Showing posts with label hackers. Show all posts
Showing posts with label hackers. Show all posts

Tuesday, July 5, 2011

Hacker5 and the plagiarism

October: http://www.mediafire.com/?djevkf0owozd4j5

November: http://www.mediafire.com/?o1cyuwc55gip9gi

December: http://www.mediafire.com/?azc4p996iq57aad

http://www.mediafire.com/?3jbzjvm0dvnsrsu

http://www.mediafire.com/?os2lej6ftm9g9n8

some more home work read all the Hacker5 Magazines
reserch and abuse us
but be happy always

team Hacker5

Monday, June 13, 2011

Investigative Journalists are soft targets


After J Dey’s death, silent moments, pain and tears and whispers are visible. 24 hours have already passed since Dey’s departure, yet the police are clueless about his death. Dey's funeral was an emotional farewell. So many questions around, so much of grief, insecurity, pain was in ambience. Shameless police and politicians marked their presence by facing media cameras but there was no hitch of regret on their face. Condolence messages kept pouring from media house to media house. There was competition in sending fax and smses to media. Finally, a journalist’s death too was encashed by these hypocrites for their own publicity. None of them is worried about the police and home department that is clueless about the crime. It was difficult to believe that their buddy left this world forever. He was shot from close distance and police are still clue less about the unknown assailants. How can this government and police department can just let go such issue? Now they think that journalists should be provided with security but what about the past? Who will compensate for J Dey’s death? A large number of media persons had turned up to pay their last respects to the senior journalist. Dey is survived by his wife Shubha Sharma and mother. Looking at his family I had experienced pain in my ribs. I started wondering that this could happen to my family too for bringing out the truth. A journalist is always a soft target.

In broad daylight city like Mumbai where we boast about better law and order, anyone can take anybody’s life and escape clueless. The Maharashtra government swung into action, ordering special police teams to probe Dey’s death. Will they be really investigating the issue? Do you thing can we ever get to know the real criminal? Despite being compared with Scotland Yard police, the Mumbai police continue to be clueless about the crime. State Home Minister R R Patil, Mumbai Police Commissioner Arup Patnaik, Joint Commissioner of Police (Crime) Himanshu Roy, Joint Commissioner of Police (Law and order) Rajnish Seth and several senior government officers should be answerable for this incidence. Our dumb Chief Minister directed Patnaik to arrest the culprits involved in Mr Dey’s murder but where can the murderer be nabbed? He also has failed to mention whom to be held responsible for this case? Always an eye wash, god knows for how long?

J Dey had been receiving death threats and police were aware about it. How come Chief Minister failed to provide police protection for Dey? The government has provided security to Dey’s family at a time when it has lost it bread winner. It very unfortunate, the Home Minister could have acted and provided security to the crime journalist before he was gunned down. Now what is the use of plan for journalists' protection? Senior NCP leader and PWD Minister Chhagan Bhujbal said that it was very important to get the culprits behind bars. It’s true Mr Bhujbal but how can we put the accused behind bars? Just by giving mere political statements to media or by exercising your powers to really nab a culprit? How can you all ministers become so shameless to come in front of camera and still talk big. The manner in which bullets were pumped into Dey’s body, no law could have helped him at that time. The relevant department will look into it. But whatever happened is sad, bad.

The police, meanwhile, are examining the CCTV footage of Crisil House, which is located opposite the scene of the crime. The footage, though, isn't very clear because it was raining heavily at the time of the journalist's murder. So now is there any other way? Or any other excuse for media? The post-mortem report of Dey shows that five bullets were pumped into his body and one bullet that hit his shoulder did not come out. He died due to the bullet injury. Five bullets were pumped into his body and there was no noise? The attack on J Dey was undoubtedly an attack on the media. The police say they can’t establish a motive. Well, Dey had been covering the underworld for years; he’d written on the diesel mafia. Two leads for you, Commissioner Arup Patnaik. But we’re not surprised. The police force is flabby, too busy with rallies and subordinates’ cell phones. It, therefore, came as no surprise at all that in recent cases like the Kurar murders, the local officers did not even want to take down a complaint. Is the Mumbai police inept, poorly led, or just plain corrupt? Difficult to say.

J Dey was killed in a centrally-connected neighbourhood, in broad daylight and within walking distance of a police station. It adds up to one conclusion: in Mumbai, no one is safe. And when a citizen’s physical security cannot be guaranteed by the State, then that State has forfeited its right to govern. Bullet riddled bodies don’t make a crime reporter cringe. When I looked at J Day’s dead body I was scared, because all these days even I was doing investigative journalism, now also i am doing my reserch on Hackers, they do defametary blogging,they abuse and some times even make calls to me and threatn.

If you want to reach the fact and fight odd, then your destiny is death. It was an association that lasted right unto his death. Those were the years when J. Dey was still trying to find his footing in journalism. Enough is enough. Things need to get back on track, and we can start with the enactment of stringent provisions against those who attack the media. Or we can be one of those banana republics where dead journalists are commonplace.

Thursday, June 9, 2011

Indian Government web-sites need attention


The Hacker collective Anonymous joined the fight against Indian corruption by hacking the site of the Indian government IT website NIC, the National Informatics Center. Ostensibly the hack was a retaliation for the government’s violence against Indian activist Baba Ramdev, who had been staging a hunger strike to protest government corruption, which the government recently disbanded with violent force. The hack, which the group claims took just three minutes, displayed the above message on the site. NIC quickly moved to take the page offline, but a cached Google page confirmed the direct hit by Anonymous. The hack comes just days after Anonymous hacked the government database of Iran, exposing private emails from that country. While no data was stolen or exposed from this latest hack in India, Anonymous’ message was clear: the corruption of institutional forces runs against individual freedom.

A statement by Anonymous said, “Over fifty years ago, Indian Freedom Fighters laid down their lives for our freedom. In the end, what was it all for? Today our politicians ride slip-shod over our laws, corruption is rampant. If the brutal way Baba Ramdev’s hunger strike was crushed is anything to go by, it would seem that India is now on its way to becoming an undemocratic ‘democracy’.”
This is something really worth giving a thought, why all of sudden ANONYMUS has to voice for Indian issues, give a thought, you hackers may realize the fact and reason behind it.

In the past, we have witnessed many of our websites being hacked including India's Central Bureau of Investigation (CBI), colleges, NGOs, Indian companies and religious organisations among others by Pakistani Hackers. And, in the recent past, ONGC website too was hacked by them. And now, there are many chances that they would target SAIL (Steel Authority of India) website as it has many vulnerabilities and can be easily hacked.

The unfortunate part is that in spite of being warned by Kaizen India Info – Sec Solutions Pvt. Ltd (A cyber security firm that is working towards making our country free from cyber threats) about the loopholes to SAIL authorities, no necessary actions have been taken so far. Similarly, Kaizen had also informed higher authorities of ONGC about the vulnerabilities in their website but they too did not pay heed to the warning and ultimately landed up getting hacked by Pakistani hackers. Sadly, whenever a website gets hacked, fingers are always pointed towards the hackers but the fact is that the website owners themselves are responsible for not taking proper care and leaving their websites open with all the loopholes inviting hackers to attack.

A tit-for-tat campaign has been in practice by groups on both Indian and Pakistani sides dating back to the late 1990s when tensions over the disputed Himalayan territory of Kashmir brought the nuclear-armed neighbours to the brink of war.

In 2009, India’s one of the biggest banks Bank of Baroda, a global bank with a network of branches in India, and an international presence in 21 countries was hacked by Pakistani hacker group called Pakbugs.

“Indians place little or no value on the kind of data individuals and organisations in many countries prefer to keep confidential, like passport and bank account details or work contracts,” Cyber Expert Vijay Mukhi said.
"Privacy is a concept not rooted in India culture. I don't think we can change that and I don't think it's going to change in my lifetime," he added.
"The government doesn't care" about protecting information online. Corporates for some reason just don't want to spend the money. They don't think it happens often. Web security is a low priority," he said.

Very recently, the website of Sony BMG has been hacked and an anonymous poster has uploaded a user database to pastebin.com, including the usernames, real names and email addresses of users registered on SonyMusic.gr. This kind of company websites getting hacked not only affects the company itself but also the customers. Interestingly, many of the companies are insured and thus they get their losses recovered leaving the customers to suffer.

The question that arises is who will take action against these attacks? Government has been maintaining silence even though one after the other their websites are been attacked and details are been leaked or deleted. Is our government so weak? Now, after CBI, ONGC, Bank of Baroda and many other official websites, SAIL can be the next target. Hope that the SAIL authorities are listening and would take necessary steps towards protecting their website

Tuesday, May 10, 2011

133t anti- Indian h4x0rs






SOME SO Called 133t Indian h4x0rs I pity on you, please learn to draft proper messages, you are the biggest anti Indian group and sabotaging our nation. I understand your publicity greed but no use. I don’t think media would be ever interested in such group. Two guys in this so called team are from Gujarat, one prominent hacker from Hyderabad, one from my own Mumbai and one from Rajasthan. Unfortunately they are none other than the old so called patriotic group of our country.


