Twitter hacked by Iranian Cyber Army

Iranian Cyber Army claims to control and manage internet by their power by wiping out Twitter Thursday

Paige Maynard







Around 10 p.m. Thursday evening, Twitter users logged in to the Web site to find an unusual message from the Iranian Cyber Army claiming that they, not the U.S., controlled and managed the internet.
Techcrunch has the full message, if you want to read the bizarre rantings of the ICA.
The Iranian Cyber Army apparently not only hacked in to Twitter, but also Mowjcamp. The company updated its status blog after the hack saying, “Twitter’s DNS records were temporarily compromised but have now been fixed. We are looking into the underlying cause and will update with more information soon.”
Twitter managed to get back up, but the other Web site is still affected. The microblogging service issued a warning to all their users saying that if you use the same password for your Twitter as you do with other websites, now may be a good time to change it.
So why did the Iranian Cyber Army target Twitter? Let’s let TechCrunch take over:
“There is a history between Iran and Twitter. It was well noted and covered in the media that Twitter was used as a tool during the Iranian election protests. The US government actually intervened to assure that Twitter was available to the protesters in Tehran and around the country. This attack may be an act of reprisal from groups who were not happy with the role that Twitter played during the protests.”.
Not to mention the fact that the Internet helped spread footage of protester Neda Agha-Soltan being shot and killed, an event which helped mobilize Iranian election protesters.
With the maneuver of the Iranian Cyber Army, Twitter finds itself once again being no stranger to hacking. Nearly two months ago their web servers were misconfigured to reveal internal network information. And let’s not forget about french man Hacker Croll stealing over 300 confidential Twitter documents and sending them to various websites to publish.
It is unclear who the Iranian Cyber Army is at this time or if they are actually the responsible party behind this Twitter hacking.
So it seems like Twitter still has some kinks to work out when it comes to protecting their databases and passwords. May we suggest calling up Mark Zuckerberg? He claims to know a thing or two about privacy settings. 

How to Remove Kido / Conficker / Downadup / Downup Worm?


[Image: virus-conficker.jpg]
Symptoms to check if your computer is infected with this:

* Show all hidden files and folders are not working
* Can’t access anti-virus websites like: Bitdefender.com Symantec.com, and patch sites like Microsoft.
* The existence of a file named: jwgkvsq.vmx inside the RECYCLED folder.
* Creates autorun.inf files on USB devices plugged in an infected machine. Also other viruses does this.
* Account lockout policies being reset automatically.
* Certain Microsoft Windows services such as Automatic Updates, Background Intelligent Transfer Service (BITS), Windows Defender and Error Reporting Services are automatically disabled.
* Domain controllers respond slowly to client requests.
* System network gets unusually congested. This can be checked with network traffic chart on Windows Task Manager.
* Launches a brute force dictionary attack against administrator passwords to help it spread through ADMIN$ shares, making choice of sensible passwords advisable.

Remove the virus:
Some of the well-known security companies came up with tools for removing the Conficker/Downandup worm virus. Removal tools can be freely downloaded from any of the following security sites:

* Microsoft
* BitDefender
* ESET
* Symantec
* Sophos
* Kaspersky
* McAfee Anti-virus with updated detections can remove this by scanning your system.
* AVG can also remove it via system scan, if you have it installed and updated.

How to remove the Conficker/Downandup worm virus?

1. Download Conficker/Downandup removal tools from the given sites above.
2. Disconnect from the internet, and remove any network cables at the back of your PC/laptop, and also remove any plugged-in USB devices.
3. Login as Administrator on your computer, or any account that has administrator privileges.
4. Run the removal tool. My recommendation is to use the removal tools from BitDefender (quick scan) and Symantec (thorough scan). But if you are not content, just run all the removal tools for greater detection.Simple-case: The removal tool will detect and remove the Conficker worm and ‘may’ require that you restart your computer.
Extreme-case: The removal tool won’t run because the virus is preventing it from running. Quick solution:
1. Open task manager (CTRL+ATL+DEL)
2. Terminate (End) the process with these names: explorer.exe and svchost.exe
3. A countdown timer will appear requiring you to restart your computer. DO NOT DO ANYTHING AT THIS POINT EXCEPT… Immediately run the BitDefender Tool (quick scan) so that it will remove the virus before your computer restarts.
4. If the tool won’t still run, ‘end process’ all the svchost.exe and try running the removal tool again.

