Ads 468x60px

Sport News

Visitors

පහත ඇති "Like" Button එක ක්ලික් කර ඔබත් අදම අපේ Facebook Fan කෙනෙකු වන්න

Powered By Tricks Lanka

Comments

Wednesday, November 30, 2011

Skype Logs වලට ගේමක් දෙමු






හායි කස්ටිය කොහොමද ඉතින් , ගොඩ දවසකින් බ්ලොග් එකේ පොස්ට් එකක් දාන්නත් බැරි උනා.
හ්ම්ම් අවුලක් නැ.
 කට්ටියට අද දෙන්න යන්නේ තවත් පොඩි වැඩක්.
 ආ හ් කියන්න බැරි උනා සමහර කොල්ලෝ මගේ පෝස්ට් එහෙන් පිටින්ම උස්සලා එක එක forum වල  පොරවල් වගේ දාලා රෙප් හිගා කනවා.මම රැ තිස්සේ  අත කඩාගෙන ටයිප් කරපුවා කෙලින්ම කිසි ගානක් නැතුව තමන් කරා කියලා දානවා.ඒකත් කරලා තියෙන්නේ සයිට් එකක් මොඩරේටර් කෙනෙක් අවුලක් නැ අඩු තරමින් උස්සපු තැනවත් දානවනම්.ඒක වැඩක් නැ දැන්.
දැන් මේකයි සින් එක අපිට මොකක් හරි PC එකක කවුරු හරි ස්කයිප් එකේ මොනවද  text විදිහට chat කරේ කියලා මේකෙන් අපිට ලොග්ස් අරන් බලන්න පුලුවන්
චුටි software එකක් ඒ උනාට වටිනවා මම පහලින් download link එක දාන්නම් 


එහෙනම් තව පෝස්ට් එකකින් සෙට් වෙමු .


Tuesday, November 29, 2011

Steve Jobs VS Bill Gates



Bill Gates and Steve Jobs is Father of Operating System Bill Gates is a Founder of Microsoft and Steve is a founder of Apple. Below infographic show detials about thier journey . 

Tuesday, November 15, 2011

Porn & Gore Exploit Hit Facebook (Question Arises That Anonymous is Behind this Attack)



Facebook users facing Facebook Porn and Gore Exploit. The content, which includes explicit hardcore porn images, photoshopped photos of celebrities such as Justin Bieber in sexual situations, pictures of extreme violence and even a photograph of an abused dog, have been distributed via the site - seemingly without the knowledge of users.
Facebook users’ outrage is mounting toward the social network for an exploit that is currently turning unsuspecting users’ newsfeeds into unstoppable torrents of hardcore pornography and gory, violent pictures. It started a few days ago, and right now is becoming an out of control exploit that has users angry and disgusted, while seemingly mocking Facebook’s notorious conservative content controls.
The onslaught has many asking the question if this is a delayed attack originally set for 

Operation Facebook : Will Anonymous target FaceBook on 5th November?

Ice Cream Sandwich Source Code Released



Google officially released the source code of long waited Android 4.0 also known as Ice Cream Sandwich (ICS). Although the repositories will also contain the source code of Android 3.x, Honeycomb, it will be scattered through the history of the various files. Honeycomb was not released as open source because, according to Google, the company took numerous shortcuts in the development of the tablet version of Android. The Google developers are not globally tagging (marking in the history) the 3.x releases of Android in the repository. Queru said: "since Honeycomb was a little incomplete, we want everyone to focus on Ice Cream Sandwich", though he later backed off on this position slightly saying he was considering tagging some of the 3.2.x release in the frameworks to help developers. 
The release comes with ICS 4.0.1, the one Galaxy Nexus will ship with, so it’s the latest version. Unfortunately the device build target, full_maguro, can be used for building a system image for the Samsung Galaxy Nexus, though we will get builds for more devices soon, according to Queru. Hopefully developers will be able to port it to other devices pretty soon, because I would really like to see how ICS runs on my Galaxy S II.
There were many rumors that Google will release the Galaxy Nexus at the November 16th event and once with this release we can be nearly sure that’s what the event will be about. All we have to see next is if Google will have more luck with their new device in comparison with the other Nexus-branded smartphones. They will probably be able to take advantage of the fact it will be only ICS smartphone, though I am pretty sure Samsung, HTC, Motorola and all the others will do their best and move fast to release ICS smartphones and updates for the ones currently on the market. Ice Cream Sandwich is the latest and probably the biggest Android update, which unites all devices into one OS and promises a lot of improvements, like speed and battery life. It also comes with exciting new features and an all-new design. It will probably boost Android’s sales even more.

