Tempat Segala Ilmu Hacking dan Komputer dari A-Z

Search

inspirational stories of hacker number one in the world who paved the satellite!




Do you know the number one hacker in the world? yes, a hacker number one in the world managed to shift a satellite! Who is she? He is Jim Geovedi. Geovedi was born on June 28, 1979. Geovedi is an information technology expert from Indonesia. Geovedi very interested in the discovery of a gap in computer and network security. So he was eager to know how to work in a satellite communication system. He also called "not a bit like a Bond villain, but has some secrets that they will pursue an all-out in 1998-1999"
Geovedi lived his life after high school to become a graphic artist in New York City. One time there was a pastor who introduced him to Geovedi about computers and the Internet. Geovedi began to like computers and the internet and the desire to learn more in the self-taught. He had also started to dive into the world of hackers in the world. In 2001, Geovedi establish C2PRO Consulting, ie general IT consulting firm. He also operates IT security consulting firm Bellua Asia Pacific in 2004, and then changed its name to Xynexis International. In the same year he founded the Global Noosc security services company. Geovedi also been a speaker at Kuala Lumpur on the dangers of the system.
Currently in 2004, exactly when the election is finished, Geovedi hired by the Election Commission to find out the perpetrators buster counting data centers. And Geovedi was successful!
Geovedi also been paved Indonesian satellite and china belonging to its clients. At that time Geovedi also admitted that he found a loophole to change the direction of rotation of the satellite china. Then his client was too panicked, and in the end Geovedi can restore the normal direction of the satellite. In the Indonesian satellite, he can also change the direction of rotation only.
In fact, he has also been admitted to himself that he was able to unlock all the secrets of internet in Indonesia. He can control all incoming and outgoing data in Indonesia. He also can peek at your chat you're probably cheating or so. He can also replace or take money-money on the internet in Indonesia. In fact, he can also modify all financial transactions in Indonesia!
However, the most precious is, Geovedi not want to undertake all the crime, because he was not interested at all. He prefers to look for the gap without utilizing it for evil and harm others.Geovedi was also invited to many events hacker world. a moment Jim Geovedi never diatanya like this (Q: questioner, A: Geovedi)Q: What have you been hacked?A: I actually never hack anything, I only tested on the Internet security system, banking, telecommunications, insurance, electricity, etc.Q: So, how do you build a reputation as a hacker?A: At first I just want to hang out with the hacker's not a hacker Indonesia. I also often invited to be a conference speaker or interviewed by international media. A few years after that then I noticed by Indonesia. I started hired to find the hacker who has hacked the results of elections in Indonesia, then I also asked to be a speaker at the Kuala lumpur when there is a new wireless entry into Indonesia in 2003. Then in 2006, I was asked to be a speaker issue of satellite security system , and then that makes me good name.Q: Are you able to hack the satellite?A: Sure can! is actually quite unique satellite system. It is difficult to hack into the satellite, because you have to know all the contents of the satellite. The only way to find out is you have to go into space and learn all system operators, ranging from airlines and others. From there you will find a niche where you can control the satellite operator without having to enter the room again. The more you frequently investigate other cases, you will realize that the gap is patterned together with other satellites. That is where I was able to hack the satellite.Q: Then you can get into the environment from a distance operator?A: Hahahaha ... for one or two cases it can be doneQ: So, I hear you can hack Indonesian satellite and china, what do you do?A: When I was asked to test the satellite control a security system, and I found a gap in china satellite making it possible for me to shift a little orbit. And after shifting makes them very panic. Fortunately there are still extra fuel so that orbit can be restored. For Indonesia Satellite I just change the direction of rotation onlyQ: With such capabilities, how do you resist the temptation to do evil?A: Indeed! If you want I can also control all internet traffic in Indonesia, even I could also divert trafficnya well, I could also observe the incoming or outgoing traffic across Indonesia. I also can modify all financial transactions in Indonesia. Then if I do it's what's in it ?? I really was not interested in doing such acts and the last one I'm not too concerned with the material world alone.
great right? how about you now? Are you just use the hacking knowledge for crime ?

FUNNY Coding Game For ANDROID ! Show Your Skills !


 http://i.ytimg.com/vi/OH40Gs7C1x4/maxresdefault.jpg
some time ago I found a game that really forced my brain to think hard. The game is not really made for the development of understanding of the syntax syntax in programming, but the game is a lot of focus on algorithms and logic. we have to really think hard to complete the game. Although the initial level is very easy but the longer it will be increasingly difficult.
I myself sometimes do more than half an hour ..: D this game is very suitable for those who want to hone your algorithm. In this Game syntax syntax used seems something like c ++, but at the level of our initial limited to certain commands such as 'for', but we are only allowed to use the command 'while'. For me it was very difficult, but challenging !!

For those who want to download this game please download playstore by name"Hacked"yes, the name of the game "Hacked". Besides, you can train your coding skills, you can also create your own games or get into other people's games. So it was fun!


