The great place to get up-to-date with the latest technology.

Keylogger - Actual Spy Software,logs all keystrokes


Actual Spy - is a keylogger which allows you to find out what other users do on your computer in your absence. It is designed for the hidden computer monitoring and the monitoring of the computer activity. Keylogger Actual Spy is capable of catching all keystrokes, capturing the screen, logging the programs being run and closed, monitoring the clipboard contents.

What is key logger?

A Key logger (KeyLogger or Keystroke Logger) is a program that runs invisibly in the background, recording all the keystrokes, usually saving the results to a log file.

Keylogger Actual Spy software features:

Logs all keystrokes, is case sensitive (keystroke logger).

Makes screenshots within the specified time interval.

Saves the applications’ running and closing.

Watches clipboard contents.

Records all print activity.

Records disk changes.

Records internet connections.

Records all websites visited.

Records startup/shutdown.

All the information is stored in the encrypted log file.

Convenient interface of the log and screenshot view.

Generates the report in the text and html format.

Sends the report to the specified email, via FTP or local area network.

Works in the standard and hidden mode.

In the hidden mode it is invisible in all operating systems (in Windows NT/2000/XP/Vista/7 processes as well).

Provides the opportunity to protect keylogger with the password, so that nobody except you could view the logs.

Fast installation, convenient and understandable interface, various set of features, flexible configuration system.

Unique Keylogger Actual Spy software features:

The keylogger Actual Spy Software is absolutely invisible in the all operating systems (in Windows NT/2000/XP/Vista/7 processes as well) and is not detected by antivirus software.

Case sensitive when detecting the keystrokes.

When viewing the keystrokes can show only the characters without showing the pressed system keys which is more convenient. For example, if the following keys are pressed:
"[Shift]It[Space]is[Space]keylogger."

You can see the text
"It is keylogger."
having checked the "Show only characters" option.
Log search with or without the case sensitive option.

For your convenience, the limits of the text log size and screenshot size are specified separately, as the screenshots size normally occupies more disk space than a text file.

Specifying the limits of the clipboard contents. If large amounts of information are copied to the clipboard, only the specified part will be saved.

Sending the reports to email, via FTP or local area network with flexible configuration system.

The Keylogger Actual Spy software is necessary for:

For system administrators. Keylogger Actual Spy will help you to find out, what exactly took place in the system.

For CEOs. You can perform the full control of the computers of your company or enterprise. You will always know about all actions performed by the employees or other people on the computers of your company.

For parents. You will be able to find out what programs your children run and what they search in the net, and to check them.

For any user. Using keylogger Actual Spy, you will be able to establish the full control over your computer. You will also find out, what was going on on your computer during your absence: what was run and when, what text was typed, etc. Using the program constantly, you will able to restore the previously typed text in case you have lost it. The Actual Spy software will also help you to restore the forgotten password or the lost email.

For computer classes and Internet Cafes. Keylogger will let you find out, what the users have been doing on the computers.

Program version : Actual Spy Version 3.0
File Name : actualspy.exe
File Size : 1.52 MB


The registration key for the program is :-

0iU0DOkvQS/fLQ1Hxo5efM8O5q12ZW
ClEJ4De+0Rw8WG2lcgbkJTQqXvOcPM
iw3/fvztayACVcGvys9Fk98Sepc+Yl
d+5Z+EiTZwvPuCqGa8gLs2oC/X8POr
mO99+d59DYcdXjzqWwq5zzV6P2CSaG
p+nz5YbUbuKvEmp8w2vp+g=

URL Autocomplete : Firefox vs. Chrome

Firefox 14 is now in the beta stage. It comes with several new features, click-to-play plugins, Google SSL search by default and so on. But it also comes with one seemingly minor tweak that will have a great effect on the workflow of any users, with those spending a lot of time in the browser being the most affected - autocomplete of typed URLs in the AwesomeBar.

