Saturday, 16 April 2016

Top 10 movies based on hacking.



In recent years, Hollywood has taken a shine to hackers, with hackers appearing in almost every heist or mystery movie now. This can be both good and bad for our profession. As we know, whichever way Hollywood decides to depict our profession is how most people will perceive it.
The good news is that not all of Hollywood's depictions of hackers are negative, despite the overwhelming perception by the masses that our profession is a malicious one.
In trying to determine the ten best hacker movies, I tried to only use those films where people are actually entering into other peoples' or organizations' computers for good or ill. Very often, reviewers of this genre include any movie with computer "stuff" as a "hacker movie." In my definition of a hacker movie, someone must be using advanced skills to access someone else's computer, without their consent or knowledge, for good or ill.
In addition, I evaluated the movies based upon plot, acting, directing and, most importantly, how they portrayed hackers. They got extra points if they portrayed the hackers as the "good guys," have female hackers in opposition to the male geek archetype, and even more points if the hacking represents something close to reality.

#10. Takedown

Takedown (also known as Trackdown) is a B-grade movie—a fictionalized and sensationalized account of the tracking and capture of probably the most infamous U.S. hacker, Kevin Mitnick. Based upon the book and written by his nemesis, Tsutomu Shimomura, the story tends to glorify Shimomura. Mitnick operated in the 1980s and '90s and eventually went to prison for a couple of years. Now, he is a highly paid IT security consultant, speaker, and writer.
This movie has low production values, despite having some relatively well-known actors (Skeet Ulrich, Tom Berenger, and Amanda Peet, among others). Don't expect to learn much hacking from this movie, though, as nearly the entire 1 hour and 36 minutes is a story about tracking down Kevin Mitnick as the FBI and Shimomura searches for him across the states.

#9. Swordfish

In Swordfish, Hugh Jackman plays a retired, elite hacker who has been released from a long prison term and is now working in the oil fields and living in a trailer. He is approached by an organized crime figure played by John Travolta, and is forced to do one last hacking job against his will.
Unfortunately, the hacking is forgettable and far from reality. Jackman's character is seen breaking into highly secure systems within seconds, while gyrating geometric objects appear on his screen. Very little depiction of the actual hard work that goes into hacking is seen, and they make it look like a computer game.
The most memorable part of this movie is Halle Berry's topless scene. Although it has nothing to do with hacking, it does make this movie memorable.

#8. The Italian Job

Although the MINI Coopers are really the stars of The Italian Job (a remake of the 1969 film of the same name), Seth Green plays Lyle, a hacker among a group of elite thieves, who is able to manipulate traffic signals, among other devices, that make this grand theft possible. Could this hacker have been using Shodan to identify and assist in hacking these devices?
Although not true to the detail, it does portray hacking with some realism. I really like the concept that ALL digital devices are susceptible to hacking, not just computer systems.

#7. The Fifth Estate

The Fifth Estate is an unauthorized account of Julian Assange and WikiLeaks. Cumberbatch plays a believable Assange as a egotistical, idealist that is out to change the world. Few Americans know that Assange is a famous (or infamous) hacker in his native country of Australia. He broke into the Pentagon, Citibank, NASA, and Stanford University, among other facilities, before being caught.
WikiLeaks was founded to provide a safe place for whistleblowers to make secret state information available to the world when that information reveals the ill deeds of powerful governments. They were responsible for the leaks regarding U.S. military abuses in Iraq and Afghanistan, as well as in other places.
Although little hacking takes place in this movie, it is an important film for the hacking community as it depicts how hacking can potentially change the world history, as I'm sure it will.

#6. Ghost in the Shell

Ghost in the Shell is a classic Japanese anime film that depicts a future (probably mid-21st century) where humans are part flesh and blood and part bionic. Many people have cyber brains that are part electronic and part grey matter. This cyber brain enhances their cognitive abilities and allows them to plug into larger networks. This is an intriguing concept that is likely to become reality in the very near future.
The story is about a special operations task force that is part-police and part-military. The lead character is female officer whose body was destroyed as young girl and has been replaced by a beautiful bionic body. The hacking in this futuristic tale is the even more malicious variety of hacking, the hacking of the human mind.


#5. Sneakers

In Sneakers, Robert Redford and Ben Kingsley portray two young hackers whose lives take two different directions after their playful hacking leads to the arrest of Kingsley's character. They meet again some thirty years later when one (Kingsley) is working for the bad guys and the other (Redford) isn't sure who he's working for when he's forced to comply upon threat of his true identity being revealed.
The plot revolves around a new encryption algorithm that would make electronic communication secure. The NSA plays the bad guys who want the encryption algorithm so that they can spy on everyone. The movie was ahead of its time in that respect.