The group is hey wire and shattered, their identity is attacked and many of the group members lured in criminal activities. They all are between the age group of 19 to 22. They are spoiled brats and ideal minds. The Hyderabad fellow hacker is quite sharp and cunning, but the guy from Rajasthan is really sharp ( I really admire these Gujrat and Rajasthan Guy). They from middle class families and doing small time jobs. Some of them are yet to finish their education. The reason behind defacing Indian sites is nothing but gaining popularity and to remain in news. Create deter in hacking world and also make their name famous.


Indian officials are under fire for the security lapse that allowed the terror siege to occur in our country. So many times Javan gets killed and police get attacked. Intelligence fail, government flops and we innocent people get owned by terrorists, that does not mean, crime and criminals are role models. The destroyers have no nationality or religion, they are just scavengers born to frustrated souls..And blot on our own country. Security lapse (=a temporary failure in arrangements for any safety). In 26/11 some terrorists made entry in Taj and the hotel was totally destroyed and it is considered a very serious security lapse and it is one of the deadliest attacks in the history of India. The attackers took advantage of security laps and got in that does not mean they are the heroes. They are attackers, criminals and terrorists, they scan your security with illicit intentions, their main object is to attack and damage. They are not bothered about who’s who!! It’s their mentality and upbringing. Whenever a hacker hack a site or defaces the same, they leave message questioning your security potentials.


Today I was reading one message on one such defaced site, “Stop Eating Our Money. Yea you heard it right OUR fucking Money”. Here I want to ask what is the meaning of “Fucking Money”? It really fucks or you earn out of it? Guys no one is forcing you to pay on gun point, it’s you who wish to pay for your own wants and desires. More over the worth appreciating fact is that they themselves already published on their site that, “We need to understand that there is no real guarantee for a job and also there is no replacement for hard work. Guarantee is a misnomer and merely a sales technique. We have 64.1%* placement record so far. Appin certified professionals are working in top companies. We offer 100% assurance of our assistance in finding you the best job. Students have come to our institute to take training after they were dissatisfied from the so called 100% Job Guarantee institutes. All Appin certified job seekers can send across there resume at placement@appinonline.com. Company have different openings across various domains and currently hiring for national and international hiring”.


they are very much vocal and clear in what they are doing. Khare is a business man like any other schools in our country where education is sold and purchased, we pay heavy money to possess a certificate, many underprivileged in spite of having knowledge and wisdom deprived of education in India. Big money big education that’s how it is. Can you stop all of them?


Then the message continued with “Stop Boasting about shit things and fooling our government atleast from now on work for the nation in a true way in a Real way”.


Whatever it is, one thing is sure. Appin is paying income tax in time, they have not produced any terrorists, neither are they indulged in any antinational activities. They are simply doing their business and expanded it larger than life. Hundreds of people are earning their living from them. They have empowered thousands of young youth of this country. If suppose, Appin closes its business, then are you going to provide their employees a living? When you cannot be provider then you have no right to snatch their living. Our government can’t be fooled, please have at least faith in them. Work for nation means what? They should start defacing sites and harasses people in the name of country? Yes This Country Gave You Everything And What You Did Till Now?? The same question I would like to ask these defacers. Change Your Mind set. Don’t behave antinational and trouble your own country people.


Learn Some Real Shit Other Then Outdated Methods and Backdoored Tools of Monotones way of defacing. Why to leave logs and ask someone to find you? If at all you are true Indian and bunch of men then come forward and face the world, have guts to show your faces and say it’s me. But I know you cowards have no guts. We know that you are Not The Masters, you Are Not The Blasters, Neither you are of Any Corporate Level IT Experts but We are More Greater Then That We are..



ANTIINDIANS


That’s Your Name that’s Your Fame


0wn3d y0uR 0wn c0untry pe0pl3 and f33ling great


SHAME…L4m3rz Wait And Watch, evil has very short life….


I know who u are but I won’t harm u, unfortunately u r my fellow Indian


~~St0ry Ends~~

Thursday, April 14, 2011

The virtual girlfriend: Fantasy or nightmare?


>A sampling of virtual girlfriends

Meet the next virtual girlfriend: The announcement of Cloud Girlfriend, an app designed to publicly flirt with users on Facebook, has had tech bloggers in a tizzy for nearly a month. Now that it has an official release date (April 06) and a cost (free), it's due time for us to take a closer look at "her" and, more important, what the fantasy of a virtual girlfriend says about us.

David Fuhriman, CEO of Cloud Girlfriend, says the product isn't just about entertainment and escapism; he sees it as a training ground for relationships: "Like the saying goes, 'Practice makes perfect.' [It] can help people come together and practice managing a real relationship -- and then take it into the real world." You know, like a Tamagotchi is to pet ownership, a virtual girlfriend is to dating. OK, so that might seem a dubious claim -- real-life interactions are an entirely different beast from status updates and "pokes" -- but these days so much of even our real-world relationships are managed virtually. As Fuhriman points out, a relationship with Cloud Girlfriend is like the increasingly common long-distance relationship (minus the Skype sex). This all brings to mind an article I read the other day about virtual therapy, where the patient talks out his or her problems with a sophisticated avatar capable of mirroring body language, engaging in basic conversation and, most important, asking a series of probing questions. Therapists are also using virtual simulations to help patients through social phobias.

It isn't just the potential entertainment or therapeutic value that has people wound up over Cloud Girlfriend. After all, the Web is already full of virtual girlfriends. There are iPhone apps and interactive games of all flavors. That's not to mention the phenomenon of Love Plus, a game for Nintendo DS that allows players to maintain a relationship with, creepily, young teenage characters. The game is so popular in Japan that a resort town dreamed up a special vacation package for fans to have a romantic getaway with their pixelated lovers. The game also led to the first marriage between a man and a virtual woman. And then there's the most popular virtual lady of all: free Internet porn.

What makes Cloud Girlfriend different and, apparently, more enticing is the potential to convincingly present oneself as something you're not: a stud with a pretty, doting girlfriend. The appeal isn't limited to those capable of deriving satisfaction from interacting with an avatar; a virtual Facebook girlfriend is, as with most things on the social network, largely about self-presentation. In addition to public online flirtations -- which are meant to make the bachelor look more appealing to potential partners -- Fuhriman is working on developing software that allows users to superimpose their image on a photo of their fake ladyfriend. It might seem too good to be true: Some suspected it was an April Fool's joke since it was announced in late March; others pointed out that Facebook's terms of service ban profiles generated by bots. But Fuhriman explained that real women will be managing the profiles and taking responsible for the digital flirtations. However, he insists that it "is not a sex chat or pornography service." That raises the question: Why not just do it yourself -- create a fake Facebook profile for your dream girl and then fabricate interactions on your real profile?

The thing is, I suspect the buzz over Cloud Girlfriend has less to do with the app's actual utility and far more to do with the desire, and fear, that it taps into. We're more connected, and yet more isolated, than ever. The hyped future-is-now remedies for carnal loneliness -- like sex robots and teledildonics -- have inspired disappointment, and often repulsion. This is a time of fantasy fulfillment and disenchantment -- and what represents that better than a lover who is real to everyone except oneself.

post by tracy_clarkflory

Monday, April 11, 2011

When Hackers Penetrate Each Other

There is one article written by some hacker of Thailand Pe3z, “When hackers penetrate each other”. It’s really worth reading; he says (translated from thai by google) “This is not even any other drama this occurs when there is a group of hackers. The site of a hacker attack themselves, because due to a hacker site such that the "sales course" in exchange for money. The party then went further. Also stated that the "teaching shit hacking." Another very short one, so very careful, I bite find. Types of snakes very short money teaching other people to fish any other fraud Bla any other.” This was really an awesome statement.

But here I want to say in India there are hundreds of so called ethical hacking institutes and 60 of them are topers of this hacking training industry and doing great business. We are also against commercializing hacking, because as we all know plenty of open source resources are available for learning such stuff. The question here is “what if a person is slow learner or doesn’t have that much capacity to learn on his own? Why they should not be provided with the knowledge, hacking is not property of someone who can solely possess for himself. For that matter you are not even needed to attend school or college because the stuff you study in books is very well available on open source, knowledge is knowledge, let it be hacking or faking, its openly available everywhere. But the knowledge needs authentication. (again depends who will certify whom?).

One more question, there are many people who made hacking as an industry of producing hacker and randomly thousands of students seek courses from them? Do we have guts to physically stop this mockery or control over such business? NO, we can only deface or damage someone virtually which is nowhere related to his prosperity.


If all these classes are controlled or closed by some defacer friends of mine, then I will quit this business of cyber security and remain in the business of news that is what I am actually doing
(but till want to assure on my behalf).

Kaizen in a venture by a hacker and his friends, he tried doing something on his own by refusing to be a bonded labor. Where is he wrong? Whatever he is selling is his skill, and if he keeps on defacing pages to add glory to his skills as hacker who will take care of his living and bread butter? There are many such hackers working with him and he is definitely trying something different. The other side of hackers those who were working in some training institutes started new pattern of teaching because they don’t want to make this wisdom a mockery, where are they wrong?

