Jun 27, 2011

Crazy Call Spoofing

CrazyCall is the ultimate tool for making prank calls and fooling your friends.
You can change your CallerID, so when you call someone he sees on his Caller ID display the number you selected.
You can also change the pitch of your voice for deep and creepy or high and funny.
How is it done:

1st step
Select the country you are calling from, choose the CallerID you want to display and enter the number you want to call.

2nd step
Press "Get me a code" and we will provide you with number to call and a code.
Call the number

3rd step
Enter the code and we will connect your call to your friend with the CallerID and voice you have selected.

here is the screen shot of that site




download its application for android

note: this will cost as per your mbl cmpny's international call charge ...


by-- hemal modi


Hacking-class Doesn't take any responsibility how you use this information 

Jun 21, 2011

Make Your First Android Application


The Android Market is taking off. In March, over 9,000 applications hit the Android market, doubling the amount added the previous month, impressing Android users everywhere. Given the huge amount of new Android phones coming out this year, it doesn’t seem like things are going to level off anytime soon.

Recently, Google announced that they are sending free Nexus One or Droid devices to developers with 3.5+ stars and 5,000+ downloads on their applications – making it that much more attractive to become a (good) Android developer.


Want to know how to write Google Android apps? Android applications are written in Java – a relatively easy to learn, friendly language for new developers. Aside from the possibility of a free Nexus One and some money, you could actually contribute to the Android community. If you’ve got innovative ideas and the drive to see them spread, the Android market is for you! Let’s get you started on your very first Android application.

Before we get to how to write Google Android apps – first, a bit of overview. Android apps (much like almost any mobile app) are developed on a computer – PC or Mac (generally) – and then compiled and sent to the device for testing. If you don’t have an Android device yet, there are emulators that simulate an Android device on your computer, meaning that you can still develop an Android game or application without owning one.
before doing this..keep in mind that,,it will take some time..as many of us are the beginner,,it will surely take time to understand,,so read it care fully ,,this is basic for developing android application




1st step Get Eclipse

For this tutorial, I’m going to use Eclipse, because frankly it’s the easiest and most hassle-free development tool for Android right now. If you’re a NetBeans programmer, be my guest; but I’ll use Eclipse today.

dwnld



2nd step: Download The Java JDK

If you don’t have it already, you need to download the Java JDK 6. If you currently have the JDK 5, you should be okay, but there’s really no reason not to update. Just install it by downloading and then running through the setup to get things going. I’d recommend that you just hit next–>next–>finish, rather than doing anything fancy. Once you get things working, you can mess around a bit.


3rd : step Download The Android SDK Tools

Next, you’ll need to get the Android SDK Tools straight from Google. Unpack and install this to a directory you’ll remember – you need to reference this in the next few steps.


4th step: Configure Eclipse For Your Android

Start Eclipse, and head to ‘Help>Install New Software‘. Hit “Add…” and for the name, type “Android” and set the link to “https://dl-ssl.google.com/android/eclipse/” (if this doesn’t work, try it with http:// instead of https://).Click “OK” and the following should appear.


Select both of the resulting packages, and hit next – this will download the Android ADT (Android Development Tools). Go ahead and start the download to obtain these two packages. Restart Eclipse (it should prompt you to on completion of the downloads). We’re almost ready to start coding.
5th: Configure The Android SDK

Navigate to the folder you downloaded/unpacked the Android SDK to. In there, you’ll find a file named “SDK Setup.exe.” Start that file – the following dialogue should appear.



Don’t feel obligated to download every single thing. Could it hurt? Not really. For me, however, I only really want to program for Android 2.1 and 2.01, so those are the only API packages I bothered to get (someday I may pay for my folly, but not today). Either way, get what you want (and you do need to pick one) and hit install. The SDK manager will install it for a little while – go grab a snack.
6th: Set Up Your Android Virtual Device (AVD)

Now that you’ve finished yet another painful download, click over to “virtual devices” (still in the SDK Manager). We’re going to create an Android device that will test run your programs for you! Hit “New” to create a new Android device, and put in the specifications that you want it to have. In the screenshot below, you’ll see the options I wanted (that closely mimic that of my Motorola Droid).


Click “Create AVD” to–well–create your AVD. Select your AVD from the list, and hit “Start” to make sure that you do indeed have a working emulation of an Android phone. After a pretty lengthy start-up wait, it should look something like this.

wait for some time this Virtual environment will take time to load..
Fool around with it and explore for a bit if you want, then close it up so we can get back to work.
7th: Configure Eclipse Again

Remember that Android SDK we got earlier? We didn’t do anything with it. Now, it’s time to tell Eclipse where it is so Eclipse can use it as a resource. To do this, open Eclipse and navigate to Window>Preferences (or on Mac, Eclipse>Preferences) and select the Android tab. As shown below, browse to the location of your Android SDK and hit “Apply“.


Everything check out so far? Hit “OK” to save everything and let’s go program.
8th: Create A New Project

It’s finally time to code some. Navigate to ‘File>New>Other…>Android>Android Project‘, and input a project name, as well as some other details. If you want, copy from my screenshot below. Some of the fields need explaining that simply doesn’t belong here, so if you want to know more specifically, please let me know and maybe I’ll write an article about it.



Hit “Finish” and the project will be created.
9th: Input Your Code

In the tree on the left, navigate to the “src” folder and expand everything. Go to the file with the name of your “Activity” (created in step 8, mine was HelloWorld) and double click it to see the contents. Presently, your code has all of the content in black (with some minor modifications depending on your settings). To make a working “Hello world” program, you need to add the text that is in bold . Note that there are two bold “blocks” of code, and you need to add both to make things work.

//==========Start Code============
package com.android.helloandroid;

import android.app.Activity;
import android.os.Bundle;
import android.widget.TextView;

public class HelloAndroid extends Activity {
/** Called when the activity is first created. */
@Override
public void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
TextView tv = new TextView(this);
tv.setText("Hello, Android");
setContentView(tv);
}
}

//==========End Code============

I would love to explain all of the code, but that’s not exactly the point of this tutorial; the point is to get your feet off the ground. I know some/most of this is confusing; but it’s just how things are wired.
Step 10: Run Your Program

Above your code, you’ll see a little green “Play” button (or navigate to ‘Run>Run‘). Click it.When a popup box asks you how to run the application, you’re going to tell it to run as an “Android Application”. It will prompt you to save changes; hit yes.


Now you get to wait an eternity while your virtual device boots up. I’d recommend that you leave it open for the duration of your programming sprees, otherwise you’re going to spend more time watching the Android logo spin than you will watching your program freeze up. Just saying. Efficiency.

After everything’s done loading, your application should upload and start automatically. Which means that right after you “unlock” the device, you’ll be greeted with your first Android program.I only captured the top half of the screen because the rest of it is black.


That’s it, congratulations! The task can be a bit daunting at first; and definitely confusing, but if you stick with it you won’t be disappointed. If you step back and think about it, we only did a few really major things, the rest was just the process of connecting the pieces to make everything work.pls comment if u like it...


by- hemal modi

Jun 20, 2011

Basic Introduction to Metasploit | Hackersbay.in



The Basic ---- Introduction
  
What is Metasploit ?

The Metasploit Project is an open-source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its most well-known sub-project is the Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive, and security research.

Basically Metasploit is tool which provides complete environment for hacking.

Read More
___________________________________________________________________________

Using The Features

In this part we will talk about using the Exploits , Payloads , Auxiliary , Nops and Encoders

I think i don't need to explain what are these because it is already discussed in the first part 

Metasploit have


+ -- --=[ 684 exploits - 355 auxiliary
+ -- --=[ 217 payloads - 27 encoders - 8 nops



This may vary in your metasploit according to your version.


The Basic use of metasploit

1. Pick which exploit to use
2. Configure the exploit with remote IP address and remote port number
3. Pick a payload
4. Configure the payload with local IP address and local port number
5. Execute the exploit

Read More  
____________________________________________________________________________


Hacking a Box and Giving Instructions using meterpreter


Welcome to the Metasploit Basics Part 3. In this part i will show you a live example of how to own a PC with some exploit and what to do after the Meterpreter session is opened. In short i will explain you about the Meterpreter.

Meterpreter short form Meta-Interpreter .The Meterpreter is one of the advanced payloads available with the MSF. The way to look at the Meterpreter is not simply as a payload, but rather as an exploit platform that is executed on the remote system.The Meterpreter has its own command shell, which provides the attacker with a wide variety of activities that can be executed on the exploited system.in short the meterpreter helps us to overcome the limitations and disadvantages of a individual payload like the adduser payload 

Read More

_____________________________________________________________________________

Note To Readers - If you want to promote your articles or web blogs then i will do it for free even if your blog rank is the lowest in alexa or google.

Contact me at -facebook.com/sauravhacker

BeEF - Browser Exploitation Framework

BeEF is pioneering techniques that provide the experienced penetration tester with practical client side attack vectors. BeEF focuses on leveraging browser vulnerabilities to assess the security posture of a target, BeEF hooks one or more web browsers as beachheads for the launching of directed command modules. The framework allows the penetration tester to select specific modules (in real-time) to target each browser.  


