Freitag, 20. Mai 2011

Message to L33ch l33ts


Dear l33chs,

Please hack my server without any hesitations; your limit is nothing beyond this. You can hack, deface or even destroy the site, play sports, leave nasty messages and do whatever. I am not bothered. What happen when Ankit Fadia was hacked? You hacked one, he established another. The series went on. You are the losers, he never lost anything. Nor you could snatch anything from him.

MY business is not online, I am print media person. My bread butter is not my web site and more over, I don’t have anything there which you can make public. No worries at all. I know my blog messages are harassing you. I am the only person daring you bluntly, because I love to live without fear. A positive attitude may not solve all your problems, but it will annoy enough people to make it worth the effort. It’s so hard when I have to, and so easy when I want to..Just love my attitude.

You can take what is not meaningful to me, you cannot reach my treasure. Fear is pain arising from the anticipation of evil. If I would have real l33t hacker, I would have hacked Swiss accounts, I would have hacked all porn sites, nudity, hates blogs and sites against religion, I would have hacked Dawood and Chota Rajan. I would have hacked land mafia’s, corrupt government authorities, This makes me so sad I can't think about it and I cry, but I am sure there are plenty of fat bankers eating well and sleeping dry without any worry in the world. I refuse to hate, but I can't like it a bit..And would have gone behind bar for the cause, like Julian Asange..

I am prepared for worst, you do your best at destructions, your limit is shameful, and my reach is meaningful.

If you have your way of harassing people, they too have ways of saying YOU shut up!

“Wicked men obey out of fear; and good men, out of love.”

I will fear no evil

For my God is with me

And if my God is with me

Whom then shall I fear?

Donnerstag, 19. Mai 2011

L33t hacker's little mind and l33ding nuisance




Hello all....

Indian l33ts message to hackers to unite -

the message for Ankit fadia about his copy pasting was copied from various sources like scribd.com, wincoast.com.

you pick up each sentence of that message and put in search engine and see how they copied each line from different places. A group of four stupid losers, who flopped in their life, landed frustrated by attacking all famous people of India. Poor losers in-spite of such cheap attempts couldn’t gather mush publicity for them self. Infact now everyone is spitting on them. Unfortunately one of them was suppose to design my unite hacker’s site but when we realized about his illicit intentions we kicked him out of the project and thus the war began.

My dear l33t lichads try to give credits to your line by line message. Even your name is not original. Now whom are you planning to give credit for stealing the name l33t?
Look at Cat Techie how original it is, becuase this is my brain child, not stolen ot copied as l33t:P

It’s not about Denouncements- www.baptiststandard.com

It's about sending a message www.flickr.com/photos/houseofduke/3216243678/

Proof of the above mentioned plagiarisms www.squidoo.com › ... › Internet › Blogging › Other Blogging Info

The above are just few examples; the message is copied word by word and sentence by sentence. From thousands of sites to create one stupid message and then too it’s full of errors. L33t lam3rs blot on hacker’s community. If you have guts to come face to face, then please come out of that so called underground fobia and blow the ‘bigul’ and announce crusade.

Look at the Anonymous Group, their standard their way of operating, they never go against any individual or organization; they fight for common man against the system. Look at Anti-sec they don’t write messages or have no FB profile or no pastebin business, they do their job and just remain quite. Because they are not publicity greedy dogs, they are hacker and have ethics, you are not even worth calling a hacker, none of you have written any exploits, or created any tools or made any difference to cyber world. You are just using available exploits and hacking sites. What happened to Appin? They prospered more, after this recent defacement they got 34% more business, more students in strength. Ankit Fadia became hero, and your these cheap traits may not be even bothering him, I am sure he must be taking it as a joke. You are making fool of yourself. Look at me coming in odd world created my bench mark, cat- techie public pages thousands of likes, profile more than 5000 friends, groups over loaded, pages n number I don’t even know who’s created them.

