All Stories
Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts


what is os x lion ?

Mac OS X Lion (version 10.7) is the eighth major version of Mac OS X and set to be released in the summer of 2011. It is said that Mac OS X 10.7 Lion is going to be the best release of Apple's venerable operating system ever. When the software finally launches, Lion could be the top option in the OS space.
Considering the forthcoming boost of Mac Lion and making sure that Aobo Mac Key Logger is available for Mac OS X Lion users, Aobo Software has been working on Lion Key Logger. This Key Logger for Lion Mac OS X is similar in working features to the Tiger, Leopard and Snow Leopard ones.
-->
What's New in Mac OS X Lion?
Multi-touch Support:
A system which makes you enjoy more fluid and realistic gesture responses, including rubber-band scrolling, page and image zoom, and full-screen swiping.
Full-screen Apps:
A feature that you can make a window in an app full screen with one click and switch to another app's full-screen window with a swipe of the track pad.
Launchpad:
An iPad style window that shows all the apps on your Mac in an elegant, full-screen display.
AirDrop:
A simple, hassle-free way to copy files between Macs wirelessly.
Versions:
A versioning system that will automatically save successive versions of your documents, providing a simple way to browse, edit and revert to previous states.
-->
Auto Save:
A system-wide mechanism that will automatically save your documents as you work on them.
Resume:
Another system feature that can restore apps to the state they were in before you quit the app or shut down your Mac.
Mail V5:
The new email client will feature grouped conversations, wide-screen layout and MS Exchange 2010 support.
Key features of Mac OS X Lion Key Logger:
- Stealthy and undetectable Monitoring
- Record all keystrokes typed on any applications
- Record both-side chat history on iChat/AIM/Adium/Skype/MSN
- Record website visits on a Lion computer
- Record desktop screenshots in a preset interval
- Record passwords typed on a Mac Lion computer (Professional Only)
- Monitor multiple user accounts on a Mac Lion
- Secretly send the logs to your email box or FTP server
- Password protected of the program
- Easy-to-setup Mac Lion Key Logger
Aobo Mac Lion Key Logger is expected to launch on the heels of the release of Mac OS X Lion. Let's look forward to the birth of Mac OS X Lion and Aobo Key Logger for Lion Mac OS X!
where can i get os x lion
Download it frome here 

where can i get os x lion



what is os x lion ?

Mac OS X Lion (version 10.7) is the eighth major version of Mac OS X and set to be released in the summer of 2011. It is said that Mac OS X 10.7 Lion is going to be the best release of Apple's venerable operating system ever. When the software finally launches, Lion could be the top option in the OS space.
Considering the forthcoming boost of Mac Lion and making sure that Aobo Mac Key Logger is available for Mac OS X Lion users, Aobo Software has been working on Lion Key Logger. This Key Logger for Lion Mac OS X is similar in working features to the Tiger, Leopard and Snow Leopard ones.
-->
What's New in Mac OS X Lion?
Multi-touch Support:
A system which makes you enjoy more fluid and realistic gesture responses, including rubber-band scrolling, page and image zoom, and full-screen swiping.
Full-screen Apps:
A feature that you can make a window in an app full screen with one click and switch to another app's full-screen window with a swipe of the track pad.
Launchpad:
An iPad style window that shows all the apps on your Mac in an elegant, full-screen display.
AirDrop:
A simple, hassle-free way to copy files between Macs wirelessly.
Versions:
A versioning system that will automatically save successive versions of your documents, providing a simple way to browse, edit and revert to previous states.
-->
Auto Save:
A system-wide mechanism that will automatically save your documents as you work on them.
Resume:
Another system feature that can restore apps to the state they were in before you quit the app or shut down your Mac.
Mail V5:
The new email client will feature grouped conversations, wide-screen layout and MS Exchange 2010 support.
Key features of Mac OS X Lion Key Logger:
- Stealthy and undetectable Monitoring
- Record all keystrokes typed on any applications
- Record both-side chat history on iChat/AIM/Adium/Skype/MSN
- Record website visits on a Lion computer
- Record desktop screenshots in a preset interval
- Record passwords typed on a Mac Lion computer (Professional Only)
- Monitor multiple user accounts on a Mac Lion
- Secretly send the logs to your email box or FTP server
- Password protected of the program
- Easy-to-setup Mac Lion Key Logger
Aobo Mac Lion Key Logger is expected to launch on the heels of the release of Mac OS X Lion. Let's look forward to the birth of Mac OS X Lion and Aobo Key Logger for Lion Mac OS X!
where can i get os x lion
Download it frome here 

Posted at 11:26 AM |  by Unknown
google adsense gratuit




While Google's AdSense seemed, there was many men and women which doubted Google's idea will be marketable and in actual fact make virtually any income. But as we endure right here today it really is by far the most recognized pay-per-click opportunity on the globe.

Yes, dozens of nay sayers ended up having their very own terms eventually. And that is since the people with Google never ever get as well as want to do something without assessing if it'll be worthwhile, or maybe exactly how worthwhile it truly is.
-->

Yet naturally, because you could possibly perfectly realize, AdSense isn't just worthwhile pertaining to Google. It's also worthwhile for your people who promote by using AdWords and intensely worthwhile pertaining to marketers which apply it to produce cash flow that are from time to time merely enormous.

And so 1 have to question himself precisely why that is this kind of a good deal for all. And the problem alone is very normal since you also hardly ever run into a thing that may be worthwhile for all in the sequence. So why would certainly AdSense become virtually any diverse.

Very well, AdSense will be in which this holders today, providing benefits for all in the game because it makes use of some sort of distance in the Internet's promotion design.

You observe, the internet is a quite interactive setting, and its particular communications result from your those who are checking. They opt for if to check out a particular link along with the phrase "navigating" is just about the almost all accurate 1 with conveying this example.

And so AdSense is great because it inbound links with each other consumers as well as vendors. Yes, you should hand this away for you to Google for any excellent idea. They realize you'll find individuals out there of which need it stuff and the ones who would like to market them what exactly they are thinking about. And also Google AdSense allows members from the 2 classes discover the other person.

The idea performs for your site visitors, since the design is very transparent. You do not view a large visual advertising which endeavors for you to lure people into obtaining a thing. You merely view a handful of terms. And also if you appreciate everything you see you can follow on this. The idea performs simply because site visitors don't have of which emotion associated with an individual trying to lure them into spending cash. Ironically, even so, they are wrong.

The idea performs for your AdWords promoters simply because the advertising get all over the place. Not just can many people end up detailed throughout Google's lookup which receives gazillions associated with visits daily, in the beginning without functioning the maximum amount of pertaining to SEARCH ENGINE OPTIMISATION as well as hanging around so much.

The advertising may reach virtually any website of which handles something comparable to what exactly they are selling. Now you must understand they are able to never ever yank associated with this kind of excellent promotion alone. Knowning that provides you for you to the thing that creates Google's AdSense some sort of publisher's ally.

The idea emanates from the fact that your advertising are contextual, which they somehow relevant to your key terms people deal with with your webpage. Since individuals or maybe with your website, which handles a particular subject matter, you realize they are thinking about of which subject matter.

Yet, hey there, delay one minute, Google appreciates many corporations which would like to market any visitors a thing relevant to the subject matter. Google desires any visitors, you want Google's promoters along with the site visitors would like to obtain stuff. And that is your essence associated with what makes AdSense quite a lot for all.

