Showing posts with label hacking tools. Show all posts
Showing posts with label hacking tools. Show all posts

Tuesday, April 2, 2013

UltraDefrag 6.0.1 "PORTABLE"


UltraDefrag is a powerful disk defragmentation tool for Windows. It is the first open source defragmenter with full support of system locked files defragmentation. Actually all files including registry hives and paging file can be processed by UltraDefrag during the Windows boot process.

Boot Time Defragmentation: This feature provides an ability to defragment any system files. Including page file, registry hives, hiberfil.sys file and many other files locked by the system or other applications when windows is fully running.
Fast Disk Optimization: The optimizer rearranges all data and places them to the beginning of the drive. In many instances we have found, that the system is more stable and performs a lot better under load, if data is placed at the beginning of the drive.
Single File and Folder Defragmentation: After UltraDefrag is installed you have the ability to select any file or folder and deframent it. This option is mostly useful, if you have recently installed an application or a game and would like to have it defragmented immediately for maximum performance.















DOWNLOAD PORTABLE

DOWNLOAD FULL

Thursday, March 14, 2013

New Pope 2013


Sunday, July 22, 2012

A message from Bill Gates


Bill Gates: I will always choose a LAZY PERSON to do a Difficult Job.. Because, He will find an easy way to do it.

Wednesday, July 18, 2012

Advance IP scanner + download

Advanced IP Scanner Is an Excellent Utility That Helps To Find All Local Network Devices


Do you want to find who is connected to your router? or  do you want to find out how many devices connected to you internet router? , well you can ping all IP address one by one or you can use this Advance IP scanner!.

Tuesday, May 15, 2012

Haktech: Blizzard still working on fixing Diablo III launch issues

If you have bought Diablo III and have experienced lots of downtime since the game's Battle.net servers were turned on less than 24 hours ago, you are most definitely not alone. The players of the action-RPG sequel from Blizzard have experiences lots of downtime from Blizzard's Battle.net servers as the development team tries to fix a number of issues that have cropped up since the launch earlier this morning.

The Battle.net forums tell the main tale. Blizzard has been performing "emergency maintenance" on the Battle.net servers in the Americas for a large fraction of the day. There's already been a few hours of downtime for the servers as Blizzard tries to fix "several issues that are impacting the game".

One big bug that has affected a few people is "Error 3006". As described on the official Diablo III forums, this happens when you give the Templar NPC, found in the Cathedral part of the game, a shield. In short, don't do it. Players have found that when this action happens, they are booted from the game and cannot sign back in.

Hopefully, Blizzard will fix this problems quickly. We will also point out that a lot of these issues may not have happened if Blizzard had not insisted on making people sign onto Battle.net to play Diablo III, even when playing the game in single player mode.

Sunday, May 13, 2012

Haktech: Yahoo CEO to reportedly resign thanks to incorrect resume [Update]





Yahoo CEO Scott Thompson will reportedly resign his position with the company, just a few months after the former President of PayPal was named to the top spot of Yahoo. Internet reports that officially, Yahoo will say Thompson is leaving for "personal reasons."

In reality, Thompson will depart thanks mostly to the reveal earlier this month that he did not have a computer science degree from Stonehill College, as his official bio at both Yahoo and previously at PayPal claimed. Thompson's false computer science degree was also listed as part of Yahoo's regulatory filings.

Thompson was named as CEO of Yahoo in January. In April, Thompson was still leading the company when it announced plans to lay off 2,000 workers. However, his leadership was called into question by Dan Loeb of Third Point, Yahoo’s largest outside stock holder.

It was Loeb who first revealed that Thompson did not have a computer science degree. Yahoo's board of directors called it an "inadvertent error" in Thompson's bio but Loeb kept up the pressure, later demanding that Yahoo's board turn over all documents relating to Thompson's vetting process.

It is expected that Yahoo’s head of global media Ross Levinsohn will take over leading the entire company on an interim basis.

