Friday, December 28, 2007

Windows Home Server - 27th November Update

After installing the November update you will notice that your network health turns red on your home server. With the November update, you can now get a trusted SSL certificate for your .HomeServer.com domain name. If you have already set up remote access, you will need to quickly unconfigure your existing domain name and re-run Setup to acquire an SSL certificate for your HomeServer.com domain name.



How to turn on back Windows Live domain?
- To reconfigure your domain name, open your Windows Home Server Console and click the Settings button.
- Once the Settings are open, click the Remote Access.
- As you can see, the Domain Name Status still informs you that it is working. Your Remote Access page should still be viewable away from your home. However, a trusted SSL certificate has not been setup as the earlier Network Health notification informed you.
- To complete the setup, click the Unconfigure button. After clicking the Unconfigure button, it will change to a Setup button. Click the Setup button to install a trusted SSL certificate for your HomeServer.com domain name.
- Once the Setup button has been clicked, the Domain Name Setup Wizard will open. Click the Next button to continue.
- The Domain Name wizard will ask you to verify your Windows Live ID that you previously used to setup your personalized HomeServer.com Domain. Type in your Windows Live E-mail Address and Password and click Next.
- The Domain Name wizard will display all registered names linked to your Windows Live account that you just entered. Select the correct domain name and click Next.
- Click Done.

Your Domain Name Status should display Working if you have followed these steps.

Windows Home Server corrupts files

When you use certain programs to edit files on a home computer that uses Windows Home Server, the files may become corrupted when you save them to the home server.

Several people have reported issues after they have used the following programs to save files to their home servers:
- Windows Vista Photo Gallery
- Windows Live Photo Gallery
- Microsoft Office OneNote 2007
- Microsoft Office OneNote 2003
- Microsoft Office Outlook 2007
- Microsoft Money 2007
- SyncToy 2.0 Beta

Friday, December 7, 2007

Researchers hack and crack Microsoft wireless keyboards

Weak encryption used by Microsoft Corp.'s wireless keyboards can be cracked in a matter of moments, a pair of Swiss security researchers said yesterday. Giving hackers a way to snatch passwords and financial account information in real-time and from a distance away.

Max Moser and Philipp Schrodel, of the Swiss security company Dreamlab Technologies AG, cracked the one-byte encryption key used by Microsoft's Optical Desktop 1000 and 2000 keyboards, Moser said, then eavesdropped on keystroke traffic using an inexpensive radio receiver and a few inches of copper wire. "All we need is about 30 characters," Moser said, referring to the number of keystrokes necessary for analysis, "and we can decipher the text."

Armed with a radio receiver that costs less than $80 and a copper-wire antenna, Moser and Schrodel were able to sniff out and pull in wireless signals between keyboards and computers from as far away as 33 feet. Walls and windows were no obstacle. "You could sit in a car across the street from an office," said Moser, "and point the antenna at a building on the other side of the street." With a longer antenna -- perhaps hidden inside a larger vehicle, such as a truck -- the range could be boosted to more than 130 feet.

Once the data packets transmitted from keyboard to computer have been pinched, it's a simple job to crack the code. Microsoft's wireless keyboards use a one-byte encryption key that provides only 256 possible key values for each keyboard and its associated receiver, the part that plugs into the PC. "We try every one of those for each keystroke, and then compare them to wordlist in combination with a weighted algorithm," said Moser. "It only takes about 30 keystrokes to recover the encryption key."

From there, anything typed on the hacked keyboard shows up in a separate window in the sniffer/decoder software the two researchers crafted. They were even able to grab keystrokes from multiple keyboards simultaneously, with each keyboard's results appearing in a separate window.

Thursday, December 6, 2007

Gates: Next IE to be IE8

Bill Gates confirmed that Microsoft will call its next browser Internet Explorer 8, though Microsoft isn't sharing much else, such as the obvious questions: When will it arrive and what features will it have?

The confirmation came during his speech at the "Mix and Mash" conference taking place this week in Redmond, Wash. In a posting on the IE blog, Microsoft general manager Dean Hachamovitch jokes about some of the names Microsoft ruled out, such as "IE 7+1" and "IEVIII."

But, seriously, folks don't care about the name. They care about features and timing. Don't you guys agree with me?

LogMeIn releases remote control for Macs

LogMeIn has began offering a version of its remote-access service for Mac users. Once installed, LogMeIn Free for Mac allows a computer to be controlled from another computer via a Web browser.

The company is also releasing a beta version of LogMeIn Rescue for Mac for support technicians performing long-distance control and repair.

Both new LogMeIn tools work with Macs running OS 10. 4 Tiger and 10.5 Leopard operating systems. Users can access their Macs from browsers on computers running Windows, Mac, and Linux operating systems, as well as on the iPhone and other compatible handhelds.

For all the LogMeIn supporters, this is a great news especially to those who have Mac at home or at work.