#4. Live Free or Die Hard

The fourth installment in the Die Hard series, Live Free or Die Hard, depicts a scenario where a hacker played by Timothy Olyphant (of Justified fame) takes down nearly the entire U.S. infrastructure in an attempt to transfer trillions of dollars from the Federal Reserve to his account.
As I believe this type of infrastructure hack is one of the most important issues in national security, it gets kudos from me. Watching Bruce Willis ride outside of a Harrier Jump Jet to take down the bad guys is simply laughable, though. Another notable moment in this movie is the portrayal by Justin Long as the good guy hacker employed by Willis' cop character to assist in stopping the bad guys. You probably remember him from the iconic "Mac vs. PC" ads.

#3. WarGames

This classic 1983 hacker move WarGames depicts a young teenage bedroom hacker played by Matthew Broderick who almost starts World War III. By war-dialing, he is able to get unencumbered access to the Department of Defense's nuclear missile launch controls.
The hacker is portrayed as a playful, rather than malicious, and knowledgeable teenager who inadvertently hacks into critical DoD systems.

#2. The Girl with the Dragon Tattoo

Noomi Rapace portrays The Girl with with Dragon Tattoo (I prefer the original Swedish version to the Hollywood version) superbly. She is a young woman, recently released from prison for a crime of passion in her youth. She has been traumatized by the corrections and probation system and is probably showing signs of mild autism. As a way of earning an income, she works as hacker for hire for a private investigator. This leads her into the path of Mikael, a middle-aged investigative writer who is being unfairly persecuted by a diabolical wealthy industrialist.
Her hacking is critical to revealing the identity of the true evil-doer. Although the hacking is oversimplified, it is far more realistic than most films, even if she is using a Mac. She works from a command line terminal and there are scenes showing the Unix/Linux file structure.

#1. Hackers

In Hackers, Angelina Jolie and Johnny Lee Miller (they were married after the making of this movie) portray two youthful and hip hackers. Miller (now of the Sherlock Holmes TV spinoff, Elementary) portrays a hacker who got caught as a very young child (11) after crashing thousands of computers and has been sentenced to zero computer access until his 18th birthday.
The hacking is relatively realistic, although a bit dated. The film was made in 1993, but the technology looks to be mid- to late-1980s. It gets points for portraying hackers as the good guys (thwarting the plans of the evil corporation) and as hip, rather than nerds.
What do think? Did I miss any great hacking flicks?

How to get free trials of credit cards.





When I see the words "free trial," I know I'm probably going to have to whip out my credit card and enter in the number to "not get charged." Then I end up forgetting about the trial and want to kick myself in the ass when I see my statement at the end of the month.
In order to avoid that rigmarole, you can actually use fake credit numbers instead of your own, and you can do that using the sitegetcreditcardnumbers.com, which can generate up to 9,999 credit card numbers at a time, or just one.
Now, to be completely clear, these numbers cannot be used to purchase any item. Nada. Zilch. Nothing. For that to work, you would need a valid expiration date and CVV or CSV number. This site merely provides the standard 16 digit credit card number that can be used to bypass certain online forms that only ask for the number.

How Does It Work?

The credit card number generator uses a system based off of the Luhn Algorithm, which has been used to validate numbers for decades.A fake number will work for sites that store credit card information to either charge you later or ask you to upgrade.
For sites that ask for an upfront fee or have an automatic charge sometime down the line (Hulu Plus, Netflix, Spotify), this won't work since they ask for more than just a credit card number for validation. You can, however, getunlimited free trials on those sites using a simple trick with your email address if you have a valid card number with expiration date and CSV.

Getting a Card Number on Android

There's also an AndroidWhen I see the words "free trial," I know I'm probably going to have to whip out my credit card and enter in the number to "not get charged." Then I end up forgetting about the trial and want to kick myself in the ass when I see my statement at the end of the month.
In order to avoid that rigmarole, you can actually use fake credit numbers instead of your own, and you can do that using the sitegetcreditcardnumbers.com, which can generate up to 9,999 credit card numbers at a time, or just one.
Now, to be completely clear, these numbers cannot be used to purchase any item. Nada. Zilch. Nothing. For that to work, you would need a valid expiration date and CVV or CSV number. This site merely provides the standard 16 digit credit card number that can be used to bypass certain online forms that only ask for the number.

How Does It Work?

The credit card number generator uses a system based off of the Luhn Algorithm, which has been used to validate numbers for decades.A fake number will work for sites that store credit card information to either charge you later or ask you to upgrade
For sites that ask for an upfront fee or have an automatic charge sometime down the line (Hulu Plus, Netflix, Spotify), this won't work since they ask for more than just a credit card number for validation. You can, however, getunlimited free trials on those sites using a simple trick with your email address if you have a valid card number with expiration date and CSV.