Even you goons are in my friend list. It’s you who made me famous and its they who loved me and made be prosper and big. It’s their support made me strong, it’s your atrocity made me fight with even more determination, you both the side are of Hackers, the only difference is Good and Bad . Earlier Hacker5 was printed just 5000 copies now it’s three times, out of which 7000 are just subscribers. They are wiser than you and educated also, they are the upper crust of IT industry. Who cares what you say? Don’t try to become lord Falkland. Please understand you have limit to what you are doing because you are not what you are pretending to be. You cannot snatch the morsel from my mouth and eat it all. You cannot stop Ankit Fadia growing and Appin prospering. You just can’t do anything. I never knew you that you people are at such a sorry stage that you don’t even possess an average brains. Please treasure your limited edition knowledge for your own benefit. Or become bigger than Ankit Fadia, me or Appin..I know you can’t, because those who dream for big can never fall on such cheap level.

Few days back I saw a post by some hacker who was accusing me for my articles and posts on Hacker5 as well as for my blog cattechie.blogspot.com They were claiming that all my work is a copy paste work and for the same they have provided some links also. These people really make me laugh out loud. I really get surprised when I see that how idiot and silly some people can be and the worst part is if you go to them to make them realize there silly mistakes, they are not ready to even take that advice. Poor frustrated and jealous souls, may god bless them. Internet is the biggest resource of information and knowledge. Whatever you want to learn or read or do research, each and every single details are available online, all you need is just a little time and dedication to look out for the right places for the right resources. The problem with today’s world is that the life of everyone is so busy that it’s not possible for a lot of enthu learners to dedicate certain amount of time and energy for searching and sorting out the data. I as a blogger, as an editor, as an author and as well as a learner believe in the easy availability and accessibility of information. All my work, be it electronic or print has never come anywhere without mentioning the original source and owner of the material. Moreover the concept of idea can’t be processed by any individual, the person who gave birth to an idea can’t claim that the idea belongs to just him and can’t be used or modified or elaborated by anyone else. And as long as you are giving the proper credentials I don’t see anything wrong in taking that idea. It’s a simple concept that why to reinvent the wheel? Sad, that these so called and self proclaimed guardians and moral custodians of internet don’t have this much of IQ.

I am here to share and learn whatever stuffs I have on my blog, I am not earning a single rupee out of that, so I don’t understand the actual problem of these moral custodians with my blog. Whatever I post there, I do it by the request of my readers and followers and I do it for them only. I never go and say that come and see my blog or come and visit my blog, everyone is free and they have the freedom to go anywhere and read anything they want to, if you have any problem with my blog, no one is forcing you to come to it, you are free to go to wherever you want to go. Why to make so many hue and cries over this? My work is just for my readers and my friends and I will continue doing my work for them, those who have problem are most welcome to go to any other place where they are comfortable.

any ways the IP of one of one of the l33t is 115.111.145.166 :P save your own ass first, and then bark at others.

Try some other gimmicks guys, this won’t pay you much …

all the original l33t hackers please forgive me,this is for my indians l33t idiots.

"If you don’t let us dream, we won’t let you sleep."

Security sandbox program: Defense-in-depth or layered vulnerabilities?


As children, many of us played in sandboxes: controlled play environments that enabled us to build castles safely without digging up the backyard. In computing, a sandbox serves a very similar function, only here, researchers and IT technicians are playing with bits, not grains of sand. In this tip, we'll discuss the concept of application sandboxing or security sandbox programs, including what they are, how they work and whether they add more vulnerabilities than mitigate. A sandbox operates by providing an isolated or confined space that functions similarly as -- but is not connected to -- the actual network. In this isolated space, programs and applications can be downloaded, unpacked and tested before they are migrated to the actual server, thereby (hopefully) preventing malicious programs from causing chaos on the network.