It only affects Windows system that aren’t patched with the latest update. Run autoupdate and patch your Windows. It is critical that these patches be installed:
Microsoft Security Bulletin MS08-067 – Critical
Vulnerability in Server Service Could Allow Remote Code Execution (958644)
http://www.microsoft.com/technet/securit...8-067.mspx (download for XP)
Microsoft Security Bulletin MS08-068 – Important
Vulnerability in SMB Could Allow Remote Code Execution (957097)
http://www.microsoft.com/technet/securit...8-068.mspx (download for XP)
Microsoft Security Bulletin MS09-001 – Critical
Vulnerabilities in SMB Could Allow Remote Code Execution (958687)
http://www.microsoft.com/technet/securit...9-001.mspx (download for XP)
For manual download of patches for Windows XP and Vista go to http://www.softwarepatch.com/windows/

How To Kill Unresponsive Programs without The Task Manager

Windows is generally not known for its stability. Among other things there are frequent “Not Responding” applications. The reasons may vary from less RAM to Viruses to poorly designed applications. So what do you do when an application hangs up?

I bet you hit Ctrl+Alt+Del or fire up the task manager in some other way, reach for the application and choose “End Task”. Now there is nothing wrong with this approach, in fact as long as it gets the job done it doesn’t matter how you do it. However, ever had the situation where the task manager itself takes ages to load up? Of course it can happen because task manager does a lot of other things besides just ending tasks so it requires that much more resources. Apart from that, how about ending the hung applications with just a single click?
Yeah! you can do so. Its simple to achieve. Just follow along:

* Right click on the desktop and choose New > Shortcut

[Image: newtkl.png]

* In the dialog box that appears just type the following:
taskkill.exe /f /fi “status eq not responding”

[Image: locationtkl.png]

* Give it a name of your choice

[Image: nametkl.png]

* Now just wait for something to start “Not Responding” and let loose your Task Killer!
So what did we do exactly? We just created a shortcut to run a command. The command being taskkill. Whenever you double click the shortcut you will invoke the said command which takes care of the rest. In particular the command we use says that kill all taskes whose status is equal to “not responding” and kill them forcefully (/f).

The /fi switch is used to filter and pinpoint the application to kill. We are using the Program’s status to filter the applications that are not responding and then kill them. You can filter(and thus kill) by memory usage (equal to, greater than, less than or not equal to), cpu time, window title and others.
[Image: filtertkl.png]

YMS Status Changer - Displays the current song information (flexible formatting& effects) in the Yahoo! Messenger status.



This General Purpose Plugin can change the Yahoo! Messenger status text with the current playing song information, such as the title, artist, song name, or playlist entry number. Here are some features:
- flexible text formatting;
- global hotkeys support;
- customizable behavior (e.g. not to change the status while invisible, etc.)
- special effects with the status text :)
- no ads or any unsolicited text in the status! - it's your plugin and you can put any text you want there
...and much more.


Download YMS Status Changer here

Overclock using multiplier



Previously been discussed about how to shape the relationship between the FSB with the memory. After discovering the relationship the two, then we can do overclocking on the processor.

With easy detikINET 'interesting' Intel Core i7 965 from the standard speed of 3.2 GHz to 4GHz just by raising the FSB speed, it was because the cooling is limited by the processor is still the standard.

It is true Intel Core i7 965 already has very adequate speed to run even the heaviest application. High speed is certainly not immune from the multiplier is also owned. What is a Multiplier?

Muliplier is a ratio between the processor's internal clock with the external clock, Itupun ratio can be changed to determine the processor speed. For example, the Intel Core i7 965 has a multiplier 24 with 133MHz FSB. This means that the processor has a default speed of 133MHz = 24 x 3192 MHz or equal to 3.2 GHz.

But keep in mind that not all processors have a multiplier that can be raised (unlocked multiplier), in fact most of the processors in circulation now can only be derived Multipliernya (Multiplier Lock).

Increasing the number of multiplier overclocking is a very safe thing to do, because the changes would not affect skyrocketing FSB speed or memory.

With the right combination of FSB speed, memory and the number of multiplier, then the overclockers will find the optimal processor speed.

