Showing posts with label injectors. Show all posts
Showing posts with label injectors. Show all posts

Saturday, April 16, 2011

The SAGa of server hack


The hacker mindset itself is great victory and debacle for their growth. When my server got hacked, there were many hackers settling the scores with their rivals and some of them were sighting the reasons for hack, many of them felt bad and few of them thought I got it hacked for publicity. Anyways whom to give credit or whom to hold responsible for this hack is still a big question.

Look guys you all have always blamed CAT for every good bad ugly reason, but have you ever thought the guys amongst you are digging your graves and providing your info to us. I have not taken any legal action because I trust your potential of hacking. More over no hacker can eliminate anyone’s online existence. This is just a myth. With the blessings of Google, there are hundred pages dedicated to me, there are thousands of pages talks about me. There are hundreds of youtube clips, shows about me. Whom are you going to stop? And whom you will hack? What if I create beautiful blogs of my publications and create social network profile and do our publicity? Will you be able to stop me?

NOP ….No one can eliminate or finish someone’s online existence ever.. The reason everything has limit to it.. And if suppose to reach all these places Hackers make special efforts and try doing what they want to do..I think I am the most important target and I can scare them..lolz! guys be focused on your carrier, there are better things to do, utilized your skills and talent to display in better fashion, that may benefit you with better future..Hacking cat :P no gains..I am sorry to say this..but you are making me feel very very great and important..now let me come to main topic

A Smart guy pm us saying “ It’s sad to hear about Cat Techie server getting root -> http://www.zone-h.net/archive/notifier=cattechie_hacked, The guys who did it approached me and said, even u r against r45c4l, time to fuck them... I thought they were kidding but, it actually happened... they are from inj3ct0r and 1 of them managed to steal openSSH 0-day which was written by anti-sec (romeo)... guys are from USA... (Indians in USA).... all I know is, they are pissed on Gaurav for 1 reason (calling ICW a group of skiddies)... and glorifying himself... as it was in one of the mails of him to inj3ct0r where he requested for r45c4l at inj3ct0r email... and they hate r45c4l for one more reason -> teaming up with cat-techie...!!! today morning I got an email saying 'congrats' but, I am not impressed in fact, I felt bad coz once upon a time... I used call r45c4l, my bro...I am trying to mitigate the dispute whether cat and ras knows it or not... coz I know these guys and they are powerful... with reach everywhere.... I mean, everywhere...I am trying to find a patch for that 0-day or will make it and once I have it, i will mail it to u.... and trust me, openssh 0-day is INEVITABLE! 99.99% of the servers are vulnerable to it...!!! Someday try to research on milw0rm and threat to milw0rm by anti-sec coz of openssh 0-day it’s a MasterCard which has to be broken somehow! For time being ask both of them to be quite because these guys i know are at their HIGH!!!! Let time go by and yes... u can share this with cat but not with rascal...

Before the real fun for the hacker begins, three essential steps must be performed. ... If you know yourself but not the enemy, for every victory gained you..People on stages are called actors. All they are required to do is look plausible, stay sober, and say the lines they're given in the right order. Wisdom of Hackers is a untrustworthy force in today's world. A finding shows that a small group of people accounted for a large number of ratings. In other words, as many have already begun to suspect, small but powerful groups can easily distort what the "Hackers" really thinks, leading groups to often end up appearing extremely positive or extremely negative. The so-called "wisdom of the Hackers" has been called into question. The term, which implies that a diverse collection of individuals makes more accurate decisions and predications than individuals or even experts, in Predictive cyber world, it’s not all gamblers who participate, or all people who follow them, and neither are its participants widely distributed throughout the country, and its mostly black males.

At his second hint

I really ‘smiled’ …he again PM me saying “Hmmm... I am not anti-sec guy :) U wanna know who did it? Promise me, you won’t harm him. Also, I will secure your server... server is not ur bread and butter but defame will affect the growth... if u must know.... the people who did it, I call myself their 'daddy'... I know the toy they are playing with and I can the shield that will work.... someday if u need me.... smXXX XXXXX will be at ur service :-) he is not brother :) and remember, in this nasty underground...trust no one, own everyone. for godsake!!! dont call anyone brother... I dont remmeber all of them but, he told many... u have a pic in which u say, save hackers join cat army... he dislikes denaming any group... may it be anything.... and..... rascal is one of the reason, they dont really like him.... his handle is nullzer0 and is usually found in freenode irc and smashthestack irc.... real name : Roshan L****NI, location : Mumbai :) age : 28 years old groups : inj3ct0r and hackforums education : Diploma 2nd year mech (drop out) current job : working in mall (…………..)... luck with girls : as his handle null and 0 .

so it was not made by u? that pic? actually i ahvent seen that pic so cant comment but, trust me... hackers dont like gettined 'owned' by anyone. do no harm to him even if u find him, i know this has gone legal... sorry am not saying it :) rest assured, I can arrange a meeting and u can discuss further ..... try to think 'creative' which u will.... this guy is a charm! however, no matter how much he might like u (which am sure he will) he wont give out his toy... we know each other since 4 years... yet he denied that scripot... it was a server hack not web hack and trust me, u will waste time in forensic... it has privoxy auto enabled... that’s all am giving :) he is blessed guy... but, this is not the end vaidehi... he is not 'enough'... he will pounce back.... and he is getting script to reach subnets.... coz i remember he once said.... that ur bread and butter is press and ur press uses computers... i discouraged him , he may not do anything but, am not sure... i honestly feel, u must talk to him on irc.... tomm 8pm indian time... "u must talk to him on irc.... " - i said (learn to befriend the robbers :)

Third story

Last night I called u my friend so remember, NEVER EVER even doubt that I will do wrong to you... There is one guy who hates r45c4l and he is in London , living in 'South Harrow'... and he leet than you could imagine! Not on facebook or any social n/w sites, not on full disclosure sites... For more info, ask r45c4l about 'Jeed'... and he will tell u... rest assured, never even doubt that I would do anything 'unacceptable'.... :-) and if again some damage happens.... dont come to me saying i did it... am saying in advance, am not coming in ur way.... u dont come in my way ..Happy? :)

These are the three different stories given by him. let me speak my mind, yes I gathered about many hackers, it’s not only one hacker in particular, that time I was just a journalist and researcher. My focus was to get in unknown world and find answers to all hidden crust. My question here is why you all blame me? Why not those people who mortgaged their own communities pride in my hand? It was just impossible task to reach any hackers personal life unless and until a journalist have resource with in that community. It’s your community to be blamed not me.

Anyways Slowly slowly I became one of you. Whatever reservations a common man and authorities had about hackers, I tired becoming voice and represented everywhere in my own capacity. It’s not you but I have never exposed any hacker or his personal life to anyone. I am rich by pocket; but I am really rich by people and friends. My profiles have more than 5000 friends, my public page has another 3000 likes, and all my groups have thousands of members. I have an organization, where 90% of staff are from middleclass background, we all alike people has set this firm and came up with flying colors and set a trend in Media market. We all are between the age group of 19 to 30.

