Thursday, December 31, 2009

Why we need ethical hackers?



Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes. 
While most of the companies are ignorant of their security controls, many succumb to hackers inspite of having the best security systems and policies in place. Breaking sites, defacing them with anti national and porno messages, reading the e-mail secretly, cracking mail passwords,stealing credit card numbers from online shopping site or implant software that will secretly transmit their organization’s secrets to the open Internet have become rampant in the recent past. While the best of security continues to get broken time to time by the determined hackers, what options can a helpless organizations look forward to?
Even in cyber cafes(where most of us regularly visit) ,when we type our mail id and password, a simple  software can trap it and your details activity can be mailed to an unknown person,without any knowledge of the user.How a normal individual will protect his privacy and cope with these sort of situation?


It is no longer adequate to buy and install a simple software package and let it run. Companies need specialists, IT professionals dedicated to network security and trained to find security holes and fix them before they can be exploited.


Globally, with a tremendous rise in cyber crime, there is a rapidly growing demand for highly skilled professional called  ethical hackers who can safeguard the Internet and  corporate networks and their web sites.
The job of ethical hackers is to get into the minds of the computer criminals, think like them and come up with innovative methods to protect computer systems and corporate networks.


Though we have thousands of security consultants from various companies, very few of them are actually aware of measures to counter hacker threats. So,India needs  institutions which would train companies or students in the art of defending their own cyberspace.
Keeping the above things in mind, we have started   course on Ethical Hacking, called “IT Security and Antihacking” which is the first of its kind in WestBengal.aimed at information security professionals, auditors, CTOs, CIOs, network administrators, students.
demand for ethical hackers from sectors like banking, finance, telecom and companies with large network and huge on-line database.


The course curriculum is designed to teach, providing a structured methodology for detailing the techniques used by hackers to assess and attack corporate networks. Beginning with a ethical part of whole things, covering legal and HR issues, reasons why one must perform ethical hack, common attack types and vulnerabilities etc,
Anybody with a basic understanding of computers and network can join in the program. Even normal café users can also do the course to protect his/her privacy at café,office etc.
For course details contact us.

Wednesday, December 30, 2009

Some useful website...

Useful Websites

By hackingheart team

Free sms sites:-
1)www.indyarocks.com-unlimited within 130 characters..
2)www.sms7.in-480 chars sms with time scheduling..
3)www.freesms8.com-160 chars with unlimited sms with scheduling,you can choose your own display name etc..

Free essential software websites:-

1)www.filehippo.com-provides uptodate essential softwares..
2)www.soft32.com-essential softwares..


If you have any new interesting useful website then mail us.
we will add here with your name and city.

If you want to know about any website related to specific topics then mail us. We will help you.

mail at: rahultogupta@yahoo.com

Chat tricks (Rediff bol & Yahoo)

MULTIPLE LOGIN IN REDIFF BOL


By-Rahul jaiswal




1)First RIGHT CLICK on Rediff Bol icon.
2)Click on Run as.
3)If you Want to open more than two id's follow again follow the same.Just it and you are done


HACKING IN REDIFF BOL


BY Rahul jaiswal



Hacking in rediff bol is quite tough thing but I'll make it easy for you.
You need to download some software's for that like key loggers,phishing page software's etc etc.
....................................


After downloading these software's install them and if you want to get the full version of hacking rediff bol id software's mail me..



Wanna pm to those who have blocked u in rediff bol


BY Rahul jaiswal



Shocked!! Yeah, u should be shocked, b'coz now I'm gonna tell u, how to pm those ppl who have blocked u or whose pm has already closed. Steps are followed, . ...........................,,,,,,,,,,,,,,.......................................................................
REMEMBER:- The person whom u want to send pm, should be added in ur list, and his/her status should be online.
Open Rediffmail.
Open that id in which the victim is added already and his status is online.
There is option that you can chat with ur rediff bol friends through rediffmail.
You open ur email, if u find victim's id online in list over there, send pm to victim.
Believe me the victim will surely receive your pm, even if victim blocked u.
----------------------
Any rediff bol tricka wana know feel free to ask...
----------------------



Change Yahoo messenger title bar


BY Rahul jaiswal



Hey guys you can change the yahoo messenger title bar...
For this just find the folder messenger in the drive in which the messenger is installed. Then search a file named "ymsgr". In this file just go to the end and write the following code:
[APP TITLE]
CAPTION=Red Devil
Here you can write any name in place of Red Devil... then see the fun.... You can have your own name being placed in yahoo messenger title bar.











