Twitter hacked by Iranian Cyber Army

Iranian Cyber Army claims to control and manage internet by their power by wiping out Twitter Thursday

Paige Maynard







Around 10 p.m. Thursday evening, Twitter users logged in to the Web site to find an unusual message from the Iranian Cyber Army claiming that they, not the U.S., controlled and managed the internet.
Techcrunch has the full message, if you want to read the bizarre rantings of the ICA.
The Iranian Cyber Army apparently not only hacked in to Twitter, but also Mowjcamp. The company updated its status blog after the hack saying, “Twitter’s DNS records were temporarily compromised but have now been fixed. We are looking into the underlying cause and will update with more information soon.”
Twitter managed to get back up, but the other Web site is still affected. The microblogging service issued a warning to all their users saying that if you use the same password for your Twitter as you do with other websites, now may be a good time to change it.
So why did the Iranian Cyber Army target Twitter? Let’s let TechCrunch take over:
“There is a history between Iran and Twitter. It was well noted and covered in the media that Twitter was used as a tool during the Iranian election protests. The US government actually intervened to assure that Twitter was available to the protesters in Tehran and around the country. This attack may be an act of reprisal from groups who were not happy with the role that Twitter played during the protests.”.
Not to mention the fact that the Internet helped spread footage of protester Neda Agha-Soltan being shot and killed, an event which helped mobilize Iranian election protesters.
With the maneuver of the Iranian Cyber Army, Twitter finds itself once again being no stranger to hacking. Nearly two months ago their web servers were misconfigured to reveal internal network information. And let’s not forget about french man Hacker Croll stealing over 300 confidential Twitter documents and sending them to various websites to publish.
It is unclear who the Iranian Cyber Army is at this time or if they are actually the responsible party behind this Twitter hacking.
So it seems like Twitter still has some kinks to work out when it comes to protecting their databases and passwords. May we suggest calling up Mark Zuckerberg? He claims to know a thing or two about privacy settings. 

How to Remove Kido / Conficker / Downadup / Downup Worm?


[Image: virus-conficker.jpg]
Symptoms to check if your computer is infected with this:

* Show all hidden files and folders are not working
* Can’t access anti-virus websites like: Bitdefender.com Symantec.com, and patch sites like Microsoft.
* The existence of a file named: jwgkvsq.vmx inside the RECYCLED folder.
* Creates autorun.inf files on USB devices plugged in an infected machine. Also other viruses does this.
* Account lockout policies being reset automatically.
* Certain Microsoft Windows services such as Automatic Updates, Background Intelligent Transfer Service (BITS), Windows Defender and Error Reporting Services are automatically disabled.
* Domain controllers respond slowly to client requests.
* System network gets unusually congested. This can be checked with network traffic chart on Windows Task Manager.
* Launches a brute force dictionary attack against administrator passwords to help it spread through ADMIN$ shares, making choice of sensible passwords advisable.

Remove the virus:
Some of the well-known security companies came up with tools for removing the Conficker/Downandup worm virus. Removal tools can be freely downloaded from any of the following security sites:

* Microsoft
* BitDefender
* ESET
* Symantec
* Sophos
* Kaspersky
* McAfee Anti-virus with updated detections can remove this by scanning your system.
* AVG can also remove it via system scan, if you have it installed and updated.

How to remove the Conficker/Downandup worm virus?

1. Download Conficker/Downandup removal tools from the given sites above.
2. Disconnect from the internet, and remove any network cables at the back of your PC/laptop, and also remove any plugged-in USB devices.
3. Login as Administrator on your computer, or any account that has administrator privileges.
4. Run the removal tool. My recommendation is to use the removal tools from BitDefender (quick scan) and Symantec (thorough scan). But if you are not content, just run all the removal tools for greater detection.Simple-case: The removal tool will detect and remove the Conficker worm and ‘may’ require that you restart your computer.
Extreme-case: The removal tool won’t run because the virus is preventing it from running. Quick solution:
1. Open task manager (CTRL+ATL+DEL)
2. Terminate (End) the process with these names: explorer.exe and svchost.exe
3. A countdown timer will appear requiring you to restart your computer. DO NOT DO ANYTHING AT THIS POINT EXCEPT… Immediately run the BitDefender Tool (quick scan) so that it will remove the virus before your computer restarts.
4. If the tool won’t still run, ‘end process’ all the svchost.exe and try running the removal tool again.

