In this site you will get lots of tech news/Antihacking/IT security/programming tips,latest happening on IT n Software etc.
Thursday, December 31, 2009
Why we need ethical hackers?
Wednesday, December 30, 2009
Some useful website...
Chat tricks (Rediff bol & Yahoo)
Mobile hacking
Super Bluetooth hack
By Rahul Jaiswal
Super Bluetooth hacker uses Bluetooth AT commands to access /hack other Bluetooth enabled handsets . You can access others SMS ,contacts make calls ,shut down device etc .Super Bluetooth hack is a Java software . So it works in Nokia ,SonyEricsson , LG ,Samsung and all other phones with Java support .Download Super Bluetooth hack 1.8 here .
Download Super Bluetooth hack
Though the name of the software is Bluetooth hack ,it doesn't perform any kind of hacking .Actually the hacking mode seems to be working only in some low security SonyEricsson phones . In High -end Nokia ,LG ,Samsung phones ,the target device should accept the incoming Bluetooth connections to make Bluetooth hack work . So first you need to play some tricks to make the targets phone connected to your device ( Just ask him to send a song ). Later then you can start Bluetooth hacking .\par
Super Bluetooth hack 1.8 features
Connect any phone via Bluetooth or Infrared.
Turn off , read SMS , send SMS ,make calls ,Read phone book
--------------
Advanced Blocker v2.12: Filter unwanted calls
By Abir Atarthy
Advanced Blocker is all-in-one solution to help you filter unwanted voice calls, video calls, text messages, MMS and WAP Push messages.
Advanced Blocker (AB) is easy to set-up yet powerful filtering tool for unwanted or badly-timed calls and messages.
How it works?
* Create a blacklist rule: to block certain contacts from calling/texting you, you just need to import them in the application. You can import contacts from phonebook, from the phone log and manually. Hidden callers can also be blocked!
* Group filters allow you to apply the same blocking rules for all of your phonebook contacts, all contacts not in phonebook and hidden callers.
* Incoming calls (voice and video) are blocked with a busy tone. Messages (text messages, MMS and WAP push messages) are silently filtered with no sound or light indication.
* Details of each filtering rule allow you to fine-tune the blocking options for the selected contact(s) or text pattern – you can choose whether to accept or reject calls, SMS, MMS and WAP Push messages.
* Visual indicator on the stand-by screen monitors AB’s activity and shows you if there are new blocked calls/messages.
* Blocked History log shows you all new blocked events.
What can you block?
Advanced Blocker recognizes any type of incoming communication and will instantly and silently block events from blacklisted contacts or rules:
* Voice calls
* Video calls
* Anonymous calls
* SMS
* MMS
* WAP push messages
You can quickly create filter rules and effectively filter:
* Phone numbers – imported from the phone’s contact book, the phone’s log or entered manually
* Private/hidden/withheld numbers –calls from hidden or not identified numbers
* Phone number patterns – wildcard '*' pattern filter allows you to block out incoming calls beginning or ending with certain numbers e.g. international prefixes; * replaces arbitrary number of positions within phone numbers
* Messages containing a text pattern – text messages containing a predefined text word or phrase are automatically junked
* Groups of callers – all in phonebook, all not in phonebook, all numbers for which there is no filtering rule
Features and Advantages
Advanced Blocker seamlessly integrates with your phone and the standard phone software to ensure flawless performance and intact blocking of calls and messages.
Features include:
* Silent instant reject of all blacklisted numbers, number patterns and text rules
* Auto-start mode - option to automatically start-up AB after phone restart
* Blocking of fixed numbers or groups of numbers (wildcard * number filters)
* Discreet activity indicator on the phone’s stand-by screen
* Various contact import options – import from the phone’s log, from phone’s contact book, manual import
* Blocked history log for detailed history of filtered events
* Visual indicators providing instant overview of all new blocked events in the blacklist rules main screen
* Blocked messages can be easily viewed and restored
* Full reject entry log with details screen for each blocked event
* Customizable reject options for blacklisted contacts – you can select what kind of events to accept or reject from each number – calls, SMS, MMS, WAP push messages.