I never thought bloody this CAT would be really subject of discussions, and will overnight gain name (Good, bad and ugly) and fame and all of sudden become famous. It my confession, I feel honored because; many young web developers, designers, hackers and writers are empowered by my organization. I have never harmed anyone, and known for my integrity. That is what I have been doing and so far I have never crossed my limits. Let the hackers make my server a sports ground, about this I am openly going to challenge some people on 1st may 2nd anniversary, I don’t play hide and seek. And don’t approve the same. Control your fellow beings, they are mortgaging you.
I wish you all the success and bright future. Anytime you need me I am there by you

Saturday, February 19, 2011

Anti-sec - group of hackers to keep security

Anti-sec is the group of underground hackers; and they are here with the cause. They say big no to promoting Hacking related open materials and making it a child’s play. This is probably the revulsion to combat evil trends in cyber arena and control over this deservedly elite occupation which has been encroached by larger commercial groups such as virus creators, antivirus producers, that the movement is more a rebellion against that. This group came in lime light after hacking “imageShack’ one of the most popular image hosting service in the cyber world. Anti-Sec Movement, staunchly dedicated to the eradication of “full disclosure” hacked this world’s largest image hosting site, played around with their own ideas and they replaced the images uploaded by users with that of their own, which is supposedly the image of the manifesto of ‘their movement’. The entire visual display was rounded off with the message “no images were harmed in the making of this.. Image.”

Anyways nobody could deny their abilities after the attack of milw0rm. Anti-secs want to keep security - in particular, exploits - private. In way they are right because inj3ct0rs were getting bad name because of open display of exploits. There are evidences that the exploits were used by antinationalist for elicit purpose. Milw0rm is their nemesis. There's a discernible political bent to their writings and ratings. While we see a general shift on the internet towards the idea that "information just wants to be free", the anti-sec people don't agree with this when it comes to matters of security. From a white-hat point of view, they're saying that full disclosure actually causes more damage than if only a select few, capable, and not necessarily malevolent, people were to know about any particular exploit. So far it’s not clear that there's a tad of immaturity and insecurity in these people or they really want to work in the interest of cyber security, and one should appreciate that. The common claim of the Movement is that “full disclosure is the disclosure of exploits publicly - anywhere.” the security industry for making profit due to “full-disclosure” with “scare tactics” that were intended to make the public purchase anti-virus software and firewalls. Well, with their daring “heist”, the members surely have managed to across loud and clear the gist of their intention.

In other terms you can say this movement is kind of fight or crusade against the traditional for-profit computer security industry. They think that publicizing security holes and those hole's exploits causes more pain than it helps. They also seem to be kind of anti-capitalist and are very talented security researchers. Antisec are the kind of amazing group of hackers who don't want profit from fear. Generally Hackers are known for creating deterrence, fear and penetrations. Here is this group to sabotage such intentions of Dark side of cyber world. There are so many myths and misconceptions about them but the fact is that they at least have credibility. These guys are sticking to their guns and keeping the hacking underground just that, underground. Anti-sec is a response to the fear-mongering era of 1998 - 2004 when every hanger-on wannabe computer guy became a security researcher and started publishing "advisories". Between dotcom bubble eras to 9/11, everybody was a security guy, and not only that, but the "security guy" was pointing the finger at the hacker community every time a script kiddie defaced some web page. Those most sec guys are snake-oil salesmen and absolutely deserve no sympathy. If they're gonna bad-mouth hackers and promise protection to everyone then let them protect themselves from the real Hackers; by and large, they're out-gunned and out-skilled.

There are many so called security ( tech or defense agencies) minting money over suing the tag of Hacker, they have made it business, every year thousand of hackers are (youngsters) manufactured in their so called industry but still nation lacks hundreds of security personals towards national security. This is irony and here is need of someone to stop these ‘manufacturers of hackers’, I think hackers like Anti sec are the proper takers on these morons. Anti-sec doesn't go after civilians, by the way. The another biggest threat today is there are hundreds of exploit writers around the globe, One group publishes exploits and carries out mayhem for fun so make such high profile hacks were attempted just because of open display of these exploits. It doesn't matter what they are or what they do and why they do the most important thing is they are here with the Cause, and that is nothing but the security at large.
The Anti Security Movement or popularly written as Anti-sec is a popular movement opposed to the computer security industry. It attempts to censor the publication of information relating to but not limited to: software vulnerabilities, exploits, exploitation techniques, hacking tools, attacking public outlets and distribution points of that information. Movement followers have cited websites such as Security Focus, Security team, Packet Storm Security, and milw0rm to be targets of their cause, as well as mailing lists like "full-disclosure", "vuln-dev", "vendor-sec" and bugtraq, as well as public forums and IRC channels. The start of most public attacks in the name of the anti-security movement started in around 1999 and 2000. The "anti-security movement" as it is understood today was coined by the following document which was initially an index on the anti.security.is website. The purpose of this movement is to encourage a new policy of anti-disclosure among the computer and network security communities. The goal is not to ultimately discourage the publication of all security-related news and developments, but rather, to stop the disclosure of all unknown or non-public exploits and vulnerabilities. In essence, this would put a stop to the publication of all private materials that could allow script kiddies from compromising systems via unknown methods.

A common misconception is that if groups or individuals keep exploits and security secrets to themselves, they will become the dominators of the "illegal scene", as countless insecure systems will be solely at their mercy. This is far from the truth. Forums for information trade, such as Bugtraq, Packetstorm, www.hack.co.za, and vuln-dev have done much more to harm the underground and net than they have done to help them. This was one of the first anti-security hacktivist groups. The group waged war on the security industry with their popular assault known asAnti-Sec. In a nutshell, this group doesn't like websites that promote security. If a website provides different methods for safety then Anti-Sec wants to blank their site. They want to take away the ability of organizations to sell their services.

No one knows about this group so far, they don’t have any sort of forum or website or any traces where the members can be located, and if someone clames about knowing them, then It can subject to doubt. The kinds of hacks they have performed and beguile they blown against bigwigs are not in a mood to spare them, maintaining anonymity is compulsion for them. Still it’s very much interesting and leaves the reason to think about their agenda and activities. Bravo guys..

Read in details ,soon to be published “Cat Techie”………………….

Thursday, February 3, 2011

Hindu militant Group

I f you get in to flash back, there were few communities and groups on Orkut which were working for the pride of this nation.(HMG was also one of them), Hindu militant Group made its mark, then showing the concern for country. A group of Pakistani hackers use to abuse innocent girls of our country, by posting their morphed nude pictures along with the pictures of their family members and also their personal details. Initially the group HMG tried convincing Pakistani Hackers about stop targeting blameless girls. However HMG failed to convince them (Hoodlum Don/ Hoody is the founder of HMG). During that time, the users were not that regular on Orkut or any other social networking sites. Hindu Militant Group, Had India not been a vibrant democracy and where Hinduism an intolerant faith, we would have witnessed many violent and perverted responses in cyber space. The owner of HMG gave offer to Gaurav to join their group and to witness the happenings going around. This is how Gaurav, one of the founder member of ICW started forming a team with the brilliant hackers to deface Pakistani sites. There were many brilliant hackers like Sameer, Godvin, Bond, witu (wireless punter) the integral part of ICW. Not only these boys but the girls also gave best ot contribution to this group.

