Wednesday, December 30, 2009

,

Your Mobile Is In Danger : Karsten Nohl Cracks GSM Mobiles Security Algorithm

Karsten Nohl, A Germen Hacker have claimed that he have successfully cracked the GSM mobiles security algorithm. Which can effect the whole world even your moblie.

 Karsten_1_high_res_1

I know what you might be thinking till now and its all true. Nohl was not alone in this whole arena of finding the vulnerability in the GSM phones. He was with another 24 friends teamed up to crack the worlds most used mobile security algorithm.

 

GSM security algorithm is based on the such a frequesny that it changes it signals from one tower to another in seconds and then transfers the signals to the other frequency station. Yeah, I know its pretty complicated stuff there.

 

Nohl claims that armed with the code, which has been published online, and a laptop with two network cards, an eavesdropper could be recording phone calls within 15 minutes...

We also have live numbers of Victims !

 

Nohl : "This shows that existing GSM security is inadequate"

Tuesday, December 29, 2009

,

WinScanX : A Simple, Fast and Portable Windows Auditing Tool

WinScanX is a state-of-the-art Windows auditing tool designed to help you get your Windows audit done quickly. It's easy to use and no installation is required.

 

WinScanX was released recently and its the one of the best resource released in 2009 . Its Fast, Simple, Portable and efficient tool for every security professional out there. Its really pa state of art tool.

 

1

 

WindScanX is released in two versions, one which is free to download and use and have some features in it which includes the GUI Front-End, Command-Line Interface, Easy-to-Use Reporting, Online Documentation etc and the other PRO version includes these and Quick Domain Audit, Multi-Host Scanning.

 

  Download WinScanX here                                         WinScanX ScreenShot Here

 

Windows Audit was created by Reed Arvin in order to provide the audit and security community with tools that are efficient and easy-to-use. These tools are designed to help minimize the time it takes to gather data in a security assessment so that more time can be spent doing what the computer cannot; analyzing the data to provide solid recommendations for identified security issues...

,

Total Round Up For "Top 10 Sexy Hackers of 2009"

Well many of the guys have already guessed and made the list of the sexiest hackers in the world and i also know i am pretty late in this news but i know what made this more special is that many were satisfied and many infosec geeks wasn't. So i just thought to top-10-listmake a whole roundup of the lists.

 

1. Violet Blue’s list of the Top 10 Sexy Geeks.

2. Michael Dahn's list of Top 10 Sexy Infosec Geeks of 2009.

 

The long hour discussion nearly took down twitter for about an hour. Surely i wasn't in the list :( and see you should i always respect your seniors decisions and that's what i am doing.

 

People Who Made The Hackers Choices :

20.  Tammer Saleh

19.  Crystal Williams

18.  Brady Forrest

17.  Amanda Coolong

16Sirus...

Saturday, December 26, 2009

Christmas Present For Hackers [Pic]

This is just a nice Christmas present that my friend ophelia want this Christmas. May she get this gift. I was just thinking what if Santa Clause was a hacker. Ok Get the Santa here !! :DChristmas Present For Hackers [Pic]

Happy Christmas @hackerthedude

Image Credit : ophelia

,

Net Wars : New Challenge For Hackers [Video]

Net Wars are a new talent hunt for hackers that are good in hacking field and if they win Darth_Vader-3d-2they are given a job of ethical hacking. or if they not they can even get a handful of contacts and goodies too.

 

Some days ago CNN covered the story of this challenge which is currently taking place in U.S. These challenges are taken under by SANS : The most trusted source for computer security... Ya we all know the big SANS. if u dont know who are sans, its a organization of high end ethical hacking teachers and they provide some qualifications in US for ethical Hacking...

The United States Cyber Challenge

A national competition and talent search to find and develop 10,000 cyber security specialists to help the United States regain the lead in cyberspace [ 5/8/09 ].


The web pages for the US Cyber Challenge will be posted on May 29 at www.sans.org/uscc and at other sites. To learn more about the program prior to May 29, email USCC@sans.org


1.The Need
2.The Competition and Skills Programs
3.The Sponsorship...

Thursday, December 24, 2009

,

FBI Is Watching You : Now On Facebook, Twitter, Youtube and More


Ok did anybody told FBI about Privacy stuff that we need to live on this planet Earth full of some officers who just want to piss of Hackers.


