Jump to content

zbeng

Active Members
  • Posts

    2402
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by zbeng

  1. Well i'l take the Megaupload & sexuploader solution program i uploaded as an example : http://rapidshare.com/files/6183201/Megauplad_and_sexupload_solution_--_FWZ_Exclusive.rar.html now replace rapidshare with rapidshit so it looks like this : http://rapidshit.com/files/6183201/Megauplad_and_sexupload_solution_--_FWZ_Exclusive.rar.html if u go there it will tell you that it needs 5 people to request it to be mirrored ... & you can do that using proxyez Twisted Evil I use http://www.anonymizer.su/ for requesting files from rapidshit the great ting is tht it even suports download managers
  2. nu-s popoooo n-ai pt ce dai o bere:))
  3. scz...iti raman dator cu un cadou de mos craciun
  4. Found this on igniteds, bit old but could be usefull. Greets, http://rapidshare.de/files/4404814/crackerskit.v2.00-icu.zip.html Welcome to the CrackersKit 2.0 installation!Below is a list of the current tools included : Analysis :
  5. zbeng

    psp

    http://www.psp-hacks.com
  6. zbeng

    sal

    bine ai venit pe aici...
  7. hai la gunoi si cu asta ca parca prea important "se crede"
  8. http://pozezml.evonet.ro/Note.htm pus acolo pt ca era prea lung;))
  9. !!! $$$ !!! Cmaster CC Verify CWizard THCC Visa Card Generator 06 Carcabot_Mass_Email CcHack CC-Fake cvv2c DesertCVV2 id-fake Paypal-Link-Spoofed-Scam HoW To Get Credit Cards Fresh And Fastest ------------------ AIO uploader for all Cool Small Usefull Dp ------------------ ANONIMITY Jap ------------------ BINDER&PACKER ees binder v1.0 NT Packer v2.1 NakedBind v1.0 Aspack 2.1 F.B.I. Binder AFX Executable Binder PRO Deception v4.0 coolbind22 Binder v2.1 Deamon Crypt v 2.0 AmkoJoiner MultiBinder v1.4.1 MicroJoiner v1.7 Pretator v1.6 YAB Binder v 2.0 ------------------ BRUTER WebCrackv4.0 BrutuS Crack FTP FTP Brute Hacker phpbb bruteforcer PhpBB pass extractor phpBB Cracker Email Cracker FTP Brute Forcer ------------------- EXPLOIT COLLECTION 10377 Exploit SMF ShoutBox Xss & Html Inj SMF Ultimate Shoutbox Cookie Disclosure Exploit Firefox_BuG ------------------- FLOOD_DOS Flowbabeflow FreeSiteKillerV2.01 webxgrab Web Attacker ENG TheRapist - DoS Attacker HybridFlood2 Anti-russ 3.0 Http Bomber v1.001b Sprut DoS_5 etherflood DoSAttacker phpBB Dos phpBB Attacker Ping Attack Site Nuke Divine Intervention UC Forum Spammer Inferno Nuker Multiple Site FlooD ------------------ GOOGLE HACKING Alt-GooGle Google Version 1.2 Google H4ck3r GooLink ------------------ KEYLOGGERS Elgolf 1.0 Beta ESK KeyLogger Glog Keylogger HermanAgent IKlogger0.1 ------------------ MESSENGER MSN Extreme 3.0 winks,moods,muggins,weemees and meegos + Installer MSN Messenger Account Cracker v2.0 Hotmail Email Hacker Hotmail HAcker Gold HotmailHack yahooUltraCracker MSN Spy Lite v1.0 Yahoo Hack ! SH Yahoo Pass Sender 1.1 Yahoo Password Decoder ------------------ OTHER BACKDOOR all in one shell backdoor assh0le backdoor blowdoor30c intestinal worm backdoor NST Back Connect Backdoor All RooT backd00r genie v151 m0trix Private Backdoor ------------------ PASSWORD CRACKERS rainbowcrack-1.2-win md5_cracker Jhon 1.7 Win mdcrack-1.2 hydra-4.6 ------------------ PHP SHELL'S c99shell r57shell BackDooR (fr) Defacing Tool Pro v2.5 nstviewshell PHP Backdoor v1 PHP_BackDoor_v1.5 PHP_Shell_v1.7 Simple_PHP_BackDooR ------------------ RAPID SHARE & CO HACKING Link Grabber 3.0.4 Rapidshare Hack RapidGet RapidSearch.Beta.0.1 RapidLeecherv4.4.87 MaC Rapid Premium Account Checker RapidMule RapidShare AntiLeech RapidShare Checker RapidShare Decoder Renew IP RapidUp The Grabber 1.4.1 Unlimited RapidShare With I.E. ------------------ SCANNER SuperScan 4 Stealth - HTTP Scanner v1.0 build 23 CGI Vulnerability Scan CGI Scanner v4.0 Legion NetBios Scanner CGI Founder v1.043 Scanarator SuperScan 3.0 Blues Port Scanner NetBIOS Name Scanner MooreR Port Scanner Trojan Scanner 1.0 Modded By RooT nmap 