Tuesday, October 30, 2012

Unbeatable Deals on Sharp LC70LE734 LCD TVs !

Click this link to find these unbeatable deals! LC70LE734

#OpmaZYNGA : Anonymous leaked confidential documents from Zynga , key will be released on Nov 5

The Anonymous hacker group has claimed to have leaked confidential documents from the executives of Zynga . The key to the data files will be released on November 5. They have uploaded two files in multiupload. The first file has 36Mb and the second file is 412Mb. The message posted by the hackers: Zynga customers and Facebook users , We are anonymous . During the last few days anonymous has been targeting Zynga for the outrageous treatment of their employees and their actions against many developers . We have come to believe that this actions of Zynga will result in massive layoff of a thousand people and legal actions against everyone that speaks to the public about this plan. It will also come to end of the US game market as we know it as all this jobs will be replaced in other more convenient financial countries. With a billion dollars cash sitting in a bank we do believe that such actions are an insult to the population and the behaviour of corporations like Zynga must change. Anonymous could not allow this to happen so it's starting to release confidential documents we have leaked on this plan Hacker also said they are planning to release all the games they have taken from their servers for free. They've also leaked a small transcript from the confidential documents.

Friday, October 26, 2012

Anonymous November 5, 2012 video

Here is anonymous' video calling the people to arms to stand up and overtake our government on November 5, 2012

Top 15 Security/ hacking tools

1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source. Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results. Get Nmap Here 2. Nessus Remote Security Scanner Recently went closed source, but is still essentially free. Works with a client-server framework. Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. Get Nessus Here 3. John the Ripper Yes, JTR 1.7 was recently released! John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches. You can get JTR Here 4. Nikto Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired). Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those). Get Nikto Here 5. SuperScan Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan. If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice. Get SuperScan Here 6. p0f P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on: – machines that connect to your box (SYN mode), – machines you connect to (SYN+ACK mode), – machine you cannot connect to (RST+ mode), – machines whose communications you can observe. Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine. Get p0f Here 7. Wireshark (Formely Ethereal) Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later. Get Wireshark Here 8. Yersinia Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP). The best Layer 2 kit there is. Get Yersinia Here 9. Eraser Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License. An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass. Get Eraser Here. 10. PuTTY PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4x0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients. Get PuTTY Here. 11. LCP Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing. A good free alternative to L0phtcrack. LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack article. Get LCP Here 12. Cain and Abel My personal favourite for password cracking of any kind. Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. Get Cain and Abel Here 13. Kismet Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. A good wireless tool as long as your card supports rfmon (look for an orinocco gold). Get Kismet Here 14. NetStumbler Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving. NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses: Verify that your network is set up the way you intended. Find locations with poor coverage in your WLAN. Detect other networks that may be causing interference on your network. Detect unauthorized “rogue” access points in your workplace. Help aim directional antennas for long-haul WLAN links. Use it recreationally for WarDriving. Get NetStumbler Here 15. hping To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills. hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features. Get hping Here Yah I’ve stayed away from commercial products in this article, perhaps I’ll cover those another day. Digg This Article You can also check out the Top 10 Security Live CDs for Pen-Testing, Forensics and Recovery Here.

Friday, March 2, 2012

taly clashes video: Police battle rail protesters in Turin

press release from anonymous warning the media

To The Media, We are Anonymous. We have been watching those of you who call yourselves “The Media” with great disdain as you fail to meet our expectations at doing what the people demand, Reporting news. For too long the media has given power to those who do not deserve it and did not rightly earn it. By reporting about the luxurious lives of movie stars and billionaires, you have knowingly and carelessly given power to those who do not care about anything else but their own egotistical lives. By being exposed to such narcissistic and pompous behavior through the media, many have been brainwashed by your propaganda into believing that these insignificant and meaningless stories are news. We are here to say, no more. No more shall the media pick and choose what the people hear as news. No more shall we allow you to report on Whitney Hudson when Syrian rebels push towards a civil war. No more shall we allow you to report on Jeremy Lin when the tension in the Middle East is mounting. No more shall we allow you to report on the Kardashians’s marital problems, BeyoncĂ©’s baby drama, or Charlie Sheen’s drug problems when countries around the world are facing devastating financial bankruptcy. These Entertainment time-wasters have proven to be no more than a distraction to the people, as important news and headlines never get the justice they deserve. We are anonymous and we are here to say, you can no longer choose what is front-page material. Operation Occupy the Media is an ongoing operation supported by anonymous members all around the world to liberate the people from the distraction of major news media and the entertainment news that occupy the front pages of your websites, newspapers, and magazines. We shall be targeting all of your social media outlets and discussion boards to bring attention to actual issues that should be priority news. We will make it our duty to report the vital news while you, the ones in charge of informing the people, report on trivial, insignificant nonsense. We are tired of being misinformed by the media. We are tired of people having a deceiving sense of the word “Beautiful”. We are tired of the people focusing more on entertainment than their own rights and privileges which are being taken away slowly but surely. And we are tired of people having a false sense of priority through the reports by the media. Expect us media.