Magazine is the only niche print which reaches stalls and corporate sectors and some hackers got the recognition and name out of it and this magazine is providing bread butter to vendor, circulation, printer, peon, office staff to the hackers those involved in it. Can anyone guarantee me providing living to these many people? Till today r45c4l used to struggle for getting his salary at the end of the month, now he must be definitely happy to be provider to some families…. that’s blessing and basic difference as provider and seeker.

Blogging, defacing, garages,groups,sects…oh my god there are many segments to one word HAKERS..I thought at least they are away from false pride, jealous, greed and politics but it’s quite unfortunate to say they are also victims of such evil tendencies. If hackers like r45c4l, trying to get hackers in main stream profession is crime then I support this criminal.

Last but not the least I thank “Anonymous” Group, it was really heartfelt message. They stood by hacker and warned mockers, those randomly harassing hacker by posing as one of the CBI thread. The one who are instigating young hackers to do defacement..they are scaring hackers against another group of hackers, they divide and trying to rule which is not possible because some hackers refuted such evil ideas.

Who does what, and why is big question, I don’t want to be a judge or moral custodian of someone’s behavior. When I cannot create or share. I have no right to destroy or snatch. I am happy to be a target of A HACKERS AND EVEN FEEL GREAT because now the focus of them is not rival countries or cyber securities or biggies of this business..It’s ME THE CAT…. Still some hacker are loud about saying it’s me who got the sites hacked for publicity, here I can just say..”I wish I could have been such a great hacker”...any ways I always had a great dream of having few dedications at Zone –H, someone gifted it to me..

Blessing in disguise..

Thursday, April 7, 2011

Cattechie aka Vaidehi Sachin again in news for the hackers,by the hackers of the hackers


The server got hacked at 6.18 precisely in the morning, the attack was going on continuously from last 3 days and it’s still going on. They were doing bruteforce attack after they failed in DDoS, they were trying all over the places they can do it, they tried it on WHM panel, Cpanel of all the domains, FTP accounts, emails of some of the mail accounts specially feedback@sabkileak.com , it looks like somehow their main target was http://www.sabkileak.com/



ICW, indishell, ICA,DNA, stuxnet, all hacking shit we can knock your doors anytime”. What a shit is this? Why you need to knock the door, if you have guts please come in the doors are open. We may have some differences with our aims and goals but when someone offends us we should be united as one... and this heinous attack should not be tolerated at any cost. Long back “khujli chodary” issued one PDF warning to all hackers for not using particular name for defacement and on that page similar warning was issued. Khujli tried his level best to bend all hacker but fortunately they gave dame to his intentions. More over what I feel is, the main motto behind this hack was not to give a message to icw, ica, indishell, dna, ics etc., it was done by someone who hates our success... we are working to find out, my guys are back to me and they will dig the ground till they reach and find out the evil punks hiding in underground hell. Any ways I never ever came across such stupid underground group.

Cybercriminals are spreading invisible infections far and wide across the Internet by hammering hundreds of thousands of websites. SabkiLeak website based on the lines of WikiLeaks which is to be launched on 1st May, 2011 was apparently compromised by a group of hackers called Fake ICA seeming to be registered in New Delhi. Assisting Fake ICA is its owner’s girlfriend who was once known as the slaughter house for anti-Indian and anti-Hindu worms and the power House of Hindus. But, later she was caught providing information to the Pakistani counterpart and hence was boycotted by hackers hacked the website using Brute force .

The intentions behind the attack from the rivalries appear to be an outcome of sheer envy or the fear of getting their corruption practices exposed. It is also not so skeptical that the hacker group must be hired by some government officers for the attack. Despite the fact that they have tried their best to interrupt the path of SabkiLeak, the website authorities assures to launch it on the scheduled date itself. On the contrary, the attack has only made the website owners gain more confidence and simultaneously get a wider exposure. The whole incidence has only left the ignorant hackers and authorities behind the attack bang their heads against empty pots. In a way, the attack has proved to be a training session for the Kaizen wannabees and its technical staff under the leadership of R45C4l to fight against this kind of attacks on organizations, business groups or any part of the IT sector. Since SabkiLeak is only a virtual media and nothing related to print and paper, there was not any loss in actual. Although the server was down for few hours, the problem is believed to be solved soon.

one of the close source said getting root is not big issue, The guys who did it is against r45c4l, the source said that they are from inj3ct0r and 1 of them managed to steal openSSH 0-day which was written by anti-sec (romeo)... guys are from USA... (Indians in USA).... openssh 0-day is INEVITABLE! 99.99% of the servers are vulnerable to it...!!! someday try to research on milw0rm and threat to milw0rm by anti-sec coz of openssh 0-day its a mastercard which has to be broken somehow!anyways it want make difference because my virtual existence is not much as compare to print.

Hackers had left a message after defacing the website which said there is no point wasting time on defacing Pakistani websites forming small groups. It is essential to form a united group which will help the nation to be cyber secured. Defacing sites of organizations like CBI or PM office is not a great thing as it can be done by any hacker. Responding to the attack, SabkiLeak said that these kinds of attacks are not going to stop it from achieving its motive and also that the website will be launched on 1st May itself standing true to its promises. To be precise, the attack was a message to hackers group like ICW, Indishell, ICA, DNA-stuxnet, ICS and many other ethical hacking groups claiming to be the best. Lately, Cattechie having the same vision had tried bringing all these groups together under one roof ‘Unite Hackers’ for a better prospect of the country but due to some miscreants the attempt received a setback.

Hey guys I really felt like laughing at the defaced page. Those guys are watching every strange thing… hey what this mean? Anyways I am happy; my websites became message board for the entire hackers group other than “khujli” group. Not a big problem... attention creator shower off your ass. So silly and amateur attack, any ways thanks for this hack. All my lost brothers got united once again. This was worth.
Any ways guys I feel this attack was not against me but it’s a open challenge to all groups lets unite and show we may be separated by groups but once challenged we r united... GoodLuck

Friday, March 25, 2011

The truth about vaidehi sachin - how she tarnished the Indian Hacking Scene and exploited Indian Hackers and backstabbed them


The truth about vaidehi sachin - how she tarnished the Indian Hacking Scene and exploited Indian Hackers and backstabbed them

Hey this was one of the hilarious slide show and animation made by a Delhi group and I am proud of them, they made this much efforts on me. One line I liked the most is “don’t feed Cat
yes friends don’t feed cat because she is feeding others. She no needs to be fed.
The group of losers, unnecessarily dragging ICA here I clearly indicate indishell and ICW the guys are working with me and pretty happy.

This series is worth seeing for the extraordinary imagination and grief portrayed by group of hackers, who joined me with big dreams and parted digging their own graves, killing anyone is small thing, killing cat is even more easy, but for that you can only imagine a story board but can’t do anything much beyond.

Coming to my PM with fake profile leaving some nasty dialogs, leaving some awful comments on group walls, creating blogs, making animations..What is all this? Simply you are wasting your time and I am utilizing the same time and growing, I am where I should be. Just moving ahead, but where are you? Why wasting so much time on me? The reason you don’t have much to do and I have no work for you guys..Poor losers..Somewhere at the bottom have you realized one thing? I am still keeping you busy and the task is also me THE CAT… ha ha ha..The elite world of so called social system blesses me looking at these videos, thinking Oh my god the girl has real guts to take hackers on task…bravo..

The hackers working with me are proud of me because they know the fact and who is who..

The hackers still failed to understand me are in dilemma and the hacker’s newly associated with me are not even sacred of these traits. Then what is the use of such videos, accept you making fun of yourself, one benefit is there, some where you are learning animations and may be little bad sequencing and rendering but well began is half done, good creative work go ahead boys, god bless you..
Oh just forgot to remind blogging, defaming.damaging has become your lifestyle.
oh..gosh..Some of your fairer side is good at SEO make best use of it..Good bad or ugly I want CAT to exploit maximum space over cyber world

Thanks for helping..