Me Myself Enjoy Playing with it all the time..I love Playing with it ♥


You Can Download It From Here


You Don't Know How to install it ?? Don't worry the developers are gud guys they have a flash presentation for you 


Check it out here http://www.bindshell.net/
They also have some more things for you :) http://www.bindshell.net/

Check a video also


http://www.youtube.com/

Best Online Virus Scanners

Here are the list of some more common anti-virus software vendors online scanner web link. If your anti-virus do not work properly or if you have any doubt that your computer has been infected by a virus so scan your computer online.


BitDefender

Bitdefender is going to be a popular anti-virus solution, BitDefender Online Scanner is an on-demand antivirus and antispyware tool that lets you see just how safe your PC is for yourself. It detects and remove any virus and spyware on your computer online. 
 
Kaspersky 

Kaspersky is one of our favorite online virus scanner tool, it detect the virus and spyware using the same method as in the fully-functional anti-virus solution provides.It allows malware detection and to compare your result with the malware database for effective result.  

Panda Active Scan

Panda ActiveScan is Panda Software’sonline antivirus, that works directly over the Internet. With a simple click from your browser you can scan all your files and e-mail for viruses.  
 

ESET Online Scanner


ESET Online Scanner is a user friendly, free and powerful tool which you can use to remove malware from any PC utilizing only your web browser without having to install anti-virus software. ESET Online Scanner uses the same ThreatSense® technology and signatures as ESET Smart Security/ESET NOD32 Antivirus, and is always up-to-date. 


OneCare Online Scanner

Windows Live OneCare safety scanner is a free service designed to help ensure the health of your PC.  

 
 
 
 

Jun 13, 2011

Turkey police arrests 32 Anonymous hackers for DDOS attack


Turkey have detained 32 more suspects that the authorities believe are linked to Anonymous. The Turkish state-run news agency reports that the suspect were taken into custody by police after raids in dozens of cities it’s not clear how the police linked the 32 people to the hacker group.




The arrests in Turkey came after the hacker group targeted the Turkish websites of the prime minister’s office and parliament in what the group called a protest against the plans of the Turkish government to place filters on the internet.

Anonymous also issued a statement that said, “Regardless of how many times you are told, you refuse to understand. There are no leaders of Anonymous. Anonymous is not based on personal distinction,” the group posted in a statement. “You have not detained three participants of Anonymous. We have no members and we are not a group of any kind. You have, however, detained three civilians expressing themselves.” The group claims that its DDOS attacks are the same sort of peaceful protest that sitting in front of a shop somewhere denying entry is in the real world.

Jun 10, 2011

Motorola (Croatia) Website hacked..now its motorola's turn after sony???

Motorola's Croatia domain here it is is vulnerable to hackers. Croatia officially the Republic of Croatia is a country in Central Europe.
The Website is hacked and defaced by various hackers 2-3 times yesterday.





First it was defaced by Cocain Underground hacking team and currently a hacker from Turkey named "TeRoRisTe_Mc" have his deface page on the site.

by- hemal :]

Jun 8, 2011

Epic Games Database Hacked by Contra

Epic Games epic Database Hacked by Contra (Hacker) , He hack whole database and Leak all database structure online athere .





The Site of Epic Games is currently showing Database connection error.




EPIC--
Established in 1991, Epic Games develops cutting-edge games and cross-platform game engine technology.The company has created multiple million-selling, award-winning titles in its Unreal series, including Unreal Tournament 3 for PC, PLAYSTATION®3 and Xbox 360®. Epic’s Gears of War won over 30 Game of the Year awards, and the sales of Gears of War and Gears of War 2 have eclipsed 12 million units. Epic’s Unreal Engine 3 is the four-time winner of and Hall of Fame inductee for Game Developer magazine’s Best Engine Front Line Award. Unreal Engine 3 has also been recognized as the number one game engine by Develop magazine. Gears of War 3, the most anticipated blockbuster of 2011, is expected to hit stores September 20.


by-hemal08ce094

Google Vs Apple ..

Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Google Inc. purchased the initial developer of the software, Android Inc., in 2005. Android’s mobile operating system is based on the Linux kernel.






iOS (known as iPhone OS before June 2010) is Apple’s mobile operating system. Originally developed for the iPhone, it has since been extended to support other Apple devices such as the iPod touch, iPad and Apple TV.




Android features :
-Has variety of applications but less than iOS.
-Provides great user interface.
-Open-source.
-Full customization can be done.
-Based on Linux kernels, so of course it’s secure.
-Has multi-panel screens.






iOS features :
-Has great animations/graphics.
-Has best user interface ever.
-Has tons of applications.
-It only works on Apple devices, ie. iPad and iPhone. Apple doesn’t allow third party to use there iOS.
-Comes with a contract of 1 or 2 years, so you have to unlock and jail break the phone to get rid of this contract and then you can use any SIM.
Is dashing in looks.


by-Hemal08ce094

Anonymous Started War Against India's corruption #OpIndia

Hacker group Anonymous has come out in support of a civil movement against corruption in India by hacking one of the websites of a government IT organization.

Until now a large number of the hacks of websites in India were part of an ongoing cyber war between Indian and Pakistani hacker groups.







Anonymous put up its logo and a message for the country's Prime Minister Manmohan Singh on the website of the National Informatics Center according to The Hacker News. The page could not be accessed by Tuesday, but a cache of it on Google Search confirmed that it had been defaced by Anonymous.


"There is no use securing. There is no use of spending on forensic. Get this message clear Mr. Prime Minister and others", the message read.

The NIC is responsible for promoting and implementing IT projects including e-governance projects in the country.





A large number of Indians have rallied behind social activist Anna Hazare and a yoga guru Baba Ramdev in a fight against corruption in India. Ramdev's fast in Delhi was broken up over the weekend by the police, and he and his supporters were evicted from the venue.





Anonymous said in a message on Twitter that the NIC site had been defaced because of violence against Ramdev by the central government. Earlier it extended an invitation through Twitter for users to join in an operation against corruption in India.

Anonymous has also set up an Operation India page on
Facebook
and an account on Twitter to carry on the fight against corruption in India.


India's Minister of State for Communications & Information Technology, Sachin Pilot, told Parliament in May that the Government has taken several measures to detect and prevent cyber attacks and espionage. By computer security guidelines issued by Government, no sensitive information is to be stored on systems that are connected to Internet, he said.

The government has also formulated a Crisis Management Plan for countering cyber attacks and cyber terrorism for implementation by all ministries and departments of the federal, and state governments and critical sectors, Pilot said. Ministries and departments have also been advised to audit their IT systems regularly. Most often these guidelines are not taken seriously and a large number of hacks could have been avoided, an analyst said on condition of anonymity.


here is the link of site
cache of this site


i am fully support this group,for there fight against corruption.i am hopping same thing from you..and sorry for late post .. am busy this days..and i will try to update news as soon as possible from my side

Hemal...

Jun 7, 2011

Find Serial Key or Cracks for Any Software

This summary is not available. Please click here to view the post.

Jun 6, 2011

Lulzsec Leaks Source Code of Sony Computer Entertainment Developer Network !






Just Now ! BOOM ... By Lulzsec . They again hit SONY by releasing the complete source code of Sony Computer Entertainment Developer Network "scedev.net" Via there Twitter account. They provide a Mediafire file sharing link for download a 55.28 MB file :download

Total Exposure - The Hacker News [THN] Magazine - June 2011 | Issue 03

The Hacker News ,June Month Magazine is Released Now ! GET YOUR COPY TODAY. Its our Issue 03 with theme "Total Exposure" . We hope this monthly magazine will keep you update in Cyber World.


Content :
- Total Exposure
- Wikileaks : Exposure in true way
- Guide about selecting your Computer Security Consultant
- In the Realm of Cyber Breach
- Exploit Writers : Challenging Cyber Security
- Interview with Team Inj3ct0r
- IT Security Incident Management
- Interview with Core Anonymous Member : Anony_ops
- Exposure of Password secrets of Apple Safari
- Sony Hacked , Again hacked & Again Hacked
- Hacking News Highlights of the Month
- Hackers Toolkits Updates
- Security Tool : Buffer Zone


Download THN Magazine -- Rar File | PDF file (7.78 Mb)
Also Get Previous Issue 01 & 02 here

Facebook Password Extractor - Get passwords stored in Web browsers

Facebook Password Extractor is a free tool to recover passwords to Facebook accounts that are stored or cached in popular Web browsers.






Supporting the latest versions of Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera and Google Chrome, Facebook Password Extractor can reveal login information for multiple Facebook accounts in just a click.


Features:

Shows Facebook passwords cached or stored in a variety of browsers
Reveals stored login and password information instantly in just a click
Supports all versions of Microsoft Internet Explorer, including IE7, IE8 and IE9
Supports all versions of Mozilla Firefox including Firefox 4
Supports all versions of Opera including Opera 11
Supports all versions of Google Chrome including Chrome 11
Supports all versions of Apple Safari including Safari 5
Reveals Facebook logins and passwords for all supported browsers
Beats enhanced security model of Internet Explorer 7, 8 and 9.