 FBI

Ya, Its FBI they are taking a new strategy focusing on the social media for spreading the Information or something whatever in their mind. Here is what they say :

"Over the past few years we’ve rolled out a number of new web initiatives—including an e-mail alert service, syndicated news feeds, and a series of podcasts and widgets—that make it easier for you to help us track down wanted fugitives and missing kids, to submit tips on terrorism and crime, and to get our latest news and information."

We are moving forward on other social media fronts as well.

Where is FBI Till Now :

  • Facebook, where you can follow our news, check out our photos and videos, and become a “fan” of the FBI;
  • YouTube, where you can watch our videos and connect back to our main website for job postings and other content; and
  • Twitter, where you can receive our tweets on breaking news and other useful information....
,

Process Hacker V1.9 Released

Process Hacker is a great tool or you can say a piece of software which acts as a more advance and more reliable software in front of default task manager. it creates a more detailed and a more understandable version of task manager.

 

You may remember we have earlier featured it in Process Hacker : Power Packed Task Manager, ok i know the spelling is wrong but don't worry about that we all are humans except the Google bot here :D.

 

Lets move on with Process Hacker, recently the people behind this software released the new Version of Process Hacker V1.9...

 

Tuesday, December 22, 2009

AWeber Hacked : Recent Data Compromise

We just in a split second got news, The great and most popular email subscription and rss manager for Wordpress have been hacked. The recent reports says that they have been hacked by some kind of Third-party Software which they use. AWEBER_logo

 

The general meaning of this would be the code would be hidden in the app they would be using their systems which took the ownage of there API might be. We are not sure till yet.

 

It could be Local Buffer overflow on that third party software which they were using. The Apparent effects of this hack was that many spam email message were send to the subscribers. Here is the list of the things which were NOT compromised and are saved by the team.

  • AWeber customers’ personal information was not compromised.
  • No credit card data was compromised.
  • No customers’ names, “from” or contact email addresses, postal addresses, website URLs or any other profile information were compromised.
  • No affiliates’ names, contact email addresses, tax ID numbers, website URLs or postal addresses were compromised.

We are looking into the details and will provide a further updates soon.

You can read more about this Here

,

RSnake's 2nd Take On DNS Rebinding

Robert Hansen aka RSnake the father of Xss is back with a bang. With his latest research on DNS rebinding hacking which he also explained with a Video but he is all set to remove this DNS rebinding from the world.

 

RSnake released a new podcast on DNS Rebinding after his previous release of video on it. Its a pretty good news that somebody is caring about the DNS hacking techniques as one we saw a couple of days ago Twitter was hacked, with some DNS resolution problems.

 

You are missing some Flash content that should appear here! Perhaps your browser cannot display it, or maybe it did not initialize correctly.

 

Dennis Fisher talks with security researcher Robert “Rsnake” Hansen about his recent work on DNS rebinding attacks, the poor state of browser security and his new book “Detecting Malice.”..

, ,

Finding IP address in Gmail From Email Header's

Email headers determine where a message is sent, and records the specific path the message follows as it passes through each mail server.

gmail

 

When You send an email to any of your friends or others could be your Girl friends Never mind. But When you send the email through any email client like Gmail , Yahoo Mail , Hotmail, AOL, Outlook Express, etc it also sends the Email Header which contains Some important information for Us i.e.Hackers.

 

Basically it is a feature of Mailing protocol.

Now when the victim sends you a Email through any ,Gmail, Yahoo mail etc doesn't matter, then mail comes to your inbox in the form of Email Header but the your Email client changes it and shows only readable part of it.

 

Well This article is based on how to view Email headers in Gmail. We Will talk about others in Future too. Yeah its a kind of easy tutorial....

Monday, December 21, 2009

,

The Top Targeted Brands Of 2009 [Pic]

The Year 2009 is almost over and as we noted the whole year 2009 Is The Year Of Biggest Data Breach's Ever Says Forbes and The Years Biggest Security Breach for the year 2009, But the question which exhibits now is, which were the most targeted brands of this year 2009.

 

The Avira Tech Blog have released a new report based on there attacks by the cybercriminals. Which consist of the mostly targeted websites of 2009 and which might be in 2010.

 

toptargets

*Click on the image to View Full size

Well with dawn of 2009, some most vulnerably websites from the forefront of hackers are Paypal, Chase Bank, Ebay, American Bank … after 3 more there is facebook.
Yeah !, you are right ..

,

Bootkit : One Deadly Weapon In The Attacker Arsenal

There was a great presentation at BlackHat about Bootkit. Which is simply a rootkit being loaded from the MBR before the system starts.