This can be by far the most worthwhile hook-up package you will be ever about to see wherever on the web.

And so you should get pleasure from Google pertaining to recognizing some sort of monster package. You should get pleasure from just how properly considered, however straightforward this specific scheme actually is. Positive, in practice it's got a couple of eccentricities but people are trivial as well as, upward until now everyone is apparently taking pleasure in google adsense forum help.

Adsense is designed for Anyone

google adsense gratuit




While Google's AdSense seemed, there was many men and women which doubted Google's idea will be marketable and in actual fact make virtually any income. But as we endure right here today it really is by far the most recognized pay-per-click opportunity on the globe.

Yes, dozens of nay sayers ended up having their very own terms eventually. And that is since the people with Google never ever get as well as want to do something without assessing if it'll be worthwhile, or maybe exactly how worthwhile it truly is.
-->

Yet naturally, because you could possibly perfectly realize, AdSense isn't just worthwhile pertaining to Google. It's also worthwhile for your people who promote by using AdWords and intensely worthwhile pertaining to marketers which apply it to produce cash flow that are from time to time merely enormous.

And so 1 have to question himself precisely why that is this kind of a good deal for all. And the problem alone is very normal since you also hardly ever run into a thing that may be worthwhile for all in the sequence. So why would certainly AdSense become virtually any diverse.

Very well, AdSense will be in which this holders today, providing benefits for all in the game because it makes use of some sort of distance in the Internet's promotion design.

You observe, the internet is a quite interactive setting, and its particular communications result from your those who are checking. They opt for if to check out a particular link along with the phrase "navigating" is just about the almost all accurate 1 with conveying this example.

And so AdSense is great because it inbound links with each other consumers as well as vendors. Yes, you should hand this away for you to Google for any excellent idea. They realize you'll find individuals out there of which need it stuff and the ones who would like to market them what exactly they are thinking about. And also Google AdSense allows members from the 2 classes discover the other person.

The idea performs for your site visitors, since the design is very transparent. You do not view a large visual advertising which endeavors for you to lure people into obtaining a thing. You merely view a handful of terms. And also if you appreciate everything you see you can follow on this. The idea performs simply because site visitors don't have of which emotion associated with an individual trying to lure them into spending cash. Ironically, even so, they are wrong.

The idea performs for your AdWords promoters simply because the advertising get all over the place. Not just can many people end up detailed throughout Google's lookup which receives gazillions associated with visits daily, in the beginning without functioning the maximum amount of pertaining to SEARCH ENGINE OPTIMISATION as well as hanging around so much.

The advertising may reach virtually any website of which handles something comparable to what exactly they are selling. Now you must understand they are able to never ever yank associated with this kind of excellent promotion alone. Knowning that provides you for you to the thing that creates Google's AdSense some sort of publisher's ally.

The idea emanates from the fact that your advertising are contextual, which they somehow relevant to your key terms people deal with with your webpage. Since individuals or maybe with your website, which handles a particular subject matter, you realize they are thinking about of which subject matter.

Yet, hey there, delay one minute, Google appreciates many corporations which would like to market any visitors a thing relevant to the subject matter. Google desires any visitors, you want Google's promoters along with the site visitors would like to obtain stuff. And that is your essence associated with what makes AdSense quite a lot for all.

This can be by far the most worthwhile hook-up package you will be ever about to see wherever on the web.

And so you should get pleasure from Google pertaining to recognizing some sort of monster package. You should get pleasure from just how properly considered, however straightforward this specific scheme actually is. Positive, in practice it's got a couple of eccentricities but people are trivial as well as, upward until now everyone is apparently taking pleasure in google adsense forum help.

Posted at 12:39 PM |  by Unknown

An Independent Security Researcher, Sow Ching Shiong, has discovered a serious Password reset vulnerability in Facebook that allowed hackers to change the passwords of facebook accounts.

Normally, User is required to enter his current password before they can set the new one to prevent an unauthorized person from changing the password without the user's knowledge.




However, the Researcher identified that a hacker could change user's password without known the user's current password by accessing the url "https://www.facebook.com/hacked", which automatically redirected to the compromised account recovery page.


In this page,  an attacker was simply prompted to enter the new password and confirm it, without having to know any other information.

Facebook Security Team fixed the vulnerability after being notified by the Security researcher and Sow Ching Shiong has been added to Facebook's white hats list ( https://www.facebook.com/whitehat )
 

Password Reset Vulnerability in Facebook allowed hackers to hack accounts


An Independent Security Researcher, Sow Ching Shiong, has discovered a serious Password reset vulnerability in Facebook that allowed hackers to change the passwords of facebook accounts.

Normally, User is required to enter his current password before they can set the new one to prevent an unauthorized person from changing the password without the user's knowledge.




However, the Researcher identified that a hacker could change user's password without known the user's current password by accessing the url "https://www.facebook.com/hacked", which automatically redirected to the compromised account recovery page.


In this page,  an attacker was simply prompted to enter the new password and confirm it, without having to know any other information.

Facebook Security Team fixed the vulnerability after being notified by the Security researcher and Sow Ching Shiong has been added to Facebook's white hats list ( https://www.facebook.com/whitehat )
 

Posted at 1:11 AM |  by Narut0
For those of us following or taking part in the various hacktivist activities happening around the globe on a regular basis, doxing is a regular feature. We wake up in the morning to find the personal lives of businessmen, hackers who have made target of themselves for one reason or another, government employees, and a host of others spilled out onto the Internet for the entire world to see. Doxing can be a tool for use in security testing, investigation, or research on the positive side. But it can also be a tool for humiliation, harassment, and worse on the negative side.
In the Part I of this article, we will discuss what exactly doxing is and the tools and techniques we might use to carry out such an attack. In the Part II of this article we will talk about the steps we can take to at least lessen its impact, should we find ourselves on the receiving end of such efforts.

What is Doxing?
The word doxing is a simple word involving a bit of mangling of the English language in order to communicate a somewhat more complex concept. We arrive at doxing by starting with documents, shortening it to docs, applying a bit of leetness to make it dox, then transforming it into a verb: documents -> docs -> dox -> doxing. But what is it?  Doxing is the process of locating, to the greatest extent possible, all of the information available on an individual, this being generally followed by the exposure of the information discovered to a group or the general public. Those following along might also realize that doxing, information reconnaissance, OSINT, and a number of other similar concepts are all very closely related, so much so that we might successfully argue that they are slight variations on describing the exact same concept.