Mobile hacking



Super Bluetooth hack

By Rahul Jaiswal

Super Bluetooth hacker uses Bluetooth AT commands to access /hack other Bluetooth enabled handsets . You can access others SMS ,contacts make calls ,shut down device etc .Super Bluetooth hack is a Java software . So it works in Nokia ,SonyEricsson , LG ,Samsung and all other phones with Java support .Download Super Bluetooth hack 1.8 here .
Download Super Bluetooth hack


Though the name of the software is Bluetooth hack ,it doesn't perform any kind of hacking .Actually the hacking mode seems to be working only in some low security SonyEricsson phones . In High -end Nokia ,LG ,Samsung phones ,the target device should accept the incoming Bluetooth connections to make Bluetooth hack work . So first you need to play some tricks to make the targets phone connected to your device ( Just ask him to send a song ). Later then you can start Bluetooth hacking .\par

Super Bluetooth hack 1.8 features

Connect any phone via Bluetooth or Infrared.
Turn off , read SMS , send SMS ,make calls ,Read phone book

--------------


Advanced Blocker v2.12: Filter unwanted calls

By Abir Atarthy


Advanced Blocker is all-in-one solution to help you filter unwanted voice calls, video calls, text messages, MMS and WAP Push messages.

Advanced Blocker (AB) is easy to set-up yet powerful filtering tool for unwanted or badly-timed calls and messages.

How it works?

* Create a blacklist rule: to block certain
contacts from calling/texting you, you just need to import them in the application. You can import contacts from phonebook, from the phone log and manually. Hidden callers can also be blocked!
* Group filters allow you to apply the same blocking rules for all of your phonebook contacts, all contacts not in phonebook and hidden callers.
* Incoming calls (voice and video) are blocked with a busy tone. Messages (text messages, MMS and WAP push messages) are silently filtered with no sound or light indication.
* Details of each filtering rule allow you to fine-tune the blocking options for the selected contact(s) or text pattern – you can choose whether to accept or reject calls, SMS, MMS and WAP Push messages.
* Visual indicator on the stand-by screen monitors AB’s activity and shows you if there are new blocked calls/messages.
* Blocked History log shows you all new blocked events.


What can you block?

Advanced Blocker recognizes any type of incoming communication and will instantly and silently block events from blacklisted contacts or rules:

* Voice calls
* Video calls
* Anonymous calls
* SMS
* MMS
* WAP push messages

You can quickly create filter rules and effectively filter:

* Phone numbers – imported from the phone’s contact book, the phone’s log or entered manually
* Private/hidden/withheld numbers –calls from hidden or not identified numbers
* Phone number patterns – wildcard '*' pattern filter allows you to block out incoming calls beginning or ending with certain numbers e.g. international prefixes; * replaces arbitrary number of positions within phone numbers
* Messages containing a text pattern – text messages containing a predefined text word or phrase are automatically junked
* Groups of callers – all in phonebook, all not in phonebook, all numbers for which there is no filtering rule


Features and Advantages

Advanced Blocker seamlessly integrates with your phone and the standard phone
software to ensure flawless performance and intact blocking of calls and messages.

Features include:

* Silent instant reject of all blacklisted numbers, number patterns and text rules
* Auto-start mode - option to automatically start-up AB after phone restart
* Blocking of fixed numbers or groups of numbers (wildcard * number filters)
* Discreet activity indicator on the phone’s stand-by screen
* Various contact import options – import from the phone’s log, from phone’s contact book, manual import
* Blocked history log for detailed history of filtered events
* Visual indicators providing instant overview of all new blocked events in the blacklist rules main screen
* Blocked messages can be easily viewed and restored
* Full reject entry log with details screen for each blocked event
* Customizable reject options for blacklisted contacts – you can select what kind of events to accept or reject from each number – calls, SMS, MMS, WAP push messages.

