Showing posts with label vaidehi. Show all posts
Showing posts with label vaidehi. Show all posts
Tuesday, August 9, 2011
Cat Techie” book written by vaidehi sachin aka Cat Techie
“Cat Techie” book written by vaidehi sachin aka Cat Techie, journalist’s journey in hackers world. Online edition of cat techie available on www.cattechie.com. This is the best book, read and responded with maximum hits. Cattechie is hacker and Journalist.
CATTECHIE HERE AGAIN
Monday, August 8, 2011
Vaidehi Sachin aka Cat Techi, a journalist’s journey would be launched tonight in a short while…

Cat Techie and her Journey...well there is so much to share and so much speak out. it was beautiful phase,with mixed experiences.
Now after so much of experience, I can say that I understand hackers in and out. Now I am well aware of their culture, mindset, every reaction, methods, tricks, and their focal area. When I was introduced to the hidden crust of cyber space, it was quite difficult for me and my team to deal with since we were very new to this domain. My team members are very young and since they possess quick leaning skill, it was very easy for me to train them with all the journalistic skills on political, crime and social beat. But, when it came to cyber space, we all were left puzzled.
We had no idea about where to hit and how to start. In addition to this, too much of dependency on one particular source dragged us in big mess. It was our mistake that we trusted a person who wasn’t matured enough and faithful. Today, things have transformed for me. Learning from all the mistakes made in the past, I have created myself in a very distinct manner where I am valued and respected. I have near about 5011 face book friends. I am glad to know that there are people who have dedicated pages in my name and moreover 3500 people have liked it. I could achieve this because I maintained space to interact with them and understand their psyche.
However, I started studying deeper about hackers. I was thrilled to see all young techies applying their brains in cyber expertise and aghast to see the planning of Gen next war. Hackers are Faceless, they love to live with anonymity and that’s the reason they bluntly expose others as the victim is not aware anything about the culprit. More over, I would really appreciate if these hackers dare to give their whereabouts before attacking some ones integrity. I am sure they will never unveil their identity because they need guts. In a way, they are toothless cowards. Their arguments and aggression know only the language of sabotaging and damaging other elements.
It’s a secret world with hidden, horrible faces on social networking site. Hackers love to live with power of destruction. They want to become famous by their handles (code name or fake name) and by maintaining secrecy of the original identity. There is no doubt most of the hackers are not only talented, but they are also expert in security. Irrespective of whether a hacker is big or small, generally they have their own website, face book account and twitter accounts too; they make their space over every available social networking sites. They love to be lauded while attacking someone. Since they are faceless and have got nothing to lose; they attack people who live with identity and name. I am sure if they have to reveal their identity, you will find them most abusive human beings on this earth. They do not represent their community in a strong manner. There are multiple groups, blogs, news portals where everyone tries to keep upper hand. At the same time, there is no integrity. Yet the biggest problem is that they are not accepted by large in society. Still there is taboo when you say hacker.Now after so much of experience, I can say that I understand hackers in and out. Now I am well aware of their culture, mindset, every reaction, methods, tricks, and their focal area. When I was introduced to the hidden crust of cyber space, it was quite difficult for me and my team to deal with since we were very new to this domain. My team members are very young and since they possess quick leaning skill, it was very easy for me to train them with all the journalistic skills on political, crime and social beat. But, when it came to cyber space, we all were left puzzled.
We had no idea about where to hit and how to start. In addition to this, too much of dependency on one particular source dragged us in big mess. It was our mistake that we trusted a person who wasn’t matured enough and faithful. Today, things have transformed for me. Learning from all the mistakes made in the past, I have created myself in a very distinct manner where I am valued and respected. I have near about 5011 face book friends. I am glad to know that there are people who have dedicated pages in my name and moreover 3500 people have liked it. I could achieve this because I maintained space to interact with them and understand their psyche.
However, I started studying in-depth about hackers. I was thrilled to see all young techies applying their brains in cyber expertise and aghast to see the planning of Gen next war. Hackers are Faceless, they love to live with anonymity and that’s the reason they bluntly expose others as the victim is not aware anything about the culprit. Moreover, I would really appreciate if these hackers dare to give their whereabouts before attacking some ones integrity. I am sure they will never unveil their identity because they need guts. In a way, they are toothless cowards. Their arguments and aggression know only the language of sabotaging and damaging other elements.
It’s a secret world with hidden, horrible faces on social networking site. Hackers love to live with power of destruction. They want to become famous by their handles (code name or fake name) and by maintaining secrecy of the original identity. There is no doubt most of the hackers are not only talented, but they are also expert in security. Irrespective of whether a hacker is big or small, generally they have their own website, face book account and twitter accounts too; they make their space over every available social networking sites. They love to be lauded while attacking someone. Since they are faceless and have got nothing to lose; they attack people who live with identity and name. I am sure if they have to reveal their identity, you will find them most abusive human beings on this earth. They do not represent their community in a strong manner. There are multiple groups, blogs, news portals where everyone tries to keep upper hand. At the same time, there is no integrity. Yet the biggest problem is that they are not accepted by large in society. Still there is taboo when you say hacker.
One thing I would like to mention here is that hackers are too much into blogging. Countless hackers maintain ten to fifteen blogs each. Their optimizing skills are amazing. They function in chain, one hacker can pass news to other hacker and in no time we may find news everywhere. These blogs are their tools to defame the enemy and or to publicize themselves. I have never seen such trained traits of blogging. Forums is another place where all these hackers discuss many things like latest hacking tools, queries, gossips and whose doing what.
Hey don’t stop here………….
Don’t forget to read “Cat Techie” only on www.cattechie.com , online launch is at 9pm..
Thanks……………………..
Wednesday, July 6, 2011
Vaidehi sachin aka Cattechie to be launched on 8th August






Dear friends and blog readers,
Long awaited book “Cat Techie” will be launched on 8th August, in Mumbai. In the recent past so many issues and controversies mushroomed up all of sudden, from all angles. I though let me answer all those issues through this book of mine, which was dumped in the past, due to certain reasons.
After the launch of this book, you will be able to access online edition of the same. I am publishing the tentative index and rough sketch of this book, but I am sure you will get to read something even beyond this.
Till then, I won’t be available for frequent communication on line. If you guys have any queries or updates, mail me at cattechie@gmail.com or pm me at my Face book account. Both my accounts would be answered by r45c4l.
One more request, stop sending me all sort of threats and blackmailing mails as someone has sent it to me in the name of Anonymous regarding ICA, I am sure this may not be the real hackers group, who so ever..Please don’t repeat.
Regards
Vaidehi/cattechie
Tuesday, July 5, 2011
THis is How Attrition was Hacked



One fine morning Some “James Attrition” reached my inbox with some pastebin link, as usual the link was about plagiarism in the book and it was also about cautioning Indian hackers against me. Being a hacker he was caring for his community and warning them against me, anyways it dosent make any difference, but no issues.. It just hurts.
I have 5011 friends in my “Cattechie” FB account, and 3500 on my public profile, another 1500 in my “Catz” group. I have maximum enemies in friends list, if given a chance they might even cut me in to hundred peaces and erase my even remote existence. But few of them are my real fans, my kids, brothers and real friends too. With them I feel life is really blessed.
When this James started attacking me, some of my fans and friends went on abusing him, he also took them for ride by calling them Cat fake and so on, I have seen one common practice here, if someone strongly stands by me then people call that profile is my fake, and even if my fake comes and abuse me (though I don’t have) they will become fan of that abuser. Abusing me, being Cat critic and Cat enemy is fashion here, and that has become way of my life, I generally don’t visit others walls or groups, I have limited myself to my own group and wall. During these James Attrition days my fan Dnyaneshwar sent me message:
Hi di......i just wanna to tell u something that is......
if u have 3 fake FB accounts and id of victims u can hack the victims ac easily.... so think about responding ur friend request....and make ur ac secure.....i think u r well known about it...
Your biggest fan dnyaneshwar
my pleasure ...to guiding u di...