4.03 ------------------ SECURITY Kism 0.2 ------------------ SQL Injection sqlbftools sqldict forcesql sqlinjector sqlping SQL INJECT Commander SQLPowerInjector ------------------ TROJAN & RAT SKD Rat 2.0 Combined Forced Rat Beta Gadu-Ghost Trojan v.2.3 ProRat SE 1.8 Cyn v2.1 MofoTro 1.1 Furax 1.0b Omerta 1.3 Remote Dark Trojan X Rat v3.3 TGA Backdoor v2.0 ------------------ TUTORIAL &TEXT Defacing Hacking_GMail Hackers Black BooKs ------------------ WIRELESS AirCrack Kismet ----------------- I highly Recommend this. Some of these tools are phenomenally useful!! http://rapidshare.com/files/4963527/h4xingt00ls_T0rP4rk.rar
  10. Gamerman made this Release Notes ------------------------------------------------------------------------------- Network Sniffers 2007 Version 2 All the latest scanner are include in the basic and the Deluxe version. The Basic & Deluxe versions' Programs: Retina Security Scanner V. 5.09.1067 Capturix networks 2006 V. 4.06.170 GFI Languard Network Security Scanner V. 7.0.20060609 HTTP Analyzer Full Edition v1.7.1.171 NsAuditor Network Security Auditor 1.4 Ping-Probe V.1.1.3 Safety-Labs Shadow Security Scanner V.7.86.178.178 Security Explorer 5.32 Wire Shark .99 (Formally Ethereal) Retina Wi-Fi Security Scanner V. 1.0.3 http://rapidshare.com/files/2454698/AIO_Network_Sniffers_2007_Final.part1.rar http://rapidshare.com/files/2454697/AIO_Network_Sniffers_2007_Final.part2.rar http://rapidshare.com/files/2454687/AIO_Network_Sniffers_2007_Final.part3.rar PASS:www.ithotnews.com
  11. Tutorial: MySpace'>http://rapidshare.de/files/35360219/tut.rar MySpace Cracker Programs: ------------------------------------ Get'>http://rapidshare.de/files/35403747/MySpace_Cracker.rar ------------------------------------ Get you buddys MySpace Password and ID. Change Their MySpace Account. I owned these in 5 minutes 012345@hotmail.com - 123456 101010@aol.com - 123456 1q2w3e@hotmail.com - 123456 33333333@aol.com - 123456 555555@msn.com - 123456 999999999@aol.com - 123456 crafty@aol.com - password creativity@aol.com - password crosshatch@hotmail.com - password dart@aol.com - password discontinue@yahoo.com - password donielle@yahoo.com - password dose@aol.com - password drawer@aol.com - password eb@aol.com - password eel@yahoo.com - password ender@yahoo.com - password encyclopedia@aol.com - password eugenius@yahoo.com - password example@yahoo.com - password exclusion@hotmail.com - password exclusion@yahoo.com - password exquisite@yahoo.com - password eyelids@aol.com - password felonious@aol.com - password ferries@aol.com - password fever@msn.com - password fin@hotmail.com - password foggy@aol.com - password further@aol.com - password ALONSO@yahoo.com - qwerty RODNEY@hotmail.com - qwerty 11111111@aol.com - 11111111 1111@msn.com - 1111 1974@yahoo.com - 1974 1979@yahoo.com - 1979 1983@yahoo.com - 1983 1989@yahoo.com - 1989 1qaz2wsx@gmail.com - 1qaz2wsx 2222222222@yahoo.com - 2222222222 2222222222@hotmail.com - 2222222222 1qaz@hotmail.com - 1qaz 22222@aol.com - 22222 22222@hotmail.com - 22222 55555@aol.com - 55555 5555555555@yahoo.com - 5555555555 6666@aol.com - 6666 7777777777@hotmail.com - 7777777777 77777777@yahoo.com - 77777777 7777@yahoo.com - 7777 8888@aol.com - 8888 9999@hotmail.com - 9999 ALEXIS@aol.com - ALEXIS ANDY@msn.com - ANDY ANTONIO@aol.com - ANTONIO ASHLEY@msn.com - ASHLEY BERNARD@hotmail.com - BERNARD BORIS@yahoo.com - BORIS CARL@yahoo.com - CARL CARY@hotmail.com - CARY CASEY@hotmail.com - CASEY CARTER@msn.com - CARTER CHANCE@aol.com - CHANCE CHAD@hotmail.com - CHAD CHESTER@aol.com - CHESTER CLYDE@hotmail.com - CLYDE CONRAD@aol.com - CONRAD DALLAS@msn.com - DALLAS DANA@hotmail.com - DANA DEANGELO@hotmail.com - DEANGELO DIEGO@gmail.com - DIEGO DIRK@yahoo.com - DIRK DOMINICK@msn.com - DOMINICK DONNY@gmail.com - DONNY DUSTY@aol.com - DUSTY EDDIE@msn.com - EDDIE EDISON@hotmail.com - EDISON EDUARDO@gmail.com - EDUARDO EMERSON@hotmail.com - EMERSON EMERY@aol.com - EMERY EMMANUEL@msn.com - EMMANUEL