Teya Salat
No content for this blog yet.
IMG0010A
khalid wafa (GOOGLE) Hacking Beast Best Blogger Tips
content top

Thursday, September 29, 2011

2316 Reasons why Assad is finished, #OpSyria leaves Government websites with a message


Operation Syria has taken another step and now defacing more government websites. This defacing is not anywhere like your normal defacing. It has had time and effort put in to creating this template and the information with the defacement is strong and gets the word across. So far this is the best defacement i have ever seen and sets the way for other hackers to live up to stylish, strong content  and not just simple plain ones.
The government which now sport a map of Syria that is made up by 2316 people, all of which have suffered at the hands of Assad. As u hover each person it shows there name, age, and date of death.This is very sad to see so many people killed for no reason and also to see the person at the control of this getting away with it.
Anonymous hackers have been on a mission to free the people of Syria from this trouble for some time now and in future attacks we can only expect to see them get more high scale doing more damage with more results.
Screen shots
orginal:


sites defaced so far, more to come.

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Link Directly To This Post :

Link To The Homepage :

Tuesday, September 27, 2011

VOGH: Voice of Grey Hat released their 2 magazine "DEFCON Chennai The Reality"





Voice of Greyhat (VOGH) released their second  magazine named "VOGH RELEASED II | DEFCON Chennai  The Reality"

VOGH RELEASED II | DEFCON Chennai  The Reality Contents:- 
  • Introduction
  • What is DEFCON 
  • Brief History of DEFCON
  • DECFON Chennai
  • The Reality 
  • Conclusion


Download:- Archiver Format | PDF Format





The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Link Directly To This Post :

Link To The Homepage Khalid Wafa :

Saturday, September 24, 2011

Three Webserver R00ted, More Than 800 Websites Hacked By Minhal Mehdi & NoTty_rAJ

More than 800 web-sites hacked and defaced by Minhal Mehdi & NoTty_rAJ (Power Hackers). They managed to hack into 3 web-servers and defaced all the domains running on those web-servers.http://1.bp.blogspot.com/-bwiKE8gQOME/Tntbu3YaZ-I/AAAAAAAAA1c/4YqnfOqlrXw/s1600/snapshot9.png

To see the list of hacked sites click Here

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!


Link Directly To This Post :

Link To The Homepage :

Cyber Security Division shields attacks on Marine Corps network



MARINE CORPS BASE CAMP LEJEUNE, N.C. – War has been waged throughout history, and new tactics and technology emerge to provide an upper hand against one’s opposition. Unremitting innovations of one’s combative tools and elements are reactive and proactive measures that address the evolving wares and strategies of the adversary in order to maintain dominance and win the battle.
In this day and age, the Internet has become the battlefield in a cyber war, and hackers, armed with computer viruses, prove to be an asymmetric threat difficult to defend against.
On May 8, 2000, the Department of Defense reported that four of their classified networks were infected with the “love bug” virus. It is estimated that the email virus caused some $10 billion in losses in as many as 20 countries.
Although the DOD has some of the best defenses against cyber attacks, the possibility of having its systems infiltrated remain. The Marine Corps Installation East Cyber Security Division is constantly working to prevent Marine Corps Base Camp Lejeune’s network cyber security from being compromised.
“Eight years ago we had around 60 to 70 (cyber) attacks a year,” said Sean Gilligan, information technician with Cyber Security Division, MCB Camp Lejeune. “Now, we’d be lucky to see less than one in a day.”
Viruses can be used to gain access to networks to obtain information. The variety of avenues to spread malware only makes infiltration of systems of any kind easier.
“We can only do so much to protect and prevent an infiltration of our system,” said Seth Thigpen, information technician with Cyber Security Division, MCB Camp Lejeune. “It’s also the users’ responsibility to make sure malware doesn’t find its way onto our (government computers).”
Thigpen said there are programs that exploit vulnerabilities or crack passwords called root-kits to gain access to a network without being detected by antivirus software. Once a root-kit is installed, it allows the attacker to mask the intrusion, gain access to the computer and possibly other machines on the network. Thigpen said he actually had a root-kit infiltrate his personal computer.
The Marine Corps has implemented cyber awareness training courses on MarineNet to include, Information Assurance Awareness training and Personally Identifiable Information and Careless Keystrokes Can Kill. These courses cover topics such as official use of government computers, recognizing suspicious emails and how devices, such as thumb drives and phones, should never be connected to government computers.
“Anyone’s phone could have an embedded virus,” said Thigpen. “Just because you don’t see it, doesn’t mean it’s not there. You could plug your phone to a computer and cause an infection. If someone decides to plug up their phone (to a government computer), we’ll see it and they’ll receive a call from us.”
The Cyber Security Division is constantly monitoring the activity on all of MCB Camp Lejeune’s government computers.
“We see everything,” said Jason Norris, information technician with Cyber Security Division, MCB Camp Lejeune. “We can see all the websites you’ve visited, the emails you’ve sent and we can even see the type of phone you have when you plug to one our computers.”
Cyber Security staff said they track all activity and even though many people think they’re getting away with the misuse of government computers and a government network, they’re only building themselves a record of discrepancies while security staff is busy catching bigger fish. They added that there has been a large decline in the number of discrepancies recorded.
In order to improve the cyber security, the proper use of the computers and networks must be enforced. Cyber Security staff asks users to help protect the network by watching out for suspicious activity, updating their government computers and completing and understanding all of the required cyber awareness training.
“We also provide free antivirus software to all military personnel to help protect their person computers,” said Gilligan. “There are also (patrons) who e-mail themselves work to do at home, and this keeps both government and personal computers protected from malware when documents are exchanged.”
The MCI East Cyber Security Division mission is to ensure the confidentiality, integrity and availability of all data. User awareness is also important to maintaining and increasing network security, and the combined effort from the Cyber Security Division and Marine Corps network users will promote efficient proactive and reactive responses to threats.
The Cyber Security Division will be hosting the annual Information Assurance Cyber Awareness Training at the Base Theater, Nov. 2 through 4. Military personnel can obtain free antivirus software at www.disa.mil/antivirus/homeuse.html. For more information on cyber security call 451-7050.

