The Content Provided on HackClarify are Only for Security Awareness & Educational Purposes Only, Hackclarify is Not Responsible for any Harm Done!
Place Your Ads Here By Requesting Using The Contact Form
Add to Google Reader or Homepage Add to Netvibes Add to Yahoo! Subscribe in NewsGator Online Add to My AOL

Macbook Thrashes Ultrabook Analysts Give Bad Numbers



The HP Envy 14 Spectre premium ultrabook starts around $1,399 directly from HP. PC markers don't fare well at all competing with Apple at the high end of the market, says an IDC analyst. The HP Envy 14 Spectre premium ultrabook starts around $1,399 directly from HP. PC markers don't fare well at all competing with Apple at the high end of the market, says an IDC analyst.
(Credit: Brooke Crothers)
Ultrabook numbers will fall far short of Intel's aggressive market share targets, an IDC analyst told CNET. The MacBook Air, meanwhile, continues to coast amid continued popularity.
An IDC report today showed a weak PC market caught in its seventh consecutive quarter of little to no growth.
"The volume isn't there and it's going to be way below what Intel had hoped for," IDC analyst Jay Chou told CNET, referring to ultrabooks.
"The first half [of 2012] is about 500,000 ultrabooks shipped worldwide. It's nowhere near Intel's initial hope," Chou said. Ultrabooks are thin, lightweight Windows laptops that compete with Apple's MacBook Air.
Apple MacBook Air.Apple MacBook Air.
(Credit: Apple)
Intel had said at the beginning of the year that ultrabooks could take 40 percent of the consumer laptop market.
"We might hit a million [ultrabooks] this year. The future really lies in 2013 and how well it jells with Windows 8," Chou added.
IDC expects about 225 million laptops to ship by the end of 2012. So, a million would be a tiny fraction of that market.
"The MacBook Air is a good part of Apple's business. It's had good growth," Chou said.
Unit shipments of Apple's MacBooks were up in the most recent reported quarter (Q2) to about 2.8 million (PDF) compared with 2.75 million in the same quarter last year.
Why the ultrabook shortfall? "A lot more models have to hit that $700 spot and they need a more lightweight and faster responding OS like Windows 8," according to Chou.
And it's hard to make inroads into a market that Apple practically invented. "They [Apple] really know how to magnify their strength. PCs typically out-spec them. But it's really just saying I have a bigger engine," which doesn't resonate with as many customers as before, he said.
Intel declined to comment.


Read More Add your Comment 0 Replies


Some Maintainence & Slow Development



 
It is That HackClarify will not post any content, for some days. This was because of the random amount of posts by me, which led to less amount of comments,subscriptions and shares.

We might also have to never post again in HackClarify for this reason.

All readers are being dedicated.

Well, at the time of the Break, HackClarify wants you to comment,share and subscribe.

People who will contribute to the site by sharing,Liking,commenting will be rewarded by Samin Yasar with tons of things Like , Cracked Content/Softwares , Hacking Tools, Un posted posts that will be posted in HackClarify later on and more VIA gmail account.

Plus: First Person with 100 comments will get Exclusive extra prizes. A whole Collection of Scripts and *SURPRISES*

Thank You.


Hope i get this done.

Regards,
Samin Yasar @hackclarify
Founder/Super Admin
Blogger
HackClarify


Read More Add your Comment 5 Replies


Windows 8 to come with Bult in Malware Protection



windows-8
Microsoft's next version of Windows will ship with "tons of security features," including one that automatically scans boot drives for malware and a revamped version of the Windows Defender antivirus program, company executives said.

At the company's BUILD conference in Anaheim, California on Tuesday, Corporate Vice President of Windows Planning and Ecosystem Michael Angiulo demonstrated an early version of Windows 8 that automatically scanned an infected USB drive used to boot the next generation operating system. Before the OS was able to load, the computer stopped the process and displayed a warning that the boot volume contained an "invalid signature" indicating it had been compromised.