See the twist here these people were at that time trying to convey their disagreement over insulting Hindu woman and god. But in other hand HMG group’s one of the female member provided photographs of the female group members to Pakistani hacker and they were misused. This hacker babe is still there on our Face Book community and very well from my own Native place Hyderabad. Sad but crood, most of the time woman is woman’s enemy. Now also she enjoys displays and making mockery of each profile with utmost abusive language. She loves when girls are abused on her wall, its sick physic.

The other hand there is girls like ‘EG’, my team girls are her diehard fans. She shows those guys their place who tries messing with her, very much dedicated to country, aggressive yet loving and full of compassion. I salute this girl and value her attitude. I feel proud of HMG when I look at girls like her, but also feel sorry for one thing, they could control over other country but couldn’t clean their own carpet. If you go to face-book walls, it has become place of war, false ego and random abuses, vulgar language, perversion and mean approach. To stand by one girl as supporter , all guys collectively hit other girl with most innovative slangs. Irony!

The other day Andhra Hacker displayed my blog screen short on his wall,( probelby it was tagged by some one) but read comments if not removed.. I mean..I really failed to understand what they were trying to convey? It’s there on blog, why need display? Ok you displayed, showed your concern for whom so ever, what have you achieved? nothing much See the double standards. AH guys they abuse like some body has given them right, Why? What have we done to you?
Please leave us or hold us, don’t make us punching bag. We have lots of work and growing. My 90% of the staff is between the age group of 19 to 27. We slogged day night for our company reach to the heights, without any financer or politician or business group. Believe me 63 hackers are earning their living from my company NBC. And today we have appointed some more hackers in our security company Kaizan. They are happy with us.

We are not here to damage, it’s a bogey, the team of guilty hackers has been trying to nurture for some months now. But they had failed to make headway in the absence of any supporting evidence. Hackers love bogeys. First they are created; then promoted; and finally bashed. In the last week one such bogey was discovered. With the vocal assistance of a section of the groups, it was assiduously promoted. The hype got further fillip. And almost immediately the bashing began. This line of thought was first propagated when some of the Hackers miserably failed in their malicious intensions.

Before we examine the ramifications of this allegation, it is important to understand the motivation that guides the disproportionate attention paid to two crude rumors. Nobody in their right minds has ever suggested that every Hacker is Criminal, real or potential. They unsuccessfully tried to hunt with the hound and run with the hare, but stopped short of endorsing the repugnant demand for revoking the ban on people like us. Any ways the Question remains here is..Who is that girl (who provided pictures to Pakistan Hacker’s?) answer is in your friends list, if you still can’t make out then wait for my book ‘Cat techie” to be launched.

Everyone has right of expression, abusing is violation of that fundamental right.. Do not ever abuse the rights given to you by independent India.

Anything for India? Is it?

Monday, January 31, 2011

Rota hai KAI ko over Fake Things ...?




DON’T DARE WE ARE BAD GIRLS

L ast night we had to stay back in office due to some print error in magazine and reaching the print deadline by completing the task. My collogue Anupriya stayed back to accompany me home, who has recently joined our firm was online chatting with Kai Ty Agi( Group), he was trying to scare her the most by so many things . I have groomed my girls and they are not scared of anyone, by using chain proxy and hidden IP how long one can hide his or her identity? His dispersal to join NBC, his dialogues, the way of his chatting, his pretentious style of saying things got him caught. We can pretend over anything but somewhere we leave the traces and I am CAT, an investigation is my biggest job. Tracing such things makes me happy. Guys you need to change your style while fooling others. When you are sure that all these NBc girls’ profiles are fake then why the hell you send friend request to them or go and chat with them? Leave them aside, I am damn sure they never come to you, they are happy in their group. They are alright with US(me and r45c4l). Hollow vessels makes big noise, guys barking dogs never bite. Stop barking please, we are not interested.

More over some so called high profile business man Hacker using abusive language was quite upsetting, first you cross your limits and then you get it back and when you are asked to evict you abuse, why? Fisrt place I am surprised how these people get so much time to be on social sites and toop so low? Facebook is the one site on the internet that is probably the most used. The amount of Facebook users are increasing dramatically on a daily basis. Facebook started out as a social networking site which mainly consisted of lots of young users but as Facebook currently stands there are users of all ages and walks of life. Inclusive in the Facebook security concerns is fake profiles. Facebook is currently being flooded with fake profiles. Due to the huge daily registration rate on Facebook, it is hard to keep track of who is a regular user and who is a Facebook fake. 50% of profiles on Face Book are fake.

As the guy was scaring anu (though she was not) that they were suppose to publish her profile picture in news paper because, he thinks its fake, I felt like laughing as a Journalist and lawyer. See above given profiles and tell me how many of them are holding their real pics including some Dev D and some Kai or who so ever. There is no law made, if you are using Salman Khan’s pic as your DP, its Salman Khan who can take legal action against you. That to if you are 100% sure the profile holder is not Salman Khan, or Salman has never given him permission to use his pic. I want these guys to go ahead and publish the stuff, some of them are soon appearing on TV that day see the mess from my side, because I was waiting for their public appearance. Let it me Arnab, Rajdeep or Pranan Roy they are legends in their own way and can gage the fraud and channels has access for public opinions, please don’t treat us with your stupid cock bull stories. That won’t make any difference, as far as my company is concerned “I AM THE BOSS and ITS MY BUSINESS, NO ONE IS ABOVE ME TO DECTATE” my board of directors are my cute brothers they know me better than anyone on this earth…..

As far Keeping eye on my company 24/7, I would say “please arrange living for yourself and then poke in others business, I am not going to lose anything, I love attention, controversies, messing with bad guys, because I know what I am and I know who the hell trying to create illusions. My staff and team is equally strong and determine. You eyeing on me may not get anything but If I eye on you, you may lose many things, the difference between us is..you are a creature of hidden world and I rule over Dark..love to live with FACE and Identity, so my staff. NBC is my concern and we the family are very happy here. And when we feel some one is unwanted we throw them out and forget. Once gone …No return is our policy. I will be happy if you keep eye on opportunities coming your way than messing with us, you get nothing accept a big KICK ON YOUR BUTT

His next allegation was, CAT respects Pakistani hackers and seeks help from them, A BIG YES! Why not? As an Indian fellow being what you couldn’t do they did it by showing basic respect for me and my team. The faith that they invested in us made us feel special. When a Girl is respected she automatically pays that gratitude and it’s her ego and pride. You guys failed to receive and they were at receiving end why shouldn’t I respect them? As an individual I don’t have any enemies, if you think I am your enemy I can’t stop you. What you need todi is... change your attitude.

It has recently been discovered that over fifty percent of new Facebook profiles are actually fake. The question that may be asked is why are people setting up fake Facebook profiles?