Link Playstore : https://play.google.com/store/apps/details?id=com.hackedapp&hl=en
Change or Spoof a MAC Address in Windows or OS X

Change or Spoof a MAC Address in Windows or OS X


Every NIC  has a unique MAC address. This applies to all types of network cards, including Ethernet cards and WiFi cards. The MAC Address is a six-byte number or 12-digit hexadecimal number that is used to uniquely identify.
An example of a MAC address is 3A-1A-3E-4B-5C-3A and it falls into the Layer 2 networking protocol of the OSI model. In today’s networks, ARP, or Address Resolution Protocol converts a MAC address to a Layer 3 protocol address, such as an IP address. A MAC address can also be called a Physical Address. Read my post on how to find your MAC address if you don’t know it.
mac address
All MAC addresses are hard-coded into a network card and can never be changed. However, you can change or spoof the MAC address in the operating system itself using a few simple tricks.
So why would you want to change your MAC address? Well there are many reasons for this, mostly related to bypassing some kind of MAC address filter set on a modem, router or firewall. Changing the MAC Address can help you bypass certain network restrictions by emulating an unrestricted MAC Address or by spoofing a MAC address that is already authorized.
For example, a WiFi network may allow only authorized computers to connect to the network and filters out computers based on the MAC address. If you can sniff out a legitimate MAC address, you can then spoof your MAC address and gain access to the WiFi network.
Another example is if you have an ISP that allows only a certain number of computers to connect to the Internet from your home. If you have more computers that need to connect, you can spoof the MAC address of an authorized computer and connect from a different computer.

Change Windows MAC Address

You can change the MAC address for the network card in Windows pretty easily following the steps below.
Step 1: Click on Start, then Control Panel, then Network Connections, and right-click on the network connection you want to change the MAC address for and select Properties. It will normally either be Local Area Connection or Wireless Network Connection.
local area connection
If you are using Windows Vista, Windows 7 or higher, you have to go to Control Panel, then Network and Internet, then Network and Sharing Center, and then click on Manage Network Connections or Change adapter settings.
change adpater settings
Then you can right-click on the adapter and choose Properties.
Step 2: On the General or Networking tab, click the Configure button.
configure network adapter
Step 3: Now click on the Advanced tab and click on the Locally Administered Address property or the Network Address property.
locally administered address
By default, the Not Present value is selected. Go ahead and click on the Value radio button and enter in a new MAC address. The MAC address is a combination of 6 pairs of numbers and characters, i.e. 40-A2-D9-82-9F-F2. You should enter the MAC address without the dashes.
mac address change
You can go to the command prompt and type in IPCONFIG /ALL to check that the MAC address has been changed. Go ahead and restart the computer in order for the changes to take effect.
This is the simplest way to change your MAC address in Windows. You can also do so via the registry, but it’s much more technical and probably not required by most people.

Change OS X MAC Address

Changing the MAC address on OS X is definitely not as easy as it is on Windows. Firstly, you have to use Terminal (similar to command prompt in Windows) to actually change the MAC address.
Secondly, you need to manually figure out the technical name of the adapter before you can change the settings. I’ll explain everything below step by step, but it gets a bit complicated at times.
To start, let’s find out the current MAC address for your Mac. You can do this in one of two ways: via System Preferences or via Terminal. Open System Preferences, click on Network and then click on the Advanced button. Make sure to select the appropriate interface first (WiFi, Ethernet, etc) in the listbox on the left.
os x network advanced
Click on the Hardware tab and you will see the first line is MAC Address. I thought you could simply choose Manually from the Configure dropdown, but that doesn’t allow you to edit the MAC address.
network hardware mac
In Terminal, you can get the MAC address by typing in the following command:
ifconfig en0 | grep ether
This will give you the MAC address for the en0 interface. Depending on how many interfaces you have on your computer, you might need to run this command several times adding 1 to the number each time. For example, I ran the following commands below until I reached an interface that didn’t exist.
terminal os x ifconfig
Now you can simply compare the MAC addresses listed here with the one you saw via System Preferences. In my case, my WiFi MAC address of f8:1e:df:d8:9d:8a matches with en1, so that is the interface I have to use for the next commands.
Before we change the MAC address, you can use a useful command in Terminal to generate a random MAC address if you need one.
openssl rand -hex 6 | sed ‘s/\(..\)/\1:/g; s/.$//’
Now that you have a new MAC address, you can change the current one using the following command below. Replace XX with the actual MAC address you want to use.
sudo ifconfig en0 ether xx:xx:xx:xx:xx:xx
In order to do this, you need to be logged in as an Administrator or you have to enable the root account in OS X. By default, root is disabled and it’s better to leave it disabled if you can. Just login as an admin and you should be able to run the command just fine. It will ask you for your password, though, before changing the MAC address.
Also, the address won’t change if you are still connected to a WiFi network. You need to first disconnect from any networks and then run the command. Surprisingly, disconnecting from a wireless network in OS X is not intuitive at all. You have to press and hold the Option key and click on WiFi icon to look the disconnect option.
disconnect from wifi os x
So here is a rundown of all the commands I ran in order to get the current MAC address, generate a random one, update the MAC address and then verify to make sure it had changed!
mac address change os x