Fat CAT is still alive and follow Vaidehi Sachin

Friday, March 18, 2011

Hackers Accross The Globe



The hackers groups and their intension of existence

Kosovo Hackers group

Motto: - they want to realize Serbian people about their lost families in their battle between Bulgaria and Serbia war – this group of hackers attacks Serbian sites they are also known with name Albanian hackers. ..They loud saying - Our final word is that we honor all families who lost someone in the war against you. We want justice and we want our missing people back

___________________________________________________

China gal security team - The leader of the group Xiao Tian, is 21 years old

Motto: spread hacking awareness among Chinese people

___________________________________________________

Turkish hackers name - cyber warrior

Motto: Against Turkey Publications, Society and the public conscience of the Negative

Affect situations - there general principle of Misyon'un Mission coverage and faith on the Internet and the attack on the moral values, helped shape the brains for the contents contain pure, Satanist and pornographic content, publications challenge. Said by Turkish hackers group cyber warrior
____________________________________________________

Honker hackers group

Honker is a symbol of patriotic Chinese hackers

Motto - Honker Union of China to launch network attacks against Japan and supporting the Chinese government against what they view as the imperialism of the United States and the militarism of Japan. The group is currently merged with the Red Hacker Alliance. Red Hacker Alliance - responsible for poisoned for cnn attack on april 19th 2008

_____________________________________________________

SKIDROW Hacker Group -

Motto - crack licensed games and cheats n publish it on internet

______________________________________________________

Female hacker group Beng Hacks

Motto: No motive and no evidence - still doubt on its existence - need 2 get more info on it

______________________________________________________

Gjilani Hackers Group - Albanian hackers group

Motto: - no motive, just geeks promoting as communist group of hackers
http://ghg-crew.ace.st
_____________________________________________________

Somaliland hackers group - Somalia country

Motto: 2 provide info n educate people on how to protect computers vandals and how to be secured

SGH - also known as ethical hackers in their country - helping country government
______________________________________________________

Kurdish Hacker Group - Iranian country

Motto- take revenge - by defacing sites of Turkish and Assyrian - and steal the info of government and military org
______________________________________________________

Palin Hacker Group's - known as anonymous in early days of 2008

Motto - to expose Scientology. in jan 2008 targeted - the Church of Scientology — which its members considered to be an overly litigious
_______________________________________________________

Eastside Hackers Group

Motto- all developers ..work on Microsoft platform - this group members r - Microsoft lovers! Work for Microsoft
_______________________________________________________

Romanian hacker group

Motto - exposing security shortcomings on corporate and anti-virus websites -
- > indirectly helping corp. sec More recently the group, whose most famous member is a hacker called Unu
________________________________________________________

Burmese hackers group

Motto - people from Burma government, mission to stand against Russia and Georgia states
Also known as ygn ethical hackers group

MUSLIM hackers group

Motto - spread Islam around the world by defacing sites and stop hatred against Islamism community
________________________________________________________

Shadowy hackers group

Motto: target enemies of wiki leaks
_________________________________________________________

Delta hackers group

Motto - hackers r gaming freaks play online games with bets and crack commercial games
and upload them for free on web
_________________________________________________________

Hacker group L0pht - raised from Boston in early days

Motto - security awareness in IT's and conduct sec workshop
_________________________________________________________

Dutch hackers group

Motto: - help other hackers and make sense of their world - best of the best hackers supporters in the world...
_________________________________________________________

091 hackers group

Motto- community based hacker group and involve in sec projects and help them with all trends
_________________________________________________________

Chaos Computer Club - early days famous hacker froup from germany

Motto - Supports principles of the hacker ethic, this group also fights for free access to computers and technological infrastructure for everybody
_________________________________________________________

PHIRM - old days hacking group

Motto - to reflect a favorite television show in old days on the time of airwolf - now this group is disappeared / or got shut
___________________________________________________________

The Humble Guys THG - hackers group in early days - of 1980

Motto - Breach security of IBM PC's and IBM devices
____________________________________________________________

Red Hacker Alliance - chinese hackers group

Motto - make the largest hacking group in the world
_____________________________________________________________

Shmoo hacker Group

Motto- security think tanks in early days - provide sec solutions to needy ppl
_______________________________________________________________

The hackers groups such as the fallowing given list but they are not much active
Ctg Hacker's Group

ULQINZ hackers group

prishtina hackers group

Prizreni Hackers Group

House of Hackers

Nerezi Hacker's Group

l33thackers group

omega hacker group - russian

DJ hackers group

Drenica Hackers Group

HacDC group

w00w00 security team/ hacker group

This are the few hacker community groups highlighted... all around. As i was researching this info came 2 know able the existence of ANONYMOUS hackers is since long! So don't really know when they have raised... need 2 get more info on it.

SOURCE By Kai

Thursday, March 10, 2011

Hacker vs. Hacker


The hacking and public humiliation of cyber-security firm HBGary isn't just entertaining geek theater. It's a cautionary tale for businesses everywhere Greg Hoglund's nightmare began on Super Bowl Sunday. On Feb. 6 the high-tech entrepreneur was sitting in his home office, trying to get to the bottom of some unusual traffic he was seeing on the Internet. Two days earlier he'd noticed troubling activity hitting the website of HBGary Federal, the Sacramento startup he helped launch in 2009. He suspected some kind of hacker assault and had spent the weekend helping to shore up the company's systems. A few hours before Green Bay kicked off to Pittsburgh, Hoglund logged into his corporate account on Google (GOOG)—and confirmed his fears. He couldn't get in. Someone had changed the password and locked him out of his own e-mail system. Stolen passwords and hackers are facts of life in the Internet Age. Twitter, Facebook, MasterCard (MA), the Washington Post Co. (WPO), the New York Stock Exchange (NYSE), the U.S. State Dept., and countless other organizations large and small have had to deal with cyber-assaults. More often than not, the security hole is plugged and, if the victims are lucky, the plague abates. Not this time. HBGary Federal is a spinoff of Hoglund's HBGary Inc., a cyber-security firm that offers protection to corporations and governments from cyber-attack. Hoglund built his career on the business of hacker-proofing—getting hacked meant HBGary failed at the very thing it's paid to get right.

Hoglund called Google's corporate technical support to shut down the account, but a representative told him that doing so would take time. It didn't matter. Intruders were already helping themselves to tens of thousands of internal documents and e-mails, some of them personal exchanges between Hoglund and his wife, Penny Leavy, president of HBGary. Then the hackers—who turned out to be members of the anarchic cyber-guerrilla organization that calls itself Anonymous—triumphantly posted their electronic booty on an online file-sharing service for all the world to see. That's when Hoglund's real problems began, and the resulting controversy—involving a high-powered Washington (D.C.) law firm, the Justice Dept., and the whistle-blower site WikiLeaks—hasn't just been entertaining geek theater but a rare look into the esoteric realm of cyber-security. It's a world where only a select few understand the workings of the computers and networks we all use, where publicly antagonizing the wrong people can have disastrous consequences, and where some participants tend toward self-aggrandizement and flexible differentiations between right and wrong.

The HBGary Federal documents—to Hoglund's surprise, he says—revealed unethical and potentially criminal plans to build a digital-espionage-for-hire business. "They really showed how bad things are getting," says Bruce Schneier, a renowned computer security expert. "Blackmail, espionage, data theft. These are things that were proposed as reasonable things to do. And no one said, 'Are you crazy?' " The plans were conceived in part by HBGary Federal's top executive, a former U.S. Navy cryptologist named Aaron Barr. Barr was working in conjunction with two other security companies. In a bit of cloak-and-dagger grandiosity, the firms dubbed their collaboration Team Themis, after a titan of Greek mythology who embodied natural law. (Forsaking Themis brings on Nemesis.) Team Themis proposed to electronically infiltrate grass-roots organizations opposed to the U.S. Chamber of Commerce, the powerful Washington lobbying organization. In a separate and even more legally dubious proposal intended for Bank of America (BAC), the group laid out a plan to infiltrate WikiLeaks and intimidate its supporters.

Team Themis's machinations were exposed before they got past the proposal stage. But the schemes the security firms came up with were Nixonian in scope and Keystone Kops-like in execution. In a 12-page PDF sent to Hunton & Williams, the Washington law firm representing the U.S. Chamber, Team Themis suggested creating dummy documents and online personae, and scouring social networks such as Facebook for intelligence on their prospective client's most vocal critics. In the proposal for Bank of America, the security firms suggested hacking WikiLeaks itself to expose its sources. For Hoglund and his 30-person company, the fallout from the revelations continues to grow. Employees of HBGary and their families have been besieged with hostile phone calls and e-mails, including some death threats, and the company canceled its presentations at the annual RSA cyber-security conference in February. News sites that cover computer security have plumbed the document dump, turning HBGary and Barr into objects of ridicule. Barr resigned on Mar. 1 and declines to speak publicly about the ordeal. All of it makes Greg Hoglund furious. "These individuals are not hacktivists, they are criminals," he tells Bloomberg Businessweek, referring to his Anonymous adversaries. "If you let a gang of cyber-thugs hack into systems with impunity and get away with it, what kind of precedent does that set for cyber-security?"

Hoglund, 38, is widely respected in the computer security world for his expertise with "rootkits," software that facilitates privileged access to a computer while evading detection. The HBGary chief executive officer never went to college and learned his trade on the fly, spending time with other hackers and writing his own security software. He co-founded HBGary in 2004, providing corporations with tools to detect, analyze, and combat sophisticated malware attacks from hostile foreign governments. (The firm's name is derived from Hoglund and his two original partners, Shawn Bracken and Jon Gary.) Among the companies HBGary has worked with are Morgan Stanley (MS), Sony (SNE), and Walt Disney (DIS).

