Tuesday, June 19, 2012

Windows 7 Activator + Loader Download



Activate Your Windows 7 OS From trial to genuine Version using the Activator or Loader..

Download The Tool given below..

Click Here to Download

Share your comments...

Monday, June 18, 2012

Vista, Server & Windows 7 Activation keys


######################################################
OS  |  Type   |  Brand  |  Key
######################################################
Vista|Ultimate|Acer|3YDB8-YY3P4-G7FCW-GJMPG-VK48C
Vista|Ultimate|Advent|39MVW-K8KKQ-BGJ9B-24PMW-RYQMV
Vista|Ultimate|Alienware|7QVFM-MF2DT-WXJ62-XTYX3-P9YTT
Vista|Ultimate|Asus|6F2D7-2PCG6-YQQTB-FWK9V-932CC
Vista|Ultimate|Dell|2QBP3-289MF-9364X-37XGX-24W6P
Vista|Ultimate|DixonXP|6JPQR-4G364-2B7P7-83FXW-DR8QC
Vista|Ultimate|Gateway|6P8XK-GDDTB-X9PJQ-PYF36-G8WGV
Vista|Ultimate|Hedy|7R2C3-DWCBG-C8G96-MPT8T-K37C7
Vista|Ultimate|HP|23CM9-P7MYR-VFWRT-JGH7R-R933G
Vista|Ultimate|Lenovo|24J6Q-YJJBG-V4K4Q-2J8HY-8HBQQ
Vista|Ultimate|OQO|C4QGV-XHYYT-9PW8R-DCFTQ-FBD6M
Vista|Ultimate|Toshiba|33G3W-JY3XQ-CQQ7C-TG96R-R6J6Q
Vista|Ultimate|Sony|2KKTK-YGJKV-3WMRR-3MDQW-TJP47
Vista|Business|Acer|2TJTJ-C72D7-7BCYH-FV3HT-JGD4F
Vista|Business|Asus|72PFD-BCBK8-R7X4H-6F2XJ-VVMP9
Vista|Business|Dell|368Y7-49YMQ-VRCTY-3V3RH-WRMG7
Vista|Business|Fujitsu|4C3CM-H3RXM-VBMVQ-K8RHX-RTFX8
Vista|Business|Gateway|9GK24-BJJPV-93JB4-9CD3T-QTHDD
Vista|Business|HP|2Q2WM-VCB98-8C6BG-C9BT2-3XDRY
Vista|Business|Lenovo|2YRV9-YCY3F-FRJ4T-BKD6B-C47PP
Vista|Business|MSI|2X4F8-Y4QGK-Y8RTT-CK6PB-M8X92
Vista|Business|OQO|KBK7F-XCVK4-9W477-GPFVC-YXFDM
Vista|Business|Sony|3W2Y2-GRRYB-VH76X-KPDXX-XFJ4B
Vista|Business|Toshiba|38MK6-4QYC6-GJQQX-9DYQ4-H9MQD
Vista|BusinessN|Acer|2434H-HFRM7-BHGD4-W9TTD-RJVCH
Vista|HomeBasic|Acer|2W7FD-9DWCB-Q9CM8-KTDKK-8QXTR
Vista|HomeBasic|Asus|762HW-QD98X-TQVXJ-8RKRQ-RJC9V
Vista|HomeBasic|Benq|7R997-DXYDR-YGCR3-RHVDP-T8TKX
Vista|HomeBasic|CHS|2QM7G-GTFJ4-2DTTG-R73YR-W3D8G
Vista|HomeBasic|Dell|3YMR2-WMV49-4WD8X-M9WM7-CH4CG
Vista|HomeBasic|Fujitsu|4G8P7-TVW66-Y3H3V-C4Q4J-CQR2B
Vista|HomeBasic|Gateway|7Q3BC-897QP-6HVMF-TTJ34-P92J4
Vista|HomeBasic|Gericom|MDRBF-FKHJB-6J8RV-P4GKQ-G6BR8
Vista|HomeBasic|Gigabyte|889T3-F4VGX-QK4V7-JH76R-3HHRC
Vista|HomeBasic|HP|2VX48-BVXT6-GD2PK-BD3R2-44MV3
Vista|HomeBasic|Ksystem-Irbis|J2QKK-V8M3X-WRPPT-FBW4B-FQ6FP
Vista|HomeBasic|Lenovo|2WP98-KHTH2-KC7KG-4YR37-H8PHC
Vista|HomeBasic|LG|6DT3K-TCY4G-Y2VK9-T8J3T-2RGT7
Vista|HomeBasic|Mecer|C3MXB-T6PGC-2M2XV-C6PRX-TPW79
Vista|HomeBasic|Medion|3XFY9-7GTXV-93RXP-V62MQ-84WP6
Vista|HomeBasic|NEC|2432B-Q9RGP-VT9CK-64JFP-X6XVT
Vista|HomeBasic|Packard Bell|4GW2B-QCB6W-BWTVG-2DDKY-KRDMH
Vista|HomeBasic|Rover|BMHBK-PJD8J-WDWGY-Q4D6Q-46YJP
Vista|HomeBasic|Samsung|27WDG-2G9G2-BTVMF-W4KCX-9F8PX