My eyes were wide open to his message, I was making plans of hack, and obviously none other than James Attrition .. But as you all know my condition ….hacking ..vacking mai kya janu re? a biggest noob in hackers community :P
I answered his message by asking him method of doing it..
He promptly replied saying - First make three facebook accounts and add your slave (he must accept)
- then go to this fallowing link
http://www.facebook.com/recover.php/
There put the slave's email and fill the captcha then it will ask you to enter a new email where you put your email (not the one used on an existing account but a new one)
- it will then ask you the security question ( if you know it very well then just put it and the account is hacked )
But if you do not know the answer just keep entering random words until the limit is exceeded
- Once the limit is exceeded it will ask you to choose three trusted friends
There you put the three accounts you made and added your slave
- It will then send all three accounts the security code
And you go login all three and get the security code and just put it
- Hacked , enjoy now good nightThis is how he explained me how to hack account, I was very much excited and went to Attrition’s account to see in log in mail and got very much upset because that was not visible. If you see Gaurav Singh’s wall, he made a post on June 25the at 7.29pm
i*********s@r*********.com guess :P
After few seconds one of his friend, answered there with proper email address.
That’s how the mission Attrition started, we fallowed all those instructions one by one and got stuck when we were asked to select three friends to receive recovery code for that account..
Except one, the two other friends were not known to me much.. But as I said it was team effort.
Finally we chose three guys and started chasing them, one was not in friends list of anyone of us, but his Cell number was on his profile, we called him and requested saying please friend help me with the code that you received to recover my hacked account, he went out of his way gave us access to his e mail and face account, same way even other friend gave us access to only Gmail but not to Face Book account, we changed his FB account Password and any how got second code, and third one was known to us so without making much fuss and queries he gave us the code..
To gather these codes we spent 23 hours and it was instruction from face book to get those codes and enter in 24 hours, my blood pressure went low, everyone was nerves but at eleventh hour, we filled that form and provided them Alternet email, recovery codes and everything..
We received message, “log on to account after24 hours with new email and password, those 24 hours was real tension.
We thought suppose if this attrition logs in, the whole efforts in vain. Second tension, if we get caught then he might tighten the security options and then there won’t be any chance… (See how little provocations make you do crime and you happily violet all rules and reach your target)
Exactly after 24 hours, I logged in and got access to his mail, my defacement page was ready, the 24 hours long waiting periods I was just planning all stupid thing to express my pain, grief, sorrow and anger..
Oh, my god..Finally I was in his account..
First changed all security options, and removed his post and all that the content which was hurting me..
We all were screaming and hauling like mad people.. Monitored all his activities, I really lost faith in humanity and especially this community… his inbox was flooded with all shit, everyone was trying to build relation with him , all were curious to know who he is? But this smart fellow, answered saying mail me, and add more friends to create awareness against her. All top guns of community were on task against me..
Hummm! mean but ok…chalta hai
One thing he forgot to remove during all this drama, his log in IP logs, which made me, reach the exact person, I tagged that defaced page to them, and as I perfectly guessed, he was the only one to give very filthy comment by abusing FUCK U CAT…
I can understand his aggression, I can even understand his frustration, he was flopped and I gave another name there CAT SLAVE.. That must have really pissed him,
All I can say Sorry, friend my intention was not to hurt you, I just wanted to solace myself from the pain of humiliations and abuses. You may call me Drama Queen as you have mentioned this on twitter also.
that time they bee lined at James profile with screen shots, links, and so on and now they are running towards attrition.org…
I really feel powerful or sometimes a Big ghost, that so many people rushing to bang and fatak..
30 long hours on twitter, only one name and many master to abuse, Cat techie, Naidehi NBC and that is none other than me..
I vaidehi Sachin aka Cat Techi, most loved and hated creature here..
God bless you all with lots of happiness
Keep abusing, keep exposing,
As long as you all keep chanting my name I am Happy for you all
Monday, June 27, 2011
LulzSec - You are missed by your fans

From past 55 days Media is reporting on the LulzSec activities. Most of the time there were just our silly press statements other than the facts. Lulz Security, more commonly referred to as LulzSec. It’s been a long 50- days for the Lulz Boat, those fun-loving hackers sailing under the Twitter handle of LulzSec, their message use to end with love all, love more and some time love. If you are on twitter, I am sure you must have witnessed the funny and humorous messages by them, no hard words no grief, just humor. No, new was the way in which this hacking group kept the media waiting on their every breach, joke and, importantly, tweet. Tweeting out announcements, upcoming targets, jokes and more, LulzSec, has almost 282,000 followers at the time of writing – a figure which has rocketed up in recent weeks. But now I am sure you all must be missing that. Actually they did biggest mistake being too much vocal on social networking sites. LulzSec have taken a lot of joy from tweeting about all the times they’ve supposedly been exposed, only to remain online. The core members – Topiary, Sabu and Kayla were tweeted a lot and that’s how they gave their rivals a tip off to reach them.
This ‘hacktivist’ group was not new - let’s not forget the Anonymous crowd which LulzSec. This group received widespread attention by engaging in “Denial of Service” (Dos) attacks on companies which acted against WikiLeaks. The young hackers group really had huge fan fallowing and liking, they were much more famous than Anonymous. And there are no doubt the half-dozen hackers who make up LulzSec took real interest in the mainstream media’s coverage of their work, as leaked chat logs. Yet the more they attacked, the more they talked it up, and the more enemies they made, and even more the fan fallowing. LulzSec formerly associated with Anonymous. LulzSec also urged fellow hackers with similar agendas to join the “revolution” against large Government bodies and corporations, referring to the spate of attacks recently carried out by LulzSec in some kind of collaboration with the much larger hacking group called Anonymous. Representing a new generation of activists, who use the internet as their grounds of battle, the LulzSec represent the newest group of “hacktivists” who’ve come into the limelight for data theft through cyber attacks. Cyber attacks, and related data and/or identity theft have become increasingly common, with a major such incident being reported every other week.
The attacks, termed by Anonymous as being part of a much larger “Operation Payback”, have come in retaliation to online file-sharing and restrictions on downloading by companies and authorities. InfraGard, an information- sharing organization of companies that collaborates with the FBI towards curbing cyber crime has also reportedly been attacked by LulzSec. LulzSec's campaign was designed to take down corruption in governments globally as well as big business. With recent hacks and announcements, it hardly seemed like LulzSec would ever slow down. Earlier, the group had hacked the U.S. Senate, the CIA, an FBI-affiliated website, PBS, Sony and much more. Those seemed random and chaotic. The group even opened what amounted to a dial-a-hack hotline, asking folks to call with hack suggestions.
In their farewell post, the group admitted it was a small group of hackers: six, in fact. However, it also gave up a huge amount of booty. LulzSec also implied its efforts ended after 50 long days, why would LulzSec quit so suddenly? Earlier in the week, 19-year-old Ryan Cleary was arrested by Scotland Yard. While LulzSec denied he was a member, rival group Team Poison said he was, and Team Poison also promised to expose the identities of the remaining LulzSec members. It's unclear if this is real, but LulzSec made the announcement on its Twitter feed. And they announced their retirement…
Their face book fans, twitter followers all missing them, they never thought of such a painful farewell to their beloved hackers group LulzSec.
Any ways I am verymuch sure, LulzSec retired but the group will definitely emerge in some other Avatara..
Guys your fans missing you..Come back in whichever way you can..
Every revolution has hard path and strong obstacles.
You re cyber warriors, come back with ban
Labels:
anonymous,
cat techie,
cattechie,
Central Intelligence Agency,
CIA,
cyber-attack,
data theft,
FBI,
identity theft,
InfraGard,
Julian Assange,
Lulz Security,
LULZSEC,
MasterCard,
vaidehi,
WikiLeaks
Tuesday, June 21, 2011
#OpIndia Favouring Pakistan?