Getting a Card Number on Android

There's also an Android application for getting fake card numbers calledCardGen, available for free in the Play Store. You can generate and validate credit card numbers directly from the app, making it easy to use on the go as well. Validation in particular would be useful if you were accepting credit card payments on your own site and wanted to make sure the cards were legit.
Don't forget to like on Facebook zeroint


The app is ad-supported, but since it's free, I can live with that. In the generate field you can select from most of the major credit card providers, including American Express, Mastercard, Visa, and Discover. The disclaimer explains what the app does and how you should use it.
 application for getting fake card numbers calledCardGen, available for free in the Play Store. You can generate and validate credit card numbers directly from the app, making it easy to use on the go as well. Validation in particular would be useful if you were accepting credit card payments on your own site and wanted to make sure the cards were legit.


The app is ad-supported, but since it's free, I can live with that. In the generate field you can select from most of the major credit card providers, including American Express, Mastercard, Visa, and Discover. The disclaimer explains what the app does and how you should use it.

Friday, 15 April 2016

Microsoft Visual Studio Professional 2013 + Key Torrent + Direct LInk

Microsoft Visual Studio Professional 2013 + Key Torrent + Direct LInk

Microsoft Visual Studio Professional 2013 + Key Torrent + Direct LInk
Microsoft Visual Studio
Microsoft Visual Studio 2013 
Visual Studio provides the most comprehensive solution to easily deliver applications across all Microsoft platforms, including phone, desktop, tablet, server, and the cloud. With an included MSDN subscription, you get access to thousands of Microsoft products and additional services—so you have everything you need for designing, developing, and testing your applications on a variety of platforms.
Features of Microsoft Visual Studios 2013
  • Quickly get the information you need, in contex
  • Visualize the structure of an application with UML diagrams
  • Receive the MSDN Subscription level for Visual Studio
  • Describe and enforce architectural dependencies
  • Use tools to understand the relationships in existing code
  • Online tutorials to learn the visual studio tools and all programming
  • and much more………
What’s New ?
  • The latest Visual Studio “Visual Studio Team Foundation Server 2013” Key is added
How to Activate ?
  1. Download and Install any version of visual studio 2013
  2. Run the installed visual studio 2013 (any version)
  3. Click the help button from toolbar and go to register product option
  4. Click the change my product licence and enter the given key of respective versions
  5. You have fully access to your microsoft visual studio 2013 ( your desired version)
  6. Done !!! Enjoy :)
Direct Download Link

Screenshots
Microsoft Visual Studio 2013 Keys
87DQC-G8CYR-CRPJ4-QX9K8-RFV2B ( Ultimate Version)
KCQWK-Q43V3-M3F2T-83VGV-Y6VTX (Professional Version)
TTDB9-9YPYH-7FBVY-X2CTQ-D8F2H (Test Professional Version)
P27TG-XXX2W-XK8TK-QD9FK-V36W4 (Premium & Express Version)
6T3MC-YX8XF-7CWXW-462TQ-8G2B4 (Team Foundation Server)
Downloads

Official Website Trial Setup Link

 Download Full Torrent Link 

Note:Skip Ad To Start downloading

Manual GPRS/EDGE 3G Settings for Mobilink 3G, Telenor 3G, Ufone 3G, Warid 3G, Zong 3G

MOBILINK HTML/GPRS/MMS SETTINGS

Mobilink Logo
  • HTML Setting
Connection Namea. For Postpaid: Mobilink Connect
b. For Prepaid: Jazz Connect
BearerGPRS
Homepagewww.mobilinkworld.com
Access Point Namea. For Postpaid: connect.mobilinkworld.com
b. for Prepaid: jazzconnect.mobilinkworld.com
WAP Proxy (IP) address
Usernamen/a
Passwordn/a
Session typeContinuous / permanent
SecurityOff
AuthenticationNormal
  • MMS Settings
Connection NameMMS
BearerGPRS
Homepagehttp://mms/
Access Point Namea. For Postpaid: mms.mobilinkworld.com
b. for Prepaid: mms.mobilinkworld.com
Gateway/WAP Proxy/
Proxy (IP) address
172.25.20.12
Usernamemobilink
Passwordmobilink
Session typeContinuous / permanent
SecurityOff
AuthenticationNormal
  • GPRS Settings
Connection Namea. For Postpaid: Mobilink WAP
b. For Prepaid: Jazz WAP
BearerGPRS
Homepagehttp://wap.mobilinkworld.com
Access Point Namea. For Postpaid: wap.mobilinkworld.com
b. for Prepaid: jazzwap.mobilinkworld.com
Gateway/WAP Proxy/
Proxy (IP) address
172.24.97.29
Usernamemobilink
Passwordmobilink
Session typeContinuous / permanent
SecurityOff
AuthenticationNormal

