an e-mail.

If you are concerned about your credit card account, then you always have the option of being able to check your credit card account with the company through the phone. Always be cautious when opening an e-mail from a so-called credit card company. If you do suspect that the e-mail is not genuine, then you can e-mail the company and ask them if they sent you an e-mail. They will be happy to respond; and if it isn’t genuine, then you can forward the e-mail address to your e-mail providers address and they will block the account.

Find IP of any site

step 1:open your dos it is done by pressing window key and r at a timestep2type cmdstep3type ping domain.comdomain.com is the site for which u want to know the ip addressit look like thisC:\Documents and Settings\admin>ping youtube.comPinging youtube.com [208.65.153.251] with 32 bytes of dataReply from 208.65.153.251: bytes=32 time=1234ms TTL=244Reply from 208.65.153.251: bytes=32 time=1424ms TTL=244Reply from 208.65.153.251: bytes=32 time=1649ms TTL=244Request timed out.Ping statistics for 208.65.153.251:Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),Approximate round trip times in milli-seconds:Minimum = 1234ms, Maximum = 1649ms, Average = 1435mshere 208.65.153.251 is the ip address of youtubeu can to this for any site

Wednesday, May 7, 2008

Sony PS3