Monday, October 1, 2012

How To Recover Windows 7 password?


Here is the Tutorial how recover forgotten password of xp,vista, win 7?

(1)First you have to boot from another O.S like ubuntu, back track or any other which come in live cd format.Run O.S from cd.( you can also run O.S from pendrive ,it`s faster than cd)

(2)Copy "sam" & "system" file from this location C:/WINDOWS/SYSTEM 32/CONFIG (this files contain your password in NTML hash form) and save it in your pendrive.


(3)Now  We Want to get hashes from this file , there are different types of software available based on O.S. For windows i recommended  you "sam inside" .It`s easy to use. Download from here.

(4)Now you need other computer to run this file ,because it`s windows compatible program, so copy this "sam" & "system" file &this program in pendrive.

(5)Now open pendrive in your friend`s computer who has windows . Unzip sam inside & run the program.

(6)Now Import sam & system file in this software. it will show you username & passwords in hashes  form.

(7)now next step is to crack hashes. for this purpose you can use tools or online hash cracker.HERE is the   LIST OF ONLINE HASH CRACKER.(please view NTML HASH CRACKER).If you cannot crack online you should use tools like john the ripper , cain & able etc.

BUT IF YOU CANNOT DO THAT , THEN EASY WAY IS DOWNLOAD Ophacrack iso file form here. Burn into a cd and reboot pc. IT will do automatically for you.

still you cannot do this send me sam & system file , i will give you password. :)

The Official VCP5 Certification Guide: VMware Press Official Cert Guide



http://i43.fastpic.ru/big/2012/0930/e9/aea31aa59251525aff4395813fee80e9.jpg
The Official VCP5 Certification Guide
VMw-re Pr-ss (August 2012) | ISBN: 0789749319 | PDF + EPUB | 624 pages | 123.0 MB

Trust the bestselling Official Cert Guide series from VMware Press to help you learn, prepare, and practice for VCP5 exam success. They are the only VMware authorized self-study books and are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.


The Official VCP5 Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

Master VMware VCP510 exam topics
Assess your knowledge with chapter-opening quizzes
Review key concepts with exam preparation tasks
Practice with realistic exam questions on the DVD
The Official VCP5 Certification Guide focuses specifically on the objectives for the VCP510 VMware Certified Professional on vSphere 5. VMware Certified Instructor (VCI) Bill Ferguson shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

The companion DVD contains a powerful Pearson IT Certification Practice Test engine that enables you to focus on individual topic areas or take a complete, timed exam. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.

Well-regarded for its level of detail, assessment features, comprehensive design scenarios, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

The official study guide helps you master all the topics on the VCP510 exam, including:

Understanding how virtualization can best be integrated into today’s real-world IT environments
Recognizing what to change, and what to leave alone
Planning, installing, configuring, and upgrading vCenter Server and VMware ESXi Planning and configuring vSphere networking and storage
Deploying and Administering Virtual Machines and vApps
Establishing and Maintaining Service Levels
Performing basic troubleshooting
Monitoring vSphere implementations
Managing vCenter Server alarms
Preparing for the future of VMware virtualization
The Official VCP5 Certification Guide is part of a recommended learning path from VMware that includes simulation and hands-on training from authorized VMware instructors and self-study products from VMware Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered worldwide, please visit www.vmware.com/training.

Table of Contents

Chapter 1. Planning, Installing, Configuring, and Upgrading vCenter Server and VMware ESXi
Chapter 2. Planning and Configuring vSphere Networking
Chapter 3. Planning and Configuring vSphere Storage
Chapter 4. Deploying and Administering Virtual Machine and vApps
Chapter 5. Establishing and Maintaining Service Levels
Chapter 6. Performing Basic Troubleshooting
Chapter 7. Monitoring vSphere Implementation and Managing vCenter Alarms
Chapter 8. What Do I Do Now?
Appendix A. Answers to the “Do I Know This Already?” Quizzes and Chapter Review

Download link:
(Buy premium account for maximum speed and resumming ability)

Second Copy is Best Data Backup Solution: Download Free


Second Copy 8.1.0.13 Beta

Second Copy 8.1.0.13 Beta | 6.5 MB

Second Copy® is the perfect backup product designed for all versions of Windows, including 9x/Me/NT4/2000/XP/2003/Vista, you have been looking for. It makes a backup of your data files to another directory, disk or computer across the network. It then monitors the source files and keeps the backup updated with new or changed files. It runs in the background with no user interaction. So, once it is set up you always have a backup of your data somewhere else.