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Link Directly To This Post :

Link To The Homepage :

Thursday, September 22, 2011

Monitor Pages for Changes in Chrome





Sometimes keeping track of website pages can be a pain. Maybe you want to monitor a certain section of a webpage, such as the price of an item on Amazon. Page Monitor for GoogleChrome lets you do exactly that, and does so intelligently.
Using this extension you get a lot of control over any page. You can specify the interval you want it monitored at, which parts of the page you want tracked, and much more. It also ignores things like code changes so that you’re not frequently getting notified for things that don’t matter.
Here’s a rundown of the features:
  • Monitor any number of pages for changes
  • Add pages with two clicks
  • Visually select parts of a page to track
  • Smart comparison system that ignores ads and code changes
  • Highlighting of changes that happened to a page since the last check
  • Set separate check interval for each page
  • Set a sound alert when a page change is detected
  • Custom sound alerts
  • Desktop notifications
  • Import and export the monitored pages list
Page Monitor for Google Chrome

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Link Directly To This Post :

Link To The Homepage :

Wednesday, September 21, 2011

SriLankan Cyber Army is Againest Anonymous SriLanka : Warning to Anonymous SL by SL Cyber Army

http://a0.twimg.com/profile_images/1503816973/AnonymousSriLanka_bigger.jpgSriLankan Cyber Army is Againest #Anonymous SriLanka : Warning to Anonymous SriLanka by SriLankan Cyber Army

Massge Given By Srilankan Cyber Army :-

Dear fucked up Anonymous SriLanka (LTTE),

We know you you are, we know what you do and why you do.
stop using the Name of Sri Lanka to hack into Sri Lankan websites.
Stop using our boys and girls as a tool for your Cyber terrorism.


You all are going to fail before us. You all are fucked up LTTE members. Pathetic, embarrassed and n00b pedophiles.

You never understand the the Anonymous concept. You think it is a group. Anonymous is not a group. It is a movement. Antisec is a movement. Don't ruin the Name of anonymous, you pedophiles.

You all are bunch of n00bs and Script kiddies. You never going to understand anything related to The Real Anonymous movement.

Anonymous SriLanka, Educate yourself!

We are not going to Forgive you!

Never mess up with Sri Lanka.
We are people.
We are angry people.
We are against terrorism.
We are not going to tolerate Anonymous SriLanka (LTTE).
- SriLankan Cyber Army
The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!


Link Directly To This Post :

Link To The Homepage :

Tuesday, September 20, 2011

Ghost in wires - free download


Kevin Mitnick one of the world's best hacker's latest book Ghost in Wires is now available online .







The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Link Directly To This Post :

Link To The Homepage :

content top