We commonly see doxing used by hacking groups such as Anonymous, LulzSec, AntiSec, and so on. An excellent example is the large scale doxing of law enforcement-related personnel by Anonymous in December of 2011, an act which was reportedly carried out in revenge for the close attention being given to hacktivist groups by various law enforcement agencies. In this particular attack the information on over 7000 people was exposed, including names, addresses, social security numbers, email contents, passwords to sensitive systems, and a great deal of other information.
On the white hat side of the fence, a somewhat more restrained form of doxing is also used, although generally much more limited in the set of techniques available, and generally lacking the public exposure of information. Doxing techniques may be used by penetration testers, security researchers, incident responders, and investigators to collect information on potential targets, track down information regarding the origins of tools used in attacks or malware, or to locate the originator of an attack. In March of 2012, the FBI is said to have used information gained from doxing and turned over by another hacking group to arrest Hector Monsegur, a.k.a Sabu, who is widely supposed to have been the founder and/or leader of LulzSec.
Ultimately, doxing is searching for information on an individual, although usually taken to a much greater length than the typical light cyberstalking or ego surfing many of us engage in on a daily basis.
Why Would Anyone Want To Do This?
The motivations behind doxing, whether originated by the good guys or the bad guys, are generally not positive for the person who is the target of such activity. As we mentioned, doxing is used by those who are considered to be on the dark side, hackers (in the bad sense) and hacktivist groups, and also by others such as stalkers, identity thieves, internet trolls, and so on. Usually people in this group seek out said information to attack or harass their targets in some fashion. The specific motivations here may vary somewhat, but we can quickly come up with specific cases in which the entirety of the available data on an individual might be used including name, address and social security number (the identity theft trifecta), account credentials, telephone numbers, and so on.
Even on the light side, where we might find an investigator, incident responder, law enforcement, or other similar personnel using such techniques, the consequences for the target will likely be at least unpleasant, if not targeted at the same ultimate goals. In actuality, much of the set of techniques we would call doxing is simply referred to as investigation in such communities.
What are the Consequences of Being Doxed?
The consequences of doxed information being exposed can range from slight irritation to serious threat to health, livelihood, or potentially life. We can very quickly see where exposing information on a person’s social activities, sexual preference, medical history, and other such interesting bits of information may be seriously damaging. This type of exposure could easily result in public embarrassment, severe reputational damage, loss of employment, identity theft, and worse.
A fairly serious example of doxing and subsequent attacks can be seen in the actions taken by Anonymous against Aaron Barr, then the CEO of HBGary Federal, a defense contracting company. In February of 2011, Barr announced his infiltration of Anonymous and said he would expose the information he had found in a talk at a security conference that year. As with most cases of poking a wasp nest with a stick, this ended badly. Anonymous doxed Barr and attacked the HBGary Federal servers, later posting tens of thousands of emails from the HBGary Federal systems on the Internet, as well as the body of personal information on Barr himself. They subsequently took over social networking accounts, compromising servers, and generally causing quite a bit of havoc. Ultimately, this series of attacks resulted in Barr resigning, reputation damage to Barr and HBGary Federal, some level of investigation by the US House Armed Services Subcommittee on Emerging Threats and Capabilities, and the US Congress.
Doxing Techniques
A number of different sources can provide information for doxing efforts. We can, for instance, collect from social networking sites and tools, people-oriented search tools, pay search sites, public records, and any of a number of other places. Some such sources or tools are generic and will show data on nearly any name we care to enter, and others are very specific and pertain to a particular company, city, or the like.
Typically when we start to dox someone, we will have some small amount of information to start with. A name, depending on how common the name is, is a good starting point; a name and an email address are better. If we have an email address on which to search, we may immediately turn up other sources of information, particularly if the target in question uses the email address as a common account name, posts online frequently, etc. Given a name, email address, and a city, we may be able to turn up a home address, employer, professional organizations, local sports teams or hobby groups, and so on. Each additional piece of information we turn up adds to the body of information we have and makes validating the next piece of information along the path much easier. The more information we have to begin with, the easier our job is.
If we are starting with a weak set of information, or the target has a very common name (James Smith would be a problem), we may have to do a bit of inference at the beginning. One of the most likely starting points would be to pin down a physical location to a smaller area. If we know James Smith had a particular IP address at some point, we look this IP up to find which ISP or company this IP belongs to. Based on this, we might narrow down our search parameters to the areas this ISP serves or this company operates in. Of course the danger exists that our inference is entirely wrong, and we have just gone down the wrong path entirely. But we do have to start somewhere.

Social Networking Sites
Social networking sites can provide a virtual gold mine of information for doxing purposes. A typical person who is at all active online will typically have accounts on at least two or three social networking sites. Depending on the site in question, we may find all manner of personal information (some not fit for public consumption) including current and past employers, education, physical location data, and a plethora of other items.

Of benefit to those using such sites to collect information is the myriad of privacy and sharing settings, each being entirely unique to a particular site. Those of us who are security professionals may have a good grip on handling such settings and may be aware of the need to restrict our personal information, putting us in a better position than the common user to properly safeguard our information. In some cases, this may not be good enough to completely protect us. The companies who run these social networking tools regularly update their privacy settings, and many of them allow “friends” to take actions like tagging pictures with names and re-sharing information, thus circumventing our security efforts.
Additionally, friends, family, co-workers, et al may provide another avenue for gathering information, even if the target has a properly secured account and is extremely careful. Given a particularly chatty friend on a social networking site, we may not even need information directly from the target. This is one of the main reasons that doxing efforts often extend outside of the target in question.

We may also be able to bypass the security measures on a social networking account by simply asking for access to the information through whatever friending mechanism available for the service in question. Such an approach will often enjoy success if we create an account impersonating someone who the target already knows or has some history with, such as a friend, co-worker, classmate etc. We can see an excellent example of this in the Robin Sage incident in which a security researcher impersonating a woman managed to friend over 300 people and gain access to all manner of sensitive information, including classified military information on troop movements.
General Online Content
Although social networking sites provide us with one of the richest sources we may find, they are by no means the only sources available. We can find all types of information by looking for online resumes, blog postings, postings to newsgroups, archives of local newspapers, newsletters from professional organizations, records of births, deaths, and marriages, any of a number of public records and other data. The problem we encounter when digging for such data is finding what we actually want in the massive volume we might need to sift through.
People-oriented Search Tools
Given this enormous body of information available to search, it is helpful to filter some of this through sets of tools that will do some of the work for us. Fortunately, there are a number of services that will conduct searches oriented around individuals and will often give us at least some portion of the information we seek for free. Some of the more common tools include:
• Pipl.com
• Spokeo.com
• Zabasearch.com
• Mylife.com
• Peekyou.com
 and many, many, others. These sites will commonly turn up names, addresses, birth dates, family members, pictures, documents, employers, and quite a bit of other information. Such sites do not exist out of pure altruism, so they will often display a certain amount of information as a hook and then ask for a payment to access the remainder. We can usually get enough free information from such search engines on which to base further searches or general digging, making these sites worth a visit.
In addition there are a number of pay sites that exist for the purpose of performing “background checks,” allowing us direct access to databases of information collected on individuals. These sites will likely include the same set of information as the people-oriented search engines (in fact they may be the same company), but the better sites will also have access to more difficult to reach records such as criminal proceedings, court documents, mortgage documents, and other similar items that are public or semi-public records. Most of this data is available to the individual in general, should we choose to look for it, but it often requires considerably more legwork and expense to obtain. A few background check sites include:
• Intelius.com
• Ussearch.com
• Peoplefinders.com


Information about Domains and Networks
Considering the connectedness of the average computer-savvy person these days, chances are we will be able to turn up an IP address or domain name connected to them in some fashion. Given a small amount of such information, unless the person has been particularly careful, we will often be able to quickly find a good deal more with a few simple searches.
Whois searches and searches of DNS records can often give us contacts for the domain or IP in question, sometimes even being directly connected to the individual who is our target. While this seems unlikely and entirely too easy, such information is often present. Aggregation tool sites such as Netcraft.com, IPinfoDB.com, and yougetsignal.com can also provide us with additional information such as where the system on the other end of the domain name or IP might be physically located, what software it is running, and any of a number of other useful bits.
Lastly, we would be remiss to not mention the Wayback Machine at web.archive.org. The Wayback Machine archives the content of a huge number of web servers on a regular basis, and looking at changes to a website over time can be extremely instructive.  It may be that the system on the other end of a domain name contains no interesting information now, but it might have a month ago, or a year ago, or five years ago. The Wayback Machine can be en extremely helpful tool for many research efforts.
Our Friend Google
 Google can be the doxers best friend. We all know what Google is and how easy it is to type "firstname lastname" into the search field and get a few hits. There are, however, considerably more advanced ways of searching Google that will get us better results.