How to Speed Up Logging Into Windows

How to Speed Up Logging Into Windows

Even with fast hardware and the newest operating system, logging into Windows can become painfully slow if there are a lot of programs that startup when Windows starts up. Note that I am not talking about how long it takes to boot Windows because that is a completely different beast.
I’ve already written previously on speeding up Windows boot times, speeding up Windows 7 and speeding up Windows 8. Just reading those articles will help you speed up Windows guaranteed. One common theme you’ll see in those articles is managing startup items.
As mentioned before, your Windows 8 or Windows 10 machine might be able to boot up in 10 seconds, but once you type in your password to login, it could take more than a minute to get to a fully functional desktop because of startup programs. I’ve already written a detailed article on how to disable startup programs in Windows 7 and higher, which you should read first.
However, there are situations where you simply can’t disable everything. Maybe you working in a corporate environment and are required to have certain programs startup when you login. If you’re a business owner or professional, you might have certain business applications that you want to start up when you login.
In this type of case, you need something different. One interesting solution to this problem is to delay the loading of the startup programs by the few minutes after you login. In this article, I’m going to talk about a program called Startup Delayer, which does exactly that.

Startup Delayer

Once you download and install the program, it will show you a dialog the first time you run the program. Here you have to choose how you want Startup Delayer to behave.
startup delayer behavior
Note that you can change whatever settings you picked here later on in the program settings. The dialog has a slider where the far left means you want your programs to load as fast as possible and you don’t mind your computer running slow or sluggish. There really isn’t any point to using this application if you choose the far left because all the programs loading immediately is what’s happening by default when you log into Windows.
As you move the slider to the right, you’ll see it’s pretty much the same except for the CPU and Disk Idle values. By default, its set to 30%, which means the program will wait till your computer is at least 30% idle before launching the delayed applications you have chosen.
Moving to the far right means your delayed applications will start later, but smoother. You might have to wait a minute or so before the application will launch. Startup Delayer manages all of this and will automatically launch the applications when the desired idle value is reached.
Once you click Save, you’ll get to the main program interface. Here you will see 3 tabs across the top: Startup Applications, Running Tasks and System Services. As the name of the first tab implies, any startup applications that start with Windows will be listed here.
startup delayer gui
The startup items are broken down into three different categories: Delayed, Normal Startup and Disabled. You can simply drag and drop the items to the section you like. To delay an application, just drag it from Normal Startup to Delayed like shown below.
delayed startup items
The first item you drag and drop will be given the first priority when loading. As you add more items, they will be added to the queue. When Startup Delayer loads the programs, it will launch then in the order listed. You can change the order of the items by dragging and dropping the items.
When you select an item, you will see that Automatic Delay is selected and the default values for CPU and DISK idle are listed. You can change the idle values for each application individually if you like also by simply selecting the item and typing in new values.
If you double-click on any of the delayed applications, you can configure the advanced settings. The General tab lets you edit the target in case you want to add any command line parameters to the program.
launch details
On the Delay tab, you can again edit the idle values or choose to do a Manual Delay if you like, but the program developers don’t recommend using manual delays.
delayed program wait
On the Wait tab, you can check a box to ensure that the application has completed loaded before Startup Delayer continues loading other applications. You can also set it so that Startup Delayer will wait until the current program is terminated or a user gives confirmation before launching the next application.
delayed program advanced
On the Advanced tab, you can configure options so that the program launches on certain days only, doesn’t launch if another instance is already running, or launches if an Internet connection is detected. This option can be useful in certain situations. For example, do you really need Skype to launch if there is no Internet connection?
Finally, going back to the main screen, you can click on the green Add New button to add a program that is not already listed. This can be really useful for things like launching a web browser or a MS Office application or any other program that may not automatically startup when logging into Windows.
The Running Tasks lists out all of the current processes running on the system. Again, if something is not listed in the main tab, you can go to Running Tasks, select a process and then click the small round plus button. I would be very careful about adding anything from here to the delayed section because many of the processes listed are Windows processes.
Luckily, they have a filter that lets you hide all the Microsoft processes so that you see only processes created by third-party programs. Just click on the Filter button and then click Hide all created by Microsoft.
hide microsoft processes
The last tab is System Services, which lets you stop, start and disable Windows services, but for the purposes of this article, you should just leave it alone unless you know what you are doing.
Before we get into whether this program actually works well or not, there are a couple of other small items to mention. Firstly, you can click on the Options button at the top right of the main interface to change how the program behaves. I personally haven’t had to mess around with any settings here, but if you want more information during the login process, you can click on the Launch Process tab and select Show always during Startup and check the Show Launch Process Window on Startup.
launch options
By default, the program keeps itself very well hidden and only pops up during the login process if something goes wrong. Otherwise, you won’t even know anything is going on. What’s nice about the program is that it has a plethora of options so you can see more info if you like.
Secondly, you can click on the Tools button to do even more stuff like create startup profiles, view the last launch log, view the last performance graph, create a backup of all your settings, etc.
startup delayer tools