ETHAN@aol.com - ETHAN ERWIN@yahoo.com - ERWIN FLOYD@hotmail.com - FLOYD GINO@aol.com - GINO HAYDEN@yahoo.com - HAYDEN HECTOR@hotmail.com - HECTOR JORGE@msn.com - JORGE LAMAR@aol.com - LAMAR MARVIN@aol.com - MARVIN MILO@yahoo.com - MILO NOEL@yahoo.com - NOEL NOBLE@aol.com - NOBLE OTIS@yahoo.com - OTIS REID@msn.com - REID REUBEN@yahoo.com - REUBEN RILEY@msn.com - RILEY SHERMAN@hotmail.com - SHERMAN STAN@gmail.com - STAN SYDNEY@yahoo.com - SYDNEY SYLVESTER@yahoo.com - SYLVESTER TIMMY@msn.com - TIMMY TOMAS@msn.com - TOMAS TYRONE@msn.com - TYRONE VITO@aol.com - VITO WERNER@msn.com - WERNER WERNER@hotmail.com - WERNER aaaaa@gmail.com - aaaaa alexis@aol.com - alexis allyce@hotmail.com - allyce amigo@yahoo.com - amigo andy@msn.com - andy asd123@hotmail.com - asd123 asd123@msn.com - asd123 asd123@aol.com - asd123 aryn@hotmail.com - aryn ashley@msn.com - ashley ashely@yahoo.com - ashely barb@aol.com - barb bbbbb@yahoo.com - bbbbb benz@aol.com - benz bessy@aol.com - bessy betsey@yahoo.com - betsey bling@aol.com - bling border@yahoo.com - border brandy@hotmail.com - brandy bree@aol.com - bree bryana@hotmail.com - bryana browse@hotmail.com - browse budweiser@yahoo.com - budweiser buttfuck@aol.com - buttfuck cactus@gmail.com - cactus cactus@yahoo.com - cactus cadet@yahoo.com - cadet callie@hotmail.com - callie cambridge@yahoo.com - cambridge camel@aol.com - camel camp@aol.com - camp canvas@aol.com - canvas canvas@yahoo.com - canvas capo@hotmail.com - capo capital@yahoo.com - capital capitals@msn.com - capitals caress@aol.com - caress carl@yahoo.com - carl carne@msn.com - carne carp@yahoo.com - carp carpenter@aol.com - carpenter carr@hotmail.com - carr carter@msn.com - carter cary@hotmail.com - cary casey@hotmail.com - casey cassius@gmail.com - cassius casualties@yahoo.com - casualties catch@yahoo.com - catch cathie@aol.com - cathie cause@yahoo.com - cause eyelash@yahoo.com - eyelash failure@aol.com - failure fairy@aol.com - fairy fanning@hotmail.com - fanning fashion@aol.com - fashion fats@aol.com - fats fatty@msn.com - fatty feed@yahoo.com - feed fever@yahoo.com - fever ffff@gmail.com - ffff ffff@hotmail.com - ffff fffff@aol.com - fffff fffff@hotmail.com - fffff ffffff@aol.com - ffffff fidelio@yahoo.com - fidelio fielding@yahoo.com - fielding fifi@aol.com - fifi fifty@aol.com - fifty finder@hotmail.com - finder fine@aol.com - fine fishes@hotmail.com - fishes flashing@aol.com - flashing flava@msn.com - flava fling@aol.com - fling flippant@hotmail.com - flippant flirts@msn.com - flirts floppydisk@aol.com - floppydisk flory@hotmail.com - flory flounder@msn.com - flounder floyd@hotmail.com - floyd fluster@aol.com - fluster foamy@hotmail.com - foamy forbes@yahoo.com - forbes forget@msn.com - forget fork@aol.com - fork four@hotmail.com - four france@aol.com - france francis@aol.com - francis frazer@hotmail.com - frazer fray@hotmail.com - fray freezer@hotmail.com - freezer freshman@aol.com - freshman friars@aol.com - friars friend@msn.com - friend frisky@hotmail.com - frisky cambridge@gmail.com - qwerty dal@aol.com - qwerty flori@yahoo.com - qwerty 1qaz2wsx@yahoo.com - qazwsx
  12. AATools v5.50 (Cracked) : Advanced Administrative Tools v5.50 Build 990 AccessDiver 4.120 : Stable Version of this excellent allround Utility... AccessDiver Tutorial : Speaks for itself... Ares Tutorial : Speaks for itself... Brutus AET2 : Bruteforce style program... C-Parse : Log Parser... CCBILL Ripper : A handy utility for any exploiter... CMX Exploiter IV : Handy and easy to use exploit scanner... Final Ares Complete Edition : Another BruteForce program... Gaa Moa's Proxychecker : Utility for collecting and verifing proxies... Goldeneye : Limited a little by its fake detection but never the less a must have utility... IBill Ripper : A handy utility for any exploiter... John the Ripper : Decryption tool. The one and only JTR. If you have to ask you don't need Password Generator : For generating secure passwords... Proxy Checker 7.0 : Proxy Analyser Tool with lots of features.(Serial included in the zip) Raptor 3 : The ultimate wordlist utility... A must for any newbie or seasoned pro.. Wordlist : Excellent newbie wordlist!!! XFactor Tutorial : Our own superb BruteForce util XFactor , broken down in a step by step easy to follow tutorial! Site: http://www.xisp.org/downloads.html PT AIA CARE SE OCUPAU DE SITE-URI XXX in curand si un tut foarte extins si bun
