2ND 'THE HACKERS CONFERENCE 2013' TO BE HELD IN NEW DELHI

Written By TAC Team on Sunday 28 April 2013 | 02:58


The Hackers Conference is an unique event, where the best of minds in the hacking world, leaders in the information security industry and the cyber community along with policymakers and government representatives on cyber security meet face-to -face to join their efforts to co-operate in addressing the most topical issues of the Internet Security space.

This is the second edition of the Conference. Following the huge success of the conference last year the current edition of the conference brings back to you all the knowledge, all the fun in a better, grander way! The Conference will be held in New Delhi, on the 25 of August 2013, and will get together industry leaders, Government representatives, Academia and underground Black-hat hackers to share knowledge and leading-edge ideas about information security and everything related to it.


Venue Location:

NDMC Convention Center,
Parliament Street,
Connaught Place,
New Delhi, India.


Date and Timings

August 25, 2013
Sunday, 9am - 7pm.


Contact us

Email : info@thehackersconference.com


Phones :

+91-8285603969
+91-9899223732

REGISTER YOURSELF


General Inquiries
All inquiries, correspondence and issues related to conference registrations should be directed to 'The Hackers Conference' via email info[@]thehackersconference[dot]com with 'Registrations' as subject or Call us at +91-8285603969or +91-9899223732.

Sponsorship Opportunities
If you are interested in partnering the 'The Hackers Conference' 2013, email us at sponsors[@]thehackersconference[dot]com. We will get back to you with the sponsorship options that are available.

Call for Papers
Abstracts and Papers or queries related to them should be mailed at cfp[@]thehackersconference[dot]com

Join us as volunteer
THC2013 needs volunteers to get the show running. Volunteers will help plan the conference, coordinate programme activities, assist with registrations, act as official guides during the conference, staff various official activities. Interested geeks (only from Delhi NCR) can email us at info[@]thehackersconference[dot]com


For More Visit: THE HACKERS CONFERENCE

CYBERATTACKERS HACK INTO LIVINGSOCIAL, 50 MILLION CUSTOMERS IMPACTED

Written By TAC Team on Saturday 27 April 2013 | 06:21

"LivingSocial hacked but company officials say credit card information was not stolen"

LivingSocial, the daily deals site owned in part by Amazon, has suffered a massive cyberattack on its computer systems, according to officials at the company.

The breach has impacted 50 million customers of the Washington, D.C.-based company, who will now be required to reset their passwords. All of LivingSocial's countries across the world appear to have been affected, except in Thailand, Korea, Indonesia and the Philippines.

The firm began sending emails to customers Friday afternoon telling them they would have to change their site passwords.

"We recently experienced a cyber-attack on our computer systems that resulted in unauthorized access to some customer data from our servers. We are actively working with law enforcement to investigate this issue," LivingSocial CEO Tim O'Shaughnessy said in an email.

The memo said that customer credit card information was not stolen — it was stored in a separate database. And while the hacker stole customer passwords, they were encrypted and "salted," or scrambled.

"Although your LivingSocial password would be difficult to decode, we want to take every precaution to ensure that your account is secure, so we are expiring your old password and requesting that you create a new one," O'Shaughnessy said.

The company advised consumers who used their LivingSocial password at other sites to change their password at those sits, also.

The firm expects its customer service phone lines to be deluged, so O'Shaughnessy warned that he may decide to temporarily suspend telephone customer service relations.

"Because we anticipate a high call volume and may not be able to answer or return all calls in a responsible fashion, we are likely to temporarily suspend consumer phone-based servicing. We will be devoting all available resources to our Web-based servicing," he said.

PHROZEN KEYLOGGER LITE V1.0 DOWNLOAD

Written By TAC Team on Sunday 21 April 2013 | 10:04


Phrozen Keylogger Lite is finally available, developed by Dark comet RAT developer. Phrozen Keylogger Lite is a powerful and user friendly keylogger especially created for Microsoft Windows systems. Phrozen Keylogger Lite is compatible with all currently supported versions of Windows, which effectively means Windows XP to the recently released Windows 8.