We are aware of the flop show of operation India and the reason for taking this operation a bad shape is appalling but the sensational fact that came out is, Pakistan hackers always targeted India's top agency and sites. Now days they are just relaxing by being one of the member of #OpIndia and participating in the attacks if necessary. Many such websites are rooted by them in the name of #OpIndia mission. Earlier the focus of Indian hackers was to protest against such practices and there was control over Pakistan hackers by defacing their sites. Long back the peace deal was made to stop these attacks on each other’s countries and all of sudden there was breach of this peace treaty between these two countries. Recently a hacker called “ j4ckh4xor, ( I won’t disclose his full details )attacked Pakistan sites at wrong time and in reaction CBI was hacked. He is the hacker who hacked Appin’s website and many more, unfortunate incidences. This guy is working in a good ‘IT’ company and holding good profile. The way he randomly hacked these sites were not expected. He landed up displaying his immaturity and foolish presentation.
Cyber-attackers who identified themselves as the "Pakistan Cyber Army" have hacked the website of India's top police agency. The website of the Central Bureau of Investigation (CBI) was hacked by programmers who left a message saying that the attack was in revenge for similar Indian assaults on Pakistani sites. The hackers signed their message on the Indian police website: "Long Live Pakistan."
Now the, #OpIndia operation has reduced the burden and tension of Pakistani hackers, because the task what they were executing, now Indians hackers have carried their legacy by attacking their own country websites. Shame on Indian hackers those promoting this kind of operation and asking skids to get involved in D-dos attacks, such as the recent attack on Indian army Website and NDTV website.
Earlier there was deterrence in outside country and enemy neighbors for hacking Indian sites, now they are thrilled with the operation India, the reason you fools are damaging your own country by full feeling their dreams what else you need? Don’t you think even the corruption in Pakistan is also on high end? Don’t you think even the hackers in Pakistan are capable of sending messages to their government? But still they will not involve in any such practices because they love their country and its cyber property in spite of all odds. They are the true patriots having head on shoulders. More over they are enjoying your foolishness, because you people are more than enough to cause damage to India and Indians. Sometimes I really doubt your credentials? Are you true Indian? Or a Pakistan mortgaged soul in India?
Our country is a democratic country and we have larger population than Pakistan, so the problems are quite serious. On entire globe almost every country has some or other internal challenges and issues. But this is the first ever odd example in Indian history that our own country hackers are damaging its online infrastructure. Looking at all this painful saga, I feel like saluting Pakistani hacker for their love and dedication towards their own country.
According to the Indian Computer Emergency Response Team, a government agency that tracks IT security issues, more than 3,600 Indian websites were hacked in the first six months of these After the Mumbai terror strikes, anti-India elements in Pakistan are now planning an attack on Indian computer networks, intelligence agencies have warned. Already Pakistani hackers are trying out a dry run against Indian networks through popular websites registered there after the Mumbai terror strikes.Every time the relations between the two countries dampen, Pakistanis start attacking Indian sites and Indian hackers attack Pakistan websites. But now India has big security challenge because this time the attack is not from Pakistan, it is from own Indian Hackers. If this continues then the group should change their names to “Indian Cyber Attackers” “Gundas Of Hindustan” “Indian cyber warfare” and rest Indian enemy Hackers other small groups.
Reason can be anything but answer is just one and that is …
Ruin Indian infrastructure in the name of Anonymous and challenge its own security.
Long live India, with such traitors.
anything off India,
No one for India
Monday, June 13, 2011
For Investgative Journalists, politicians, police, underworld, and subject of reserch are an inevitable evil in today's situation

J Dey’s death was a very shocking incident. I was restless and paranoid about the appalling conditions faced by journalists while discharging their duties. I was Dey’s great fan as a crime correspondent. I always tried to be as good as he was. I used to compete with Mid-day two years back when I was working with ADC. Whenever there used to be crime story by J Dey, our editor Mobin Pandit used to point out saying look at this. If you have to be a good crime correspondent, you will have to be well resourced and researched. Often, I used to follow Dey’s stories and provide a new angle to it by adding more research and that’s how, we became better reporters. It’s sad to notice ones senior’s death like this. His reporting encouraged hundreds of journalists like me, but his death stole our confidence and faith in this government. Brother of journalism fraternity has passed away. Fraternity; unfortunately is not strong enough to attract common man’s sympathy.
Journalists, politicians, police and underworld is an inevitable evil in today's situation. The current scenario has been prevailing since last three decades. The circular talks of the founding rot in the city police; such as the orderlies of senior officials being parallel establishment. These officials have business partnership with the illegal dens like matka and boot legging. CP says that these parallel power centers sms their parallel paymasters alerting about the possible police raid. To talk of Dey's most recent endeavour into the fortress of oil-mafia; one may recall some lead stories in an English morninger in 2008 and again in 2010 stating how two suspected terrorists who had carried out a murder of an oil adulterator for the benefit of another adulterator were handed over to Indonesian embassy by Mumbai police. The duo was nabbed as their local guide panicked and informed the city cops that their satellite phone usage was worrying.
The IB and crime branch sleuths were aghast to know that after carrying out the murder operation for a city based oil-mafia don; they were doing rekey of the sea shore as their colleagues were to land from Indonesia for carrying out an attack on US embassy in Mumbai. The duo was handed over to the embassy of Indonesia. The attack did take place, what world is this we are living in where our Chief of City Police has to detail out such scenario in a warning circular to the same very people who are beneficiaries of this parallel policing. Wiki leaks have relayed a cable sent by Mumbai Consulate of USA to Washington in which we read an essay on city cops working for Dawood Ibrahim. How can some unidentified persons kill such seasoned reporter for such proximity? And still not traced? The Maharashtra government failed to protect the journalist to hunt down the murderers. Dey’s reporting on the underworld made him a respected byline, but it was his passion for wildlife that drew him to journalism. He authored two books on the operations of the mafia and was on the hit-list of several mafia dons and on numerous occasions received threatening calls.
Despite being aware about the threat to Dey’s life, Police failed to protect him. His stories about government departments and land scams created ripples in the state legislature. He recently exposed a Rs 10,000-crore oil-mafia scam. In crime reporting, the passion to get breaking news sometimes demands a very heavy price, and eminent crime reporter J Dey paid the ultimate one, raising the question whether a journalist is really free to write against anti-social elements. The attack on media persons is not new to this city. Journalists have always been targeted by the underworld, political goons and sometimes even the police. In 1997, known crime reporter Baljeet Parmar was shot at Antop Hill. The firing was believed to be carried out by the underworld gangster Chhota Rajan. Earlier, in 1982, AK Narayan a Ulhasnagar journalist working with Blitz was hacked to death by one Maruti Yadav at the behest of the underworld which was unhappy with his exposes connecting local politicians to them.
Narayan’s body was packed into two metal boxes and left at his own doorstep. Though Yadav was nabbed, no underworld connection could be established. In June 2009, four media-persons were manhandled in Parel by men allegedly owing allegiance to the Bahujan Samaj Party. Television journalist Amit Joshi was brutally assaulted by local goons with sticks and rods while he was covering an incident in August last year. To get hard and authentic news, an investigative reporter has to build sources within the police, as well as among the anti-social element groups. The more we get into this, more the risk. We are not only watched by the police, but also the underworld. Though the risk of being shot or assaulted is an integral part of a crime reporter’s life, it is his family which has to live in the constant fear of losing him. People often advice me to get out of crime reporting and opt for another beat. A sustained campaign against the underworld has often resulted in a death threat to journalists.
The CID isn’t headed by a Commissioner, this is the elite’ wing of the State police. Their website talks of its job profile. The Commissioner of this wing issued a statement a week after Mumbai attacks that CID is not concerned with terror related intelligence. This man was awarded the post of police commissioner Mumbai and later DGP of State. Hasan Gafur; then CP of Mumbai who took to streets while his colleagues preferred to comply with vows given to their wives that they would not leave control room; was shunted out for his rave act. The architects of the miss-communication, fraudulent communication on wireless leading to the death of many police officers and men were considered to be reliable witnesses by the Pradhan commission led an Ex-MLC.