Google hacking is the use of advanced operators in search engine queries (not necessarily just Google), in order to enable more targeted searches. As we mentioned, this is not specific to Google and similar search parameters can be used with most any search engine. Lists of advances operators can generally be found on the page for the search engine in question. For Google, the advanced operators can be found here http://support.google.com/websearch/bin/answer.py?hl=en&answer=136861 and for Bing here http://msdn.microsoft.com/en-us/library/ff795620.aspx. For most any search engine, we can find the advanced operator listing by searching for the engine name and “advanced operators”. While we will find some variation in query construction between different engines, the construction is usually fairly similar.

A large body of work exists for using advance operators to perform very specific searches, alongowith a few books. The book Google Hacking for Penetration Testers by Johnny Long (available from Syngress) is an entire volume dedicated to this specific subject. Although it is a bit long in the tooth at this point, it is still a good resource.  We can also look to the Google Hacking Database (GHDB) at http://www.hackersforcharity.org/ghdb/ or http://www.exploit-db.com/google-dorks/ for a database of specific searches. These databases contain a wide variety of security specific searches and are available to the public through a few simple clicks.
Metadata
Metadata is data about data, and we can find such data associated with almost any file with the exceptions to this being vanishingly small. We can see a common example of metadata in the creation and modification timestamps associated with almost all files. Metadata can provide us with another excellent source for our doxing efforts. We can find this data in word processing documents, presentations, image files, videos, and any of a number of similar artifacts. In this metatdata, we can often locate various interesting items such as usernames, hostnames, network paths, various dates, hardware information, and a variety of other interesting bits. For files created on hardware containing GPS capabilities, we may also find embedded GPS coordinates for the location where the file was created, databases or temporary files containing a history of physical locations, and the like. Overall, metadata is definitely worth taking a look at if we find files in the course of our search.
There are number of tools that can provide us with the capability to sift through metadata. For general usage, we can use Metagoofil (although this is now a bit aged and requires some effort to get working properly), FOCA which is in the same general vein as Metagoofil, ExifTool which ostensibly handles image formats but actually does a great number of other formats as well, and several others. Becoming familiar with metadata tools can lead to all sorts of interesting information.
Maltego
Any of a variety of other tools might assist us in our reconnaissance efforts whilst doxing. While it would be nearly impossible to develop an exhaustive list, there is at least one that deserves a special mention, namely Maltego. Maltego is “an open source intelligence and forensics application”. Maltego enables us to conduct, in many cases, a certain portion of our doxing in an automated fashion. Maltego, given a starting place, such as an IP address, hostname, name, etc… will attempt to ferret out other related items of information.

Results from Maltego can be hit or miss, depending on the information available to find. It is absolutely fantastic at tasks like combing through data for an organization. We may also discover a larger set of information from Maltego than we can comfortably cope with, is we are not careful to limit its scope.
Keeping Track
Last, but certainly not least, we will want some method for keeping track of the information we find. We could absolutely use a simple text editing tool like Notepad, Gedit, or the like. Such tools are very useful for taking notes as we go along, but ultimately not a good tool in the long run. In the case where our research has been thorough enough to include multiple individuals, a plain text document will quickly become a difficult task to keep up with and will not lend itself well to searching or correlating information.
As with many larger sets of data, or data we might need to manipulate in various ways, spreadsheets and/or databases are a very handy tool. We will typically want to develop a common template for our doxing efforts, so we do not miss particular items by oversight, i.e.:

• Maiden name
• Facebook account
• Twitter account
• IP addresses
• System names
• Domain names
• Blog URL
• Name
• Address
• DoB
• SSN
• Email addresses
• Phone numbers
• Employer
this, of course, is a very small sample and our template would need to cover considerably more. In an exhaustive doxing effort, we would likely end up with a stack of such collections of data.
There are also a few commercial tools are purpose-built for just such a use. CaseFile is one such tool, and was created by the makers of Maltego. This provides us with a much more tailored solution, but may be overkill for some smaller efforts.

Part II
In the next part of this article, we will be discussing the opposite side of the doxing equation, namely anti-doxing. Now that we have covered what doxing is and how it is performed, we will talk about how we can protect ourselves and help to mitigate such an attack when we are on the receiving end.

Doxing and Anti-Doxing – Part I

For those of us following or taking part in the various hacktivist activities happening around the globe on a regular basis, doxing is a regular feature. We wake up in the morning to find the personal lives of businessmen, hackers who have made target of themselves for one reason or another, government employees, and a host of others spilled out onto the Internet for the entire world to see. Doxing can be a tool for use in security testing, investigation, or research on the positive side. But it can also be a tool for humiliation, harassment, and worse on the negative side.
In the Part I of this article, we will discuss what exactly doxing is and the tools and techniques we might use to carry out such an attack. In the Part II of this article we will talk about the steps we can take to at least lessen its impact, should we find ourselves on the receiving end of such efforts.

What is Doxing?
The word doxing is a simple word involving a bit of mangling of the English language in order to communicate a somewhat more complex concept. We arrive at doxing by starting with documents, shortening it to docs, applying a bit of leetness to make it dox, then transforming it into a verb: documents -> docs -> dox -> doxing. But what is it?  Doxing is the process of locating, to the greatest extent possible, all of the information available on an individual, this being generally followed by the exposure of the information discovered to a group or the general public. Those following along might also realize that doxing, information reconnaissance, OSINT, and a number of other similar concepts are all very closely related, so much so that we might successfully argue that they are slight variations on describing the exact same concept.