Free for personal, non-commercial use, Facebook Password Extractor can instantly reveal cached login and password information to Facebook accounts.

Be aware before handing over your laptop/pc to anyone....OR you can hack your friends account just by installing this s/w on there pc/laptop...

download link

Massive Gmail phishing attack hits top U.S. officials

NEW YORK (CNNMoney) -- Hundreds of personal Gmail accounts, including those of some senior U.S. government officials, were hacked as a result of a massive phishing scheme originating from China, Google said Wednesday.






The account hijackings were a result of stolen passwords, likely by malware installed on victims' computers or through victims' responses to e-mails from malicious hackers posing as trusted sources. That type of hack is known as phishing. Gmail's security systems themselves were not compromised, Google said.


The company believes the phishing attack emanated from Jinan, China. In addition to the U.S. government personnel, other targets included South Korean government officials and federal workers of several other Asian countries, Chinese political activists, military personnel and journalists.

"The Department of Homeland Security is aware of Google's message to its customers," said Chris Ortman, a spokesman for the agency. "We are working with Google and our federal partners to review the matter, offer analysis of any malicious activity, and develop solutions to mitigate further risk."

Secretary of State Hillary Clinton addressed the issue Thursday morning.

"Google informed the State Department of this situation yesterday in advance of its public announcement," she said. "These allegations are very serious, we take them seriously, we're looking into them, and because this will be an ongoing investigation I would refer you to first Google for any details that they are able to share at this time, and to the FBI, which will be conducting the investigation."

Federal Bureau of Investigation spokesman Paul Bresson said the agency is working with Google and with U.S. government agencies "to review this matter further to identify the origin of this campaign and to see what information may have been compromised." He declined to comment further on the investigation.

The news comes a little more than a year after a separate hack originating from China affected Gmail accounts of Chinese human rights activists. In that case, attackers were able to break through Google's security systems, and two Gmail accounts were hacked.

That cyber attack set off a series of events that eventually led to Google ending its agreement with the Chinese government to censor certain search results, and the company physically moved its servers out of the country.

On Thursday, after the most recent cyber attack, a Chinese official insisted that his government takes the attacks seriously.

"We firmly oppose computer hacking or any illegal activity that harms net security and will severely punish anyone engaging in such activity according to law," said foreign ministry spokesman Hong Lei. "Computer hacking is an international problem and China is also a victim. Any accusation linking China to such activity is baseless and with ulterior motives."

This time around, the hack appears larger in scope -- but Google itself was not attacked. A person with knowledge of the attack's details said there was no apparent correlation between last year's attack and this one.

A spokesman from Google declined to comment on how the company obtained the information about the most recent hack. Public information, user reports and a third-party hacking blog called Contagio was used to determine the scope, targets and source of the attack.

The hackers were attempting to monitor the victims' e-mails, and some users' forwarding settings were altered.

The company urged users to "please spend ten minutes today taking steps to improve your online security so that you can experience all that the Internet offers -- while also protecting your data."

Google provided several examples of how Gmail users can better protect themselves from phishing attacks on its blog, including enabling a setting that allows users to login to their accounts only after receiving a verification code on their phones. The company also suggested that users monitor their settings for suspicious forwarding settings.


By --David Goldman @CNNMoneyTech
-CNN's Carol Cratty contributed to this report


REFERENCE
CNN

Jun 5, 2011

The state government’s websites are under threat of being hacked



An ‘ethical’ hacker demonstrates how one can break into the civic corporation’s e-governance site and I P Gautam’s official domain to access confidential info.

The state government’s websites are under threat of being hacked. A BCA student, who calls himself an ‘Ethical’ hacker, demonstrated how it was possible to hack into the e-governance site of the Ahmedabad Municipal Corporation and civic chief I P Gautam’s official domain.

Falgun Rathod showed on his home PC how these websites are vulnerable to misuse, poking the bubble of the state government that prides itself in winning three National e-Governance Awards recently.

Rathod also demonstrated how one can access the balance sheet of all nagarpalikas in the state that use the double entry accounting system. He pointed out that one can easily update any file on the website or change the face of the websites by using defacer websites.

While checking the AMC website, the 20-year-old student came across the ‘Administration log-in’ page. Out of curiosity, he explored a bit more into it and tried to implement authentication bypass (input validation attack).you can learn about this attack here INPUT-validation attack

He put a string, which is a unique code in computer language, in the login form, that has user name and password. The moment the account opened he realised that he had hacked into Municipal Commissioner I P Gautam’s ID which said, ‘Welcome I P Gautam’.

This was a shock for Rathod who realised how confidential information that is meant only for administrative work and staff can be used for illegal or malafide purposes.

He found that information like updates on the projects, tenders, sending mobile messages to the AMC employees was possible through the ID.

“If a hacker wishes to spread false information among the employees using the municipal commissioner’s domain ID, it is very much possible,” Rathod told Mirror.

Rathod decided to alert the AMC about this loophole in their system. Rathod and this Mirror reporter contacted I P Gautam, who in turn directed them to deputy municipal commissioner Dilip Mahajan who looks after the Information Technology department.

Mahajan appreciated Rathod’s proactiveness in bringing the issue to the civic corporation’s notice. “We will look into the issue closely. If laxity is found in the security system we will try to secure it at the highest level and solve it at the earliest,” Mahajan said.

Source 
AM

Great white sharks attracted by AC/DC hits

A shark cage tour operator has found that great white sharks are attracted to music by Aussie band AC/DC.



SHARKS ENTHUSIASTS HAVE USED fish guts to attract great white sharks for years, but it seems the fearsome creatures may be attracted to something more pleasing to their ears: music from Australian rock band AC/DC.

Matt Waller, a tour operator in South Australia's Neptune Bay, has observed that when sharks hear the band's hits, especially Shook Me All Night Long and Back in Black, they are drawn to the source of the music.









Matt's research was inspired by dive operators on Guadalupe Island, who discovered playing music underwater for clients also caused changes in shark behaviour. He and his company, Adventure Bay Charters, decided to do some experimenting of their own.

Using underwater speakers attached to diving cages, they pumped Australian rock hits through the water. Most of Matt's tunes had no effect, but when the great whites heard the AC/DC songs, they swam up and rubbed their faces against the source of the music.

Headbanging attraction

Matt acknowledges he is no expert on the minds of sharks and doesn't know exactly why they find the '80s rock band's music so appealing.

"Sharks don't have ears, they don't have long hair, and they don't head bang past the cage doing the air guitar," he told Australian Geographic.

The sharks are probably drawn to the low frequencies found in AC/DC's music, and Matt wants to test out this theory. "Once we've got a range of songs, we can electronically identify a common characteristic between those songs," he says.










Led Zeppelin is next on Matt's playlist, but his children are convinced that the sharks will be fans of the White Stripes and Wolfmother.

Matt's findings could help cage-diving operations become more environmentally sustainable by reducing the amount of berley used on tours. He says Adventure Bay Charters is currently the only company in the world that uses music, not bait, to attract sharks, but predicts other operators will soon follow his lead.
thanx to my friend chintan gurjar for informing me regarding this...


REFERENCE
REF.

Jun 3, 2011

Google +1

Google +1 Clickjacking Script !




A click jacking script for google's new +1 feature is released by one who named "yda". Its looking nice and in future, i think this one will become one of the most wanted script.it is similar to yahoo answer ..and giving some one reputation/like..for helping us...

You can see demo here:demo link






you can download source code from here..


http://www.filesonic.in/file/1117934581

NOTE: To make the button completely invisible change the 0.5 to 0 in this line:
opacity: 0.5; filter: alpha(opacity = 50);



REFERENCE
www.techieblogie.info

Reveal the Passwords Hidden Behind Asterisk (****)

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)you can try with any other site...//

2) Type your 'Username' and 'Password'.
Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.

javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!


Note :- This trick may not be working with firefox.

Faceniff Evil Android Application ... it is dangerous ;)

What is Faceniff?


FaceNiff is an Android application that lets users sniff and intercept web session profiles over Wi-Fi networks, stealing other users’ credentials from Facebook, Twitter and other services.
The app requires root access on the user’s Android smartphone, but other than that it’s fairly simple to use, which makes it perhaps even more dangerous than Firesheep, a Firefox extension that lets users hijack Facebook and Twitter sessions over Wi-Fi networks. FaceNiff also works on WPA-encrypted Wi-Fi networks, which Firesheep doesn’t support.

Right now it works with Facebook, Twitter, YouTube, and Nasza-Klasa (a Polish Facebook clone), but developer Bartosz Ponurkiewicz promises more are coming.

FaceNiff is much more flexible than Firesheep as the latter requires a computer. Nearly anything is accessible to FaceNiff users, providing they can get access to protected networks.

