How to Download Torrent files on Your Mobile Phone

Torrent have become part of our daily internet usage. But what if you need to download a Torrent file by a wifi or any network connection outside your home, like in your workplace or college. Well Torrent clients have been around for that from few years and here are some of the popular Torrent clients you can use to download the torrent file using your Mobile Phone.




Symbian
SymTorrent 
  • The first and only BitTorrent client for Symbian OS Phones and its free and Open Source.
  • SymTorrent is available for mobile devices based on the S60 Platform 3rd and 5th edition .
  • Capability to start download via the browser.
  • Resumes partial downloaded torrents even after restarting the application.
Java ME Phones
MobTorrent is the first Bittorrent client for Java ME based mobile phones like Nokia S40, Nokia 6500 and supports all Java ME capable phones with the proper JSRs.

iPhone
  • A popular torrent client for iPhone,iPod and iPad’s.
  • Application was actually envisioned as a tool for managing ImageShack‘s torrent download service, but now extended to other torrent sites such as IsoHunt and Mininova.
  • IS Drive costs $4.99 in the Apple App Store, and this service comes loaded with either a monthly or daily fee.
Android
  • Supports all popular clients like µTorrent, Transmission, rTorrent, Vuze, Deluge and BitTorrent 6.
  • Lets you control Speed and performance of the torrent Download.
  • Adding a torrent file is easy via the integrated search, RSS feeds or the barcode scanner.
  • Easy management of torrents through home screen widgets and background alarm service.
Windows Mobile
  • Direct save to file, no more temporary file
  • Full and consolidated file saving modes.
  • Trackerless Torrents (DHT) based on Kademlia
  • Peer Exchange (PEX)
  • Plain Text and RC4 Protocol Encryptions
  • Advanced extensions
  • HTTP Seeding
Share:

Researchers Release tool that can take down Secure Websites

The THC-SSL-DOS tool released on Monday exploits a flaw in SSL(Secure Sockets Layer) renegotiation protocol by flooding the web service with multiple renegotiation requests over a  already established SSL connection for a new key. This works in same way as more common DOS(Denial of service) attacks , except the fact that this flaw in SSL renegotiation takes up more resources than a single HTTP request, hence leading to taking down a large webserver with a single computer.

The tool was released by a group of German Researchers called the Hackers Choice to exploit the flaw in SSL, which is used in many of the secure web services like Email, Banking etc, to transfer secure data across the network between user and a website without interception by a third person.
The Researchers said in a blog post- “We are hoping that the fishy security in SSL does not go unnoticed. The industry should step in to fix the problem so that citizens are safe and secure again. SSL is using an aging method of protecting private data which is complex, unnecessary and not fit for the 21st century,”.
This exploit can allow a single laptop to take down an average server with a greater Bandwidth over a standard DSL connection . It can also take down multiple larger Webservers with few computers. The group claims that the attack would also work on non SSL enabled websites with few modifications on the tool.
For more info-The Hackers Choice
Share:

8 More Important Security Enhancements

1. Check Windows Update and Office Update regularly (http://office.microsoft.com/productupdates); Click on the Automatic Updates tab in the System control panel and choose the appropriate options.
2. Install a personal firewall. Both SyGate (www.sygate.com) and ZoneAlarm (www.zonelabs.com) offer free versions.
3. Install a free spyware blocker. I am choose SpyBot Search & Destroy (http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.
4. Block pop-up spam messages by disabling the Windows Messenger service.
Open Control Panel >> Administrative Tools >> Services and you'll see Messenger
Right-click and go to Properties, Set Start-up Type to Disabled and press the Stop button. Bye spam pop-ups!
5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol.
undefined
6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.
7. Buy antivirus software and keep it up to date. If you're not willing to pay, try AVG Free Edition
8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get.
Share:

Security Software That Can Detect And Kill Hidden Trojan Virus And Keylogger

In your system some times many harm full program run like keylogger ,virus and trojan which are hidden and you do not capable to remove it, So today i am going to introduce you with a software which remove all the hidden harm full program from your system and increase the security of your computer system.



Process Revealer

This software launch by LOGIXOFT. Process Revealer is a free security software that can detect and kill hidden processes.
Process Revealer Free Edition is a free hidden process detector that reveals what does not appear in standard detection utilities like Windows Task Manager. Process Revealer provides detailed information about each process running on your computer to help you know if a process is related to a malicious program. Hidden programs are automatically highlighted in the interface and can be removed in one click.
Share:

Cross Site Scripting (XSS)

XSSHello everyone!
Today we are going to cover some basics about a common vulnerability found in web applications.
Due to this, a user (attacker) can inject a (client-side) script into the web page.
Interesting? then…carry on reading..