Take your time while Advanced Blocker takes care of your privacy!
Join our free sms group
Hackingheart in your mobile:-
Join our free IT sms group called hackingheart(1000 + members)and get news on latest hapning on IT,useful Softwares,cool,websites, security tricks etc on your mobile.
All r absolutely free!GUARANTEED TO MAKE U ROCK!!!
How to join?
To join the group type in
JOIN hackingheart
and send it to 567678
One time subscription of Rs 2.00 will b deducted for BSNL. Others
subscriber one time Rs 3 only.
There after no charge/no hidden cost. Just receive absolutely free sms.
If u have any difficulties/queries/doubts then call Abir, at 9434243285
Tuesday, December 29, 2009
Write for us
We invite all of you to write for this.
Send your original articles/tips/writings for this site to
with your name,address,profession, and contact details.
We will be very glad to publish your articles in our site.
So friends we are looking for your articles.
DISCLAIMER
Hackingheart is definitely not a site that promotes or encourages computer hacking (unethical), but rather it is a Computer Security related website. In fact, Computer Hacking and Computer Security are the two concepts that goes hand-in-hand. They are like the two faces of the same coin. So with the existence of close proximity between Hacking and Security, it is more likely that people often mistake my site to be that promotes Hacking. But in reality, our goal is to prevent hacking. We believe that unless you know how to hack (ethically), you cannot defend yourself from malicious hack attacks.
While using this site and reading various hacking tutorials, you agree to follow the below mentioned terms and conditions:
1. The site is totally intended for educational purpose and does not in anyway encourage hacking. The real purpose of this site as already stated is prevention from hack attempts.
2. The words "Hack" and "Hacking" should be taken or considered as "Ethical Hack" or "Ethical Hacking".
4. Any actions and or activities related to thematerial contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law. This site contains materials that can be potentially damaging or dangerous.If you do not fully understand something on this site, then GO OUT OF HERE!Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials.These materials are for educational and research purposes only.Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW! Neither administration of this server, the authors of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions.
5. I believe only in White Hat Hacking. On the other hand we condemn Black Hat Hacking.
Security
BitDefender
By-Abir atarthy
BitDefender Antivirus provides advanced protection against viruses, spyware, hacker attacks and data theft, without slowing down your computer.
- Anti
The module Anti - to ensure detection and removal of all viruses in circulation. BitDefender Internet Security uses robust scan engines, certified laboratory ICSA, Virus Bulletin, Checkmark, CheckVir and TUV.
- Firewall
The firewall module filters network traffic and controls when the user access to the Internet and permission to run applications. Stealth mode allows you to "hide" your computer from malicious software and hackers.
- Spam
BitDefender Internet Security will solve the problem of spam, and you will not worry about it.
- Anti-Spyware
BitDefender Internet Security monitors and prevents potential spyware infiltration of objects in real time, before they harm your system. Using an extensive database of known spyware signatures of objects, your computer is protected from spyware.
Download: http://www.bitdefender.com/
--------------------
ESET NOD32 Antivirus 4.0.474 (32bit-64bit)
NOD32 provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
Trojans, viruses, worms and other malware using NOD32 are kept out of striking distance of your valuable data. Advanced detection methods implemented in the software even provide protection against the future threats from most of the new worms and viruses.
The fourth generation of the NOD32 Antivirus System features a fully integrated software suite characterized by an unprecedented detection track record, the fastest scanning rates and extremely low utilization of system resources.
NOD32's detection efficiency combined with 2-50 times faster hard disk scanning rate earned the product many international prestigious awards.
NOD32 is the world leader of the Virus Bulletin 100% Awards having won more awards (21) than any competing product. Since its first submission for testing in May 1998, NOD32 was the only tested product that has never missed a single In the Wild virus.