We commonly see doxing used by hacking groups such as Anonymous, LulzSec, AntiSec, and so on. An excellent example is the large scale doxing of law enforcement-related personnel by Anonymous in December of 2011, an act which was reportedly carried out in revenge for the close attention being given to hacktivist groups by various law enforcement agencies. In this particular attack the information on over 7000 people was exposed, including names, addresses, social security numbers, email contents, passwords to sensitive systems, and a great deal of other information.
On the white hat side of the fence, a somewhat more restrained form of doxing is also used, although generally much more limited in the set of techniques available, and generally lacking the public exposure of information. Doxing techniques may be used by penetration testers, security researchers, incident responders, and investigators to collect information on potential targets, track down information regarding the origins of tools used in attacks or malware, or to locate the originator of an attack. In March of 2012, the FBI is said to have used information gained from doxing and turned over by another hacking group to arrest Hector Monsegur, a.k.a Sabu, who is widely supposed to have been the founder and/or leader of LulzSec.
Ultimately, doxing is searching for information on an individual, although usually taken to a much greater length than the typical light cyberstalking or ego surfing many of us engage in on a daily basis.
Why Would Anyone Want To Do This?
The motivations behind doxing, whether originated by the good guys or the bad guys, are generally not positive for the person who is the target of such activity. As we mentioned, doxing is used by those who are considered to be on the dark side, hackers (in the bad sense) and hacktivist groups, and also by others such as stalkers, identity thieves, internet trolls, and so on. Usually people in this group seek out said information to attack or harass their targets in some fashion. The specific motivations here may vary somewhat, but we can quickly come up with specific cases in which the entirety of the available data on an individual might be used including name, address and social security number (the identity theft trifecta), account credentials, telephone numbers, and so on.
Even on the light side, where we might find an investigator, incident responder, law enforcement, or other similar personnel using such techniques, the consequences for the target will likely be at least unpleasant, if not targeted at the same ultimate goals. In actuality, much of the set of techniques we would call doxing is simply referred to as investigation in such communities.
What are the Consequences of Being Doxed?
The consequences of doxed information being exposed can range from slight irritation to serious threat to health, livelihood, or potentially life. We can very quickly see where exposing information on a person’s social activities, sexual preference, medical history, and other such interesting bits of information may be seriously damaging. This type of exposure could easily result in public embarrassment, severe reputational damage, loss of employment, identity theft, and worse.
A fairly serious example of doxing and subsequent attacks can be seen in the actions taken by Anonymous against Aaron Barr, then the CEO of HBGary Federal, a defense contracting company. In February of 2011, Barr announced his infiltration of Anonymous and said he would expose the information he had found in a talk at a security conference that year. As with most cases of poking a wasp nest with a stick, this ended badly. Anonymous doxed Barr and attacked the HBGary Federal servers, later posting tens of thousands of emails from the HBGary Federal systems on the Internet, as well as the body of personal information on Barr himself. They subsequently took over social networking accounts, compromising servers, and generally causing quite a bit of havoc. Ultimately, this series of attacks resulted in Barr resigning, reputation damage to Barr and HBGary Federal, some level of investigation by the US House Armed Services Subcommittee on Emerging Threats and Capabilities, and the US Congress.
Doxing Techniques
A number of different sources can provide information for doxing efforts. We can, for instance, collect from social networking sites and tools, people-oriented search tools, pay search sites, public records, and any of a number of other places. Some such sources or tools are generic and will show data on nearly any name we care to enter, and others are very specific and pertain to a particular company, city, or the like.
Typically when we start to dox someone, we will have some small amount of information to start with. A name, depending on how common the name is, is a good starting point; a name and an email address are better. If we have an email address on which to search, we may immediately turn up other sources of information, particularly if the target in question uses the email address as a common account name, posts online frequently, etc. Given a name, email address, and a city, we may be able to turn up a home address, employer, professional organizations, local sports teams or hobby groups, and so on. Each additional piece of information we turn up adds to the body of information we have and makes validating the next piece of information along the path much easier. The more information we have to begin with, the easier our job is.
If we are starting with a weak set of information, or the target has a very common name (James Smith would be a problem), we may have to do a bit of inference at the beginning. One of the most likely starting points would be to pin down a physical location to a smaller area. If we know James Smith had a particular IP address at some point, we look this IP up to find which ISP or company this IP belongs to. Based on this, we might narrow down our search parameters to the areas this ISP serves or this company operates in. Of course the danger exists that our inference is entirely wrong, and we have just gone down the wrong path entirely. But we do have to start somewhere.

Social Networking Sites
Social networking sites can provide a virtual gold mine of information for doxing purposes. A typical person who is at all active online will typically have accounts on at least two or three social networking sites. Depending on the site in question, we may find all manner of personal information (some not fit for public consumption) including current and past employers, education, physical location data, and a plethora of other items.

Of benefit to those using such sites to collect information is the myriad of privacy and sharing settings, each being entirely unique to a particular site. Those of us who are security professionals may have a good grip on handling such settings and may be aware of the need to restrict our personal information, putting us in a better position than the common user to properly safeguard our information. In some cases, this may not be good enough to completely protect us. The companies who run these social networking tools regularly update their privacy settings, and many of them allow “friends” to take actions like tagging pictures with names and re-sharing information, thus circumventing our security efforts.
Additionally, friends, family, co-workers, et al may provide another avenue for gathering information, even if the target has a properly secured account and is extremely careful. Given a particularly chatty friend on a social networking site, we may not even need information directly from the target. This is one of the main reasons that doxing efforts often extend outside of the target in question.

We may also be able to bypass the security measures on a social networking account by simply asking for access to the information through whatever friending mechanism available for the service in question. Such an approach will often enjoy success if we create an account impersonating someone who the target already knows or has some history with, such as a friend, co-worker, classmate etc. We can see an excellent example of this in the Robin Sage incident in which a security researcher impersonating a woman managed to friend over 300 people and gain access to all manner of sensitive information, including classified military information on troop movements.
General Online Content
Although social networking sites provide us with one of the richest sources we may find, they are by no means the only sources available. We can find all types of information by looking for online resumes, blog postings, postings to newsgroups, archives of local newspapers, newsletters from professional organizations, records of births, deaths, and marriages, any of a number of public records and other data. The problem we encounter when digging for such data is finding what we actually want in the massive volume we might need to sift through.
People-oriented Search Tools
Given this enormous body of information available to search, it is helpful to filter some of this through sets of tools that will do some of the work for us. Fortunately, there are a number of services that will conduct searches oriented around individuals and will often give us at least some portion of the information we seek for free. Some of the more common tools include:
• Pipl.com
• Spokeo.com
• Zabasearch.com
• Mylife.com
• Peekyou.com
 and many, many, others. These sites will commonly turn up names, addresses, birth dates, family members, pictures, documents, employers, and quite a bit of other information. Such sites do not exist out of pure altruism, so they will often display a certain amount of information as a hook and then ask for a payment to access the remainder. We can usually get enough free information from such search engines on which to base further searches or general digging, making these sites worth a visit.
In addition there are a number of pay sites that exist for the purpose of performing “background checks,” allowing us direct access to databases of information collected on individuals. These sites will likely include the same set of information as the people-oriented search engines (in fact they may be the same company), but the better sites will also have access to more difficult to reach records such as criminal proceedings, court documents, mortgage documents, and other similar items that are public or semi-public records. Most of this data is available to the individual in general, should we choose to look for it, but it often requires considerably more legwork and expense to obtain. A few background check sites include:
• Intelius.com
• Ussearch.com
• Peoplefinders.com


Information about Domains and Networks
Considering the connectedness of the average computer-savvy person these days, chances are we will be able to turn up an IP address or domain name connected to them in some fashion. Given a small amount of such information, unless the person has been particularly careful, we will often be able to quickly find a good deal more with a few simple searches.
Whois searches and searches of DNS records can often give us contacts for the domain or IP in question, sometimes even being directly connected to the individual who is our target. While this seems unlikely and entirely too easy, such information is often present. Aggregation tool sites such as Netcraft.com, IPinfoDB.com, and yougetsignal.com can also provide us with additional information such as where the system on the other end of the domain name or IP might be physically located, what software it is running, and any of a number of other useful bits.
Lastly, we would be remiss to not mention the Wayback Machine at web.archive.org. The Wayback Machine archives the content of a huge number of web servers on a regular basis, and looking at changes to a website over time can be extremely instructive.  It may be that the system on the other end of a domain name contains no interesting information now, but it might have a month ago, or a year ago, or five years ago. The Wayback Machine can be en extremely helpful tool for many research efforts.
Our Friend Google
 Google can be the doxers best friend. We all know what Google is and how easy it is to type "firstname lastname" into the search field and get a few hits. There are, however, considerably more advanced ways of searching Google that will get us better results.