Firefox has had suggestions for a very long time, but it now auto-fills the address bar field as you type with the URL that is the best match. It's a good addition, but the devil is in the details.

Google Chrome comes with the very same feature, autocomplete in the address bar. But the very subtle differences make Firefox's implementation a bit less useful.

The problem is that autocomplete suggestions can be quite annoying, especially when they're wrong. Even if they're not "wrong", i.e. they work as intended, they can still hurt usability rather than help it.

The Firefox team diverted from the way Google implemented the feature. In Chrome, the full URL of the most visited page that matches what you've typed so far is filled in.

In Firefox, only the domain name is filled in, not the entire URL, even if you generally visit a specific page and not the index.

For example, if you regularly use Google Reader, you would see www.google.com/reader autocompleted in Chrome when you started typing "google" but www.google.com in Firefox.

In some cases, you want the top domain name filled in, for example for a newspaper site; in some cases you want the full URL, if you're using a product on the subdomain and so on.

It's hard to determine which approach is the best since it depends a lot on personal choice and the sites you visit.

Where both browsers falter is with sub sections of a site. Both Firefox and Chrome give precedence to the letters to the left, i.e. if you type "r" they are both going to suggest websites that start with "r" or, bar that, those that have "r" very early in their domain name.

Even if you're a heavy Google Reader user and you've only visited a site that starts with "r" once or twice in months, the latter will be suggested.

There is a logic behind this, it would be very annoying if you started to type something and the first match would be some Facebook page that just happens to have the letters somewhere near the end of the URL in some randomly generated ID. Still, this could be fixed with a bit of algorithm wits.

Still, the feature can prove very useful in both browsers especially since you can remove suggestions to give the ranking algorithms a hand. Just select the suggestion you don't like and hit the "Delete" key to remove it or "Shift+Delete" to remove it permanently from the suggestions.

Another trick in Google Chrome is to press the "Ctrl" key to prioritize items from the history rather than bookmarks or search suggestions.

Finally, if you find the feature annoying, you can disable it in Firefox. Go to "about:config" search for browser.urlbar.autoFill and double-click it to set it to "false."

Malaysian Cyber Conference 1.1



Malaysian Cyber Conference kini kembali !


Persidangan ini akan diadakan pada 30 Jun 2012 bertempat di Putra World Trade Center (PWTC).Ia akan bermula pada pada jam 12.00 tengah hari sehingga pukul 6 petang.Hanya 100 orang pembayar terawal sahaja akan mendapat tempat.Bayarannya ialah RM10 sahaja ! Kemungkinan besar,sijil turut akan diberikan tetapi penginapan tidak akan disediakan.

Cara pembayaran melalui bank-in :

CIMB : Muhd Auzan bin Azmi
0205-0134-754-527

Emailkan juga nama penuh,nombor kad pengenalan,nombor telefon,alamat serta slip bank sebagai bukti pembayaran kepada newsdf2u@gmail.com.
Tarikh tutup pembayaran ialah pada 23 Jun 2012.

Aturcara majlis tersebut adalah seperti berikut:

12.00 -> 2.00 = Pendaftaran dan makan tengahari
2.30 = Perasmian dan ucapan pengarah program
2.45 -> 3.15 = Pembentangan pendedahan
3.15 -> 5.00 = Forum mengenai pendedahan MCC dan Vyrec
5.30 -> 6.00 = Sesi bergambar
6.00 = Bersurai

Bagi sebarang maklumat lanjut,anda boleh melayari Facebook Fan Page Malaysian Cyber Conference yang rasmi.
Untuk sebarang update mengenai Malaysian Cyber Conference,anda boleh ikuti mereka di Twitter mereka iaitu https://twitter.com/#!/mycyberconf
Layari juga laman sesawang mereka https://mycyberconf.org/

Experts Name Flame’s MD5 Chosen-Prefix Collision Attack “Unknown”

Microsoft has released further details on the MD5 hash collision attacks utilized by the Flame malware to sign its code and make it look like it came from the company.