Phrozen Keylogger Lite has been especially created to capture all keystrokes from any type of keyboard (PS/2, USB and even Virtual Keyboards). The captured keystrokes are stored into a local database. There they are sorted by their process name and the active window into a log.

Phrozen Keylogger Lite is running silently in background. When the program is successfully installed on a computer, it will capture all keystrokes fully stealthily and the program will remain hidden from every user. It will not slow down the computer it is installed on.
If you want to consult the logs of the current day or previous days just press the so-called “Magic Shortcut” and enter your personal password and the logs will be made visible in a new window. You can easily manage, export, delete, mark as important, mail, etc. these logs.
Phrozen Keylogger Lite also gives you the possibility to manage black listed words. When such a word is entered via keystrokes you will immediately be sent a mail which contains the entire context in which that ‘black listed word’ appears. This is a very useful feature: suppose you have forbidden your son to go to a specific gambling site and he does go there against your wishes, you then immediately get a mail that warns you of this transgression.

Download Phrozen Keylogger Lite v1.0


HOW TO RUN FACEBOOK HOME APPLICATION ON ANY ANDROID DEVICE

Facebook Home arrived on Google play, But Officially it was announced for HTC One, One-X, Samsung Galaxy S3, S4 and Note 2 only. Recently a hacker from XDA Developers forum bypass the limitation which makes it to run on facebook phone is moved . Hack was done by senior member theos0o. Hack doesn't required any root access on your android phone to install it, but if your device comes with preinstalled facebook app, Root access is needed. To run facebook home on android phone, user need to uninstall original facebook, facebook messenger and facebook home apps before.

All you needs to run two APK files [Download here].

However there are some limitations of facebook home, it consumes large amount of data and memory and if you are expecting high end interface and launcher then its not for you.
Install it at your own risk ;) 
Enjoy.

ANY MAC APPLICATION CAN BE CRASHED BY EIGHT CHARACTERS TEXT

Open Radar Community today reported a bug in Apple's Mac systems. 
According to a post, a eight characters text will crash almost any application on your Mac. When you type "File:///" (The capital 'F' is important) in some Mac application like TextEdit, it will crash the screen. It is figured out that, the bug is inside Data Detectors, a feature that lets apps recognize dates, locations, and contact data, making it easy for you to save this information in your address book and calendar. Since the bug has been reported to Apple, it will likely be patched at some point. A reader copy posted the crash dump at Pastebin.

TWO ANONYMOUS HACKERS JAILED FOR PAYPAL AND VISA HACKING


Christopher Weatherhead, a 22-year-old student and Ashley Rhodes, 28 were jailed by a London court Thursday for a series of cyber-attacks by the hacking group Anonymous that cost the U.S. online payments giant PayPal millions of dollars. PayPal was repeatedly attacked in December 2010 after the website decided not to process payments made to the Wau Holland Foundation, an organization involved in raising funds for WikiLeaks. During Weatherhead trial, prosecutors said the attack had cost the company 3.5 million pounds ($5.5 million) in loss of trading as well as software and hardware updates to fend off similar attacks.

BLACKBERRY Z10 OS 10.1.0.1429 LEAKED



Earlier this week, BlackBerry OS 10.1.0.1483 roll out to developers. However, that release is stripped down of a few native apps. Today, a leaked OS for the BlackBerry Z10 version 10.1.0.1429 has leaked which claims to contain the full 10.1 OS. This OS currently supports STL100-2, STL100-3 and STL100-4 devices only. Get Instructions on how to install this leaked OS here

Download Links: STL100-2, STL100-3, STL100-4

Download the file that you need from the links up above. Make sure you download the correct version for your device. This is an unofficial software release. There are no guarantees that it is stable. 