Update - Yahoo has now made Thompson's resignation official, saying simply he has "left the Company." Ross Levinsohn has also been confirmed as interim CEO and Yahoo has also named Fred Amoroso as its new Chairman of its board.

Yahoo has also announced a settlement with Third Point which will have Loeb and two more Third Point team members named to Yahoo's board.

Wednesday, May 9, 2012

Download: Auslogics Duplicate File Finder

Helps you to find and remove useless duplicate files, stored
on your PC. By using this powerful yet free utility, you can
increase free space on your disk by up to 50%.

  •     Finds identical pictures, documents and any other files
  •     Compares files not only by names, but by their content
  •     Can significantly increase free space on your disk
  •     Helps you to organize your media collections
  •     Reduces time needed to defragment your hard drive


Download Here: Duplicate File Finder

Download: Geek Uninstaller 1.0.0.1

Standard removal program leaves tons of leftovers on your PC. GeekUninstaller performs deep and fast scanning afterwards and removes all leftovers. Keep your PC clean! Use Force Removal for stubborn and broken programs.

GeekUninstaller is a much faster and more powerful alternative to "Windows Add or Remove Programs" applet! It has very powerful features to uninstall and remove programs. It can effectively and thoroughly uninstall any program that the standard Windows Add/Remove Programs can't remove, remove all the leftover files and registry entries, and fix the program install/uninstall errors if anything found. GeekUninstaller has a simple and comprehensive interface that will quickly guide you through all its features.

Download: Geek Uninstaller 1.0.0.1 | 1.6 MB Freeware

Friday, April 20, 2012

Download: SC-KeyLog 2.25 - Key logger FREEWARE


SC-KeyLog is a powerful, invisible keylogger that captures user activity and saves it to an encrypted logfile.

Use this tool to: Find out what is happening on your computer while you are away, to maintain a backup of your typed data automatically, to spy on others or use it for monitoring your kids.

SC-KeyLog is highly customizable, easy to use and creates exceptionally small custom keylogger engines of only 40 KB in size! Create as many keylogger engines as you like and deploy them on remote systems with ease. An optional mailing feature allows you to automatically send the logfile to a specified email address on a user defined interval.

This stealth moniting application is designed for Windows 95, 98, ME, NT4, 2000, XP and 2003.

Tuesday, April 10, 2012

Haktech: FCC and carriers team up for stolen cell phone database

The Federal Communications Commission has teamed up with the largest wireless carriers in the USA to develop a database of stolen mobile phones, in an effort to curb theft of the gadgets, reports PC Magazine. AT&T, Verizon, T-Mobile and Sprint have pledged support to the FCC's effort, which is called the PROTECTS Initiative.

The PROTECTS Initiative will work like this when it launches within six months: owners of stolen cell phones will be able to call their provider and report their device as stolen, and then the carrier will lock the stolen device down and prevent it from being used. And within 18 months, stolen cell phones will be listed in a common database.

The FCC's initiative follows similar programs in the U.K. and other parts of the world, where those countries are already using databases of stolen devices to cut down on crimes related to cell phone theft. Julius Genachowski, chairman of the FCC, said at the Mobile World Congress in Barcelona this year that he saw such database programs working in those countries.

"With today's announcement, we're sending a message to consumers that we've got your back, and a message to criminals that we're cracking down on the stolen phone and tablet re-sale market and making smartphone theft a crime that doesn't pay," Genachowski said.

According to the FCC, about 40 percent of robberies in major cities like Washington, D.C. and New York City involve cell phones. Cell phone-related crime has gone up 54 percent since 2007 in Washington, D.C. alone.

Sunday, April 8, 2012

Haktech: Xbox LIVE Users Prefer Movies To Games

Xbox LIVE has a reputation of being the best console online gaming hub, but it seems that most customers are more interest in its media content than in its gaming capabilities.


According to Microsoft, users spend more than 50% of their Xbox LIVE time watching movies and listening to music rather than playing multiplayer games.