He was able to get the valid version of Windows to load by turning off the system and turning it back on. The presentation starts around the 1:08 mark in the following video:



The technology making this possible is known as UEFI, short for Unified Extensible Firmware Interface. A successor to the BIOS ROM firmware that Microsoft operating systems have relied on since their beginning, UEFI was designed to shorten the time it takes a PC to start up. It was built by Intel, but is designed to work with a variety of CPU architectures.
"It's not just about speed and having a boot that looks better," Angiulo said during Tuesday's keynote, referring to UEFI. "It's about security, too."
Steven Sinofsky, president of Microsoft's Windows and Windows Live division, went on to say that Windows 8 developers "have taken Defender and we've actually built a whole new range of protection, all the way up though antimalware, antivirus." Users are free to run Defender or security software supplied by another company. In all, the new OS will offer "tons of security features," he added.

The company issued a statement Wednesday saying Windows 8 would include "low-level security features such as Secured Boot to help defeat classes of threats, and user facing features including Windows Defender and SmartScreen" spam-filtering. The statement didn't elaborate.

Windows 8 will also offer a new way to log on to PCs equipped with a touchscreen. Sam Bowne, a security instructor at San Francisco City College, provided a screenshot here that describes the feature this way: "You choose the picture – and the gestures you use with it – to create a password that's uniquely yours."

Bowne and his students have been testing the security features in the new Windows beta, according to a source.
"There is built in antivirus, and it works!" he wrote "It stopped not only thr EICAR test file, but more than a dozen malware items in Metasploit. So it might be time to sell your Symantec stock."


Read More Add your Comment 0 Replies


Custom Android ROM | Cyanogen Mod Review




cyanogen
Bought an Android smart phone and don't know the difference between a company modded ROM and a custom Rooted ROM. Well, I am here to let you get information on a custom ROM; maintained by team Cyanogen. It always depends on you that whether you use a custom ROM after rooting your android phone, Or else you are lazy enough to prefer a company modded ROM. Likely, I accept the fact that in company modded ROM some features may take the whole game i-e can be much good as compared to cyanogen, but if you are advanced user and like to customize the phone the way you want, then use cyanogen ROM. Let me explain some facts of this Good Modded ROM.

Customize-able ROM:

This ROM is much customize-able, you can do whatever you want with your phone, It comes pre-installed with ADW Launcher which works super fast with it, You can have a dock placed at the home screen, Can have a transparent Application drawer on clicking the menu button and can even have some transparent notification place. You can MOD the phone the way you want. If your phone has some LED lights, this cyanogen gives you the way to mode them too. You can change when those lights should function. Now you can think that all this can be done in Stock ROMS too, But surely that stock ROM gonna be slow after having installed ADW Laucnher, except that built in interface, but cyanogen doesn't slow down.
Home screen swap transition effects can be modified the way you like.

Super Fast:

Unlike those 500MB stock ROMS, this 100MB cyanogen, works like a charm, I first installed this in my HTC phone and when I swapped the home screen, and typed some text notes, I wondered its much faster than that stock ROM. If you are regular user of Stock ROM then after getting this custom ROM installed you will surely feel the speed differences.

Gestures For the Home Screen:

You can easily add some gestures for the home screen, Likely you can add any pattern and can link that pattern to the custom application which you want to be launched upon repeating the pattern at the locked screen, No need to unlock just make a custom pattern and make that pattern on the lock screen and WOA! That application linked blazes to come to screen and start working like charm.
To add a gesture just go to Settings>>CyanogenMod Settings>>LockScreen Gestures and add any application with the required gesture you build.
Gesture Cyanogen hackersthirst

Screen Rotation Extent:

You are able to rotate your screen using the sensor at any angle you need, Its the option under the CyanogenMod settings under Display and using the sensor you can get the required results, Like the screen can be rotated even at the home screen unlike stock Rom.

Sufficient Theme Repository:

Under the CyanogenMod there is absolutely sufficient theme repository. After getting the Mod installed just attach your Google account with your phone and then search the keyword "cm7 theme" and you are done there will be many themes for cm7 I am using cyanogenMod seven as the reference because latest stable release is at 7 version. Plus, in-order to get the skins for the launcher like your home screen and the application drawer cyanogen uses ADW Launcher and you can search at market (Google Play)for ADW skins, Keep searching on and you will get the good stuff.