Dey’s demise has given a last alert; and if we do not wipe out the evils in seats of power now; we will not have another alert. Anyone of us can be the next target.
my tribute to J' Day..I lost one of my senior journalist
Investigative Journalists are soft targets

After J Dey’s death, silent moments, pain and tears and whispers are visible. 24 hours have already passed since Dey’s departure, yet the police are clueless about his death. Dey's funeral was an emotional farewell. So many questions around, so much of grief, insecurity, pain was in ambience. Shameless police and politicians marked their presence by facing media cameras but there was no hitch of regret on their face. Condolence messages kept pouring from media house to media house. There was competition in sending fax and smses to media. Finally, a journalist’s death too was encashed by these hypocrites for their own publicity. None of them is worried about the police and home department that is clueless about the crime. It was difficult to believe that their buddy left this world forever. He was shot from close distance and police are still clue less about the unknown assailants. How can this government and police department can just let go such issue? Now they think that journalists should be provided with security but what about the past? Who will compensate for J Dey’s death? A large number of media persons had turned up to pay their last respects to the senior journalist. Dey is survived by his wife Shubha Sharma and mother. Looking at his family I had experienced pain in my ribs. I started wondering that this could happen to my family too for bringing out the truth. A journalist is always a soft target.
In broad daylight city like Mumbai where we boast about better law and order, anyone can take anybody’s life and escape clueless. The Maharashtra government swung into action, ordering special police teams to probe Dey’s death. Will they be really investigating the issue? Do you thing can we ever get to know the real criminal? Despite being compared with Scotland Yard police, the Mumbai police continue to be clueless about the crime. State Home Minister R R Patil, Mumbai Police Commissioner Arup Patnaik, Joint Commissioner of Police (Crime) Himanshu Roy, Joint Commissioner of Police (Law and order) Rajnish Seth and several senior government officers should be answerable for this incidence. Our dumb Chief Minister directed Patnaik to arrest the culprits involved in Mr Dey’s murder but where can the murderer be nabbed? He also has failed to mention whom to be held responsible for this case? Always an eye wash, god knows for how long?
J Dey had been receiving death threats and police were aware about it. How come Chief Minister failed to provide police protection for Dey? The government has provided security to Dey’s family at a time when it has lost it bread winner. It very unfortunate, the Home Minister could have acted and provided security to the crime journalist before he was gunned down. Now what is the use of plan for journalists' protection? Senior NCP leader and PWD Minister Chhagan Bhujbal said that it was very important to get the culprits behind bars. It’s true Mr Bhujbal but how can we put the accused behind bars? Just by giving mere political statements to media or by exercising your powers to really nab a culprit? How can you all ministers become so shameless to come in front of camera and still talk big. The manner in which bullets were pumped into Dey’s body, no law could have helped him at that time. The relevant department will look into it. But whatever happened is sad, bad.
The police, meanwhile, are examining the CCTV footage of Crisil House, which is located opposite the scene of the crime. The footage, though, isn't very clear because it was raining heavily at the time of the journalist's murder. So now is there any other way? Or any other excuse for media? The post-mortem report of Dey shows that five bullets were pumped into his body and one bullet that hit his shoulder did not come out. He died due to the bullet injury. Five bullets were pumped into his body and there was no noise? The attack on J Dey was undoubtedly an attack on the media. The police say they can’t establish a motive. Well, Dey had been covering the underworld for years; he’d written on the diesel mafia. Two leads for you, Commissioner Arup Patnaik. But we’re not surprised. The police force is flabby, too busy with rallies and subordinates’ cell phones. It, therefore, came as no surprise at all that in recent cases like the Kurar murders, the local officers did not even want to take down a complaint. Is the Mumbai police inept, poorly led, or just plain corrupt? Difficult to say.
J Dey was killed in a centrally-connected neighbourhood, in broad daylight and within walking distance of a police station. It adds up to one conclusion: in Mumbai, no one is safe. And when a citizen’s physical security cannot be guaranteed by the State, then that State has forfeited its right to govern. Bullet riddled bodies don’t make a crime reporter cringe. When I looked at J Day’s dead body I was scared, because all these days even I was doing investigative journalism, now also i am doing my reserch on Hackers, they do defametary blogging,they abuse and some times even make calls to me and threatn. If you want to reach the fact and fight odd, then your destiny is death. It was an association that lasted right unto his death. Those were the years when J. Dey was still trying to find his footing in journalism. Enough is enough. Things need to get back on track, and we can start with the enactment of stringent provisions against those who attack the media. Or we can be one of those banana republics where dead journalists are commonplace.
Sunday, June 12, 2011
Don’t spread rumors; we are Anonymous

Today I was really shocked to see one screen short floating over face book, mentioning some statements released by “Anonymous” that they are winding the #Op-India because of NBC and Cat. How can one release such statements? For some time if assumed one can understand about Cat, but why NBC? And the most important thing, can anyone really control over Anonymous? Wow I never knew I am so strong that I can halt a mission like #Op-India.
NBC is an independent news group which has got nothing do with any sort of activities here, just because you are exposed, you cannot drag my company in unwanted issues. I strongly support the original group of Anonymous, and always against the fakes posing as Anons and sabotaging my country.
In the recent past the news about Anonymous attack on Indian army website hit headlines, every one of this country was misguided. Overnight all hacker and common man of this country started hating this group because of rumors spread about them. Anonymous has made common cause in India with an anti-corruption movement.website of the National Informatics Center (NIC)was hacked by Anonymous but they never attacked Army and Indian Registrar. These were simply misused by Indian hackers. And these fake Indian hackers are planning to target Congress website under the cover of Anonymous’.
Operation India page on Facebook, was criticized by a number of users after the announcement that they hacked Indian army's site. Face book users were fuming with the thought that Anonymous attacked Indian Army. Why Anonymous should damage these sites to convey their message? This news was published on “The Hackers News” and then it reached everywhere, how come hacker’s news was so sure about the hack is by Anonymous?
The fact is that Anonymous never attacked defense sites. #OpIndia, started with great cause to fight against corruption, voice for common man and fight for media’s freedom. Looking at the popularity of this group and their good work, I always thought that after some time. Many small hackers groups may join them and emerge as one of the strongest hackers group on the Globe. That day each country will have unseen watch dogs over corrupt government to control their activities and raise voice for common man. But I was wrong. Group of Indian hackers in the power greed and with malicious intentions, started attacking their own country websites in the name of Anonymous. These Indian hackers hacked our Army websites, private institutions, media group, and an individual. They were randomly attacking everyone in the name of anonym

Unfortunately few Indian guys and the team of “The Hackers news” started conducting many activities by using the name of Anonymous. They did this for their personal profit, not for the noble cause which they ware pretending to be. In short time those Hackers fooled some innocent Indians. In short they got bad name to #OpIndia. Finally there was fake declaration about the closer of such Nobel mission.
One of my facebook friend of Anonymous group” Weare Legion’ told me that “we are anonymous, we are peaceful, anyone promoting or using violence is not anonymous and has been sent to give Anonymous a bad name in the press, our goal is freedom and peace for all, if you agree then you too are anonymous. (Indeed this was better way of living with ethics) who gave these Indian hackers freedom to attack our own country websites? Why Anonymous is quite, in spite of so much mess created in their name? Why are they not showing these hackers their place?
Today when I was discussing few things with Imnull0 (hacker of Anonymous group) and he gave me big shock by emphasizing over the facts. He told me that some bloggers and especially “The Hackers News” played dirty role in spreading all wrong messages and fake news on behalf of them without their consent. When Anon got to know the facts that THN is spreading false news including on FB, Twitter and his blog they decided to take the call.
THN was badly insulted by the Anon at IRC and he ( Mohit Kumar Vashisht) was asked to accept his mistakes and correct them by removing all the false claims and statements that he has have released in the name of Anonymous. They also made it very clear that they were never involved in the hacks carried out in India in the name of Anonymous; some of the hacks are Indian army website, NIC website, Rahul Gandhis website. Now they are at the verge of hacking Congress websites by same modus operands. These attacks are carried out by none other than the group of this so called news blogger and it’s very much possible that there can be involvement of some other hackers groups too.