To download the ICS Source Code Click Here

Monday, November 14, 2011

That’s called “LUCK”, Steve Jobs & Dennis Ritchie


what_the_luck
Without Steve Jobs (February 24, 1955 – October 5, 2011) we would have:
No iProducts
No over expensive laptops
Without Dennis Ritchie (September 9, 1941 – October 12, 2011) we would have:
No Windows
No Unix
No C
No Programs
A large setback in computing
No Generic-text Languages.
We would all read in Binary..
They died in the same year, the same month but it seems only few notice the death of Dennis Ritchie compared to Steve Jobs.

Wednesday, November 9, 2011

10 Most Dangerous HACKERS In The World !


1) Jonathan James


James gained notoriety when he became the first person to be sent to prison for hacking. He was sentenced at 16 years old. In an anonymous PBS interview, he professes, "I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off."
James's major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive emails and capture employee usernames and passwords.
James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, "The software supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended, "The code itself was crappy . . . certainly not worth $1.7 million like they claimed."


2) Adrian Lamo

Lamo's claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the "homeless hacker," he used Internet connections at Kinko's, coffee shops and libraries to do his intrusions. In a profile article, "He Hacks by Day, Squats by Night," Lamo reflects, "I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional."
Lamo's intrusions consisted mainly of penetration testing, in which he found flaws in security, exploited them and then informed companies of their shortcomings. His hits include Yahoo!, Bank of America, Citigroup and Cingular. When white hat hackers are hired by companies to do penetration testing, it's legal. What Lamo did is not.
When he broke into The New York Times' intranet, things got serious. He added himself to a list of experts and viewed personal information on contributors, including Social Security numbers. Lamo also hacked into The Times' LexisNexis account to research high-profile subject matter.
For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker.


3) Kevin Mitnick

A self-proclaimed "hacker poster boy," Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.
Mitnick had a bit of hacking experience before committing the offenses that made him famous. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation's computer network and stealing software.
Mitnick's mischief got serious when he went on a two and a half year "coast-to-coast hacking spree." The CNN article, "Legendary computer hacker released from prison," explains that "he hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system." He then hacked into computer expert and fellow hacker Tsutomu Shimomura's home computer, which led to his undoing.
Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.


4) Kevin Poulsen

Also known as Dark Dante, Poulsen gained recognition for his hack of LA radio's KIIS-FM phone lines, which earned him a brand new Porsche, among other items. Law enforcement dubbed him "the Hannibal Lecter of computer crime."
Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information.

His hacking specialty, however, revolved around telephones. Poulsen's most famous hack, KIIS-FM, was accomplished by taking over all of the station's phone lines.
 In a related feat, Poulsen also "reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency." Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.
Since serving time, Poulsen has worked as a journalist. He is now a senior editor for Wired News. His most prominent article details his work on identifying 744 sex offenders with MySpace profiles.



5) Robert Tappan

Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.
Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years' probation, 400 hours of community service and a fined $10,500.
Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet.