Here is the video of faceniff demonstrating the new attack



Confirmed to work on:
HTC Desire CM7
Original Droid/Milestone CM7
SE Xperia X10
Samsung Galaxy S
Nexus 1 CM7
HTC HD2
LG Swift 2X
LG Optimus Black - original rom
LG Optimus 3D - original rom
Samsung Infuse

For More Information Visit -


http://www.hackersbay.in/2011/06/faceniff-evil-android-application.html

Jun 2, 2011

ComPuter

  • "!sgub evah t'nseod CP sihT ?sgub naem ayaddahW"
  • "#define QUESTION ((bb) || !(bb)) - Shakespeare."
  • "Daddy, what does FORMATTING DRIVE C mean?"
  • "E=Mc^5...nahhh...E=Mc^4...nahh...E=Mc^3...ah, the hell with it."
  • "Mr. Worf, scan that ship." "Aye, Captain... 300 DPI?
  • "Today's subliminal thought is:"
  • "Virtual" means never knowing where your next byte is coming from.
  • 'Calm down -- it's only ones and zeros.'
  • 'Profanity: the universal programming language'
  • ..... REALITY.SYS Corrupted - Unable to recover Universe
  • ...now touch these wires to your tongue!
  • .signature not found! reformat hard drive? [Yn]
  • 10.0 times 0.1 is hardly ever 1.0.
  • 29A, the hexadecimal of the Beast.
  • :-) :-> ;-) :) "Smilies everyone, Smilies" Mr.Rourke
  • <-------- The information went data way -------->
  • A bad random number generator: 1, 1, 1, 1, 1, 4.33e+67, 1, 1, 1
  • A bug in the code is worth two in the documentation.
  • A bug in the hand is better than one as yet undetected.
  • A computer program does what you tell it to do, not what you want it to do.
  • A computer scientist is someone who fixes things that aren't broken.
  • A computer's attention span is only as long as its extension cord.
  • A fault tolerant system must report the faults even as it tolerates them.
  • A hacker does for love what others would not do for money. - Laura Creighton
  • A list is only as strong as its weakest link. - Don Knuth
  • A low level language is one whose programs require attention to the irrelevant.
  • A paperless office has about as much chance as a paperless bathroom.
  • A successful tool is used to do something undreamed of by its author. - Johnson
  • A)bort, R)etry or S)elf-destruct?
  • A)bort, R)etry, I)gnore, V)alium?
  • A)bort, R)etry, I)nfluence with large hammer.
  • A)bort, R)etry, P)ee in drive door
  • AAAAAA - American Association Against Acronym Abuse Anonymous
  • APATHY ERROR: Don't bother striking any key.
  • APL is a write-only language. - Roy Keir
  • ASCII to ASCII, DOS to DOS.
  • Abstraction is achieved by data hiding and enforced by encapsulation.
  • Adding manpower to a late software project makes it later. - Brook
  • Advanced design: Upper management doesn't understand it.
  • After a number of decimal places, nobody gives a damn.
  • All computers run at the same speed...with the power off.
  • All new: The software is not compatible with previous versions.
  • All programmers are playwrights and all computers are lousy actors.
  • All the simple programs have been written, and all the good names taken.
  • All wiyht. Rho sritched mg kegtops awound?
  • All you need to know is the user interface. - J. Redford
  • An algorithm must be seen to be believed. - D. E. Knuth
  • An elephant is a mouse with an operating system.
  • And on the seventh day, He exited from append mode.
  • Another megabytes the dust.
  • Any given program will expand to fill available memory.
  • Any nitwit can understand computers. Many do. - Ted Nelson
  • Any program that runs right is obsolete.
  • Any programming language is at its best before it is implemented and used.
  • Any sufficiently advanced bug is indistinguishable from a feature. - Kulawiec
  • Artificial Intelligence: Making computers behave like they do in the movies.
  • As far as we know, our computer has never had an undetected error. - Weisert
  • As of next week, passwords will be entered in Morse code.
  • Asking if computers can think is like asking if submarines can swim.
  • Asking whether machines can think is like asking whether submarines can swim.
  • Avoid GOTOs completely if you can keep the program readable.
  • Avoid temporary variables and strange women.
  • Avoid the Fortran arithmetic IF (or better yet, just avoid Fortran).
  • Avoid unnecessary branches.
  • BASIC is to computer programming as QWERTY is to typing. - Seymour Papert
  • BREAKFAST.COM halted... cereal port not responding!
  • Backup not found! A)bort, R)etry or P)anic?
  • Backup not found: A)bort, R)etry, M)assive heart failure?
  • Backups? We doan *NEED* no steenking baX%^~,VbKx NO CARRIER
  • Bad command or file name. Go stand in the corner.
  • Bad style destroys an otherwise superb program.
  • Base 8 is just like base 10, if you are missing two fingers. - Tom Lehrer
  • Be careful when a loop exits to the same place from side and bottom.
  • Beware of programmers who carry screwdrivers. - Leonard Brandwein
  • Brain fried; core dumped.
  • Breakthrough: It finally booted on the first try.
  • Breakthrough: It nearly booted on the first try.
  • Bug? That's not a bug, that's a feature. -T. John Wendel
  • C:\BELFRY is where I keep my .BAT files.
  • C:\GRAPHICS\GIF\NAUGHTY\FILTHY\DISGUSTING\WOW!
  • CCCP:> format CCCP: /u
  • CCITT - Can't Conceive Intelligent Thoughts Today
  • CChheecckk yyoouurr dduupplleexx sswwiittcchh..
  • Capt'n! The spellchecker kinna take this abuse!
  • Choose variable names that will not be confused.
  • Close your eyes and press escape three times.
  • Compatible: Gracefully accepts erroneous data from any source.
  • Computer Science: solving today's problems tomorrow.
  • Computer and car salesmen differ in that the latter know when they are lying.
  • Computer possessed? Try DEVICE=C:\EXOR.SYS
  • Computer programmers do it byte by byte.
  • Computers are a more fun way to do the same work you'd have to do without them.
  • Computers are only human.
  • Computers are unreliable, but humans are even more unreliable. - Gilb
  • Computers are useless. They can only give you answers. - Pablo Picasso
  • Computers talk to each other worse than their designers do.
  • Computers... are not designed, as we are, for ambiguity. - Thomas
  • Congratulations! You are the one-millionth user to log into our system.
  • Controlling complexity is the essence of computer programming. - Kernigan
  • Customer: A primitive life form at the bottom of the food chain.
  • DYNAMIC LINKING ERROR: Your mistake is now everywhere.
  • Death is a nonmaskable interrupt.
  • Debugger: A tool that substitutes afterthought for forethought.
  • Design simplicity: It was developed on a shoe-string budget.
  • Design: The activity of preparing for a design review.
  • Diagnostics are the programs that run when nothing else will.
  • Disc space, the final frontier!
  • Disclaimer: Any errors in spelling, tact, or fact are transmission errors.
  • Do files get embarrassed when they get unzipped?
  • Do you like me for my brain or my baud?
  • Document code? Why do you think they call it "code?"
  • Don't comment or patch bad code; rewrite it.
  • Don't compare floating point numbers solely for equality.
  • Don't diddle code to make it faster; find a better algorithm.
  • Don't document the program; program the document.
  • Don't hit the keys so hard, it hurts.
  • Don't let the computer bugs bite!
  • Don't stop at one bug.
  • Dreams are free, but you get soaked on the connect time.
  • EBCDIC: Erase, Back up, Chew Disk, Ignite Card
  • E Pluribus UNIX.
  • Earth is 98% full...please delete anyone you can.
  • Emacs is a nice operating system, but I prefer UNIX. - Tom Christiansen
  • Error 13: Illegal brain function. Process terminated.
  • Esc key to reboot Universe, or any other key to continue...
  • Every bug you find is the last one.
  • Every program in development at MIT expands until it can read mail.
  • Every program is a part of some other program, and rarely fits.
  • Every program is either trivial or it contains at least one bug.
  • Everybody needs a little love sometime; stop hacking and fall in love!
  • Exclusive: We're the only ones who have the documentation.
  • Expert systems are built to embody the knowledge of human experts. - Kulawiec
  • Field tested: Manufacturing doesn't have a test system.
  • Finish your mail packet! Children are offline in India.
  • Foolproof operation: All parameters are hard coded.
  • Foolproof operation: All parameters are hard coded.
  • From C:\*.* to shining C:\*.*
  • Futuristic: It only runs on the next-generation supercomputer.
  • Futuristic: It will only run on a next generation supercomputer.
  • God is REAL, unless explicitly declared INTEGER.
  • God is real, unless declared integer.
  • God made machine language; all the rest is the work of man.
  • Gotta run, the cat's caught in the printer.
  • Hackers have kernel knowledge.
  • Hardware: The parts of a computer system that can be kicked.
  • Help! I'm trapped in a Chinese computer factory!
  • Hex dump: Where witches put used curses...
  • Honey, I Formatted the Kid!
  • Host System Not Responding, Probably Down. Do you want to wait? (Y/N)
  • How an engineer writes a program: Start by debugging an empty file...
  • How do I love thee? My accumulator overflows.
  • How do I set my laser printer on stun?
  • How was Thomas J. Watson buried? 9 edge down.
  • I am a computer, dumber than any human and smarter than an administrator.
  • I am still waiting for the advent of the computer science groupie.
  • I am the computer your mother warned you about.
  • I bet the human brain is a kludge. - Marvin Minsky
  • I came, I saw, I deleted all your files.
  • I do not fear computers. I fear the lack of them. - Isaac Asimov
  • I haven't lost my mind; it's backed up on tape somewhere.
  • I just found the last bug.
  • I modem, but they grew back.
  • I must have slipped a disk; my pack hurts.
  • I smell a wumpus.
  • I suppose when it gets to that point, we shan't know how it does it. - Turing
  • I used to have a life, then I got v32bis!
  • I'm a modemer and I'm OK. I post all night and I sleep all day.
  • I'm not a sysop, I just play one on the echoes.
  • IBM: I Blame Mathematics
  • IBM: I Breaks Monthly
  • IBM: I Bring Madness
  • IBM: I Broke Mine
  • IBM: I Built Mine
  • IBM: I bring manuals
  • IBM: I'd Be Misinforming
  • IBM: I'd Buy Macintosh
  • IBM: I'll Buy Macintosh
  • IBM: I'm Being Manipulated
  • IBM: I'm Beyond Mistakes
  • IBM: I'm Buying Macintosh
  • IBM: I've Become Magnanimous
  • IBM: I've Been Mangled
  • IBM: I've Been Mauled
  • IBM: I've Been Mesmerized