It only affects Windows system that aren’t patched with the latest update. Run autoupdate and patch your Windows. It is critical that these patches be installed:
Microsoft Security Bulletin MS08-067 – Critical
Vulnerability in Server Service Could Allow Remote Code Execution (958644)
http://www.microsoft.com/technet/securit...8-067.mspx (download for XP)
Microsoft Security Bulletin MS08-068 – Important
Vulnerability in SMB Could Allow Remote Code Execution (957097)
http://www.microsoft.com/technet/securit...8-068.mspx (download for XP)
Microsoft Security Bulletin MS09-001 – Critical
Vulnerabilities in SMB Could Allow Remote Code Execution (958687)
http://www.microsoft.com/technet/securit...9-001.mspx (download for XP)
For manual download of patches for Windows XP and Vista go to http://www.softwarepatch.com/windows/

How To Kill Unresponsive Programs without The Task Manager

Windows is generally not known for its stability. Among other things there are frequent “Not Responding” applications. The reasons may vary from less RAM to Viruses to poorly designed applications. So what do you do when an application hangs up?

I bet you hit Ctrl+Alt+Del or fire up the task manager in some other way, reach for the application and choose “End Task”. Now there is nothing wrong with this approach, in fact as long as it gets the job done it doesn’t matter how you do it. However, ever had the situation where the task manager itself takes ages to load up? Of course it can happen because task manager does a lot of other things besides just ending tasks so it requires that much more resources. Apart from that, how about ending the hung applications with just a single click?
Yeah! you can do so. Its simple to achieve. Just follow along:

* Right click on the desktop and choose New > Shortcut

[Image: newtkl.png]

* In the dialog box that appears just type the following:
taskkill.exe /f /fi “status eq not responding”

[Image: locationtkl.png]

* Give it a name of your choice

[Image: nametkl.png]

* Now just wait for something to start “Not Responding” and let loose your Task Killer!
So what did we do exactly? We just created a shortcut to run a command. The command being taskkill. Whenever you double click the shortcut you will invoke the said command which takes care of the rest. In particular the command we use says that kill all taskes whose status is equal to “not responding” and kill them forcefully (/f).

The /fi switch is used to filter and pinpoint the application to kill. We are using the Program’s status to filter the applications that are not responding and then kill them. You can filter(and thus kill) by memory usage (equal to, greater than, less than or not equal to), cpu time, window title and others.
[Image: filtertkl.png]

YMS Status Changer - Displays the current song information (flexible formatting& effects) in the Yahoo! Messenger status.



This General Purpose Plugin can change the Yahoo! Messenger status text with the current playing song information, such as the title, artist, song name, or playlist entry number. Here are some features:
- flexible text formatting;
- global hotkeys support;
- customizable behavior (e.g. not to change the status while invisible, etc.)
- special effects with the status text :)
- no ads or any unsolicited text in the status! - it's your plugin and you can put any text you want there
...and much more.


Download YMS Status Changer here

Overclock using multiplier



Previously been discussed about how to shape the relationship between the FSB with the memory. After discovering the relationship the two, then we can do overclocking on the processor.

With easy detikINET 'interesting' Intel Core i7 965 from the standard speed of 3.2 GHz to 4GHz just by raising the FSB speed, it was because the cooling is limited by the processor is still the standard.

It is true Intel Core i7 965 already has very adequate speed to run even the heaviest application. High speed is certainly not immune from the multiplier is also owned. What is a Multiplier?

Muliplier is a ratio between the processor's internal clock with the external clock, Itupun ratio can be changed to determine the processor speed. For example, the Intel Core i7 965 has a multiplier 24 with 133MHz FSB. This means that the processor has a default speed of 133MHz = 24 x 3192 MHz or equal to 3.2 GHz.

But keep in mind that not all processors have a multiplier that can be raised (unlocked multiplier), in fact most of the processors in circulation now can only be derived Multipliernya (Multiplier Lock).

Increasing the number of multiplier overclocking is a very safe thing to do, because the changes would not affect skyrocketing FSB speed or memory.

With the right combination of FSB speed, memory and the number of multiplier, then the overclockers will find the optimal processor speed.

So what just leave it at that? of course not.

If the combination is still considered missing, the user can still increase the amount of voltage. There are two types of voltage in the computer, vCore, is the name for the processor voltage and voltage to vDIMM term memory. However, increasing the amount of voltage has a risk of a much larger increase compared to the multiplier or FSB.

Voltage raised solely to be done if the system does not go well due to excessive overclocking.

In conclusion, to perform overclocking is not a difficult case, but still a risk that can cause damage to the hardware.

Moreover, the computer vendors do not provide warranty for damage caused by overclocking, really a nightmare if that happened.