Tutorial on how to use LOIC DDos tool

Video to anonymous from anonymous

Hello, Anonymous. We are Anonymous. We direct this message to our self to clarify the importance that we do not allow ourselves to become tainted by personal distinction. Once an individual attempts to act as, or act for, the many, Anonymous is no longer the incoherent machine it is intended to be. There are no official messages from Anonymous. There are no official videos from Anonymous. There are no official representatives of Anonymous. There is no official gathering point of Anonymous. There is no official goal of Anonymous. Anyone attempting to modify these points does so to the detriment of the whole. Anonymous is not your personal army. One head lacks the power of many. One head is corruptible. One head is removable. Everyone's contribution is equal. Don't be a follower. Rely on the whole. Be part of the whole. Avoid the one.

Wednesday, February 29, 2012

School Shootings

We just had tragedy hit the heartland in the USA this past monday. Now me personally the 16 yr old boy who wreaked this havoc on our souls, our emotions, but most of all our serenity and peace of mind we once had about sending our young to school and taking for granted that when school is over, they will be coming through that front door with a big ole smile and hundreds of tales from that school that day. Parent's please pay close attention to your children if they show antisocial or violent or just losing interest in things that were once important to them. Then please ge them help. It could save my child and your children's lives one day.

Tuesday, February 28, 2012


https://www.evernote.com/shard/s176/sh/a04cd774-6c4c-4f2f-b78a-dae71275e62e/8a06a0ad566da57e9d76a09ae9a4c433

Sent from my Cricket mobile device

Thursday, February 23, 2012


https://www.evernote.com/shard/s176/sh/76162ad7-1043-40e1-ae36-c22cfbfe7cc1/d7e50cfc79c8716425b0fbb372b02b0f

Sent from my Cricket mobile device


https://www.evernote.com/shard/s176/sh/d5b65631-1a62-4535-b6e4-ecccdf71eed5/b1a74cc91e76a98502ad4f22db925669

Sent from my Cricket mobile device

Wednesday, February 22, 2012


https://www.evernote.com/shard/s176/sh/93c30684-db3b-4b56-bda6-45b7ece1c178/5fab188ff710e719bdb8c1501f57b0e1

Sent from my Cricket mobile device

Tuesday, February 21, 2012



Sent from my Cricket mobile device


http://www.cbc.ca/news/canada/story/2011/11/23/mask-bill-309-riot.html

Sent from my Cricket mobile device


http://parl.gc.ca/HousePublications/Publication.aspx?Language=E&Mode=1&DocId=5151861&File=30#2

Sent from my Cricket mobile device


http://parl.gc.ca/LegisInfo/Search.aspx?Language=E&Mode=1

Sent from my Cricket mobile device


Anonymos tennessee groupon facebook also just request to join.

Sent from my Cricket mobile device


Got LOIC? Then lets ddos. :)

Sent from my Cricket mobile device

VOGH: VOICE OF GREYHAT| HACKING NEWS| SECURITY NEWS| CYBER SECURITY| HACKER NEWS: Iran Preparing Stronger Cyber Defense

VOGH: VOICE OF GREYHAT| HACKING NEWS| SECURITY NEWS| CYBER SECURITY| HACKER NEWS: Iran Preparing Stronger Cyber Defense

Monday, February 20, 2012






Anonymous Tennessee

A lot of us here in Tennessee support the anonymous movement. we believe in freedom of speech and freedom of expression. We believe we should have a free internet. we should all pull together to protect our god given rights and the god given rights of our brother and sisters around the globe