Fifteen months ago, Hoglund decided to branch out into a new market and spun off HBGary Federal to perform classified work for the U.S. government. Employees of the subsidiary would have military experience and top security clearances. To run the operation, Hoglund tapped Barr, then an engineer in the Intelligence Systems Division of military contractor Northrop Grumman (NOC). "Aaron has a very high IQ. He's a very smart individual," says Hoglund. "He also has an incredibly good reputation, or he did at the time." In the year after he was hired, Barr had little success building HBGary Federal's business. The firm initially attempted to break into the "incident response" market, selling its spycraft to government agencies so they could shut down leaks and identify cyber-attackers. That field is competitive, and paying work sparse for startups. By October 2010, in the e-mails that later became public, Hoglund warned Barr that HBGary Federal was "out of money and none of the work you had planned has come in." In his reply, Barr agreed. Barr did have one possible lifeline. On Oct. 19, Palantir Technologies, a Palo Alto (Calif.) cyber-security company whose terrorism analysis software is used by the Pentagon and the CIA, reached out to HBGary Federal and another security firm, Virginia-based Berico Technologies, with a tempting offer. Palantir said it had been approached by Hunton & Williams, a century-old firm with ties to the Republican Party and the defense industry. The firm needed investigative services on behalf of a high-profile, deep-pocketed client.

Barr and representatives from the other companies discussed the project via e-mail and visited Hunton & Williams in November to meet with Richard Wyatt, co-head of the firm's litigation group. A person who was at the meeting says Wyatt wore suspenders, smoked a cigar, and propped up his cowboy boots on his desk—a cartoonish vision of a D.C. power broker. But the security professionals were impressed when they learned the identity of the prospective client: the U.S. Chamber of Commerce, which had just backed a wave of successful conservative candidates for Congress. The Chamber, it seemed, had a public-relations problem: Activist organizations such as U.S. ChamberWatch, Velvet Revolution, and Change to Win were accusing it of financial improprieties and using foreign donations for political purposes. The Chamber believed all these grass-roots organizations were working in concert with the surreptitious backing of major unions. According to the e-mails released by Anonymous, Hunton & Williams was already amassing reams of information, including union rosters, and needed expert help in digesting the data. The security firms' mission, should they choose to accept it: Infiltrate the activist groups and their leadership, compile dossiers, and help the law firm "truly understand and eliminate emerging threats that could cause harm to their clients," according to a Team Themis document.

The team's members spent much of November working up their proposal. They highlighted how they would funnel their gleanings through Palantir Technologies' military-grade terrorist-tracking software. "We need to blow these guys away with descriptions of our capabilities," wrote Matthew Steckman, an engineer at Palantir, in one of the e-mails in the published documents. "Make them think that we are Bond, Q, and money penny [sic] all packaged up with a bow." Then there was the matter of price. Such private online espionage was hardly common practice, and there was no industry-standard pay scale. Team Themis landed on $2 million. For that sum, the client would get a "daily intelligence summary," "link diagrams," and "target impact analysis," among other services. Hunton & Williams, on behalf of the Chamber, balked at the price, so the security companies agreed to do a pilot on spec. (The law firm has not commented on the matter.) Hunton & Williams clearly saw potential in Team Themis. On Dec. 2, in a message with the subject line "Urgent: Opportunity," a partner at the firm asked the group to come up with a new plan, this time to combat WikiLeaks on behalf of a different prospective client—Bank of America, which believed WikiLeaks was about to publish a cache of its documents. (The Justice Dept., the e-mails suggested, had recommended that Bank of America hire Hunton & Williams.)

Barr took the lead in crafting what would become an infamous 24-slide PowerPoint presentation that called for a cyber-campaign of disinformation against WikiLeaks. The document analyzes WikiLeaks' server infrastructure, talks about planting news stories about the exposure of its confidential informants, and proposes online attacks. Some of the language is comical, like a verbal version of an old Spy Vs. Spy cartoon from Mad magazine: "Speed is crucial!" blares one slide. "The threat demands a comprehensive analysis capability now." A person familiar with the creation of the presentation said it was the result of late-night brainstorming, and that the security firms knew Bank of America would likely reject the most aggressive tactics.

As with the Chamber of Commerce scheme, the WikiLeaks proposal never got a final hearing. While HBGary Federal and the other security firms awaited a formal go-ahead from Hunton & Williams and its clients, Barr decided to deploy his new research techniques on Anonymous.

Anonymous has had a busy winter. The group, which appears to be less a formal organization than a loose coalition of tech-savvy radicals, attacked government websites in Egypt and Tunisia. It launched denial-of-service attacks on Amazon.com (AMZN), PayPal, MasterCard, and Visa (V) after those companies declined to do business with WikiLeaks. Barrett Brown, an unofficial spokesman for the group, says its goal is "a perpetual revolution across the world that goes on until governments are basically overwhelmed and results in a freer system." Barr had come to believe that companies would have to defend themselves against this anarchic sensibility using the same tactics as the mischief makers. He also believed he had the skills and experience to join the battle. His principal weapon was a method he developed to associate the real identities found in social networks such as Facebook and LinkedIn with the anonymous profiles of hackers. So while Hunton & Williams weighed Team Themis's proposals, and with the ultimate fate of HBGary Federal hanging in the balance, Barr figured the time was right to demonstrate how social networks could yield an intelligence bonanza.

Barr began by hanging out in an online forum called Internet Relay Chat (IRC), using a fake identity. At the same time, on social networks, he "friended" people thought to be senior members of the Anonymous collective. Barr then compared the times that suspected hackers logged into IRC chat rooms anonymously and into their own identifiable social networking accounts. The exposed HBGary e-mails would later reveal that Barr's own employees thought he was overreaching and that they feared retribution from the vengeful Anonymous. But Barr plunged ahead. He proposed a talk at the RSA conference in San Francisco titled "Who Needs NSA when we have Social Media?" Then he promoted the talk by suggesting he would expose the identities of the primary members of the group. On Feb. 4, a Friday, Barr bragged to the Financial Times about his upcoming talk and claimed he had obtained the identities of the group's de facto leaders. Bad idea. As Stephen Colbert summed it up, lampooning the HBGary affair on his TV show, "Anonymous is a hornet's nest. And Barr said, 'I'm gonna stick my penis in that thing.' "
When hackers taunt, they often use the term "pwned"—as in, "I so pwned you, newbie." No one seems to agree where the word came from. Google it, and you'll find claims that it's a corruption of "owned," or that it's from a computer game, or maybe it's just a shortened form of the chess term "pawned." Whatever its origins, the term connotes humiliating domination by another person or group. That's roughly what happened next to Barr, Hoglund, and HBGary. Responding to Barr's public claims, the Anonymous hackers exploited a vulnerability in the software that ran HBGary Federal's website, obtained an encrypted list of the company's user names and passwords, and decoded them. Barr and some of his colleagues, Anonymous then discovered, had committed computer security's biggest sin: They used the same password on multiple accounts. The hackers commandeered Barr's Twitter and LinkedIn accounts, lacing both with obscenities. One of the passwords also opened the company's corporate Google account. Jackpot. In less than 48 hours after Barr's Financial Times interview appeared, the hackers had the keys to the kingdom. They immediately started downloading HBGary's e-mails. All told, Anonymous got hold of 60,000-plus—about 4.7 gigabytes worth, including attachments—and quickly put them all online in conveniently searchable form. The material details online security holes at HBGary clients and prospects such as Sony, Johnson & Johnson (JNJ), Disney, ConocoPhillips (COP), and dozens of others. The e-mails showed that DuPont (DD) was breached in 2009 (by the same hackers who hit Google) and again in late 2010. DuPont employees on a business trip to China even found that their laptops had been implanted with spyware while the hardware was supposedly locked inside a hotel safe.
In the ensuing days, Barr and Leavy, HBGary's president, took to IRC channels to plead with Anonymous for mercy. None was forthcoming. Members of the group and their supporters gleefully defaced and posted photos of Barr, published personal details about his family, tweeted his Social Security number, and generally gloated about pwning a professional adversary. They said the "ninja team" that hacked HBGary included a 16-year-old girl named Kayla. (Rumors online suggest that "Kayla" is actually a 26-year-old man living in New Jersey. Who's right? Not even Anonymous may know.) "We have no choice but to defend ourselves and defend WikiLeaks by these means," says Brown, the unofficial Anonymous spokesman. "This has just begun. We're absolutely at war now."

Meanwhile, the other members of Team Themis deny they wanted to push the operations as far as Barr did—despite the volumes of incriminating e-mails. Palantir Technologies CEO Alex Karp blames HBGary for conceiving the plot, decries any attempt to develop "offensive cyber capabilities," and has placed on leave Steckman, the engineer who coordinated with Team Themis. Palantir also issued a public apology to Glenn Greenwald, a Salon.com journalist who was singled out in a Themis proposal as a WikiLeaks defender and thus a possible target. In a statement, Berico Technologies says it "does not condone or support any effort that proactively targets American firms, organizations, or individuals." At the same time, it cut ties with HBGary. The U.S. Chamber of Commerce said in a press release that it's "incredulous that anyone would attempt to associate such activities with the Chamber," adding that it had not seen the incendiary proposals before they were made public. Morgan Stanley dropped HBGary as a security contractor. Barr never delivered his speech and when he tendered his resignation three weeks after the Anonymous attack, he said he was confident HBGary would be able to "weather this storm." As for Hoglund, even his friends in the security industry wonder how long HBGary can survive amid the onslaught of negative publicity. But the CEO claims his company has undergone a rigorous security review and is back on track. He says the hackers "made a hole-in-one from 200 yards away" and that it will never happen again. "They are nowhere near as sophisticated and scary and large as they would like people to think they are," he says.