Wednesday, December 5, 2007

Windows DNS Flaw Is Back

Microsoft said Monday that a flaw in the way its Windows operating system looks up other computers on the Internet has resurfaced and could expose some customers to online attacks.

The flaw primarily affects corporate users outside of the United States. It could theoretically be exploited by attackers to silently redirect a victim to a malicious website.

Microsoft originally patched this flaw in 1999, but it was rediscovered recently in later versions of Windows and was then publicized at a recent hacker conference in New Zealand.

The bug has to do with the way Windows systems look for DNS (Directory Name Service) information under certain configurations.

Any version of Windows could theoretically be affected by the flaw, but Microsoft issued an advisory Monday explaining which Windows configurations are at risk and offering some possible workarounds for customers. The company said it is working to release a security patch for the problem.

Here's how the attack would work: When a Windows system is specially configured with its own DNS Suffix it will automatically search the network for DNS information on a Web Proxy Auto-Discovery (WPAD) server. Typically this server would be a trusted machine, running on the victim's own network.

WPAD servers are used to cut down on the manual configuration required to get Windows systems working on the network. DNS suffixes are used to associate computers with certain domains of the network and to simplify administration.

To make it easier for the PC to find a WPAD server, Windows uses a technique called DNS devolution to search the network for the server. For example, if an IDG PC was given a DNS suffix of corp.idg.co.uk, it would automatically look for a WPAD server at wpad.corp.idg.co.uk. If that failed, it would try wpad.idg.co.uk and then wpad.co.uk. And that's where the problem lies: by looking for DNS information on wpad.co.uk, the Windows machine has now left the IDG network and is doing a DNS look-up on an untrusted PC.

This flaw only affects customers whose domain names begin with a "third-level or deeper" domain, meaning that even with the DNS suffix, users on networks like idg.com or dhs.gov are not affected.

Attackers who registered "wpad" domains within second-level domains such as co.uk or co.nz could redirect victims to malicious Websites without their knowledge, something called a "man in the middle" attack. A victim might think he was visiting his bank's Website, but in reality, he could be sent to a phishing site.

Sunday, December 2, 2007

18SX USB thumb drive

Check out this very cool, cute and funny USB thumb drive (also known as pen drive). Hope everyone enjoying this video clip.

New variant of MSN worm found!

This week a new variant of MSN worm was found! MSN Cleaner doesn't really works anymore. For those who using MSN/Windows Live Messenger, please take note of this.

I tested and MSN Cleaner did not managed to detect the main host file. MSN Cleaner only managed to clean the so called ‘spreading’ files which usually detect as imageXX.zip.

Finally, I have to use Hijackthis to scan and remove it.

Friday, November 23, 2007

Mac OS X v10.4.10 Tiger for PC x86

One of the most perfectly compiled OSx86 installation DVD. Comes with a big set of drivers (use with caution!). Intel Core 2 Duo processor was highly recommended.

For compatibility, issues and new drivers go to wiki.osx86project.org.


Download:
http://rapidshare.com/files/68108633/MOXV10410T4PCX86_www.Gold4Rum.net.part01.rar
http://rapidshare.com/files/68108294/MOXV10410T4PCX86_www.Gold4Rum.net.part02.rar
http://rapidshare.com/files/68108676/MOXV10410T4PCX86_www.Gold4Rum.net.part03.rar
http://rapidshare.com/files/68108447/MOXV10410T4PCX86_www.Gold4Rum.net.part04.rar
http://rapidshare.com/files/68108514/MOXV10410T4PCX86_www.Gold4Rum.net.part05.rar
http://rapidshare.com/files/68108661/MOXV10410T4PCX86_www.Gold4Rum.net.part06.rar
http://rapidshare.com/files/68108565/MOXV10410T4PCX86_www.Gold4Rum.net.part07.rar
http://rapidshare.com/files/68108273/MOXV10410T4PCX86_www.Gold4Rum.net.part08.rar
http://rapidshare.com/files/68108577/MOXV10410T4PCX86_www.Gold4Rum.net.part09.rar
http://rapidshare.com/files/68108571/MOXV10410T4PCX86_www.Gold4Rum.net.part10.rar
http://rapidshare.com/files/68108629/MOXV10410T4PCX86_www.Gold4Rum.net.part11.rar
http://rapidshare.com/files/68108572/MOXV10410T4PCX86_www.Gold4Rum.net.part12.rar
http://rapidshare.com/files/68107460/MOXV10410T4PCX86_www.Gold4Rum.net.part13.rar

Microsoft Windows.XP SP3 Build.3244 RC1 leak out

Some tester leak out the soon to be release SP3 for Windows XP. For those who like to try it out. Download at following link below:

http://rs43.rapidshare.com/files/70737909/mwxpsp33244brc1.part1.rar
http://rs242.rapidshare.com/files/70742604/mwxpsp33244brc1.part2.rar
http://rs246.rapidshare.com/files/70747499/mwxpsp33244brc1.part3.rar
http://rs69.rapidshare.com/files/70750261/mwxpsp33244brc1.part4.rar

Myself have tested it and it work great.