Telenor GPRS/WAP/MMS Settings

Telenor Logo
  • Telenor GRPS Settings
    • Access Point Name (Apn)/Node: internet
    • Login/Username: Telenor (case sensitive)
    • Password: Telenor (case sensitive)
    • Prompt Password: No
    • Authentication: Normal
    • Homepage: http://www.telenor.com.pk
  • Telenor WAP Settings
    • Access Point Name (Apn)/Node: wap
    • Login/UsernameTelenor (case sensitive)
    • Password: Telenor (case sensitive)
    • Wap Gateway Ip: 172.18.19.11
    • Port (If Required) : 9201
    • Port (If Required For Http Handsets): 8080
  • Telenor MMS Settings
    • Access Point Name (Apn)/Node: mms
    • Login/Username: Telenor (case sensitive)
    • Password: Telenor (case sensitive)
    • Wap Gateway: IP 172.18.19.11
    • Port (If Required): 9201
    • PORT (IF REQUIRED FOR HTTP Handsets): 8080
    • Relay Server/ Messaging Server: http://mmstelenor or http://172.18.15.1
Alternatively you can get these settings via SMS. For example for Nokia 6300;
For GPRS Internet
Write “Internet Nokia 6300” and SMS it to 131.
For WAP
Write “wap Nokia 6300” and SMS it to 131.
For MMS
Write “mms Nokia 6300” and SMS it to 131.

UFONE GPRS/MMS SETTINGS

Ufone Logo
  • UFONE GPRS Setting
    • Connection Settings
    • Setup a new connection:
    • Access points>
    • Connection name: UfoneGprs
    • Data Bearer: Packet Data
    • Access point name: ufone.pinternet
    • Username & password: ufone
    • Prompt Password: NO
    • Authentication: Normal
    • homepage: wap.ufone.com
    • Options>Advanced settings> Set your phone IP address? Automatic
    • Now Go to Connection settings Again>Packet Data> Access Point>ufone.pinternet
  • UFONE MMS Setting


    • Connection Settings
    • Setup a new connection:
    • Name is: “UfoneMMS”
    • Connection Name: Ufone.mms
    • AccessPoint: ufone.plmms
    • Everything else: default
Alternatively you can get settings either by calling Help Line or sending SMS to 222
[manufacturer<space>model] and send it to 222 
Let’s say your Handset is Nokia 6300, text message would be 
[Nokia<space>6300] and send it to 222 

WARID GPRS/MMS Settings

Warid Logo
  • Warid GPRS Settings
    • Connection Name: Warid
    • Data Bearer: GPRS
    • Acces Point Name: wap.warid
    • User Name: N/A
    • Prompt Password: N/A
    • Password: N/A
    • Authentication: Normal
    • Homepage: http://wap.google.com
    • Advance Settings
    • Phone IP Address: Automatic
    • Primary Name Server: 0.0.0.0
    • Second. Name Server: 0.0.0.0
    • Proxy Serv. Address: 010.004.002.001
    • Proxy Port Number: 8080

Warid MMS Settings

    • APN: mms.warid
    • Username:
    • Password:
    • (Username and password are blank for Warid Pakistan mms settings)
    • MMSC: 10.4.0.132/servlets/mms
    • MMSC Proxy: 10.4.2.1:8080
    • MMS Max Message Size:
    • MMS UA Prof URL:

ZONG GRPS/MMS SETTINGS

Zong Logo
  • Zong GPRS Settings
    • Account name: zong
    • Access point: zonginternet
    • User name: (not require leave blank)
    • Password: (not require leave blank)
  • Zong MMS Setting
    • MMSC Center: http://10.81.6.11:8080
    • Account name: zongmms
    • Access point: zongmms
    • proxy: http://10.81.6.33
    • Port: 9201
  • Request Settings from SMS
Write “All<Space>Make<Space>Model” and send it to 131. For example, if you have Nokia 6300 you will write: “All Nokia 6300” and send it to 131 
All<Space>Make<Space>Model and send to 131 (All Nokia 6300-> send it to 131)
If you need only GPRS settings then write an SMS as following
Internet<Space>Make<Space>Model and sent to 131
In case you don’t need GPRS or WAP and only want MMS, then follow this
MMS<Space>Make<Space>Model and sent to 131
Similarly, for only WAP setting on Zong number
WAP<Space>Make<Space>Model and sent to 131
Step 2: Once you send any of above given message, you will receive setting in an SMS. Save this SMS and you are done.