Originally designed for the development and testing of programs, sandboxes have evolved into a security tool capable of separating active programs and processes from the host system or local desktop. Thus, a security sandbox has become an efficient method for keeping systems safe from unverified and untrusted programs that could potentially wreak havoc on networks.
The average computer user may encounter an array of sandboxes on a daily basis. Google Inc.'s Chrome browser employs sandboxing to isolate JavaScript execution, HTML parsing and plug-ins. This is accomplished by running each tab in its own sandbox, thus separating Web applications from the user's machine. In early February 2011, however, Google fixed nine bugs in Chrome, including a sandbox-escape flaw. While details were provided regarding most of the bugs, Google was not so forthcoming in disclosing information about the sandbox vulnerability. This lack of transparency leaves questions regarding the security of the browser. If vulnerabilities are allowed to pass through the sandbox to their host system, malware could be installed and sensitive data could be at risk.
The popular Web service PayPal also utilizes sandbox technology to create a testing environment for merchants. The sandbox provides users with the opportunity to generate and manage mock accounts prior to actually implementing the service to accept Web transactions from customers. Problems, though -- specifically, cross-site-scripting (XSS) vulnerabilities -- have been reported.
In its most recent Flash release, Adobe Systems Inc. included a sandbox security feature to prevent Flash files loaded from the local file system from passing data to remote systems. While malicious hackers have been doing their best to break Adobe's sandbox, such features still stand as a potentially useful threat mitigation tactic.Computer and network forensic investigators may also benefit from using sandboxes. By giving examiners the ability to observe malicious executables as they unpack and execute in a "natural" environment, sandboxes could limit the likelihood that outside influences, such as other programs or services, will alter evidence. Theoretically, this all sounds amazing, but, in reality, it may introduce more

vulnerabilities.
Sandboxes: Technology and use cases


Are corporations such as Adobe and PayPal actually making their software more secure by introducing a sandbox program, or does such a program simply add another potentially breachable layer? In IT security, defense-in-depth aims to layer different security approaches in an effort to improve the overall security posture. However, in this case, adding another layer likely means adding another permeable layer that could allow malware and hackers to penetrate the sandbox and access a computer.

The four questions security administrators must ask themselves prior to implementing a sandbox are:

■What types of threats are sandboxes the most effective at thwarting?
Understanding the capabilities and limitations of sandboxes is essential to knowing the best implementation and integration possibilities for sandboxes into an organization. Unrealistic expectations will only leave an organization more complacent and, therefore, more vulnerable.

■What threats are sandboxes incapable of detecting?
Sandboxes are unable to detect encrypted viruses or other malicious code, forcing network administrators to add further security measures and, consequently, more layers of complexity.

■What risks do sandboxes introduce?
Sandboxes introduce new vulnerabilities to exploit, such as potential stack overflow, access to native libraries on the host system, and other inherent flaws associated with using Java and C# coding. Further risks include the security measures, or lack thereof, within the digital sandbox itself.

■Is there an alternative to using a sandbox that could achieve the same results?
While sandboxes are useful for programmers to test the codes they have written in, relying on a sandbox to test unknown code is risky. Oftentimes it is safer to simply omit the extra software layer altogether. For instance, when the Adobe sandbox is in protected mode, some threats, such as monitoring keystrokes, may be avoided, but other risks, such as access to protected areas like the registry, may be elevated.

Potential vulnerabilities of sandboxes


A sandbox is divided into three primary compartments. These are: the core language interpreter, the standard libraries and the untrusted application code. Of the three compartments, the standard libraries, which contain routines to perform, such as network communication and cryptography, are the most vulnerable. This is directly related to the common practice of using Java or C# coding to write these libraries and the inherent flaws of those languages, such as stack-overflow vulnerabilities. In fact, C# not only possesses weaker security by marking sections of code as unsafe, but also permits simple access to native libraries on the host system.Many individuals may confuse a sandbox with a virtual machine (VM); this is probably because many organizations use VMs as sandboxes. Doing so may be suitable as added security for Web browsing on the typical home computer, but it is not recommended for testing suspicious programs or for use on systems where sensitive data is stored.
Due to the increased popularity of virtual machines in personal computing, for generating honeypots and as a general network security measure, black hat hackers are now writing malicious code to detect if a VM is being utilized. This type of malicious code can detect whether a virtual machine is running by looking for artifacts in the system's memory, running processes, registry and file system. It may even look for VM hardware and processing instructions. Therefore, using a virtual machine as a sandbox (or in any other security capacity) is very risky and only serves to deter the lower level -- or opportunist -- hackers who do not have the skills or tools to detect if in fact a VM is in use.