Highlights:

• Windows Vista compatible

• Windows Vista/XP style user interface

• Up to 256-bit AES encryption

• Two-way Synchronization

• FTP support

• Automatic detection/deletion during synchronization

• Enhanced compression

• Automatic scheduled copies

• E-mail notification

• Multi-threaded background processing

• Run as a service

• Universal Naming Convention (UNC) support

• Preview profile activity before running

• Password protect profiles

• Run profile when files change

• Archival of up to 25 old versions

• Disk spanning Run profiles at Windows shutdown

Major features in Second Copy:

Program Options: 


· Password protect profiles

· Organize profiles in groups

· Limit the log to only errors and summaries

· Copy files locally, to a network drive, external drive, optical or zip disk

· Copy files using FTP to or from a remote computer

· Restore files back to the source location with ease

· Encrypt files during copy

Copy Options: 

· Detect file deletions during synchronization

· Copy files based on the archive bit instead of time stamp

· Span copies across multiple disks

· Ignore files older than or newer than a certain date or number of days

· Select directories in a graphical tree view

· Skip profiles based on Windows Hardware profiles

· Auto log-in to remote system with Dial-up networking

· Run a program before and after running the profile

Scheduling Options :

· Skip profile on designated days of the week

· View scheduling options more conveniently

· Easily toggle profiles between periodic and manual schedule

· Run profiles at shut down without the Windows 20-second time limit

· Run profiles when the source files on the local hard disk change

Compression Library :

· Set compression ratio for Zip files

· Use built-in Zip viewer to view, compress and extract any Zip files

· Supports PKWare's latest industry standard PKZip v4.5 zip file format as well as the traditional PKZip v2.04g format

· No limitations on Zip file size and the number of files in a zip file

User Interface: 

· Tip of the day

· Hide icon

· Show balloon hints

· Internet update to the software versions

· Quicker editing of custom profiles

· Show source and destination in details view

· Display Progress bar

· Display Preview of the profile activity before running

Home Page - http://www.secondcopy.com

Take the Hackers Quiz


Many computer hackers have broken the law in their careers, but some actually go on to have productive roles in the computer industry. And while hacking is certainly a crime, these cases are always complex. Try our ultimate hacker quiz.

White House Military Office Network Hacked by Chinese Hackers


Hackers linked to China’s government broke into one of the U.S. government’s most sensitive computer networks, breaching a system used by the White House Military Office for nuclear commands, according to defense and intelligence officials familiar with the incident.

One official said the cyber breach was one of Beijing’s most brazen cyber attacks against the United States and highlights a failure of the Obama administration to press China on its persistent cyber attacks.

Disclosure of the cyber attack also comes amid heightened tensions in Asia, as the Pentagon moved two U.S. aircraft carrier strike groups and Marine amphibious units near waters by Japan’s Senkaku islands.

China and Japan—the United States’ closest ally in Asia and a defense treaty partner—are locked in a heated maritime dispute over the Senkakus, which China claims as its territory.

U.S. officials familiar with reports of the White House hacking incident said it took place earlier this month and involved unidentified hackers, believed to have used computer servers in China, who accessed the computer network used by the White House Military Office (WHMO), the president’s military office in charge of some of the government’s most sensitive communications, including strategic nuclear commands. The office also arranges presidential communications and travel, and inter-government teleconferences involving senior policy and intelligence officials.

An Obama administration national security official said: “This was a spear phishing attack against an unclassified network.”

Spear phishing is a cyber attack that uses disguised emails that seek to convince recipients of a specific organization to provide  confidential information. Spear phishing in the past has been linked to China and other states with sophisticated cyber warfare capabilities.

The official described the type of attack as “not infrequent” and said there were unspecified “mitigation measures in place.”

“In this instance the attack was identified, the system was isolated, and there is no indication whatsoever that any exfiltration of data took place,” the official said.

The official said there was no impact or attempted breach of a classified system within the office.

“This is the most sensitive office in the U.S. government,” said a former senior U.S. intelligence official familiar with the work of the office. “A compromise there would cause grave strategic damage to the United States.”

Security officials are investigating the breach and have not yet determined the damage that may have been caused by the hacking incident, the officials said.