 

Stoned Bootkit

 

This could be use to defeat full drive encryption where the system would be infected after it boot. Below you have a copy of the main page of the http://www.stoned-vienna.com/ web site with tons of great information on the subject:


Stoned Bootkit


Stoned Bootkit is a new Windows bootkit which attacks all Windows versions from XP up to 7. It is loaded before Windows starts and is memory resident up to the Windows kernel. Thus Stoned gains access to the entire system.

 

It has exciting features like integrated file system drivers, automatic Windows pwning, plugins, boot applications and much much more. The project is partly published as open source under the European Union Public License. Like in 1987, 'Your PC is now Stoned! ..again'….

Sunday, December 20, 2009

,

Is Google Public DNS Safe ?

Is Google's new Public DNS server safe?

Google opened their new DNS service to the public. Google's strategy appears to be an attempt to compete with the popular free service called OpenDNS.

 

In light of the ongoing slaught of DDOS attacks on sites such as Facebook and under 48 hours ago, Twitter, the infosec industry is (and they should be) concerned about Google's DNS vulnerability.


Is Google Public DNS Safe ? 

So far, as this like below documents, the relatively small amount of research that has been done suggests that Google's port usage is sufficiently randomized so as to reduce the risk of an attack….

Saturday, December 19, 2009

,

New Html 5 XSS Vector’s By Gareth Heyes

Gareth Heyes is a great security guy, as you can also visit his blog The Spanner. The newly released HTML 5 is now under the eyes of hackers and it wasn't late that the New Xss vectors have been released by Gareth Heyes .

 

New Html 5 XSS Vector’s By Gareth Heyes

 

These New Xss vectors according to Gareth are automatic in major Web Browsers from Safari, Chrome to Opera all support them. And its a matter of fact that Gareth also featured them on twitter too.

 

The injection looks something like:-

<input type="text" USER_INPUT>

 

The new HTML 5 works on some other vectors and uses, but the great thing in there is that you don't need to bind your Xss into a css style in here. HTML5 however lets us execute like expressions but without css styles….

Keep Your Encrypted Notes Safe With Fsekrit

fSekrit is a small application for keeping encrypted notes.

shot03

 

This software is a good tool to keep Your encrypted codes or even data safe, from any external usage.

 

The great note about this great tool is that its a really small utility, it portable , that means you can keep it in your pen drive and take it with you to any other place.

 

Another advantage of using fSekrit is that your un-encrypted data is never stored on your hard disk.

 

With a traditional encryption utility you would have to decrypt your file to disk, view or edit it, and then re-encrypt it, and unless you use secure file wiping tools, it would be a trivial matter for someone to to retrieve your un-encrypted data, even though you have deleted it…

, ,

The Anatomy of the Twitter Hack - Twitter's DNS Servers Hacked Yet Again Last Night


 ~ via Tech Crunch

During and after Twittergate, when a hacker broke into a few hosted email accounts and obtained a number of internal documents, I had an opportunity to spend hours speaking to the actual attacker and document how he carried out the attack.

The article was called The Anatomy of The Twitter Attack, and today we unfortunately find ourselves with a sequel to that post as the Twitter DNS servers were compromised last night and the site was redirected to a defacement page.

Unlike last time, on this occasion I have not had the benefit of speaking directly to the attackers, but have spoken to a number of people within the underground security scene familiar with matters and have constructed other parts of the story from public sources

The incident last night was perpetrated by a group called the Iranian Cyber Army – and we have been told that this group is working with the Iranian government...

Friday, December 18, 2009

,

Wireshark v1.2.5 Released

Wireshark is the world's foremost network protocol analyzer, and is the standard across many industries and educational institutions for security stuff. Wireshark is the world’s most popular network protocol analyzer.Wireshark-9fbca

 

It has a rich and powerful feature set and runs on most computing platforms including Windows, OS X, Linux, and UNIX. Network professionals, security experts, developers, and educators around the world use it regularly.

 

It is freely available as open source, and is released under the GNU General Public License version 2

Wireshark uses pcap to capture packets from supported protocols.

  • Data can be captured "from the wire" from a live network connection or read from a file that records the already-captured packets.
  • Live data can be read from a number of types of network, including Ethernet, IEEE 802.11, PPP, and loop-back.
  • Captured network data can be browsed via a GUI, or via the terminal (command line) version of the utility, tshark.
  • Captured files can be programmatically edited or converted via command-line switches to the "editcap" program.
  • Data display can be refined using a display filter.
  • Plug-ins can be created for dissecting new protocols.