In closing, security sandbox programs are not a panacea. Sandboxing was developed to separate code from the host system; however, different security vulnerabilities and implications, as enumerated above, have inadvertently arisen. Thus, as with any security measure, risk assessment and mitigation are crucial when determining which security features to apply. Sandbox technology continues to not only find new uses and provide a multiplicity of benefits, but it can also lead to complacency and a false sense of invincibility. While defense-in-depth is a good strategy, it's also important to remember that, with each added layer, the number of exploitable vulnerabilities rises.


All forms of security have unintended consequences, and sandboxing is no different. Thus, relying on sandboxing alone to guarantee an application's integrity would be a serious mistake. Proper application security demands many different layers of security, all of which work together to provide a sturdy, multifaceted application defense posture. While sandboxing has potential when used properly, beware of the dangers; otherwise, effective applications, like the sand in that childhood sandbox of yesteryear, may slip right through your fingers.

About the authors:
Ashley Podhradsky, D. Sc., is an assistant professor in the Computing and Security Program at Drexel University. Dr. Podhradsky teaches and conducts research in digital forensics and information security. Her research has been recognized in academic conferences and journals within the U.S. and internationally.

Cindy Casey has an AAS. in Computer Forensics and completed her internship with the Montgomery Country District Attorney's Office's Computer Crime Unit. Ms. Casey, a student of Dr. Podhradsky, is currently enrolled in the Computing and Security Technology program at Drexel's Goodwin College of Technology and Professional Studies.

Mittwoch, 18. Mai 2011

UNDERGrown HACKERs

Today morning I was reading post by some so called underground hacker ;( I don’t know why they are called underground when they are very well living on this earth and that to enjoying the daylight, food, woman,wine and perhaps wealth. They may not be even aware what is burning under their buttocks. But yes they decide the good, bad and ugly. I am sure if they stand in front of mirror and look at their frustrated face they will for sure hate themselves JAnyways the post was about Ankit Fadia, his books and my blog and how the content was taken from different sources. Poor guys, god knows what they are trying to show, but let me tell you one thing here, whatever we speak, write, or vision for, is definitely a creation or expression of someone on this earth. Even you, your birth, your existence is out of some one. What are original are the additions to the existing content of subject.

Today I am writing this tomorrow someone may have some different expressions on this article and if she or he modifies it then what is wrong in it? More over who the hell are you to decide right or wrong. You will be remaining anonymous in dark world with your evil intentions but how does it make difference to Ankit Fadia’s life or my life or any one for that matter?They all are achievers, they succeeded in their life, they are happy and acknowledged by people. For me controversy is boon. I and controversy go hand in hand. If there is no controversy, people think I am dead. There are many such successful and popular people amongst us, they are widely abused, hated, and attacked by critics. We the Indians living in democratic country, always misuse our freedom of speech and expressions. We want our country to progress and go ahead but at the same time we are jealous of others growth, success and popularity so much so we go to any extent to tarnish some ones image by taking undue advantage of our freedom. We start taking things in our hand to decide fate of other person. Why?

Actually empty vassals make lods of noise.

the new tracking systemroughly


By eMinds Legal
A new online tracking system will allow websites to pinpoint your location to within a few hundred metres, without your permission. Internet sites will be able to work out where users are within an average of 690 metres, using information about their internet connection. At the moment they can only track users’ locations to within a radius of about 200 km, but the new technique will narrow this down to as little as 100 metres.
The new system, which has been designed by American and Chinese researchers, compares the time it takes to send data to computers to the time it takes to send to computers it knows the location of using Google Maps.To locate computers to this accuracy has previously required people to agree to share location, but the new system does not need any particular software on the computer to work or even the user’s permission.
Yong Wang, one of the researchers who designed the method, said: “This is a client-independent method. The client does not need to approve anything.”Delineated by the American and Chinese researchers, the new tracking systemroughly evaluates the whereabouts of the user.They track down the browsers by locating the closet landmark, including schools and universities, to them
While the new tracking system might be a threat for the privacy of the iPhone and other users, it has come as an advantage for the advertisers.Through the help of this technology, the scientists can now locate the user and advertise about the products, services and shops, located nearest to them.