Rooted ROM Advantage:

This ROM has full features to get advantage of the rooted phone, you can customize the phone the way you want and it can give you pretty results, I will show you in the next upcoming posts that how can you customize it better in a rooted way ;).

Permission Management:

Have you installed any application? and don't want that application to be spyware then cyanogen is the right choice for you, because you can revoke any application permission with your own desire, Just to have some more security this is the best feature, To enable this go to Setting>>CyanogenMod Settings>>Application Setting and Tick Permission Management. After that go to application management from your device and below the application management after opening specific application you can edit the permissions.
permission management android hackersthirst

Overclocking the CPU:

In cyanogenMod you can over-clock your cpu without using the third party application likesetcpu etc. You can easily setup the maximum and minimum CPU frequency and keep in mind that you may not set wrong values or much high which may be bad for your phone. Do some Google searches for your mobile to get the best values for your mobile. For this go to >> Setting >> CyanogenMod Settings and Performance.
This was just a review on my personal basis because I used this ROM and found it to be good. You should also share your views in the comments, Plus tweaks for Cyanogen ROM will be posted soon.


Read More Add your Comment 0 Replies


BanglaDos | Bangladesh DoS Attack Engine -Released!



Its been more than a few days i haven't posted , so all of you are quite waiting and frustrated , i tink so.
Please don't be mad i had some personal problems and got a lot of study in school. I got assignments as well as other stuff .

But i also dedicated a lot of my time for this new gift for you, i developed this Tool called BanglaDos aka Bangladesh Dos Attack Engine . It is a denial of service attacking tool, quite similar to LOIC and others.
I named it BanglaDos because its Bangladesh and DoS, ehm.. well you get the point right.
Its quite a useful tool hope you will love it.

If you want to know more read the "about" on the app.


Instruction Please read carefully:
  • Download the app from SourceForge or Mirror
  • Extract the files
  • Open BanglaDos.exe
  • Click continue Button
  • Type in your target
  • Start Attack!
Please share this app with everyone. It is a quite efficient tool. Its not flawless, but its good.
Be sure to check into HackClarify more.
I Think i'll make more apps and maybe also come witha BanglaDos 2.0.

Thank You!


Read More Add your Comment 3 Replies


How to Join Anonymous




 
Preface: So you want to join Anonymous?

You can not join Anonymous. Nobody can join Anonymous.
Anonymous is not an organization. It is not a club, a party or even a movement. There is no charter, no manifest, no membership fees. Anonymous has no leaders, no gurus, no ideologists. In fact, it does not even have a fixed ideology.

All we are is people who travel a short distance together - much like commuters who meet in a bus or tram: For a brief period of time we have the same route, share a common goal, purpose or dislike. And on this journey together, we may well change the world.

Nobody can speak for Anonymous. Nobody could say: you are in, or you are out. Do you still want to join Anonymous? Well, you are in if you want to.
How to get in contact with others?
Anonymous has no centralized infrastructure. We use existing facilities of the Internet, especially social networks, and we are ready to hop on to the next one if this one seems compromised, is under attack, or starts to bore us.

At the time of this writing, Facebook, Twitter and the IRC appear to host the most active congregations. But this may change at any time. Still, these are probably the best places to get started. Look for terms like "anonymous", "anonops" and other keywords that might be connected to our activities.

How do I recognize other Anonymous?
We come from all places of society: We are students, workers, clerks, unemployed; We are young or old, we wear smart clothes or rugs, we are hedonists, ascetics, joy riders or activists. We come from all races, countries and ethnicities. We are many.

We are your neighbours, your co-workers, your hairdressers, your bus drivers and your network administrators. We are the guy on the street with the suitcase and the girl in the bar you are trying to chat up. We are anonymous. Many of us like to wear Guy Fawkes masks on demonstrations. Some of us even show them in their profile pictures in social networks. That helps to recognize each other.