30 Million Facebook, MySpace, and Orkut ID’s Hacked

Hackers Have crossed the security boundaries of a widget and multi-social networking based company RockYou.com which host many users from some famous social ry_logo28networking websites such as MySpace, Face book and Orkut.etc

With this Hack over 30 Million users have been affected.

 

The most troubling aspect of this incident is that RockYou apparently stored the information in plain text, rather than following industry standards by encrypting it.
The hackers have claimed also that they have hacked the whole Database full of Usernames and  passwords and some private information as well.

 

Hacker appears to be forcing RockYou to admit to certain vulnerabilities in its data security.

"Don't lie to your customers, or I will publish everything"

The hacker wrote as an obvious reprimand to Rock You.


This seems to be strong words which hacker said in reply to company officials in terms to the matter of encryption.The RockYou is pretty upset it and have written that they are working on the Security measures they have used. You can read more about it Here.

Hackers Slays Microsoft’s Forensics Toolkit

Ok this is kind of good news for all of us. The Well Know Tool For Law Enforces Used ,Not Mostly, Microsoft-packaged forensic toolkit is now attackable.

 

DECAF

The Tool is used by Law Enforcement agencies to keep a track on a computer of a hacker. But the great thing the Twist here is that a hacker or might be a group of hackers had worked hard on this tool to crack it down.

 

They were successful with a crack they built named DECAF. Its good to see here in this whole matter is that how the government use such a piece of crap that was cracked.

 

They should had made their own tool for the forensic usage and does not rely on the software which combines a suite of 150 bundled scripts , piled in one single script.

 

The tools scan files and gather information about activities performed on the machine, such as where the user surfed on the internet or what files were downloaded…

Monday, December 14, 2009

,

Google Password Decryptor – Hack Anyone's Google Passwords

Google Password Decryptor is a Password Recovery Tool which can be used to recover your lost Google account passwords using the Google software's installed in your computer. But it can used as a hacking tool as i say.

 Google Account hacking

This software's works on the simple Google accounts vulnerability that all the Google web products such as Gmail, blogger, Google docs etc uses the same username and passwords and hence when you get the username and password of one Google web product such as of let us take here Gmail then you can use all the other Google products such as Ad words, Ad sense etc and hence Hacking the victim.

 

Google Password Decryptor is a software's which decrypt in seconds all the usernames and passwords stored in the victims computer like if he uses Gtalk it will decode the password stored in the victims computer to reveal the username and passwords…

,

Torpig Domain Generator : Hackers Using Twitter Trending Topics

Torpig botnet uses Twitter API (trends) to generate new pseudo-random domain names of attack sites where infected websites silently redirect visitors to. Active domain names change at least twice a day.

This real-time tool generates a domain name of the currently active attack site and two domain names that hackers should activate in upcoming 24 hours.

 twitter bot

This tool is a initiative by a hacker Denis or you can say a security guy. The tool uses JavaScript and Twitters API to find a domain for attacking using the twitters Trending topics.

Well its big hole in the whole twitter’s API and the way this tool have predicted the domain names are right one so far. Its now the all up to the twitter API developers hand…

Friday, December 11, 2009

,

Motorola Droid Jailbroken By Hackers

Hackers are just not stopping by the Iphone Jailbreak, they have already gone ahead and Jailbreak the newly famed Motorola Droid. The newly released Motorola Droid is a great mobile which gaved the Apple Iphone a tuff compition by selling around figure as the Apple Iphone did when it was launched.motorola-droid-front-iphone-killer

 

A hardware Modder, rejoicing in the name Zinx Verituse, has developed and published a Droid rooting exploit. Instructions on how to jailbreak Droid smart phones, along with links to the exploit were posed on an Android forum, Wired Gadget Lab via CRN reports.

 

Once rooted, Smartphone users gain administrative privileges and thus the ability to download widgets, add applications, or otherwise customize their phone. The procedure carries a risk of rendering a device inoperable or disabling features. Attempts to tamper with the phone void Motorola's warranty and run against terms of service agreements.

 

"Once installed, you will be able to run 'su' from your adb shell,'" he said in the post.

The Year's Most-Hacked Software – Forbes

Hackers Like Google Chrome OS

Google Chrome is just going out of the box after its first preview by the team at google’s bay. The newly released Google Chrome’s Source codes were in sight of hackers from the first day of release BETA version of Google Chrome. 

google-chrome-os

 

The most interesting thing to happen in this whole scenario was the released version of Google chrome was not happening to the hackers .