  13. As you know Google.com is the most popular search engine in the world. Here are some tips to how i find eBooks with Google Smile : Find Apache's (default) Index page Try this query: +("index of") +("/ebooks"|"/book") +(chm|pdf|zip|rar) +apache Find a particular eBook file Try this query: allinurl: +(rar|chm|zip|pdf|tgz) TheTitle
  14. Nokia Code function *3370# This Nokia code activates Enhanced Full Rate Codec (EFR) - Your Nokia cell phone uses the best sound quality but talk time is reduced my approx. 5% #3370# Deactivate Enhanced Full Rate Codec (EFR) *#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time *#4720# With this Nokia code you can deactivate the Half Rate Codec *#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type *#9999# Phones software version if *#0000# does not work *#06# For checking the International Mobile Equipment Identity (IMEI Number) #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols) #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols) #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols) #pw+1234567890+4# SIM Card Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols) *#147# This lets you know who called you last (Only vodofone) *#1471# Last call (Only vodofone) *#21# This phone code allows you to check the number that "All Calls" are diverted to *#2640# Displays phone security code in use *#30# Lets you see the private number *#43# Allows you to check the "Call Waiting" status of your cell phone. *#61# Allows you to check the number that "On No Reply" calls are diverted to *#62# Allows you to check the number that "Divert If Unreachable (no service)" calls are diverted to *#67# Allows you to check the number that "On Busy Calls" are diverted to *#67705646# Phone code that removes operator logo on 3310 & 3330 *#73# Reset phone timers and game scores *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it means you will get the best standby time possible *#7760# Manufactures code *#7780# Restore factory settings *#8110# Software version for the nokia 8110 *#92702689# Displays - 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again *#94870345123456789# Deactivate the PWM-Mem **21*number# Turn on "All Calls" diverting to the phone number entered **61*number# Turn on "No Reply" diverting to the phone number entered **67*number# Turn on "On Busy" diverting to the phone number entered 12345 This is the default security code press and hold # Lets you switch between lines
  15. METODA QUICK SORT Metoda Quick Sort faca parte din clasa metodelor avansate de sortare si s-a dovedit ca este cea mai rapida metoda de sortare bazata pe interschimbarea elementelor. Aceasta metoda se recomanda a se folosi in special in cazul sirurilor care sunt foarte "amestecate" (sir cvasi aleator). In acest caz se poate observa in mod special superioritatea metodei QuickSort. Algoritmul in pseudocod este: QuickSort(inceput,sfarsit) i=inceput j=sfarsit temp=a[(i+j)/2] repeta cat timp a<temp executa i=i+1 sf cat timp cat timp a[j]>temp executa j=j-1 sf cat timp daca i<j atunci schimba a,a[j] sf daca daca i<=j atunci j=j-1 i=i+1 sf daca pana cand i>=j daca inceput<j atunci QuickSort(inceput,j) sf daca daca i<ultimul atunci QuickSort(i,ultimul) sf daca Ideea acestei metode de sortare este aceea de a alege un pivot si a-l pozitiona pe acesta pe locul corespunzator conform ordinii. Odata acel element fixat se realizeaza acelasi lucru si pentru subsirurile din partea dreapta si stanga. Complexitatea este de O(n*ln(n)) in mediu desi poate ajunge si la O(n^2).
