Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party. About keyloggers key loggersA keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the user. Keylogger is commonly included in rootkits. A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory. There are other approaches to capturing info about what you are doing. * Some keyloggers capture screens, rather than keystrokes. * Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection. A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features: * Stealth: invisible in process list * Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP) * ProBot program files and registry entries are hidden (Windows 2000 / XP) * Includes Remote Deployment wizard * Active window titles and process names logging * Keystroke / password logging * Regional keyboard support * Keylogging in NT console windows * Launched applications list * Text snapshots of active applications. * Visited Internet URL logger * Capture HTTP POST data (including logins/passwords) * File and Folder creation/removal logging * Mouse activities * Workstation user and timestamp recording * Log file archiving, separate log files for each user * Log file secure encryption * Password authentication * Invisible operation * Native GUI session log presentation * Easy log file reports with Instant Viewer 2 Web interface * HTML and Text log file export * Automatic E-mail log file delivery * Easy setup & uninstall wizards * Support for Windows (R) 95/98/ME and Windows (R) NT/2000/XP |
Tools:
Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.
This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.
Other Features:
Download Ardamax Keylogger (1.94Mb) Perfect Keylogger for Windows 98/2000/XP/Vista and Windows 7 The latest, improved and most stealth version of Perfect Keylogger is now available only after purchase. To protect the product from abuse and improve its quality for the registered users, we no longer offer the trial version of the latest builds. The localized versions of Perfect Keyloger and 64-bit version are also available after purchase. The last public version is still available, but keep in mind that it's not the latest and may be flagged by security software. Download Perfect keylogger |
Want to know much about your computer or your mobile phone, want to know more tweaks and tricks and make others see the potentials in you and love you more... you are highly welcome to my blog... stay connected and feel free to comment and ask for help because i am here to help you all
Thursday, 22 May 2014
keyloggers
hack instagram account
Nir Goldshlager Founder of Break Security find the critical vulnerability in Instagram. Succesful hack allows attacker to access private photos and ability to delete victim's photos, edit comment and post new photos.
1. Hijack Instagram accounts using the Instagram OAuth (https://instagram.com/oauth/authorize/)
2. Hijack Instagram accounts using the Facebook OAuth Dialog (https://www.facebook.com/dialog/oauth)
He reported a few issues to Instagram Include OAuth Attacks, But the acquisition didn’t closed yet and Facebook Security was unable to put their hands on security issues in Instagram, So I was waiting, Waiting like a good WhiteCollar, Then Facebook Security send me a message, They say even that they was unable to fix this issues because the acquisition didn’t closed yet, They will still payout for this vulnerabilities,
So, first, checked Instagram’s OAuth protocol: (http://instagram.com/developer/authentication/)
While researching Instagram’s security parameters, Nir noticed that Facebook Security had produced some impressive results in regard to their own Instagram OAuth vulnerabilities. They essentially blocked access to any and all files, folders, and subdomains by validate the redirect_uri parameter.
In addition, redirection was only allowed to go to the owner app domain.
Thus, hacker needed to locate some other way to get past their protection. Further complicating the issue was the fact that you can’t use a site redirection / XSS on the victim’s owner app. This is because you have no access to the files or folders on the owner app domain through the redirect_uri parameter.
Block Files Folders
For example:
Allow request:
https://apigee.com
Block requests:
Redirect_uri=https://www.breaksec.com
Redirect_uri=https://a.apigee.com/
Redirect_uri=https://apigee.com/x/x.php
Redirect_uri=https://apigee.com/%23,? or any special sign
As it stands, it appears that the redirect_uri is invulnerable to OAuth attacks.
While researching, I came upon a sneaky bypass. If the attacker uses a suffix trick on the owner app domain, they can bypass the Instagram OAuth and then send the access_token code to their own domain.
For instance:
Let’s say Nir app client_id in Instagram is 33221863xxx and my domain is breaksec.com
In this case, the redirect_uri parameter should allow redirection only to my domain (breaksec.com), right? What happens when we change the suffix in the domain to something like:
Breaksec.com.mx
In this example, the attacker can send the access_token, code straight to breaksec.com.mx. For the attack to be successful, of course, the attacker will have to buy the new domain (in this case, breaksec.com.mx).
PoC Bypass (Fixed By Facebook Security Team):
https://instagram.com/oauth/authorize/?client_id=33221863eec546659f2564dd71a8a38d&redirect_uri=https://breaksec.com.mx&response_type=token
Game Over.
Bug 2.
With this bug, Nir used the Instagram client_id value through the Facebook OAuth (https://www.facebook.com/dialog/oauth).
When you use the Instagram app, it can be integrated with Facebook.
For example:
When a user wants to upload their Instagram photos to Facebook, they allow this interaction and integration to take place.
Instagram Would like to access your public profile and friend list
Nir discovered that an attacker can use virtually any domain in the redirect_uri, next parameter. This was actually sort of baffling, and I don’t know why this happened, but it worked. You can literally use any domain in redirect_uri, next parameter via the redirect_uri in Instagram client_id.
This effectively allows the attacker to steal the access_token of any Instagram user,
With the access_token the attacker will be able to post on the victim behalf in his Facebook account, Access to his private friends list.
Chat with friends using command prompt
1) All you need is your friend's IP Address and your Command Prompt.
2) Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
3) Now save this as "Messenger.Bat".
4) Open Command Prompt.
5) Drag this file (.bat file) over to Command Prompt and press Enter.
6) You would then see something like this:
7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:
8) Now all you need to do is type your message and press Enter.
Start Chatting.......!
DONE....ENJOY.~!!
2) Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
3) Now save this as "Messenger.Bat".
4) Open Command Prompt.
5) Drag this file (.bat file) over to Command Prompt and press Enter.
6) You would then see something like this:
7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:
8) Now all you need to do is type your message and press Enter.
Start Chatting.......!
DONE....ENJOY.~!!
Sunday, 4 May 2014
Top 10 Reasons Why You Should Date a Geek Girl
10. She has traumatic memories from her K-12 education, or rather, the social interactions from her years before college. Your irrational fear of public bathrooms is not so irrational to her.
9. She’s smart, maybe even smarter than you. When she sees the string of acronyms after your name in your sig file, she gets excited. Conversely, she’ll taunt you when her string is longer.
8. She won’t look at you like you have two heads when you complain about bandwidth, when you scream at your computer, when you’ve taken apart your Xbox, when you start sewing a costume to wear at GenCon…
7. She understands your nutritional needs. She bakes cookies and orders pizza for D&D nights. When you’re playing WoW, she’ll cut your dinner into bite-sized pieces so you can eat and heal the main tank simultaneously.
6. If she doesn’t share your obsession with Star Wars, she at least understands it. The idea of a room wallpapered with figurines intrigues her and she’ll pick up a lightsaber to battle you to determine who takes out the garbage.
5. Geek girls come in all shapes and sizes from pixie to Willendorf goddess. Their hair is spikey, bobbed, down to their waist, or in braids. They are not slaves to fashion, but march to the beat of their own drummer, even if that drummer demands they wear shirts with jokes about counting in binary.
4. She’ll love you for your smarts, and if those smarts net you a lot of cash, that’s just the icing on the cake. (Everyone knows a really good cake doesn’t need icing!) Her intentions are to find a lifemate, not a lifeline. Besides, she’s smart enough to make her own fortune.
3. She loves to learn about anything and everything, so life and love are never vanilla. Nuff said?
2. Her friends are other geek girls, who you can set up with your geek friends. Not only will you be a hero, all those geeks would make a great WoW guild or D&D group!
1. If you’re a geek guy, she’ll trust you. If you’re a regular guy, she has eyes and ears everywhere and when she dumps you, you’ll know why. You won’t be sure of how she figured it out, but if I told you, she wouldn’t be able to do it again. 
Ladies: 9 Reasons You Should Date a Nerd Like Me!!!
Ladies, is the reason you aren’t getting very far in the dating world because you haven’t let go of the girl you were in high school? We know it’s a stereotype, but sometimes women pine after the rebellious cool guy, the one that mothers hate and girlfriends envy. While we’re driving ourselves crazy to impress Mr. Cool, the undiscovered nerd is standing in the shadows waiting to be noticed.
You know who we’re talking about, right? We’re referring to that bespeckled guy that you overlooked so many years ago because he wasn’t cool. Well, brace yourself for revenge of the nerds, because this soft-spoken loner is smart, sincere and will genuinely be nice to you. If you haven’t given a second look to the guy that looks like your former Chemistry tutor, perhaps you should delve deeper into this untapped resource.
Maybe the comic book expert with the closetful of costumes for next month’s convention is a little much. But those guys who walk the line between nerd and die-hard geek could use just a little luring out of their shell. Underneath all of those odd hobbies and quirky friends, these men can not only hold a conversation, but they also champion a woman with an education, a large vocabulary and a mind of her own.
If you have never dated a nerd, consider the following 9 reasons why you might just need a geek in your life.
1. He’s Heartfelt
Although sometimes awkward, geeks are usually well-meaning and sincere. He wants to get to know you and feel comfortable with a real lady. Surely, it is quite a difference from the lonely nights with Lara Croft from Tomb Raider, but a welcome change nonetheless.
2. He’s a Smarty Pants
Nerds usually are intelligent, can hold a good job and are overall self-sufficient. He’s probably responsibly planned for and invested in his future well before any of us have started. Smart guys can also open your horizons and can offer a perspective or education about world news, politics or obscure movie trivia.
3. You’ll get the Star Treatment
Often overlooked, these guys can appreciate a woman when they get one. Likely to be a priority in his life, they show you off to their friends, call when they say they will and will most likely impress Mom and Dad. Okay, so maybe you will be number 2 or 3 after the computer games and geek trivia, but you won’t be on a long list of ladies vying for some time with him.
4. He’s Open to Suggestions
You can offer tips on fashions, hairstyles or even music of present day. They realize that they could use the help when replacing the acid washed jeans or “spiked” hair from the days of yore and welcome their newfound hipness.
5. He’s a Gentleman
A far cry from the smarmy creep at the bar, nerds are more likely to debate your favorite Superman villain than only go after that “one thing.” With little less relationship experience, his naïve fumbling with romantic advances come off as endearing and honest.
6. He’s a Go-Go Gadget Guy
Nerds tend to be more tech-savvy than the average layman, so whenever a frustrating situation happens with cache memory, deleting cookies or synchronizing the network, he can get those gadgets to behave.
7. He’ll Make You Laugh
With quirky interests and a matching sense of humor; nerds can share some interesting trivia or strange hobbies and while laughing at themselves, too. It’s a welcome deviation from the “I’m too cool to laugh at myself” act.
8. He Keeps the Right Company
Nerdy guys often have awkward geek friends. So instead of bad influences or disrespectful attitudes, your nerd man is hanging out with these guys playing Guitar Hero. A welcome reprieve from the raunchy “Guys Night Out,” when who knows what could happen, these guys are spending time with the fellas discussing politics or network gaming. Plus, the buddies treat you nice when you come around, while your new man will be the hit in the group with such a hot gal on his arm.
9. You Can Be Yourself
You don’t have to put on a show for these guys by wearing 4 inch heels and making yourself up to look like a goddess. We bet they wouldn’t mind your hair in a ponytail, the makeup-free glow, or your favorite jersey. You can be yourself around him and he won’t be the jerk that works so hard to make you feel ugly.
Like finding a diamond in the rough, your nerdy guy can be your own little treasure that no one has discovered yet. You will have to discover them, by the way. Nerdy ones are not the type to seek you out or make the first move, so you will have to be the brave one. But upon further examination, choosing a nerd may improve your chances of making a real connection.
Due to their neglected past, there are a bevy of nerdy gentlemen out there that never garnered a second look that are ready and willing to have a real relationship with someone that will give him a chance. So what if they are interested in geeky things? They make great companions because they stimulate the most vital organ: the brain.
samsung galaxy s5 full specification
Samsung SM-G900F for Europe
Samsung SM-G900I for Asia
Samsung SM-G900K/G900L/G900S for Korea
Samsung SM-G900M for Vodafone
Samsung SM-G900A for AT&T
Samsung SM-G900T for T-Mobile
Samsung SM-G900I for Asia
Samsung SM-G900K/G900L/G900S for Korea
Samsung SM-G900M for Vodafone
Samsung SM-G900A for AT&T