So what just leave it at that? of course not.

If the combination is still considered missing, the user can still increase the amount of voltage. There are two types of voltage in the computer, vCore, is the name for the processor voltage and voltage to vDIMM term memory. However, increasing the amount of voltage has a risk of a much larger increase compared to the multiplier or FSB.

Voltage raised solely to be done if the system does not go well due to excessive overclocking.

In conclusion, to perform overclocking is not a difficult case, but still a risk that can cause damage to the hardware.

Moreover, the computer vendors do not provide warranty for damage caused by overclocking, really a nightmare if that happened.

It certainly could be prevented if the user does not overclock too much, which means that the computer remain stable, the temperature is not excessive or an increase in speed is not far adrift from its original state

5 Tips Avoid Tired Eyes in Front of Monitor





Some of us would have the habit of working for long in front of the PC monitor, either to work or doing other things like playing games and browsing. As a result the effects of eye fatigue and headache was inevitable.
While many consider this fact not entirely true, but in reality it is still affecting the health of our eyes. The effect we sometimes a little difficult to focus the object of view, and so on. This of course caused a radiation monitor for too long when we work.
As quoted from Softpedia, Monday (14/9/2009) The following are some tips to avoid eyestrain, while in front of the monitor:
1. Keep your distance from the monitor view.
Being too close to the monitor is a bit dangerous for our eyes. We should maintain visibility into our monitors well. The recommended distance is about 20-40 inches (50-100cm) from the eye.
If we still difficult to read when the monitor was located at a distance of 20 inches, try to enlarge the font you until we feel comfortable.

2. Get rid of CRT, LCD Switch to
Monitor tube (CRT) does give a worse effect than the LCD, but the energy required is also greater. Try to replace our CRT monitors with LCD.
But the price of LCD monitors are more expensive than CRT. For those of us who still menyeyangi CRT monitors, it's good we buy anti-radiation filters. This is the solution to reduce pain from the eyes linger in front of the monitor, but with the cheap price.

3. Adjust monitor settings
Some current monitor provides many pre-set display modes, to facilitate users to change their screen settings. Pre-set these settings to give brightnes different levels, to adjust the monitor usage conditions. Sometimes use it.
For example setting like, 'text' or 'internet' will feel much cooler in the eyes, when we use for typing or browsing. Settings 'game' or 'movie' will look much brighter when in use.

4. Use anti-radiation glasses
Although it costs a relatively more expensive, but it's good to have enough money when we buy anti-radiation glasses. In addition you can take them wherever we work, these glasses are not only useful when we work in front of the monitor, namuna also protect the eye from the car light, radiation, TV, and so on.
In fact the anti-radiation coating on the glasses, very useful for our eyes. Because the layer automatically reduces the effects of pain in the eyes of radiation due to excessive light.

5. Rest his eyes for a moment, on a regular basis

The easiest way to avoid eye fatigue due to radiation monitor is periodically mengistirahatkannya. Try to rest my eyes for about 5 minutes every hour. We can use the time to 5 minutes walk, see the sights, washed her face and so on. The important thing away from the monitor.

Tricks to fend off junk Email Senders




Junk email, aka spam is hard muted, especially if the email that we use do not use a filter spam filter. Inevitably, the ads brought gelontoran unwanted messages are going mensesaki our inbox.

Here are some tricks that can be done to ward off invasion recommended Symantec's email:
 
Who should do:


  • Unsubscribe from legitimate mailing-list if you do not want to receive messages again. When registering to receive email, check out additional items whatever you want at the same time. Do not select the items you want.
  • Selective in terms of sites where you register your email address.
  • Avoid displaying your email address on the Internet. Consider alternative options-for example, use a separate address when registering at a particular mailing list, have several email addresses for many different purposes, or look for a disposable email service.
  • By using the instructions provided by the administrator, report spam if you have the option to do so.
  • Delete all spam
  • Avoid clicking on suspicious links in emails or IM messages, because it could be connected to a fake site. We recommend to type a website address directly in the browser rather than trust the link in the message.
  • Ensure that the operating system up to date, and use security software packages are comprehensive.
  • Consider the anti-spam solution that has a good reputation for handling filtering throughout your organization. 