But, what is Cross-site scripting (XSS) ?
XSS is an attack technique which allows (or rather I should say, “forces”) a web site to execute and display malicious code on a user’s web browser.
The intended victim of an attacker is a user and not the server. The server is a just a host while the malicious code executed is on that user’s (victims’s) web browser.
Attacker uses the server just to perform the attack.
So, what is the exploit code for this kind of attack?
Generally, the code is written in JavaScript (a JavaScript malware?) or it could simply be in HTML, executed on a user’s web browser! (These two are most commonly used)
Let us now try understanding this with an example:
Consider http://xss_vulnerable.com/ is a site vulnerable to XSS attack.
An attacker first needs to identify and locate this vulnerability. After this, he can perform many acts including
  • Account hijacking
  • Cookie stealing
  • Intranet hacking
  • History stealing
  • even..keystroke recording and much more..
They basic idea behind is to make a web server display back the input provided. So, one of the most common vectors for this is via a search box.
_
Here, let me show you a quick example I wrote for this little article:
A simple search box for providing user input and then displaying the results accordingly


Now, what if we replace our input? with a javascript/html code?
Lets try injecting a simple alert box,

And the end result is…

By looking at the source code of the page

we can cleary see, our input was injected into that web page and executed an harmless alert dialog box.
An attacker can now perform much advanced XSS attacks to exploit users (cookie stealing, etc) and spread that link.
Most users fall for this attack as the URL contains the REAL web site domain name.
So, these were some basics about Cross-site scripting (XSS) attack. Hope you all have enjoyed this small post.
Stay tuned for more posts regarding various XSS categories (Non-persistent, persistent and DOM-Based), preventing XSS attacks, etc
Share:

The best 10 Yahoo! Messenger Tricks and Hacks




Yahoo! Messenger is an instant messaging program which is compatible with all Windows versions. While instant messaging is the focus of Yahoo! Messenger, there are several special tricks that can enhance the user experience.

Here are my 10 Best Yahoo! Messenger Tricks and Hacks:

1. Find invisible users on your Yahoo! Messenger list

Want to find out someone who’s hiding from you? You can easily do so by going to Yahoo! Invisible Checker. All you need to do is type in the Yahoo! ID and the particular users status will be revealed.

2. Invisible nickname on chat rooms

Just go to edit profile and in the nick name type a (space character) on it just press Alt 0160 ( or ALT+255 ) and save it.

Now go to any Yahoo! chat room and you’ll notice that your nick name is empty. [Alt+0160 is a keyboard shortcut for space]

3. Run Multiple Instances of Yahoo! Messenger on same system

Some of you might be having more than one Yahoo! ID would like to log in simultaneously. Here is an easy way to do it without installing any sort of software. You just have to edit the registry and voila there you go. Follow the instructions below:
  • Download the following -multiyahoo.reg and save it to your hard disk.
  • Double click on it.


  • The above dialog will popup, click ‘Yes
  • Start the yahoo messenger login with your first ID. Then again start another yahoo messenger by clicking on the messenger icon and log in with your second ID.This tweak works with all versions of Yahoo Messengers.


4. Removing Ads from your Yahoo! Messenger

If you are using Yahoo! Messenger 8.0, then you can disable ads by following the below steps:
  • First close the Yahoo! Messenger.
  • Save this .bat file and execute it. (Note: You won’t be able to enter the chat rooms if you use this patch.)

The above fix doesn’t work for Yahoo! Messenger 9 Beta. Here’s a way to disable the ads in Yahoo! Messenger 9:
  • Make sure the Yahoo! Messenger isn’t running, if it is then just close it.
  • Now backup the following file C:\Program Files\Yahoo!\Messenger\Yahoo!Messenger.exe (create a new copy)
  • Download HxD hex editor.
  • Open C:\Program Files\Yahoo!\Messenger\Yahoo!Messenger.exe in the hex editor
  • Now go to the offset 295928 (in HxD: Search/GoTo)
  • Look at the right column and replace y from “y.m.s.g.r.a.d.s” with p
  • Save the file and close HxD.
Note: This approach breaks Yahoo! Messenger’s terms of service.

If nothing works try launching this file.

5. Yahoo! Smiley Codes

You can make use of all smileys including hidden ones in your messenger by using YEmotePLUS plugin.

6. Creating Custom Profiles for Chat

You can create custom profiles with different name, sex and other details from Yahoo! Create/Edit Profiles. You can use these for chat services only.

7. Change the Yahoo! Messenger Title Bar

You can change the text that appears at the very top of the Yahoo! messenger window by editing the ymsgr.ini file.

1. Go to Program Files\Yahoo!\ and open ymsgr.ini.

2. Then at the end, type this:

[APP TITLE]
caption=YOUR TEXT

3. Change YOUR TEXT to whatever you want it to say. Then save the file and close messenger. When you restart messenger you will see your new message.

8. Online Status Changer and Manager

HyperIM is currently the best status changer & manager for Yahoo! messenger available at present. You can download it here.

9. Access Yahoo! Messenger Chat archives while offline

You can access your Yahoo! chat logs using Yahoo! Message Archive Decoder. It reads Yahoo! Messenger archive files (.dat files) and presents them in a format that you can read. It decodes the message archive without logging in (offline mode and no passwords required). You can download it here.