Despite the administration national security official’s assertion, one defense official said there is fairly solid intelligence linking the penetration of the WHMO network to China, and there are concerns that the attackers were able to breach the classified network.

Details of the cyber attack and the potential damage it may have caused remain closely held within the U.S. government.

However, because the military office handles strategic nuclear and presidential communications, officials said the attack was likely the work of Chinese military cyber warfare specialists under the direction of a unit called the 4th Department of General Staff of the People’s Liberation Army, or 4PLA.

It is not clear how such a high-security network could be penetrated. Such classified computer systems are protected by multiple levels of security and are among the most “hardened” systems against digital attack.

However, classified computer systems were compromised in the past using several methods. They include the insertion of malicious code through a contaminated compact flash drive; a breach by a trusted insider, as in the case of the thousands of classified documents leaked to the anti-secrecy web site Wikileaks; and through compromised security encryption used for remote access to secured networks, as occurred with the recent compromise involving the security firm RSA and several major defense contractors.

According to the former official, the secrets held within the WHMO include data on the so-called “nuclear football,” the nuclear command and control suitcase used by the president to be in constant communication with strategic nuclear forces commanders for launching nuclear missiles or bombers.

The office also is in charge of sensitive continuity-of-government operations in wartime or crises.

The former official said if China were to obtain details of this sensitive information, it could use it during a future conflict to intercept presidential communications, locate the president for targeting purposes, or disrupt strategic command and control by the president to U.S. forces in both the United States and abroad.

White House spokesmen had no immediate comment on the cyber attack, or on whether President Obama was notified of the incident.

Former McAffee cyber threat researcher Dmitri Alperovitch said he was unaware of the incident, but noted: “I can tell you that the Chinese have an aggressive goal to infiltrate all levels of U.S. government and private sector networks.”

“The White House network would be the crown jewel of that campaign so it is hardly surprising that they would try their hardest to compromise it,” said Alperovictch, now with the firm Crowdstrike.

Last week the senior intelligence officer for the U.S. Cyber Command said Chinese cyber attacks and cyber-espionage against Pentagon computers are a constant security problem.

“Their level of effort against the Department of Defense is constant” and efforts to steal economic secrets are increasing, Rear Adm. Samuel Cox, Cyber Command director of intelligence, told Reuters after a security conference.

“It’s continuing apace,” Cox said of Chinese cyber-espionage. “In fact, I’d say it’s still accelerating.”

Asked if classified networks were penetrated by the Chinese cyber warriors, Cox told the news agency: “I can’t really get into that.”

The WHMO arranges the president’s travel and also provides medical support and emergency medical services, according to the White House’s website.

“The office oversees policy related to WHMO functions and Department of Defense assets and ensures that White House requirements are met with the highest standards of quality,” the website states. “The WHMO director oversees all military operations aboard Air Force One on presidential missions worldwide. The deputy director of the White House Military Office focuses primarily on the day-to-day support of the WHMO.”

The office is also in charge of the White House Communications Agency, which handles all presidential telephone, radio, and digital communications, as well as airlift operations through both fixed-wing and helicopter aircraft.

It also operates the presidential retreat at Camp David and the White House Transportation Agency.

“To assure proper coordination and integration, the WHMO also includes support elements such as operations; policy, plans, and requirements; administration, information resource management; financial management and comptroller; WHMO counsel; and security,” the website states.

“Together, WHMO entities provide essential service to the president and help maintain the continuity of the presidency.”

Asked for comment on the White House military office cyber attack, a Cyber Command spokesman referred questions to the White House.

Regarding U.S. naval deployments near China, the carrier strike groups led by the USS George Washington and the USS Stennis, along with a Marine Corps air-ground task force, are now operating in the western Pacific near the Senkakus, according to Navy officials.

China recently moved maritime patrol boats into waters near the Senkakus, prompting calls by Japanese coast guard ships for the vessels to leave.

Chinese officials have issued threatening pronouncements to Japan that Tokyo must back down from the recent government purchase of three of the islands from private Japanese owners.

Tokyo officials have said Japan is adamant the islands are Japanese territory.

Officials said the Washington is deployed in the East China Sea and the Stennis is in the South China Sea.

About 2,200 Marines are deployed in the Philippine Sea on the USS Bonhomme Richard and two escorts.