And while the lesson of the HBGary saga may be that it's not always easy to tell the black hats from the white hats in the ambiguous game of computer security, Hoglund has no doubt which is which. "It will get worse," he says. "This whole event has only emboldened them. I hope this isn't the way the Internet has to be. Right now it's a domain of lawlessness. This is bigger than HBGary, than my company. Right now, the pendulum has swung way over to the bad guys' side

Sourse Bloomberg

Wednesday, March 9, 2011

Julian Assange and ‘cypherpunk’ connection



source- robert manne

The world's best-known 'cypherpunk' has long been on a mission to stop governments watching our every move. It is said to be the key to understanding WikiLeaks. Although there are tens of thousands of articles on Julian Assange in the world's newspapers and magazines, no mainstream journalist so far has grasped the critical significance of the cypherpunks movement to Assange's intellectual development and the origin of WikiLeaks. The cypherpunks emerged from a meeting of minds in late 1992 in the Bay Area of San Francisco. Its founders were Eric Hughes, a brilliant Berkeley mathematician; Timothy C. May, an already wealthy former chief scientist at Intel who had retired at the age of 34; and John Gilmore, another already retired and wealthy computer scientist - once number five at Sun Microsystems - who had co-founded an organisation to advance the cause of cyberspace freedom, the Electronic Frontier Foundation. They created a small group, which met monthly in Gilmore's office.

At one of the early meetings of the group, an editor at Mondo 2000, Jude Milhon, jokingly called them cypherpunks, a play on cyberpunk, the "high-tech, low-life" science-fiction genre. The name stuck. It soon referred to a vibrant emailing list, created shortly after the first meeting. At the core of the cypherpunk philosophy was the belief that the great question of politics in the age of the internet was whether the state would strangle individual freedom and privacy through its capacity for electronic surveillance or whether autonomous individuals would eventually undermine and even destroy the state through their deployment of electronic weapons newly at hand. Many cypherpunks were optimistic that the individual would ultimately triumph. Their optimism was based on developments in intellectual history and computer software: the invention in the mid-1970s of public-key cryptography by Whitfield Diffie and Martin Hellman, and the creation by Phil Zimmerman in the early 1990s of a program known as PGP, "Pretty Good Privacy". PGP democratised their invention and provided individuals, free of cost, access to public-key cryptography - and thus the capacity to communicate with others in near-perfect privacy. At the time the cypherpunks formed, the US Government strongly opposed the free circulation of public-key cryptography. It feared making it available would strengthen the hands of the espionage agencies of America's enemies abroad and of terrorists, organised criminals, drug dealers and pornographers at home.

One of the key projects of the cypherpunks was "remailers", software that made it impossible for governments to trace the passage from sender to receiver. Another key project was "digital cash", a means of disguising financial transactions. Almost all cypherpunks were anarchists who regarded the state as the enemy. Most but not all were anarchists of the right, or in US parlance, libertarians, who supported laissez-faire capitalism. The most authoritative political voice among the majority libertarian cypherpunks was Tim May, who, in 1994, composed a vast, truly remarkable document, Cyphernomicon. May thought the state to be the source of evil in history. Assange joined the cypherpunks email list in late 1995. There were many reasons he was likely to be attracted to them. Even before his arrest (for alleged hacking) he had feared the intrusion into his life of the totalitarian surveillance state. Assange believed that he had been wrongly convicted of what he called a "victimless crime". The struggle against victimless crimes - the right to consume pornography, to communicate in cyberspace anonymously, to distribute cryptographic software freely - was at the centre of the cypherpunks' political agenda. Moreover the atmosphere of the list was freewheeling - racism, sexism, homophobia were common.
Cypherpunks saw themselves as Silicon Valley Masters of the Universe. It must have been more than a little gratifying for a self-educated antipodean computer hacker, who had not even completed high school, to converse on equal terms with professors of mathematics, whiz-kid businessmen and some of the leading computer code-writers in the world. Assange contributed to the cypherpunks list from December 1995 until June 2002. Almost all his interventions have been placed on the internet. On the basis of what historians call primary evidence, the mind and character of Assange can be seen at the time of his obscurity. The first thing that becomes clear is the brashness. Over a technical dispute, he writes: "Boy are you a dummy." When someone asks for assistance in compiling a public list of hackers with handles, names, email addresses, Assange responds: "Are you on this list of morons?"

In a dispute over religion and intolerance, one cypherpunk had written: "Because those being hatefully intolerant have the 'right' beliefs as to what the Bible says. Am I a racist if I don't also include an example from the Koran?" "No, just an illiterate," Assange replied.

If one thing is clear from the cypherpunks list, it is that the young Assange did not suffer those he regarded as fools gladly. Some posts reflect his faith in the theory of evolution. Assange forwarded an article about the role played by the CIA in supplying crack gangs in Los Angeles. A cypherpunk responded: "I wish they'd get back to the business, but add an overt poison to the product. Clean out the shit from the cities. Long live Darwinism." "Darwinism is working as well as it ever was. You may not like it but shit is being selected for," Assange shot back. Other posts reflect his recent life experiences. Assange had helped Victoria police break a paedophile ring in 1993. On the cypherpunks list, he defended the circulation of child pornography on the internet on the grounds that it would cut the need for new production and make it easier for police to capture paedophiles. In another post, he expressed deep anger at perceived injustice regarding those with whom he identifies - convicted hackers.
One, Tsutomu Shimamura, had not only played a role in the hunting down of a notorious American fellow-hacker, Kevin Mitnick, but had even co-authored a book about it, Takedown. "This makes me ill. Tsutomu, when Mitnick cracks, will you dig up his grave and rent his hands out as ashtrays?"
Assange also posted on the reports of violence against another hacker, Ed Cummings, also known as Bernie S, imprisoned in the US. "I was shocked. I've had some dealings with the SS ... Those that abuse their power and inflict grave violence on others must be held accountable and their crimes deplored and punished in the strongest manner. Failure to do so merely creates an environment where such behaviour becomes predominant."

Where did Assange stand with regard to the radical cypherpunks agenda of Tim May? Assange was, if anything, even more absolute and extreme. In September 1996, Esther Dyson, the chair of the lobby group for freedom in cyberspace, the Electronic Frontier Foundation, was quoted in the Los Angeles Times as being in favour of certain extremely limited restrictions on internet anonymity. On the cypherpunks list, a furious controversy, called "the Esther Dyson Fuss", broke out. Some cypherpunks defended Dyson, saying she had every right to argue a more nuanced position and it was healthy for individuals to speak their mind.
Assange went further. "Examining in detail Dyson's interests, it appears she maintains a sizeable and longstanding interest in East European technology companies. She is also very far to the right of the political spectrum (rampant capitalist would be putting it mildly). She also speaks Russian. "I'm not saying she's been working for the CIA for the past decade, but I would be very surprised if the CIA has not exerted quite significant pressure ... in order to bring her into their folds." "At least you don't accuse me of being a communist," Dyson responded. "I am not a tool of the CIA nor have they pressured me, but there's no reason for you to believe me." When Assange was in trouble last year, she wrote a piece on the Salon website arguing that even unpleasant characters need to be defended. From beginning to end Assange was, in short, a hardline member of the tendency among the cypherpunks that Tim May called the "rejectionists" - an enemy of those who displayed even the slightest tendency to compromise on the question of Big Brother and the surveillance state. On another question, however, Assange was at the opposite end of the cypherpunks spectrum from May. At no stage did Assange show sympathy for the anarcho-capitalism of the cypherpunks mainstream. In October 1996, a prominent cypherpunk, Duncan Frissell, claimed that in the previous fiscal year the US Government had seized more tax than any Government in history. Assange pointed out that, as the US was the world's largest economy and that its GDP had grown in the previous year, this was a ridiculous statement and deceptive.
In October 2001, Declan McCullagh expressed "surprise" when a "critique of laissez-faire capitalism" appeared on the cypherpunks list "of all places". Assange replied: "Declan, Declan. Put away your straw man ... Nobel economic laureates have been telling us for years to be careful about idealised market models This years [sic] Nobel for Economics won by George A. Akerlof, A. Michael Spence and Joseph E.Stiglitz 'for their analysis of markets with assymmetric [sic] information' is typical. "You don't need a Nobel to realise that the relationship between a large employer and employee is brutally assymmetric [sic] ... To counter this sort of assymetery. [sic] Employees naturally start trying to collectivise to increase their information processing and bargaining power. That's right. UNIONS Declan."
Assange was, then, an absolutist crypto-anarchist but one who leaned decidedly to the left. There is also evidence he was increasingly repelled by the corrosive cynicism common in cypherpunks ranks. From 1997 to 2002 Assange accompanied all his cypherpunks postings with this beautiful passage from Antoine de Saint-Exupery.