Anonymous has warned them not to make any statement and carry out any attacks by the name of #OpIndia without consulting the others who are in #OpIndia, they have even told them in clear words that not to make any pages on FB or any other social networking site. Anonymous also realized that the allegations made on Cattechie, NBC and others are nothing but a false plot to divert the attention and settle their personal rivalry. Shame on THN and those supporting such groups, they are playing such dirty politics against a journalist just because she has the guts to raise her voice against injustice and trying to stop these fake people crossing their limits.
Well now my question is that, what should be done with “The hackers News”? And the hackers group working with them for hacking Indian websites? They are the traitors and threat to our country. Long back some one wrote about him stating that he is a JIHADI, that time I felt very bad, but now I am realizing the fact. These guys are terrorists working against the nation. Not only that they are shame for the hackers community as they are ruining the name of Indian Patriotic hackers.
In my capacity I will always support #OpIndia crusade against corruption, and I am sure, at any cost this campaign will never halt, they will just walk their way keeping all odds aside. They are Anonymous, the revolutionaries and legends. They have ethics and they can, and you cannot stand by Nobel cause.
If you cannot support the cause, then just stay away, but at least don’t defame them by sabotaging their mission.
you have back stabbed them; now expect the unexpected.
They are Anonymous.
They are Legion.
They do not forgive.
They do not forget.
Expect them
Friday, June 3, 2011
NBC-Hacker5, Kaizen and Hackers

Face book has one of the biggest community of hacker across the country, In India the term hacking and intentions are yet not very much clear and specific. Indian hackers lack unity and integrity. Hackers are divided in teams and small groups. 40 percent hackers are in the industry of producing hacker, I mean they are having their own seminars, classes, and certified courses. There are many hackers lured in unethical activities.
Certified Ethical Hacker’s certificates are bought and purchased. There is no control over these examinations and their authenticity is at stake. Many of them are working with IT sectors, and some of them totally dedicated to research, yet keeping there one foot in underground activities. Indian hackers are blessed with potentials, skills and self learning abilities. Only India has an average of skilled hackers between the age group of 14 to 17. At the age of 16 some of them even write their exploits, codes and scripts. These particular groups of hackers are form middle class or upper middle class families, they lack papers. They don’t have certificates to show but their skill can slam the claims of so called demigods of hacking community.
China, Korean and Us government already announced about their own cyber army, they train number of hackers at government expenses. Israeli and Africans hackers are known for their dedication and eccentric approach towards the cause. Each country globally has one or other national issue and the hackers of that particular country and dedicated to that cause and nation. They don’t harm their own country; they won’t become watch dogs for their own country. They are the loyal patriots and guards of their cyber space. Indian hackers lack patriotism, there are some small time group of hacker claims to be patriotic hacking community, but their patriotism is limited to the defacement of Pakistanis websites. They just deface randomly and leave their message for Pakistan and its hackers. Most of the time these messages are nasty and not worth reading. If this young generation of hackers given an opportunity and freedom I am sure the cyber space may come under secure zone.
Chennai, Bangalore ,Bombay ,Pune and Delhi are the den of hackers. Either they are working with private firms, or seeking education. Day time they are committed to their routine but at night they become cyber terrorists. The ethics are vanished, the focus is lost, and some of the groups even became scavengers and attacking Indian sites to set personal scores. They are attacking private firms and individuals for revenge, fame and publicity. Neither they are loyal to security industry not to hacking passion. This is the biggest dilemma of Indian hackers.
In the recent past few groups are stuck in identity crises, few old times group got in rivalry and others lost in the glory of other side. Youth of this country learning hacking through open source and Google, they use available exploits to hack their own country’s resources and properties; there are hundreds of forums and news bulletins and blogs, providing open tools, scripts and exploits. All this material is most of the time used on Indian servers. It’s high time we need to declare theses forums and communities as anti-national, they are traitors and threat to our cyber space. Laws are stringent but hardly applied; there is no watch over such practices. Cyber cell across the country lacks latest updates. The staff is old and every day updates are beyond their reach. Other than the power of law and order they possess no such extra ordinary skills to nail down such open sources.
There are number of good hackers working in call centers, some in cyber cafés and some in low profile organization, and many land up becoming instructor in Hacking classes. If we go by statistics India produces on an average thousands of hackers in the period of three months. If you go by annual production then I can say it will reach in hundred thousand. Appin, Inobuzz, tech defense, whagela’s and fadia’s are lured in this industry of producing hackers, the irony is that these hackers have no jobs, opportunities and end of the day India still has challenge over cyber security issues.
Instead of crying over issues we thought of resolving problems in our capacity by providing jobs to, skillful hackers lacking papers, gave them a publication Hacker5 as mouth piece, unfortunately our concern was misunderstood and we became victim of illicit hackers and their traits. At the end I am proud to say this magazine is reaching in remote areas, where two hours electricity is a biggest challenge. These students have no open source to acquire knowledge. There are n numbers of young students, got platform to reach readers. Complimentary copies of Hacker5 reach 17 such villages where education and resource is biggest challenge. All over Mumbai library its reaches free. There are so many students request us for free copy, because they can’t afford it. I think minimum 200 hackers in this community will agree to what I said.
We have number of TV channels, news available on websites, but still crave for print (news paper). Just because open source of learning is available for those who can avail these services we cannot neglect 40% that Indian population still underprivileged for electricity, education, and finance. If you have hundred rupees to waste then you are not my buyer. If you invest hundred rupees to make this cause reach in remote places they you are my buyer.
Let them be privileged with your support
the only profit is smile on their face and support to live with dignity..
I never wanted to disclose this, because charity is never disclosed, we have our NGO “Aadhar”, I don’t believe in taking funds and donations from other to do my part of duty. I am born as human on this mother earth, and giving back to our society in own capacity is my own moral duty. We donate 30 % of our business profits to Aadhar. So that the needy and help less can live with dignity and care.
Oh! One more thing, if at all you all would want to visit our new family of physically disabled 500 members at, Jai Mumbai viklang santha, Dr babasaheb ambedkar nagar, Meeraa road east..You are welcome. These families are supported by NBC my organization. The young kids getting education, youth employed at our company in their own capacity. Distress woman and old people are provided with possible best facilities. I don’t know whether you are aware or not our NBC family members are between the age group of 19 to 30. We all need to go long way, we just started our journey.
I don’t know about other hackers, but I am proud to say r45c4l,ch0ta, Kai Farmer, Doper, Sid Shenvi are definitely the reason for making above person’s life worth living, and he is none other than OUR family member, Imran Mullah.
business or profits is not my motto, it’s one of the aspect. There are many people even supported by this blog income. Please visit us..They just need you time, your love and your attention, because YOU can and THEY cannot …..reach you..
we will, we can
my special invite to l33t hackers (anti-Indian hackers of india) come and see how beautifull is life when you share and care for fellow Indians.
Monday, May 23, 2011
Similarities of Underground and underworld

All these days I am doing research on Hackers, their communities, their way of functioning and their life style. I noticed lots of similarities between Underworld Criminals and hackers. For example hackers and mafia’s both uses handle and they are scared to disclose their original names. Their identity is either their group or their handle.
We have so many known criminals like chota rajan who’s actual name is Rajendra Nikhalje (nana), Dawood Ibrahim (Bhai) Pav Takla (Chota shakeel) Fahim mach mach, saleem langda, Arun Gavli (daddy) Doctor is handle of Gavli Gang criminal, who use to executive crime operations with hundred percent accuracy. That’s why they use to call him Doctor. Fahim has habbit of arguing that’s why he was called ‘mach mach’. Langda has one leg short due to polio. Chota shakil has wisdom hair cut so he was named as “Pav takla” (quarter portion of head balled).
I don’t know the specific reason for Hackers having their particular handles but they are known by that. R45c4l, micr0, H4x0r, c0de crack3r,silent poison, dark l00k, nirvana, snake, d4rk code…there are number of handles of these hackers.
There are mafia communities like D company, Rajan gang, Gavli gang, Naik gang, mudliar group, haji mastan group..Harya Narya gang...these are the groups and communities of mafia’s. Their community members use nicknames both to separate insiders from outsiders and to stymie potential executions into their. They use violence strategically by planning each action by their commanders. These commanders are like admin in charges or group leaders.