10. Retrieve Yahoo! Messenger Display pictures

Y! Display Pic will retrieve Yahoo! users even if they are offline or invisible. You can download it here.
Share:

Best 6 proxy Sites to Hide Your Identity

Share:

Hack Adobe Products With Notepad

This very short tutorial or tip that will show you how to hack photoshop or any other adobe software, you will need a serial key that is generated through a keygen or http://www.serials.ws/ when installing, next go to:


C:\Windows\System32\drivers\etc


Do this before installation!

Find a file named "hosts", right click it and "edit" paste this text completely:


# Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a "#" symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
127.0.0.1 localhost
127.0.0.1 activate.adobe.com
127.0.0.1 practivate.adobe.com
127.0.0.1 ereg.adobe.com
127.0.0.1 activate.wip3.adobe.com
127.0.0.1 wip3.adobe.com
127.0.0.1 3dns-3.adobe.com

127.0.0.1 3dns-2.adobe.com
127.0.0.1 adobe-dns.adobe.com
127.0.0.1 adobe-dns-2.adobe.com
127.0.0.1 adobe-dns-3.adobe.com
127.0.0.1 ereg.wip3.adobe.com
127.0.0.1 activate-sea.adobe.com
127.0.0.1 pagead2.googlesyndication.com
127.0.0.1 wwis-dubc1-vip60.adobe.com
127.0.0.1 activate-sjc0.adobe.com


What to do if the "hosts" file is invisible:

* Go to folder options in the control panel and then view hidden folders

Note:-
NEVER register the product or you will most certainly get blocked
 

You May Use These Black Listed Keys




1325-1449-6781-7659-0393-3886
1325-1009-9542-4206-2571-1821
1325-1669-8978-0838-9142-5258
1325-1110-3587-1378-2512-5113
1325-1485-7575-6892-8980-2789
1325-1351-8493-5126-5063-2659
1325-1180-0975-6327-5927-7027
1325-1318-5855-0146-4316-2971
1325-1089-7510-0925-1754-1759
1325-1916-2561-6219-3580-7611
1325-1342-6295-1372-0690-8009
1325-1884-3525-3192-5355-8786
1325-1978-5904-9353-5360-7627
1325-1164-1632-4494-2722-8482
1325-1519-2548-8290-3544-1865
1325-1991-4924-6752-2176-8168
1325-1738-2955-4811-5315-0359
1325-1558-2481-7578-1265-3812
1325-1485-4253-9130-7614-5497
1325-1763-8748-4339-3347-4635
Share:

File Binding Tutorial

In this tutorial I will be showing you (if you do not know already) how to bind two files together using WinRAR.

This is useful if you are sending a file and you want it to extract and run straight away.

For this tutorial I will be using a simple .exe file (command[1].exe) and a game (Grid Wars).

Step 1: 
Get the files you want to bind.

Step 2:

Highlight them both and add to archive.

Step 3:

Change the name and select "Create SFX archive"

Step 4:

Go to the "Advanced" tab at the top and click on "SFX options"

Step 5:

In the "General" tab type in the name of the file you want to run after the extraction.

Step 6:

Go to the "Modes" tab and select "Hide all"

Step 7:

Go to the "Text and icon" tab and change the icon to something other than the WinRAR icon

Step 8:

Click "OK" on the advanced window and "OK" in the main window and it will create the file.

Now when the user clicks on it extracts and automatically runs command[1].exe

This can be used in a variety of ways, you can experiment with the options to get different results.

Enjoy!!!

Sky Is Not The Limit
Share:

Hacking Sites With DNN Very Easy

DNN (DotNetNuke) Gallery All Version Remote File Upload without Authentication

Bug Found by Alireza Afzali From ISCN Team

Date of finding bug : 2008/05/5

Over 10 military website and 20 state of United State of america Defaced by
this bug


Example Of The Hack

Orignal Site 
http://www.raddho.org/

File In The Root 
http://www.raddho.org/portals/0/badman.txt

The Song In Below Video Is Really Funny 
 
So Here Are The Steps :--
 
1st Find The DNN

Go To Any Search Engine

Google

And Search This Dork

:inurl:/tabid/36/language/en-US/Default.aspx

See The Results And Target Any site

You Will See This Part In Every Site That You Searched For

/Home/tabid/36/Language/en-US/Default.aspx

Now Replace This With

/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx

You Will Enter In The Gallery Page

Now Select

File ( A File On Your Site )

At This Point Cope This Java Script And Paste It In The Address Bar

http://rapidshare.com/files/349733746/js.txt

You Will Find The Upload Option

Select Root And Upload Your File

Your File Then Will Be In The Root

Then Put This In End Of URL

portals/0/yourfile.yourfile format

Your Done Enjoy !!!
 
Share:

DISCLAIMER

The information provided on hottechtips.blogspot.com is to be used for educational purposes only. The website creator is in no way responsible for any misuse of the information provided. All of the information in this website is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word “Hack” or “Hacking” on hottechtips.blogspot.com should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk.