Jumat, 30 November 2012

Aircel Free 3G at 3.6 MBPS

Dear visitors today we are back with new Aircel tricks. Afer long time finally there is a working tricks for Aircel users. This is trick is based on peoples VPN. Using this tricks you can use Unlimited 3G. This is working only in some states.

Aircel Free 3G at 3.6 MBPS

This trick is tested and it's confirmed working in Bihar and Westbengal. We don't assure that this trick will work all over India but you can try it in your State and if it's working comment below. Just follow below steps and you can easily use unlimited 3G with Aircel.

Steps To Use Aircel 3G Trick

It's very easy to use this trick as this trick is based on Peoples VPN you need to download and Register on their official website.
  • To download and register on Peolpes VPN follow bellow links.
  • Download Peoples VPN.
  • Register on Peoples VPN.
  • Try this 3g trick at lowest 3g pack.
  • For getting 3G Speed you need to do Recharge with Minimum 3G Pack i:e 39 RS 3G pack for Bihar or West Bengal Circle.
  • After doing these steps enter your username and password in Peoples VPN.
  • Connect Peoples VPN with Port 1021.
  • It will connect Instantly, Speed will be around 3.6 MPS.
  • Enjoy free 3g!!!
Be Social! Take a second share this post with your friends if it helped you. Also like us on facebook and stay updated with latest posts.

Kamis, 29 November 2012

Beware! Fake Facebook Privacy Notice

Hello readers have you recently got a warning from Facebook, if yes don't worry it's totally fake. A fake privacy notice is spreading very fast on Facebook stating that you have to update your status with a unique message. In it also mentioned that failing do so would result in exposition of your privacy.
Beware! Fake Facebook Privacy Notice
Well this is fake and no way related to facebook. Please reffer to facebook privacy policy which is provided on their website for better understanding your privacy.

Tips To Protect Your Facebook Privacy

  • Never share your personal photos publicly.
  • Choose your privacy while uploading photos or updating status.
  • Publicly shared post & photos can be viewed by anyone.
  • Your personal photos might be misused.
  • You also use other facebook security tool to protect you privacy on facebook.

Additonal Tips By Facebook

You have settings that help you design how your timeline will appear to others, like hiding things from your timeline. Remember that this only impacts whether those things are visible on your timeline. Those posts are still visible elsewhere, like in news feed, on other people's timelines, or in search results. You can delete your own posts from your timeline or activity log, or ask someone else to delete a post you're tagged in.

Be Social! Take a second share this post with your friends if it helped you. Also like us on facebook and stay updated with latest posts.

Rabu, 28 November 2012

Airtel Real Host Trick - Working

Dear visitors today we are back with new Airtel real host trick which can be used in moble. As many airtel vpn tricks are blocked in many states, for those who cannot use vpn tricks they can use this real host trick. This trick can be also used  in PC using Vnap. Using this you can browse very smoothly as it based on high speed server.

Airtel Real Host Trick - Working

This new Airtel tricks is confirmed to be woking in Delhi & Tamil Nadu however you can try this trick in your State and if it's working comment below.

Steps To Use Airtel Real Host Trick

Here are very simple steps to use this trick, first you need to download any opera or uc handler you can google it or download link is provided in this post.

Creat new config in mobile:

Account Name: thefuturehack
Access point: airtelgprs.com
Proxy: 80.239.243.210
Port: 80
    Now Save the Settings, Open Opera min in handler,
    In Opera Mini handler, Enter the below FrontQuery exact as shown below.

    FrontQuery:     working hp/action.php/Cousm/http/

    Replace working hp with any working homepage of your states. Below are few homepages you can use.
    Working Homepages:
    202.46.201.112
    203.115.112.5
    203.115.112.27
    203.115.112.27
    122.170.122.201
    122.170.122.212
    122.170.122.202
    122.170.122.214

    You can use this trick in PC using Vnap. Refer below mentioned post to know about how to use Vnap an download link of Vnap.

    Note: As this Trick is based on Proxies to avoid sim blocking don't use more than 50mb in once. After use of 45-46 mb disconnect it and then reconnect. There will be no sim blocking.

    Be Social! Take a second share this post with your friends if it helped you. Also like us on facebook and stay updated with latest posts.

    Senin, 26 November 2012

    Why Collect Full Content Data?

    I recently received the following via email:

    I am writing a SANS Gold paper on a custom full packet capture system using Linux and tcpdump. It is for the GSEC Certification, so my intent is to cover the reasons why to do full packet capture and the basic set up of a system (information that wasn't readily available when setting my system up)...

    I am already referencing The Tao of Network Security Monitoring.

    These are the questions that I came up with based on questions other peers have asked me...

    Here are the questions, followed by my answers. Most of this is covered in my previous books and blog posts, but for the sake of brevity I'll try posting short, stand-alone responses.

    1. As an information security analyst in today's threat landscape why would I want to do full packet capture in my environment? What value does have?

      Full content data or capturing full packets provides the most flexibility and granularity when analyzing network-centric data. Unlike various forms of log data, full content data, if properly collected, is the actual data that was transferred -- not a summarization, or representation, or sample.

    2. Where should I place a full packet capture system on my network - are ingress/egress points sufficient?

      I prioritize collection locations as follows:

      • Collect where you can see the true Internet destination IP address for traffic of interest, and where you can see the true internal source IP address for traffic of interest. This may require deploying two traffic access methods with two sensors; so be it.
      • Collect where you can see traffic to and from your VPN segment. Remember the previous IP address requirements.
      • Collect where you can see traffic to and from business partners or through "third party gateways." You need to acquire the true source IP, but you may not be able to acquire the true destination IP if the business partner prevents collecting behind any NAT or security devices that obscure the true destination IP.
      • Collect where your business units exchange traffic. This is more of a concern for larger companies, but you want to see true source and destination IPs (if possible) of internal traffic as they cross business boundaries.
      • Consider cloud or hosted vendors who enable collection near Infrastructure-as-a-Service platforms used by your company.
    3. What advantages are there to creating a custom server with open source tools (such as a server running Linux and capturing with tcpdump) opposed to buying a commercial solution (like Solera or Niksun)?

      A custom or "open" platform enables analysts to deploy the sorts of tools they need to accomplish their security mission. Closed platforms require the analyst to rely on the information provided by the vendor.

    4. Now that I have full packet data, what kind of analysis goals should I have to address advanced threats and subtle attacks?

      The goal for any network security monitoring operation is to collect and analyze indicators and warnings to detect and respond to intrusions. Your ultimate role is to detect, respond to, and contain adversaries before they accomplish their mission, which may be to steal, alter, or destroy your data.

    5. Any other advice for an analyst just getting started with full packet capture systems and analyzing the data?

      Rarely start with full content data. Don't dump a ton of traffic into Wireshark and start scrolling around. I recommend working with session data (connection logs) and application-specific logs (HTTP, DNS, etc.) to identify sessions of interest, then examine the content if necessary to validate your suspicions.

    I could write a lot more on this topic. Stay tuned.

    Premium Guide To Make Money With Adf.ly

    Dear visitors today we are back with a new post on how to make huge money with adf.ly. Many of you might know about adf.ly. If you don't know what adf.ly here is a quick look on adf.ly and a guide on how to make huge money with adf.ly.

    Premium Guide To Make Money With Adf.ly

    What is adf.ly

    Adf.ly is a free url shortening service. Many websites provide this services, but what difference with adf.ly is it pays you when any person visits your shorten url. You can share your url on facebook(by default facebook does not allows you to share adf.ly links but guide contains a method by which you can easily share links on facebook),Twitter, forums, personal websites and any social networking sites. They pay $4/1000 visitors which is not bad in any way as you are getting this for just sharing your shorten url. Their minimum payout is $5. You can request payment by various methods. They pay their user genuinely. Many users earn $200-500 monthly by just sharing the links.

    Premium Guide

    At the end of this post there is a download link for E-book on "How to make huge money with adf.ly". This Guide contains plenty of methods so I have not posted it here it is better you download the Guide and read all methods. You can earn unlimited with adf.ly after reading this Guide, if you have ability to do something in your life.

    My First Payment's Proof

    Adf.ly Payment Proof

     Signup for adf.ly acount.

    If you don't have adf.ly account then join here

    Download Guide-How to make huge money with adf.ly

    Download adf.ly Guide

    Be Social! Take a second share this post with your friends if it helped you. Also like us on facebook and stay updated with latest posts.
    Visit us daily for more online money making tips.

    Minggu, 25 November 2012

    Spectrum of State Responsibility

    "Attribution" for digital attacks and incidents is a hot topic right now. I wanted to point readers to this great paper by Jason Healey at the Atlantic Council titled Beyond Attribution: Seeking National Responsibility in Cyberspace.

    ACUS published the report in February, but I'm not hearing anyone using the terms described therein. Probably my favorite aspect of the paper is the chart pictured at left. It offers a taxonomy for describing state involvement in digital attacks, ranging from "state-prohibited" to "state-integrated."

    I recommend using the chart and ideas in the paper as a starting point the next time you have a debate over digital attribution.

    Sabtu, 24 November 2012

    Recommended: The Great Courses "Art of War" Class

    I recently purchased and listened to an audio course titled The Art of War (TAOW) by Prof Andrew R. Wilson and published by The Great Courses. From the first few minutes I knew this series of six 30 minute lessons was going to be great.

    For example, did you know that "Sun Tzu" didn't write "The Art of War?" An anonymous author wrote the book in the 4th century BC, based on Sun Tzu's lessons from his time in the 6th century BC.

    Also, "The Art of War" isn't even the name of the book! It's actually "Master Sun's Military Method." Furthermore, the use of the term "Master" is significant as it was a term not usually associated with generals.

    I especially like two aspects of the course. First, the lecturer, paraphrasing his own words, didn't choose to simply peruse TAOW looking for trite phrases. He equates that approach with telling a stock broker to "buy low, sell high." Instead, Prof Wilson is more concerned with explaining the context for the book and what the words really mean.

    Second, the lecturer extends his discussion beyond the history of China's Warring States Period, the era from which TAOW was born. Prof Wilson applies lessons from the book to military history and business situations. He also applies TAOW to modern Chinese cyber espionage, showing he keeps current with contemporary issues.

    Consider buying TAOW as a holiday gift for yourself or your friends!