Performance Results

So does this program really work? Well, when I tried it out back in 2008, it didn’t work all that well. Back then, it simply did a manual delay, which didn’t work very well. However, in the ensuing years, the program has gotten a lot more advanced and in my tests on Windows 7, it made a significant difference in the user experience.
Instead of sitting around waiting for the desktop to become clickable or waiting for the Start menu to appear after clicking on it 10 times, Startup Delayer can make everything seem snappy. You obviously have to wait a bit longer for some programs to load up, but I have never once felt I needed one of those startup programs to load immediately after logging in.
It’s also worth noting that the program becomes more useful if you have a larger number of startup items. If you only have a couple of things loading up on startup, it’s probably not going to make a major difference. Let us know if the program helped on your system or not. Enjoy!
How to Protect Your Computer from Hackers, Spyware and Viruses

How to Protect Your Computer from Hackers, Spyware and Viruses

This article has been inspired by a situation I ran into while visiting a cousin in India. Since I’m in the IT field, she asked me to take a look at her computer since it was acting “funny”. The “funny” part was that the computer would automatically restart whenever you tried to install ANY software onto it or download any program from the Internet.
The first thing I noticed was that there was no anti-virus software installed on the computer, so my first goal was to install an anti-virus program and check for viruses. But of course, the virus that was already on the computer would not let me install or download anything! Smart virus! To make a long story short (and I mean a LONG story), there were 2256 viruses on the computer and 110 instances of spyware and malware. I have never even heard of such a ludicrous number of viruses on a computer before!
virus
Most of the viruses on the computer were hidden in files that had been downloaded off the Internet: songs, videos, and movies. I was amazingly surprised that the computer lasted for 2 years with that many viruses! So I gave my dear cousin a serious lesson in how to protect her computer from the dangers of the Internet and I will go through them here for anyone else who might be interested!
This is by no means a comprehensive list, so if you have any suggestions, please feel free to comment and I’ll add them on!

Steps to Avoid Viruses & Malware

1. Install Anti-Virus Software – This should not even have to be listed because if you don’t have any anti-virus software installed, you’re asking for trouble! If your reason for not installing anti-virus software is because it’s too expensive, then that can reason can be shot down because there are several free anti-virus programs out there that are considered better than commercial software packages. Here are two of the most popular ones:
Avira – Avira has a free version that was ranked #3 in 2014 for detecting viruses.
Bitdefender – Bitdefender had the second highest detection rate and they also have a free edition.
Panda Anti-Virus – In 2014 virus detection tests, Panda anti-virus had a 99.9% detection rate. This was the highest out of over 25+ anti-virus programs. It’s not free, but I mentioned it because of it’s top rating.
Kaspersky Anti-Virus – Not free, but in the top 5 in terms of detection rate.
In addition to anti-virus software, you should install one anti-malware program and the best is MalwareBytes Anti-Malware Free. It was tested in 2014 and did the best job out of 10 products, many of which were not free.
2. Update All Software – Installing an anti-virus program by itself is not enough. There are hundreds of new threats that are found daily and the anti-virus programs release updates regularly to combat these new threats. Make sure you anti-virus program is set to update automatically so that you don’t have to rely on your memory to do it. Also, this goes for all the software on your computer. The most important software to keep up to date is your Windows operating system. It is essential to have Automatic Updates turned on and set to download and install updates automatically.
windows updates
3. Install only Trusted Software – If you’re not sure what a piece of software does from its name, then don’t install it. Also, don’t install anything you didn’t intend to install in the first place. Sometimes programs will ask you to install other programs during the install of the original application. Be careful of that because it’s usually spyware. If you’re installing software from big names sites like Microsoft or Adobe, you’re good. For anything else, you should first get it scanned. The easiest way to do this is to use an online tool like VirusTotal, which lets you upload a file for scanning or lets you enter the URL you want checked.
virustotal
4. Avoid P2P File Sharing Software – If used with great caution, P2P software is quite useful for movies, songs and software, but if you’re not very technically savvy, you might end up downloading a song that has a keystroke logger attached to it that will send anything you type to some other computer over the Internet. It’s almost impossible to tell that this is occurring unless your anti-virus or anti-spyware programs pick it up in their scans. If you don’t know what you’re doing, don’t try to torrent.
5. Delete Unknown Emails – If you receive emails from random people, do not bother to open the email, just delete it. If you have any doubts after reading the name and the subject, it’s probably not someone you know. Never download or open attachments unless you are sure it’s from someone you know. Give the person a call quickly and ask them if you’re not sure. Most large companies that you create online accounts with will not send you attachments unless you specifically ask for them through their web site. Also, be wary of any emails from sites pretending to be banks, auction sites, etc asking for you to verify bank account info or address info. No bank ever does that.
Also, hackers try to prey on your emotions. If something sounds too good to be true, i.e. you won some money or free vacation, it probably is. Secondly, if you get any email from the IRS or police or a lawyer or anyone else trying to scare you, don’t panic and start giving out information. These are all usually scams because no official agency emails people about serious issues.
sketchy emails
6. Do not click on Ads – Avoid clicking on ads if you can. Especially those ads where something is flying around and if you shoot the duck, you win some prize! Ads have become more sophisticated in that they try to make the ad interactive so that you’ll be tempted to play it like a game.
7. Run Virus Scans Regularly – If you’re not in the mood to scan every day, at least run a scan once a week. Actually, setup a schedule for your computer in your anti-virus software to run a scan late at night or whenever you don’t use your computer and that way you won’t be bothered with a slow computer.
8. Be careful what you attach to your computer – This is a more common way to transfer viruses than you might think. Everyone now has a USB flash stick that they carry around on their key chains, ready to snap into any computer. But who knows what viruses are on your friends computers and what accidentally got transferred to their USB stick. A lot of virus programs will auto launch right when the USB stick is put into the computer, so you don’t even have to open or download any of the files to be infected.
9. Avoid Shady Web Sites – If you need to look at porn, then make sure you do it in a virtual environment. You are DEFINITELY going to get a virus or spyware if you browse porn sites on your computer. Virtualization basically allows you to run programs like Internet Explorer in a virtual environment that does not effect your current operating system. If you want to find out more, search for “Virtual PC” or “VM Ware” in Google. Otherwise, simply avoid going to shady web sites!
10. Turn On or Install a Firewall – If you’re running Windows or Mac, make sure firewall is turned on. A firewall prevents hackers from gaining access to your computer by limiting the number of ports that are open to the public. Also, when buying a wireless router, make sure it has a built in firewall. Having a software and hardware firewall is better than just having one or the other.
windows firewall
11. Secure Your Wireless Network – Most wireless routers are set to no security when you install them. Be sure to log into the router and at least set the basic security that requires a password. There are stronger encryption options, but if you don’t understand those, then simply set a password on the router and the wireless network, otherwise anyone can connect to your home network and change all the settings.
12. Use a Complex Password for Login – This means that you should already have a password to login to your computer. Not having a password at all is not a good idea. Create a password for all user accounts and make sure it’s complex. Complex means it should have numbers, upper case characters, lower case characters, and symbols. This makes it way more difficult for a hacker to get into your computer.
How to protect your android against hackers (or at least make it difficult for them)