  • IBM: I've Been Misled
  • IBM: Ici Beaucoup Merde
  • IBM: Iconoclastic Bilateral Monopoly
  • IBM: Icons Bygones My Mom's
  • IBM: Idealistically Backwards Microcomputers
  • IBM: Ideas Bring Money
  • IBM: Idiots Became Managers
  • IBM: Idiots Being Mental
  • IBM: Idiots Built Me
  • IBM: Idle Brain Malfunction
  • IBM: Ifs Buts Maybys
  • IBM: Ill'manners Being Mandatory
  • IBM: Ill-mannered Besotten Macrocasm
  • IBM: Illustrious Bankruptcy Malenfactor
  • IBM: Illustrious Busy Mice
  • IBM: Imbecile Bad Micros
  • IBM: Imensa Bola De Manteca
  • IBM: Imitable Boring Microcomputers
  • IBM: Immeasurable Bigheaded Malapert
  • IBM: Immovable Brash Monolith
  • IBM: Impeccably Blue-dressed Managers
  • IBM: Imperial Bellicose Marauder
  • IBM: Imperialist by Marketing
  • IBM: Impersonal Bellicose Magnate
  • IBM: Impious Bacchnalain Metropolis
  • IBM: In Business (for) Money
  • IBM: Inadequates Becoming Millionaires
  • IBM: Inane Brutish Merchandising
  • IBM: Incompatible Blue Machines
  • IBM: Inconsistent Business machines
  • IBM: Incontinent Bandolerisimo Moloch
  • IBM: Increasingly Bad Manufacturing
  • IBM: Increasingly Banal Movement
  • IBM: Incredible Bowel Movement
  • IBM: Incredibly Bad Merchandising
  • IBM: Incredibly Ballsey Marketeers
  • IBM: Incredibly Belligerent Marketing
  • IBM: Incredibly Big Manufacturer
  • IBM: Incredibly Big Monster
  • IBM: Incredibly Bloody Minded
  • IBM: Incredibly Boastful Mercenary
  • IBM: Incredibly Boring Manuals
  • IBM: Incredibly Broad Monolopy
  • IBM: Incredibly Bullying Menace
  • IBM: Indecision Breeds Mistakes
  • IBM: Indecorous Big-named Medusoid
  • IBM: Indigestion Bothers Me
  • IBM: Industry Bowel Movement
  • IBM: Industry's Biggest Mistake
  • IBM: Industry's Bulging Monolith
  • IBM: Inept Bulling Menace
  • IBM: Inevitably Bad Marketing
  • IBM: Inferior Before Macintosh
  • IBM: Infernal Biggest Mistake
  • IBM: Infernal Blue Machines
  • IBM: Infinite Budget Merchandising
  • IBM: Infinitely Baffling Motives
  • IBM: Inherently Bad Manuals
  • IBM: Innovation By Management
  • IBM: Insanely Better Marketing
  • IBM: Insensitivity Begets Mediocrity
  • IBM: Inshallah Burak Ma'lesh
  • IBM: Insidious Byzantine Mentality
  • IBM: Insignificant Bothersome Machine
  • IBM: Insipidly Bankrolling Millions
  • IBM: Insolent Bickering Mal-der-mer
  • IBM: Install Bigger Memory
  • IBM: Insulting Boorish Manner
  • IBM: Insultingly Boring Microcomputers
  • IBM: Intensely Boring Machines
  • IBM: Intentionally Braindamaged Machinery
  • IBM: Intercourse Beats Masturbation
  • IBM: Interesting But Mediocre
  • IBM: Interesting But Mundane
  • IBM: Intergalactic Bottomline Mistake
  • IBM: Internals By Mediocrity
  • IBM: International Bit Mangler
  • IBM: International Bowel Movement
  • IBM: Intersmashable Byte manipulators
  • IBM: Into Building Money
  • IBM: Intriguingly Blue Motif
  • IBM: Invented By Maladroits
  • IBM: Invented By Marketing
  • IBM: Invented By Murphy
  • IBM: Irresponsibility Behaved Multinational
  • IBM: It Broke Be
  • IBM: It's Become Monolithic
  • IBM: It's Been Malfunctioning
  • IBM: It's Better 'morrow
  • IBM: It's Better Manually
  • IBM: It's Beyond Monolithic
  • IBM: It's Broke Ma'am
  • IBM: It's Bugging Me
  • IBM: It's Bullshit Mommery
  • IBM: Itty Bitty Machines
  • IBM: Itty Bitty Mentality
  • IBM: Itty Bitty Mouse
  • IBM: Itty Bity Maharishi
  • If God had intended Man to program, we would be born with serial I/O ports.
  • If I had it all to do over again, I'd spell creat with an "e". - Kernighan
  • If a program is useful, it must be changed.
  • If a program is useless, it must be documented.
  • If a train station is where the train stops, what is a work station?
  • If at first you don't succeed, call it version 1.0
  • If at first you don't succeed, you must be a programmer.
  • If it was easy, the hardware people would take care of it.
  • If only women came with pull-down menus and online help.
  • If the code and the comments disagree, then both are probably wrong. - Schryer
  • If you have a procedure with 10 parameters, you probably missed some.
  • Implementation is the sincerest form of flattery.
  • In /dev/null no one can hear you scream
  • In God we trust; all else we walk through.
  • In computer science, we stand on each other's feet. - Brian Reid
  • In the long run, every program becomes rococco, and then rubble. - Alan Perlis
  • Is reading in the bathroom considered Multi-Tasking?
  • It is easier to change the specification to fit the program than vice versa.
  • It is easier to write an incorrect program than understand a correct one.
  • It is now pitch dark. If you proceed, you will likely fall into a pit.
  • It is ten o'clock; do you know where your processes are?
  • It said, "Insert disk #3," but only two will fit!
  • It wasn't as easy to get programs right as we had thought. - Wilkes, 1949
  • It's 10 o'clock. Do you know where your child processes are?
  • It's here at last: We've released a 26-week project in 48 weeks.
  • It's redundant! It's redundant! -R. E. Dundant
  • Justify my text? I'm sorry but it has no excuse.
  • Kiss your keyboard goodbye!
  • Know Thy User.
  • LISP: To call a spade a thpade.
  • Last one out, turn off the computer!
  • Let the machine do the dirty work. - Elements of Programming Style
  • Life would be much easier if I had the source code.
  • Life would be so much easier if we could just look at the source code.
  • Lisp Users: Due to the holiday, there will be no garbage collection on Monday.
  • Logic is neither an art or a science but a dodge.
  • Logic: The art of being wrong with confidence...
  • Long computations that yield zero are probably all for naught.
  • MC Hammer, n. Device used to ensure firm seating of MicroChannel boards
  • MIPS: Meaningless Indicator of Processor Speed.
  • Machine independent code isn't.
  • Machine-independent: Does not run on any existing machine.
  • Maintenance free: It's impossible to fix.
  • Maintenance-free: When it breaks, it can't be fixed...
  • Make input easy to proofread.
  • Make it right before you make it faster.
  • Make sure all variables are initialized before use.
  • Make sure comments and code agree.
  • Make sure your code "does nothing" gracefully.
  • Managing programmers is like herding cats.
  • Maniac: An early computer built by nuts...
  • Manual Writer's Creed: Garbage in, gospel out.
  • May the bugs of many programs nest on your hard drive.
  • Maybe Computer Science should be in the College of Theology. - R. S. Barton
  • Me and my two friends... GIF and Wesson.
  • Meets quality standards: Compiles without errors.
  • Meets quality standards: It compiles without errors.
  • Memory dump: Amnesia...
  • Microwave: Signal from a friendly micro...
  • Modem: How a Southerner asks for seconds...
  • Mommy! The cursor's winking at me!
  • Multitasking: Screwing up several things at once...
  • My BBS is baroque now. Please call Bach later with your Handel.
  • My Go this amn keyboar oesn't have any 's.
  • My computer NEVER cras
  • My computer isn't that nervous, it's just a bit ANSI.
  • My computer's sick. I think my modem is a carrier.
  • My mail reader can beat up your mail reader.
  • My sister opened a computer store in Hawaii. She sells C shells by the seashore.
  • Netnews is like yelling, "Anyone want to buy a used car?" in a crowded theater.
  • Never forget: 2 + 2 = 5 for extremely large values of 2.
  • Never put off till run-time what you can do at compile-time. - D. Gries
  • Never test for an error condition you don't know how to handle. - Steinbach
  • Never trust a computer you can't lift. - Stan Masor
  • Never trust a computer you can't throw out the window. - S. Hunt
  • Never underestimate the bandwidth of a station wagon full of tapes. - Jackson
  • Never violate the Prime Directory! C:\
  • Never write software that anthropomorphizes the machine.
  • Never write software that patronizes the user.
  • New: It comes in different colors from the previous version.
  • Nice computers don't go down.
  • No extensible language will be universal. - T. Cheatham
  • No line available at 300 baud.
  • No program done by a hacker will work unless he is on the system.
  • No program done by an undergrad will work after she graduates.
  • Nobody has ever, ever, EVER learned all of WordPerfect.
  • Nostalgia: The good old days multiplied by a bad memory...
  • Objects are closer than they appear.
  • Old mail has arrived.
  • Old programmers never die; they just branch to a new address.
  • On a clear disk you can seek forever. -Computerworld button
  • On a clear disk you can seek forever. - Denning
  • On a clear disk you can seek forever...
  • One if by LAN, two if by C. - Paul Revere, as told by John Karwoski
  • One man's constant is another man's variable. - Perlis
  • One person's error is another person's data.
  • One picture is worth 128K words.
  • Overflow on /dev/null; please empty the bit bucket.
  • People who deal with bits should expect to get bitten. - Jon Bentley
  • Performance is easier to add than clarity.
  • Performance proven: It works through beta test.
  • Portable: Survives system reboot.
  • Press [ESC] to detonate or any other key to explode.
  • Printed on 100% recyclable phosphor.
  • Profanity is the one language all programmers know best.
  • Programmer: One who is too lacking in people skills to be a software engineer.
  • Programmers do it bit by bit.
  • Programming Department: Mistakes made while you wait.
  • Programming is an art form that fights back.
  • Programming is an unnatural act.
  • Programming just with goto's is like swatting flies with a sledgehammer.
  • Programs: What software used to be, back when we knew how to write it.
  • Protect your software at all costs; all else is meat.
  • Quality assurance: A way to ensure you never deliver shoddy goods accidentally.
  • RAM DISK is not an installation procedure!
  • REALITY.DAT not found. Atempting to restore Universe......
  • REALITY.SYS corrupted- reboot Universe (Y/N)?
  • Random access is the optimum of the mass storages.
  • Real programmers use: COPY CON PROGRAM.EXE
  • Real programs don't eat cache.
  • Remember the good old days, when CPU was singular?
  • Remember, UNIX spelled backwards is XINU.
  • Replace repetitive expressions by calls to a common function.
  • Resistance is useless! (If < 1 ohm) Revolutionary: 
  • Disk drives go round and round. Revolutionary: 
 