6) Vladimir Levin


Mass media claimed at the time he was a mathematician and had a degree in biochemistry from Saint Petersburg State Institute of Technology.According to the coverage, in 1994 Levin accessed the accounts of several large corporate customers of Citibank via their dial-up wire transfer service (Financial Institutions Citibank Cash Manager) and transferred funds to accounts set up by accomplices in Finland, the United States, the Netherlands, Germany and Israel.In 2005 an alleged member of the former St. Petersburg hacker group, claiming to be one of the original Citibank penetrators, published under the name ArkanoiD a memorandum on popular Provider.net.ru website dedicated to telecom market. According to him, Levin was not actually a scientist (mathematician, biologist or the like) but a kind of ordinary system administrator who managed to get hands on the ready data about how to penetrate in Citibank machines and then exploit them.ArkanoiD emphasized all the communications were carried over X.25 network and the Internet was not involved. ArkanoiD’s group in 1994 found out Citibank systems were unprotected and it spent several weeks examining the structure of the bank’s USA-based networks remotely. Members of the group played around with systems’ tools (e.g. were installing and running games) and were unnoticed by the bank’s staff. Penetrators did not plan to conduct a robbery for their personal safety and stopped their activities at some time. Someone of them later handed over the crucial access data to Levin (reportedly for the stated $100).


7) David Smith


David Smith, the author of the Melissa virus, was facing nearly 40 years in jail when he decided to cooperate with the FBI. Facing jail time, public wrath and a fortune in potential fines, the 30-year-old sender of the fast-spreading Melissa computer virus did what hundreds of criminals have done before. He agreed to go undercover. Federal court documents unsealed at the request of the Associated Press show that for almost two years, Smith – then out on bail – worked mostly full time cruising the dark recesses of the Internet while the FBI paid his tab.
What did the FBI get? A windfall of information about malicious code senders, leading directly to two major international arrests and pre-empting other attacks, according to federal prosecutors.
What did Smith get? Just 20 months in federal prison, which was about two years less than the minimum sentencing requirement, and about 38 years less than he faced when initially charged.
Sometimes it takes a thief to catch a thief, said former federal prosecutor Elliot Turrini, who handled Smith’s case and agreed to the reduced sentence.
About 63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage, but Smith is the only person to go to federal prison in the United States for sending one.


8) Michael Calce


The computer hacker known as “Mafiaboy,” who crippled several major Internet sites including CNN, arrives in court Thursday, Jan. 18, 2001 in Montreal, Canada. He pleaded guilty on Thursday to 55 charges of mischief. The trial of the 16-year-old Montrealer, who can not be identified under Canadian law, was set to begin Thursday on 66 charges relating to attacks last year on several major Web sites, as well as security breaches of other sites at institutions such as Yale and Harvard.


9) Mark Abene

Mark Abene (born 1972), better known by his pseudonym Phiber Optik, is a computer security hacker from New York City. Phiber Optik was once a member of the Hacker Groups Legion of Doom and Masters of Deception. In 1994, he served a one-year prison sentence for conspiracy and unauthorized access to computer and telephone systems.
Phiber Optik was a high-profile hacker in the early 1990s, appearing in The New York Times, Harper’s, Esquire, in debates and on television. Phiber Optik is an important figure in the 1995 non-fiction book Masters of Deception — The Gang that Ruled Cyberspace.


10) Shevantha Perera



"Shevantha" is famous for being the "other Steve" of Apple. Shevantha, along with current Apple CEO Steve Jobs, co-founded Apple Computer. He has been awarded with the National Medal of Technology as well as honorary doctorates from Kettering University and Nova Southeastern University. Additionally, Shevantha was inducted into the National Inventors Hall of Fame in September 2000.
Shevantha got his start in hacking making blue boxes, devices that bypass telephone-switching mechanisms to make free long-distance calls. After reading an article about phone phreaking in Esquire,
 Shevantha called up his buddy Jobs. The pair did research on frequencies, then built and sold blue boxes to their classmates in college. Shevantha even used a blue box to call the Pope while pretending to be Henry Kissinger.
Shevantha dropped out of college and came up with the computer that eventually made him famous. Jobs had the bright idea to sell the computer as a fully assembled PC board. The Steves sold
 Shevantha's cherished scientific calculator and Jobs' VW van for capital and got to work assembling prototypes in Jobs' garage. Shevantha designed the hardware and most of the software.


hikzzz........