Have you been infiltrated?
If you talk to another Anonymous, you will never know who he is. He may be a hacker, cracker, phisher, agent, spy, provocateur - or just the guy from next door. Or his daughter. It is not illegal to be Anonymous. Nor is it illegal to wear Guy Fawkes masks. Keep that in mind. If you personally have not been involved in illegal activities, you have nothing to worry, no matter whom you talk to; If you have, it is wise not to talk about it. To no one.

How do I protect my privacy?
Invent an alias, a nick, a pseudonym ... call it as you will, just invent something. Then register a mail account in that name with one of the big mail providers. Use this email address to register your Twitter, Facebook, etc. accounts. Make sure to clear all cookies before you start using your new identity, or better use a different web browser for Anonymous than for your other activities.

If you have higher needs for security, ask us about encryption, steganography, TOR, etc. Many of us know how to use them.We will always respect your need for privacy. We will never ask for your personal information. If we do, we will not expect a truthful answer; And neither should you

What is the right thing to do?
The only person who can tell you what is right for you is yourself. This is also the only person you should follow. We have no leaders. You are also the only person responsible for your actions. Do what you think is right. Do not what you think is wrong.

How many Anonymous are there?
We are more than you think. We are more than anybody thinks. We are many.

And you are now one of us. Welcome to Anonymous.


Read More Add your Comment 1 Replies


SSL Broken by Hackers Used by Millions of Websites





Researchers discovered that the encryption that's supposed to protect us while surfing the web is totally exploitable by hackers with the necessary know-how.

Thai Duong and Juliano Rizzo plan to demonstrate a proof-of-concept code which will prove that SSL protocols are not as secure as everyone thought them to be.

The researchers claim that their Browser Exploit Against SSL/TLS code, or BEAST, will prove to the world that any cryptographic protocol before TLS 1.1 is vulnerable and can be deciphered fairly easily.

They will attempt to decode an authentication cookie used to log-in to a PayPal account, fact which will diminish the world's faith in one of the foundation blocks of internet security.

Even though later protocols, such as the TLS 1.1 and 1.2 don't present the same weakness, these versions are yet to be implemented into websites and browser applications, which means that most popular websites are unprotected.

The algorithm was laid down in the form of a JavaScript that intercepts encrypted cookies transferred by websites during the authentication process.

“BEAST is different than most published attacks against HTTPS,” stated Duong.

“While other attacks focus on the authenticity property of SSL, BEAST attacks the confidentiality of the protocol. As far as we know, BEAST implements the first attack that actually decrypts HTTPS requests.”

What up until now has been considered to be more of a theoretical weakness has now become something real that puts us all in peril. BEAST is supposed to decrypt the authentication cookie used to access a PayPal account in 10 minutes, which is far less than anyone would expect.

So why don't website and browser developers do something about it, especially since TLS 1.1 is available since 2006?

In order to efficiently update all the security protocols, the process would have to be done by all the major players at once, otherwise, whenever a fix is attempted, incompatibilities will prevent applications that rely on the old system to work.

Out of all the browsers currently available, only Opera implements TLS 1.2 by default, while in Internet Explorer the technology is there, but lies dormant, waiting to be manually activated.

Google Chrome and Mozilla Firefox seem to be the last in this race as they seem to be waiting for each other to start the implementation.


Read More Add your Comment 0 Replies


List Of Indian Sites Hacked by Bangladesh | Cyber War



 Well the war continues & i came up with the list of Sites Hacked by Bangladesh!!
Well just for a few people "I AM A BANGLADESHI" i'll hack you down if you go on fussing up with my country!!




heres the list & i know you Skiddy Indians are gonna Lose!!