  • [If you can't hear me, it's because I'm in parentheses]
  • [Unix] is not necessarily evil, like OS/2. - Peter Norton
  • f u cn rd ths, u cn gt a gd jb n cmptr prgrmmng.
  • fortune: No such file or directory
  • "From there to here, and here to there, funny things are everywhere." -- Dr. Seuss
  • "The joyfulness of a man prolongeth his days." -- New Testament
  • Translation: Laugh and you'll live longer...
  • There are two ways to live: one is as if nothing is a miracle; the other as if everything is. -- Albert Einstein
  • "In order to deviate successfully, one has to have at least a passing acquaintance with whatever norm one expects to deviate from." -- Frank Zappa, from The Real Frank Zappa Book
  • "Claudia, you're the only woman who's accepted me for the man I can't help being..." -- Paul, on Spin City, proposing to Claudia
  • "For a change, lady luck seemed to be smiling on me. Then again, maybe the fickle wench was just lulling me into a false sense of security while she reached for a rock." -- The Icarus Hunt, by Timothy Zahn
  • "Oh, you hate your job? Why didn't you say so? There's a support group for that. It's called EVERYBODY, and they meet at the bar." -- Drew Carey
  • "He (the husband) was trying to help... (with the kids), but... well, you know..." -- Christina Krol
  • "You should never wear your best trousers when you go out to fight for freedom and liberty." -- Henrik Ibsen
  • "For those of you who like to lie awake nights and worry about things ponder this: the United States Navy will be building an aircraft carrier that will run its communications systems, aircraft launch, and weapons systems using Microsoft Windows-based operating systems." -- TNPCN
  • "A human being should be able to change a diaper, plan an invasion, butcher a hog, conn a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders, cooperate, play solitaire, solve equations, analyze a new problem, pitch manure, program a computer, cook a tasty meal, fight efficiently, die gallantly. Specialization is for insects." -- Robert Heinlein (slightly edited)
  • "I know that if I just beat my head against the wall long enough, an idea will infallibly result, but there is always the nameless terror that maybe this time the Muse is not merely hitchhiking through Georgia but has been kidnapped, murdered and tumbled into a ditch. Or maybe she's mad at me." -- David Lance Goines, from Goines Posters
  • Theory vs practice: "In theory there is no difference between theory and practice. In practice, there is." -- Yogi Berra
  • "It's important that people should know what you stand for. It's equally important that they know what you won't stand for." -- Mary H. Waldrip
  • I can only conclude that I'm paying off karma at a vastly accelerated rate. -- Lt. Cmdr. Susan Ivanova ("Points of Departure", Babylon 5)
  • In the beginning, there was nothing. And God said: "Let there be light!" And there was still nothing, but you could see it. -- Unknown
  • From a distance, it is impossible to tell if an administrator associated with your project is sitting on his hands or covering his butt. -- Unknown
  • Don't worry about people stealing your ideas. If your ideas are any good, you'll have to ram them down people's throats. -- Howard Aiken
  • The scientist does not study nature because it is useful; he studies it because he delights in it, and he delights in it because it is beautiful. If nature were not beautiful, it would not be worth knowing, and if nature were not worth knowing, life would not be worth living. -- Jules Henri Poincaré
  • The issue is not whether you are paranoid. Look around you Lenny. The issue is whether you are paranoid enough. -- Strange Days
  • Quidquid latine dictum sit, altum sonatur.
  • (Whatever is said in Latin sounds profound).
  • A life with neither misery nor pleasure is an empty, neutral existance... to actively seek nothingness is worse than defeat... how can you admire a human who consciously embraces the bland, the mediocre, and the safe rather than risk the suffering that disappointments can bring? -- Tom Robbins
  • Relationships are hard. It's like a full-time job, and we should treat it like one. If your boyfriend or girlfriend wants to leave you, they should give you two weeks' notice. There should be severance pay, and before they leave you, they should have to find you a temp. -- Bob Ettinger
  • God is like, so cool. Think of the coolest person in your life. He made that person. And he's cooler than that. -- Justine Bateman
  • The White House has always attracted the mentally ill.
  • -- Vincent Charles, Secret Service Agent
  • (explaining why security was heightened around the White House)
  • I always wanted to be somebody, but I should have been more specific. -- Lily Tomlin
  • "The purpose of the experiment was to identify those who objected to it taking place" -- Vladimir Nabakov, the novelist
  • "Those are my principles. If you don't like them I have others." --Groucho Marx
  • "I used to think that the brain was the most wonderful organ in my body. Then I realized who was telling me this." -- Emo Phillips
  • Nitwit ideas are for emergencies. You use them when you've got nothing else to try. If they work, they go in the Book. Otherwise you follow the Book, which is largely a collection of nitwit ideas that worked. -- Larry Niven, "The Mote in God's Eye"
  • "At the heart of science is an essential tension between two seemingly contradictory attitudes - an openness to new ideas, no matter how bizarre or counterintuitive they may be, and the most ruthless skeptical scrutiny of all ideas, old and new. This is how deep truths are winnowed from deep nonsense. Of course, scientists make mistakes in trying to understand the world, but there is a built-in error-correcting mechanism: The collective enterprise of creative thinking and skeptical thinking together keeps the field on track." -- Carl Sagan
  • "In science it often happens that scientists say, 'You know that's a really good argument; my position is mistaken,' and then they actually change their minds and you never hear that old view from them again. They really do it. It doesn't happen as often as it should, because scientists are human and change is sometimes painful. But it happens every day. I cannot recall the last time something like that happened in politics or religion." -- Carl Sagan, 1987 CSICOP keynote address
  • "The surest sign that intelligent life exists elsewhere in the universe is that it has never tried to contact us." -- Calvin and Hobbes, Bill Watterson
  • "If I had not been a monk, I would have become an engineer." -- The Dalai Lama
  • "If there is anything the nonconformist hates worse than a conformist, it's another nonconformist who doesn't conform to the prevailing standard of nonconformity." -- Bill Vaughan
  • "Never interrupt someone doing something you said couldn't be done." -- Amelia Earhart
  • I blinked at her. "Uh, I find I'm astonished again. How is this place run? Is it an anarchy?" Hazel shrugged. Justin Foote looked thoughtful. "No I wouldn't say so. It is not that well organized." -- Robert A. Heinlein: The Cat Who Walks Through Walls
  • Mowery's Observation: "It's hard to make things foolproof because fools are so darn ingenious." -- Dave Mowery
  • A foolish man speaks before he thinks, a wise man thinks before he speaks, but a godly man lets his life speak for him. -- author unknown
  • "I'm not a smart man, but I know what love is." -- Forrest Gump
  • The Wisdom and Weirdness of Douglas Adams
  • "There is a theory which states that if ever anybody discovers exactly what the Universe is for and why it is here, it will instantly disappear and be replaced by something even more bizarre and inexplicable. There is another theory which states that this has already happened." -- Douglas Adams "The Hitchhikers Guide to the Galaxy"
  • "Don't try to outweird me, I get stranger things than you with my breakfast cereal every morning." - Zaphod BeebleBrox
  • "Curiously enough, the only thing that went through the mind of the bowl of petunias as it fell was 'Oh no, not again.' Many people have speculated that if we knew exactly why the bowl of petunias had thought that we would know a lot more about the nature of the Universe than we do now." -- Douglas Adams
  • For a moment, nothing happened. Then, after a second or so, nothing continued to happen. -- Douglas Adams "The Hitchhikers Guide to the Galaxy"
  • Various Tag Lines
  • No matter what happens... somebody will find a way to take it too seriously.
  • API (Poland): A small two-seater Cessna 152 plane crashed into a cemetery early this afternoon in central Poland. Polish search and rescue workers have recovered 300 bodies so far and expect that number to climb as digging continues into the evening."
  • Just because something's toxic doesn't mean it's not tasty.
  • There are two kinds of people in the world: Those who need closure. -- Mark Schmidt
  • Warning: Belief in strange ideas does not guarantee that strange ideas will believe in you.
  • 'Have you tried re-installing?' is a registered trademark of Microsoft Corp.
  • If a man speaks in the forest and there is no woman around to hear him, is he still wrong?
  • I'll never forget what grandpa said right before he passed away: "Aaaaah! No! NO! Aaaaaiiiee! Get it offa me! Get it off!! Aieeeergh!"
  • I'll never forget what grandpa said right before he passed away: "Let's see here... Red on yellow... OK, this one's a King snake, see?"
  • I want to die peacefully in my sleep like my grandpa, not screaming and yelling in terror like his passengers.
  • Intuition (n): an uncanny sixth sense which tells people that they are right, whether they are or not.
  • It's never too late to have a happy childhood.
  • Just because you're paranoid doesn't mean that people aren't out to get you.
  • Just because you're you doesn't mean I'm not.
  • Motto of the Bomb Squad: If you see us running, you'd better catch up.
  • Politicians, like diapers, should be changed frequently, and for the same reasons.
  • Heisenberg may have been here.
  • Error - Keyboard not found.. Press Enter to Continue