How to protect your android against hackers (or at least make it difficult for them)

 0704_find_my_iphone
There is nothing, hardware or software, that is unhackable.
Let’s get that out of the way right off the bat. If a hacker — a real hacker, not someone with a set of easily available hacking tools — really wants your information, they will get it. The same can be said for the NSA or any other state-sponsored organization.
This is a guide to help you deter the type of people degenerates that recently forced their way into celebrity iCloud accounts to pull down private photos. Whether they used brute force to guess the password or an off the shelf piece of software, a combination of these precautions could mean the difference between a mild inconvenience (like having to change a password) and having your personal information (including photos) plastered all over the Internet.
And the Internet never forgets.
And it’s not going to get any better. While news of the celebrity hack is still fresh in our minds, Home Depot is investigating its own hacking related issues. The hackers are winning right now. Even Apple has informed developers that they can’t store HealthKit data in iCloud.
So defend yourself against the jerks and sociopaths.

Passwords and Password Managers

A strong password is a good first step to securing your data. But you need to do more than just use a combination of letters and symbols. To reduce the chances of having your password guessed or brute forced, use a password manager and use a randomly generated alpha-numeric password that’s at least 20 characters long. LastPass, Dashlane, RoboForm, mSecure and 1Password  are cross platform services that work via the mobile Web in addition to native apps.
Not only will it generate random passwords, it will warn you when you’re using the same password on multiple sites, a huge security error that many of us are guilty of committing. If you would rather manage your own passwords, make sure they are all different. When you use the same password everywhere, when one site or service is compromised, suddenly the hackers have access to your entire digital life.

Two-Factor Authentication

Two-factor authentication acts as stop-gap when a new device tries to log into a service or site. For example, with Twitter’s two-factor authentication feature enabled, when you try to log into your account with a new device, it sends you a text message with a temporary password. In other words, you can’t log into an account without your phone and the temporary password sent to that phone.
You’ll be alerted when someone is trying to get into your account even if they have your password. Apple, Twitter, Dropbox, Microsoft and Google all use two-factor authentication. Set these up for extra security.
0704_find_my_iphone

Don’t Back Up Sensitive Data or Your Phone Online

The cloud is supposed to be secure. This weekend we learned, not so much. If you’re dealing with sensitive images, documents, or videos, its best to keep them off all external servers. That means not allowing services like iCloud, Dropbox, Flickr, Google Drive, and others to auto-upload data to their cloud storage. Instead, keep that sensitive data on an external drive that’s only accessed when you’re offline. Wickr CEO and co-founder Nico Sell warns that there are all kind of dangerous websites out there with malware that could compromise your computer and give a hacker access to your data.
This also means not backing up your smartphone to the cloud. Those backups are a treasure trove of data. Everything about you is in that backup. Keep it password protected and local.

Don’t Link Accounts

When Wired’s Mat Honan suffered a hack of his entire digital life in 2012, one of the side victims of his hacking was Gizmodo’s Twitter account. Honan had linked his personal account to Gizmodo’s when he had worked for the publication. When his account was compromised, by proxy so was Gizmodo’s and both accounts began tweeting the nonsense usually associated with hacked Twitter accounts.
In a world where Facebook Login is commonplace and some apps and services only work if you use your Facebook Login credentials, it’s difficult to keep accounts separated. Facebook does offer two-factor authentication so there’s at least a stopgap for the entry into all those linked accounts. But if it’s possible, use a separate account for everything each with its own unique login and password information. It’s also a good idea to see which apps you have linked to your Facebook and Twitter accounts and remove ones that you no longer use.