 Who should not do:


  • Opening an email attachment from an unknown. This appendix can infect your computer.
  • Replying to spam. Usually forged email address, and reply to email spam will result in another spam spam.
  • Fill out the form in a message requesting personal or financial information or passwords (passwords). Leading companies can not ask for your personal information via email. If you hesitate to contact the company through a trusted independent mechanism, such as by verifying the phone number or Internet address is known that you type into a new browser window (do not click on or cut and paste the link in the message).
  • Buying products or services from spam messages.
  • Open the spam message.
  • Forward any virus warnings you receive by email. It could be a lie that is the news (hoaxes).

Rapidleech Server List Update 10 December 2009







I've updated premium rapidleech server list for you..
http://sv3.giotle.biz/leech/ User/Pass: GLG/GLG
http://sv2.giotle.biz/leech/ User/Pass: GLG/GLG
http://megapid.com only Mega
http://sv1.giotle.biz/leech/ User/Pass: GLG/GLG
http://starbright-promotions.com/leech/ User/Pass: GLG:GLG
http://a2th.com/getlink/ User/Pass: ndtn/uds
http://dlking.info/rl/
http://intercambiando.co.cc/
http://www.hlusoe.info/
http://trungkien.us/load/
http://downloadpremium.net/
http://jleech.com/
http://www.jidox.com/
http://www.ngising.net/
http://www.rapid8.com/
http://rapidhard.pl/

Delete Undeletable File with Unlocker

Cannot delete file or folder in Windows explorer of XP, Vista, 2000 or 2003? Is it because the access is denied? Or because Windows cannot read from source file or disk? The source or destination file may be in use? Make sure the disk is not full or write-protected and that the file is not currently in use?
Sometimes you just cannot delete files and Windows keeps throwing out error messages without any specific solution. There is no further information on how the access is denied, or why Windows cannot read from the source file, or what application that is using or accessing the file so that it cannot be deleted.
In other words, the file is locked without any clear explanation of what is happening and any clear solution to unlock the file.
If you don’t want to install any software, there are two standard solutions for this.

How to delete undeletable files without installing software…


First option:
  • make sure that you have closed all of the running applications.
  • open the Windows Task Manager by pressing Ctrl + Alt + Del.
  • In the “Process” tab, find the “explorer.exe”.
  • Right click it and select “End process”.
  • Ignore the warning message and click “Yes”.
Second option, if the first doesn’t work, you should restart Windows. They try to delete it again. There should be no problem in deleting the file.
However, would you spend time to restart Windows everytime you find a locked file? What about your current task? Do you have to leave them just to delete a locked file? There are times when you just can’t avoid the necessity of an additional application to make things right in a faster way. In this case, Unlocker would be the perfect answer.
Unlocker doesn’t only let you to delete a locked file without restarting Windows, but it also lets you know which programs that are locking the file. Moreover, it also enables you to rename or move the locked file. All is done right inside your Windows explorer.

How to delete locked file with Unlocker


  • Download and install Unlocker.
  • Right-click the undeleted file and select Unlocker from the menu.
  • If the file is locked by other programs, Unlocker will show you which ones.
  • Select the delete option from the drop-down menu.
  • Hit “Unlock All” button.
  • That’s all. The file is deleted directly.
There is a faster way to do it. You can bypass the necessity to right-click the file everytime you find a locked one by letting Unlocker assistant running in the background. This assistant will automatically launch Unlocker once you close the error message that pops up when you cannot delete a file.
For me, Unlocker has done very well so far. I can delete every locked file without having to restart Windows. However, the maker warns there could be times when you have to restart Windows or even fails in deleting a locked file using Unlocker. I guess it happens once in a blue moon, though.
Another interesting thing you can find from the developer’s site is the list of the alternative programs in case you find Unlocker fails to do a certain deletion job. The alternatives are ranging from Boot Deleter, WhoLockMe, Delete Doctor, Process Explorer, ForceDel, and many others.
Unlocker is a freeware supporting Windows Vista, XP, 2000 and 2003.

Simple Trick to Speed Up Your Computer



This is a very simple trick to speed up your computer.
just do this step
Step One: Open up Notepad (it’s in Accessories)

Step Two: Type in MYSTRING=(80000000)

Step Three: Save the file as MEMORY.VBE (or RAM.VBE if you like…just remember the .VBE)

Step Four: Make sure you save the file to your DESKTOP.