 

They wanted it to be Live , so it can be booted in seconds and would also really small in size so it could fit in a 1GB Thumb drive. Very soon it got torrented and hosted, courtesy of a geek celeb who goes why the name of Hexxeh.

 

The first build required 4GB, but a new and vastly improved ‘diet build’ is now available as a 300MB direct download, it extracts to a 950MB image that can run off a USB stick.The OS is also available as a torrent on PirateBay, and lots of other trackers…

Tuesday, December 8, 2009

Co-NASA Websites Hacked With SQL Injections

The Websites of NASA's Instrument Systems and Technology unit and Software  Engineering division were broken into and screenshots illustrating the hack posted online. The website was hacked my a hacker named "c0de.breaker" . The main aim was according to the hacker was -nasa_sql

“Because this is my hobby and I want to prove that even big websites which should be very secure, can be hacked, and this is true and sad at the same time.

I think it’s alright what i’m doing because if somebody else would find the vulnerability before me, he/she could do many bad things and damages (shelling, rooting, backdooring,etc).”

Ok that was great.The Website Vulnerable: http://saif-1.larc.nasa.gov (CEOS Systems Analysis Database).The hacker used many SQL injections for this vulnerability to hack in the website. some of them he showed us were some…

Monday, December 7, 2009

, ,

OllyDbg Beta 2 Final Released

OllyDbg is a 32-bit assembler level analyzing debugger for Microsoft® Windows®. Emphasis on binary code analysis makes it particularly useful in cases where source isollydbg unavailable. x is a shareware, but you can download and use it for free.

 

OllyDbg is a 32-bit assembler level analyzing debugger for Microsoft® Windows®. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. OllyDbg is a shareware, but you can download and use it for free.

 

OllyDbg is the king of software debugging and cracking. OllyDbg is used mainly and is popular because of its really amazing utility in software debugging and cracking as well. You might have heard of this software allot times.This is BETA 2 version on OllyDbg  2. So it means it may contains some Bugs in it.

 

hacking

 

Please read it carefully :

1. OllyDbg 2.0 is rewritten from scratch.
2. No, plug-in are not yet implemented.
3. Yes, they will be implemented again - presumably in v2.02.

 

NOTE : A release will follow soon !

Saturday, December 5, 2009

, ,

RSnake On DNS Rebinding [Video]

DNS Rebinding is a really good technique through which an Normal Internet user would be tricked easily. Robert Hansen aka RSnake is a security expert and you won't believe but i am big fan of him. Because If you know that much in hacking stuff RSnake Know alot then you. He is great you can also visit his blog here ha.ckers.org

 rsnake

Now lets talk about some DNS Rebinding in basics and we will also see totally cool RSnake’s video on this. He explains every tiny bit of the exploit. Well i want to tell you guys that i am not to good in this whole matter of DNS Rebinding, Because i am still learning and i would not be able to help you guys with this matter that much but still.

So lets start -

 

How DNS Rebinding Works

 

The attacker registers a domain which is delegated to a DNS server he controls. The server is configured to respond with a very short TTL parameter, which prevents the response from being cached….

Thursday, December 3, 2009

, ,

Is Your Son a Computer Hacker ?

Well i am 17 yrs old and i am admitting that i am hacker, My dad doesn't know i am hacker and you might also be feeling right now after looking at my blog.

But what about those people who does not know till yet that his son is a computer HACKER !! So here is a video for you guys. Enjoy and don't forget to share this -

 

Happy Hacking @hackerthedude

Safe Yourself From XSS Attack : Microsoft Anti-Cross Site Scripting Library v3.1Released

Microsoft Anti-XSS library is a utility released by Microsoft for fighting against well known attacks XSS. It runs on a server based on ASP.Net server. It differs from most encoding libraries in that it uses the white-listing technique ,sometimes referred to as the principle of inclusions, to provide protection against XSS attacks.

 

safe from xss

This approach works by first defining a valid or allowable set of characters, and encodes anything outside this set invalid characters or potential attacks. The white-listing approach provides several advantages over other encoding schemes.

One of the common web application problem today is Cross Site Scripting , Microsoft Anti-Cross Site Scripting Library is a must have tool for security developer , security auditor. using this tool will immediately point you where actually you need to rectify.

 

BTW its requires .Net Framework for running and Asp.net web-based applications for working and is released for it only.

