Jumat, 29 Juli 2011

hacking software



1).Portable.PDF.Password.Remover.3.1.rar--click here 


2).RAR.Password.Recovery.Magic.v6.1.1.303-BEAN.rar--click here 


3).Remote.Password.Stealer.v2.7.Retail-ZWT.rar--click here


4).Password_Hacking_AIO.rar--click here



5).Password_Finder.zip--click here


6). FACEBOOK_hacking_bunDle.zip --click here       



7).007_Facebook_Hack_v_1.0.exe.html - - click here 


8).Facebook_Hack.rar -- click here 


9).Pirates Facebook Hack v1.2.rar-- click here


10).Facebook Hack Attack v3.6.EXE-- click here


11).Facebook Hack Password 2011 ~PrJ.zip-- click here


12).Facebook_Hack_1.2_original.rar-- click here

Top 15 Security/Hacking Tools & Utilities

Top 15 Security/Hacking Tools & Utilities 
1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (Network Mapper) is a free open source utility for network exploration
or security auditing. It was designed to rapidly scan large networks, although
it works fine against single hosts. Nmap uses raw IP packets in novel ways to
determine what hosts are available on the network, what services (application
name and version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are in use,
and dozens of other characteristics. Nmap runs on most types of computers and
both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (packet_trace). A very
versatile tool, once you fully understand the results.
Get Nmap Here – http://www.insecure.org/nmap/download.html
2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-
server framework.
Nessus is the worlds most popular vulnerability scanner used in over 75,000
organizations world-wide. Many of the worlds largest organizations are
realizing significant cost savings by using Nessus to audit business-critical
enterprise devices and applications.
Get Nessus Here – http://www.nessus.org/download/
3. John the Ripper
Yes, JTR 1.7 was recently released!
John the Ripper is a fast password cracker, currently available for many
flavors of Unix (11 are officially supported, not counting different
architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect
weak Unix passwords. Besides several crypt(3) password hash types most commonly
found on various Unix flavors, supported out of the box are Kerberos AFS and
Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
You can get JTR Here – http://www.openwall.com/john/
4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive
tests against web servers for multiple items, including over 3200 potentially
dangerous files/CGIs, versions on over 625 servers, and version specific
problems on over 230 servers. Scan items and plugins are frequently updated and
can be automatically updated (if desired).
Nikto is a good CGI scanner, there are some other tools that go well with Nikto
(focus on http fingerprinting or Google hacking/info gathering etc, another
article for just those).
Get Nikto Here – http://www.cirt.net/code/nikto.shtml
5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the
highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows with a decent interface, I
suggest you check this out, it’s pretty nice.
Get SuperScan Here – http://www.foundstone.com/index.htm
subnav=resources/navigation.htm&subcontent=/resources/proddesc/superscan4.htm
6. p0f
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the
operating system on:
- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machine you cannot connect to (RST+ mode),
- machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY
active connections to the target machine.
Get p0f Here – http://lcamtuf.coredump.cx/p0f/p0f.shtml
7. Wireshark (Formely Ethereal)
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you
capture and interactively browse the contents of network frames. The goal of
the project is to create a commercial-quality analyzer for Unix and to give
Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can
reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
Get Wireshark Here – http://www.wireshark.org/
8. Yersinia
Yersinia is a network tool designed to take advantage of some weakeness in
different Layer 2 protocols. It pretends to be a solid framework for analyzing
and testing the deployed networks and systems. Currently, the following network
protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery
Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration
Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch
Link Protocol (ISL), VLAN Trunking Protocol (VTP).
The best Layer 2 kit there is.
Get Yersinia Here – http://yersinia.sourceforge.net/
9. Eraser
Eraser is an advanced security tool (for Windows), which allows you to
completely remove sensitive data from your hard drive by overwriting it several
times with carefully selected patterns. Works with Windows 95, 98, ME, NT,
2000, XP and DOS. Eraser is Free software and its source code is released under
GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted it..make
sure it’s really gone, you don’t want it hanging around to bite you in the ass.
Get Eraser Here – http://www.heidi.ie/eraser/download.php
10. PuTTY
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms,
along with an xterm terminal emulator. A must have for any h4. 0r wanting to
telnet or SSH from Windows without having to use the crappy default MS command
line clients.
Get PuTTY Here. – http://www.chiark.greenend.org.uk/~sgtatham/putty/
11. LCP
Main purpose of LCP program is user account passwords auditing and recovery in
Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute
force session distribution, Hashes computing.
A good free alternative to L0phtcrack.
LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack
article.
Get LCP Here – http://www.lcpsoft.com/english/download.htm
12. Cain and Abel
My personal favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It
allows easy recovery of various kind of passwords by sniffing the network,
cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis
attacks, recording VoIP conversations, decoding scrambled passwords, revealing
password boxes, uncovering cached passwords and analyzing routing protocols.
The program does not exploit any software vulnerabilities or bugs that could
not be fixed with little effort.
Get Cain and Abel Here – http://www.oxid.it/cain.html
13. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion
detection system. Kismet will work with any wireless card which supports raw
monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco
gold).
Get Kismet Here – http://www.kismetwireless.net/download.shtml
14. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux
counterparts, but it’s easy to use and has a nice interface, good for the
basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area
Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
Verify that your network is set up the way you intended.
Find locations with poor coverage in your WLAN.
Detect other networks that may be causing interference on your network.
Detect unauthorized rogue access points in your workplace.
Help aim directional antennas for long-haul WLAN links.
Use it recreationally for WarDriving.
Get NetStumbler Here – http://www.stumbler.net/
15. hping
To finish off, something a little more advanced if you want to test your TCP/IP
packet monkey skills.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The
interface is inspired to the ping unix command, but hping isn’t only able to
send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a
traceroute mode, the ability to send files between a covered channel, and many
other features.
Get hping Here – http://www.hping.org/
This post has been flagged by the HacknMod community as questionable content.
Please note hacknmod’s postings are for informational purposes only. HacknMod
does not condone illegal acts. Behave yourselves!