Step Five: Just double-click the newly created file on your desktop whenever your PC seems sluggish. It will give your RAM a much needed boost.


Work on XP and Vista 

How to Remove Yahoo Messenger 10 Ads

This is simple trick to remove the annoying Yahoo Messenger ads.

Download Ad Banner Remover Plus 1.0.4 here

Check all option






















then click "Apply Option" button






















This tool supports Yahoo Messenger version 9 and newest.


:)

Free Unlimited Bandwidth Hosting

Are you getting  trouble when looking for hosting with large bandwidth and space? especially the unlimited?
you could try hosting services from megsamillion

Features
    * Unlimited Disk Space
    * Unlimited Bandwidth
    * Unlimited Email
    * Backup Storage
    * Cpanel Control Panel
    * PPC Ads


you can use this hosting service to learn create a website if you don't have enough money to purchase the paid hosting, and certainly this hosting support Rapidleech :D

I've tried this hosting service, access speed is not too fast and using the old version of cpanel, but it's nod bad :D

Facebook Chatbar Addon for Mozilla Firefox



Chat on facebook has become one of the popular social network in the world, chat facilities allow us to chat in realtime with colleagues or friends who are online.

But do you know that facebook has hidden emoticons feature in his chat facility?, If not check this out. When you're done chatting, try adding the following emoticon symbols:

: D

facebook it will automatically turn it into an emoticon, now for your firefox browser user there is a way how to create emoticons in chat box box, do the following:
1. Install Facebook Chatbar addon, download here
2. Restart your firefox
3. Then you can chat easier with emoticon chatbar on facebook.

here the screenshot



:)

Free Rapidleech Server List ( Update November 2009 )



This is some working rapidleech server list, some of them are with premium megaupload, rapidshare,or hotfile

Premium Rapidleech
www.rapid8.com
http://coolleech.com/index.php
http://sv2.coolleech.com/index.php
http://sv3.coolleech.com/index.php
http://sv1.gopro4vn.com/mega
http://www.dhilip.co.uk/rapidleech/index.php?debug=1
http://emlaai.net/
http://www.obamastar.net/linhtinh/leech/
http://leech21.co.cc/
http://www.megaleech.eu/
http://downloadpremium.net/
http://milan.down2all.com/
http://www.fjordbits.com/tp1/
http://www.subearchivos.com/index.php?debug=1
http://mobi4free.co.cc/rapidleech/
http://artbr.info/rapidleech42/
http://bzm.ir/dl/index.php
http://www.itsjustfortoday.com/images/
http://infraredtools.com/foxgen/index.php
http://www.lech-nhocpro.com/leech/index2.php
http://mccallbrewery.com/index.php
http://www.turboleech.info/
http://vietleech.com/index.php
http://rsplg.com/ < for rapidshare
http://muplg.com/ megaupload




Non Premium Rapidleech
http://leech.giaothuy.com/
http://www.alrawnaq.net/rip/
http://mirographics.net/rapidleech/f....php?debug=1go
http://ceteoveloz.co.cc/sopraquempode/index.php?debug=1
http://tom.x-files.lv/R/
http://www.dleech.com/index.php
http://leechrl.co.cc/rapidleech/index.php
http://notderbypie.com/wp-admin/libs.php/index.php


Last checked 26 november 2009






Rapid Leech is a free server transfer script for use on various popular upload/download sites such as megaupload.com, Rapidshare.com and more than 45 others. The famous Rapidleech script transfers files from Rapidshare, Megaupload, Depositfiles.com, Easy-share.com, etc, via your fast servers connection speed and dumps the file on your server. You may then download these files from your server anytime later.
Rapidleech script has being used by more than 5 million users worldwide and has being installed on more than 2000 servers.

Trick Download Megaupload With No Premium account

This is the trick to download from megaupload.com without captchas or countdown timers and with full speed as premium member.





this is simple trick how to generate free megaupload link to premium

If you have a download link from megaupload like
http://www.megaupload.com/?d=F9XISOK0

then add mgr_dl.php after slash ( / ) like
http://www.megaupload.com/mgr_dl.php?d=F9XISOK0

copy that new link to your favorite download manager