http://www.mit.gov.in/
http://sodhisaab.in/
http://mr-khan.com/
http://badtube.in/
http://myh.myhostingbox.com/
http://fuckstyle.in/
http://www.ravisandhu.in/
http://sebi.gov.in/index.php
http://naughtypunjab.com/
http://sex2050.in/
http://apit.ap.gov.in/
http://mea.gov.in/
http://www.tec.gov.in/
http://cmet.gov.in/
http://mpcb.gov.in/
http://indiagovernance.gov.in/
http://www.sebi.gov.in/
http://www.nationallibrary.gov.in/
http://myh.myhostingbox.com/
http://highcourtchd.gov.in/
http://anniyan.in/
http://9th-direction.com/
http://devils2k.9th-direction.com/
http://jaggybala.9th-direction.com/
http://kayavur.9th-direction.com/
http://ohm-raji.9th-direction.com/
http://rememberingsuresh.9th-direction.com/
http://selvandraprasad.9th-direction.com/
http://kayavur.com/
http://ohm-raji.com/
http://rememberingsuresh.com/
http://selvandraprasad.com/
http://ofb.gov.in/
http://www.kerala.gov.in/
http://www.djtadka.in/index.html
http://passport.gov.in/
http://musictub.com/
http://www.iirs.gov.in/
http://www.cci.gov.in/
http://www.hdmc.gov.in/
http://musictub.com/
http://www.business.gov.in/
http://musicfm.co.in/
http://musicx.in/
http://newjatt.com/
http://punjabimob.com/index.html
http://rdxtop.com/
http://waptadka.com/
http://civilsupplieskerala.gov.in/
http://www.minorityaffairs.gov.in/
http://www.nccptrai.gov.in/
http://www.wii.gov.in/
http://thetuliptouch.in/
http://wefindyourfreelancer.com/
http://9bricks.in/
http://aakash.bytegrafix.in/
http://acumenhr.in/
http://agarbattibazar.com/
http://al-miraaj.co.uk/
http://arunchaudhari.com/
http://arwa.bytegrafix.in/
http://balajinursery.com/
http://balanceworkout.in/
http://bytegrafix.co.in/
http://www.biblechild.com/
http://www.booklager.com/
http://www.businesscues.com/
http://mr-khan.com/
http://musictub.com/
http://mobhot.com/
http://punjabimasti.in/
http://fonesong.com/
http://sendtop.com/
http://nightmasti.com/
http://aakash.bytegrafix.in/
http://acumenhr.in/
http://agarbattibazar.com/
http://apclindia.co.in/
http://arunchaudhari.com/
http://arwa.bytegrafix.in/
http://atm4u.in/
http://balajinursery.com/
http://balajinursery.com/
http://balanceworkout.in/
http://bhandarkargroup.com/
http://bytegrafix.co.in/
http://bytegrafix.in/
http://bytegrafix.net/
http://bytetech.in/
http://bytetechnologies.in/
http://bytetechnologies.net/
http://chiragsolar.net/
http://deepakpetrochem.com/
http://deltascientific.in/
http://dtone.co.in/
http://dwarkadhisjinihaveli.org/
http://e360paisavasool.com/
http://earthpestcontrol.co.in/
http://eshoppe2500.com/
http://exercoreengineering.com/
http://famefactormagazine.com/
http://gewbellows.com/
http://gmmodular.com/
http://graffititools.net/
http://grindlygases.com/
http://hasu.bytegrafix.net/
http://healthandwealthinvestments.com/
http://hostbyte.co.in/
http://hostbyte.in/
http://hotbite.in/
http://imperialpaversandblocks.com/
http://in-house.co.in/
http://inhousecommunications.net/
http://iphoned.bytetech.in/
http://java.bytegrafix.in/
http://jhaverisec.net/
http://jobsite.theitbazar.com/
http://justtiles.in/
http://ketal.bytegrafix.in/
http://krishnashray.in/
http://leadimporter.co.in/
http://learnkathak.com/
http://maab.co.in/
http://wefindyourfreelancer.co.in/
http://buddycrowd.com/
http://wefindyourfreelancer.com/
http://maargdarshan.com/
http://mastikipaathshaala.com/
http://mechtechmachines.in/
http://microquick.co.in/
http://mnrcompany.com/
http://mohanlaltea.com/
http://myparadisenetwork.com/
