22 Apr 2010

Download Harvest Moon: Back to Nature (Theme Song)


Hi bloggers, I have something interesting that you might like. I just got Harvest Moon Back to Nature Original Theme Song and ringtones and I want to share it with you guys. You must know Harvest Moon. It is a famous RPG Game for Play Station. There are about 22 theme songs here. I hope you enjoy it. Just download the songs on the link below:

Title
Opening 1
Opening 2
Opening Music Box
Opening Boy and Girl Singing
Spring
Summer
Fall
Winter
Festival Fun
Festival Contest
Judging
Minigame
Minigame Horse Race
Town
Karen's theme
Popuri's theme
Ann's theme
Mary's theme
Ellie's theme
Ending


And also you got a bonus here. Get free Harvest Moon Back to Nature Ringtones:

Ringtone 1
Ringtone 2

That's all the download link I can share to you. I hope you enjoy it.

18 Apr 2010

Privacy-related changes coming to CSS :visited

Privacy-related changes coming to CSS :visited
For many years the CSS :visited selector has been a vector for querying a user’s history. It’s not particularly dangerous by itself, but when it’s combined with getComputedStyle() in JavaScript it means that someone can walk through your history and figure out where you’ve been. And quickly – some tests show the ability to test 210,000 URLs per minute. At that rate, it’s possible to brute force a lot of your history or at least establish your identity through fingerprinting. Given that browsers often keep history for a long time it can reveal quite a bit about where you’ve been on the web.
At Mozilla we’re serious about protecting people’s privacy, so we’re going to fix this problem for our users. To do so we’re making changes to how :visited works in Firefox. We’re not sure what release this will be part of yet and the fixes are still making their way through code review, but we wanted to give a heads up to people as soon as we understood how we wanted to approach fixing this.
These changes will have some impact on web sites and developers, so you should be aware of them. At a high level here’s what’s changing:

  • getComputedStyle (and similar functions like querySelector) will lie. They will always return values as if a user has never visited a site.
  • You will still be able to visually style visited links, but you’re severely limited in what you can use. We’re limiting the CSS properties that can be used to style visited links to color, background-color, border-*-color, and outline-color and the color parts of the fill and stroke properties. For any other parts of the style for visited links, the style for unvisited links is used instead. In addition, for the list of properties you can change above, you won’t be able to set rgba() or hsla() colors or transparent on them.
These are pretty obvious cases that are used widely. There are a couple of subtle changes to how selectors work as well:
  • If you use a sibling selector (combinator) like :visited + span then the span will be styled as if the link were unvisited.
  • If you’re using nested link elements (rare) and the element being matched is different than the link whose presence in history is being tested, then the element will be drawn as if the link were unvisited as well.
These last two are somewhat confusing, and we’ll have examples of them up in a separate post.
The impact on web developers here should be minimal, and that’s part of our intent. But there are a couple of areas that will likely require changes to sites:
  • If you’re using background images to style links and indicate if they are visited, that will no longer work.
  • We won’t support CSS Transitions that related to visitedness. There isn’t that much CSS Transition content on the web, so this is unlikely to affect very many people, but it’s still worth noting as another vector we won’t support.
We’d like to hear more about how you’re using CSS :visited and what the impact will be on your site. If you see something that’s going to cause something to break, we’d like to at least get it documented. Please leave a comment here with more information so others can see it as well.

How to Crack Windows passwords

What is Rainbow Crack and How to do it: The Time-Memory Tradeoff Hash Cracker : 
How to Crack Windows passwords
This article has been posted by our fellow members Mr.Amey Anekar, Mr.Rahul and Mr Sachin.

Before going ahead with the discussion let us first explain to you why it is so difficult to crack windows passwords.

Windows uses NTLM, LM or MD5 algorithm to encrypt the plain text passwords and saves it in system32/config folder. The encrypted passes that are saved in the SAM file under system32/config are called hashes. Now dont just browse the SAM file and attempt opening it. It's useless doing this under windows. Even if you get to open this file using another OS eg. a live linux distro, you need the keyhive, coz the SAM file is further encrypted with it's key in the 'system' under the same dir as SAM.

The algorithms NTLM, LM or MD5 are not proprietary. So the first thing you might think is, WOW!! then just get the hashes apply the reverse algorithm on them and recover the password. But it's not so easy smart ass. Read further.

Common features of NTLM, LM and MD5 algo:
  1. The hashes once formed it is computationally infeasible to recover the original string from the cipher. In layman's lang, the algorithm is irreversible.
  2. No two strings can ever have the same hashes.
  3. A minor change in the string causes a considerable change in the hash. This is known as avalanche effect.
So when you login to your box and enter the password, the password you entered gets encrypted in one of the forms above and then the so formed hashes are compared to the saved hashes and if they match you are allowed into the system. So from this you can know that even your computer is not aware of your real password.