DOWNLOAD ANONYMOUS - OS 0.1 – ANONYMOUS HACKERS OPERATING SYSTEM


Want to try out Anonymous Operating System? Download the Anonymous-OS 0.1, a live, Ubuntu based distribution which is created under Ubuntu 11.10, and uses the Mate Desktop. You can create a LiveUSB of it via the Unetbootin.

Anonymous OS is named after Anonymous, a hacktivist group, famous for opposing Internet censorship and has hacked various government websites and corporations. Their motto is “We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.”
Update: The group “Anonymous Operations” has confirmed that the custom Linux based operating system released under their name is not an operating system they have developed. The group claimed that the Anon OS is fake, and is wrapped with trojans and malware.

Also SourceForge pulls Anonymous-OS, and is no longer available in it, as the project is n’t transparent and there is a substantial risk in downloading and installing the operating system.

If you still want to check it out and try it for yourself, you can download it below, although we recommend it running in a virtual environment, with secure network connection.


Pre-installed apps/applications on Anonymous-OS:

  • ParolaPass Password Generator
  • Find Host IP
  • Anonymous HOIC
  • Ddosim
  • Pyloris
  • Slowloris
  • TorsHammer
  • Sqlmap
  • Havij
  • Sql Poison
  • Admin Finder
  • John the Ripper
  • Hash Identifier
  • Tor
  • XChat IRC
  • Pidgin
  • Vidalia
  • Polipo
  • JonDo
  • i2p
  • Wireshark
  • Zenmap
and more

Download Anonymous-OS 0.1

you can download from this torrent link:
Download Anonymous OS here.

Warning: Use at your own risk. Operating system is not developed by any Genuine Source. It might be a backdoored OS by any Law enforcement Company or Hacker.

Anonymous OS uses Tor which can preserve privacy and anonymity. Tor helps you use the Internet anonymously and leave no trace on the computer. The OS itself also has apps pre-installed on it that can be used in penetration testing, network and computer security testing, and password cracking.

METAL SLUG 3 v1.6 APK FREE DOWNLOAD

Written By TAC Team on Thursday 18 April 2013 | 09:26


Required Android O/S : 2.3.3+

Screenshots :







METAL SLUG 3 v1.6 APK

password: click here


TEMPLE RUN: Oz v1.2.0 APK FREE DOWNLOAD

ROCKMELT FOR MAC OS X BETA 4

RockMelt is re-imagining your online experience by creating a new web browser that makes it easy to stay in touch with friends, search online, and get updates from your favorite websites.


RockMelt for Mac OS X Beta 4



ROCKMELT v0.16.91.483 FREEWARE

RockMelt is re-imagining your online experience by creating a new web browser that makes it easy to stay in touch with friends, search online, and get updates from your favorite websites.

                           

RockMelt v0.16.91.483

    vista / Win7 / WinXP1

HOW TO CAPTURE A SCREEN SHOT WITH MAC OS X

Dear Users, Here is some steps to capture a screen shot with Mac OS X :-

1.) To capture the entire desktop, press Command-Shift-3. The screen shot will be automatically saved as a PNG file on your desktop.


2.) To copy the entire desktop, press Command-Control-Shift-3. The screen shot will be placed on your clipboard for you to paste into another program.

3.) To capture a portion of the desktop, press Command-Shift-4. A cross-hair cursor will appear and you can click and drag to select the area you wish to capture. When you release the mouse button, the screen shot will be automatically saved as a PNG file on your desktop. (The file is saved as PDF in Mac OS 10.3 and earlier.)


     

4.) To capture a specific application window, press Command-Shift-4, then press the Spacebar. The cursor will change to a camera, and you can move it around the screen. As you move the cursor over an application window, the window will be highlighted. The entire window does not need to be visible for you to capture it. When you have the cursor over a window you want to capture, just click the mouse button and the screen shot will be saved as a PNG file on your desktop. (The file is saved as PDF in Mac OS 10.3 and earlier.)