Facebook does have an extremely clear and precise policy with regard to fake profiles. According to Facebook and its policy a fake profile will be deleted when the Facebook teams becomes aware of it. Fake profiles are causing huge problems for many innocent Facebook users who have genuine profiles. The factor that spammers and virus writers are using fake Facebook profiles to their advantage means that people will stop at nothing in order to get people online to do what they want. It is interesting to note that besides people creating fake Facebook profiles for the usage of malicious purposes or spam, people create fake Facebook profiles of celebrities and actors all the time. If you are a regular Facebook user and do a search for a celebrity of your choice, chances are very likely that this particular celebrity has a Facebook profile. The question that arises is if this genuine Facebook profile or is it a fake? The majority of the time there is no real way of telling. It can thus be said in conclusion: Don't take everything on Facebook.

Hey rebellions just listen one thing, don’t dare me or my staff ….we are simple but definitely not fools…we have not messed with any hackers life, it’s you people sabotaged your community and crying over buried graves…If you wouldn’t have messed with their personal life we could have never reached to them. Blame yourself for playing with the life of fellow community members….and now when I stopped it ...you are provoking me, this time you are responsible for the mess.. last but not the leaset if any Hacker has problem with us please remove us from your friends list..
You have every liberty to GET OUT….

read next post why ICW returns.............

Monday, January 24, 2011

Journalist to Launch www.sabkileak.com

The disclosures made by WikiLeaks have given a blunt and candid assessment of how American foreign policy is conducted. On Right Left and Centre, Wikileaks revelations has not only embarrassed America and exposed America's Diplomatic secrets but also India and several other countries. WikiLeaks has succeeded in hitting the reset button on International relations and politics.
India has become a hot spot of corruption, what with mega scams like the CWG, 2G, and Adarsh scams breaking out impoverishing the country's exchequer by 100s of billions of rupees. Politicians, fat-cat industrialists, and bureaucrats have formed an unholy nexus, which is bleeding Mother India like never before. The rich is getting richer, while the poor is being pushed deeper into the abyss of abject misery and poverty. How can we tackle this problem? Do we need an Indian Julian Assange to lead a crusade against our corrupt netas and babus?

In a way WikiLeaks has helped the common people to know the true faces of their politicians and leaders. Though it seems to be a wonderful source of true information, unfortunately the Indian government has made it an offence to own any website based on the lines of WikiLeaks.

Supreme Court advocate Pavan Duggal, who specialises in cyber law, points out that starting a site like WikiLeaks could make the owner liable to paying a fine of up to Rs 5 crore per contravention under the IT (Amendment) Act, 2008. One may even attract a criminal liability of three to ten years in jail under various statutes and the Indian Penal Code.

“At one side where the government gives each and every individual the right to freedom and information, on the other side they are restricting the citizens from their expression. Is this justified? There should be a media like WikiLeaks in India which will expose the corrupt practice of our leaders,” says Amar Pawar, a BPO employee.

As per the RTI Act, information sought had to provided to the citizen within a period of maximum 30 days, but citizens in our country have to wait for more than two years to elicit any information from concerned departments. List of pending cases runs in thousands and remains without addressed. Since the voice of the common people goes unheard most of the times, their issues remain unnoticed. A journalists group plans to come up with a website named www.sabkileak.com which would be solely based to inspire transparency, exposure of evils for wider interest of nation; and thereby to bring blots on our system to books. Several cases go pending even though government officials and contractors have access to skeletons-in-the-cupboard, they find it risky to approach courts or journalists or any civilian out of the purview of government service on the grounds of safety of their interest. Thus, www.sabkileak.com shall facilitate relaying of such material uploaded by such government servants; who wish to expose evils in the system.

“People must get to know the truth of their leaders and its government. This can lead to bad apples being dropped off from the basket. Policies that have direct influence on you can be debated with justice. The country can eventually move forward due to its transparency. I would support www.sabkileak.com since it is serving the nation for betterment,” says Chandrashekhar Shetty, a resident of Bhandup.

When AV contacted some of the personalities, here is what they said:


YP Singh, Ex-IPS officer - Looking at the corruption rate, there is a need of WikilLeak like website. I welcome www.sabkileak.com which will help the people to know the true faces of corrupt politicians. People are aware of corruption happening in the governance but no one protest or take any action against it. SabkiLeak will help to strengthen the people’s power to fight against corruption.

Shaina NC, BJP spokesperson Mumbai Unit - If SabkiLeak is for the welfare of the people then it would be fine but if it is used for blackmailing purpose then it would turn as a huge problem. I welcome this website and hope to see it soon.

Abbas Kazmi, Advocate - SabkiLeak should be handled by a strong and prominent personality. If these types of website come into existence, then hundreds of corruption cases will come into light. This will help the country to grow at a faster rate.

Amin Solkar, Advocate - Initially RTI proved to be a powerful tool to curb the issue of corruption to a great extent. But, today hundreds of RTI cases are pending. SabkiLeak will help the nation to overcome this barrier.
Vijay Mukhi, Cyber Expert - It is a great move. This will help the common people to know how corrupt their leaders are. Thus, it will help nation to bring the issue of corruption to.
source- http://www.afternoonvoice.com/

coming soon CATTECHIE story of a journalist

HINDU, MUSLIM GODS ABUSED, STRIPPED ON FACEBOOK

Facebook is the most famous social utility that connects people with friends and others who work, study and live around them. But, this social networking site has become the modest weapon to abuse, insult and express hatred towards religions. Distressingly, a facebook page named Hindu has several images of both Hindu and Muslim gods cropped and merged with nude human bodies. Not only this, the page also includes pathetic and adult comments.
The owner or developer of the website http://www.hindunet.org/ has misused the facebook by creating a page with contents hurting sentiments of both Hindu and Muslim religion followers. The page has 79,872 followers and their only reason to be there seems to abuse other religion. Very sadly, there are number of images in which the Hindu gods are shown in compromising position. Whereas, there are also images which a pig is shown holding the holy Quran. Some pictures are so distressing that it cannot be explained. “It is surprising to know that these kinds of pages are entertained. Isn't there anyone to moderate? Facebook should look into this matter,” says Kiran Raghavan, a Bank employee.
The images can be found on the link http://www.facebook.com/ pages/Hindu/24525368223?v=photos. In one of the images, three Hindu gods are shown as 3 idiots as in the movie poster. Another one shows a pig resting over the Kaba of Mecca. Almost every deities are been abused. Every post is related to sexuality.

Harish Gupta, a resident of Borivali says, “Facebook should ban these kinds of pages which is spreading hatred towards other religions. People should protest against these anti-religion pages and make things safe for the future.” Adding further he said, “We should not get instigated rather we should live in peace and love. All religions are equal.”
Few months ago, Pakistan had banned facebook for a month of time due to the abuse made towards Islam. "Many pages are been created to target religions but still no proper actions have been taken. It is necessary that admin department of facebook should take care on these kinds of sensitive issues since this can result into a major physical war between the existing religions. Virtual war has already started this kind of stuff may also adversely affect the cyber space of many countries," said Mohammed Shaikh, a Dahisar resident. “These pages are intentionally made by people who possess evil intentions. Facebook is used by millions of people with different mentality and approach towards life. Though we cannot stop their evil thoughts but they can be definitely banned and discarded,” says Rehan Ali, a businessman. When AV contacted Vijay Mukhi, he said, “Government must issue letter to these kinds of websites and put an end to the insult of any religion. The miscreants should be booked under IT Act.”

www.afternoonvoice.com

Friday, January 21, 2011

Fairer side of hacker









She in odd world


The experience of women at the entry levels of the hacking scene, mostly in online chat groups, is one of relentless sexual harassment. It is a hard battle for women to be respected in a culture dominated by teenage boys for women hackers, there’s a different kind of glass ceiling to break. Hacking has traditionally been a man’s world. But women are quietly breaking into the hacker subculture, a loose group of computer enthusiasts who meet in online chat rooms and at real-life conventions.