Google hacking is the use of advanced operators in search engine queries (not necessarily just Google), in order to enable more targeted searches. As we mentioned, this is not specific to Google and similar search parameters can be used with most any search engine. Lists of advances operators can generally be found on the page for the search engine in question. For Google, the advanced operators can be found here http://support.google.com/websearch/bin/answer.py?hl=en&answer=136861 and for Bing here http://msdn.microsoft.com/en-us/library/ff795620.aspx. For most any search engine, we can find the advanced operator listing by searching for the engine name and “advanced operators”. While we will find some variation in query construction between different engines, the construction is usually fairly similar.

A large body of work exists for using advance operators to perform very specific searches, alongowith a few books. The book Google Hacking for Penetration Testers by Johnny Long (available from Syngress) is an entire volume dedicated to this specific subject. Although it is a bit long in the tooth at this point, it is still a good resource.  We can also look to the Google Hacking Database (GHDB) at http://www.hackersforcharity.org/ghdb/ or http://www.exploit-db.com/google-dorks/ for a database of specific searches. These databases contain a wide variety of security specific searches and are available to the public through a few simple clicks.
Metadata
Metadata is data about data, and we can find such data associated with almost any file with the exceptions to this being vanishingly small. We can see a common example of metadata in the creation and modification timestamps associated with almost all files. Metadata can provide us with another excellent source for our doxing efforts. We can find this data in word processing documents, presentations, image files, videos, and any of a number of similar artifacts. In this metatdata, we can often locate various interesting items such as usernames, hostnames, network paths, various dates, hardware information, and a variety of other interesting bits. For files created on hardware containing GPS capabilities, we may also find embedded GPS coordinates for the location where the file was created, databases or temporary files containing a history of physical locations, and the like. Overall, metadata is definitely worth taking a look at if we find files in the course of our search.
There are number of tools that can provide us with the capability to sift through metadata. For general usage, we can use Metagoofil (although this is now a bit aged and requires some effort to get working properly), FOCA which is in the same general vein as Metagoofil, ExifTool which ostensibly handles image formats but actually does a great number of other formats as well, and several others. Becoming familiar with metadata tools can lead to all sorts of interesting information.
Maltego
Any of a variety of other tools might assist us in our reconnaissance efforts whilst doxing. While it would be nearly impossible to develop an exhaustive list, there is at least one that deserves a special mention, namely Maltego. Maltego is “an open source intelligence and forensics application”. Maltego enables us to conduct, in many cases, a certain portion of our doxing in an automated fashion. Maltego, given a starting place, such as an IP address, hostname, name, etc… will attempt to ferret out other related items of information.

Results from Maltego can be hit or miss, depending on the information available to find. It is absolutely fantastic at tasks like combing through data for an organization. We may also discover a larger set of information from Maltego than we can comfortably cope with, is we are not careful to limit its scope.
Keeping Track
Last, but certainly not least, we will want some method for keeping track of the information we find. We could absolutely use a simple text editing tool like Notepad, Gedit, or the like. Such tools are very useful for taking notes as we go along, but ultimately not a good tool in the long run. In the case where our research has been thorough enough to include multiple individuals, a plain text document will quickly become a difficult task to keep up with and will not lend itself well to searching or correlating information.
As with many larger sets of data, or data we might need to manipulate in various ways, spreadsheets and/or databases are a very handy tool. We will typically want to develop a common template for our doxing efforts, so we do not miss particular items by oversight, i.e.:

• Maiden name
• Facebook account
• Twitter account
• IP addresses
• System names
• Domain names
• Blog URL
• Name
• Address
• DoB
• SSN
• Email addresses
• Phone numbers
• Employer
this, of course, is a very small sample and our template would need to cover considerably more. In an exhaustive doxing effort, we would likely end up with a stack of such collections of data.
There are also a few commercial tools are purpose-built for just such a use. CaseFile is one such tool, and was created by the makers of Maltego. This provides us with a much more tailored solution, but may be overkill for some smaller efforts.

Part II
In the next part of this article, we will be discussing the opposite side of the doxing equation, namely anti-doxing. Now that we have covered what doxing is and how it is performed, we will talk about how we can protect ourselves and help to mitigate such an attack when we are on the receiving end.

Posted at 2:23 PM |  by Narut0
Do you suspect your neighbour using your WiFi network without your consent? Rather than spending hours staring at your router’s administration console to find out who is using your WiFi, you can use Wireless Network Watcher – a free utility that scans for devices currently connected to your network.

Once launched, the utility scans the network you are connected to and display the devices currently using your WiFi connection along with their corresponding IP address, Mac Address, Computer names and Network Adapter name.

That’s cool! But what if your neighbour is not connected at the moment you are running the scan? You will obviously not see his or her computer in the list. If you want to get notified as soon as someone attempts to connect to your WiFi network, you will need to tweak the app a bit.
Go to Options and select the following: Put Icon On Tray,Start As Hidden, Tray Balloon on New Device, Background Scan and Beep on New Device.
 We will now set the interval between two scans. To do this click on Options > Advanced options or press F9. In the new window, enter the desired time in seconds between scans, for example 900 (equivalent to 15 minutes).
 Now each time someone connects to your WiFi Network, a balloon notification will appear in your tray icon.

Someone is using my WiFi! Now what?

Ok calm down – don’t tear your hair out if you found someone is using your WiFi. I’ll show you how you can keep freeloaders away from using your WiFi connection.
If someone has been able to connect to your WiFi network, it is most likely because there was no password protection. The simplest solution is set up a strong password using a secure algorithm such as WPA/ WPA2 – avoid using WEP as it is easily crackable.
Don’t worry, you don’t need to know about how encryption algorithm such as WEP/WPA works. You just need to select it on your router’s administration console and set a password.
So how do you do all that? Well, it depends on the type of router you have. Most routers admin console are accessible via the address http://192.168.1.1. You will be prompted for a username and a password. Most router manufacturers set the default credentials to root or admin for both the username and the password. Once you have logged in, look for your Wireless settings and make the appropriate changes.
 Congratulation! You can now start breathing again. This should be enough to keep unauthorized users from using your WiFi. If you are still being paranoid, you can harden your WiFi security by white-listing your computer’s mac address in your router’s console. However, this makes it a bit tougher for welcome guests such as your family or friends, to get online at your house.

Find out who is using your WiFi

Do you suspect your neighbour using your WiFi network without your consent? Rather than spending hours staring at your router’s administration console to find out who is using your WiFi, you can use Wireless Network Watcher – a free utility that scans for devices currently connected to your network.

Once launched, the utility scans the network you are connected to and display the devices currently using your WiFi connection along with their corresponding IP address, Mac Address, Computer names and Network Adapter name.