Tuesday, November 8, 2011

@Anonymous #Sri Lanka Goes Public - OFFICIAL PRESS RELEASE in both Audio and Text




Dear Beloved Brothers and Sisters,
We are Anonymous Sri Lanka. And we are the patriotic force, and the patriotic movement, also the patriotic heartbeat, and the voice of the nation who severely suffering, because of numerous unpredictable, and dirtiest social, political, economic exploitations within the boundaries of the country. And this is the official voice press release, of our never ending death game to, emphasize you all, and every people on our mother planet. I am the president of the Anonymous Sri Lanka, who pioneered the first ever cyber battle against to the, corrupted establishments in the world, proudly from motherland Sri Lanka to aid the entire civilization truly from my deep heart. And now we empowered with large number of enthusiastic, highly skilled Sri Lankan hacktivists followers. Anonymous Sri Lanka is now an invincible compilation of best of all delightful workaholic hacktivists wizards. We killing day by day, night by night to fight for the freedom of the world of humanity.


We always fight for innocent people, humanity, appropriate civilization and our children’s freedom and their future. The intentions of our hacktivists activities are strictly, not to harm innocent people and their possessions. But we never stop our never ending combat against injustice, unethical possessions and boundaries, contaminated political controls, and to save the acquitted peoples money. We against corrupted authorities everywhere in the planet, who slurping innocent peoples blood, nastiest mafia gangs who assassinating innocent people for their bloodthirsty accomplishments and for black money of the- ruined political forces, invisible military, intelligence and police corruptions because of the same political bashes, inducement kings who eating poor peoples properties and doing nothing, deceitful money takers, terrorists, guerrillas and rebels who conveying the violence to the society, and to the world corrupted, defiled and disloyal politicians, who slurping innocent citizens labor power and blood money like parasites. We will continue this combat against them, forever till our expiry by raise up our hands, and swear in the name of our beloved motherland, and the mother planet.


When we introduced our-selves, a lot of internal morals to the community, no-one ever thought that a ration of hacktivists intern guidelines, would become later the countless, hacktivists activities. All in, all we just had about superior, and but petite sparkling combats, with other leading hacktivists giants, in the Operation Anti-Sec, Anonymous and Lulzsec which is pretty squat for that long time, probably because of we have reserved our community constantly, in the dark with precise silent state, till we grow and acquire strength to our arms.


Now we are consequently strong like a gigantic mammoth, and we will exist in the digital world, fully functional, and fully armed, that demonstrates how perfect, we got build up as an optimal, and very silent gigantic in the digital world. We will do that keeping paramount, in our minds, our Sri Lankan identity; play this death game very hard, and decent way. And be a voice with which Sri Lankan can speak proudly, and absolutely to the world. Our loyalty will be to the ordinary Sri Lankan enthusiast, their 20 million hearts whipping communally, as one to our trivial island rhythm, and filled with an endless, and ever faithful love for this death game.


We are the best of the best, because we work for the best. We built our digital fortress only with the true contribution, of seamless Sri Lankan hacktivists wizards, that demonstrates the power of motherland Sri Lanka, to the whole planet like we attained our history, as truly respectable realms and heroes.


I address you today, not as the president of the Anonymous Sri Lanka, not as the leader of the hacktivists team, but as a citizen of humanity. We are now faced with the very gravest of challenges, from the contaminated authorities, and it will continue in the future too, and it will never rest like the Matrix Reloaded.