http://neelkanthmotels.com/
http://nikesh.in/
http://pastiwala.com/
http://petalsgroup.net/
http://placeyou.in/
http://princedancecompany.com/
http://promobizevents.com/
http://psdtojoomla.co.in/
http://purnn.co.in/
http://rtepl.com/
http://rti-vadodara.com/
http://rutu.info/
http://sakshamconsultancy.com/
http://sayajisamachar.com/
http://scopeenterprise.com/
http://sfxtrade.com/
http://shahexpansionjoint.com/
http://shahmarble.com/
http://shivamevents.com/
http://shreejimatrimony.com/
http://shreejiplacement.com/
http://shubharpan.com/
http://smsxpress.in/
http://sonusign.com/
http://spacerealty.in/
http://sudhalkareyehospital.com/
http://syndicatesales.net/
http://talentsolutions.org/
http://teratechnolabs.com/
http://thehajjexperience.com/
http://theitbazar.com/
http://thekesarmango.com/
http://thetuliptouch.in/
http://tzoneacrobatsent.com/
http://umiyafarmandnursery.com/
http://vhealthcare.org/
http://vidhipublication.com/
http://weareyourcoder.co.in/
http://kcspizzanj.com/
http://letsintroduce.in/
http://rtmlzone.com/
http://petesmorristown.com/
http://webwurkstest.net/
http://westerndanceacademy.com/
http://yourautodeal.com/
http://i-techy.com/
http://aarkayprinters.com/
http://adtconsultants.com/
http://ad-wiser.in/
http://allied-fs.in/
http://amplesgroup.com/
http://amplindia.com/
http://apexconstco.com/
http://ardourconsulting.com/
http://avivafibretech.com/
http://a2zcall.com/
http://a2zcall.in/
http://bdsgroup.in/
http://bestcoloringpages.com/
http://bharatshipping.com/
http://bookmyconference.net/
http://bwsolutions.co.in/
http://carrybagindia.com/
http://cfiindia.com/
http://cgold.co.in/
http://chutneyseuston.co.uk/
http://classiclightingsolutions.com/
http://classicoutdoors.co.in/
http://clubblueeyes.com/
http://coolflowcoolingtowers.in/
http://corporatesolutionsindia.co.in/
http://cosmolinguaworld.com/
http://cplpanel.com/
http://cricketwatzup.com/
http://crowngaskets.com/
http://dakshexim.com/
http://dbsinfosoft.co.uk/
http://dbsinfosoft.com/
http://dbstechy.co.uk/
http://dbstechy.eu/
http://dbstechy.com/
http://delhirajyabrahminsabha.com/
http://diegocomputers.com/
http://digiair.in/
http://dogbuysale.com/
http://downtownonline.in/
http://dpcsindia.com/
http://electricalproductsindia.com/
http://energymnutritions.com/
http://esdisoftwaremall.com/
http://evershineshell.com/
http://fashionstudio.co.in/
http://fastech.co.in/
http://fgasupplements.com/
http://futuretechnosystems.com/
http://futuretechnolgy.com/
http://gdcargocare.com/
http://goelconsultancyservices.com/
http://graphicsworld.co.in/
http://gsmgmusic.com/
http://gulfrecruitments.com/
http://gurgaonpropertiesonline.in/
http://hansfabindia.in/
http://hariomsecurities.com/
http://igeniuess.com/
http://imperialcapvest.com/
http://innovationfashions.com/
http://i-techy.co.uk/
http://jevica.com/
http://jsbmlogistics.com/
http://kansil.in/
http://karamengg.com/
http://kaystendertouch.com/
http://kriverengineering.com/
http://ledemergencylightingsolutions.com/
http://ledlightingsolutions.in/
http://locumprime.co.uk/
http://mangalamtourism.com/
http://midnightexpo.com/
http://myhostingbox.com/
http://nationalwalktech.com/
http://newwavetraining.org/
http://nidhienterprises.asia/
http://noeticsoft.co.uk/
http://omsaitravels.org/
http://originbuildwell.com/
http://pastrypalace.in/
http://phteindia.com/
http://polkasnacks.com/
http://powergridsystems.in/
http://primeavianfeeds.com/
http://princeindustries.co.in/