  16. The Ultimate Christmas Fonts tot pt u encoded http://www21.rapidupload.com/d.php?file=dl&filepath=446 Parola godfather
  17. encoded sper sa nu le ai adica is sigur ca nu le ai Size : 2.5 Mb Download : http://rapidshare.com/files/5777731/45_Christmas_fonts.rar
  18. URBAN LEGENDS Urban legends are stories told around day-to-day things, but are incorporated with unusual twists in the form of unlikely facts that are difficult to verify. Designed to elicit emotional response, the most popular urban legends are health and animal scares. Many urban legends are gaining popularity as they spread along with other email hoaxes. VIRUS TYPES The majority of viruses fall into five main classes: - Boot-sector - File-infector - Multi-partite - Macro - Worm VULNERABILITY A vulnerability is a security weakness in a computing system that is typically found in programs and operating systems. The presence of known vulnerabilities in computing systems can leave these systems very much open to malware and hacker attack. This is because programs that take advantage of known vulnerabilities, commonly referred to as exploits, are often publicly available as source code, which can be customized to create a malware or a hacking tool. Software vendors typically provide fixes or patches for vulnerabilities found on their products. WORM A computer worm is a self-contained program (or set of programs) that is able to spread functional copies of itself or its segments to other computer systems. The propagation usually takes place via network connections or email attachments.
  19. FILE INFECTING VIRUSES File infecting viruses or file infectors generally copy their code onto executable programs such as .COM and .EXE files. Most file infectors simply replicate and spread, but some inadvertently damage host programs. There are also file infectors that overwrite host files. Some file infectors carry payloads that range from the highly destructive, such as hard drive formatting, or the benign, such as the display of messages. GRAYWARE Grayware is AV's general classification for applications that have annoying, undesirable, or undisclosed behavior. Grayware applications do not fall into any of the major threat (ie. Virus or Trojan horse) categories as they are subject to system functionality, as well as user debate. Some items in the Grayware category have been linked to malicious activities, while others are used to provide users with targeted information in terms of product announcements. Organizations dealing with sensitive information should be generally alarmed by the capability of any application with data gathering functionality. The majority of grayware fall into the following classes: - Adware - Data Miners (Tracking Cookies) - Dialers - Hacking tools - Joke programs - Keyloggers - Password cracking applications - Remote Access Programs - Spyware Most AV recognizes that some users prefer to have tools to determine whether grayware are running on their systems, and thus, provides additional options to scan for and/or remove them. HACKING TOOLS Hacking tools are programs that generally crack or break computer and network security measures. Hacking tools have different capabilities depending on the systems they have been designed to penetrate. System administrators have been known to use similar tools - if not the same programs - to test security and identify possible avenues for intrusion. JAVA APPLETS Java applets allow Web developers to create interactive, dynamic Web pages with broader functionality. They are small, portable Java programs embedded in HTML pages and can run automatically when the pages are viewed. Malware authors have used Java applets as a vehicle for attack. Most Web browsers, however, can be configured so that these applets do not execute - sometimes by simply changing browser security settings to "high." JOKE PROGRAMS Joke programs are considered relatively harmless and are often designed to annoy or make fun of users. They do not infect files, cause damage, or spread to other systems. Many joke programs are designed to cause unnecessary panic - especially those that cause computers to behave as if something has been damaged. Abnormal system behaviors caused by joke programs include the closing and opening of the CD-ROM tray and the display of numerous message boxes.