According to experts, at first glance Flame appeared to have a valid digital signature, but after further analysis, they reached the conclusion that there were many irregularities.

For instance, it had no X.509 extension fields, and the Certificate Revocation List (CRL) Distribution Point (CDP) extension, the “Microsoft Hydra” critical extension, and an Authority Information Access (AIA) extension were missing.

They also noticed that a field called Issuer Unique Identifier, which is normally obsolete and not used by Microsoft, contained a correctly encoded X.509V3 extension field.

Researchers have explained that the collision attacks were performed by Flame’s masterminds because they were needed to forge certificates that would be valid for code signing on Windows Vista and more recent versions of the operating system.

The rogue certificates would not work on these Windows variants and that’s why the cybercriminals had to come up with the clever way of making them valid for code signing.

To minimize the risks, Microsoft not only made some modifications to the Terminals Server Licensing Certificate infrastructure, but they’ve also released the out-of-band update that most users should have applied by now.

On the other hand, Marc Stevens and Benne de Weger, specialists in the field of rouge certificates, have revealed some interesting findings, naming the MD5 chosen-prefix collision attacks “unknown.”

“We have confirmed that Flame uses a yet unknown md5 chosen-prefix collision attack. We are interested in other possible certs based on this md5 coll attack for further analysis,” they explained.

“We are now analyzing their chosen-prefix collision attack in more detail, (more examples would greatly help) and trying to write up some results and conclusions to make a more detailed statement. The collision attack itself is very interesting from a scientific viewpoint and there are already some practical implications.”

YouTube Will Stream the Olympics Live on 10 HD Channels

The Olympics are coming. London will host this year's competitions. With so many sports and so many athletes from so many countries, the interest in the event is very high.

Of course, many of the races and competitions will be broadcasted by local televisions, it will be almost impossible to miss the biggest sports and the biggest athletes.

But with a competition so large, not everything will be covered. Which is why it's great that YouTube has struck a deal with the International Olympic Committee to stream many of the events on the site live.

"Millions of Olympic fans from across 64 territories in Asia and Sub-Saharan Africa will have a chance to watch the games live from London," YouTube wrote.

"In total, the IOC’s YouTube Channel will offer fans in these countries over 2,200 hours of high-definition sporting event coverage from London 2012, including all the medal finals," YouTube explained.

YouTube will stream the full events only in a few countries, free of charge, where the IOC hasn't sold broadcast rights. Unfortunately for most of the world, that's not the case so you'll only get historic footage, teasers and probably highlights during the event.

Still, that still leaves a lot of places where the streams will be available. And sports fans are in for a treat. There will be 10 concurrent live streams from the event, streaming HD content from 9am to 11pm London time. There's also a non-stop news channel with the highlights and important events of the day.

"For those not in these particular countries, you can already watch historic clips from past Games on the IOC channel and teasers from London on the London 2012 YouTube Channel. Hopefully, these will hold you over until the triumphant entrance of the athletes at the Opening Ceremony on July 27," YouTube added.

Google Replaces Yandex in Firefox 14

Google has famously been the default search engine in Firefox for many years. What few people know is that Google is not the default in every country. In places where Google does not dominate, Mozilla prefers to have the local favorite as the default, despite the monetary agreement.

For example, Yandex is the default search engine in the Russian version of the browser, Yahoo is used in some parts of Asia.

But that's about to change soon, apparently, Mozilla wants to switch from Yandex to Google with Firefox 14 in Russia.

There's no explanation for the move from Mozilla so we can only speculate. It could be that Google is paying well for the position, useful especially since it's far behind Yandex in Russian-speaking countries, however Mozilla hasn't made too many decision based on monetary needs before.

Hackers Take the LulzSec Name, Again (Video)

A group of hackers has released a video in which they announce the return of the LulzSec collective. As expected, the news has already raised a lot of controversy among online activists, some Anonymous channels naming the decision an “insult” to the famous Topiary.