Top Ten Hackers

No. 10 - The Deceptive Duo
Top Ten    Hacker Seen On www.dil-ki-dunya.tk
In 2002, the Deceptive Duo (really 20-year-old Benjamin Stark and 18-year-old Robert Lyttle) were responsible for a series of high-profile break-ins to government networks, including the U.S. Navy, NASA, FAA and Department of Defense. Like so many other hackers, California-based Lyttle and Florida-based claimed they were merely trying to expose security failures and protect Americans in a post-911 world. The two hackers posted messages, left email addresses and defaced Web sites in an attempt to get the government's attention...and get the government's attention, they did. Lyttle and Stark pleaded guilty in 2005. Stark was sentenced to two years probation, Lyttle served four months in prison with three years probation, and both were ordered to pay tens of thousands of dollars in restitution for the damage they caused.
No. 9 - Jonathan James (aka c0mrade)
Top Ten    Hacker Seen On www.dil-ki-dunya.tk
On the list of computer systems you'd want to be really, really, really secure, the Department of Defense surely shows up, which makes Jonathan James' (aka c0mrade) break-in to the DoD's Defense Threat Reduction Agency server all the more impressive. James' 1999 spree included not only the DoD, but NASA as well. The then 16-year-old used his purveyed access to steal software, not defense secrets, but James still got into some dangerous territory, including software used to control the International Space Station's living environment. For his crimes, he served an abbreviated minor's sentence of six months and also had to pledge to give up computer use.
No. 8 - Dmitri Galushkevich
Top Ten    Hacker Seen On www.dil-ki-dunya.tk
When pretty much the whole country of Estonia was suddenly caught up in Internet gridlock in May 2007, the very-small-but-very-tech-savvy former Soviet Republic thought they knew who to blame: the Russian government.At the time, the two countries were caught up in a series of riots over the removal of Soviet-era statues, but now it had gotten serious. The weapon of choice? A botnet.The hackers responsible for the cyberterror hijacked computers and used them, en masse, to overload servers across the country. ATM machines didn't work, Web pages didn't load, government systems were shut down.It took weeks for Estonian officials to untangle the mess and even longer for them to find the culprit: Dmitri Galushkevich, a 20-year-old ethnic Russian living in Estonia. Was he working alone? Unclear, but for wreaking this havoc, Galushkevich was fined 17,500 kroons. Or about $1,620.
No. 7 - Kevin Poulsen (aka Dark Dante)
Top Ten    Hacker Seen On www.dil-ki-dunya.tk
Today, Kevin Poulsen is an editor at tech-savvy Wired magazine, but back in the 1980s, he was just your average phone-phreaking, Porsche-driving hack.Poulsen gained some notoriety for a clever prank he played on Los Angeles radio station KIIS, in which he rigged the phones to allow only him to get through and win a trip to Hawaii and the aforementioned Porsche.Known as Dark Dante, Poulsen also took on more serious targets. His break-in to the FBI's database eventually led to his 1991 arrest and five years prison time. Since then, he's gone respectable, retiring to the editor's chair and using his cybersleuth powers for good deeds, like tracking sex offenders on MySpace.
No. 6 - John Draper
Top Ten    Hacker Seen On www.dil-ki-dunya.tk
Draper is pretty much the granddaddy of hackers.Back in the early 1970s, he was the king of "phone phreaking," meaning he was playing the phone company. Back in the pre-Internet, pre-personal computer days, the phone system was the big computer to beat and Draper did it well.Draper's breakthrough came when he and a friend realized that a toy whistle, a giveaway in a breakfast cereal box, emitted the same frequency as the tones used by AT&T switches to route phone calls.Building off that, Draper made homemade devices, "blue boxes" that could get you all the long distance calls you wanted...for free. What did all this get him? Some time in prison, as well as the attention of Apple co-founder Steve Wozniak, who wanted to get in on phone phreaking himself. Draper went on to write one of the first word-processing programs, EasyWriter, but now specializes in, go figure, security.
No. 5 - Raphael Gray (aka Curador)
Top Ten    Hacker Seen On www.dil-ki-dunya.tk