Security Questions

At some point these made sense. Probably before social networks had us sharing all our personal information with friends, family and then eventually the world. Now security questions like “What’s your mom’s maiden name?” and “What’s the name of your favorite movie?” are easy to answer by anyone that knows how to use Google, since we’ve shared most of that information online. Instead of answering truthfully, come up with unique answers that make zero sense in context. For example: “What’s your favorite food?” could be answered with Buster Table.
Make sure it’s something memorable that has nothing to do with the actual question.

Misinformation

Since you’re already going to start answering questions with lies, you might as well make your online persona a den of fabrications in the name of security. “A lot of times people are disillusioned and feel resistance is impossible and they just give up,” Sell said while talking about people already in the thick of social networking, “the most powerful tool going forward is misinformation.” She recommends changing all the key things that are used by companies as security questions. This includes your birthday, billing address, birth location, and family ties.
Birthdates can prove to be a huge security risk. Just move your birthday on Facebook a few days forward or back and maybe even change the year or you can hide it. Most people won’t even notice and for those that do, just tell them why and suggest they do the same.
Also, if you’re already friends on Facebook with family members, there’s really no need to advertise that you’re also family. A smart hacker can determine your mother’s maiden name via aunts, uncles, cousins, and grandparents. Your mom doesn’t even need to be on Facebook for her maiden name to be known.
0903_passcode

Password Protect All Devices

This should be the first thing you do with a smartphone, tablet, or computer. Your computing devices are just giant bags of personal information. If any of them get stolen, why make it easier for the culprits to steal your identity? Plus, you’re not just saving yourself grief, but all of your contacts. Gathering email addresses is the first step in hacking into a person’s accounts.

Site Specific Credit Card Numbers

Many banks and credit cards offer single use and temporary credit card numbers. Use these to your advantage. A credit card number can be used to verify identification. In fact, when Mat Honan was hacked all the hackers needed was the last four digits of his credit card to establish identity. If you are using multiple cards (all tied to the same account so you get one bill) when one account is compromised, it doesn’t lead to a series of accounts being taken over by hackers.

Privatize Your Website

If you own a domain name, chances are your name, address and phone number are freely available to anyone that does a whois query. Fortunately, you can privatize your domain registration. Go to the domain registration site you use (the place where you purchased your domain name). Sign in and look for the option to privatize your information. If you can’t find the option, call the site and have them walk you through the procedure. It’ll probably cost you a few dollars a year, but it’s worth it.
Once again, nothing is hacker-proof if you’re targeted by a very talented individual or state. And some of these precautions may seem like overkill and the ravings of a someone that’s paranoid. But, if you do everything right and it thwarts hackers before they even start, it’s worth it.

CARDING FULL TUTORIAL + SCREENSHOT + VIDEO + >500 DORK CARDING (bonus PAYPAL & CC)

https://consumeraffairs.global.ssl.fastly.net/files/cache/news/credit-card-data-theft_large.jpgKali ini, saya akan mengajarkan tutorial full cading lengkap dengan screenshot,video,dork,dll
carding merupakan suatu kegiatan berbelanja di internet dengan kartu kredit orang lain. orang yang sering melakukan tindakan carding ini disebut carder. menurut Clear Commerce Inc, perusahaan teknologi informasi yang berbasis di Texas – AS, Indonesia ternyata memiliki carder paling banyak ke dua sedunia setelah Ukrania. Ternyata Indonesia hebat juga (y), nah apakah kamu juga ingin belajar carding juga ? disini saya akan jelaskan step by step carding sesungguhnya.
  • Persiapan Tools
Sebelum kita mulai, kita download dulu tools"nya
1. Havij : Download
2.  Grenox : Download
3. SQLI DB : Download
  •  Pencarian Dork
Tadi saya udah berjanji akan memberikan lebih dari 500 dork, silahkan buka link ini
http://pastebin.com/8NVqwcwm
  • Cari Target
Nah disini kita akan cari target dengan software yang bernama Grenox yang sudah kita download tadi
cara menggunakan grenox seperti ini :
1. tulis dork nya
2. pilih Pages 5
3. klik Search
4. Setelah selesai klik Remove Clone agar tidak ada yang double
5. klik start
6. klik save to file kalau mau di save hasil scan"nya

kalo masih belum mengerti, silahkan liat screenshot dibawah ini
  • Mulai Penyerangan
Setelah mendapatkan web vuln, seperti pada gambar, kita akan scan dengan havij caranya seperti ini :
1. Buka havij lalu isi target dengan salah satu webvuln yang kita temukan tadi
2. Lalu klik analyze
3. Kalau berhasil maka, klik tables
4. Tunggu proses, jika sudah selesai, klik Getdbs
5. Lalu klik Get Tables
6. Lalu cari "user"(biasanya) dan centang "user"
7. lalu klik Get Columns
8. Lalu jika berhasil, maka ada column "email" dan "password", lalu silahkan centang keduanya
9. lalu klik get data
10. setelah itu klik save data
kalau masih belum mengerti silahkan ikuti screenshot dibawah ini,
oh iya screenshot dibawah ini yang ke 5 dan ke 6 itu ketuker

