It certainly could be prevented if the user does not overclock too much, which means that the computer remain stable, the temperature is not excessive or an increase in speed is not far adrift from its original state

5 Tips Avoid Tired Eyes in Front of Monitor





Some of us would have the habit of working for long in front of the PC monitor, either to work or doing other things like playing games and browsing. As a result the effects of eye fatigue and headache was inevitable.
While many consider this fact not entirely true, but in reality it is still affecting the health of our eyes. The effect we sometimes a little difficult to focus the object of view, and so on. This of course caused a radiation monitor for too long when we work.
As quoted from Softpedia, Monday (14/9/2009) The following are some tips to avoid eyestrain, while in front of the monitor:
1. Keep your distance from the monitor view.
Being too close to the monitor is a bit dangerous for our eyes. We should maintain visibility into our monitors well. The recommended distance is about 20-40 inches (50-100cm) from the eye.
If we still difficult to read when the monitor was located at a distance of 20 inches, try to enlarge the font you until we feel comfortable.

2. Get rid of CRT, LCD Switch to
Monitor tube (CRT) does give a worse effect than the LCD, but the energy required is also greater. Try to replace our CRT monitors with LCD.
But the price of LCD monitors are more expensive than CRT. For those of us who still menyeyangi CRT monitors, it's good we buy anti-radiation filters. This is the solution to reduce pain from the eyes linger in front of the monitor, but with the cheap price.

3. Adjust monitor settings
Some current monitor provides many pre-set display modes, to facilitate users to change their screen settings. Pre-set these settings to give brightnes different levels, to adjust the monitor usage conditions. Sometimes use it.
For example setting like, 'text' or 'internet' will feel much cooler in the eyes, when we use for typing or browsing. Settings 'game' or 'movie' will look much brighter when in use.

4. Use anti-radiation glasses
Although it costs a relatively more expensive, but it's good to have enough money when we buy anti-radiation glasses. In addition you can take them wherever we work, these glasses are not only useful when we work in front of the monitor, namuna also protect the eye from the car light, radiation, TV, and so on.
In fact the anti-radiation coating on the glasses, very useful for our eyes. Because the layer automatically reduces the effects of pain in the eyes of radiation due to excessive light.

5. Rest his eyes for a moment, on a regular basis

The easiest way to avoid eye fatigue due to radiation monitor is periodically mengistirahatkannya. Try to rest my eyes for about 5 minutes every hour. We can use the time to 5 minutes walk, see the sights, washed her face and so on. The important thing away from the monitor.

Tricks to fend off junk Email Senders




Junk email, aka spam is hard muted, especially if the email that we use do not use a filter spam filter. Inevitably, the ads brought gelontoran unwanted messages are going mensesaki our inbox.

Here are some tricks that can be done to ward off invasion recommended Symantec's email:
 
Who should do:


  • Unsubscribe from legitimate mailing-list if you do not want to receive messages again. When registering to receive email, check out additional items whatever you want at the same time. Do not select the items you want.
  • Selective in terms of sites where you register your email address.
  • Avoid displaying your email address on the Internet. Consider alternative options-for example, use a separate address when registering at a particular mailing list, have several email addresses for many different purposes, or look for a disposable email service.
  • By using the instructions provided by the administrator, report spam if you have the option to do so.
  • Delete all spam
  • Avoid clicking on suspicious links in emails or IM messages, because it could be connected to a fake site. We recommend to type a website address directly in the browser rather than trust the link in the message.
  • Ensure that the operating system up to date, and use security software packages are comprehensive.
  • Consider the anti-spam solution that has a good reputation for handling filtering throughout your organization. 


 Who should not do:


  • Opening an email attachment from an unknown. This appendix can infect your computer.
  • Replying to spam. Usually forged email address, and reply to email spam will result in another spam spam.
  • Fill out the form in a message requesting personal or financial information or passwords (passwords). Leading companies can not ask for your personal information via email. If you hesitate to contact the company through a trusted independent mechanism, such as by verifying the phone number or Internet address is known that you type into a new browser window (do not click on or cut and paste the link in the message).
  • Buying products or services from spam messages.
  • Open the spam message.
  • Forward any virus warnings you receive by email. It could be a lie that is the news (hoaxes).

Rapidleech Server List Update 10 December 2009







I've updated premium rapidleech server list for you..
http://sv3.giotle.biz/leech/ User/Pass: GLG/GLG
http://sv2.giotle.biz/leech/ User/Pass: GLG/GLG
http://megapid.com only Mega
http://sv1.giotle.biz/leech/ User/Pass: GLG/GLG
http://starbright-promotions.com/leech/ User/Pass: GLG:GLG
http://a2th.com/getlink/ User/Pass: ndtn/uds
http://dlking.info/rl/
http://intercambiando.co.cc/
http://www.hlusoe.info/
http://trungkien.us/load/
http://downloadpremium.net/
http://jleech.com/
http://www.jidox.com/
http://www.ngising.net/
http://www.rapid8.com/
http://rapidhard.pl/