Likewise Hackers too have their groups ICA, ICW, l33t (original) l33t (fake Indian idiots) AH, Punjabi hackers. PCA, Pakbugs (Pakistan)and the other side the elite groups like ICW, Garage for hackers, Anonymous, Anti sec, Nirvana, Chaos (Germany), KHG (Kosovo), Iranian cyber army, Red Army ( china) th3j35t3r…
PCA and Paksbug are Pakistani hackers group, their prime target in India and their fight is over Kashmir. They never harm or hack their own country people or group. They are Pakistani patriots. Anonymous group fight for freedom of speech, freedom of media and freedom of press. One more reason of their fight is privacy and right of common man. You won’t have a single example where they have targeted common man or business group or specially such organizations where hackers are recruited or assigned jobs. They have no website; their messages are with cause and concrete statements addressing administration and system.
KHG fights for Kosovo and freedom of their country, Anti sec against the exploits writers and antivirus companies. Iranian cyber army for the freedom of their country, they have ethics and principals. These groups are highly skilled groups with no showsha, no personal attacks, or no bad business. Most of them are with patriotism.
African hackers are like Robin Hoods they are mostly in financial crimes, carding, money laundering. Their country is poor, they lack opportunities and scope. This is how they earn their living and support many by doing charity towards community and churches.
There are some groups of hackers work for charity. 80% hackers in Indian jail are Africans.
A famous group called “Hackers for Charity”, known for their utmost contribution towards underprivileged
The original l33t hacker community and forums are against piracy, porn and corruption. They are the most educated and skilled hackers with lethal techniques. Unfortunately some Indian goons are tarnishing their image by copying the name l33t.
Recently formed Indian l33ts are the bunch of arrogant brats, born in bank corrupt families; parents are in financial scams, one of the so called l33ts father is a government employee, other ones mother is caught in scam. Some of them call themselves panther, lion, wolfs and codes. The most pathetic amongst them are Gujrat and south ones. They copied name of famous l33t group but couldn’t even reach to any of their basic qualities. There is one Face book profile of this so called l33t, I wonder how can they survive so shamelessly by copying the name of legends? They prefer to send hard-to-fake signals about their badness and their inability to fit in any part of the larger world: hence the tendency toward showing incompetence at tasks other than criminality, as seen in the recent past. Their tendency toward extreme show off and the participation in criminal events is quite peculiar. They attack all famous people and try encashing out of them. They are Indian anti-nations groups of hackers. You can see some of the same behavior in almost any new group of Indian Hackers.
The other side’s there are Mafia’s like Chota Rajan is known as patriot don, because he provides information about underworld to intelligence department. That group is never into drugs or flesh trading and fake currency. No doubt he is criminal and is on the top of most wanted list. But still his crime has not affected innocent average Indians.
D’company Indian anti-national group, they are always in favor of Pakistan and support group of Taliban. They have caused maximum loss to our country and innocent citizens by bomb blast, drug peddling, and fake currency. Harboring terrorists and murders they damaged Indian securities.
The legend groups like ICW, HMG and the original members of it, always had agenda of securing nation. They never sabotaged their country interest. They never believed in cheap defacements, and their hacks were never in quantity or random that was quality, all high profile hacks.ICW is the group even signed peace deal with Pak hackers, bur letter on the new group of hacker damaged the deal and in reaction to action even Pakistani hackers start random defacements.
As we all know Garage (G4H) is community of professionals and they don’t support hacking they only support knowledge sharing and they can’t stop anyone to register with garage as its public community. So far I have never witnessed any defacement or any hacks by garage ever, but some registered members of garage are bringing bad name to this unique group and they need to be strict over registrations.because its open group and any one can be rejistered there.
Unfortunately there are some hackers from these well known groups joined hands with the groups like Indian fake l33ts, and bypassed the ethics of hacker’s community. There is so much to write on this, but rest of it you can read in my soon to be launched Cattechie book.
One more common factor, In 2003 a journalist Tirodkar who became tipper of police and double crossing mafia’s and police had helped the mafia locate potential victims for fake encounters and to settle nefarious deals. However, later he was charge sheeted under MCOCA,and released on bail. He violated journalistic ethics to gun down criminals and expose fakes in Police department. He suffered a lot there after by police and mafias. But his faith in judiciary and his national interest got him scot free from all such clutches.
Here again I being journalist facing all odds but one day will reach to my goal by eliminating odds and antinational elements from Hackers community.
All these days I worked as political and crime correspondent in various publications. Investigations and research is my favorite subject. Detecting crime and criminals is my passion; hitting headline with crime story is my Job. Once upon a time there use to be competition between Mid-day, Afteroon and Mumbai Mirror. Those days, remaining on front page with lead crime stories was a challenge. I used to bother so many officers for info, at the same time police informers and private detectives and intelligence sources use to give me tip off to reach my goal. I was blue eyed baby of by senior editor Mr.Pandit.
Now when I am working on hackers, my mission is yet to be accomplished because I am yet to reach my goal. Because the Codes of the Underworld and underground yet to be encoded.
Thursday, May 5, 2011
A hacker is an aesthete?

A ``computer hacker,'' is someone who lives and breathes computers, who knows all about computers, who can get a computer to do anything. Equally important, though, is the hacker's attitude. Computer programming must be a hobby, something done for fun, not out of a sense of duty or for the money. (It's okay to make money, but that can't be the reason for hacking.) In one sense it's silly to argue about the ``true'' meaning of a word. A word means whatever people use it to mean.
The concept of hacking entered the computer culture at the Massachusetts Institute of Technology in the 1960s. Popular opinion at IT posited that there are two kinds of students, tools and hackers. A ``tool'' is someone who attends class regularly, is always to be found in the library when no class is meeting, and gets straight As.
A ``hacker'' is the opposite: someone who never goes to class, who in fact sleeps all day, and who spends the night pursuing recreational activities rather than studying. There was thought to be no middle ground. What does this have to do with computers? Originally, nothing but there are standards for success as a hacker, just as grades form a standard for success as a tool. The true hacker can't just sit around all night; he must pursue some hobby with dedication and flair. It can be telephones, or railroads (model, real, or both), or science fiction fandom, or ham radio, or broadcast radio. It can be more than one of these. Or it can be computers. the word ``hacker'' is generally used among IT students to refer not to computer hackers but to building hackers, people who explore roofs and tunnels where they're not supposed to be.
There are specialties within computer hacking. An algorithm hacker knows all about the best algorithm for any problem. A system hacker knows about designing and maintaining operating systems. And a ``password hacker'' knows how to find out someone else's password. Someone who sets out to crack the security of a system for financial gain is not a hacker at all. It's not that a hacker can't be a thief, but a hacker can't be a professional thief. A hacker must be fundamentally an amateur, even though hackers can get paid for their expertise. A password hacker whose primary interest is in learning how the system works doesn't therefore necessarily refrain from stealing information or services, but someone whose primary interest is in stealing isn't a hacker. It's a matter of emphasis.
Throughout most of the history of the human race, right and wrong were relatively easy concepts. Each person was born into a particular social role, in a particular society, and what to do in any situation was part of the traditional meaning of the role. This social destiny was backed up by the authority of community or state. Each person makes free, autonomous choices, unfettered by outside authority, and yet each person is compelled by the demands of rationality to accept ethical principle of a hacker. Disputed questions of ethics, like abortion, are debated as if they were questions of fact, subject to rational proof. The choice between the ethical and the aesthetic is not the choice between good and evil, it is the choice whether or not to choose in terms of good and evil. At the heart of the aesthetic way of life, it is the attempt to lose the self in the immediacy of present experience. The life of a true hacker is episodic, rather than planned. Hackers create ``hacks.'' A hack can be anything from a practical joke to a brilliant new computer program. But whatever it is, a good hack must be aesthetically perfect. Ethical Hacking, this phrase is very misleading. What he has discovered is the Hacker Aesthetic, the standards for art criticism of hacks.