"If you want to build a ship, don't drum up people together to collect wood and don't assign them tasks and work, but rather teach them to long for the endless immensity of the sea." Another time, a cypherpunk suggested that in the great struggle for privacy and against censorship ordinary people could not give a damn. In what was one of his final cypherpunks postings, Assange responded: "The 95 per cent of the population which comprise the flock have never been my target and neither should they be yours; it's the 2.5 per cent at either end of the normal that I find in my sights, one to be cherished and the other to be destroyed."
Increasingly, Assange began to mock Tim May.

Many thought of May as an antisemite, with good reason. In November 2001, when May used a quote from a cypherpunk fellow traveller, David Friedman, Assange emailed: "Quoting Jews again, Tim?"

Assange was a regular contributor to the cypherpunks mailing list, particularly before its decline in late 1997 after a meltdown over the question of the possible moderation of the list - censorship! and the departure of John Gilmore. The cypherpunks list clearly mattered to him deeply. Shortly before his travels in 1998, Assange asked whether anyone could send him a complete archive of the list between 1992 and the present. While commentators have failed to see the significance of the cypherpunks in shaping the thought of Assange, this is something insiders to the movement understand. When Jeanne Whalen from the Wall Street Journal approached John Young, of Cryptome, in August last year, he advised her to read the Assange cypherpunk postings he had just placed on the internet, and also Tim May's Cyphernomicon. "This background has not been explored in the WikiLeaks saga. And WikiLeaks cannot be understood without it." Likewise, in his mordant online article on WikiLeaks and Assange, the influential cyberpunk novelist and author of The Hacker Crackdown, Bruce Sterling wrote: "At last - at long last - the homemade nitroglycerin in the old cypherpunks blast shack has gone off."

Fewer than 20 years ago Julian Assange was sleeping rough. Even a year ago hardly anyone knew his name. Today he is one of the best-known and most-respected human beings on earth. Assange was the overwhelming winner of the popular vote for Time magazine’s “Person of the Year” and Le Monde’s less politically correct “Man of the Year”. If Rupert Murdoch, who turns 80 this month, is the most influential Australian of the postwar era, Julian Assange, who will soon turn 40, is undoubtedly the most consequential Australian of the present time. julian asange,Murdoch’s importance rests in his responsibility for injecting, through Fox News, the poison of rabid populist conservatism into the political culture of the United States; Assange’s in the revolutionary threat his idea of publishing damaging documentary information sent by anonymous insiders to WikiLeaks poses to governments and corporations across the globe.

Sunday, February 20, 2011

your laptop or smartphone at Wi-Fi hot spots for Hackers


You may think the only people capable of snooping on your Internet activity are government intelligence agents or possibly a talented teenage hacker holed up in his parents’ basement. But some simple software lets just about anyone sitting next to you at your local coffee shop watch you browse the Web and even assume your identity online. “Like it or not, we are now living in a cyberpunk novel,” said Darren Kitchen, a systems administrator for an aerospace company in Richmond, Calif., and the host of Hak5, a video podcast about computer hacking and security. “When people find out how trivial and easy it is to see and even modify what you do online, they are shocked.”
Until recently, only determined and knowledgeable hackers with fancy tools and lots of time on their hands could spy while you used your laptop or smartphone at Wi-Fi hot spots. But a free program called Firesheep, released in October, has made it simple to see what other users of an unsecured Wi-Fi network are doing and then log on as them at the sites they visited.
Without issuing any warnings of the possible threat, website administrators have since been scrambling to provide added protections. “I released Firesheep to show that a core and widespread issue in website security is being ignored,” said Eric Butler, a freelance software developer in Seattle who created the program. “It points out the lack of end-to-end encryption.” What he means is that while the password you initially enter on websites like Facebook, Twitter, Flickr, Amazon, eBay and The New York Times is encrypted, the Web browser’s cookie, a bit of code that that identifies your computer, your settings on the site or other private information, is often not encrypted. Firesheep grabs that cookie, allowing nosy or malicious users to, in essence, be you on the site and have full access to your account. More than a million people have downloaded the program in the last three months. And it is easy to use. The only sites that are safe from snoopers are those that employ the cryptographic protocol transport layer security or its predecessor, secure sockets layer, throughout your session. PayPal and many banks do this, but a startling number of sites that people trust to safeguard their privacy do not. You know you are shielded from prying eyes if a little lock appears in the corner of your browser or the Web address starts with “https” rather than “http.”
“The usual reason websites give for not encrypting all communication is that it will slow down the site and would be a huge engineering expense,” said Chris Palmer, technology director at the Electronic Frontier Foundation, an electronic rights advocacy group based in San Francisco. “Yes, there are operational hurdles, but they are solvable.”
Indeed, Gmail made end-to-end encryption its default mode in January 2010. Facebook began to offer the same protection as an opt-in security feature last month, though it is so far available only to a small percentage of users and has limitations. “It’s worth noting that Facebook took this step, but it’s too early to congratulate them,” said Butler, who is frustrated that “https” is not the site’s default setting. “Most people aren’t going to know about it or won’t think it’s important or won’t want to use it when they find out that it disables major applications.” Joe Sullivan, chief security officer at Facebook, said the company was engaged in a “deliberative rollout process,” to access and address any unforeseen difficulties. “We hope to have it available for all users in the next several weeks,” he said, adding that the company was also working to address problems with third-party applications and to make “https” the default setting. Many websites offer some support for encryption via “https,” but they make it difficult to use. To address these problems, the Electronic Frontier Foundation in collaboration with the Tor Project, another group concerned with Internet privacy, released in June an add-on to the browser Firefox, called Https Everywhere. The extension, which can be downloaded at eff.org/https-everywhere, makes “https” the stubbornly unchangeable default on all sites that support it. Since not all websites have “https” capability, Bill Pennington, chief strategy officer with the web site risk management firm WhiteHat Security in Santa Clara, Calif., said: “I tell people that if you’re doing things with sensitive data, don’t do it at a Wi-Fi hot spot. Do it at home.” But home wireless networks may not be all that safe either, because of free and widely available Wi-Fi cracking programs like Gerix WiFi Cracker, Aircrack-ng and Wifite. The programs work by faking legitimate user activity to collect a series of so-called weak keys or clues to the password. The process is wholly automated, said Kitchen at Hak5, allowing even techno-ignoramuses to recover a wireless router’s password in a matter of seconds. “I’ve yet to find a WEP-protected network not susceptible to this kind of attack,” Kitchen said. A WEP-encrypted password (for wired equivalent privacy) is not as strong as a WPA (or Wi-Fi protected access) password, so it’s best to use a WPA password instead. Even so, hackers can use the same free software programs to get on WPA password-protected networks as well. It just takes much longer (think weeks) and more computer expertise.

Using such programs along with high-powered Wi-Fi antennas, hackers can pull in signals from home networks two to three miles away. There are also some computerised cracking devices with built-in antennas on the market, like WifiRobin ($156). But experts said they were not as fast or effective as the latest free cracking programs, because the devices worked only on WEP-protected networks. To protect yourself, changing the Service Set Identifier or SSID of your wireless network from the default name of your router to something less predictable helps, as does choosing a lengthy and complicated alphanumeric password. Setting up a virtual private network, or VPN, which encrypts all communications you transmit wirelessly whether on your home network or at a hot spot, is even more secure. The data looks like gibberish to a snooper as it travels from your computer to a secure server before it is blasted onto the Internet. Popular VPN providers include VyperVPN, HotSpotVPN and LogMeIn Hamachi. Some are free; others are as much as $18 a month. However, Palmer at the Electronic Frontier Foundation blames poorly designed websites, not vulnerable Wi-Fi connections, for security lapses. “Many popular sites were not designed for security from the beginning, and now we are suffering the consequences,” he said.

Saturday, February 19, 2011

Anti-sec - group of hackers to keep security

Anti-sec is the group of underground hackers; and they are here with the cause. They say big no to promoting Hacking related open materials and making it a child’s play. This is probably the revulsion to combat evil trends in cyber arena and control over this deservedly elite occupation which has been encroached by larger commercial groups such as virus creators, antivirus producers, that the movement is more a rebellion against that. This group came in lime light after hacking “imageShack’ one of the most popular image hosting service in the cyber world. Anti-Sec Movement, staunchly dedicated to the eradication of “full disclosure” hacked this world’s largest image hosting site, played around with their own ideas and they replaced the images uploaded by users with that of their own, which is supposedly the image of the manifesto of ‘their movement’. The entire visual display was rounded off with the message “no images were harmed in the making of this.. Image.”