Not surprisingly, as in other male-dominated spheres, these women are often harassed and mocked by certain insiders — though here it is by teenage boys, who make up most of the “entry levels” of hackerdom.
The chat rooms where beginning hackers often learn technical tricks are stocked with “little hacking boys from hell … how awfully rude they are, and how intelligent they are,” according to a hacker who goes by the handle Natasha Grigori and heads antichildporn.org, an organization of hackers who track down child pornographers on the Net.

R-E-S-P-E-C-T
But the few female hackers don’t network with each other — in fact, some of their greatest trouble comes from other women, called “scene whores” — hacker groupies who use sex to get ahead. Fortunately, the few women who break through to the “elite” ranks of hacking find that at the top, what matters is your technical skills, not your gender.
“If you can match their [male hackers’] skill level and better it, they’ll give you every ounce of respect. … It’s when a female comes in and tries to play on her being feminine, that doesn’t get you anything,” says Blueberry, a 32-year-old woman from Brisbane, Australia, who founded condemned.org, another anti-child porn organization.
ABCNEWS.com spoke to more than a dozen female hackers from the United States, Australia and New Zealand for this two-part series. Last week’s piece (see related story, right) looked at who the female hackers are; this week, we examine the challenges they face.
A note about names: Like most hackers, these women choose to go by online handles. Real names will be specifically marked as such.

Hackers vs. Scene Whores
Courtnee, a 20-year-old hacker from the Pacific Northwest, says the prevalence of “hacker groupies” makes it more difficult for true female hackers to get respect. (www.twistedlens.com)
there are plenty of women at hacker conventions — they’re just not all hackers. Some are girlfriends, some wives. But the female hacker’s nemesis is the “scene whore.” These latex-clad hacker groupies haunt conventions and offer teenage boys cyber sex in chat rooms to boost their own self-esteem, female hackers say.

“The average woman, in today’s society, could remain unnoticed,” says Blaise, a 29-year-old woman from New Zealand. “Looking at an average woman in a computer society that consists of mainly antisocial men, she will be the center of attention. It’s those girls that give every woman a reputation...and that are what you have to prove yourself against before you gain any respect.” And the prevalence of scene whores has shattered any female solidarity that might exist among the hacker community, as groupies fight over the most highly skilled men and real female hackers fight the boys’ assumption that all women in the scene are groupies.
“When I first started in the scene, this one person said, you know, you can be my cyberwhore and you’ll be elite through association,” says Blueberry, who says she rejected the advance.
Dark Tangent, head of Defcon and a prominent male hacker, remembers a “scene whore” having videotaped sex with a male hacker in an elevator at the convention’s Las Vegas hotel. He warns of “evil groupies” who condition poorly adjusted male hackers to think of women as sex toys.
Natasha says she regularly has to throw women out of the IRC chat room that she hosts because they disrupt the tech talk by offering cybersex to her teenage charges.
“It’s really bad as far as the women ripping each other to shreds. This whole cybersex thing really bothers me,” Natasha says.
“A_kitten,” a 34-year-old woman from California whose Web site features sexy photos of herself, has been described as everything from a “scene whore” to a “cult leader” by terrified male hackers unwilling to give names to a reporter for fear of her “legion of groupie script kiddies” who used to crash sites on her command.
She doesn’t deny using her femininity to get her way in a male-dominated society.
“People just assume that since I am a girl and I have that power that I must be abusing it,” she says. “I think some guys are intimidated or offended by the natural power that women possess.”
But “St.” Jude Milhon, a prominent hacker from Berkeley, Calif., doesn’t see using feminine wiles as part of the spirit of hacking. “It wouldn’t be sporting. Simply be present, honest, reasonably competent, female, and everyone’s aghast.”
Fighting to Be Heard But it’s a hard battle for women to be respected in a culture dominated by teenage boys. The experience of women at the “entry levels” of the hacking scene, mostly in online chat groups, is one of relentless sexual harassment.
British sociologist Paul Taylor, author of Hackers: Crime in the Digital Sublime, terms this the “Wild, Wired West,” a rough-and-tumble social environment determined by the attitudes of insecure teenage boys trying to impress each other with “typed testosterone.”
“It’s almost like some Lord of the Flies-type environment,” he says, referring to William Golding’s novel about a group of teenage boys who descend into feral savagery when cut off from civilization.
The anonymity of online interaction also fuels sexual harassment, making it more difficult to enforce social rules and freeing the most maladjusted young men to take out their sexual frustrations on people with feminine handles, Taylor says.
“The first time I posted, I posted with a woman’s nickname. I was ripped to shreds: ‘You’re a woman, get off here, we’re not going to help you,’” Natasha says. When RosieX, founder of the Australian cyberfeminist magazine GeekGirl, got into the online bulletin board scene in 1990, she found women so intimidated by that attitude that they pretended to be male to avoid harassment.
“I was frustrated, because I wanted to learn skills and all the boys wanted to do was f---,” she says.
Even a_kitten, who takes pride in her power over those boys, sneers at them.
“For every 50 jerks on IRC, I stumble upon one nice guy that I can talk to,” she says.

Non-Sexist Elite
But the sexual gantlet seems to fade with experience. Defcon’s Dark Tangent says top-rank hackers generally stay away from the IRC channels, waiting to see whose thirst for knowledge is great enough to survive the savage atmosphere. To them, skill is all that matters, not the body it comes in.
“When you interact with people such as the L0pht, or the cDc or the most experienced members of the hacker culture, gender is a non-issue. It’s what you know that matters, and less who you are,” says Javaman, a Philadelphia-area hacker. “There is sexism at the lowest levels, but among the more skilled people, the more able people, it really is a non-issue.”
And at conventions, hackers seem to love nothing more than a woman who can fix a network breakdown. Though they’re tormented online, for some reason the rare women in hacking are treasured in person, female hackers say.
“Girls are victimized only in the bodiless state … in the flesh, they’re objects of wonder and fascination,” says Milhon.

Hacker Hangouts
There’s much debate among hackers as to what exactly is the hacker “scene.” There are plenty of hackers who aren’t part of the scene, and plenty of people - such as “scene whores,” girlfriends and just hangers-on - who aren’t hackers but who also hang out with them. Here are some places hackers congregate:

IRC chat rooms:
Hackers largely eschew AOL chat and Instant Messenger for this older form of chat. Rooms like “#hackphreak” are full of “script kiddies,” aggressive teenage boys who form the bottom of the hacker food chain. More experienced hacker groups have invitation-only rooms to which they invite promising techies. Scene whores are common here, and female hackers often have to fight off the foul-mouthed boys.
2600 meetings: A step above the IRC bunch, this in-person, scheduled meetings (named after a hackers’ magazine) let young hackers around the country socialize with their nearby peers.
Conventions: At annual meetings like Defcon in Las Vegas and HOPE in New York, thousands of male and female hackers get together to discuss computer security. Top hacking groups give lectures, people trade lots of software and script kiddies try to “prove their skills” to their elders.