Wednesday, November 21, 2007

Nero 8 Retail version

Nero 8 now available on market. Nero has even release the update for Nero 8 already.

Something important to share with everyone before you install Nero 8. Please go to Nero website and download and run the Clean Up tool (if you installed Nero 7 before, download the Clean Up tool for Nero 7).

Then go to this location in registry:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager

And delete this registry key:
PendingFileRenameOperations

Then now you can try install Nero 8.

By the way, here is the location you can download Nero 8 retail version:
http://rapidshare.com/files/58156906/Nerov8Recm.part01.rar
http://rapidshare.com/files/58161594/Nerov8Recm.part02.rar
http://rapidshare.com/files/58166428/Nerov8Recm.part03.rar
http://rapidshare.com/files/58171411/Nerov8Recm.part04.rar
http://rapidshare.com/files/58176517/Nerov8Recm.part05.rar
http://rapidshare.com/files/58181479/Nerov8Recm.part06.rar
http://rapidshare.com/files/58186572/Nerov8Recm.part07.rar
http://rapidshare.com/files/58191531/Nerov8Recm.part08.rar
http://rapidshare.com/files/58196351/Nerov8Recm.part09.rar
http://rapidshare.com/files/58199818/Nerov8Recm.part10.rar

Password: when Myth meets a Myth!


Good luck!

Tuesday, November 6, 2007

L.ROOT-SERVERS.NET server changed IP address

DNS name servers that don't forward their requests to other DNS servers, need to know some of the IP addresses of the root name servers in order to find their way to the rest of the information. They either have this knowledge built-in or use an external file containing an initial mapping.

The L.ROOT-SERVERS.NET root name server changed its IP address, and hence some updating to the hints could be useful.

Getting an up to date file:
ftp://ftp.internic.net/domain/named.root
  • $ dig @A.ROOT-SERVERS.NET. . ns > root.hint
  • Windows based DNS setups can update it by running the "Configure a DNS Server" wizard and selecting "Configure root hints only".

Consider it an opportunity to verify your name server software is up to date on patches and perhaps to learn a few interesting bits on how the DNS system works.

Monday, September 17, 2007

Turn on Hidden ADMIN account in Vista

Not many people know that Vista has a hidden super user account. I will show you how to activate this Vista Administrator account.

Activate it and it will be very useful just in case something happen to your user account or your cannot login to your user account.
  • Click on Start.
  • Type in cmd in Start Search box and press ENTER.
  • Type in Net user administrator activate:yes and press ENTER.

You're done.

Vista RATING hack

I found this from someone. Very cool Vista RATING hack.

TRY AT YOUR OWN RISK

Navigate to C:\Windows\Performance\WinSAT\DataStore\xxxx-xx-xx xx.xx.xx.xxx Assessment.WinSAT.xml.

Open it with notepad. Approximately one 'paragraph' down, you will see listings between the 'winspr' tags.

These listings include 'system score', 'memoryscore', 'cpuscore', 'cpusubaggscore', 'videoencodescore', 'graphicsscore', 'gamingscore', and 'diskscore'.

Simply change the value that appears between the opening and closing tags.

Changing your graphics score to be over 3.0 allows you to have themes for the photo screensaver.

Other effects are still unknown.

You won't be able to "Save As" with notepad so create the file in another directory then overight the original.

REMEMBER: Make a BACKUP copy of the original "Assessment.WinSAT.xml" before you overwright it.

Cheers guys!

Wednesday, September 12, 2007

Vista product key leaked

A list of Windows Vista product key on the leaked in internet. The list now available for download thru some website.

If you suddenly cannot login into Windows and stuck at the screen they asking you to enter new product key. Please contact Microsoft soon to retrieve back your product key.

Pykspa worm

Pykspa worm has becoming very popular now. Pykspa worm is a worm that spreads via Skype. Yes, believe it or not. Now Skype is no longer safe.

Here was the screenshot:

I found out that MyITLab.net was the first Malaysian forum to have the removal instruction. To learn more about it, please visit the following link:
http://www.myitlab.net/index.php?showtopic=1068&view=findpost&p=6559

Sunday, August 26, 2007

Windows XP Validation Crack

1. You run Windows Validation Crack.exe.


2. You click APPLY and wait, this screen will appear:


3. Validation complete!

Windows XP 30 days Trial Crack

Please download the crack here.

Extract it into a folder.

1. First you run Activate.exe:


2. Then click on YES and you will see the following screen:


3. Then you see this that your version is activated:

Just transfered!

Hello everyone. Thanks for visiting to my blog. I was moving over from my old blog http://h3xc0d3.zeroblogs.com/ to this new blog.

I really appreciate all the support for you guys! Thank you!