Take your time while Advanced Blocker takes care of your privacy!


Join our free sms group

Hackingheart in your mobile:-

Join our free IT sms group called hackingheart(1000 + members)and get news on latest hapning on IT,useful Softwares,cool,websites, security tricks etc on your mobile.

All r absolutely free!GUARANTEED TO MAKE U ROCK!!!

How to join?
To join the group type in ur mobile
JOIN hackingheart
and send it to 567678

One time subscription of Rs 2.00 will b deducted for BSNL. Others
subscriber one time Rs 3 only.
There after no charge/no hidden cost. Just receive absolutely free sms.
If u have any difficulties/queries/doubts then call Abir, at 9434243285

Tuesday, December 29, 2009

Write for us

We invite all of you to write for this.

Send your original articles/tips/writings for this site to

hackingheart7@gmail.com

with your name,address,profession, and contact details.

We will be very glad to publish your articles in our site.

So friends we are looking for your articles.

DISCLAIMER

Hackingheart is definitely not a site that promotes or encourages computer hacking (unethical), but rather it is a Computer Security related website. In fact, Computer Hacking and Computer Security are the two concepts that goes hand-in-hand. They are like the two faces of the same coin. So with the existence of close proximity between Hacking and Security, it is more likely that people often mistake my site to be that promotes Hacking. But in reality, our goal is to prevent hacking. We believe that unless you know how to hack (ethically), you cannot defend yourself from malicious hack attacks.

While using this site and reading various hacking tutorials, you agree to follow the below mentioned terms and conditions:


1. The site is totally intended for educational purpose and does not in anyway encourage hacking. The real purpose of this site as already stated is prevention from hack attempts.

2. The words "Hack" and "Hacking" should be taken or considered as "Ethical Hack" or "Ethical Hacking".

3. . Implementation of hacks explained by us is sole responsibility of user and "HACKINGHEART" or its owner is not responsible for any damages caused by the hacks explained in this site.

4. Any actions and or activities related to thematerial contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law. This site contains materials that can be potentially damaging or dangerous.If you do not fully understand something on this site, then GO OUT OF HERE!Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials.These materials are for educational and research purposes only.Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW! Neither administration of this server, the authors of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions.

5. I believe only in White Hat Hacking. On the other hand we condemn Black Hat Hacking.

Security

BitDefender

By-Abir atarthy


Building products BitDefender: BitDefender AntiVirus 2010, BitDefender Internet Security 2010, BitDefender Total Security 2010. BitDefender offers the most advanced technology to protect your PC from viruses, spyware, hackers,

BitDefender Antivirus provides advanced protection against viruses, spyware, hacker attacks and data theft, without slowing down your computer.

- Anti
The module Anti - to ensure detection and removal of all viruses in circulation. BitDefender Internet Security uses robust scan engines, certified laboratory ICSA, Virus Bulletin, Checkmark, CheckVir and TUV.

- Firewall
The firewall module filters network traffic and controls when the user access to the Internet and permission to run applications. Stealth mode allows you to "hide" your computer from malicious software and hackers.

- Spam
BitDefender Internet Security will solve the problem of spam, and you will not worry about it.

- Anti-Spyware
BitDefender Internet Security monitors and prevents potential spyware infiltration of objects in real time, before they harm your system. Using an extensive database of known spyware signatures of objects, your computer is protected from spyware.

Download: http://www.bitdefender.com/

--------------------

ESET NOD32 Antivirus 4.0.474 (32bit-64bit)


NOD32 provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.

Trojans, viruses, worms and other malware using NOD32 are kept out of striking distance of your valuable data. Advanced detection methods implemented in the software even provide protection against the future threats from most of the new worms and viruses.


The fourth generation of the NOD32 Antivirus System features a fully integrated software suite characterized by an unprecedented detection track record, the fastest scanning rates and extremely low utilization of system resources.


NOD32's detection efficiency combined with 2-50 times faster hard disk scanning rate earned the product many international prestigious awards.


NOD32 is the world leader of the Virus Bulletin 100% Awards having won more awards (21) than any competing product. Since its first submission for testing in May 1998, NOD32 was the only tested product that has never missed a single In the Wild virus.