Private clubs: This is where the top minds trade information. On Web pages, through e-mail and in person, groups of experienced hackers push their machines to the limit in the search for advanced technical knowledge.

Wednesday, January 19, 2011

ALL THE BEST FRIENDS, MAY YOU BE THE WINNER OF THIS COMPITITION

Basics to Become Hacker without getting caught



H e can easily tweak these according to his needs and become hacker. This is the way the term was used when Bill Gates was inventing Windows. Those who are often referred to as hackers today, should actually be called "crackers" - people who do not have unauthorized access, like a safe-cracker. If you doubt me, and want to know how to be a hacker then do a search on the term "professional hacker," and you will find many professional and legitimate computer training courses being offered. They are the ones learning the real hacker secrets. Everyone has heard of one individual or another that was caught while hacking computers that belonged to this or that organization. Because hacking into computers is highly illegal, it should be mentioned that this article will not mention any real specifics about the subject, and this author would rather gladly encourage you to become a real hacker - professionally. This article, will however, give a brief overview of criminal hackers, some of their methods, and a few things you can do to make your own computer safer from hack attacks. Here are those things you need to learn on how to become a hacker. It should go without saying that the first thing that is needed is to learn about computers. This means study. A lot of reading is involved along with just plain old-fashioned learning how to use a computer. Then, of course, there are the special aspects of computer study. The places where the tips are learned is often two-fold: a friend who has access to a computer, and a variety of places on the Web. But this is also an interesting thing - if a young person has the ability to learn, and wants to learn can use hacking tutorials- then why not take the time to learn the right things - things that can earn him a lot of money in the legit world? Is it possibly that it could be the friend he has that turns him away from the good? Search for tools on Hackers Websites and forums. Special hacker Web sites, where hackers congregate, exist on the Web - as does every other known group of people - whether legal or illegal. Some of these are known to be hacker chat rooms, hacker forum, and regular hacker sites.
It is in these Web sites, and possibly some of the people that he may meet, maybe only online, where he will learn the hacking basics, and learn how to hack. Some of the tools that a hacker may use are often varied and constantly changing. One such tool that was used last year allowed a hacker to gain control of the computers of those who simply mistyped the word Google - when trying to get the popular search engine. This automatically directed them to a special website that would give them such malware items as Trojan downloader’s, backdoors and spyware. Another tool would be the robot spider. These can be sent out and put on automatic and will look for ports of access into your computer. These spiders are running around all the time and some say that they may hit most computers that are online - up to 50 times a day. Other tools use email attachments. It is claimed that as much as 65% of all email is spam. And as much as 1 in about 30 emails contains a virus, or some form of malware. This is why having your own virus and spam protection is a must, as well as a good spyware remover. Someone is busy. Once someone has been hacking information on a computer they will often leave a Trojan file that will give them further access - often more than one file. Then they could use your computer to send out spam attacks - without you even knowing that it is taking place. Or, they could simply be hacking your personal information off of your computer. These are just a few of their tools.
One of the first things that someone would learn about hacking tutorials when studying to be a hacker is how to cover their tracks. Of course, some are better than others. A young hacker is less likely to know all the little things that an expert hacker might know. Besides, the young hacker may be trying to impress others - and get a little careless about covering his tracks. This is why younger hackers are often caught. An older hacker, on the other hand, will rarely leave any tracks. They know how to use their victim's computers as a tool for a launching place to get into another computer - leaving a phony IP address. The truth is, and it is a good thing, that computer programmers are getting better software, and hardware (firewalls) that are constantly doing a better job - both in keeping hackers out, and in recording IP addresses better for tracking purposes. There will always be hackers, and there will always be hackers in prison. The legislation is definitely turning against the hacker - with some hacking crimes becoming equal to terrorism, these days. Kevin Mitnick, a well-known hacker, had the Federal prosecutors accuse him of having caused $291 million in damages to corporate computers. A serious crime, and he remains in jail because of it - unable to touch anymore computers. Even by learning some of the wrong type of hacking basics through hacking tutorials, a young person could start down a wrong path. Hacking computers, though often glorified on TV, is still criminal.


source- hack alerts

Tuesday, January 18, 2011

BJP TO PROTECT HACKERS IF THEY PROBE IN EXPOSING CURRUPT POLITICIANS..

Mobile numbers, addresses on Facebook 'a security risk'


A security expert has warned that users should remove their home addresses and phone numbers from their Facebook accounts. Graham Cluley said the website now gives third parties access to that information. The website said in a blog post at the weekend that it would give developers of applications access to the contact information of users who install their apps. "These permissions must be explicitly granted to your application by the user via our standard permissions dialogs. Please note that these permissions only provide access to a user's address and mobile phone number, not their friend's addresses or mobile phone numbers," the Sydney Morning Herald quoted Facebook's Jeff Bowen as saying. However, Sophos security expert Cluley, has raised doubts over the move. "You have to ask yourself - is Facebook putting the safety of its 500+ million users as a top priority with this move?" he said."It won't take long for scammers to take advantage of this new facility, to use for their own criminal ends." Cluley advised that users should take personal info such as home addresses and mobile numbers off their pages. "You can imagine, for instance, that bad guys could set up a rogue app that collects mobile phone numbers and then uses that information for the purposes of SMS spamming or sells on the data to cold-calling companies," he said. (ANI) A security expert has warned that users should remove their home addresses and phone numbers from their Facebook accounts. Graham Cluley said the website now gives third parties access to that information. The website said in a blog post at the weekend that it would give developers of applications access to the contact information of users who install their apps. "These permissions must be explicitly granted to your application by the user via our standard permissions dialogs. Please note that these permissions only provide access to a user's address and mobile phone number, not their friend's addresses or mobile phone numbers," the Sydney Morning Herald quoted Facebook's Jeff Bowen as saying. However, Sophos security expert Cluley, has raised doubts over the move. "You have to ask yourself - is Facebook putting the safety of its 500+ million users as a top priority with this move?" he said. "It won't take long for scammers to take advantage of this new facility, to use for their own criminal ends." Cluley advised that users should take personal info such as home addresses and mobile numbers off their pages. "You can imagine, for instance, that bad guys could set up a rogue app that collects mobile phone numbers and then uses that information for the purposes of SMS spamming or sells on the data to cold-calling companies," he said.

Sunday, January 2, 2011

What is Cyber-terrorism?