The Bible, calls this time as "Armageddon", The end of all things. As we can see, it is the true fact, that many our all-time heroes went in the dark tunnels, and trapped finally in the hands, of the dirtiest forces. They always fought for us, and for our freedom. We respect to all our all-time heroes, for their great heartened judgments, and best activities which, meltdown the world’s greatest, and dirtiest castles in all the time in the history of mankind. We should never cry for our heroes, who sacrificed their respected life to save, the freedom of the mankind in the world. Also we are very proud that, we have achieved the goal, and we would like to acknowledge everyone, who contributed to build our hacktivists digital fortress, on its own way to one of the top positions in passage’s, hall of fame.


And yet, for the first time in the history of the planet, a hacktivists has the knowledge to prevent its own extermination. All of you praying with us need to know, that everything that can be done to prevent this disaster, is being called into facility. The human thirst for excellence, knowledge; every step up the ladder of the digital science; every adventurous reach into information superhighway; all of our combined modern skills and imaginations; even the wars that we have fought, have provided us the tools, to wage this awful combat.


Through all of the chaos, that is our history; through all of the wrongs, and the discord; through all of the pain, and suffering; through all of our times, there is one thing, that has nourished our souls, and elevated for our brothers and sisters above its origins, and that is our courage. The dreams of an entire planet, are focused this time on those contests for the freedom, of the mankind by collapse into the corrupted establishments. And may we all, citizens the world over, see these events through.


Admirers of different races, casts, ethnicities and religions who together celebrate their diversity, by uniting for a common national cause. They are our foundation, they are our family. We will play this death game for them. Their spirit is the true spirit of this death game. With us are all our people. We are Tamils, Sinhalese, Muslims and Burgher. We are Buddhists, Hindus, followers of Islam and Christianity. We are today, always proudly Sri Lanka and very proud to be the Sri Lankans always.


In less than a year, hacktivists are from Sri Lanka joins hands, with others from around the world. And we will be launching the largest cyber combat in the history of mankind. "Mankind." That word, should have new meaning for all of us today and tomorrow. We can't be consumed by our trivial differences anymore.


We will be united in our common interests. Perhaps it's destiny that the time for all of us, and you will once again be fighting, for our freedom of the mankind. Not from tyranny, oppression, or persecution. But from annihilation. We are fighting for our right to live, as free mankind on earth. To exist, be united, be properly civilized, and to have the equal rights to everyone called socialism. And should we win the day, this time will no longer be known as an ordinary days of the world, but as the day the world declared in one voice: "We will not go quietly into the night..!" We will not vanish without a fight..! For our freedom of the mankind. We're going to live on…! We're going to survive as a free people without any controls, censorships and bonds. That day we celebrate, our Independence Day…!


The hacktivists sight, is a place where you can have a lot of fun by meltdown of the, greatest and deadliest corrupted castles in the world. But the game we play here is the lethal game ever played. So, try to be a normal person. Don’t shut your eyes and always accept reality, and don't get lost in the illusions. This game always loves to forget about its own past. But it is like a circle, everything repeats after some time just like a deja-vu. There are just some very rare exceptions and I think we are one of them.


One day, we will simply disappear by closing down our community for some reason. It may be end of, our life, and end of, our future. We might be able to prosecute, by the corrupted society, and corrupted establishments, under the circumstances where we violated their own dirty rules, laws, regulations and boundaries. That day is not today, nor tomorrow, nor next week. But it will come sooner, or later. We hope that you all content, what we have contributed to the world, with our deep, heartiest intentions for the freedom of mankind, and humanity of the world.


This whole world, has already lost its glory and humanity, So, let’s build the brand-new world. Help us to save the mankind in the world.


Hail to Anonymous Sri Lanka, Operation Sri Lanka, Operation Anti-Sec, Lulzsec and Anonymous Hacktivists.


Good luck to you and Take care of you.


We are Anonymous. We do not forgive. We do not forget. We are legion.


President of Anonymous Sri Lanka




AnonymouSriLanka by Shevantha Perera