Raphael Gray called himself a saint, insisting he was only trying to help e-commerce sites when he broke into their databases to steal credit card numbers and personal information from 26,000 or so American, British and Canadian customers in 2000. The then-18-year-old Welsh teenager insisted he was merely trying to draw attention to lax online security systems. So, if he was really just trying to help, then why did he post the card numbers online? Well, that's another question.Gray was sentenced in 2001 to three years of psychiatric treatment.
No. 4 - Gary McKinnon (aka Solo)
Top Ten    Hacker Seen On www.dil-ki-dunya.tk
Scottish-born, London-based hacker McKinnon wasn't just in it for fun; he had a political axe to grind.Conspiracy-theorist McKinnon broke into computers at the U.S. Department of Defense, Army, Navy, Air Force and NASA sometime in 2001 and 2002. What exactly was he looking for? Evidence of really fuel-efficient alien spacecraft, for one.No joke.McKinnon believes the U.S. government was hiding alien technology that could solve the global energy crisis. Now, in the process of snooping around for this stuff, the self-taught hacker concedes he may have deleted a whole bunch of other files and maybe some hard drives as he attempted to cover up his tracks. Nothing significant, he insists.The U.S. government begs to differ, claiming McKinnon's hack job cost them $700,000 to fix. They also kind of doubt the whole UFO story and wonder if his snooping had more earthly intentions. Back in the U.K., Gary's lawyers insist that their client, who suffers from Asperger's Syndrome, deserves special mental health considerations.Gary himself has become a cause celebre, with his pending extradition being protested by celebrities like Sting.
No. 3 - Adrian Lamo
Top Ten    Hacker Seen On www.dil-ki-dunya.tk
It's true that companies sometimes hire hackers to test their systems for weaknesses, but no one ever hired Adrian Lamo.In 2002 and 2003, Lamo broke into several high-profile targets, just for kicks. He then told the targets what he had been able to do and how he did it. How kind of him. Lamo's targets included Microsoft, Yahoo and the New York Times, where he inserted his contact info into their database of experts.Known as "the homeless hacker," Lamo slept in abandoned buildings and hacked via laptop from Internet cafes and public libraries. His network-busting technique of choice involved going in through the out door, entering sites through proxy access, a setup that corporations often use to let their computers connect out to the Internet. That led to his arrest in 2003.Lamo served two years probation and now works as a tech journalist.
No. 2 - Kevin Mitnick
Top Ten    Hacker Seen On www.dil-ki-dunya.tk
Kevin Mitnick started out just wanting a free ride on the bus.He came a long way from his hacks into the Los Angeles metropolitan bus system and early dabbling in phone fraud. Mitnick went on to become the most wanted computer hacker in the country, known (and wanted) primarily for his hack into Digital Equipment Corporation's network to steal their software.It may have been his first notable break-in, but Mitnick went on to other big targets, including cell phone giants Nokia and Motorola.Even his eventual arrest was notable: After hacking into fellow hacker Tsutomu Shimomura's computer, Mitnick was tracked down by Shimomura and the FBI in 1995.Today, Mitnick has served a five-year sentence and come clean, but he continues to profit off his former title, authoring books and working as a security consultant.
No. 1 - Robert Tappan Morris
Top Ten    Hacker Seen On www.dil-ki-dunya.tk
Even if you know next to nothing about computer viruses, you've probably heard of "worms." That's because news stories about this particularly contagious (and therefore destructive) breed of virus abound.Blame Robert Tappan Morris for it all.Back in 1988, while a graduate student at Cornell University, Morris created the first worm and released it on the Internet. He claimed it was all an experiment gone awry, a test to see how big the then-new Internet was. The worm turned out to be more than a test: it replicated quickly, slowing computers to the point of non-functionality and virtually crippling the Internet. He was eventually fined and sentenced to three years probation.Since then, he's earned his Ph.D. from Harvard and made millions designing software. Today, he's a computer science professor at MIT. Not bad.