  • Maturity is for those too young to know better
  • If you are not part of the solution, you are part of the precipitate
  • From the perspective of quantum theory, you don't look at light, it looks at you... probably.
  • PCMCIA - People Can't Memorize Complicated Internet Acronyms
  • Now go away, or I shall taunt you a second time!
  • Not one shred of evidence supports the notion that life is serious.
  • Blessed are they who can laugh at themselves for they shall never cease to be amused.
  • Last night I blasted a blank tape at full volume. The mime next door went nuts.
  • Just remember...if the world didn't suck, we'd all fall off.
  • Men are from earth. Women are from earth. Deal with it.
  • There is always one more imbecile than you counted on.
  • Someone who thinks logically provides a nice contrast to the real world.
  • Perl: the only language that looks the same before and after RSA encryption
  • ...so when the project started we all drew lots to see who would be made the scapegoat if it fails...
  • iMac: never trust a product which is hyped on the basis of its packaging...
  • Your mouse has moved. Windows NT must be rebooted for the changes to take effect.
  • Some mornings, it's just not worth chewing through the leather restraints...
  • Ahh, arrogance and stupidity all in one package. How very efficient! -- Babylon 5
  • When the chips are down, the buffalo is empty.
  • All generalizations are false.
  • Friends help you move. Real friends help you move bodies.
  • Baroque (adj.): When you are out of Monet.
  • Warning! Humor may be hazardous to your depression!
  • I'm lost. I've gone to look for myself. If I should return before I get back, please ask me to wait.
  • Advice for the day: If you have a lot of tension and you get a headache, do what it says on the aspirin bottle: Take two and keep away from children.
  • Q: How many surrealists does it take to change a lightbulb? A: Three: one to hold the giraffe, the other to fill the bathtub with the brightly-coloured machine tools.
  • How many of you believe in telekinesis? Raise my hand...
  • Quantum mechanics: The dreams stuff is made of.
  • Plan to be spontaneous - tomorrow.
  • Any sufficiently advanced bug is indistinguishable from a feature
  • Today's mighty oak is just yesterday's nut that held its ground.
  • Insanity is my only means of relaxation
  • Sometimes I think I understand everything, then I regain consciousness
  • What is this talk of 'release'? Klingons do not make software 'releases'. Our software 'escapes' leaving a bloody trail of designers and quality assurance people in its wake.
  • If you're too open minded, your brains will fall out
  • Some mistakes are too much fun to only make once.
  • Psychiatry is the care of the id by the odd.
  • Sign on Interstate 10, Near Phoenix, "AZ State Prison Ahead: Do Not Stop for Hitchhikers"
  • life, n.: A whim of several billion cells to be you for a while
  • When tempted to fight fire with fire, remember that the Fire Department usually uses water.
  • Why do people who know the least know it the loudest?
  • Profanity: the universal programming language.
  • Computer analyst to programmer: "You start coding. I'll go find out what they want."
  • The programmer's national anthem is 'AAAAAAAAHHHHHHHH'. -Weinberg, p.152
  • If debugging is the process of removing bugs, then programming must be the process of putting them in. -Dykstra
  • God is REAL, unless explicitly declared INTEGER.
  • Programming is an art form that fights back.
  • My software never has bugs. It just develops random features.
  • The sex was so good that even the neighbors had a cigarette
  • You're just jealous because the voices talk only to me.
  • Earth is the insane asylum for the universe.
  • It's lonely at the top, but you eat better.
  • Give me ambiguity or give me something else.
  • Elvis is dead and I'm not feeling too good myself.
  • NyQuil -The stuffy, sneezy, why-the-heck-is-the-room-spinning medicine
  • Be yourself. No one can ever tell you you're doing it wrong.
  • Never under any circumstances take a sleeping pill and a laxative on the same night.
  • I'm not different, I'm statistically challenged
  • There is a very fine line between "hobby" and "mental illness".
  • Good judgment comes from bad experience, and a lot of that comes from bad judgment.
  • Experience is something you don't get until just after you need it.
  • The quickest way to double your money is to fold it in half and put it back in your pocket.
  • There are two theories to arguing with women. Neither one works.
  • Generally speaking, you aren't learning much when your mouth is moving.
  • Never miss a good chance to shut up.
  • My wife keeps complaining I never listen to her ... or something like that.
  • Alcohol and calculus don't mix. Never drink and derive.
  • I don't have a license to kill. I have a learner's permit.
  • No trees were killed in the sending of this message. However a large number of electrons were temporarily inconvenienced.
  • Repeat after me, "we are all individuals..."
  • Everyone is entitled to their own opinion. It's just that yours is stupid.
  • Live your life so that when you die, the preacher won't have to tell lies at your funeral.
  • Life is short, make fun of it.
  • If you can't beat 'em, arrange to have 'em beaten.
  • The race is not always to the swift, nor the battle to the strong, but that's the way to bet. If it's you against the world, bet on the world.
  • If there's one thing we learn from history, it's that we don't learn from history.
  • There is no mechanical or electronic problem so difficult that it can not be solved by brute force and ignorance.
  • You do not have to believe in miracles to depend upon them.
  • A good friend will come and bail you out of jail. But a true friend will be sitting in jail with you saying, "Man! that was fun!"
  • I almost had a psychic girlfriend but she left me before we met.
  • He who laughs last, thinks slowest.
  • Welcome to the Brave New World. Hope everyone brought an antacid?
  • If that wasn't enough for you, see Bumper Snickers and One-Liners.
  • Laws, Rules and Theorems Explaining the Working of the Universe
  • Stapp's Ironical Paradox, AKA Stapp's Law: the universal aptitude for ineptitude makes any human accomplishment an incredible miracle.
  • Treiman's Theorem: Impossible things don't usually happen.
  • O'Reilly's law of the kitchen: Cleanliness is next to impossible.
  • Lieberman's law: Everybody lies, but it doesn't matter since nobody listens.
  • Denniston's law: Virtue is its own punishment.
  • Gold's law: If the shoe fits, its ugly.
  • Conway's law: In any organization, there will always be one person who knows what is going on. This person should be fired.
  • Finster's law: A closed mouth gathers no feet.
  • Lynch's law: When the going gets tough, everyone leaves.
  • Muir's law: When we try to separate anything out by itself, we find it hitched to everything else in the universe.
  • Glyme's formula for success: The secret of success is sincerity. Once you can fake that, you've got it made.
  • Mason's first law of synergism: The one day you'd sell your birthright for something, birthrights are a glut.
  • Hanlon's razor: Never attribute to malice that which is adequately explained by stupidity.
  • Handy guide to modern science: If it's green or wriggles, it's biology. If it stinks, it's chemistry. If it doesn't work, it's physics.
  • Green's law of debate: Anything is possible if you don't know what you're talking about.
  • Stewart's law of retroaction: It is easier to get forgiveness than permission.
  • First rule of history: History doesn't repeat itself, historians merely repeat each other.
  • Oliver's law of location: No matter where you go, there you are.
  • Harrison's postulate: For every action, there is an equal and opposite criticism.
  • Lerman's Law of Technology: Any technical problem can be overcome given enough time and money.
  • Corollary: You are never given enough time or money.
  • Murphy's First Law for Wives: If you ask your husband to pick up five items at the store and then you add one more as an afterthought, he will forget two of the first five.
  • Law of the Search: The first place to look for anything is the last place you would expect to find it.
  • Corollary: It will not be in the last place you expect to find it.
  • Kauffman's Paradox of the Corporation: The less important you are to the corporation, the more your tardiness or absence is noticed.
  • The Salary Axiom: The pay raise is just large enough to increase your taxes and just small enough to have no positive effect on your take-home pay.
  • Miller's Law of Insurance: Insurance covers everything except what happens.
  • First Law of Living: As soon as you start doing what you always wanted to be doing, you'll want to be doing something else.
  • Weiner's Law of Libraries: There are no answers, only cross-references.
  • Isaac's Strange Rule of Staleness: Any food that starts out hard will soften when stale. Any food that starts out soft will harden when stale.
  • Kenny's Law of Auto Repair: The part requiring the most consistent repair or replacement will be housed in the most inaccessible location.
  • Second Law of Business Meetings: If there are two possible ways to spell a person's name, you will pick the wrong one.
  • Corollary - If there is only one way to spell a name, you will spell it wrong anyway.
  • The Grocery Bag Law: The candy bar you planned to eat on the way home from the market is hidden at the bottom of the grocery bag.
  • Yeager's Law: Washing machines break down only during the wash cycle.
  • Corollary: All breakdowns occur on the plumber's day off.
  • Lampner's Law of Employment: When leaving work late, you will go unnoticed. When you leave work early, you will meet the boss in the parking lot.
  • Quile's Consultation Law: The job that pays the most will be offered when there is no time to deliver the services.
  • Loftus' Law: Some people manage by the book, even though they don't know who wrote the book or even which book it is.
  • Lovka's Dilemma: You never get away, you only get someplace else.