“What we're seeing is that people are turning on the Xbox to play games and then keeping it on afterwards to get other types of entertainment,” Microsoft's Interactive Entertainment Division SVP Yusuf Mehdi, told the Los Angeles Times.

Mehdi revealed that consumers spend an average of 84 hours per month on Xbox LIVE. For comparison, the average consumer watches TV for 150 hours per month.

Saturday, April 7, 2012

Haktech: NVIDIA’s Kepler Is Heading To ‘Superphones’

NVIDIA CEO Jen-Hsun Huang has sent an email to his employees suggesting that the company’s newly launched Kepler GPU might appear in smartphones soon.



“Today is just the beginning of Kepler,” the email reads.  “Because of its super energy-efficient architecture, we will extend GPUs into datacenters, to super thin notebooks, to superphones.  Not to mention bring joy and delight to millions of gamers around the world.”

Kepler is the GPU chipset that powers NVIDIA’s latest GeForce GTX 680 graphics card, a powerful beast that sits on top of the graphics performance charts with a breathe at the time of writing this piece.

Thursday, April 5, 2012

Haktech: U.K. Hacker Accessed Accounts for 20 Months Before Bust

CSO - The reassuring news in the UK this past week was that Edward Pearson, a 23-year-old hacker from York, was jailed for 26 months after stealing the personal information of bank card, credit card and PayPal customers .

Tuesday, April 3, 2012

Haktech: Permanent E-Ink Tattoos that Change with your Mood

E Ink Tattoos that Change with your Mood

Uses Safe Sub-dermal Implants!

How many people do you know who regret their tattoo? You grow up, you dump (or get dumped), or maybe you picked a tattoo "artist" that learned their craft in prison using ballpoint pens and a sharpened paper clip. At that point, your choices are: deal with it, get it covered up, or get shot with lasers to take it off. And nobody wants to go for a job interview only to be given the evil eye because you're a little more inked than the current employees! Body modification discrimination is a sad fact of life.

What do you do when you want a tattoo but don't want the commitment of permanent ink? The moodInq system is a breakthrough in tattoo technology, using a skin-safe proprietary E ink encapsulated pigment system that lasts a lifetime but can be configured to display any design (or none!) to suit your mood. So how does it work? We have partnered with leading physicians and technicians in the cosmetic surgery industry to implant the E ink grid, called a canvas.



 The canvas can go anywhere on your body and be configured to the size and shape of the body party you'd like to ink. After a short healing period (usually 2-3 days), you can begin using the moodInq software included with your kit to change your canvas to display the tattoo you desire!








(Important Note: What you are buying here is the moodInq Wand, software, and a 2-year membership to moodInq's tattoo art database. Your kit will come with a list of participating cosmetic surgery clinics. Tattoo canvas implantation prices vary by provider and canvas surface area desired.)












Product Specifications

  •     Proprietary E Ink programmable tattoo can be changed at will
  •     Great for those who don't want to commit to permanent ink
  •     Three steps:
  1.         Have E ink canvas implanted (through our partners in the cosmetic surgery industry)
  2.         Choose or design your preferred artwork
  3.         Run the moodInq Wand over the canvas - your tattoo appears!
  •     Your tattoo can be changed to any design in the moodInq database or with custom art
  •     Upload your own black & white or greyscale files: jpeg, gif, tiff, bmp, ai, eps, and pdf
  •     moodInq tattoos can even simulate greyscale using halftones
  •     IMPORTANT NOTE: Tattoo canvas implantation is a separate purchase.
  •     Kit includes:
  •         moodInq Wand
  •         Software (Mac and PC)
  •         2-year membership to moodInq's tattoo art database
  •     Patent Pending

More Details Here:

Haktech: Teacher aide fired for not providing Facebook password

The Facebook password saga appears to be continuing this week, after it was revealed that a school teacher's aide was fired last year for refusing to give her social networking password to her bosses.

