Berita Terbaru Hot News ASR Search Engine Active Search Results Search Engine Active Search Results Page Ranking Technology ASR Page Ranking Technology Add Your Web Site To ASR ASR's Registration Page Active Search Results (ASR) is an independent Internet Search Engine using a proprietary page ranking technology with Millions of popular Web sites indexed. April 2011 ~ free sofware haker
Berlanggan artikel Blogtegal via e-Mail

Check Page Rank of your Web site pages instantly:

This page rank checking tool is powered by Page Rank Checker service

Jumat, 29 April 2011

Email Hacking

Email-Hackers Group
HOME


Please do not submit an order if you are not willing to pay.


WHY you need US
* Do you suspect that your spouse/significant other is cheating on you?
* Have you been a victim of an internet scam ?
* Do you want to know what your employers are doing on your time?
* Do you have important data that have been lost and need to be recovered?
* Do you want to keep a tab on your kids?
* Do you want to know the truth ?

The reason as to why you would require a password retrieval session is highly dependant on your situation as it is hard to answer in general.
What ever your reason might be we can help you to find the facts.
For a small fee (150USD) we can provide you a fast and secure service of hacking mail passwords

HOW TO START

It`s simple and easy
to submit an order with us
there are only 4 steps

1. Just click HERE to fill out the ORDER FORM and we will do the rest.

2. In a few hours (per average less than 72hrs) we will crack the password and we will send you the proofs.

3. Once you are convinced that we actually have the password, you are required to pay the charges ($150USD)

4. You will receive the password as soon it`s confirmed your full payment

========================= CLIK TO ORDER ============================================
Read more »

Selasa, 26 April 2011

Internet Explorer 9: It’s Different!





Have you ever encountered a virtual battle? Yeah! You heard it right. I am talking about a battle, the one that is taking place between different web browsers. Last Friday while I was reading a tech blog, I got to know that Microsoft had released its much awaited browser- Internet Explorer 9. I did not even wait to finish reading the article and immediately opened another tab to start downloading Internet Explorer 9. I had to get firsthand experience, the browser war was heating up and I did not want to sit back and relax with an old browser.

At first glance, Internet Explorer 9 may look like any other browser but that is not the case. It is different. The first thing you like about Internet Explorer 9 is its integration with Windows 7. If you use Windows 7, you don’t have to pin the shortcut to taskbar anymore, it automatically appears on the taskbar.

Also, the built in download manager is super fast as compared to previous versions of Internet Explorer. I could see a huge difference while downloading an iYogi video, which was posted on YouTube. Microsoft has really worked on this version of download manager, it has introduced a feature that resumes downloading when you pause and shows the transfer rate in the status bar. The download manager also alerts you if the file you are downloading has malicious content or is simply virus-infected. Unlike other browsers, the download manager for Internet Explorer 9 stopped me from downloading a malicious application on my laptop when I tried to test this feature.

If you have ever encountered an error while using previous versions of Internet Explorer, and if the error message has prompted you to stop all work and close all browsers, you would love Internet Explorer 9. If a particular tab is causing problems in Internet Explorer 9, it would simply prompt you to close that tab while you can continue doing your work as usual.

Apart from all the improvements in Internet Explorer 9, the one feature that steals the show, for me, is the ease with which I can stream high definition videos. Travelling and watching videos on my laptop is going to be so much fun now.

Yeah I know, I might sound like a Microsoft fan right now, but I could change loyalties, if people from Google and Mozilla were to introduce some more changes in their browsers!
http://kickurl.com/97838/
Read more »

Kamis, 21 April 2011

Function Hacker In Era of Internet Technology

Want to know more about the hacker, who had been regarded as perpetrators of crime, a hacker has positive and negative sides

Today, society considers hackers as criminals, who often break into the sites of others. But in fact, hackers are the most important job. Especially in the current era of internet technology.

"Hacking is like a double-edged sword. Aktitivitas can be used for negative and positive. The positive hacking must be done by white hackers. While hacking to negative interest would have been done by black hackers," said the white community of hackers from hackers Yogyafree Nathan Gusti Ryan, to Legal, Friday (6/8/2010).
According to the hacker with a nick name Progtel this negative activity by hackers is to destroy the system by exploiting vulnerabilities present. However positive, skill hack can be used to audit a company's network security.

Audit network security in question is looking for security holes and notify the owner of the network for immediate repair. Thus, weak network vulnerable to hackers black target to be covered and prevent hackers black damaging the existing system.
"Trends in corporate business today, all completely online. That is, the development of ecommerce quite extraordinary. Imagine if your company's competitors hire a cracker or black hackers to disrupt and damage the Security System your company's eCommerce site, then the business process its Online System will be disrupted could even halt altogether. How big losses that will be on the responsibility? Moreover, public confidence in the credibility of your company will fall, "said Nathan.