Samsung SM-G900T for T-Mobile
| GENERAL | 2G Network | GSM 850 / 900 / 1800 / 1900 - all versions |
|---|---|---|
| 3G Network | HSDPA 850 / 900 / 1900 / 2100 - SM-G900F HSDPA 850 / 900 / 1700 / 1900 / 2100 - SM-G900M | |
| HSDPA 850 / 1900 / 2100 - SM-G900A HSDPA 850 / 1700 / 1900 / 2100 - SM-G900T | ||
| 4G Network | LTE 800 / 850 / 900 / 1800 / 1900 / 2100 / 2600 - SM-G900F LTE 700 / 850 / 1700 / 1900 / 2100 / 2600 - SM-G900M | |
| LTE 700 / 850 / 1700 / 1800 / 1900 / 2100 / 2600 - SM-G900A LTE 700/850/900/1700/1800/1900/2100/2600 - SM-G900T | ||
| SIM | Micro-SIM | |
| Announced | 2014, February | |
| Status | Available. Released 2014, April |
| BODY | Dimensions | 142 x 72.5 x 8.1 mm (5.59 x 2.85 x 0.32 in) |
|---|---|---|
| Weight | 145 g (5.11 oz) | |
| - Fingerprint sensor (PayPal certified) - IP67 certified - dust and water resistant - Water resistant up to 1 meter and 30 minutes |
| DISPLAY | Type | Super AMOLED capacitive touchscreen, 16M colors |
|---|---|---|
| Size | 1080 x 1920 pixels, 5.1 inches (~432 ppi pixel density) | |
| Multitouch | Yes | |
| Protection | Corning Gorilla Glass 3 | |
| - TouchWiz UI |
| SOUND | Alert types | Vibration; MP3, WAV ringtones |
|---|---|---|
| Loudspeaker | Yes | |
| 3.5mm jack | Yes |
| MEMORY | Card slot | microSD, up to 128 GB |
|---|---|---|
| Internal | 16/32 GB storage, 2 GB RAM |
| DATA | GPRS | Yes |
|---|---|---|
| EDGE | Yes | |
| Speed | HSDPA, 42.2 Mbps; HSUPA, 5.76 Mbps; LTE, Cat4, 50 Mbps UL, 150 Mbps DL | |
| WLAN | Wi-Fi 802.11 a/b/g/n/ac, dual-band, DLNA, Wi-Fi Direct, Wi-Fi hotspot | |
| Bluetooth | Yes, v4.0 with A2DP, EDR, LE | |
| NFC | Yes | |
| Infrared port | Yes | |
| USB | Yes, microUSB v3.0 (MHL 2.1), USB On-the-go, USB Host |
| CAMERA | Primary | 16 MP, 5312 x 2988 pixels, phase detection autofocus, LED flash, check quality |
|---|---|---|
| Features | 1/2.6'' sensor size, 1.12 µm pixel size, Dual Shot, Simultaneous HD video and image recording, geo-tagging, touch focus, face and smile detection, image stabilization, HDR | |
| Video | Yes, 2160p@30fps, 1080p@60fps, 720p@120fps, HDR, video stabilization, dual-video rec., check quality | |
| Secondary | Yes, 2 MP, 1080p@30fps, dual video call |
| FEATURES | OS | Android OS, v4.4.2 (KitKat) |
|---|---|---|
| Chipset | Qualcomm MSM8974AC Snapdragon 801 | |
| CPU | Quad-core 2.5 GHz Krait 400 | |
| GPU | Adreno 330 | |
| Sensors | Accelerometer, gyro, proximity, compass, barometer, gesture, heart rate | |
| Messaging | SMS(threaded view), MMS, Email, Push Mail, IM, RSS | |
| Browser | HTML5 | |
| Radio | No | |
| GPS | Yes, with A-GPS support and GLONASS | |
| Java | Yes, via Java MIDP emulator | |
| Colors | Charcoal Black, Copper Gold, Electric Blue, Shimmery White | |
| - Wireless charging (market dependent) - ANT+ support - S-Voice natural language commands and dictation - Smart stay, Smart pause, Smart scroll - Air gestures - Dropbox (50 GB cloud storage) - Active noise cancellation with dedicated mic - TV-out (via MHL 2.1 A/V link) - SNS integration - MP4/DivX/XviD/WMV/H.264/H.263 player - MP3/WAV/WMA/eAAC+/FLAC player - Organizer - Image/video editor - Document viewer (Word, Excel, PowerPoint, PDF) - Google Search, Maps, Gmail, YouTube, Calendar, Google Talk, Picasa - Voice memo/dial/commands - Predictive text input (Swype) |
| BATTERY | Li-Ion 2800 mAh battery | |
|---|---|---|
| Stand-by | Up to 390 h | |
| Talk time | Up to 21 h | |
| Music play | Up to 67 h |
| MISC | SAR US | 1.20 W/kg (head) 1.58 W/kg (body) |
|---|---|---|
| SAR EU | 0.56 W/kg (head) 0.41 W/kg (body) | |
| Price group |
| TESTS | Display | Contrast ratio: Infinite (nominal), 3.549 (sunlight) |
|---|---|---|
| Loudspeaker | Voice 66dB / Noise 66dB / Ring 75dB | |
| Audio quality | Noise -96.3dB / Crosstalk -95.2dB | |
| Camera | Photo / Video | |
| Battery life | ||
Disclaimer. I can not guarantee that the information on this page is 100% correct.
Subscribe to:
Comments (Atom)