That’s cool! But what if your neighbour is not connected at the moment you are running the scan? You will obviously not see his or her computer in the list. If you want to get notified as soon as someone attempts to connect to your WiFi network, you will need to tweak the app a bit.
Go to Options and select the following: Put Icon On Tray,Start As Hidden, Tray Balloon on New Device, Background Scan and Beep on New Device.
 We will now set the interval between two scans. To do this click on Options > Advanced options or press F9. In the new window, enter the desired time in seconds between scans, for example 900 (equivalent to 15 minutes).
 Now each time someone connects to your WiFi Network, a balloon notification will appear in your tray icon.

Someone is using my WiFi! Now what?

Ok calm down – don’t tear your hair out if you found someone is using your WiFi. I’ll show you how you can keep freeloaders away from using your WiFi connection.
If someone has been able to connect to your WiFi network, it is most likely because there was no password protection. The simplest solution is set up a strong password using a secure algorithm such as WPA/ WPA2 – avoid using WEP as it is easily crackable.
Don’t worry, you don’t need to know about how encryption algorithm such as WEP/WPA works. You just need to select it on your router’s administration console and set a password.
So how do you do all that? Well, it depends on the type of router you have. Most routers admin console are accessible via the address http://192.168.1.1. You will be prompted for a username and a password. Most router manufacturers set the default credentials to root or admin for both the username and the password. Once you have logged in, look for your Wireless settings and make the appropriate changes.
 Congratulation! You can now start breathing again. This should be enough to keep unauthorized users from using your WiFi. If you are still being paranoid, you can harden your WiFi security by white-listing your computer’s mac address in your router’s console. However, this makes it a bit tougher for welcome guests such as your family or friends, to get online at your house.

Posted at 12:41 PM |  by Narut0
HTTPS Everywhere is a Firefox and Chrome extension that encrypts your communications with many major websites, making your browsing more secure. Encrypt the web: Install HTTPS Everywhere today.

Install HTTPS Everywhere for Firefox
Install in Firefox
 
Install HTTPS Everywhere for Chrome
Install in Chrome
Alpha Version
 










 HTTPS Everywhere is produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by using a clever technology to rewrite requests to these sites to HTTPS.

 

HTTPS Everywhere

HTTPS Everywhere is a Firefox and Chrome extension that encrypts your communications with many major websites, making your browsing more secure. Encrypt the web: Install HTTPS Everywhere today.

Install HTTPS Everywhere for Firefox
Install in Firefox
 
Install HTTPS Everywhere for Chrome
Install in Chrome
Alpha Version
 










 HTTPS Everywhere is produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by using a clever technology to rewrite requests to these sites to HTTPS.

 

Posted at 1:49 PM |  by Narut0
Have you ever been in a situation where you have received a friend request from a very attractive girl and find yourself asking whether it is her or not in her profile pictures? Trust me, you are not alone! I’m sure many of us have been in a similar situation.

There are many reasons why they do that. Sometimes it is because they don’t like to put their own photos online, or they just upload a fake Facebook photo to get more friend requests from opposite sex.



Identify fake profile photos on Facebook

 In this post, I will show you how you can take advantage of reverse image search technology to find for images by uploading an image.
This method is pretty handy if you are wondering if your new acquaintance is using a fake picture or not.
1. Go to Google Image and click on the camera icon in the right corner of the search bar. A new window will pop up where you will be prompted to upload an image from your computer or from a URL.

 You can either download and save your acquaintance’s Facebook photo and upload it, or you can directly paste his or her photo link in Google Image. If your friend’s photo is private, you can also use the small picture that appears on his or her profile. To get the image link, right-click on the photo and select Copy Image Location if you are under Firefox. You should find similar option for Chrome.

 2. After uploading your image, click on search. If the photo has been taken from the web, Google Image will return all web pages where this photo is present.


 With this powerful method, you can now easily find out who is using a fake profile picture on Facebook or any social-networking  websites.


Find out who is using a fake profile photo on facebook

Have you ever been in a situation where you have received a friend request from a very attractive girl and find yourself asking whether it is her or not in her profile pictures? Trust me, you are not alone! I’m sure many of us have been in a similar situation.

There are many reasons why they do that. Sometimes it is because they don’t like to put their own photos online, or they just upload a fake Facebook photo to get more friend requests from opposite sex.



Identify fake profile photos on Facebook

 In this post, I will show you how you can take advantage of reverse image search technology to find for images by uploading an image.
This method is pretty handy if you are wondering if your new acquaintance is using a fake picture or not.
1. Go to Google Image and click on the camera icon in the right corner of the search bar. A new window will pop up where you will be prompted to upload an image from your computer or from a URL.

 You can either download and save your acquaintance’s Facebook photo and upload it, or you can directly paste his or her photo link in Google Image. If your friend’s photo is private, you can also use the small picture that appears on his or her profile. To get the image link, right-click on the photo and select Copy Image Location if you are under Firefox. You should find similar option for Chrome.

 2. After uploading your image, click on search. If the photo has been taken from the web, Google Image will return all web pages where this photo is present.


 With this powerful method, you can now easily find out who is using a fake profile picture on Facebook or any social-networking  websites.


Posted at 3:53 AM |  by Narut0
We all know the old method of searching an image over the internet by typing a keyword related to what we are looking for.reverse image search to find fake profile on Facebook.
Did you know that there exists image search engines that allow you to make a search using an image? You have been living under a rock if you didn’t know these kind of tools exist!
Searching the web using an image allows you to explore the web in an entirely new way.

5 reasons to perform search using an image

There are various reasons why you would perform image search rather than searching an image by typing a keyword. Below are some ideas what you can do these tools:
  1. Find your stolen images on the web if you are a photographer, graphic designer, etc..
  2. Check if someone profile’s photo on Facebook is real or taken from the web.
  3. Find larger size and better resolution of the image found  on the web.
  4. Explore the different sources where a particular image is found online.
  5. Integrate  similar image retrieval technologies in your app if you are a developer.
I have compiled below the best sites to use for reverse image search. Actually, I have tested more websites than listed below, unfortunately the rest did not make it among the top 5 to use.

1. Google Image Search

Among all online tools I have tested, I believe that none can beat the power of Google Image Search as it returned the most amount of results for the same image as compared to other websites. To upload an image, click on the camera icon in the search bar and in the new window,  you will be asked to upload an image from your computer or paste an image link directly. Alternatively, you can also drag and drop an image from your computer to the Google Image logo.

Unfortunately, Google Image API has been deprecated hence you can’t use it to build an application.

2. TinEye Reverse Image Search

TinEye also performs almost accurate image search as Google Image except that there’re fewer results.  This might be because Google Image  has more images indexed in its database than TinEye’s  2 billion images. Nevertheless, TinEye has something that Google Image does not have – an API.  This is may be why companies like Ebay and Istockphoto has turned to TinEye to integrate its technology in their app. It is not free for commercial use though.

3. PicTriev

This tool can perform image search for people faces only and not objects. As compared to TinEye and Google Images, it automatically detects the gender  and the age of the person in the photo. It also gives a suggestion of the person’s name if it is a celebrity. An android app is available for your mobile phone.

4. Imgseek

This website provides a tool called isk-daemon, an open-source  app developed in Python to start your own reverse image search service. However, you will probably need a powerful server to host all these images in your database. You can find a live demo of the application here. If you are looking for similar open source application, this list from wikipedia might come in handy. As for the test with this service, it  is less accurate as compared to Google Image and TinEye, but it is worth to check it out.