Vista|HomeBasic|Sony|4DWY4-M6VH9-Y6FX6-D2H3V-3PXM9
Vista|HomeBasic|Toshiba|4DV48-MFJR8-VRW92-3VTYM-HBTPB
Vista|HomeBasic|Trigem|2YY8K-6KVM4-3DTT6-XRFHK-RYYDG
Vista|HomeBasicN|Acer|22TC9-RDMDD-VXMXD-2XM2Y-DT6FX
Vista|HomePremium|Acer|2TYBW-XKCQM-XY9X3-JDXYP-6CJ97
Vista|HomePremium|Alienware|D9CRD-R8YYQ-VYG3W-YG4FK-2CXRF
Vista|HomePremium|Asus|8XPM9-7F9HD-4JJQP-TP64Y-RPFFV
Vista|HomePremium|Dell|4GPTT-6RYC4-F4GJK-KG77H-B9HD2
Vista|HomePremium|DixonXP|7VJMY-XWBMV-T3PCK-3FRWY-KKMRQ
Vista|HomePremium|Everex|BH3M9-MQPD8-PTPDK-T6DWK-B2XFW
Vista|HomePremium|Founder|C6KM8-8JDBT-QBRM8-2MGFH-XH7QY
Vista|HomePremium|Fujitsu|6M66G-C2BGD-XGBBV-2BHKV-C9KM3
Vista|HomePremium|Gateway|6DX2X-QR7XB-3RBY2-BGQ2R-DR9M6
Vista|HomePremium|HP|HW7V9-XYT4W-PFR9Q-2DKGJ-RR4TD
Vista|HomePremium|iQon|6R99P-3HY62-7XR3F-WGP2T-HKCB9
Vista|HomePremium|Kohjinsha|HRCXG-RQPBQ-YBP92-KFFRY-JKQQ3
Vista|HomePremium|Ksystem-Irbis|7QVBM-X4KG7-QCWDP-YC8PQ-PXKH8
Vista|HomePremium|Lenovo|34BKK-QK76Y-WWR7C-QF2M7-2TB37
Vista|HomePremium|LG|73JC4-PR3R6-9DKYC-FDG3K-3FTT3
Vista|HomePremium|Medion|4FG94-MMYPT-H2QD2-V4DCP-X7QB8
Vista|HomePremium|MeshPC|HR3TD-CH9JD-CT8WF-X948R-C3QR3
Vista|HomePremium|MSI|86C2J-2M84W-HBMRQ-GBJWJ-VPTRM
Vista|HomePremium|NEC|22CTR-JFKJJ-BMXQK-XKXBC-C8R98
Vista|HomePremium|Optima|863XK-7RW2B-6R8CR-4FYQV-3FTW8
Vista|HomePremium|Packard Bell|6PFJK-WKXQR-9Q27C-6CWD7-MQ3CQ
Vista|HomePremium|Paradigit|6DX4V-3CJX6-97XGD-KW4C2-PVRRK
Vista|HomePremium|Powerspec|CK82T-QVTHF-8HGMF-9F3G9-FJH92
Vista|HomePremium|Quanmax|88XKM-J69QV-VB9M9-QCM66-647KW
Vista|HomePremium|Samsung|2MQH8-77KBM-PRTT7-HVDWW-DCXVT
Vista|HomePremium|Sony|6JWV3-843DD-4GV68-6D8JB-G6MF9
Vista|HomePremium|Targa|6VJ7B-3KTJH-H3DDQ-7JD7G-26VMG
Vista|HomePremium|TCL|BH626-XT3FK-MJKJH-6GQT2-QXQMF
Vista|HomePremium|Toshiba|6DG3Y-99KMR-JQMWD-2QJRJ-RJ34F
Vista|HomePremium|Velocity|GCHCQ-WTYXJ-GDJBC-JYDCX-F9VXW
Vista|Starter|Acer|26VQB-RP3T9-63FVV-VD7RF-H7M2Q
Vista|Starter|Lenovo|23Q4W-YQPHY-TY89Y-7Q3VX-W72KT
Server|ServerEnterprise|Dell|BKCJJ-J6G9Y-4P7YF-8D4J7-7TCWD
Server|ServerStandard|Dell|D7TCH-6P8JP-KRG4P-VJKYY-P9GFF
Server|ServerWinFoundation|Dell|VMYRB-8BRVQ-KXWFF-334J3-F2WHJ
Server|SBS|Dell|76GGM-4MQ6T-XCJH9-6R2XQ-PW2D2
Server|Business|Dell|76GGM-4MQ6T-XCJH9-6R2XQ-PW2D2
Server|Enterprise|Dell|26Y2H-YTJY6-CYD4F-DMB6V-KXFCQ
Server|Standard|Dell|223PV-8KCX6-F9KJX-3W2R7-BB2FH
7|Ultimate|Acer|FJGCP-4DFJD-GJY49-VJBQ7-HYRR2
7|Ultimate|Alienware|VQ3PY-VRX6D-CBG4J-8C6R2-TCVBD
7|Ultimate|Asus|2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G
7|Ultimate|Dell|342DG-6YJR8-X92GV-V7DCV-P4K27
7|Ultimate|HP|MHFPT-8C8M2-V9488-FGM44-2C9T3
#7|Ultimate|Lenovo 2|22TKD-F8XX6-YG69F-9M66D-PMJBM