“ITs out ! FBI did not destroy Lulzsec , were back for an epic revenge!” one of the hackers wrote on Twitter.

A video released by the members of the newly formed LulzSec reveals even more details regarding their reasons and plans.

“The oppressive powers behind the Evil empire have used Darth Sabu to seed mistrusting amongst the inhabitants of the planet Anonymous. The Old Order of the Knights of the Lulz, hunted and exterminated by FBI Siths, have gone into the shadows,” they wrote.

“Those who have survived are secretly preparing to revenge and meditating about the events. Meanwhile the ruling Empire has started building the Death Laws, to be used to control freedom and the spread of information on the Internet.”

After some Star Wars-themed scenario in which they explain their reasons, they reveal that they’re currently analyzing terabytes of data they allegedly obtained from “the empire.”

The list of targets mentioned in the video includes state.gov, the FBI, US Military, Syrian government, and Columbian prisons.

Of course, ever since the original LulzSec hackers were arrested, many have tried to resurrect the group. The most successful of them was the LulzSec Reborn gang that managed to make an impression after breaching sites such as MilitarySingles and CSS Corp.

However, Anonymous publicly stated its disapproval of the lulzy collective.

Now, the new LulzSecs haven’t even begun hacking sites and they’re already called attention seekers.

Here's the video:



Expert Shows How Twitter Can Be Used to Crack Passwords

Joshua Dustin, an information security expert, has made a small experiment to show how Twitter can be used to create password cracking wordlists.

For his demonstration, Dustin relied on the John the Ripper password cracker and used the MD5 password hashes dumped by LulzSec Reborn after they had breached the MilitarySingles.com website.

First, the expert made a script that connected to Twitter and extracted 500 tweets that matched the supplied terms, creating a list of the words from those posts. Then he fed the script some of the relevant words.

The result: 4,400 unique words which, when compared to the MilitarySingles hashes, returned 1,978 passwords.

“And that's 1978 uniques. The number of accounts we actually cracked with these 1978 passwords is actually even more than 4400 accounts cause many use the same passwords as each other, and with the mangling rules John tries ~300 mutations of each word in the list (semperfi gives us semperFi, semperfi1, semperfi123, etc),” Dustin explained.

Facebook Wants to Open Up the Site to Kids Under 13

Facebook is looking into ways of getting kids under 13 years old to use the site legally and without causing a privacy nightmare. Currently, the site like all the other in the US, are closed off to young kids due to legislation requiring parental approval over any data stored for kids this young.

But that doesn't mean that a lot of kids aren't already using the site, some with their parents' help, some without their knowledge.

The social network is exploring ways it could get these kids to use the site and stay within the confines of the law. For example, parents will have to create accounts for children younger than 13 years old. They'll also get to approve any friend requests and be able to read messages and control the kids' profiles.

There are bound to be a lot of people scandalized by this, but most of them are going to be scandalized by one thing or another anyway. The move would solve a real problem and make the parents responsible for their kids' well-being, as they should.

Host Gator Hacked by S3rver.exe

The systems of Host Gator, a company that hosts over 8 million domains, have been breached by s3rver.exe. The hacker described the attack in a Pastebin document.

By leveraging a post cookie injection present on the site’s tickets subdomain, he managed to obtain the administrator’s password. Then he uploaded a shell that allowed him to gain access to the domain files of hostgator.com.

The data dump doesn’t seem to contain any sensitive information, but it shows that he has possessed access to certain restricted areas.

After the next phase, which s3rver.exe described as being a man-in-the middle attack, he contacted a member of Host Gator’s support team, asking him why the tracking.hostgator.com domain is down. The technician confirmed that for some reason there appeared to be “an issue on the server.”

At press time, the files uploaded by the hacker onto the tracking subdomain were still there.

AntiSec Hackers Reveal Security Holes in the UK’s NHS


A group of hackers called k0detec that describes itself as a “fraction of the Anonymous faction that is AntiSec” claims to have found major vulnerabilities in systems owned by the United Kingdom’s National Health Service (NHS).