In India most of the hackers are mostly undergraduates, in their late teens or early twenties. The aesthetic viewpoint is quite appropriate to people of that age. An epic tale of passionate love between 20-year-olds can be very moving. A tale of passionate love between 40-year-olds is more likely to be comic. To embrace the aesthetic life is not to embrace evil; hackers need not be enemies of society. They are young and immature, and should be protected for their own sake as well as ours. In practical terms, the problem of providing moral education to hackers is the same as the problem of moral education in general. Real people are not wholly ethical or wholly aesthetic; they shift from one viewpoint to another.
Some tasks in moral education are to raise the self-awareness of the young, to encourage their developing ethical viewpoint, and to point out gently and lovingly the situations in which their aesthetic impulses work against their ethical standard.
The term hacker, most having to do with technical adeptness and a delight in solving problems and overcoming limits. If you want to know how to become a hacker, though, only two are really relevant. There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest net experiments. The members of this culture originated the term hacker. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker.
The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music actually; you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them hackers too and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term hacker.
There is another group of people who loudly call themselves hackers, but aren't. These are people (mainly adolescent males) who get a kick out of breaking into computers and phreasking the phone system. Real hackers call these people are crackers and want nothing to do with them. Real hackers mostly think crackers are lazy, irresponsible, and not very bright, and object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer. Unfortunately, many journalists and writers have been fooled into using the word ‘hacker” to describe crackers; this irritates real hackers no end.
The basic difference is this: hackers build things, crackers break them.
Saturday, April 16, 2011
The SAGa of server hack

The hacker mindset itself is great victory and debacle for their growth. When my server got hacked, there were many hackers settling the scores with their rivals and some of them were sighting the reasons for hack, many of them felt bad and few of them thought I got it hacked for publicity. Anyways whom to give credit or whom to hold responsible for this hack is still a big question.
Look guys you all have always blamed CAT for every good bad ugly reason, but have you ever thought the guys amongst you are digging your graves and providing your info to us. I have not taken any legal action because I trust your potential of hacking. More over no hacker can eliminate anyone’s online existence. This is just a myth. With the blessings of Google, there are hundred pages dedicated to me, there are thousands of pages talks about me. There are hundreds of youtube clips, shows about me. Whom are you going to stop? And whom you will hack? What if I create beautiful blogs of my publications and create social network profile and do our publicity? Will you be able to stop me?
NOP ….No one can eliminate or finish someone’s online existence ever.. The reason everything has limit to it.. And if suppose to reach all these places Hackers make special efforts and try doing what they want to do..I think I am the most important target and I can scare them..lolz! guys be focused on your carrier, there are better things to do, utilized your skills and talent to display in better fashion, that may benefit you with better future..Hacking cat :P no gains..I am sorry to say this..but you are making me feel very very great and important..now let me come to main topic A Smart guy pm us saying “ It’s sad to hear about Cat Techie server getting root -> http://www.zone-h.net/archive/notifier=cattechie_hacked, The guys who did it approached me and said, even u r against r45c4l, time to fuck them... I thought they were kidding but, it actually happened... they are from inj3ct0r and 1 of them managed to steal openSSH 0-day which was written by anti-sec (romeo)... guys are from USA... (Indians in USA).... all I know is, they are pissed on Gaurav for 1 reason (calling ICW a group of skiddies)... and glorifying himself... as it was in one of the mails of him to inj3ct0r where he requested for r45c4l at inj3ct0r email... and they hate r45c4l for one more reason -> teaming up with cat-techie...!!! today morning I got an email saying 'congrats' but, I am not impressed in fact, I felt bad coz once upon a time... I used call r45c4l, my bro...I am trying to mitigate the dispute whether cat and ras knows it or not... coz I know these guys and they are powerful... with reach everywhere.... I mean, everywhere...I am trying to find a patch for that 0-day or will make it and once I have it, i will mail it to u.... and trust me, openssh 0-day is INEVITABLE! 99.99% of the servers are vulnerable to it...!!! Someday try to research on milw0rm and threat to milw0rm by anti-sec coz of openssh 0-day it’s a MasterCard which has to be broken somehow! For time being ask both of them to be quite because these guys i know are at their HIGH!!!! Let time go by and yes... u can share this with cat but not with rascal...
Before the real fun for the hacker begins, three essential steps must be performed. ... If you know yourself but not the enemy, for every victory gained you..People on stages are called actors. All they are required to do is look plausible, stay sober, and say the lines they're given in the right order. Wisdom of Hackers is a untrustworthy force in today's world. A finding shows that a small group of people accounted for a large number of ratings. In other words, as many have already begun to suspect, small but powerful groups can easily distort what the "Hackers" really thinks, leading groups to often end up appearing extremely positive or extremely negative. The so-called "wisdom of the Hackers" has been called into question. The term, which implies that a diverse collection of individuals makes more accurate decisions and predications than individuals or even experts, in Predictive cyber world, it’s not all gamblers who participate, or all people who follow them, and neither are its participants widely distributed throughout the country, and its mostly black males.
At his second hint
I really ‘smiled’ …he again PM me saying “Hmmm... I am not anti-sec guy :) U wanna know who did it? Promise me, you won’t harm him. Also, I will secure your server... server is not ur bread and butter but defame will affect the growth... if u must know.... the people who did it, I call myself their 'daddy'... I know the toy they are playing with and I can the shield that will work.... someday if u need me.... smXXX XXXXX will be at ur service :-) he is not brother :) and remember, in this nasty underground...trust no one, own everyone. for godsake!!! dont call anyone brother... I dont remmeber all of them but, he told many... u have a pic in which u say, save hackers join cat army... he dislikes denaming any group... may it be anything.... and..... rascal is one of the reason, they dont really like him.... his handle is nullzer0 and is usually found in freenode irc and smashthestack irc.... real name : Roshan L****NI, location : Mumbai :) age : 28 years old groups : inj3ct0r and hackforums education : Diploma 2nd year mech (drop out) current job : working in mall (…………..)... luck with girls : as his handle null and 0 .
so it was not made by u? that pic? actually i ahvent seen that pic so cant comment but, trust me... hackers dont like gettined 'owned' by anyone. do no harm to him even if u find him, i know this has gone legal... sorry am not saying it :) rest assured, I can arrange a meeting and u can discuss further ..... try to think 'creative' which u will.... this guy is a charm! however, no matter how much he might like u (which am sure he will) he wont give out his toy... we know each other since 4 years... yet he denied that scripot... it was a server hack not web hack and trust me, u will waste time in forensic... it has privoxy auto enabled... that’s all am giving :) he is blessed guy... but, this is not the end vaidehi... he is not 'enough'... he will pounce back.... and he is getting script to reach subnets.... coz i remember he once said.... that ur bread and butter is press and ur press uses computers... i discouraged him , he may not do anything but, am not sure... i honestly feel, u must talk to him on irc.... tomm 8pm indian time... "u must talk to him on irc.... " - i said (learn to befriend the robbers :)
Third story
Last night I called u my friend so remember, NEVER EVER even doubt that I will do wrong to you... There is one guy who hates r45c4l and he is in London , living in 'South Harrow'... and he leet than you could imagine! Not on facebook or any social n/w sites, not on full disclosure sites... For more info, ask r45c4l about 'Jeed'... and he will tell u... rest assured, never even doubt that I would do anything 'unacceptable'.... :-) and if again some damage happens.... dont come to me saying i did it... am saying in advance, am not coming in ur way.... u dont come in my way ..Happy? :)
These are the three different stories given by him. let me speak my mind, yes I gathered about many hackers, it’s not only one hacker in particular, that time I was just a journalist and researcher. My focus was to get in unknown world and find answers to all hidden crust. My question here is why you all blame me? Why not those people who mortgaged their own communities pride in my hand? It was just impossible task to reach any hackers personal life unless and until a journalist have resource with in that community. It’s your community to be blamed not me.