  • Finishing
    Setelah kita selesai mendapatkan banyak email dan password, saatnya kita mengcrack hash nya menjadi karater password sebenarnya. Caranya seperti ini
     1. Tadi yang terakhir kan kita sudah save data menjadi html, silahkan buka html, dan akan seperti ini
    2. lalu karena di tutorial saya, hasil passwordnya adalah berupa MD5, maka saya akan decrypt juga MD5, kalau misal kamu mendapat password selain MD5 silahkan crack disini
    3. lalu kita copy semuanya ke microsoft excel agar mudah untuk di copy



    4. lalu kan udah ditaruh di excel, terus kan otomatis kepisah tuh md5 nya, trus kita copy seperti pada screenshot diatas, lalu pastekan di SINI
    5. dan lihatlah! tinggal kamu pilih mau password yang mana !
    6. jangan senang dulu! kita belum selesai!, langkah selanjutnya adalah buka http://www.hashkiller.co.uk/list-tool.aspx
    7. setelah itu copykan hasilnya tadi ke link diatas, dan hasilnya seperti ini, silahkan ikuti nomor2 dibawah ini ya..
    8. nah setelah itu lihat di nomor 4, kita copy semuanya ke excel lagi dan paste di password yang masiuh md5 tadi, dan hasilnya seperti ini
    9. nah silahkan anda memilih sendiri :D :D


    VIDEOS
    oh iya, hampir lupa, videonya ada disini
    VIDEO 1
    VIDEO 2
    VIDEO 3
    VIDEO 4

    BONUS
    okay, sesuai judul, saya akan berikan bonus PAYPAL + CC nih

    ++++++++++++++++++++++++++++++++++++++++++++++++++
                     Email : dondebhut@centurytel.net
                     Password : smokey12
                     Name : Deborah+hutto
                     Status : unverified
                     Type : personal
                     Limit/Unlimit : LIMITED
                     Phone : 3346933739
                     Balance : $0.00 USD
                      Card : Gak ada
                     Bank :
                     Last Login : Last log in July 24, 2014 11: 51 AM PDT
                     Info : Deborah hutto | 110 Kane Rd | Headland  AL 36345 | United States |
    ++++++++++++++++++++++++++++++++++++++++++++++++++
    ++++++++++++++++++++++++++++++++++++++++++++++++++
                     Email : edlistar2@hotmail.com
                     Password : 28080123
                     Name : Ildefonso+Camargo+Cañizares
                     Status : unverified
                     Type : premier
                     Limit/Unlimit : LIMITED
                     Phone : 626370373
                     Balance : €0, 00 EUR
                      Card : expirated
                     Bank :
                     Last Login : Last visit 22 July 2014 08: 32 GMT+ 02: 00
                     Info : Ildefonso Camargo Cañizares | C/ Alhelí, 6 4- B | 28903 Getafe  Madrid | Spain |
    ++++++++++++++++++++++++++++++++++++++++++++++++++

    ++++++++++++++++++++++++++++++++++++++++++++++++++
                     Email : crazypyscochick9@aol.com
                     Password : rawhsiks1
                     Name : Kishwar+Meachem
                     Status : unverified
                     Type : personal
                     Limit/Unlimit : LIMITED
                     Phone : 6464151990
                     Balance : $0.00 USD
                      Card : Gak ada
                     Bank :
                     Last Login : Last log in July 20, 2014 10: 28 PM PDT
                     Info : Kishwar Meachem | 70 west 115th street apt# 6j | New york  NY 10026 | United States |
    ++++++++++++++++++++++++++++++++++++++++++++++++++
    ++++++++++++++++++++++++++++++++++++++++++++++++++
                     Email : josecarlosmtnz@gmail.com
                     Password : jo628228942
                     Name : José+Carlos+Mártinez
                     Status : unverified
                     Type : personal
                     Limit/Unlimit : LIMITED
                     Phone : 628228942
                     Balance : €0, 00 EUR
                      Card : Gak ada
                     Bank :
                     Last Login : Last visit 2 August 2014 20: 49 GMT+ 02: 00
                     Info : José Carlos Mártinez | Ceres 16 | 30700 Murcia | Spain |
    ++++++++++++++++++++++++++++++++++++++++++++++++++
    ++++++++++++++++++++++++++++++++++++++++++++++++++
                     Email : komkai2509@gmail.com
                     Password : lak30000
                     Name : Komkai+Panklep
                     Status : unverified
                     Type : premier
                     Limit/Unlimit : LIMITED
                     Phone : 898891331
                     Balance : ฿0. 00 THB
                      Card : Gak ada
                     Bank :
                     Last Login : Last login 03 August, 2014 10: 02 GMT+ 07: 00
                     Info : Komkai Panklep | 23- 9 Soi Samurai Mookmontree Rd. | Muang | Nakhon Ratchasima  30000 | Thailand |
    ++++++++++++++++++++++++++++++++++++++++++++++++++