7|Ultimate|Lenovo|6K2KY-BFH24-PJW6W-9GK29-TMPWP
7|Ultimate|Samsung|49PB6-6BJ6Y-KHGCQ-7DDY6-TF7CD
7|Ultimate|Sony|YJJYR-666KV-8T4YH-KM9TB-4PY2W
7|Professional|Acer|YKHFT-KW986-GK4PY-FDWYH-7TP9F
7|Professional|Asus|2WCJK-R8B4Y-CWRF2-TRJKB-PV9HW
7|Professional|Dell|32KD2-K9CTF-M3DJT-4J3WC-733WD
7|Professional|Fujitsu|PT9YK-BC2J9-WWYF9-R9DCR-QB9CK
7|Professional|HCL|2QTV2-3CMPP-FQBYK-GRD62-D7XMW
7|Professional|HP|74T2M-DKDBC-788W3-H689G-6P6GT
7|Professional|Lenovo|237XB-GDJ7B-MV8MH-98QJM-24367
7|Professional|Samsung|GMJQF-JC7VC-76HMH-M4RKY-V4HX6
7|Professional|Sony|H9M26-6BXJP-XXFCY-7BR4V-24X8J
7|Professional|Toshiba|2V8P2-QKJWM-4THM3-74PDB-4P2KH
7|Professional|Wortmann|6JKVQ-WJTWW-JVPRB-77TGD-2DV7M
#7|Professional|????|862R9-99CD6-DD6WM-GHDG2-Y8M37
#7|HomePremium|Asus 2|7JQWQ-K6KWQ-BJD6C-K3YVH-DVQJG
7|HomePremium|Acer|VQB3X-Q3KP8-WJ2H8-R6B6D-7QJB7
7|HomePremium|Advent|38JTJ-VBPFW-XFQDR-PJ794-8447M
7|HomePremium|Alienware|V3Y2W-CMF9W-PGT9C-777KD-32W74
7|HomePremium|Asus|2QDBX-9T8HR-2QWT6-HCQXJ-9YQTR
7|HomePremium|Dell|6RBBT-F8VPQ-QCPVQ-KHRB8-RMV82
7|HomePremium|Fujitsu|C6MHH-TRRPT-74TDC-FHRMV-XB88W
7|HomePremium|HCL|39QDH-D7MHH-WDMTD-TM2R9-KM7DB
7|HomePremium|HP|4FG99-BC3HD-73CQT-WMF7J-3Q6C9
7|HomePremium|Lenovo|27GBM-Y4QQC-JKHXW-D9W83-FJQKD
7|HomePremium|LG|38GRR-KMG3D-BTP99-TC9G4-BBDJJ
7|HomePremium|Medion|2P2P9-CM3F8-FTV6P-PC7CX-8TFF7
7|HomePremium|MSI|4G3GR-J6JDJ-D96PV-T9B9D-M8X2Q
7|HomePremium|Packard Bell|VQB3X-Q3KP8-WJ2H8-R6B6D-7QJB7
7|HomePremium|Samsung|CQBVJ-9J697-PWB9R-4K7W4-2BT4J
7|HomePremium|Siragon|HWDFB-YVFG4-3TJ7F-Q3WMT-7B6PH
7|HomePremium|Sony|H4JWX-WHKWT-VGV87-C7XPK-CGKHQ
7|HomePremium|Toshiba|6B88K-KCCWY-4F8HK-M4P73-W8DQG
#7|HomePremium|Toshiba 2|6GF36-P4HWR-BFF84-6GFC2-BWX77
#7|HomePremium|????|2P2P9-CM3F8-FTV6P-PC7CX-8TFF7
7|HomeBasic|Acer|MB4HF-2Q8V3-W88WR-K7287-2H4CP
7|HomeBasic|Asus|89G97-VYHYT-Y6G8H-PJXV6-77GQM
7|HomeBasic|Dell|36T88-RT7C6-R38TQ-RV8M9-WWTCY
7|HomeBasic|HP|DX8R9-BVCGB-PPKRR-8J7T4-TJHTH
7|HomeBasic|Lenovo|22MFQ-HDH7V-RBV79-QMVK9-PTMXQ
7|HomeBasic|Samsung|2P6PB-G7YVY-W46VJ-BXJ36-PGGTG
7|HomeBasic|Sony|YV7QQ-RCXQ9-KTBHC-YX3FG-FKRW8
7|HomeBasic|Tongfang|9DBMT-GXRWM-6Q9Y3-WMYM8-FJCBW
7|HomeBasic|Toshiba|9H4FH-VD69Y-TGBD2-4PM4K-DRMMH
7|Starter|Acer|RDJXR-3M32B-FJT32-QMPGB-GCFF6
7|Starter|Asus|6K6WB-X73TD-KG794-FJYHG-YCJVG
7|Starter|Casper ERA|6PB94-MC2C6-4F37H-KTJ32-PF2PT
7|Starter|Dell|36Q3Y-BBT84-MGJ3H-FT7VD-FG72J
7|Starter|HP|RH98C-M9PW4-6DHR7-X99PJ-3FGDB
7|Starter|Lenovo|273P4-GQ8V6-97YYM-9YTHF-DC2VP
7|Starter|MSI|2W4DJ-JFFJV-DMCPP-2C3X8-883DP
7|Starter|Nokia|2XGHP-9TQK2-8CF28-BM2P2-8FRX8
7|Starter|Sony|32J2V-TGQCY-9QJXP-Q3FVT-X8BQ7
7|Starter|Toshiba|TGBKB-9KBGJ-3Y3J6-K8M2F-J2HJQ
7|Starter|Viliv|7W842-2HCPJ-BC3MJ-B79K6-TD2HQ