5.) Add Control to the two shortcuts above to place the screen shot on the clipboard instead of saving it to the desktop.


6.) Another method for capturing screen shots in Mac OS X is by using the bundled Apple utility, Grab, located in the Applications > Utilities folder. Grab is useful if you need to include a cursor or a menu in your screen shot, or if you want to save your screen shot to TIFF format. To include a cursor, first go to Grab Preferences and select the cursor icon you wish to have in your screen shot. To capture the screen with Grab, run Grab, then choose of the capture modes from the "Capture" menu: Selection, Window, Screen, Timed Screen.

7.) When you choose the Selection mode in Grab, you can capture a specific region of the screen by dragging around it. Grab will display a tooltip showing the size of the region you have selected and the screen shot will open in a window when you release the mouse button. The cursor will not be included.

8.) When you choose the Window mode in Grab, an instruction window will appear asking you to select the window you wish to capture, then click the "Choose Window" button. When you click the button, the instructions will disappear and the window you click ill be captured, including the mouse cursor at the position where you click (if a cursor was selected in Preferences).

9.) When you choose the Screen mode in Grab, an instruction window will appear asking you to click the screen when you are ready to capture. The mouse cursor will be included in your screen shot at the position where you click (if a cursor was selected in Preferences).

10.) When you choose the Timed Screen mode in Grab, an instruction window will appear, allowing you to prepare your screen for capture. When you are ready, press the "Start Timer" button and you will have ten seconds before the screen is captured. This allows you to open menus and sub-menus, if necessary. After ten seconds the entire screen will be captured. The mouse cursor will be included in your screen shot if a cursor was selected in Preferences.


HOW TO SET UP GOOGLE'S NEW FEATURE INACTIVE ACCOUNT MANAGER

Written By TAC Team on Friday 12 April 2013 | 01:41

Google After Death : Decide What Happens To Your Digital Data After You Die.

"What should happen to your photos, emails and documents when you stop using your account?" Google said in a message at an account settings page.

"You might want your data to be shared with a trusted friend or family member, or, you might want your account to be deleted entirely," the message continued.

"Whatever the reason, we give you the option of deciding what happens to your data."

Google’s brand new feature Inactive Account Manager gives you control over your digital afterlife.

In this short tutorial I will show you How to set up Google's Inactive Account Manager. Please follow given below instructions step by step:

Step 1> Just Go to your Accounts page. You'll find a link to it under the Account Management section. See image below for better understanding:


Step 2> Click On "Learn more and go to setup".

Step 3> Now, Click the blue Setup button. On the setup page, you'll see 4 sections:

Alert Me
In the "Alert me" section, you have to provide a mobile phone number to which Google will send a alerting message 1 month before any actions will be performed on your account. You can also give an alternate e-mail id.


Timeout Period

With "Timeout period," feature you can set a timeout period for your Google account. They will warn you one month before this period expires. You can set this for three, six, nine, or one year.


Notify Contacts and Share Data

In "Notify Contacts and Share Data" field you can figure up to 10 trusted contacts, such as close friends and family members, who should be notified that your account has remained inactive for the specified period of time. Another thing that for each contact, once your account has timed out, your trusted contact can download your data for 3 months, or you can check the box for "Share my data with this contact" and choose which Google products you'd like to share data from.


To protect your information from unauthorized access, trusted contacts will need a verification code to access your data. Trusted contacts will receive a verification code after your account becomes inactive.


Optionally Delete Account
If you don't want to share anything with others, you'd rather just delete everything, you can decide this at the 4th and last section, "Optionally delete account." Simply, Click the toggle switch to On next to "Delete my account." Finally, click the blue Enable button to complete the setup process. It's all done.


Hey Friends, this was the new feature of GOOGLE, Hope you like this, if you like this, please comment below... So, i wish you live long....
Enjoy Dear Readers...



Popular Posts