Jump to content

Cyb3r3vil

Members
  • Content Count

    50
  • Donations

    $0.00 
  • Joined

  • Last visited

  • Days Won

    9

Posts posted by Cyb3r3vil


  1. fcc-net-neutrality_wide-667147afe5c68d5e

     

    At the start of a meeting to decide the issue of net neutrality, Federal Communications Commission Chairman Tom Wheeler (center) holds hands with FCC Commissioners Mignon Clyburn (left) and Jessica Rosenworcel at the FCC headquarters Thursday.

    Mark Wilson/Getty Images

    The Federal Communications Commission approved the policy known as net neutrality by a 3-2 vote at its Thursday meeting, with FCC Chairman Tom Wheeler saying the policy will ensure "that no one — whether government or corporate — should control free open access to the Internet."

    The Open Internet Order helps to decide an essential question about how the Internet works, requiring service providers to be a neutral gateway instead of handling different types of Internet traffic in different ways — and at different costs.

    "Today is a red-letter day," Wheeler said Thursday.

    The dissenting votes came from Michael O'Rielly and Ajut Pai, Republicans who warned that the FCC was overstepping its authority and interfering in commerce to solve a problem that doesn't exist. They also complained that the measure's 300-plus pages weren't publicly released or openly debated.

    The new policy would replace a prior version adopted in 2010 — but that was put on hold following a legal challenge by Verizon. The U.S. Court of Appeals for the D.C. Circuit ruled last year that the FCC did not have sufficient regulatory power over broadband.

    After that ruling, the FCC looked at ways to reclassify broadband to gain broader regulatory powers. It will now treat Internet service providers as carriers under Title II of the Telecommunications Act, which regulates services as public utilities.

    Update at 2:20 p.m. ET: Reactions — For And Against

    Welcoming Thursday's news, the ACLU's legislative counsel Gabe Rottman says:

    "This is a victory for free speech, plain and simple. Americans use the Internet not just to work and play, but to discuss politics and learn about the world around them. The FCC has a critical role to play in protecting citizens' ability to see what they want and say what they want online, without interference. Title II provides the firmest possible foundation for such protections. We are still sifting through the full details of the new rules, but the main point is that the Internet, the primary place where Americans exercise their right to free expression, remains open to all voices and points of view."

    Broadband for America, a group whose members include major Internet service providers, is calling for Congress to intervene. Its honorary co-chairs John Sununu and Harold Ford Jr. say:

    "The FCC's decision to impose obsolete telephone-era regulations on the high-speed Internet is one giant step backwards for America's broadband networks and everyone who depends upon them. These 'Title II' rules go far beyond protecting the Open Internet, launching a costly and destructive era of government micromanagement that will discourage private investment in new networks and slow down the breakneck innovation that is the soul of the Internet today."

    Update at 1:22 p.m. ET: Rules Will Apply To Mobile

    "The landmark open Internet protections that we adopted today," Wheeler says, should reassure consumers, businesses and investors.

    Speaking at a news conference after the vote, Wheeler says the new policy will "ban blocking, ban throttling, and ban paid-prioritization fast lanes," adding that "for the first time, open Internet rules will be fully applicable to mobile."

    Update at 1 p.m. ET: FCC Adopts Net Neutrality

    By a 3-2 vote, the FCC votes to adopt net neutrality rules to "protect the open Internet."

    Update at 12:50 p.m. ET: Wheeler Draws Applause

    Chairman Tom Wheeler is speaking, meaning a vote is looming.

    "The action that we take today is an irrefutable reflection of the principle that no one — whether government or corporate — should control free open access to the Internet," FCC Chairman Tom Wheeler said, drawing applause and whoops of approval from some of those in attendance.

    Update at 12:01 p.m. ET: A Dissenting Vote

    Saying the FCC was seizing power in "a radical departure" from its earlier policies. Commissioner Ajut Pai, a Republican, spoke against the proposal. He accused the FCC of "turning its back on Internet freedom."

    Pai said the commissioners were backing the new measure for only one reason: "because President Obama told us to."

    Seeing the new policy as an attempt to intrude on the Internet, Pai predicted higher costs for consumers and less innovation by businesses.

    Update at 11:25 a.m. ET: 'Open Internet' Portion Has Begun

    After dealing with another issue (of municipalities being able to control broadband service), the FCC has turned to the new proposal.

    The proposal was introduced at Thursday's meeting by Julie Veach, chief of the FCC's Wireline Competition Bureau, who said it "would set forth clear, sustainable, enforceable rules to preserve and protect the open Internet as a place for innovation and free expression."

    She said the order "builds on the views of some 4 million Americans" who responded to a request for comments.