In the wake of the recent computer attacks, many have been quick to jump to conclusions that a new breed of terrorism is on the rise and our country must defend itself with all possible means. As a society we have a vast operational and legal experience and proved techniques to combat terrorism, but are we ready to fight terrorism in the new arena – cyber space? A strategic plan of a combat operation includes characterization of the enemy’s goals, operational techniques, resources, and agents. Prior to taking combative actions on the legislative and operational front, one has to precisely define the enemy. That is, it is imperative to expand the definition of terrorism to include cyber-terrorism. As a society that prides itself on impartiality of justice, we must provide clear and definitive legislative guidelines for dealing with new breed of terrorism. As things stand now, justice cannot be served as we have yet to provide a clear definition of the term. In this light, I propose to re-examine our understanding of cyber-terrorism. There is a lot of misinterpretation in the definition cyber-terrorism, the word consisting of familiar "cyber" and less familiar "terrorism". While "cyber" is anything related to our tool of trade, terrorism by nature is difficult to define. Even the U.S. government cannot agree on one single definition. The old maxim, "One man's terrorist is another man's freedom fighter" is still alive and well. The ambiguity in the definition brings indistinctness in action, as D. Denning pointed in her work Activism, Hactivism and Cyberterrorism, "an e-mail bomb may be considered hacktivism by some and cyber-terrorism by others" It follows that there is a degree of "understanding" of the meanings of cyber-terrorism, either from the popular media, other secondary sources, or personal experience; however, the specialists’ use different definitions of the meaning. Cyber-terrorism as well as other contemporary "terrorisms" (bioterrorism, chemical terrorism, etc.) appeared as a mixture of words terrorism and a meaning of an area of application. Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, who in 1997 was attributed for creation of the term "Cyberterrorism", defined cyber-terrorism as the convergence of cybernetics and terrorism. In the same year Mark Pollitt, special agent for the FBI, offers a working definition: "Cyberterrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents." Since that time the word cyber-terrorism has entered into the lexicon of IT security specialists and terrorist experts and the word list of mass media "professionals". One of the experts, a police chief, offers his version of definition: "Cyber-terrorism – attacking sabotage-prone targets by computer – poses potentially disastrous consequences for our incredibly computer-dependent society." The media often use cyber-terrorism term quite deliberately: "Canadian boy admits cyberterrorism of his family: "Emeryville, Ontario (Reuter) - A 15-year-old Canadian boy has admitted he was responsible for months of notorious high-tech pranks that terrorized his own family, police said Monday" A renowned expert Dorothy Denning defined cyber-terrorism as "unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives". R. Stark from the SMS University defines cyber-terrorism as " any attack against an information function, regardless of the means" Under the above-mentioned definitions of cyber-terrorism one can only point to the fact that any telecommunications infrastructure attack, including site defacing and other computer pranks, constitute terrorism. It means that cyber-terrorism has already occurred and we "live " in the epoch of cyber terror. However, another expert, James Christy the law enforcement and counterintelligence coordinator for the DIAP (Defense-wide Information Assurance Program), which is steered by the office of the assistant secretary of defense for command, control, communications and intelligence, states that cyber-terrorism has never been waged against the United States. "Rather, recent hacking events – including a 1998 web page set up by a supporter of the Mexican Zapatistas rebel group, which led to attacks on the U.S. military from 1,500 locations in 50 different countries – constitute computer crime. William Church, a former U.S. Army Intelligence officer, who founded the Center for Infrastructural Warfare Studies (CIWARS) agrees that the United States has not seen a cyber terrorist threat from terrorists using information warfare techniques. "None of the groups that are conventionally defined as terrorist groups have used information weapons against the infrastructure" Richard Clarke, national co-ordinator for security, infrastructure protection and counterterrorism at the National Security Council offered to stop using "cyberterrorism" and use "information warfare " instead The above-mentioned observations drive a clear line between cyber-terrorism and cyber crime and allow us to define cyber-terrorism as: Use of information technology and means by terrorist groups and agents. In defining the cyber terrorist activity it is necessary to segment of action and motivation. There is no doubt that acts of hacking can have the same consequences as acts of terrorism but in the legal sense the intentional abuse of the information cyberspace must be a part of the terrorist campaign or an action. Examples of cyber terrorist activity may include use of information technology to organize and carry out attacks, support groups activities and perception-management campaigns. Experts agree that many terrorist groups such as Osama bin Ladenn organization and the Islamic militant group Hamas have adopted new information technology as a means to conduct operations without being detected by counter terrorist officials. Thus, use of information technology and means by terrorist groups and agents constitute cyber-terrorism. Other activities, so richly glamorized by the media, should be defined as cyber crime.

Reference:Computer Crime reserch center

CATTECHIE HERE AGAIN

Hacker between Wikileaks, attempts at censorship and chaos

Rob Gonggrijp, founder of the Amsterdam provider XS4ALL , hacker scene said at the opening of the 27th Chaos Communication Congress ( 27C3 ) in Berlin on Monday that the coming years after the by Wikileaks triggered the Cable Gate are simply not quite mastered. The publication of hundreds of thousands of previously classified as secret U.S. diplomatic papers "is pressure to increase internet censorship," said the former editor of Hack-Tic . The FBI and U.S. intelligence agencies pressed for a new law on Internet surveillance, after which they Provider encrypted communication in plain text would have passed already. Overall, attempts to deprive the world, internet freedoms, including freedom of information massively restrict. The hacker community share the principles of Wikileaks, but not all their relatives were in a "war" with a superpower, Gonggrijp said: "We do not compromise the freedom of expression." The Dutchman criticized in this sense, the union activists Anonymous . It does not work, the server PayPal or Mastercard, the Wikileaks spinning off of the money supply, short term tie up and little attention to direct an order. Real "hackers" would but at least not their real names in the metadata can be sent out press releases here, quipped Gonggrijp. Those who do not have enough "maturity" as a traveler reaches have data yet, should be better not to connect to the network. For the hacker to enter rulers and citizens with similar whistleblower Wikileaks and Internet platforms in the new territory together. "Many politicians recognize that their advisers to tell them not to what is going on." Is the tax they had in hand, but it could not really move, let alone turn things around. The most sought therefore looking engine only halfway relaxed and hope "that the accident happened later." This opening sets the stage for tens of thousands of spin doctors who examined her speed to sell the truth to the public. Hackers and geeks would not know all the answers to the current problems, but had at least parts of it. remained generally Gonggrijp in his skeptical view of 2005 that the hacking community after 11 September 2001 and then built up the monitoring infrastructure, "lost the war" did. He sees the consequences but not as fatal as it was five years ago. It will probably a bit "chaotic" in the coming years - and many news sites would look similar, as is already the conspiracy specialized in the hacker's Blog Fefe . The data not only travelers from the Chaos Computer Club ( CCC ), the conference traditionally held after the Christmas understood, but already slightly better than the rest of the world, "how does chaos" and to master it. Also, a small group of thoughtful people could thus change the world, but before were still enough slots available. Gonggrijp therefore considers it important, and trust between hackers to strengthen cohesion. He advocated for it, even the annual meeting in more and more from all seams bursting Berliner Congress Center ( bcc ) at Alexanderplatz "can grow to be careful" and to seek a larger venue. This year CCC had the much sought after around 4,000 tickets available for four days for 70 € per piece only available in advance among the people brought. The Congress was thus well within a few hours before sold out, single day tickets will only be on Tuesday in manageable quantities to give it. This was despite the streaming offers too much "fresh blood" from outside the conference held and prevented from visiting, complained Gonggrijp. That the Chaos Communication Congress with an increase to a similar fate befall the event as a mass without great networking factor decried Defcon in Las Vegas, believes the veteran hackers do not like. These have been at a lower number of visitors on a problem of booze and too many participants from military and government also suffered. Jeremie Zimmermann, spokesman for the civil rights group La Quadrature du Net warned, also warned that "increasing power" politics and economics from attacking the network. This copyright will, above all, the hook of "piracy" and the enforcement effort, as the negotiations on the disputed ACTA showed. "We have a battle to beat the heads, called Zimmermann, therefore the hackers. This is about staking psychological frameworks. to make clear "is about is to exchange and share" culture that promotes. Culture and knowledge, ultimately exist only if they were shared. Wikileaks assured full support to Zimmer. courtasy- heise online CATTECHIE HERE AGAIN