  20. ACTIVE "X" CONTROLS ActiveX controls are components that add dynamic and interactive features to Web pages. With ActiveX tools, multimedia effects, animation, and functional applications can be added to Web sites. HouseCall from TrendM's online virus scanner is an example of the application of ActiveX. ActiveX controls are typically installed with user permission. However, security measures can be circumvented. In some instances, ActiveX components in Web pages are able to run automatically when the Web pages are opened. Visiting users are also sometimes tricked into accepting unwanted ActiveX controls. The unauthorized installation and execution of ActiveX controls can open opportunities for malicious code to install components or to make modifications on visiting systems. ADWARE Adware is software that displays advertising banners on Web browsers such as Internet Explorer and Mozilla. While not categorized as malware, many users consider adware invasive. Adware programs often create unwanted effects on a system, such as annoying popup ads and the general degradation in either network connection or system performance. Adware programs are typically installed as separate programs that are bundled with certain free software. Many users inadvertently agree to installing adware by accepting the End User License Agreement (EULA) on the free software. Adware are also often installed in tandem with spyware programs. Both programs feed off of each other's functionalities - spyware programs profile users' Internet behavior, while adware programs display targeted ads that correspond to the gathered user profiles. AFFECTED FILE TYPE Malware and grayware may arrive as files of a certain type. The term “affect” here could mean the file format (eg. PE or Win32) that the malware or grayware comes as, or the formats that it attaches to in the case of file infectors. AFFECTED SOFTWARE Affected software, Platform and Systems Affected indicate the area(s) affected by a particular threat, whether it is malware, grayware, or vulnerabilities. This list contains the operating systems or applications that need to be installed in the user’s system before the threat performs its malicious rountines. It is known that a threat may behave differently across different platforms. ALIASES Different vendors often have their own approaches towards detection, whether it involves malware, grayware, or vulnerabilities, which can result in different naming conventions. The aliases field in the Virus Encyclopedia, Spyware/Grayware and Vulnerabilities pages indicate other names used to refer to the same threat. BACKDOOR The term backdoor often refers to backdoor programs - applications that open computers for access by remote systems. These programs typically respond to specially-built client programs, but can be designed to respond to legitimate messaging applications. Many backdoor programs actually make use of the IRC backbone, receiving commands from common IRC chat clients via the IRC network. Backdoor programs (detected by MOST antivirus as BKDR_malwarename) typically cannot propagate on their own. BOOT SECTOR VIRUSES Boot sector viruses infect the boot sector or the partition table of a disk. Computer systems are typically infected by these viruses when started with infected floppy disks - the boot attempt does not have to be successful for the virus to infect the computer hard drive. Once a computer is infected, boot sector viruses usually attempt to infect every disk accessed on the infected system. In general, boot sector viruses can be successfully removed. There are a few viruses that can infect the boot sector after executing as a program. They are known as multi-partite viruses and are relatively rare. BROWSER HELPER OBJECTS Browser Helper Objects (BHOs) are companion applications for Microsoft Internet Explorer. They usually come in the form of toolbars, search helpers, and monitoring applications. Some adware and spyware programs have employed BHOs to monitor user browsing habits and deliver targeted advertising as well as to steal information. CHRACTERISTICS The characteristics listed on the Virus Encyclopedia includes the possible avenues of distribution. COMPRESSION Compression reduces a file's size for processing, storage, and transmission. Malware and grayware authors may use different compression types or algorithms to reduce their program's size or hide the original digital structure of their program. Recent outbreaks were due to the application of different compression algorithms on existing malware variants to produce new ones that eluded antivirus scanners. COMPUTER INFECTED SINCE (DATE) This table displays the number of affected computers, by region, since detection first became available for a particular threat. See World Virus Tracking Center for additional information. COOKIES Cookies are text files that are created on computers when visiting Web sites. They contain information on user browsing habits. When a user returns to a Web site, a cookie provides information on the user's preferences and allows the site to display in customized formats and to show targeted content such as advertising. Cookies can collect user information that can then be obtained by another site or program. DAMAGE POTENTIAL A malware's damage potential rating may be high, medium, or low based on its inherent capacity to cause both direct and indirect damage to systems or networks. Certain malware are designed specifically to delete or corrupt files, causing direct damage. Denial of service (DoS) malware may also cause direct and intended damage by flooding specific targets. Mass-mailers and network worms usually cause indirect damage when they clog mail servers and network bandwidth, respectively. HIGH - System becomes unusable (e.g. flash bios, format HDD) - System data or files are unrecoverable (e.g. encryption of data) - System cannot be automatically recovered using tools - Recovery requires restoring from backup - Causes large amounts of network traffic (packet flooders, mass-mailers) - Data/files are compromised and sent to a third party (backdoor capabilities) MEDIUM - System/files can be recovered using AV products or cleaning tools - Minor