The passes of your email accounts are also stored in the similar fashion. That's the reason when you say you forgot your password, the website resets your password and cant show you your original password coz even they dont know it. Click the link below to read the rest of the post.

So the only way to crack the hashes is using brute-force. This is where rainbow tables come into the scene. Rainbow tables sound fancy but are very simple to understand. Rainbow tables are a collection of strings and their relative pre-compiled hashes. Each of the hash in the rainbow table is checked with the original hash and one which matches has it's corresponding string as the password. Sounds complicated?? Don't worry script kiddies. Hacktivism has already binded all that you need to crack these hashes.

One of the most widely used tools for hash cracking is Rainbow Crack. You can download it from http://project-rainbowcrack.com or if you are using backtrack, it is already installed.

Well rainbow crack takes hashes as inputs. So first you have to extract those hashes from the SAM file. Now we assume that you are using BackTrack 4. If you are not, download it and then come back.

In backtrack to make things easy, go to the media where windows is installed, browse to the WINDOWS/System32/config folder and then copy the SAM and system file and place it on the desktop.

Open the terminal and type the following command:

samdump2 SAM system

This will give the following output
Now copy the part which shows all the accounts and their respective hashes and save them in a file, say, hashes.txt

Now you can either use rainbowcrack, john the ripper or ophcrack.

To use rainbowcrack you need the appropriate raindow tables. These rainbow tables are very huge, sometimes ranging in GBs. So they are bulky to download. Alternately, you can make your own Rainbow Tables using RTGen (more on this in the next post) but you can consider downloading some light-weight RT until then.

Download RT from

To start cracking place the downloaded RT in /pentest/passwords/rcrack

Syntax for cracking hashes using rcrack. Go to the BackTrack Menu>Privilege Escalation>Password Attacks>Offline Attacks>Rainbow Crack

Now type

./rcrack rainbow-table-name -f hashes.txt

It may take a long time before finding the correct hash and the corresponding pass. So take a nap and come back...

If you want an easier but less effective way of cracking windows passes refer this post

This post may not be up to the mark, but this is how things are. The methodology can get better. You have to figure out ways to allay the steps. If you want to be a hacker, there is no spoon feeding. So research is the only way to successful hacking.

Happy Hacking!!!

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

How to Make a Flash Disk Become Bootable with UNetbootin

This mode is useful when the optical cd / dvd drives laptop / computer is not working properly, you can use UNetbootin as an alternative. From the name means The Universal Netboot Installer UNetbootin. This allows you to create a Flash Disk or Hard Disk to be bootable, so you can use a flash disk as a replacement CD. This method is usually used if you want to install the OS or a virus scan of the boot.

Before using UNetbootin, you should check first whether your motherboard BIOS supports booting from external drives like flash disk or not. Because if ya ga ga can support.

UNetbootin can run in Windows and Linux OS, download the following address:

    * For Windows: http://unetbootin.sourceforge.net/unetbootin-windows-latest.exe
    * For Linux: http://unetbootin.sourceforge.net/unetbootin-linux-latest

Once you've downloaded, open the UNetbootin application, and the image appears as follows:

Of the three options above there are 3 options, namely:

    * The first option (most of), which is used if you want to download directly from the Internet and directly in the process. First select the distribution first, then select the version. Current distribution which can be downloaded directly are: Arch Linux, Backtrack, CentOS, Clone Zilla, Damn Small Linux, Debian, Dreamlinux, Dr. Web Antivirus, Elive, Fedora, FreeBSD, Frugalware, F-Secure Rescue CD, Gentoo, gNewSense, Gujin, Kaspersky Rescue Disk, Kubuntu, Linux Mint, Mandriva, MEPIS, NetBSD, NTPasswd, openSUSE, Ophcrack, Parted Magic, PCLinuxOS, Puppy Linux, Sabayon Linux, Slax, SliTaz, Smart Boot Manager, Super Grub Disk, Super Ubuntu, SystemRescueCd, Ubuntu, xPUD, Xubuntu, Zenwalk.
    * Option two, which you should have files. Iso it, so you can download the manual from the internet, or make an iso file with nero on another computer, or ask a friend ^ ^. Mentargetgat where the files you live. Iso is located.
    * Third Option (the bottom), was used for the advance, we can configure their own kernel, the initrd itself, and other options.

Then select the USB Drive when you use the Flash Disk, or select the Hard Disk when using the Hard Disk. And select the drive - his. Then select OK. And looks like the image below in
Once completed, restart your computer. And go into the BIOS with press F2, then the Boot menu choose USB Drive as the Boot priority, save and exit.
Flash Disk and now you've become a bootable .. ^ ^