Here are some key features of "ESET NOD32 Antivirus":
ThreatSense technology - a single optimized anti-threat engine for analyzing code to identify malicious behavior, such as viruses, spyware, adware, phishing and more
Unprecedented heuristic analysis capable of discovering new malware threats as they emerge
Powerful virtual PC emulation technology enables unpacking and decryption of all types of archives and run-time packing
Able to clean active malware running in memory
Protects at multiple infiltration points, including HTTP, POP3, SMTP and all local and removable media
Removes infections from files that are locked for writing (e.g., loaded DLL file)
Prevents infected files from being opened and executed, and warns on creation of infected files
Automatic execution on system startup
Supports multiple Terminal Server environments
Supports scanning of mapped network disks
System Requirements
Processor Architecture: i386(Intel 80386) AMD 64 (x86-64)
Operating Systems: Microsoft Windows 7/ 2000/ XP/ Vista
Memory: 44 MB
Disk-Space (Download): 28 MB
Disk-Space (Installation): 35 MB
What's new in ESET NOD32 Antivirus 4.0.474:
Fix: Scheduler task not displaying scan targets
Fix: Slow opening of Office documents from a Windows 2003 server share
Fix: Intermittent error when saving files on Windows 7
Other minor fixes and improvements
What's new in ESET NOD32 Antivirus 4.0.468:
Fixed: External driver injection in ESET SysRescue on Microsoft Windows 7 RC fails when this option is selected in the advanced mode of ESET SysRescue wizard
Fixed: Error sending a file via "Send to" in the right-click menu. The problem only occurs in combination of Microsoft Windows XP and Microsoft Outlook 2003 when the Microsoft Outlook process is not running.
Fixed: Mozilla Thunderbird with IMAP account freezes when a virus-laden message is received
Improved: Compatibility with server operating systems
Improved: HTTP scanning compatibility
Other minor fixes and improvements
ESET NOD32 Antivirus 4 (32-Bit)
Microsoft Windows 7/Vista/XP/2000
Version: 4.0.474, File size: 31.67 MB
ESET NOD32 Antivirus 4 (64-Bit)
Microsoft Windows 7/Vista/XP (64-bit)
Version: 4.0.474, File size: 34.55 MB
Download: www.eset.com
----------
Trojan Killer 2.0.5.9
Don't wait while trojans strike roots in your computer!Trojan Killer is a malicious computer software (malware) removal application. Samples of malware include various types of adware (displays unwanted advertising); spyware (may keep and send logs of your keyboard and mouse activity, such as credit card or personal identity information); hidden dialers (may initiate unsolicited phone call which then shows on your bill), and more.
If you are an active internet user, you should take steps to protect your sensitive personal information from possible cyber exposure. Trojan Killer will help you to timely identify and safely remove dangerous applications before it is too late. Don't wait while malicious programs strike roots in your computer. This application will prevent them from ever reaching your PC!
Download : http://www.softpedia.com/get/Security/Secure-cleaning/Trojan-Killer.shtml
--------
UnHackMe 5.0
UnHackMe - First BootWatch AntiRootkit! Now it is the must have tool for you!
UnHackMe is specially designed to detect and remove Rootkits (a new generation of Trojan programs - invisible Trojans). A rootkit is a program that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network. The intruder installs a rootkit on a computer using a user action or by exploiting a known vulnerability or cracking a password. The rootkit installs a backdoor giving the hacker a full control of the computer. It hides their files, registry keys, and process names, and network connections from your eyes.
Your antivirus could not detect such programs because they use compression and encryption of its files. The sample software is Hacker Defender rootkit. UnHackMe allows you to detect and remove Rootkits.
UnHackMe tested for removal all modern rootkits: Rustock, Haxdoor, Hacktool, Elite Keylogger etc.
Supported Windows NT4/2000/XP/2003/Vista. Compatible with all known antiviral software.
What's new in version 5.00 (December 22, 2008):
1. Enforcing Security.
2. UnHackMe executable files and drivers are signed by digital sign approved by Microsoft. "Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed by use of a cryptographic hash."
3. Compatibility. Resolved problem with crashing if a VISTA DEP is active for all applications.
Download: http://www.greatis.com/unhackme/