Share your Comments here.. 
Join our blog for mail updates..

Sunday, June 17, 2012

Prevent your website from SQL Injection vulnerability



MySQL Injection is a type of attack where an end user may hack your database from his browser itself. Here my main attempt will sql injection prevention.

What will be your SQL statement to retrieve a username and a password when we login to your website?

In most cases this will be like

 SELECT 1 FROM user WHERE username=’ABC’ AND password=’1234’; 

Now think if a user fills data something like this:
username=  ABCD
password=  ‘ or ’1′=’1

Now check your SQL query. It has changed now.
 
SELECT 1 FROM user WHERE username=’ABCD’ AND password= ’’ OR ‘1’ = ’1’ ;

Now with this query a user with an invalid username and without a password can make an unusual entrance to your private areas.

Before 2005 almost 50% website’s admin panel were hacked with this approach.
Even in 2012 it is still active and lots of websites are hacked. This is a simple example of SQL injections. There are lots of predefined SQL injection codes readily available online. You can create your own.

Even a normal internet surfer can break down your security with such a code.

To get rid of this issue we can make our Login QUERY statement something like this.
You need to make another function which will escape all the special characters form the user data if you are using PHP then you can use mysql_real_escape_string function which adds a backslashe to the following characters: \x00, \n, \r, \, ‘, ” and \x1a.

$query = sprintf("SELECT 1 FROM users WHERE user='%s' AND 
password='%s'",mysql_real_escape_string($user),mysql_real_escape_string($password));

However this will only save you from incorrect login but what if an authorized user is doing some trick to get additional things from your website.
I will suggest making a function which works globally throughout the website.
Like this one. The following codes let you discover the ways to get rid of every possible SQL Injection attack
.



Now we need to call check_form_submission in each form submission. Please try to understand the logic behind the code. It will check for all the GET and POST variables. You can modify the code accordingly to variable types. But this is OK at all. Let me know if you have discovered something or want to share your experience with me.