10 komputer tercepat 2011

10 komputer tercepat 2011
Jika Anda berpikir PC Anda cepat, tunggu sampai Anda melihat apa yang dapat dilakukan oleh Tianhe-1A, Supercomputer kolaborasi antara Intel dan Nvidia dapat melakukan komputasi 160 tahun dalam satu hari saja, sedangkan PC dual-core akan memakan waktu 160 tahun untuk menyelesaikannya.

Setiap enam bulan, proyek TOP500 komputer membuat peringkat mesin terkuat & tercepat dan sekarang, inilah adalah sepuluh mesin paling ngebut di dunia yang pernah ada.

1.Tianhe-1A
Superkomputer China saat ini tercepat di dunia: ia dapat dijalankan pada 2,5 petaflops (petaflop adalah seribu trilyun operasi floating point per detik) dipersenjentai oleh 186.368 core processor dan 229.376 GB RAM.

Terletak di Shenzhen Nasional Supercomputing Centre, digunakan oleh universitas dan perusahaan Cina.











2. Jaguar
Jaguar, sebuah Cray XT5-HE superkomputer yang terletak di US Oak Ridge National Laboratory, tersusun dari
224.162 core chip Opteron enam-core, dan kinerjanya adalah 1,76 petaflops. Superkomputer tercepat di dunia untuk penelitian.


3.Dawning Nebula
Ketika diluncurkan pada awal 2010 superkomputer Dawning Cina nebula adalah tercepat di dunia, dengan kinerja 1,27 petaflops, tapi sekarang sudah di tempat ketiga dibawah Jaguar dan Tiange yang lebih baru yang lebih cepat. Seperti saudaranya, Nebula di operasikan di National Supercomputing Centre di Shenzhen


4. TSUBAME 2.0

TSUBAME Tokyo 2.0 menawarkan kinerja mirip dengan Jaguar dengan kinerja berkelanjutan sekitar 1,4 petaflops – tapi ukurannya cuman seperempat dari ukuran Jaguar, hal ini berkat kekuatan Nvidia Fermi GPU
dan CPU Intel. Di gunakan untuk prakiraan iklim dan cuaca, pemodelan biomolekuler dan simulasi tsunami.

5. HOPPER
Hopper bekerja pada hal-hal besar: perubahan iklim, energi bersih, astrofisika, fisika partikel. Di operasikan oleh US Department of Energy Energi Nasional Penelitian Ilmiah Computing Center.

6. TERA-100
Superkomputer skala petaflop pertama yang dirancang dan dibangun di Eropa
Kapasitasnya untuk mentransfer informasi adalah setara dengan satu juta orang menonton film definisi tinggi secara bersamaan”,

Dibangun sekitar 7500 prosesor Intel Xeon, Tera-100 adalah pengganti untuk Tera 10 (buatan 2005) yang 20 kali lebih cepat dan tujuh kali lebih hemat energi sebagai pendahulunya. Satu lagi, misi Tera-100 untuk nuklir: adalah untuk membantu menjamin keandalan nuklir Eropa.