    Guest speakers included Etsy CEO Chad Dickerson and writer and TV producer Veena Sud, whose show The Killing survived with the help of Netflix. A short video from Tim Berners-Lee was also shown.

    Our original post continues:

    Precise terms and details of the policy have not been made publicly available — a situation that prompted two Republican FCC commissioners to seek to postpone Thursday's vote. That request was denied.

    Summarizing "What You Need To Know" about the vote, Eyder wrote for the Two-Way, "Without net neutrality rules, ISPs could theoretically take money from companies like Netflix or Amazon to speed up traffic to their sites."

    Thursday's vote comes after Commissioners Michael O'Rielly and Ajut Pai asked that the FCC "immediately release the 332-page Internet regulation plan publicly and allow the American people a reasonable period of not less than 30 days to carefully study it."

    That request was denied; we'll post the document here when it's available.

    • Like 1

  2.  

    Here is simple, but useful google search hack that will help you to find serial key, keygen , patch of any software .

     

    1. Go to google.com

    2.Type this syntax in search bar ” 94FBR Product name with desired software” for example :

     

    94fbr nero

    94fbr avast

    proxifier 94fbr

    etc

    nero-.jpg

     

     

    94FBR was part of a Microsoft Office 2000 product key that was released on the internet that bypassed Microsofts activation system.Because it is a relatively uncommon term, when you add it to your search queries, it will generally return results of pages listing illegal serial numbers.

    • Like 7

  3. 1000.jpg

     

    In particular, Google sounds the alarm over the FBI’s desire to ‘remotely’ search computers that have concealed their location. Photograph: Emmanuel Dunand/AFP/Getty Images

    Ed Pilkington in New York

    @edpilkington

     

    Wednesday 18 February 2015 12.17 EST Last modified on Wednesday 18 February 2015 12.58 EST
     
    Comments 427

    Google is boldly opposing an attempt by the US Justice Department to expand federal powers to search and seize digital data, warning that the changes would open the door to US “government hacking of any facility” in the world.

    In a strongly worded submission to the Washington committee that is considering the proposed changes, Google says that increasing the FBI’s powers set out in search warrants would raise “monumental and highly complex constitutional, legal and geopolitical concerns that should be left to Congress to decide”.

    The search giant warns that under updated proposals, FBI agents would be able to carry out covert raids on servers no matter where they were situated, giving the US government unfettered global access to vast amounts of private information.

    In particular, Google sounds the alarm over the FBI’s desire to “remotely” search computers that have concealed their location – either through encryption or by obscuring their IP addresses using anonymity services such as Tor. Those government searches, Google says, “may take place anywhere in the world. This concern is not theoretical. ... [T]he nature of today’s technology is such that warrants issued under the proposed amendment will in many cases end up authorizing the government to conduct searches outside the United States.”

    Google raised its objections as part of a public consultation that ended on Tuesday. Its submission, and 37 others made by interested parties, will be considered by the Advisory Committee on Criminal Rules, an obscure but powerful Washington body consisting mainly of judges that has responsibility over federal rules including those governing the actions of the FBI.

    Federal agents wishing to search a property have to apply to a judge for a warrant to do so. Under existing rules, known as Rule 41, the authorizing judge has to be located in the same district as the property to be searched.

    But the Justice Department argues that in the modern computer age, such an arrangement no longer works. It is calling for the scope of warrants to be widened so that FBI agents can search property – in this case computers – outside the judge’s district. The FBI argues that this new power would be essential in investigations where suspects have concealed the location of their computer networks.

    A comment to the committee from a coalition of prosecutors, the National Association of Assistant US Attorneys, said that “suspects are increasingly using sophisticated anonymizing technologies and proxy services designed to hide their true IP addresses. This creates significant difficulties for law enforcement to identify the district in which the electronic information is located.”

    The Justice Department itself has tried to assuage anxieties about its proposed amendment. In its comment to the committee, DoJ officials say that federal agents would only request the new type of warrants where there was “probable cause to search for or seize evidence, fruits, or instrumentalities of crime”.

    But civil liberties and legal groups remain unconvvinced, insisting that the language is so vaguely worded that it would have draconian and global implications. In its submission, the American Civil Liberties Union said that the proposed changes could violate the fourth amendment of the US constitution, which bans unreasonable searches and seizures.

    The ACLU’s principal technologist, Christopher Soghoian, said: “The government is seeking a troubling expansion of its power to surreptitiously hack into computers, including using malware. Although this proposal is cloaked in the garb of a minor procedural update, in reality it would be a major and substantive change that would be better addressed by Congress.”

    The FBI has been developing its computer surveillance techniques over almost 15 years. It now regularly uses “network investigative techniques”, or NITs, to implant malware software onto target devices that in effect allow agents to control the machine – they can turn on or off cameras and recording equipment, download the entire database of information and gain access to other linked computers.