data/file modification (e.g. file infectors) - Malware that write minimal amount of data to the disk - Malware that kill applications in memory - Causes medium amount of network traffic (e.g. slow mailers) - Automatically executes unknown programs - Deletes security-related applications (e.g. antivirus, firewall) LOW - No system changes - Deletion of less significant files in the system - Changes can be recovered by users without using any tools - Damage can be reversed just by restarting the system DATA MINERS(TRACKING COOKIES) Data Miners are applications that monitor, analyze, and collect specific information found in a database or volume of data from various sources. Data miners are not always used with malicious intent. Data mining programs allow companies to compile important client information, in order to enhance their services. Data miners may be used by Web sites to monitor, analyze, and collect particular user activities on a computer to collect information that typically will be used for marketing purposes. Usually, data miners are uploaded to a computer to search for Web sites visited, products searched, and services used. The data is then sent back to be used for targeted advertising. Data miners may be used maliciously and in some instances have been employed to steal personal information like logon credentials and credit card numbers. DENIAL OF SERVICE/DISTRIBUTED DENIAL OF SERVICE Denial of service (DoS) is a malware routine that interrupts or inhibits the normal flow of data into and out of a system. Most DoS attacks consume system resources, such that, in a short period of time, the target is rendered useless. A form of DoS attack is when a Web service (like a Web site or a download location) is accessed massively and repeatedly from different locations, preventing other systems from accessing the service and retrieving data from it. When a DoS attack is launched from different locations in coordinated fashion, it is often referred to as a distributed denial of service attack (DDoS). DESTRUCTIVE THREAT A threat tagged as destructive causes direct damage to files or computer systems, often resulting in the loss of important data. Routines such as corrupting or deleting important files and formatting the hard drive are considered destructive. A program that was designed to consume resources in a denial of service attack is also tagged as destructive. DIALERS Dialers, as the name implies, dial to predefined numbers to connect to certain sites. Many users run dialers without knowing that some of these programs actually dial long distance numbers or connect to pay-per-call sites; and that they are being charged for the calls. Dialers are often offered as programs for accessing adult sites. DISTRIBUTION POTENTIAL Distribution potential is derived from the characteristics of the malicious program. Fast-spreading network worms can spread across continents within just minutes. Some malicious programs also use numerous infection and spreading techniques – often referred to as blended threats or mixed threats. The Nimda virus, for example, was able to spread via email, network shares, infected Web sites, as well as Web traffic (http/port 80). As new systems are made and improved with added functionality, proof-of-concept malware often follows. This uniqueness, as well as the widespread implementation of a particular operating system or software, also influences the potential distribution of each malware. Many viruses written in the past do not run or spread on newer operating systems or operating systems that have all the latest security patches installed. HIGH - Blended threats (i.e. spreads via email, P2P, IM, network shares) - Mass mailers - Spreads via network shares MEDIUM - Mailers - has spread via third-party or media - spreads in IRC, IM, or P2P - requires user intervention to spread - URL/Web site download LOW - no network spreading - requires manual distribution to spread DROPPERS DETECTION<?xml:namespace prefix = "o" ns = "urn:schemas-microsoft-com:office:office" /><o:p></o:p> A dropped detection is a detection that has been removed from the pattern file due to one or several reasons. Typically, a threat detection is dropped when it conflicts with other detections or with unrelated files. Detections that cause performance issues, as well as other technical conflicts, are also dropped from the pattern file if AV deems that these detections do not pose as immediate threats. DROPPER Droppers are programs designed to extract other files from their own code. Typically, these programs extract several files into the computer to install a malicious program package. Droppers may have other functions apart from dropping files. ELF- EXECUTABLE & LINK FORMAT ELF (Executable and Link Format) is an executable file format for the Linux and Unix platforms. Antivirus detects malicious executable code for Linux and UNIX as ELF_malwarename. ENCRYPTION Encryption is the process of converting data into a form that cannot easily be read without knowledge of the conversion mechanism (often called a key). Certain malware have the ability to encrypt copies of themselves such that antivirus scanners may find it diffucult to detect them using existing signatures of available samples. More complex malware use variable encryption keys for each new copy, requiring more complex formula-based patterns from antivirus vendors. END USER LICENSE AGREEMENT (EULA) An End User License Agreement or EULA is a legal contract between a software publisher and the software user. It typically outlines restrictions on the side of the user, who can refuse to enter into the agreement by not clicking "I accept" during installation. Clicking "I do not accept" will, of course, end the installation of the software product. Many users inadvertently agree to the installation of spyware and adware into their computers when they click "I accept" on EULA prompts displayed during the installation of certain free software. EXPLOIT An exploit is code that takes advantage of a software vulnerability or security hole. Exploits are often incorporated into malware, which are consequently able to propagate into and run intricate routines on vulnerable computers.