The U.S. Pacific Command said the deployments are for training missions and carriers are not necessarily related to the Senkaku tensions.

“These operations are not tied to any specific event,” said Capt. Darryn James, a spokesman for the U.S. Pacific Command in Honolulu, according to Time magazine.  “As part of the U.S. commitment to regional security, two of the Navy’s 11 global force carrier strike groups are operating in the Western Pacific to help safeguard stability and peace.”

As a measure of the tensions, Defense Secretary Leon Panetta told Chinese military leaders during his recent visit to China that the U.S. military will abide by its defense commitments to Japan despite remaining publicly neutral in the maritime dispute.

“It’s well known that the United States and Japan have a mutual defense treaty,” a defense official said of Panetta’s exchange in Beijing. “Panetta noted the treaty but strongly emphasized that the United States takes no position on this territorial dispute and encouraged the parties to resolve the dispute peacefully. This shouldn’t have to get to the point where people start invoking treaties.”

A report by the defense contractor Northrop Grumman made public by the congressional U.S.-China Economic and Security Review Commission in March stated that China’s military has made targeting of U.S. command and control networks in cyber warfare a priority.

“Chinese capabilities in computer network operations have advanced sufficiently to pose genuine risk to U.S. military operations in the event of a conflict,” the report said.

“PLA analysts consistently identify logistics and C4ISR infrastructure as U.S. strategic centers of gravity suggesting that PLA commanders will almost certainly attempt to target these system with both electronic countermeasures weapons and network attack and exploitation tools, likely in advance of actual combat to delay U.S. entry or degrade capabilities in a conflict,” the report said.

C4ISR is military jargon for command, control, communications, computers, intelligence, surveillance, and reconnaissance.

Little is known within the U.S. intelligence community about Chinese strategic cyber warfare programs.

However, recent military writings have disclosed some aspects of the program, which is believed to be one of Beijing’s most closely guarded military secrets, along with satellite weapons, laser arms, and other high-technology military capabilities, such as the DF-21 ballistic missile modified to attack aircraft carriers at sea.

A Chinese military paper from March stated that China is seeking “cyber dominance” as part of its efforts to build up revolutionary military capabilities.

“In peacetime, the cyber combat elements may remain in a ‘dormant’ state; in wartime, they may be activated to harass and attack the network command, management, communications, and intelligence systems of the other countries’ armed forces,” wrote Liu Wangxin in the official newspaper of the Chinese military on March 6.

“While great importance is attached continuously to wartime actions, it is also necessary to pay special attention to non-wartime actions,” he said. “For example, demonstrate the presence of the cyber military power through cyber reconnaissance, cyber deployment, and cyber protection activities.”

SOURCE: http://freebeacon.com

Who is the Luckiest Jailbreak Hacker In The World


To the world, he’s known only by his online pseudonym, “pod2g.” On Twitter, he has amassed over 340,000 followers. As one of the most respect iOS security researchers today, he frequently fields job interview requests from the biggest technology companies in the world. To the millions who jailbreak, he’s a living legend.

At JailbreakCon, pod2g gave a fascinating talk on his past experiences as a hacker and mastermind jailbreaker. He’s been immortalized by jailbreakers and the security research community, but in his own words he’s just a “lucky guy.”

Pod2g, who’s real name is Cyril, has been heavily involved in exploiting iOS security vulnerabilities since 2009. The 32-year-old Frenchman claims that his parents gave him no last name—a clever excuse for a infamous hacker who’s having to constantly guard his private life.
As with any hacker of his status, it’s fascinating to hear how Cyril got started. He started coding when he was only 5 years old. His father gave him a ZX 8 I computer to experiment with, and he started copying BASIC programs from books before he could even read fully. He got an ATARI ST a few years later and did some GFA BASIC, 68k assembly and demo making. It wasn’t until college that he learned Objective C and C++, the programming languages used by Apple.

“A prodigy was born”

After graduating, Cyril worked as a J2EE (Java) expert developer and then project manager for over 11 years. His first ‘hack’ was actually the beloved Linksys WRT54G router. He wanted to improve the performance of the router by making it faster, so he hacked SD driver by writing his own MIPS assembly code. His first experiencing with mobile device hacking was actually Windows Mobile 6.1. He described “cooking a new ROM” (or Read-only memory) for the platform. This allowed him to change the firmware.