  • Hacking Tricks Latest

  • The difference between genius and stupidity is; genius has its limits.
  • Albert Einstein

  • A woman drove me to drink and I didn't even have the decency to thank her.
  • W. C. Fields

  • Tragedy is when I cut my finger. Comedy is when you walk into an open sewer and die.
  • Mel Brooks

  • There's so much comedy on television. Does that cause comedy in the streets?
  • Dick Cavett

  • Everything ends this way in France - everything. Weddings, christenings, duels, funerals, swindlings, diplomatic affairs - everything is a pretext for a good dinner.



  • "My mother never saw the irony in calling me a son-of-a-bitch."
  • Jack Nicholson

  • "Clinton lied. A man might forget where he parks or where he lives, but he never forgets oral sex, no matter how bad it is."
  • Barbara Bush (Former US First Lady)

  • "Ah, yes, divorce, from the Latin word meaning to rip out a man's genitals through his wallet."

  • Robin Williams

  • "Women complain about premenstrual syndrome, but I think of it as the only time of the month that I can be myself."
  • Roseanne

  • "Women need a reason to have sex. Men just need a place."
  • Billy Crystal Police arrested two kids yesterday, one was drinking battery acid, the other was eating fireworks. They charged one and let the other one off."
  • Tommy Cooper

  • "Security puts a premium on feebleness."
  • H.G. Wells

  • "I wanna live 'til I die, no more, no less."
  • Eddie Izzard

  • "I have nothing to declare except my genuis."
  • Oscar Wilde

  • "Money couldn't buy you friends, but you get a better class of enemy."
  • Spike Milligan


  • "The big difference between sex for money and sex for free is that sex for money costs less."

  • Brendan Francis

  • " At my age I do what Mark Twain did. I get my daily paper, look at the obituaries page and if I'm not there I carry on as usual."
  • Partick Moore

  • "I'm not a vegetarian because I love animals, I'm a vegetarian because I hate plants."
  • A. Whitney Brown

  • "All the men in my family were bearded, and most of the women."
  • W.C.Fields

  • "I never made a mistake in my life; at least, never one that I couldn't explain away afterwards."
  • Rudyard Kipling


  • "If it weren't for the killings, Washington would have one of the lowest crime rates in the country."
  • Mayor Marion Barry

  • "Seven out of ten people suffer from hemmorhoids." Does this mean that the other three enjoy it?
  • Sal Davino

  • "Too bad that all the people who know how to run the country are driving taxi cabs and cutting hair."
  • George Burns

  • "Honesty is the key to a relationship. If you can fake that, you're in."
  • Richard Jeni

  • "Never interrupt your enemy when he is making a mistake."
  • Napoleon Bonaparte



  • "A woman's mind is cleaner than a man's. She changes it more often."
  • Oliver Herford

  • "Women might be able to fake orgasms. But men can fake whole relationships."
  • Sharon Stone

  • "My girlfriend always laughs during sex---no matter what she's reading."
  • Steve Jobs (Founder: Apple Computers)

  • "I saw a woman wearing a sweatshirt with "Guess" on it. I said, "Thyroid problem?"
  • Arnold Schwarzenegger

  • "Hockey is a sport for white men. Basketball is a sport for black men. Golf is a sport for white men dressed like black pimps."
  • Tiger Woods

  • "If toast always lands butter-side down, and cats always land on their feet, what happens if you strap toast on the back of a cat and drop it?"
  • Steven Wright

  • "For three days after death, hair and fingernails continue to grow but phone calls taper off."
  • Johnny Carson


  • "I've often thought that the process of aging could be slowed down if it had to go through Congress."
  • George Bush

  • "USA Today has come out with a new survey: Apparently three out of four people make up 75 percent of the population."
  • David Letterman

  • "Work is the curse of the drinking classes."
  • Oscar Wilde

  • "Arrogant and right is surely better than humble and wrong."
  • Geoff Arbuthnot



  • "Maybe there is no actual place called hell. Maybe hell is just having to listen to our grandparents breathe through their noses when they're eating sandwiches."
  • Jim Carrey

  • "Some mornings, it's just not worth chewing through the leather straps."
  • Emo Philips


  • "I'm desperately trying to figure out why kamikaze pilots wore helmets."
  • Dave Edison

  • "Did you ever walk in a room and forget why you walked in? I think that's how dogs spend their lives."
  • Sue Murphy

  • "Now they show you how detergents take out bloodstains, a pretty violent image there. I think if you've got a T-shirt with a bloodstain all over it, maybe laundry isn't your biggest problem. Maybe you should get rid of the body before you do the wash."
  • Jerry Seinfeld

  • "A sure cure for seasickness is to sit under a tree."
  • Spike Milligan

  • "Why don't they make the whole plane out of that black box stuff." "A fast word about oral contraception. I asked a girl to go to bed with me, she said 'no'."
  • Woody Allen


  • "I played a lot of tough clubs in my time. Once a guy in one of those clubs wanted to bet me $10 that I was dead. I was afraid to bet."
  • Henry Youngman

  • "I once heard two ladies going on and on about the pains of childbirth and how men don't seem to know what real pain is. I asked if either of them ever got themselves caught in a zipper."
  • Emo Philips

  • "Everywhere is within walking distance if you have the time."
  • Steven Wright



  • "I'm so unlucky that if I was to fall into a barrel of nipples I'd come out sucking my thumb."
  • Freddie Starr

  • "How long was I in the army? Five foot eleven."
  • Spike Milligan

  • "My neighbour asked if he could use my lawnmower and I told him of course he could, so long as he didn't take it out of my garden."
  • Eric Morecambe

  • "You're about as useful as a one-legged man at an arse kicking contest."
  • Rowan Atkinson a.k.a. Mr. Bean

  • "Don't knock masturbation, it's sex with someone I love ."
  • Woody Allen

  • "I don't care to belong to a club that accepts people like me as members."
  • Groucho Marx





REFERENCE 
http://litemind.com/best-famous-quotes/
http://coolquotescollection.com/


by- Hemal 

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More