7.Roadrunner
Dibangun oleh IBM untuk Departemen Energi AS, memiliki kecepatan 1,04 kecepatan petaflop, ia dirancang untuk bekerja tahu apakah senjata nuklir AS akan tetap aman dengan bertambahnya usia mereka.Superkomputer itu juga tersedia untuk industri, dengan industri mobil dan kedirgantaraan tentunya dengan membayar layanannya.

8.Kraken
Tugasnya untuk membantu “mengatasi tantangan terbesar di dunia ilmiah, seperti memahami dasar-dasar materi dan membuka rahasia asal-usul alam semesta kita”. Terletak di Institut Nasional untuk Komputasi Ilmu, terdiri dari core 112.895 core dan 9.408 node.

9.JUGENE
Superkomputer Jerman dirancang untuk konsumsi daya yang rendah serta kinerja tinggi, danterlah terlibat dalam beberapa proyek yang menarik – termasuk mencoba mencari bagaimana DVD bekerja.

10. Cielo
Cielo digunakan untuk “operasi rahasia” oleh US National Nuklir Administrasi Keamanan, dan itu mendapatkan upgrade besar tahun ini dari 6.704 node komputasi yang akan menaikkan menjadi 9.000 nodes. serta upgrade memori dari 221.5TB menjadi sekitar 300TB.Digunakan untuk nuklir juga.

Senin, 11 Juli 2011

pengumuman

bagi siapa saja yang butuh bantuan buat project kp,skripsi atau project utnuk sebuah perusahaan dan lain-lain yang berkaitan dengan pembuatan program bisa hubungi saya

Sabtu, 25 Desember 2010

RunCore akan merilis SSD 3.5 Inci Kapasitas 1TB dengan SATA 3

RunCore akan merilis SSD 3.5 Inci Kapasitas 1TB dengan SATA 3

Pembuat SSD bernama RunCore akan merilis solid state drive 1TB besar 3.5-inch untuk interface SATA III. SSD 3.5-inch terbaru ini menggunakan interface SATA III 6 Gb / s yang dapat menawarkan hingga 500MB / s untuk data transfer rate. Berbasis di flash MLC, SSD baru RunCore dilengkapi dengan dua pengendali SF SandForce-1222 untuk kinerja RAID 0 yang terintegrasi. SSD ini menyediakan hingga 285MB / s untuk kecepatan membaca dan 275MB / s kecepatan tulis. SSD 1TB RunCore akan ditampilkan pada CeBit 2011 di bulan Maret 2011.

LG E90 Monitor LED Paling Tipis di dunia

LG E90 Monitor LED Paling Tipis di dunia



Loading ... Loading ...
Baru saja LG memperkenalkan monitor LG E90 baru, yang monitor LED tertipis untuk saat ini dari LG dengan ketebalan hanya 7,2 mm. LG E90  merupakan pilihan terbaik untuk menonton film laga atau pertandingan olah raga karena memiliki waktu respon hanya 2 milidetik, layar monitor tetap jelas dan terang bahkan selama tindakan sequence yang bergerak cepat.

LG E90 menempatkan power supply dan soket yang menghubungkan monitor dengan PC di bagian belakang dudukannya, sebuah inovasi yang disebut EZ-kabel. Selain mengurangi ukuran yang ditawarkan oleh monitor berbodi ringan dan ramping ini, LG E90 juga mengurangi konsumsi energi  – sebanyak 40 persen lebih hemat dari monitor konvensional LCD dengan CCFL-backlit.

Tampilan buram dari situs video streaming seperti YouTube secara signifikan ditingkatkan oleh  software Image Booster dari LG , sehingga mereka terlihat hebat pada monitor.  Monitor LG E90 akan dipamerkan di CES Innovations Awards 2011, di mana ia akan diakui sebagai sebuah produk “honorer”  dalam kategori peripheral komputer . LG E90 akan tersedia mulai bulan ini di pasar tertentu.