Here is a list of SQL Injection Strings you can try to test:
“1 OR 1=1″ 
“1\’ OR \’1\’=\’1″
“1\’1″
“1 EXEC XP_”
“1 AND 1=1″
“1\’ AND 1=(SELECT COUNT(*) FROM tablenames); –”
“1 AND USER_NAME() = \’dbo\’”
“\\\’; DESC users; –”
“1\\\’1″
“1\’ AND non_existant_table = \’1″
“\’ OR username IS NOT NULL OR username = \’”
“1 AND ASCII(LOWER(SUBSTRING((SELECT TOP 1 name FROM sysobjects WHERE xtype=\’U\’), 1, 1))) > 116″
“1 UNION ALL SELECT 1,2,3,4,5,6,name FROM sysObjects WHERE xtype = \’U\’ –”
“1 UNI/**/ON SELECT ALL FROM WHERE”
“%31%27%20%4F%52%20%27%31%27%3D%27%31″
“1′ OR ’1′=’1″  

Proxy lists for India



Proxy's for India-

Below you will find the list of proxy IP addresses and ports only


Proxy IPProxy port
                                                                 
202.65.158.179        8080
59.161.254.105        80
61.16.234.188        80
111.119.199.82         8080
118.91.234.77        8080
182.71.214.229        3128
202.129.240.37        8080
202.159.223.52        3128
202.164.53.124        8080
218.248.4.101        8080      














      

6 Ways to Protect Your Blog from being Hacked



1. Have Strong Passwords, and Change them Regularly-

The first step you should take to protect your blog from being hacked is to have a password that is very strong. You’ll be surprised at how simple the password some people use is, and they end up complaining when they’re hacked.

Make sure your password doesn’t contain your name, address, or even date of birth. Use something nobody can ever associate with you, and don’t ever talk about your password to anybody. Also make sure you change your password regularly; like every 3-6 months, and you will be able to protect yourself from being trailed by a hacker.

2. Have More than One Admin Account-

It could be 3 or more, and it could be only two. It is very important not to have just one admin account. The reason for this is that the first thing an hacker will do once they hack your blog is to change your details, and you can protect yourself by taking control through your other admin account.

Another thing you should realize is that this technique is just as dangerous as it is helpful, so make sure you prepare yourself for this; the more admin accounts you have on your blog, the more routes an hacker can take to get to you. To protect yourself from this, make sure the username and passwords for all your admin accounts are so unique and different, so that it will be difficult for any hacker to take control upon getting to your blog.

3. Install Plugin that Monitors Your Files and Notify You of Changes Immediately-

You can also tell your hosting to help you configure your server to notify you in case there is any change in any of your files at any time, or you can look for a plugin that makes this easy.

A lot of little changes happen to our blog every day, but the reality is that some of them shouldn’t be. It is important for you to make sure you don’t come to know about any of these changes lately, so make sure you regularly monitor your sever and wordpress installation for any changes.

4. Scan Every Theme and Plugin You Want to Install-


This is especially important if you download your themes and plugins from other websites online, or if you’re using cracked plugins and themes. You never know when a sleazy programmer will put a little code in your theme or plugin, or when that cracked software you’re downloading will be virus infected.
Don‘t just wait to get hacked before you realize this, so make sure you scan every theme and plugin you want to install on a regular basis; scan them with your own antivirus before you install them.

5. Back up Your Blog Regularly-

Don’t ever miss a day, because you never know when your blog will be hacked. One thing I have noticed in the hacking world is that, no matter how secure, there is nothing that cannot be hacked. Of course, you can invest time and effort into making your blog very secure, and you can even hire an expert to take care of this aspect. But the reality is, if a group of hackers dedicate their efforts to bring down your blog, it will only last a few hours at best.

The best thing to do in a situation like this is to back up your blog regularly. Have at least 2 plugins/
software that backs up your entire blog, and make sure you check regularly to ensure your files are properly backed up.

6. Use Different Passwords for Every Aspect of Your Website-

For every webmaster you can have up to 3 different username and passwords for your hosting, and these 3 passwords can make it easy for you to recover your website in the case that you’re hacked.

*. The first password is for your hosting account; where you can see tickets, pay for hosting, and change your Cpanel details.

*. The second password is for your Cpanel; where you can access various parts of your website and make changes directly to your blog.

*. The third password is for your wordpress installation in itself; where you can add new posts, reply to comments, create new accounts, and update your blog directly.

The deadliest mistake any blogger can make is to make all 3 passwords the same, and you can protect yourself to an extent by making these passwords different.

You should also make sure all 3 usernames are different, and try getting your web host to help you change your details from the default one to something more secure..
 
Share your Comments.. Join our Blog...

 
Design by Secure Hackers