The hackers whose location is spread out across the United States, UK and Eastern Europe have contacted Softpedia to reveal their discoveries.

“You may recall last year that LulzSec, which we of course claim only an ideological affiliation with, warned the British NHS that their systems were vulnerable,” the hackers said, referring to a BBC article.

“We have audited a number of NHS vessels and found them to be woefully insecure and not at all ship shape. We have even found logins and passwords to the UK govt GSI. This is a disappointment,” they explained.

K0detec claims to have gained access to a number of 11 systems owned by the NHS. In addition, they also have intranet access to a couple of the “vessels.”

Although they are able to access the credentials of thousands of users, the hackers state that it is not their intention to leak the data and cause damage.

“We have, obviously, a number of motivations in endeavoring to bring this issue to light,” a member of k0detec said.

“We wish to get our message out, that infosec snake oil salesmen are jeopardizing the privacy of the people, we also wish to embarrass the UK government and we wish to see the problems publicized and then fixed. We believe medical data of civilians to be, in essence, sacrosanct.”

The security experts believe that the NHS should have rigorous security auditing in place for their infrastructures and they even go as far as saying that some of the IT administrators and consultants “need to walk the plank.”

Worryingly, the exploits utilized by the hackers to compromise the organization’s systems and extract data are not zero-days, but publicly available vulnerabilities.

“Any claim that, once again, this is a ‘local problem’ is at best willful ignorance or at worst outright lies. If we have access to this information you can be guaranteed others do too, one compromised system leads quickly to a domino effect of fallen safeguards. This information also contains a goldmine of potential social engineering avenues,” they conclude.

To demonstrate their findings, the hackers have provided us with a small sample of information, allegedly obtained from NHS, that includes email addresses, names, usernames, job titles, and password hashes.

While the passwords are encrypted, k0detec members are confident that they can be decrypted.

Apple Publishes iOS Security Guide

Apple has quietly released a PDF document that details the iOS system architecture, encryption and data protection, network security, and more such topics in an apparent move to switch away from the stringent regime instated by the former Apple CEO, Steve Jobs.

Particularly aimed at organizations considering the security of iOS devices, the respective document “iOS Security” helps administrators understand “how the built-in security features work together to provide a secure mobile computing platform.”

Apple notes that its engineers have designed the mobile operating system with security as a core focus.

“Keeping information secure on mobile devices is critical for any user, whether they’re accessing corporate and customer information or storing personal photos, banking information, and addresses,” the document explains.

“Because every user’s information is important, iOS devices are built to maintain a high level of security without compromising the user experience.”

Although Apple bolstered security, iOS is still an easy-to-use platform: “The devices are designed to make security as transparent as possible.

"Many security features are enabled by default, so IT departments don’t need to perform extensive configurations. And some key features, like device encryption, are not configurable, so users cannot disable them by mistake,” the company elaborates.

The Mac maker even mentions malware, and how the iPhone, iPad, and iPod touch are all designed with multiple layers of security to keep cyber-crooks away.

“Low-level hardware and firmware features protect against malware and viruses, while high-level OS features allow secure access to personal information and corporate data, prevent unauthorized use, and help thwart attacks.”

For those who take great interest in the security of their iDevice, the document in question can be found right here.

Dota 2 Is Officially Free-to-Play, Has Support for Steam Workshop


Valve has confirmed that its upcoming Dota 2 multiplayer online battle arena (MOBA) title will be completely free-to-play, although users will be able to customize their heroes with different gear that can be sold via the in-game store, just like in Team Fortress 2. What’s more, add-ons for the game can also be developed and distributed through the Steam Workshop service.

Dota 2 is one of Valve’s big releases this year, alongside Counter-Strike: Global Offensive, so the studio wants to make sure that players will be thrilled with the multiplayer experience before its actual launch later this year.

After hinting and teasing that the game might be free-to-play, the studio has now confirmed that gamers can experience it without paying a single cent.

