Tuesday, June 12, 2012

Kandula Sreenivasa Reddy Memorial (KSRM) College of Engineering Hacked, Data Leaked BKandula Sreenivasa Reddy Memorial (KSRM) College of Engineering Hacked, Data Leaked By @D1str4ct1ony @D1str4ct1on

Kandula Sreenivasa Reddy Memorial (KSRM) College of Engineering Hacked, Data Leaked By @D1str4ct1on
Kandula Sreenivasa Reddy Memorial (KSRM) College of Engineering Hacked, Data Leaked By @D1str4ct1on
Kandula Sreenivasa Reddy Memorial (KSRM) College of Engineering Hacked, Data Leaked By
@D1str4ct1on .


@D1str4ct1on   leaked 447 accounts detail there username, email id and cleartext password .
This leak taken place from the databases of the KSRM, College of Engineering which is based in india (http://www.ksrmce.ac.in/).

leaked data available here :

Pastbin 

10000 Twitter User oauth token hacked and Exposed by Anonymous

10000 Twitter User oauth token hacked and Exposed by Anonymous
10000 Twitter User oauth token hacked and Exposed by Anonymous
10000 Twitter User oauth token hacked and Exposed by Anonymous.
Anonymous Hackers, with Twitter account "LulzsecReborn" Hack into TweetGif (http://tweetgif.com) and Hack complete Database. And they publish that on Internet also. TweetGif is a website which allow you to use animated GIF image as your twitter acount picture.

LulzSec Reborn, a 3.0 version of the earlier LulzSec, has leaked 10,000 Twitter profiles’ passwords,  Usernames, real names, locations, bios, avatars and secret tokens used to authenticate their accounts.

Pastebin message posted: The leaked data was uploaded to embed upload and contains a 4 MB SQL file with all the users details.

Users table from http://tweetgif.com/ nothing serious like 10.000 twitters…

Leaked data Available here : Click Here

Samsung Galaxy S3 launched in India at Rs 43180.

Finally, the wait is over ! Samsung galaxy S3 launched in Indian debut on Thursday. The much awaited smartphone will cost Rs 43,180 in India.
The youngest member of the Samsung’s Galaxy range with the third generation model expected to be even more successful than its predecessor, helped the South Korean company topple Apple Inc as the world's top smartphone maker.
Buyers may be a little disappointed seeing the price of the phone.

The Samsung Galaxy SIII, according to Samsung has been taken from a nature theme. The phone has been “inspired by nature and designed for humans- it sees, listens, responds, and allows you to share the greatest moments”.  In the Samsung galaxy SIII  1.4 GHz Quad Core Exynos processor which increases its performance and speed of the phone as compare to other phones. It operates on the Android OS, v4.0.4 (Ice Cream Sandwich).

                 In design the new technology is used that is Hyberblaze. This technology makes it different form the other phones. Samsung has also come up with a new technology called Smart Stay with the new Samsung Galaxy SIII. This technology claims to have your eyes been tracked by the camera, so it will make sure that the back light of the screen should not go off when you are looking at it, and will dim it when you are away. The Galaxy S3 has also added another feature called as the Direct Call. When you are messaging someone and feel to make a call to that person, you can just bring the phone near to your ear and the Direct Call feature will make sure that the call gets connected to that person and its connectivity and camera quality is just awesome.


Samsung Galaxy S3 (SIII) SPECIFICATIONS:

Display

Form Factor:                Bar
Screen Type:                Super AMOLED HD Capacitive Touch screen
Screen Size:                 4.8 inches
Screen Resolution: 720 x 1280 pixels ( ~306 ppi pixel density)
Number of Colours:    16M
Multitouch:                 Yes
Protection:                  Corning Gorilla Glass 2
UI:                                Touch Wiz UI v4.0

Processor

Chipset:               Exynos 4212 Quad
Processor:         Quad-core 1.4 GHz Cortex-A9
GPU:                  Mali-400MP
Speed:                1.4GHz
Sensors :              Accelerometer, gyro, RGB sensor, proximity, compass, barometer

Camera Features

Sensor Resolution:                 8 MP, 3264×2448 pixels, autofocus, LED flash
Video resolution/frame rate:   Yes, 1080p@30fps
Video Recording:                         Yes
Features:                               -Simultaneous HD video and image recording-Face and Smile detection
                                                     -Geo-Tagging