Meet Pod2g, The Luckiest Jailbreak Hacker In The World [JailbreakCon]
Jailbreaking is no easy feat.
Where did the name “pod2g” originate from? Cyril got into jailbreaking around the time Apple introduced the iPod touch 2G. The device had not yet been jailbroken, and another hacker named “chronic” was working on cracking it. Like many hackers who enter the iOS scene, Cyril saw it as a fun challenge. He helped create and release the jailbreak, and a prodigy was born.

After jailbreaking the iPod touch 2G, Cyril joined the Chronic Dev Team, a group of hackers who jailbreak iOS devices. After working on iOS 4 jailbreaks, he helped create the infamous Greenpois0n tool and the Corona untethered jailbreak for iOS 5.0.1. His most recent work includes Absinthe 2.0, a jailbreak tool for iOS 5.1.1 that was downloaded by millions in only a few days.

“The hackers who are actively working on the iOS 6 jailbreak can be counted on two hands”
Meet Pod2g, The Luckiest Jailbreak Hacker In The World [JailbreakCon]
From left to right: @p0sixninja, @pod2g, and @planetbeing are all instrumental members of the Chronic Dev Team



























Cyril may be brilliant, but he and his colleagues need help. “My wish is that some newcomers would help us,” said Cryil, referring to the elite group of Chronic Dev hackers who work on jailbreaks. During his talk at JailbreakCon, Cyril reiterated that there was no jailbreak for iOS 6 or the iPhone 5. Cyril and his hacker friends need time to comb through Apple’s new OS looking for vulnerabilities, which will hopefully lead to usable exploits. If there were more hackers to help, the process would undoubtedly be quicker. As it stands now, don’t expect a public iOS 6 jailbreak for months.

The hackers who are actively working on the iOS 6 jailbreak can be counted on two hands. The task is great, but the workers are few. The problem is that creating jailbreakers is far from child’s play. It requires “extensive” iOS security research and hacking experience, according to Cyril. The kind of talent required for iOS hacking can usually make more money selling their exploits or consulting for corporations. Finding someone smart enough with the level of determination required is like searching for a needle in a proverbial haystack.

And what happens when Apple itself comes knocking, like the case of comex and JailbreakMe?  When I asked Cyril if he would ever consider accepting a job offer from Apple, he seemed open to the possibility. Hackers like Cyril often spend countless days on jailbreaks and then release them for free. People forget that these guys want to build their resumes and support their families like everyone else.

What struck me about Cyril was his quiet, humble, unassuming personality. He’s a normal guy with incredible knowledge. He never tried to take complete credit for his success. “I’m lucky,” he would repeatedly say with total sincerity. Lucky indeed, Cyril. Lucky indeed.

Source: http://www.cultofmac.com

Government websites of Spain Hacked by Anonymous


If you ask me, no democracy in the world is perfect. And there will be all kinds of protests against the government in countries around the world. Now, in Spain, there seems to be some disturbance due to Spain’s Police department. A group of hackers has decided to hack into government servers and meddle with the various government sites of the country to make the government meet their demands.
The hackers have released a note in which they have very clearly mentioned what they are doing, and why they are doing. Below is the report.
 The Anonymous hackers have decided to launch cyber attack against government websites of Spain.
“Anonymous sends it’s solidarity to our brothers and sisters in Spain who at this very moment have completely surrounded the Parliament Building in Madrid. The are calling for the resignation of a government that like so many in our world today has failed to serve the needs of it’s people. We encourage our comrades in Spain to remain steadfast until their demands are met, and we promise to do all we can to assist them.” Anonymous said in the press release.
“Anonymous watched on the independent livestreams the horrendous brutality on the part of the Spanish National Police. It is always intolerable to us, but it is especially deplorable when we witness this level of senseless violence used against peaceful protesters in a supposedly western and modern ‘democracy’. “
“In response to this wanton violence by the Spanish National Police against our brothers and sisters in Madrid, Anonymous has removed from the Internet the web site of the Spanish National Police located at www.policia.es – and we will keep it offline so long as we continue to watch scenes of brutality.”
Anonymous claimed that they will also begin an attack on the primary website of the Parliament of Spain located at www.congreso.es – this attack will include not only DdoS and hacking, but also Black Fax & E-Mail bombs – effectively removing the Parliament of Spain from the Internet entirely.
What do you think? Is this the right way to protest?
SOURCE: newsvine