A true story of CATTECHIE

CATTECHIE HERE AGAIN

Monday, December 27, 2010

ITS WARNING- Hackers Be Carefull

S ince two days my inbox was barged with so many questions and so many queries about my authenticity. I felt very bad but somewhere even I was solaced to see that the one who raised question is at least giving me benefit of doubt. This post is for all those people who gave me benefit of doubt.
The first query, are they going to be arrested? The answer is big NO! If they don’t mess….First place why anyone should be arrested? Second, why they think that they can be arrested? It’s your guilt or subconscious mind hinting you about the crime you committed as a hacker; I am not going to spoil anyone’s life.. if I cannot do anything good for you. And that is my promise provided stop politicking with me.
Yes I confess, I did social engineering at initial stage to gather information about hackers, as a reporter or in better words I being a writer really don’t need to be a hacker to write about you and your world. I write crime stories, political development and try making it simple for my readers. Yet to write with some level of perfection it’s necessary for me to understand the basics of that particular subject else the depth and readability would be at stake. If I do mistake in providing genuine information Next time you won’t take me serious.
Today, the so called hackers who are becoming your guards and your messiahs by dragging me and my integrity in mess are none other than the one who even dragged you in mess. I never knew about the inner scenario of ICA, ICW or AH. Carding or the crime you commit or the handle that you use and your original names and your present status, all this became possible for me because you’re so called well wishers already mortgaged your life in a wasted greed’s and provided me every crucial information about you.( Which can be subject to judicial inquiries if I go legal) If you want me to publish those recordings I am more than happy to narrate you how these people played with your emotions keeping you in illusions. If he wouldn’t have helped me, I am damn sure reaching R4sc4l, sai satish and lord wouldn’t have been possible for me. It’s your own fraternity sabotaging your integrity not me. I am a writer came in your way for some investigations and I did fair enough with my profession. Same happened with the inj3ct0rs too. One of the injector became our source and put you in mess.
Who are these sources? The sources are none other than your leaders whom you trust more than yourself and second source my co writer, who is been busy these days telling people how bad I am. Who is convincing you all about my frauds( which I never did) I knew I am playing with fire so I took all sort of precautions, recently a guy of indishell did carding and shared those details with another so called brand hacker, and the information reached to me ( for which I have proof). Suppose I file a petition and ask judiciary to act on provided information by your leads, tell me where would you land? As a writer if I am doing some crime by gathering your information then my co writer is equally a criminal for betraying your trust and mortgage your life in my hand. Why don’t you seek answers from him?
I alone even for that matter any reporter is incomplete without a source or a thread in investigations, I am taking so many accusations from all wasted people today but never ever exposed my fraternity members let it be jyestha or saloni. You would be surprised even my co-writer couldn’t reach them so far the reason I was damn sure if my co-writer can sabotage you, he can even sabotage my people any time. The level of secrecy I maintained with my people you can’t even imagine. I would like to say thanks to Harun a Pakistani hacker, who indicated me this situation before I land in mess. He rightly said if a hacker can sabotage his own community, he can sabotage you any time. FUUUUUUUUUUUUU!
The so called well wishers who are boasting about your welfare today have already exposed you, which is irreparable. More over recently they compromised my personal computer, and hacked my blog, misused my face book account, my mail ids by sending mails to the dignitaries of this country, all that is been recorded. I gave them total 72 hours to rule my personal computer. I may be dumb but not fool. 24/7 their telephones were trapped, there are so many people worked on this issue and they are none other than your own people. The hacker who physically helped me tracing sai satish is today included in the team of Andhra Hackers. Your own enemy is your friend. At-least I am vocal and honest about confessing my stake.
And dear hackers, this is what the actual confession…. the message published on hacked blog by hackers was not by me. They tried satisfying their ego by doing this, but they could not damage this FAT CAT…. The way they took different screen shorts, the way they tagged the pics with other hackers was something hilarious. When there is lots of darkness under your own ass…. please stop pointing others ass.
Controversy and me walk like shadows, there are few yellow bloggers, wrote about me something two years back when I was juggling between my journalism and law profession, they couldn’t digest the success and made a post on me, which was recently circulated amongst all the hackers just to show how bad I am. You repeated the same by posting messages on my hacked blog. Today I have 2000 cat blogs, if you say I will put them on, please hack it…because you have time and I don’t have that.
2008 and today 2010, that time I was struggling to earn my monthly salary when that hate blog was written, today I pay 180 staff. I keep burning fire in their kitchen. Their families bless me for whatever I am. I feel proud to be a provider at my age. What is your position?
Sadly, many of the hackers are yet students and strugglers. I and my co- researcher are well settled in our lives with our own entity. When he was sharing the dais to launch “CYBER TERROR” he never had a hitch of quilt for putting you all in trouble. He was enjoying party with celebrities probably he could have never met them in his entire life. The hacker who recently accompanied me to receive award for Hacker5, was not even bothered to invite the person who got him in. This is your unity; this is what you all are. I am still the same as I was. In my field the more infamous the more popular you are. Every controversy is complimentary for me.
I am not scared of that bunch of so called hackers those daring me to expose or do blogging on me, damn fools….go ahead and do whatever you can. Few days ago lucky openly warned me of ruining my life, my co-researcher passed indirect message saying if I won’t stop they will do blogging on me. Whatever I am but one thing I must say I am sure, I am not a criminal, or an antisocial element. Max to max what can they do? I am already a public figure and my readers and the biggies of this society knew everything about me. I hold seven publications and daily news papers, to make my stand clear I need no platform. It’s not about what is written it’s about who has written? And you many not know blogging is subject to defamation in the terms of law, go and ask the blogger who once dared so.
But what if I go against you? The so called recordings provided by your own people need to prove it to court of law about what they said, the evidences and papers collected and handover to me by my co writer needs to be proven in court of law, I won’t come in trouble, it’s you going to pay for. And pay heavy… that’s my open challenge to you. Yes about money transactions nobody can disagree because whatever expenses I made, for whatever reason it’s done with full proof.
So far I tried keeping cool and always rendered a helping hand, but you failed to understand my kindness. My post is warning to all those hackers messing with my life…please don’t forget I am a lawyer and well prepared with case study, you also arrange someone for your defense, else don’t blame me for not altering you. Now one single bad move from your side may spoil the life of so many hackers, and that is just because of you and you only…………
STOP IT
This time not a cattechie
Vaidehi