                                                     -Touch Focus

                                                    -Image Stabilization

Front facing camera:            Yes, 1.9 MP, 720p@30fps


General Features

Dimensions:                   136.6 x 70.6 x 8.6 mm
Weight (grams):           133 g
OS:                                   Android 4.0.4(Ice Cream Sandwitch)
Version :                         4.0.4
FM Radio:                   Yes, Stereo FM radio with RDS
Bluetooth Features:       Yes, v4.0 with A2DP, EDR
NFC:                           Yes
Messaging:                   SMS(threaded view), MMS, Email, Push Mail, IM, RSS
GPS:                           Yes, with A-GPS support and GLONASS
USB Connector:           Yes, microUSB v2.0 (MHL), USB On-the-go
Browser:                   HTML, Adobe Flash
Internal Memory:          16GB/ 32GB / 64GB, 1GB RAM
Extendable Memory:   microSD, up to 64GB
Available Colours:         Marble White and Pebble Blue


Carrier Networks

2G:          GSM 850 / 900 / 1800 / 1900
3G:         HSDPA 850 / 900 / 1900 / 2100
4G:         LTE(Regional)
Speed: HSDPA, 21 Mbps; HSUPA, 5.76 Mbps

Data

GPRS: Class 12 (4+1/3+2/2+3/1+4 slots), 32 – 48 kbps
EDGE: Class 12
WiFi: Wi-Fi 802.11 a/b/g/n, DLNA, Wi-Fi Direct, Wi-Fi hotspot

Sound

Media Player:        Music formats: – MP4/DivX/XviD/WMV/H.264/H.263 player
                                 - MP3/WAV/eAAC+/AC3/FLAC player
Alert Types:          Vibration; MP3, WAV ringtones
LoudSpeaker:  Yes
Audio connector:  3.5mm

Battery

Type:                 Li-Ion
Capacity  (mAh): 2100

Other Features

- S-Voice natural language commands and dictation
- Smart Stay eye tracking
- Dropbox (50 GB storage)
- TV-out (via MHL A/V link)
- SNS integration
- Image/video editor
- Document editor (Word, Excel, PowerPoint, PDF)
- Google Search, Maps, Gmail,
YouTube, Calendar, Google Talkʃ 䐉 &ntegration
- Voice memo/dial/commands
- Predictive text input (Swype)


We Like

Smart Stay
Camera Quality
SIRI
Direct Call
Hyperblaze


We Dislike

Phone colour(black must be provided)
MicroSIM card
(It does not support the normal sim card. It can support MicroSIM card only . so we can’t change sim card easily the we do in normal phones.)

BSNL FREE GPRS Technical Tricks June 2012


BSNL FREE GPRS Technical Tricks June 2012.

To use free gprs in bsnl just use below settings :

BSNL FREE GPRS Tricks

Proxy:- 110.100.3.2

port:-9209

Apn:- wapwest.cellone.in

HomePage:- www.hack75.blogspot.in

Enjoy The Free Unlimited GPRS Tricks

Be Happy :) :)

How to search on Google, When you dont have Internet connection on your mobile?


Its very simple, You write a word that you want to search and then just send a message to Google number,

And you will get the search result by sms only.

No extra charges applied its normal rate are applied for message...

Google number :-       9773300000

Be Happy !!

Friday, June 24, 2011

What is A Hacker

What is A Hacker

A hacker is known to build things, solve problems and not break or crack any system. The computer industry initially hired good programmers to make sure how to full proof their system. However, over the years, the media, journalism and writers have played a very important role in changing the real meaning of the word hacker. They themselves are very confused in the term Hacker and a Cracker. A typical definition of a Hacker, that today comes to you mind is that a Hacker, is a person who tries to gain unauthorized access to any property and computers. The term Hacker came as slang from the computer world. So, different people have given different definitions to it. But what remains the common point is, that whenever you hear the word hacker, the first think that comes to your mind is always negative and bad. However, the real meaning of a hacker is a programmer who really finds it thrilling to learn more about it, who likes to explore more details about the programming language and hence stretches his or her capabilities more than any average person.
Crackers are people who get cheap thrill out of cracking computer codes, and breaking into systems. Hence, these are the people who have negativity around them and they only believe in breaking or cracking an access to any kind of system that they have no authorization to. They are malicious annoying people who try to uncover sensitive information by poking their unwanted nose everywhere. Hackers on the other hand are knowledgeable and responsible people. They like to take intellectual challenges and like to overcome all limitations that are there in a particular system. Learning to hack is not very easy. It is a special gift that is only given to a selected few. Only people who are good in searching and keeping themselves updated about the latest technology are the one who are blessed with it. Only being good with computers does not qualify one to be a good hacker. Some people also reapply their hacking knowledge to different fields like music and electronic. It is also said the every hacker is independent of any kind of hack he does, call it in the computer field or elsewhere. Hackers are known to be ethical, wise in their practice.
The realty is: 'Hackers build things, crackers break them.'
Today the hacker world has been given 3 different names. The White hat hackers, who do all the good things and are positively motivated people, Then we have the Black hat hackers also called the crackers who are usually into negative work of cracking and breaking into someone's system and finally the third and the last are the grey hat hackers who explore the best of both the worlds. To conclude, we can say that Hackers are people who are skilled programmers that work for a positive cause or a goal, either for themselves or for an organization which could be private as in an industry or for the government.