New features in version 3.1 of the Microsoft Anti-Cross Site Scripting Library include:

  • An expanded white list that supports more languages
  • Performance improvements
  • Performance data sheets (in the online help)
  • Support for Shift_JIS encoding for mobile browsers
  • A sample application
  • Security Runtime Engine (SRE) HTTP module
  • HTML Sanitization methods to strip dangerous HTML scripts.

btn_downv53_new

Ankit Fadia’s Website Hacked – Viagra Hacker Attack

It Looks like our famous hacker Ankit fadia is in trouble in these days, Ankit fadia is Ethical Hacker famous for his work in helping people against hackers, but we have confirmed that his website http://hackingmobilephones.com/ is hacked and is bring uplifted by some Viagra's :D

 

b_Ankit180

One  two days ago my dear friend William Knowles alerted me that if you see the source of the of Ankit fadia then you would find some Viagra thing under it.

These contains links to some website named http://www.uindy.edu/ and some other links also. But all points to the Viagra thing.

 

We have confirmed this news and the notable think is that there is no sign of hacker or any clue left by the hacker regarding this matter….

Hackers Now Attacking Swine Flu Patients – Fake Vaccines

Hackers are now attacking the Swine flu patients by sending fake messages of a free vacancies to the patience . Sending the virus through a Email and asking them to download it.

 

Researchers from security firms Symantec Corp and AppRiver said, "The email purports to be from the U.S. Centers for Disease Control, directing them to what looks like an official government website to fill out a vaccination form."

 

swine flu 

The main aim of the hackers are to automatically download a software in the victims computer and which automatically installs in the system.

The software then makes the victims computer a spam server which then distributes the virus to others using the victims computers and this grows and grows.

 

Hackers typically base their scams on issues that are in the top news. Lately the attacks have been linked to Tiger Wood's car crash and the holiday shopping season.

Wednesday, December 2, 2009

Hackers Don’t Give A Shit [Pic]

Hackers dont give a SHIT

Download Or View Full Size : Here

*image controversial by Jo

Team Viewer 5 Beta Released

The new version of Team Viewer is going to released soon, as its BETA version is out.en_widgets_video_audio
Company says it have some new features in which includes VoIP, webcam and application selection will give you an even better, easier and faster desktop sharing experience.

 

The new version of Team Viewer is being out after a long interval as it was also due to release of the Microsoft's major release of their next OS Windows 7.

 

But Officials are saying the new version is fully compatible with Windows 7 and can perform many tasks with Windows 7 as with other versions on Windows.

Some New Features Are :-windows7_s

 

1. Audio (VoIP) / Video.

2. Enhanced and Flexible Session Control.

3. Team Viewer Manager 5.

4. Additional New and Improved Functionalities.

5. Licenses, Updates and Downward Compatibility.

 

btn_downv53_new

, ,

Basic XSS Cross Site Scripting Demo [Video]

Allot of you guys aren't clear with xss aka cross site scripting and for that many of you were sending me mails on how to do xss attack , etc and that's why i got this video which explains some basic concepts of the Xss attack and how it can be practiced and how can we use it to hack anybody.

This video is controversial by Brial Contos, CISSP from a company named IMPERVA. it takes through each and every step involved to find a xss vulnerability in a webpage . and showcases some of the basic steps that you need to know.

 

What is XSS

Cross-site scripting ('XSS' or 'CSS') is an attack that takes advantage of a Web site vulnerability in which the site displays content that includes un-sanitized user-provided data. For example, an attacker might place a hyperlink with an embedded malicious script into an online discussion forum….

Tuesday, December 1, 2009

,

Mininova : Is No More Our Old Mininova Limits To Content Distribution

Its really a sad that Mininova is no more the old mininova in which we can download everything we need . I think it was the best Bit torrent website ever after The pirate bay.

 

From now on, they are limiting Mininova.org to there Content Distribution service. By doing so, they comply with the ruling of the Court of Utrecht of last August.

 

The people behind mininova says that there were no choice left with them so they have to shut down the mininova trackers and also all the registered users have been unregistered or have been moved to Monova.
First was the pirate bay who lost there trackers and fighting for several years in the court.

Now Mininova is down too.

It looks like many bit torrent sites are being held against the crime of distributing content freely. "Unfortunately the court ruling leaves us no other option than to take our platform offline, except for the Content Distribution service," the admins wrote.

 

2009-12-01_105604

"We are still considering an appeal at this moment," the side administrators stated...

Proper use of English could get a virus past security