Happy Republic Day!!!!!!!!!!

Cyber Defenders , Ethical Spot and Indian Hackers army wishing u all Happy Republic day!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
                    
                    Swarnim Bharat








"India is the cradle of the human race, the birthplace of human speech, the mother of history, the grandmother of legend, and the great grand mother of tradition. Our most valuable and most artistic materials in the history of man are treasured up in India only!"


















PROUD  TO  BE  AN  INDIAN !!!












                  
PROUD  TO  BE  AN  INDIA                         Let the world know what we stand for:-

There are 3.22 Million Indians in America. 
38% of Doctors in America are Indians.
12% of Scientists in America are Indians.
36% of NASA employees are Indians.
34% of MICROSOFT employees are Indians.
28% of IBM employees are Indians.
17% of INTEL employees are Indians.
13% of XEROX employees are Indians.

You may know some of these facts. 
These facts were recently published in a German Magazine, which deals with WORLD HISTORY FACTS ABOUT INDIA. 

India never invaded any country in her last 100000 years of history.India invented the Number System. Aryabhatta invented zero.
The World's first university was established in Takshila in 700BC.More than 10,500 students from all over the world studied more than 60 subjects. The University of Nalanda built in the 4th century BC was one of the greatest achievements of ancient India in the field of education.
Sanskrit is the mother of all the European languages. Sanskrit is the most suitable language 
for computer software reported in Forbes magazine,

July 1987.


Ayurveda is the earliest school of medicine known tohumans. Charaka, the father of medicine consolidated Ayurveda 2500 years ago. Today Ayurveda is fast regaining its rightful place  in our civilization.Although modern images of India often show poverty and lack of development, India was the richest country on earth until the time of British invasion in the early 17th Century.
The art of Navigation was born in the river Sindh 6000 years ago.The very word Navigation is derived from the Sanskrit word NAVGATIH.
The Word navy is also derived from Sanskrit 'Nou'.

Bhaskaracharya calculated the time taken by the earth to orbit the sun hundreds of years before the astronomer Smart.; Time taken by earth to orbit the sun: (5th century) 365.258756484 days.
Budhayana first calculated the value of pi, and he explained the concept of what is known as the Pythagorean Theorem. He discovered this in the 6th century long before the European mathematicians Algebra, trigonometry and calculus came from India; Quadratic equations were by Sridharacharya in the 11th century ; The largest numbers the  Greeks and the Romans used were 10 6(10 to the power of 6) whereas
Hindus Used numbers as big as 1053 (10 to the power of 53) with specific names as Early as 5000 BCE during the Vedic period. Even today, the largest used number is Tera 1012(10 to the power of 12).

According to the Gemological Institute of America, up until 1896,India was the only source for diamonds to the world.USA based IEEE has proved what has been acentury-old suspicion in the world scientific community that the pioneer of Wireless communication was Prof. Jagdeesh Bose and not Marconi.

The earliest reservoir and dam for irrigation was built in Saurashtra. According to Saka King rudradaman I of 150 CE a beautiful lake called 'Sudarshana' was constructed
on the hills of Raivataka during 
was constructed on the hills of Raivataka during Chandragupta Maurya's time.
Chess (Shataranja or AshtaPada) was invented in India.

Sushruta is the father of surgery. 2600 years ago he and health scientists of his time conducted complicated surgeries like cesareans,cataract, artificial limbs, fractures, urinary stones and even plastic surgery and brain surgery. Usage of anesthesia was well known in ancient India.
Over 125 surgical equipment were used. Deep knowledge of anatomy, etiology, embryology, digestion,metabolism, genetics and immunity is also found in many texts.


When many cultures were only nomadic forest dwellers over 5000 years ago, Indians 
established Harappan culture in Sindhu Valley (Indus Valley Civilization) The place value system,the decimal system was developed in india in 100 BC.


list is huge!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Many more facts are still there............................




Our grand salute to these true heros..................!!!!!!!!!!!!!!!!!!!!!

ARP POISONING OR ARP SPOOFING

Hey guys many of us dont know about ARP Poisoning attack / ARP Spoofing attack,so i decided to write about it,This is a simple basic tutorial....