It all seemed to unfold when the woman, named Kimberly Hester, comically posted in her spare time a picture of her with a co-workers pants and a pair of shoes, holding a caption saying “Thinking of you.” ZDNet reported that Hester was fired from Frank Squires Elementary in Cassopolis, Michigan after a parent saw the image on Facebook and made a complaint to the school.

Only in the past couple of weeks, Neowin reported a story of employers asking workers for their Facebook passwords and schools asking students to delete their profiles on the website. With Hester's legal battle ensuing though, she isn't giving up, saying "I did nothing wrong. And I would not, still to this day, let them in my Facebook. And I don’t think it’s OK for an employer to ask you."

There isn't much hope that she will succeed however, given that there isn't any law in the United States prohibiting employers to ask for access to their workers' Facebook accounts. The recent news coverage of the issue seems to have gotten law makers attention however, with proposals already in creation aimed at ending the password free for all.

Friday, March 30, 2012

Haktech:California loses data for over 800,000 people

California loses data for over 800,000 people

Losing your information can never be a good thing, but when it is the fault of an agency designed to keep your information safe, it is worse still. This nightmare has become a reality within the state of California. During a disaster preparedness exercise, the California Department of Child Support Services lost four storage devices. They're not sure where they lost them, either.

Physorg reported on the disastrous incident, which happened earlier this month, on March 12th. The department only acknowledged the issue on Thursday, March 29th. Somewhere between Boulder, Colorado, and Sacramento, these storage devices went missing, and there is every chance they could have fallen into the hands of individuals with malicious intent. These devices were in the possession of Iron Mountain and IBM when they went missing. Stored upon the devices is the following cheat-sheet to identity theft:

    Addresses
    Driver's license numbers
    Names of health insurance providers
    Employers for custodial parents
    Employers for non-custodial parents
    Children

You may be wondering why these devices were being moved. According to spokeswoman Christine Lalley of the Office of Technology Services, they were being sent to IBM as a disaster simulation. In the event of a disaster this was to discover whether IBM could run the Californian state's child support system remotely. Testing proved successful, and the cartridges were to be sent back. Iron Mountain provide secure transport for materials such as these for the state, barring one issue: they don't do flights. Incredibly, the data was sent through FedEx instead.

The current theory from which Lalley and the Office of Technology Services are working is that the container that these devices were stored in was not secure. Therefore, they must have fallen out... somewhere.

Those affected by the breach are advised to put a fraud alert on their credit cards, get copies of their credit reports, and take all other steps to protect their identities. On the plus side they have said that the incident will not have any impact on the processing of child support cases.

Tuesday, March 27, 2012

China: All your secret are belong to us!

We all know that China has trouble coming up with original ideas that don't involve oppression, but who knew that their blatant copying and bootlegging had gotten this bad? Richard Clarke, a former cybersecurity advisor who served under Ronald Reagan, George H.W. Bush, Bill Clinton, and George W. Bush told the Smithsonian that China has hacked into every major American company to steal their R&D.

Clarke, who runs a cybersecurity firm called Good Harbor nowadays, has been spreading some really interesting ideas to promote his new book, Cyber War. In the book, Clarke paints a pretty startling picture of the future of warfare and modern cybersecurity issues, like the Stuxnet worm.

“I'm about to say something that people think is an exaggeration, but I think the evidence is pretty strong: every major company in the United States has already been penetrated by China,” Clarke told The Smithsonian. It's the same with Britain, too. The really scary part is that it's not just consumer goods that they're targeting, but even military manufacturer. Chinese hackers already have information on the US' next generation fighter bomber, the F-35.

Even worse, important systems could easily be compromised by trojans and backdoors built into their Chinese components. “My greatest fear is that, rather than having a cyber-Pearl Harbor event, we will instead have this death of a thousand cuts. Where we lose our competitiveness by having all of our R&D stolen by the Chinese. And we never really see this single event that makes us do something about it.”