Anyways nobody could deny their abilities after the attack of milw0rm. Anti-secs want to keep security - in particular, exploits - private. In way they are right because inj3ct0rs were getting bad name because of open display of exploits. There are evidences that the exploits were used by antinationalist for elicit purpose. Milw0rm is their nemesis. There's a discernible political bent to their writings and ratings. While we see a general shift on the internet towards the idea that "information just wants to be free", the anti-sec people don't agree with this when it comes to matters of security. From a white-hat point of view, they're saying that full disclosure actually causes more damage than if only a select few, capable, and not necessarily malevolent, people were to know about any particular exploit. So far it’s not clear that there's a tad of immaturity and insecurity in these people or they really want to work in the interest of cyber security, and one should appreciate that. The common claim of the Movement is that “full disclosure is the disclosure of exploits publicly - anywhere.” the security industry for making profit due to “full-disclosure” with “scare tactics” that were intended to make the public purchase anti-virus software and firewalls. Well, with their daring “heist”, the members surely have managed to across loud and clear the gist of their intention.

In other terms you can say this movement is kind of fight or crusade against the traditional for-profit computer security industry. They think that publicizing security holes and those hole's exploits causes more pain than it helps. They also seem to be kind of anti-capitalist and are very talented security researchers. Antisec are the kind of amazing group of hackers who don't want profit from fear. Generally Hackers are known for creating deterrence, fear and penetrations. Here is this group to sabotage such intentions of Dark side of cyber world. There are so many myths and misconceptions about them but the fact is that they at least have credibility. These guys are sticking to their guns and keeping the hacking underground just that, underground. Anti-sec is a response to the fear-mongering era of 1998 - 2004 when every hanger-on wannabe computer guy became a security researcher and started publishing "advisories". Between dotcom bubble eras to 9/11, everybody was a security guy, and not only that, but the "security guy" was pointing the finger at the hacker community every time a script kiddie defaced some web page. Those most sec guys are snake-oil salesmen and absolutely deserve no sympathy. If they're gonna bad-mouth hackers and promise protection to everyone then let them protect themselves from the real Hackers; by and large, they're out-gunned and out-skilled.

There are many so called security ( tech or defense agencies) minting money over suing the tag of Hacker, they have made it business, every year thousand of hackers are (youngsters) manufactured in their so called industry but still nation lacks hundreds of security personals towards national security. This is irony and here is need of someone to stop these ‘manufacturers of hackers’, I think hackers like Anti sec are the proper takers on these morons. Anti-sec doesn't go after civilians, by the way. The another biggest threat today is there are hundreds of exploit writers around the globe, One group publishes exploits and carries out mayhem for fun so make such high profile hacks were attempted just because of open display of these exploits. It doesn't matter what they are or what they do and why they do the most important thing is they are here with the Cause, and that is nothing but the security at large.
The Anti Security Movement or popularly written as Anti-sec is a popular movement opposed to the computer security industry. It attempts to censor the publication of information relating to but not limited to: software vulnerabilities, exploits, exploitation techniques, hacking tools, attacking public outlets and distribution points of that information. Movement followers have cited websites such as Security Focus, Security team, Packet Storm Security, and milw0rm to be targets of their cause, as well as mailing lists like "full-disclosure", "vuln-dev", "vendor-sec" and bugtraq, as well as public forums and IRC channels. The start of most public attacks in the name of the anti-security movement started in around 1999 and 2000. The "anti-security movement" as it is understood today was coined by the following document which was initially an index on the anti.security.is website. The purpose of this movement is to encourage a new policy of anti-disclosure among the computer and network security communities. The goal is not to ultimately discourage the publication of all security-related news and developments, but rather, to stop the disclosure of all unknown or non-public exploits and vulnerabilities. In essence, this would put a stop to the publication of all private materials that could allow script kiddies from compromising systems via unknown methods.

A common misconception is that if groups or individuals keep exploits and security secrets to themselves, they will become the dominators of the "illegal scene", as countless insecure systems will be solely at their mercy. This is far from the truth. Forums for information trade, such as Bugtraq, Packetstorm, www.hack.co.za, and vuln-dev have done much more to harm the underground and net than they have done to help them. This was one of the first anti-security hacktivist groups. The group waged war on the security industry with their popular assault known asAnti-Sec. In a nutshell, this group doesn't like websites that promote security. If a website provides different methods for safety then Anti-Sec wants to blank their site. They want to take away the ability of organizations to sell their services.

No one knows about this group so far, they don’t have any sort of forum or website or any traces where the members can be located, and if someone clames about knowing them, then It can subject to doubt. The kinds of hacks they have performed and beguile they blown against bigwigs are not in a mood to spare them, maintaining anonymity is compulsion for them. Still it’s very much interesting and leaves the reason to think about their agenda and activities. Bravo guys..

Read in details ,soon to be published “Cat Techie”………………….

Friday, February 18, 2011

Anonymous -internet-based super consciousness

In the recent past this group of hackers have done marvelous job, and the way they displayed their protest against all sort of atrocities was worth appreciating. I wish even Indian hackers have this much of unity and determination amongst them. Earlier it was a myth a social worker, or leader or some patriot can bring revolution and change the entire system, can get freedom for the country or protect against injustice. But these warriors have refuted all those claims by setting new trends in internet world.

The name Anonymous itself is inspired by the perceived anonymity under which users post images and comments on the Internet. Usage of the term Anonymous in the sense of a shared identity began on image boards. A tag of Anonymous is assigned to visitors who leave comments without identifying the originator of the posted content. As the popularity of imageboards increased, the idea of Anonymous as a collective of unnamed individuals became an internet meme.. The secretive organisation is being investigated in several countries over strikes on Visa, PayPal and others. The group retaliated overnight by breaking into the company's website and hijacking his Twitter account. Anonymous, known for being a loosely-knit group, has been involved in a number of high profile online protests and attacks in recent months. In December, the group launched a campaign in support of Wikileaks that disrupted services at MasterCard, Visa and other companies that had withdrawn support the whistle-blowing website. The strike led to police investigations around the world, and a number of arrests in Britain and the Netherlands. Whatever, but no one could stop them doing whatever they are determined to do. I feel proud of these hackers because they have that strength to change wrong equations of so called supreme power by gaining control of all the company's e-mail, erased its files, taken down their phone systems and placed copies of many internal documents online.

Anonymous, which started as an offshoot of the notorious 4Chan internet messageboard, has been linked to a number of virtual and real-world protests over recent years. As well as the Wikileaks attacks, it also orchestrated strikes on government services in Tunisia and Egypt in support of popular protests in those countries. It has also launched vociferous protests for the right to uncensored access to pornography online and taken action against an anti-piracy firm hired by Bollywood studios. It is involved in a long-running battle with the Church of Scientology, amid claims that the religious group stifles dissent. The group has previously claimed it has no real leadership, although some individuals have come forward from time to time to explain their motives.

Somewhere in December there was an interview on BBC of someone known as Coldblood, he said in that interview that "thousands" of people had joined the protests to support Wikileaks' right to publish the US government's classified diplomatic cables. "We are trying to keep the internet open and free but in recent years governments have been trying to limit the freedom we have on the internet," he said at the time. Coldblood confirmed that he was among five people arrested across the UK last month as part of the police investigation into the Wikileaks protests. Anonymous broadly represents the concept of any and all people as an unnamed collective. Definitions tend to emphasize the fact that the term cannot be readily encompassed by a simple definition, and instead it is often defined by aphorisms describing perceived qualities.Hackers from Anonymous, best-known for attacks on Scientology and Wikileaks detractors, Operation Payback" attacks against Mastercard and Visa in December; brought the name to Anonymous as an organized crime syndicate.

Anonymous are utterly democratic mass of untraceable Internet users who come and go as they please. And this group has thousands of members and big fan fallowing across the globe. . As an Internet meme it represents the concept of many on-line community users, or the on-line community itself, acting anonymously in a coordinated manner, usually toward a goal. They are also labeled as hacktivists who undertake protests and other actions under the notional title "Anonymous," which derives from the same meme. It is generally considered to be a blanket term for members of certain Internet subcultures.
Although not necessarily tied to a single on-line entity, many websites are strongly associated with Anonymous. This includes notable imageboards such as 4chan and Futaba, their associated wikis, Encyclopædia Dramatica, and a number of forums. Anonymous broadly represents the concept of any and all people as an unnamed collective. Definitions tend to emphasize the fact that the term cannot be readily encompassed by a simple definition, and instead it is often defined by aphorisms describing perceived qualities. Anonymous is the first internet-based super consciousness.

When it comes to big statements then this group is termed as a group of "hacktivists" who crippled websites in revenge for cutting off services to whistle-blowing website WikiLeaks are warned they will continue their "digital sit-in" in a campaign for total internet freedom. But this is a group of individuals who get together to decide they want to do something. One of the main goals of Anonymous is keep the internet free and open for everyone to use and not to censor data or anything that goes through the internet. It probably has angered some of the public but that it's a necessary evil.

At last I can get only one thing they are none other than a computer hacker, a tech savvy personas. Anonymous is made up from people everywhere. They have got people from all walks of life who are participating in it. But that does not mean it's going to turn into an all out cyber war. It's maybe one battle in a very, very long uphill struggle. Anonymous works on a day by day basis. People throw idea out there, and they like it enough and it sticks, the idea becomes reality.

Long live Anonymous