Anyways Slowly slowly I became one of you. Whatever reservations a common man and authorities had about hackers, I tired becoming voice and represented everywhere in my own capacity. It’s not you but I have never exposed any hacker or his personal life to anyone. I am rich by pocket; but I am really rich by people and friends. My profiles have more than 5000 friends, my public page has another 3000 likes, and all my groups have thousands of members. I have an organization, where 90% of staff are from middleclass background, we all alike people has set this firm and came up with flying colors and set a trend in Media market. We all are between the age group of 19 to 30.
I never thought bloody this CAT would be really subject of discussions, and will overnight gain name (Good, bad and ugly) and fame and all of sudden become famous. It my confession, I feel honored because; many young web developers, designers, hackers and writers are empowered by my organization. I have never harmed anyone, and known for my integrity. That is what I have been doing and so far I have never crossed my limits. Let the hackers make my server a sports ground, about this I am openly going to challenge some people on 1st may 2nd anniversary, I don’t play hide and seek. And don’t approve the same. Control your fellow beings, they are mortgaging you.
I wish you all the success and bright future. Anytime you need me I am there by you
Friday, April 15, 2011
Cell Phone Tracking Disadvantages

Cell phones have changed the way we look at communication. It is a convenience that has allowed us to keep in touch with others no matter where we are at the moment. Now with the addition of GPS, we have the ability to locate people. While it seems like a good idea in many situations, it can be abused. An ex-boyfriend, relative, or stranger may have malicious intentions. There is also the concern about identity theft. It can be dangerous even if you think it will not happen to you.
For the most part, we want to think that law enforcement and the government have our best interests when it comes to personal safety and security. The FCC requires cell phone providers to have records of their customer location information. In addition, current cell phone tracking laws give them too much leeway since a cell phone trace can be granted even without a warrant. Only general information needs to be provided to a judge or say that it is part of an ongoing criminal investigation. Does this mean that cell phone tracking used in this manner a violation of our right to privacy? It is a gray area since the definition of a criminal activity is not always clear. Like any other consumer product with new features, cell phones with GPS make them more expensive to purchase. It is now becoming a standard requirement that cell phone manufacturers install GPS in their products.
Other Cell Phone Tracking Disadvantages
While cell phone tracking can be very effective, it does have a couple of limitations. GPS enabled cell phones cannot be located if your phone is not on. Since most people are aware that tracking cell phones is possible, individuals who abduct someone can simply get rid of it. A person can also disable the phone by setting by what is sometimes called the “hide” feature. Some may even have the option to allow tracking only in 911 situations. However, some consumers may not be aware of this feature since many cell phone manufacturers do not put it in a convenient place for you to find. Another problem is that cell phones can have reception problems. Signals can be lost in particular locations like among tall building or in heavily forested terrain.Cell phone tracking is a powerful tool, but there are disadvantages and limitations. As with any new technology, there will always be someone who will try to exploit it. By being aware of how things work, the better we are able to take steps to protect ourselves to avoid potential problems.
Of course, cell phone tracking constitutes a major invasion of privacy, regardless of whether the intention is good or bad. Are you sure that this is the right course of action? Whether you're trying to figure out who that obnoxious prank caller is or attempting to track your child, it's a thorny web of should-I-or-should-I-nots. Consider whether this is really what you want to do before proceeding.How most cell phone tracking works is typically by triangulating the “pings” made by the cell phone to the nearest cell towers. GPS-enabled cell phones don't require cell towers, and may be located anywhere in the world by satellite triangulation in a similar manner. Cell phone companies are required by law in the United States to be able to locate cell phones to an accuracy of 100 feet, so that emergency vehicles will be able to locate the caller in need.
Wait, so what's the problem? Well, cell phones are notoriously difficult to track, just inherent in the nature of the device: they're not tied down to a fixed address as with landlines, but rather can roam freely. So, there's no easy directory with a name and address associated with every phone number, like old telephone books, let alone some accessible method to track individual cell phones in real time - at least one that is available to civilians. Here’s an overview of some of the possible solutions:
Tracking Websites
So, what about all those free cell phone tracking websites that seem to be cropping up? The ones where you just have to type in the number in question? Can't they track the location of a mobile phone?Frankly, no. I have yet to stumble upon one of these websites that actually works. From sites like “Reverse Phone Detective” to “Track The Number”, none of them provide accurate location information. While I personally have not investigated the fee websites, most accounts seem to point towards scams that are just out for your money—and won't tell you what you need to know.
Caller ID
As you might imagine, caller ID is far more likely to work with landlines than cell phones. In fact, there really isn't much by way of caller ID for cell phones at all that provides anything beyond the number—and even that won't work for restricted numbers.Even the best caller ID software on your cell phone is not guaranteed to work all the time, never coming up with a name associated with the number that called you, let alone tracking the location of the call. Mostly, this is because disparate cell phone companies have not been able to work together to come up with a directory of cell phones, partially due to public outcry over invasion of privacy.So, that's one less piece of data that you're able to acquire from a cell phone number alone, let alone real time location!
Google It!
If you're trying to figure out the general location of the owner of the number, as opposed to real time tracking, a good old (or not so old) fashioned Google search will probably do the trick. The person might have been un-paranoid (or unaware) enough to have it publicly posted on a social networking site, along with other potentially location-identifying information. Again, this is a small chance, and it won't work in real time.
Hacks
Experienced hackers don't have any problems with any of this. It is perfectly possible to track a cell phone's location - after all, the cell phone companies do it - even if you just know the number and have had no physical access to it, without the user having any indication of this happening. While this hasn't reached epidemic levels, the possibility is there.
Cell Phone Tracking Software
The only guaranteed way to really track a cell phone is through some sort of installed software on the device itself. This can be anything from a child tracking service, such as Verizon's Chaperone, to fun phone apps where you can track your friends' locations.
However, this generally requires physical access to the phone, and consent of the user—both of which might be difficult to get, and probably defeats the point of what you're trying to do here.
AccuTracking
AccuTracking is a software program that is compatible with many cell phone makes and models. If you have Boost Mobile, a BlackBerry, a Windows Mobile phone or one of the many other GPS-enabled phone models, you can download the free Tracker to your cell phone. The AccuTracking service was initially free. However, they have seemingly met the limit of free accounts and now offer subscription packages that range from $5.99 to $9.99 a month. The first month of the service is free, so you can use the tracker for a few weeks at no charge and determine whether you wish to continue using it.
The online tracker offered by AccuTracking has numerous cool, helpful features. When you log on to the website with the account associated with the GPS cell phone you wish to track, you will be provided with a map with real-time locations. You can check the recent history of locations, which will not only give you the time at the location but also the speed limit traveled between locales. If you have several GPS cell phones, you can use the tracker to watch them all on one account. A feature that many parents might appreciate is the "geofence" capability. You can set up a geofence, which is a virtual boundary for the cell phone user. If the GPS cell phone is taken outside of that boundary, you will receive an alert.
InstaMapper
InstaMapper is an online GPS cell phone tracker that is currently 100% free. After you register online, you install the InstaMapper application to a GPS-enabled cell phone. Then, when you log on to the website, an interactive Google map will appear with the location of the cell phone. The map's details are updated every few seconds, with a moving dot on the map representing the GPS cell phone, so it is pretty close to real-time tracking. You can even embed your location to your personal blog, web page or social networking site, which is a fun feature if you are traveling abroad, and your friends and family want to keep tabs on you. It keeps records for up to 100,000 positions for the cell phone, and offers details such as altitude and rate of speed as well. Another free online cell phone tracker is BuddyWay. Simply register at the website and download the free software to your GPS cell phone. The phone's position will be sent to BuddyWay's server, and all you need to do is log online to find out details such as the current location and the length of travel time. Some features that parents of young drivers might appreciate in this tracker include the history of speed limits - including maximum speeds and average speeds as well as the GPS coordinates that were visited along the way - for those times when your teen is "just going to the library." If you are traveling, BuddyWay gives you some enjoyable features as well. For example, you can take pictures with your GPS cell phone and use the application to post them online at the BuddyWay website along with a brief note, making it a great way to share your travels with loved ones.
Subscribe to:
Posts (Atom)