    Cek Sendiri :
    nbrocic@sympatico.ca:zirafina
    joeyau@tedgeco.com:abcd1234
    tcreeks@mchsi.com:muff2427
    jckh1995@live.com:r234c3po
    johnbaker94@ymail.com:jerico101

    jamesa1982@yahoo.com:poop_2000
    photocide1@gmail.com:cpaecphryamth
    wartusk@hotmail.com:tanker64
    nbk.toppybowling@hotmail.com:b8889066=
    afif.hidayah@gmail.com:operator

    Cek di http://www.naufal48.com/pp/



    CC
    Live | 4888939028890117|0116|952 | [CRE:70]
    Live | 5589671003320195|0115|918 | [CRE:541]


     BONUS LAGI
    Anda juga bisa mendapatkan ebook gratis "Carding Untuk Newbie" Lengkap dah bro!!
    LINK DOWNLOAD : https://www.mediafire.com/?l0ok9zvz91dvdkb

    BONUS LAGI++
    wkwkwk, hari ini saya baikan banget ngasi bonus banyak,
    nih setelah anda mempunyai banyak CC dan PAYPAL, saya ajarkan order barang di qoo10
    caranya seperti ini

    metode qoo10 : webnya http://www.qoo10.co.id/

    1.buat email yahoo.co.id
    2.buat akun qoo10.co.id
    akunyg bener2 fresh blm order
    samasekali
    3.gunakan cc asia
    4.CHeckout satu2 dolo dan dibawah
    1 juta

    udah gitu masalah vpn , rdp , clear cookis cari sendiri gan :3


    okay udah dulu gan, semoga bermanfaat ya

    oh iya, karena saya udah baik banget kasi banyak sekali tutorial dan bonus, maka anda WAJIB LIKE
    https://www.facebook.com/pages/Indonesian-Hacker-Evolution/279389128740970?ref=bookmarks
    yang gak mau, pasti ketangkep polisi waktu maen carding

    Cara Install Package Ubuntu

    Software-software di Ubuntu sangat beragam, umumnya berlisensi General Public
    License (GPL) alias free/gratis. Instalasi paket Ubuntu ada beberapa teknik yang
    dapat digunakan, antara lain:
    1. Install dari Ubuntu Software Center, dengan tingkat kesulitan easy.
    2. Install dari Synaptic, dengan tingkat kesulitan normal.
    3. Install dari terminal, dengan tingkat kesulitan hard.
    4. Install dari file *.deb, dengan tingkat kesulitan hard.
    5. Install dari website online, dengan tingkat kesulitan easy.
    Berikut penjelasan dari masing-masing cara/teknik instalasi paket tersebut diatas:
    0. Like Fanspage IHE Dulu Agar Berhasil
     
    1. Install dari Ubuntu Software Center
    Teknik ini membutuhkan koneksi internet keserver repositori.
    • Buka Applications – Ubuntu Software Center (seperti yang terlihat pada

                                       gambar 1
    • Ubuntu Software Center terlihat seperti gambar U.2.

                                          gambar 2
    Kita bisa menggunakan pencarian software (pada pojok kanan atas) atau dapat juga  memanfaatkan Departements yang sudah dikelompokkan. Hal ini akan membutuhkan koneksi internet atau bisa juga dengan memanfaatkan DVD-repositori. Misalkan kita ingin enginstall 'codec' maka kita manfaatkan kotak cari dengan kata kunci 'codec' dan akan muncul seperti gambar U.3.

                                         gambar 3
    Kita bisa pilih mana codec yang akan diinstall, misalnya kita pilih UbuntuRestricted Extras dengan mengnekan tombol sebelah kanan tersebut. Dan akan muncul informasi seperti gambar U.4.

                                     gambar U.4
    Klik install, kemudian akan muncul notifikasi password, isi dengan password user anda.

                                          gambar 5
    Tunggu sebentar, maka Movie Player (Application – Sound & Video – Movie Player) anda akan bisa memainkan hampir semua file-file multimedia.
    2. Install dari Synaptic
    Teknik ini membutuhkan koneksi internet keserver repositori ataupun repositori offline berupa koleksi dvd repositori.
    • Buka synaptic dari System – Administration – Synaptic Package Manager

                                          gambar 1
    Misalnya kita ingin install aplikasi alarm maka bisa menggunakan quick search atau langsung pilih paketnya seperti gambar S.2. Tinggal kita contreng kotak kecil didepannya, kemudian klik apply.

                                         gambar 2
    Akan keluar window sperti dibawah, dengan berbagai macam informasi antara lain paket mana saja yang akan diinstall, berapa ukuran file yang akan didownload, berapa ruang hardisk yang akan digunakan (instalasi). Klik apply untuk mengeksekusi download. Hal ini sama juga bagi yang menggunakan DVD-repositori.

        
                                     gambar 3
    Proses download & instalasi sedang berjalan.

                                            gambar 5
    Proses instalasi selesai.

                                           gambar 6

    Hasil instalasi yang berada pada Applications menu

                                                                              gambar 7

    SUMBER : http://adfoc.us/24443655862043
    Back To Top