    Google argues such tactics run the risk of the private information of innocent third parties being hoovered up in a massive data sweep.

    Recent high-profile hacks such as the breach of Sony Pictures, which the FBI blamed on North Korea, have highlighted global cybersecurity as a growing area of importance for the Obama administration. But the US government now stands accused of trying to acquire the ability to carry out routine extra-territorial hacking raids that it has accused other countries of conducting.

    Google contends that by doing so, the US government risks undermining diplomatic arrangements it has built up with other countries over many years that allow cross-border investigations to take place with the approval of all parties.

    “The US has long recognized the sovereignty of nations,” the company says in its submission, quoting legal authorities that say that in the absence of a treaty or other national agreement, “the jurisdiction of law enforcement agents does not extend beyond a nation’s borders”.

    In October, FBI director James Comey gave remarks – widely derided by privacy watchers and tech-industry officials – in which he said “encryption threatens to lead us all to a very, very dark place”.

    Comey asked: “Have we become so mistrustful of government and law enforcement in particular that we are willing to let bad guys walk away, willing to leave victims in search of justice?”

    • Like 2

  4.  

     

     

    Phishing Hole: Serious Flaw Found in Internet Explorer

    A serious bug in Internet Explorer 11 for Windows 7 and 8.1 could let attackers steal people's login credentials and even modify Web pages. Experts say the flaw could also be used to launch convincing phishing campaigns on unsuspecting Web users.

    The flaw is a type of cross-site scripting (XSS) bug; carefully written JavaScript it lets attackers bypass what's called the "Same-Origin Policy," a rule of the Internet that prevents websites from being able to modify each other's content. It even works if the site uses the more secure HTTPS protocol instead of HTTP.

    To dispel any doubts about its existence, security expert David Leo of British security firm Deusen, who discovered the flaw, created a Web page that safely demonstrates the exploit. Visitors to the site who use IE will see the Daily Mail's homepage in a pop-up window, which then changes to read "Hacked by Deusen."

     

    Leo accomplished this because the exploit let him redirect the window from the Daily Mail's site to his own site, without changing the displayed URL. Even though the browser's address bar still displays www.dailymail.co.uk, a different Web page is actually loading in viewers' browsers.

    Pretending to deface a website, as Leo did, is the least that attackers could do with this flaw. They could also steal a website's authentication cookies, which are used to let people sign in to online accounts, thus stealing those people's credentials.

    Attackers could also create extremely credible phishing pages that would appear to have a legitimate website's URL. The phishing pages could be crafted to look like a bank's homepage or other important site, and trick people into disclosing important information, or simply contain malware.

    Microsoft says that as of now, there's been no evidence that attackers have been using this flaw in the wild. The company also points out that attackers would have to lure targets to their phishing websites in order to exploit it.

    On the one hand, exercising some extra caution in your Web browsing could protect you from attacks, but on the other, clever criminals should have little trouble luring people to a well-crafted page.

    While new versions of Internet Explorer do have a feature called SmartScreen that is designed to detect phishing websites, it only works with large-scale attacks, not targeted ones.

    To avoid attacks using this exploit, simply avoid using Internet Explorer until Microsoft issues a patch. Earlier versions of IE may also be vulnerable, but the latest versions of Mozilla Firefox and Google Chrome are not.

    WoW ! Love Firefox more & More !

     

    • Like 1

  5. Not my work just sharing INFO !

     

    google_hacking.jpg

     

     

    Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed.

    In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking:

    1. Using Google to Hack Security Cameras:

    There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. With Google, it is possible to hack these cameras so that you can view the images captured by them in real time. For this, all you have to do is just use the following search query in Google. Type in the Google search box exactly as given below and hit enter:

    inurl:”viewerframe?mode=motion”
    

     

    Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows:

     

    Livecamera1.jpg

     

     

     

     

    As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. In order to access them, just use the following search query:

     

    intitle:”Live View / – AXIS”
    

     

    Now, click on any of the search results to access a different set of live cameras. Thus, you have hacked Security Cameras using Google.

    2. Using Google to Hack Personal and Confidential Documents:

    Using Google, it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.

    intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
    
    

     

    You can gain access to a list of .xls files (excel documents) which contains contact details including email addresses of large group of people. To do so, type the following search query and hit enter:

    filetype:xls inurl:”email.xls”
    

     

    Also, it is possible to gain access to the documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query:

    intitle:index.of finances.xls
    

     

    3. Hacking Google to Gain Access to Free Stuffs:

    Ever wondered how to hack Google for free music or eBooks. Well, here is a way to do that. To download free music, just enter the following query on Google search box and hit enter.