http://priyankafoodcorporation.com/
http://ramjiglobalgroup.com/
http://ranvirart.com/
http://realinfratel.com/
http://reallynatural.in/
http://realwifi.in/
http://redribbon.co.in/
http://riprc.in/
http://rohanprince.com/
http://safe-india.com/
http://sansarwhite.com/
http://sarvottaminternational.com/
http://selectiveeducation.com/
http://sidonecorp.com/
http://skcommercials.com/
http://soft-technology.co.uk/
http://spectraconsulting.in/
http://spiceofindiawhitton.co.uk/
http://stylexpo.in/
http://supremeglow.in/
http://techy-global.com/
http://techyglobal.us/
http://theinfinitelimit.com/
http://thenetinfo.com/
http://trehanestates.in/
http://tuneer.com/
http://vrindagolfacademy.com/
http://webdesignsolutionsdelhi.com/
http://websitedesigningcompany.us/
http://yamon.us/
http://au.bestcoloringpages.com/
http://br.bestcoloringpages.com/
http://ca.bestcoloringpages.com/
http://id.bestcoloringpages.com/
http://pk.bestcoloringpages.com/
http://sa.bestcoloringpages.com/
http://th.bestcoloringpages.com/
http://uk.bestcoloringpages.com/
http://email.dbsinfosoft.com/
http://new.dbsinfosoft.com/
http://prerna.dbsinfosoft.com/
http://sms.dbsinfosoft.com/
http://mcafee.diegocomputers.com/
http://new.myhostingbox.com/
http://one.myhostingbox.com/
http://consultant.ramjiglobalgroup.com/
http://dataoperation.ramjiglobalgroup.com/
http://educonsultant.ramjiglobalgroup.com/
http://insurance.ramjiglobalgroup.com/
http://media.ramjiglobalgroup.com/
http://realestate.ramjiglobalgroup.com/
http://srgi.ramjiglobalgroup.com/
http://telecom.ramjiglobalgroup.com/
http://dir.webdesignsolutionsdelhi.com/
http://directory.webdesignsolutionsdelhi.com/
http://indianmailbox.com/
http://i-techy.com/
http://indianmailbox.com/
http://kuverproducts.com/
http://fabtechsoutions.com/
http://saltz.in/
http://fabtechsolution.com/
http://sexfull.in/
http://marigold.in/
http://tender.lsgkerala.gov.in/pages/displayTender.php?s=WCRTESTINPUT000000%3C%3E%3C%3EHACKED+by+BCA
http://www.rrbmumbai.gov.in/
http://www.indianrailways.gov.in/
http://www.travelmaxx.in/
http://www.jntu.ac.in/
http://idealimages.in/
http://www.wii.gov.in/
http://www.keralacm.gov.in/
http://www.viit.ac.in/
http://www.naac.gov.in/
http://www.coolcareersit.com/
http://www.dealsvilla.com/
http://www.e4ad.com/
http://www.grouphomedeal.com/
http://www.foodtang.com/
http://www.havewemet.com/
http://www.humanrightsorganization.asia/
http://www.indiatraveliq.com/
http://www.karnatakarfoassociation.in/
http://www.katbee.com/
http://www.mastersinnifty.com/
http://www.mirraworld.com/index.php
http://www.nangubaba.com/
http://www.peninsulayouth.org/
http://www.percaluae.com/
http://www.pharmedlimited.com/
http://www.protechengineers.in/
http://www.raanan.in/
http://www.recycletradeindia.com/
http://www.reesize.com/
http://www.rtalentcentral.com/
http://thetuliptouch.in/
http://wefindyourfreelancer.com/
http://9bricks.in/
http://aakash.bytegrafix.in/
http://acumenhr.in/
http://agarbattibazar.com/
http://al-miraaj.co.uk/
http://arunchaudhari.com/
http://arwa.bytegrafix.in/
http://balajinursery.com/
http://balanceworkout.in/
http://bytegrafix.co.in/
http://www.biblechild.com/
http://www.booklager.com/
http://www.businesscues.com/
http://mr-khan.com/
http://musictub.com/
http://mobhot.com/
http://punjabimasti.in/
http://fonesong.com/
http://sendtop.com/
http://nightmasti.com/
http://www.coastaljewelofgoa.com/
http://xbrliant.in/
http://www.bsf.gov.in/