Thinking of A Hacker


The thinking of a hacker is very much the same as that of a good program developer. Hackers who have been successful have developed a common strategy over a period of time. This strategy is to very patiently and carefully document every step, which is what the programmers do. They are good at analyzing and following a methodical approach of investigation. So when they start they don't have much as in the background, they start from the starch and gradually build what is called the entire roadmap or game plan.
It is a known fact that in order to think like a master hacker one should imitated all the big hackers both intellectually and emotionally. As they always work on a different platform and it is the platform of Self Belief.
1. The typical thinking of a Hacker is that, they believe that the world is full of ongoing problems which continuously need solutions to it. So looking for solutions should be the ultimate aim and not giving up till the time the problem is cracked.
2. Another fundamental that they work on is that, the same wheel should not be invented twice as it will be a waste of time and effort both. Brains with creativity should be used for new proposes and not older ones. So, they believe in the theory that time is precious and make the best out of it.
3. The third fundamental truth that they believe in is that, repetition is what leads to success and no word like boredom can be found in their dictionary.
4. The next good thing they believe in is Freedom. Most of the hackers work independently and that is a strong foundation for them to grow. It is said that freedom has no limit to the growth of an individual.
5. No replacement for a good attitude. An attitude to fight and not flight. One can give up whenever he or she wants. It is only the attitude that makes you different from the other.
6. Hackers believe in a value system that is not negotiable and do not compromise on it, because if they do then they would be crackers and not hackers.
Documentation is said to be the wisest thing that any developer a simple programmer or a hacker maintains. At times finding solutions is so difficult that is only the documentation that can help one understand the entire process all over again. It is like hunting for a treasure hunt in a jungle with small clues that take you to the next clue and one step closer to the final gift.

Wednesday, June 8, 2011

LulzSec wins hacking competition, refuses $10k award

The target was Black & Berg Cybersecurity Consulting, a cybersecurity consulting firm that caters to US small businesses and local governments.
But Black & Berg Cybersecurity Consulting really was asking for it. The company hosted a “Cybersecurity For The 21st Century, Hacking Challenge,” for which contestants were asked to change the homepage picture of the company's website.
The reward is $10,000 and a job at the company working with Senior Cybersecurity Advisor Joe Black.
Winner LulzSec, however, declined the money (and presumably the job offer).
“DONE, THAT WAS EASY. KEEP YOUR MONEY WE DO IT FOR THE LULZ,” wrote LulzSec on the defaced website

While LulzSec does have a history of hacking for “lulz,” it also claimed to be operating under a tight budget. It also previously solicited donations (and claimed to have received over $7,000 in BitCoin) from the online community. Nevertheless, the $10,000 reward was turned down this time for whatever reason.
Joe Black of Black & Berg Cybersecurity Consulting had this to say about LulzSec via Twitter: “Black & Berg Cybersecurity Consulting appreciate all the hard work that you're putting in. Your Hacking = Clients for us. Thx.”
In an emailed statement to IBTimes, Black said: “What can I say? We're good, they're better.”
When asked what method LulzSec used to hack his company, he said: “I'm going to go with reconnaissance, scanning, gain access, maintain access, and cover tracks.”
LulzSec first gained infamy for hacking PBS and posting a bogus story of Tupac being alive. Its next big target was Sony, which it hacked, took information from, and then published that information online. LulzSec claims to have “owned” Sony with “a very simple SQL injection, one of the most primitive and common vulnerabilities.”