    “?intitle:index.of?mp3 eminem“
    

     

    Now, you’ll gain access to the whole index of Eminem album where in you can download the songs of your choice. Instead of eminem you can substitute the name of your favorite album. To search for the eBooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.

     

    Enjoy Hacking Google and having a little fun with this INFO

     

    i know this is old news for some but sure it's new to other's

    • Like 2

  6. logo.jpg

     

     

    FreeRapid is an easy to use Java downloader that supports downloading from Rapidshare, Youtube, Facebook, Picasa and other file-sharing services, include the new ones like mega.co.nz.
    Simply copy and paste your links from a browser to this application. FreeRapid Downloader will handle the rest itself. No more clicking or uncomfortable waiting.

     

     

    Main Features
    • support for concurrent downloading from multiple services
    • downloading using proxy list
    • support for streamed videos or pictures
    • download history
    • smart clipboard monitoring
    • automatic checking for file's existence on server
    • auto shutdown options
    • automatic plugins updates
    • simple CAPTCHA recognition
    • works on MS Windows (all, include Win7 and Win8), Linux and MacOS
    • easy to use
    • multilanguage interface English, Bulgarian, Czech, Finnish, Portugal, Slovak, Hungarian, Simplified Chinese and many others. Information for translators.
    • looks great
    • more than 700 supported sites!
    • simply works! more over 2 000 000 users can confirm that
    Help us to spread out the language list.
    Currently supported services are: Well-known international sites!
    • Rapidshare.com (+ premium)
    • MegaUpload.com Mega.co.nz!
    • Megarotic.com & Sexuploader.com
    • MediaFire.com
    • NetLoad.in
    • Hotfile.com :-(
    • FileFactory.com
    • UploadStation.com
    • Uploaded.to
    • DepositFiles.com
    • Share-online.biz
    • Storage.to
    • Uploading.com
    • Share-online.biz
    • Crocko.com
    • Letibit.net
    • Uploadcore.com
    • FileStay.com
    • Bitshare.com
    • SaveFile.com
    • Filehost banned (4S)
    • Load.to
    • Eazyupload.net
    • Vimeo.com
    • FileUpload.net
    • Uppit.com
    • FileFlyer.com
    • Dailymotion.com
    • Freakshare.net
    • ShareBees.com
    • Picasa.google.com
    • YouTube.com (video)
    • ...and MANY others...
    Popular sites in YOUR country!
    • Sendspace.com
    • Prefiles.com
    • Sendspace.pl
    • Indowebster.com
    • Ziddu.com
    • FlyUpload.com
    • Rapidshare.de
    • Cramit.in
    • BitRoad.net
    • iFile.it
    • UploadJet.net
    • Ifolder.ru
    • MegaShare.vn
    • Mega.1280.com
    • FilesMonster.com
    • Multishare.cz
    • HellShare.com (+full)
    • QuickShare.cz (+premium)
    • Uloz.to
    • Sdilej.cz
    • Multiload.cz
    • Share-rapid.com
    • Nahraj.cz
    • Titulky.com
    • Edisk.cz
    • LeteckaPosta.cz
    • CZShare.com free (+profi)
    • Subory.sk
    • CobraShare.sk
    • Ulozisko.sk
    • Stream.cz (video)
    • O2MusicStream.cz (video)
    • ...and MANY others...
    Crypters!
    • Usercash.com (crypter)
    • Tinyurl.com (crypter)
    • Linkbucks.com (crypter)
    • RSMonkey.com (crypter)
    • Radikal.ru (crypter)
    • Paid4share.com (crypter)
    • Relink.us (crypter)
    • Anonym.to (crypter)
    • linkcypt.ws new.gif
    • linksave.in new.gif
    • relink.us new.gif
    • ncrypt.in new.gif
    • ...and MANY others...
    Recently added sites
    • Nova.cz
    • Barrandov.tv
    • Channel4.com
    • Facebook.com
    • Bbc.co.uk
    • Titulky.com
    • Hulu.com
    • ...others will come soon...
    • watch our Twitter to get latest info

    These servers are treating users like clicking monkey... luckily FRD comes to save the day...
    Thanks to all people for their plugins and to all translators!

    http://wordrider.net/freerapid/
    

    I think if you give it a try you will love this !

    • Like 4
    • Thanks 1

  7. Barack Obama, Machelle Obama Are sitting on a plane talking

     

    Barack Obama ,''Says i could throw  a $1000 dollor bill out the window and make some one very HAPPY !

     

    Machelle Obama ,''Say i could throw  10 $100 dollor bills out the window and make 10 people very Happy !

     

    Then the Pilot said,'' I could throw  there two Asses out the window and make 56 million people Very Happy !

     

     

    • Like 2
×