Read More Add your Comment 1 Replies


Cyber War Bangladesh & India | Part-1



If the answer to this question, we first have to be samparake hacker group. BD Black Hat Hacker's name come first in a group. The founder of this group is the name of a young black munalaita burn. This group is to create a cyber army purabe He was a member of Bangladesh. And the Bangladesh Army, a group of cyber Ethical Hacker MPs from all groups. This group of black burn munalaita nitimala bahiskrita me to break the group, and a black hat hacker named BD in a an ethical hacker groups. Some days ago, he's on some website and destroy. The official website and there was a lot. Bangladesh army after the Demolition of the non-stop destruction of his own website. After that he began and where he was in the Indian website diphesa hatyake issue of the border.


 In a few cases he is able to destroy the Indian poor website. The results of the Indian cyber phorasa (which is known as indisela) with Bangladesh Army and Bangladesh cyber war, cyber army wonder they do not talk it down. Last Wednesday, a day after the government's website hacked by some of the most important and the data it phasa. But ... they are all on the first patai "Hind's" word and writes it to the Bangladesh Business armike ahabbana war. And after the war, and in this case, the Bangladesh Army, Bangladesh, Cyber ​​Hacker of all food groups from the counter-attack is carried out together. This group is replaced by the group  "3xp1r3 Cyber ​​Army" and "aluminiyama Cyber ​​Army". In it, they realized that they kadhe Kadha "operations in" the name was called. And as a result of more than 10,000 in one night, they can occupy themselves in the Indian websites.
Cyber ​​war and see its goals soon.. [there will be an Part 2 link in this post]



Read More Add your Comment 1 Replies


Hackers Plan To Launch Sattelite to bypass SOPA



 

The term hacker can be used to mean a several understandings amongst them there are two major’s one which include “positivity” and the “negativity”. The hackers on facing the internet ban from the United states as a result of SOPA (Stop Online Piracy Act) have made a plan to launch there own satellite in the space for providing an internet which may be free from all kinds of bans and restrictions. This group of hackers belong to Germany.

What is this Plan and How is this Satellite going to work?

The plan majorly includes on launching a single satellite in the space and which will be a low orbit satellite. That will surely work under the solar power as per the satellite general rule of operation and will communicate with ground stations to make a network. This network will operate like a GPS system and will be called as “Hackerspace Global Grid (HGG)”. When any station will be under the satellite range then it will take the signals and will direct it to the other stations also and a user can gain permanent access to the network. This theory seems to be applied but there are certain hurdles in the plan and which needs to be resolved first.

Some Major Basic Hurdles:-

As we know that with the advancement of the technology we all are able to travel in the space and are able to send the satellites in the orbit of earth using rockets. But still this technology is hell costly also. Plus! There are no vital rules for the space like in case of earth and no single country can govern the space so anyone can make this satellite to stop work without any specific legal permission.
In order to make it a geo synchronous the radius of the orbit will surely get decreased and it will move in a fast manner and for the HGG project this distance seems to be large for the signals to be transmitted with a 100% quality aspect.

So what’s next with this HGG project?

The team is still moving forward to make this possible and its deciding to make the ground stations. If you are fascinated with this project and want such a network for the world them go here: Constellation to join this project. A project joined by HGG for collaboration.


Read More Add your Comment 0 Replies



 
Supported/Suggested Browsers for our site
Fight Spam! Click Here!

Don't Copy Articles

Protected by Copyscape Plagiarism Detector
DMCA Protected

Expand HackClarify

Hacking Tips & Tricks

If HackClarify articles have helped you in learning then copy code below and give a small place to this image in your blog or website:

Attribution

Creative Commons LicenseThis work is licensed under a Creative Commons Attribution-NoDerivs 3.0 Unported License. Dont Copy or Reproduce Articles.

© 2012 | Founded & Maintained by Samin Yasar | All Rights Reserved