Money will be extracted from the in-game store, where Valve, as well as players can sell customizable items, just like in Team Fortress 2. However, the studio has emphasized that these items are just cosmetic and won’t offer advantages in the game.

“Today we’re announcing that Dota 2 will be free to play, and contain an in-game store where you’ll be able to buy fancy gear to customize your heroes. We wanted to address the two most common concerns right away: Dota 2 will not be a pay-to-win game. All the items in the store are cosmetic, and don’t affect gameplay. All of the heroes will be available free of charge. We believe restricting player access to heroes could be destructive to game design, so it’s something we plan to avoid.”

Besides the in-game store, players will be able to download add-ons and new content for the game via the Steam Workshop. From here, Valve can pick potential new features for the game, just like it’s doing with Team Fortress 2, and will pay users for their ideas.

“Today we’re also announcing that Dota 2 is now part of the Steam Workshop. If you’re not familiar with the Steam Workshop, it’s a place where fans can upload content they’ve created for a game, and other players can vote and comment on it. The development team then takes those uploads and releases them as official parts of the game itself, and the original fan creator gets a slice of the sales from the in-game store.”

Overall, Dota 2 is practically using the same successful system as Team Fortress 2 and, given the popularity of the online shooter, it’s quite a good idea.

Samsung Releases GALAXY S III Source Code


Android tech-savvy and developers rejoice as Samsung has just released Galaxy S III’s kernel source code. This means that modders will now be able to start creating custom kernels based on Samsung’s Android flagship smartphone.

Devs should take into consideration that the source code released is only valid for the international version of Galaxy S III (GT-I9300). However, we can safely assume that as soon as the North American variant goes on sale, Samsung will publish the kernel source as well.

Still, Android developers will be able to take advantage of this source code in order to tinker with one of the best smartphones that is now available on the market.

The Galaxy S III source code is now available for download via Samsung Open Source Community site, but in order to access it users will need a valid account.

No More Start Menu Hacks in Windows 8 Release Preview


In addition to the wide range of other changes that the almost-here Release Preview of Windows 8 is expected to pack in terms of performance and visual design, there might also be some that could make some users very unhappy.

Apparently, Microsoft has decided to put an end to the possibility to come up with third-party apps that recreate the classic start menu on Windows 8.

The company will remove the legacy code that enabled enthusiasts to offer such software in Windows 8 Developer Preview or Consumer Preview, and it will all start with the next flavor of the platform Release Preview.

When this OS version arrives, something that might happen today or tomorrow, rumor has it, the Start Button and the Start Menu that Windows users grew attached to will be gone for good.

In fact, the Redmond-based software giant is expected to make a similar move for other software that might have made the new Windows 8 flavor resemble the older platform releases, a recent article on WinSupersite reads.

The new Metro Start Menu is here to stay, and all customers, including end-users of business grade ones, should get accustomed to that. No one will be able to boot directly into the Desktop mode starting with Windows 8 Release Preview, and the same will apply to Windows Server 12 as well.

Of course, Microsoft designed Windows 8 to work great on devices featuring touchscreen displays, but that does not mean that the same design principles would fully apply to traditional PCs using a keyboard and mouse for input.

While this observation was made quite a few times before, it seems that Microsoft chose to ignore it. Furthermore, the company is so confident in Windows 8’s Metro UI capability to appeal to users, that it even said recently that users will learn to live with it.

The question is not whether that will indeed happen or not, but rather whether Microsoft will indeed manage to revolutionize the PC market with the inclusion of consumer-oriented mobile technologies into its core Windows products.

At the moment, Windows holds the largest market share in the PC, and its availability on tablet PCs and other mobile-centric devices should help it gain some more ground.

But with many “traditional” users protesting against the domination of the Metro interface in Windows 8, it remains to be seen whether the platform will indeed succeed becoming popular enough in the desktop segment to enjoy massive adoption in the consumer and business areas alike.