Therefore, continued Nathan, the function of a hacker is very important. Hacker is the forerunner of security investigator or a security network security auditors.

Nathan himself was often asked to perform internet security network security auditing in some companies. It is generally through a formal procedure or a request from an agency / company. Meanwhile, if out of the procedure, of course this will be the responsibility of the individual.
Terjemahan Bahasa Indonesia ke Inggris
"A white hackers know the exact boundary action, which is limited to provide positive input for the web admin site to target. The limit, Action Without Damaging The Best is a warning,"said the man who was also owner of XP Solutions, an independent organization concerned with directs the development of IT and human resources expertise in it for positive purposes.

okezone.com
Read more »

Senin, 18 April 2011

nyantai@blitz karaoke

@blitz karaoke by jokarwilis2005
@blitz karaoke, a photo by jokarwilis2005 on Flickr.

sambil nunggu anak di kidszania ..karaokean dulu deh

Read more »

Jumat, 15 April 2011

bom ∂ï cirebon

Telah terjadi ledakan cukup besar yang terjadi ∂ï kota udang ..(Cirebon-jawa tengah) dimana telah menewaskan satu orang polisi dan mengakibatkan 15 orang yang terluka...kemungkinan berita ini diterbitkan ..karena adanya ledakan saat orang2 lagi berada ∂ï mesjid untuk menjalankan sholat Jumat...dimana lokasi kejadian berada ∂ï mesjid Polres Cirebon-jawa barat..
Read more »

Senin, 11 April 2011

Hackers Notepad

Hackers Notepad, Resource Hacker, Notepad + + or whatever his name, which must have this software is one software that must be owned by a hacker, or who are learning "hacker world. " With this software, we can change the source of a program, change the name of the author or the creator, file version, etc..

This software is also frequently used by thieves ripper or software. This software supports programming languages ​​vb, delphi, java, html, css, and others. To be sure, this software, must be owned by a hacker or who are learning about hacking. With user friendly interface which, in addition to hackers notepad is easy for beginners though.
download here
Read more »

Sabtu, 02 April 2011

Samsung Investigating Report of Keylogger on Its Laptops



Samsung Electronics is investigating allegations that some models of its R Series laptops contain keylogging software that could be used to record anything typed on the laptop computers.
Mohamed Hassan said he became aware of the issue last month, when he purchased a Samsung R525 at a Best Buy in Toronto. The laptop had keylogging software on it, which he deleted immediately. Two weeks later, Hassan decided he wanted a more powerful machine, so he returned the R525 and bought a new model -- the R540, at a local FutureShop. To his surprise, the keylogger was there too, Hassan said in an interview Wednesday.
"These were new systems. They weren't used for anything," he said. "I could give them the benefit of the doubt on the first one. But then when I got a second model, a different model from a different store, that tells me that Samsung is aware of the problem."
Hassan, an IT consultant based in Toronto, said that Samsung tech support told him: "We just put it there to find out how the computer is being used."
Samsung Investigates
Samsung spokesman Jason Redmond said that his company is looking into Hassan's allegations. "We take these claims very, very seriously," he said. He had not previously heard of the problem, or heard of de Willebois Consulting, the company that makes the StarLogger software that Hassan said he found on the laptop. "We have no understanding of a relationship with this company and we have no prior knowledge of this software being on our laptops," he said.
De Willebois Consulting did not respond to messages seeking comment for this story. On its website, the company says StarLogger "is completely undetectable and starts up whenever your computer starts up. See everything being typed: emails, messages, documents, web pages, usernames, passwords, and more." The software can also capture screen images, the website says.
Hassan's allegations were published Wednesday in Network World.
If Samsung is responsible for putting the keylogger on the machines, Samsung could be in big trouble, according to Cindy Cohn, legal director for the Electronic Frontier Foundation. "They shouldn't be installing keyloggers on devices that they're selling to the general public. Even if Samsung isn't using it, you're basically setting up someone else to use it," she said.
As with Sony BMG's notorious rootkit software, discovered in 2005, if Samsung secretly installed keyloggers on customers' computers, it could lead to civil lawsuits or charges that the company is violating state consumer protection laws. "There are serious criminal offenses possible if they're actually using this device to spy on their customers, but I don't see any evidence of that," Cohn said. "This could be chalked up to poor thinking, or it could be illegal. We just need more information to be able to figure out where it is on this scale."
Keyloggers are commonly used by hackers to steal sensitive information including usernames and passwords from hacked computers, but de Willebois' website describes some legitimate uses for its software: monitoring children's Internet activity or recovering text in the event of a computer crash, for example.
IDG, the parent company of the IDG News Service, also publishes Network World.
Robert McMillan covers computer security and general technology breaking news for The IDG News Service. Follow Robert on Twitter at @bobmcmillan. Robert's e-mail address is robert_mcmillan@idg.com

Robert McMillan – Wed Mar 30, 6:20 pm ET
Read more »

 
Powered by Blogger