ARP (Address Resolution Protocol) is used to map IP addressing to MAC addresses in a local area network segment where hosts of the same subnet reside. Each device on a network has at least two addresses: a media access control (mac) address, and an Internet Protocol (IP) address. The MAC address is the address of the physical network interface card inside the device, and never changes for the life of the device. The IP address can change if the machine moves to another part of the network . ARP is used to match, or resolve , an IP address to its appropriate MAC address (and vice versa). ARP works by broadcasting a packet to all hosts attached to an Ethernet. The packet contains the IP address the sender is interested in communicating with. Most hosts ignore the packet. The target machine, recognizing that the IP address in the packet matches its own, returns an answer. ARP, a very simple protocol, consists of merely four basic message types:
ARP Request . Computer A asks the network, "Who has this IP address?
ARP Reply . Computer B tells Computer A, "I have that IP. My MAC address is 122.122.122.122
Reverse ARP Request (RARP) . Same concept as ARP Request, but Computer A asks, "Who has this MAC address?
RARP Reply . Computer B tells Computer A, "I have that MAC. My IP address is 122.122.122.122
All network devices have an ARP table, a short-term memory of all the IP addresses and MAC addresses the device has already matched together. The ARP table ensures that the device doesn't have to repeat ARP Requests for devices it has already communicated with. ARP attack happens when someone is trying to change the ARP table of MAC and IP addresses information without authorization. By doing so, hackers can spoof his/her MAC or IP address to launch the following two types of attacks:
Denial of Service
A hacker can easily associate an operationally significant IP address to a false MAC address. For instance, a hacker can send an ARP reply associating your network router's IP address with a MAC address that doesn't exist. Your computers believe they know where your default gateway is, but in reality they're sending any packet whose destination is not on the local segment, into the Great Bit Bucket in the Sky. In one move, the hacker has cut off your network from the Internet.
Man in the Middle
A hacker can exploit ARP Cache Poisoning to intercept network traffic between two devices in your network. For instance, the hacker wants to see all the traffic between your computer with IP 122.122.122.122, and your Internet router. The hacker begins by sending a malicious ARP "reply" to your router, associating his computer's MAC address with the IP 122.122.122.122.

FACEBOOK WILL END ON MARCH 15th!!!!!!!!!!!!!













PALO ALTO, CA –Mark Zuckerberg announced that Facebook will be shut down in March. Managing the site has become too stressful.
“Facebook has gotten out of control,” said Zuckerberg in a press conference outside his Palo Alto office, “and the stress of managing this company has ruined my life. I need to put an end to all the madness.”
Zuckerberg went on to explain that starting March 15th, users will no longer be able to access their Facebook accounts.
“After March 15th the whole website shuts down,” said Avrat Humarthi, Vice President of Technical Affairs at Facebook. “So if you ever want to see your pictures again, I recommend you take them off the internet. You won’t be able to get them back once Facebook goes out of business.”
Zuckerberg said that the decision to shut down Facebook was difficult, but that he does not think people will be upset.
“I personally don’t think it’s a big deal,” he said in a private phone interview. “And to be honest, I think it’s for the better. Without Facebook, people will have to go outside and make real friends. That’s always a good thing.”
Some Facebook users were furious upon hearing the shocking news.
“What am I going to do without Facebook?” said Denise Bradshaw, a high school student from Indiana. “My life revolves around it. I’m on Facebook at least 10 hours a day. Now what am I going to do with all that free time?”
However, parents across the country have been experiencing a long anticipated sense of relief.
“I’m glad the Facebook nightmare is over,” said Jon Guttari, a single parent from Detroit. “Now my teenager’s face won’t be glued to a computer screen all day. Maybe I can even have a conversation with her.”
Those in the financial circuit are criticizing Zuckerberg for walking away from a multibillion dollar franchise. Facebook is currently ranked as one of the wealthiest businesses in the world, with economists estimating its value at around 7.9 billion.
But Zuckerberg remains unruffled by these accusations. He says he will stand by his decision to give Facebook the axe.
“I don’t care about the money,” said Zuckerberg. “I just want my old life back.”
The Facebook Corporation suggests that users remove all of their personal information from the website before March 15th. After that date, all photos, notes, links, and videos will be permanently erased.

Source:-http://weeklyworldnews.com


Please share what you thinks by polling :) and commenting :)

Phishing scam hits Mashreq Bank online customers
















A Dubai-based business man was recently hit by a phishing scam through the online service of his Mashreq Bank account, according to Gulf News.
Kannaiyan Shankear woke one morning to find 20 Etisalat recharge transactions on his phone worth AED500 each. The transactions all occurred between 11.30pm and 2am on December 6 and 7, while he was asleep.
“How can they approve such series of transactions? Maybe they would approve it once or twice, but not 20 times, that too within the same hour, without seeing anything unusual,” Shankear said. “If your bank balance is reduced while you’re sleeping … it’s scary. There should be a better security firewall.”
Each of the amounts deducted from his account, which totaled AED10,000, were credited to different phone numbers, which were no longer in service the next morning, according to Shankear. When the businessman lodged a complaint about the transactions with the bank, he was told that he was not the only victim of the scam.
However, Mashreq Bank is not going to be refunding Shankear his stolen money.
“We sympathise with Mr Shankear’s case and would like to offer him all assistance to take this further with the authorities. However, as per the published MashreqOnline Banking terms, the customer is responsible for the security of his or her user ID and password,” said a Mashreq spokesperson.
The businessman has since opened a case with the Dubai Police, at the request of Mashreq Bank.
“We discovered that a highly sophisticated phishing campaign resulted in Mashreq customers falling victims to an online fraud,” said a Mashreq spokesperson. “Mr Shankear has access to MashreqOnline since December 15, 2009. We have retrieved several successful logins to the account, hence it is active and the customer is aware of it.”
Source: here

Google Bangladesh owned by Tiger Mate















hello guys a recent news have came that Google Bangladesh have been HACKED by a person named Tiger mate.
See this whole article source: Here
We just got an anonymous tip that Google’s been ‘hacked’ – sure enough, visitors of the company’s Bangladesh search site (Google.com.bd) see a defaced landing page rather than the usual search site. As far as I can tell, www.google.com.bd functions properly, so whether this really constitutes a ‘hack’ is up for debate.
Local Bangladesh media, including online newspaper bdnews24.com, reported on the news as well, quoting a CTO of a local ISP, who confirmed the hack.
Nevertheless, it seems like only a subset of users see the defaced landing page, while others report that they can visit and use the search engine without any hiccups.
According to Zone-h, Bangladeshi hacker TiGER-M@TE has been quite active with defacements lately, and has targeted some high-profile sites in the past, including the local website for American Express and Airtel (video).

Critical Vulnerability in Microsoft office


Critical Vulnerability in Microsoft office


A critical vulnerability have been found in Microsoft office in the way they handle RTF by which an attacker can remotely execute arbitrary code on the victim’s computer. But attacks are still popping up in the wild, reports GCN. Even this attack has not been extensive so far, but there can be chances to increase in attacks since the sample of this exploit is publicly available on internet, reported by Microsoft. This exploit effects office XP and office 2003 SP3, office 2007 SP2. And office 2010 (both the 32-bit and 64-bit), and it is exploited using a crafted RTF file that holds a size parameter bigger than expected. Once inside the attacker may execute malicious shellcode, which then downloads other malware. After this the attacker may be able to get complete access over victim’s computer and attacker may be able to install programs, view files delete files etc, reported by Microsoft and the patch for this vulnerability will be available soon. But even if the computer is patched, the users are not completely safe. Since this flaw is present in office software, Outlook could also use to automatically load a similar modified RTF –email message.


How to secure yourself from this exploit?


The answer is by setting up Outlook to read plain text formats and blocking the opening of RTF documents from unknown sources by using office File block.


By:Navneet singh
 
© Copyright 2010-2011 Learn How To Hack! Learn Ethical Hacking & Download Free Hacking Softwares All Rights Reserved.
Template Design by Free Hacking | Published by Daily News | Powered by Free Hacking.