5.retrievr

This was the least performing tool among all that I have tested, but it was worth listing it here since it provides a feature than no tools above has – it allows you to sketch what you are looking for. For now, it is still an experimental tool  and maybe  we should give it more time, and it might probably outperform Google Image or TinEye in the future. Who knows?
 If you think there’s a tool that deserves to be among the top 5, drop me a comment below.

Top 5 websites to perform reverse image search

We all know the old method of searching an image over the internet by typing a keyword related to what we are looking for.reverse image search to find fake profile on Facebook.
Did you know that there exists image search engines that allow you to make a search using an image? You have been living under a rock if you didn’t know these kind of tools exist!
Searching the web using an image allows you to explore the web in an entirely new way.

5 reasons to perform search using an image

There are various reasons why you would perform image search rather than searching an image by typing a keyword. Below are some ideas what you can do these tools:
  1. Find your stolen images on the web if you are a photographer, graphic designer, etc..
  2. Check if someone profile’s photo on Facebook is real or taken from the web.
  3. Find larger size and better resolution of the image found  on the web.
  4. Explore the different sources where a particular image is found online.
  5. Integrate  similar image retrieval technologies in your app if you are a developer.
I have compiled below the best sites to use for reverse image search. Actually, I have tested more websites than listed below, unfortunately the rest did not make it among the top 5 to use.

1. Google Image Search

Among all online tools I have tested, I believe that none can beat the power of Google Image Search as it returned the most amount of results for the same image as compared to other websites. To upload an image, click on the camera icon in the search bar and in the new window,  you will be asked to upload an image from your computer or paste an image link directly. Alternatively, you can also drag and drop an image from your computer to the Google Image logo.

Unfortunately, Google Image API has been deprecated hence you can’t use it to build an application.

2. TinEye Reverse Image Search

TinEye also performs almost accurate image search as Google Image except that there’re fewer results.  This might be because Google Image  has more images indexed in its database than TinEye’s  2 billion images. Nevertheless, TinEye has something that Google Image does not have – an API.  This is may be why companies like Ebay and Istockphoto has turned to TinEye to integrate its technology in their app. It is not free for commercial use though.

3. PicTriev

This tool can perform image search for people faces only and not objects. As compared to TinEye and Google Images, it automatically detects the gender  and the age of the person in the photo. It also gives a suggestion of the person’s name if it is a celebrity. An android app is available for your mobile phone.

4. Imgseek

This website provides a tool called isk-daemon, an open-source  app developed in Python to start your own reverse image search service. However, you will probably need a powerful server to host all these images in your database. You can find a live demo of the application here. If you are looking for similar open source application, this list from wikipedia might come in handy. As for the test with this service, it  is less accurate as compared to Google Image and TinEye, but it is worth to check it out.

5.retrievr

This was the least performing tool among all that I have tested, but it was worth listing it here since it provides a feature than no tools above has – it allows you to sketch what you are looking for. For now, it is still an experimental tool  and maybe  we should give it more time, and it might probably outperform Google Image or TinEye in the future. Who knows?
 If you think there’s a tool that deserves to be among the top 5, drop me a comment below.

Posted at 11:53 AM |  by Narut0
Have you ever sat in your car listening to a song on the radio Find name of unknown song with lyricsthat you have heard dozens of times, but can’t quite seem to remember the title? Or may be a song you have heard on YouTube? You know the song that you can’t quite get out of your head and is going to stay there until you figure out what song it is and who performed it.

If you know a few words from the lyrics or can hum the basic tune, there’re a few tools that can help you to get the name of the song online.


  • Midomi: This may be one of the fastest ways to find the name of a song. All  you need is your computer, a microphone and an Internet connection. By singing a few of the words, humming or whistling the tune, the online tool will instantly identify the song for you. You can find a video demo how it works here.
  • Shazam: This is a mobile application that you can download to most cell phones and portable devices including iPhones, iPads,  iPods, Android powered devices, Blackberry and Windows Phones. By placing your device close to the source of music, not only will it identify the song for you, but it will also display the lyrics. Unfortunately, Shazam is not available as a desktop application.
  • Music ID2: Similar to Shazam, this mobile app can help you find a song name from a database of over 28 million songs in seconds. Not only do you get the title of the song and the artist, you have access to a host of related content. You can also search by typing in any information you know such as artist’s name, lyrics, etc. and get the same results almost instantly.
  • Tunatic: It is another great music identification software. All you need is your computer, a microphone and a connection to the Internet. Simply download the software, play the music where the microphone can pick it up.  If you don’t have a microphone, you can plug in your sound source (e.g. radio) directly to your computer, through an inexpensive audio cable.
  • TrackID: This app is another cool music recognition software made by Sony for android devices. Hold your smartphone near your TV or radio, this nifty tool will auto-magically identify the name of the song, artist name and album info within seconds.
Using a combination of these music identification tools will maximize the chance for you to identify the name of an unknown song. For the best results, I recommend you to use these applications in a quiet area.



How to find out the name of a song

Have you ever sat in your car listening to a song on the radio Find name of unknown song with lyricsthat you have heard dozens of times, but can’t quite seem to remember the title? Or may be a song you have heard on YouTube? You know the song that you can’t quite get out of your head and is going to stay there until you figure out what song it is and who performed it.

If you know a few words from the lyrics or can hum the basic tune, there’re a few tools that can help you to get the name of the song online.


  • Midomi: This may be one of the fastest ways to find the name of a song. All  you need is your computer, a microphone and an Internet connection. By singing a few of the words, humming or whistling the tune, the online tool will instantly identify the song for you. You can find a video demo how it works here.
  • Shazam: This is a mobile application that you can download to most cell phones and portable devices including iPhones, iPads,  iPods, Android powered devices, Blackberry and Windows Phones. By placing your device close to the source of music, not only will it identify the song for you, but it will also display the lyrics. Unfortunately, Shazam is not available as a desktop application.
  • Music ID2: Similar to Shazam, this mobile app can help you find a song name from a database of over 28 million songs in seconds. Not only do you get the title of the song and the artist, you have access to a host of related content. You can also search by typing in any information you know such as artist’s name, lyrics, etc. and get the same results almost instantly.
  • Tunatic: It is another great music identification software. All you need is your computer, a microphone and a connection to the Internet. Simply download the software, play the music where the microphone can pick it up.  If you don’t have a microphone, you can plug in your sound source (e.g. radio) directly to your computer, through an inexpensive audio cable.
  • TrackID: This app is another cool music recognition software made by Sony for android devices. Hold your smartphone near your TV or radio, this nifty tool will auto-magically identify the name of the song, artist name and album info within seconds.
Using a combination of these music identification tools will maximize the chance for you to identify the name of an unknown song. For the best results, I recommend you to use these applications in a quiet area.



Posted at 6:09 AM |  by Narut0

In this video i will show you how to download mp3 from youtube video

How to convert yotube to mp3


In this video i will show you how to download mp3 from youtube video

Posted at 1:25 PM |  by Narut0

How could it be the world with the actuation system idea


Posted at 2:39 PM |  by Narut0

How to activate a "non-tracking" in Firefox, activate the option will put
an end to

How to activate a "no tracking" in Firefox


How to activate a "non-tracking" in Firefox, activate the option will put
an end to

Posted at 11:08 AM |  by Narut0
© 2013 FreshGeek. WP Theme-junkie converted by BloggerTheme9
Blogger templates. Proudly Powered by Blogger.
back to top