So, what do we do? Is it already too late? Clarke doesn't offer much in the way of solutions in the interview, other than noting that US cybersystems has strong offensive systems and a weak defensive structure. This is a man who knows what he's talking about (back in 2001, he tried – and failed – to warn the government that Al-Qaeda was planning a major attack on American soil), so it is worth listening to what he's got to say, even if he is trying to sell a book.

The Smithsonian sums up their interview pretty nicely:

    [We] left Clarke's office feeling that we are at a moment very much like the summer of 2001, when Clarke made his last dire warning. “A couple hundred people have labelled me as Cassandra,” Clarke says. “And I've gone back and read my mythology about Cassandra. And the way I read the mythology, it's pretty clear that Cassandra was right.”

Maybe it's about time the US government starts worrying about the threats other countries pose to it, and less about taking care of dinosaur industries that can't get people to keep them alive.

Tuesday, February 28, 2012

Lawmakers fear power grid could fall to cyber attack

House lawmakers said at a hearing Tuesday that they are worried that the country's electrical grid is vulnerable to a crippling cyber attack.

House lawmakers said at a hearing Tuesday that they are worried that the country's electrical grid is vulnerable to a crippling cyber attack.

"Ask any expert in the national security field and see what keeps them up at night. They would probably tell you, as they tell me, that it is the increased possibility of a devastating cyber attack," said Rep. Cliff Stearns (R-Fla.), the chairman of the Energy and Commerce Oversight and Investigations subcommittee.

"Imagine the impact of a cyber attack to the electrical grid: How many days could hospitals operate with on-site electricity generation? How would metro rail systems operate, if at all? How would we recharge our smartphones or access the internet?" he said.

Many electrical networks now operate on "smart grid" technology, which relies on computers to determine electrical needs. The technology is more energy efficient, but makes the systems vulnerable to cyber attacks.

Gregory Wilshusen and David Trimble, officials at the Government Accountability Office, testified that there is not a coordinated approach to developing cybersecurity standards and that electrical companies often do not share cybersecurity information.

When lawmakers pressed for information about how many cyber attacks there have been on electrical companies, the witnesses said there is no way to know because there is no official data collection.

Gen. Keith Alexander, director of the National Security Agency, said earlier this month that the hacker group Anonymous could have the capability to cause power outages through cyber attacks within a year or two.

The group has denied any intention of attacking the electrical grid.

The Senate is preparing to vote on a cybersecurity bill that would give the Homeland Security Department regulatory authority over companies with computer systems crucial to the nation's economic and physical security.

The bill would require that the companies take adequate precautions to safeguard their systems, and would increase information-sharing about cyberthreats between the private sector and the government.

Senate Majority Leader Harry Reid (D-Nev.) plans to bring the legislation straight to the Senate floor, skipping any committee markups.

Several leading GOP senators have argued that the legislation should be reworked in committee, but the bill's supporters say Congress must move quickly to address the threat of cyber attacks. The supporters note that Congress has been working on the cybersecurity issue for several years.

Cybersecurity legislation in the House has focused mostly on providing incentives for industry to share information on threats and attacks, rather than creating new regulatory powers.

Saturday, April 16, 2011

Decompile Visual Basic 6 programs with VB decompiler


Decompile Visual Basic 6 programs with VB decompiler!
now you can decompile .EXE with VB decompiler.



Decompile Visual Basic 6 programs with VB decompiler

Download Link 1

Tuesday, April 5, 2011

Recover (crack) password from Microsoft MDB (Access Database)



Ever wonder how to recover your ms access password? well at haktech we dont give you shitty information and guides like other website out there!. and we dont give you programs and software that you will need to purchase in order to work. there are lots of freeware you can use or alternatives that works the same way as the paid ones!.. just follow the video and download the password recover application so that you can recover your Microsoft Access Password.

 

DOWNLOAD

tags

Friend Connect