Here are some key features of "ESET NOD32 Antivirus":

ThreatSense technology - a single optimized anti-threat engine for analyzing code to identify malicious behavior, such as viruses, spyware, adware, phishing and more

Unprecedented heuristic analysis capable of discovering new malware threats as they emerge

Powerful virtual PC emulation technology enables unpacking and decryption of all types of archives and run-time packing

Able to clean active malware running in memory

Protects at multiple infiltration points, including HTTP, POP3, SMTP and all local and removable media

Removes infections from files that are locked for writing (e.g., loaded DLL file)

Prevents infected files from being opened and executed, and warns on creation of infected files

Automatic execution on system startup

Supports multiple Terminal Server environments

Supports scanning of mapped network disks


System Requirements

Processor Architecture: i386(Intel 80386) AMD 64 (x86-64)

Operating Systems: Microsoft Windows 7/ 2000/ XP/ Vista

Memory: 44 MB

Disk-Space (Download): 28 MB

Disk-Space (Installation): 35 MB


What's new in ESET NOD32 Antivirus 4.0.474:

Fix: Scheduler task not displaying scan targets

Fix: Slow opening of Office documents from a Windows 2003 server share

Fix: Intermittent error when saving files on Windows 7

Other minor fixes and improvements


What's new in ESET NOD32 Antivirus 4.0.468:

Fixed: External driver injection in ESET SysRescue on Microsoft Windows 7 RC fails when this option is selected in the advanced mode of ESET SysRescue wizard

Fixed: Error sending a file via "Send to" in the right-click menu. The problem only occurs in combination of Microsoft Windows XP and Microsoft Outlook 2003 when the Microsoft Outlook process is not running.

Fixed: Mozilla Thunderbird with IMAP account freezes when a virus-laden message is received

Improved: Compatibility with server operating systems

Improved: HTTP scanning compatibility

Other minor fixes and improvements


ESET NOD32 Antivirus 4 (32-Bit)

Microsoft Windows 7/Vista/XP/2000

Version: 4.0.474, File size: 31.67 MB


ESET NOD32 Antivirus 4 (64-Bit)

Microsoft Windows 7/Vista/XP (64-bit)

Version: 4.0.474, File size: 34.55 MB

Download: www.eset.com

----------

Trojan Killer 2.0.5.9



Don't wait while trojans strike roots in your computer!Trojan Killer is a malicious computer software (malware) removal application. Samples of malware include various types of adware (displays unwanted advertising); spyware (may keep and send logs of your keyboard and mouse activity, such as credit card or personal identity information); hidden dialers (may initiate unsolicited phone call which then shows on your bill), and more.


If you are an active internet user, you should take steps to protect your sensitive personal information from possible cyber exposure. Trojan Killer will help you to timely identify and safely remove dangerous applications before it is too late. Don't wait while malicious programs strike roots in your computer. This application will prevent them from ever reaching your PC!

Download : http://www.softpedia.com/get/Security/Secure-cleaning/Trojan-Killer.shtml

--------


UnHackMe 5.0

UnHackMe - First BootWatch AntiRootkit! Now it is the must have tool for you!
UnHackMe is specially designed to detect and remove Rootkits (a new generation of Trojan programs - invisible Trojans). A rootkit is a program that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network. The intruder installs a rootkit on a computer using a user action or by exploiting a known vulnerability or cracking a password. The rootkit installs a backdoor giving the hacker a full control of the computer. It hides their files, registry keys, and process names, and network connections from your eyes.

Your antivirus could not detect such programs because they use compression and encryption of its files. The sample software is Hacker Defender rootkit. UnHackMe allows you to detect and remove Rootkits.
UnHackMe tested for removal all modern rootkits: Rustock, Haxdoor, Hacktool, Elite Keylogger etc.

Supported Windows NT4/2000/XP/2003/Vista. Compatible with all known antiviral software.

What's new in version 5.00 (December 22, 2008):
1. Enforcing Security.
2. UnHackMe executable files and drivers are signed by digital sign approved by Microsoft. "Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed by use of a cryptographic hash."
3. Compatibility. Resolved problem with crashing if a VISTA DEP is active for all applications.