  21. ############################################################## ## ## Author: LightiningLord™ < [mail]fbi.hack.gov@gmail.com[/mail] > ## Description: Glossary Security Threat Terms ## Sources: Base on research AV sites & few various security sites. ## Note: If u want to rip it atleast give a credit back to my site Smile ## ############################################################## Uhmmm...at time i always came across with people asking me what is differences all the viruses mean..well just to be a little precise i decided to make up this to help u differentiate the various kinds of viruses and how they function. Reference in Alphabetical Order, • A B C D E • F G H I J • K L M N O • P Q R S T • U V W X Y Z
  22. http://www.rapidshare.com/users/XMY6Q8
  23. Windows Vista HighSpins 2 Cursors Pack This splendid cursors pack comes with: * 7 Different Colors * Complete transparent cursors set * 32 Cursors in total * Highspin speed Download http://depositfiles.com/files/395365
  24. 1000 series (1003, 1004) http://rapidshare.com/files/5604014/c1000-y-mz.121-8.bin 1000 series (1003, 1004) http://rapidshare.com/files/5603773/c1000-y-mz.121-16.bin 2600 series (2610, 2611, 2620, 2621) http://rapidshare.com/files/5609301/c2600-io3-mz.122-10.bin 3620 series http://rapidshare.com/files/5609167/c3620-io3-mz.122-3.bin 1600 Series http://rapidshare.com/files/5593650/c1600-sy-mz.122-3.bin http://rapidshare.com/files/5593771/c1600-y-l.122-2.T.bin 2500 Series Cisco2509 version 12.0 http://rapidshare.com/files/5593787/c2500-c-l.120-4.bin 2600 Series Cisco2600-IP PLUS-12.2 (2) http://rapidshare.com/files/5593865/c2600-is-mz.122-2.T.bin Cisco2600-IP PLUS-12.0 ( http://rapidshare.com/files/5593809/c2600-is-mz.120-8.bin Cisco2600-IP PLUS-12.2 Route http://rapidshare.com/files/5593877/c2600-is-mz.122-4.T1.bin Version 12.0 Cisco2600 Router http://rapidshare.com/files/5593823/c2600-is-mz.120-5.bin Version 12.0 Cisco2600 Router http://rapidshare.com/files/5593799/c2600-i-mz.120-7.bin IPX supports versions 12.1 Cisco2600 Router http://rapidshare.com/files/5593833/c2600-c-mz.121-9.bin Version 12.1 Cisco2600 Router http://rapidshare.com/files/5593804/c2600-i-mz.121-3.T.bin Cisco2600 Router version 1.22 http://rapidshare.com/files/5593924/c2600-c-mz.122-4.T1.bin Cisco2600 Router version 1.22 http://rapidshare.com/files/5593954/c2600-ik8s-mz.122-11.T.bin Cisco2600 Router version 1.22 http://rapidshare.com/files/5593947/c2600-ik8o3s-mz.122-11.T.bin 3600 Series http://rapidshare.com/files/5593885/c3640-d-mz.120-4.bin Cisco3640 Router 12.07 (t) version. http://rapidshare.com/files/5593961/c3640-is-mz_120-7_t.bin Cisco3640 Router 12.04 (t) version. http://rapidshare.com/files/5593941/c3640-dos-mz.120-4.t.bin 4000 Series Cisco4000 http://rapidshare.com/files/5594343/c4000-ajs-mz.120-10.bin Cisco4000 Router version 12.0 http://rapidshare.com/files/5594274/c4000-is-mz.120-7.bin Cisco4000 Router version 1.22 http://rapidshare.com/files/5594306/c4500-boot-mz.122-1.bin Switch Cisco 2924 http://rapidshare.com/files/5594522/c2900XL-c3h2s-mz-120.5.2-XU.tar http://rapidshare.com/files/5594571/c2900XL-c3h2s-mz-120.5.2-XU.bin Other PIX http://rapidshare.com/files/5594560/PDM-201.bin Cisco4500-IP PLUS-12.0 (7) http://rapidshare.com/files/5594346/c4500-is-mz.120-7.bin http://rapidshare.com/files/5594321/cat8510c-in-mz_120-1a_w5_6f.bin
×
×
  • Create New...