Wednesday, July 11, 2007

Warez Search

The internet is filled with illegal applications, cracks, games, movies, TV rips, e-books - collectively referred to as warez. There are many ways to obtain warez from usenet, torrent sites, rapidshare, and many others. Today we will share some knowledge on how to search the internet for warez.


One of the best places to start searching for anime is AnimeDB. It has a database of nearly every anime ever released. Find the anime you are looking for using the search bar. Each anime has it's own page where you can view all the groups that are releasing that particular show.

Lots of useful information such as languages, comments, ratings of each group allows you to choose which group to download from. From there follow the link to the group's site to download.


If you are searching for software cracks, then Astalavista has a useful search engine of the major warez sites. Be careful though as many sites are filled with malware. Make sure your browser is sandboxed using Sandboxie or DefenseWall.

Always search for serials or keygens first as some cracks contain malware. Be sure to scan it first with your anti-virus. For extra precaution, scan the files online with VirusTotal or Jotti Scanner.


A good e-book search engine is eBdb. It indexes several major e-book sites as well as many obscure sites (usually Russian - use Google Translate).


There are several useful torrent search engines. The most famous is isoHunt. It indexes most of the major torrent sites and has a very good search engine. Due to legal troubles however, isoHunt's days appear to be numbered.

Another torrent search engine is Torrent Finder. It takes a different approach to isoHunt, in that it is a meta-search engine, allowing you to choose which sites to search and then presenting the original sites in a tabbed interface. Very useful but slow.

If you fancy searching via Google Custom Search, someone has already created a Google Custom Torrent Search here. It searches 50 sites, uses Google search but may not be that updated.

If you are still stumped then two sites provide an index of sites. Both group sites into categories. They can be found here and here.


Several online storage sites allows you to store any kind of file and for anyone to download them. MyBloop is catered towards, but not limited to, music - has unlimited storage, allows you to listen to songs for free and using this hack allows you to download them.

Many of the file upload sites such as Rapidshare, MegaUpload and others hosts warez files. Again Google Custom Search allows you to search for warez on 127 such sites. Or you could always search in Google for the file you want, let's say Harry Potter, like this: "Harry Potter" rapidshare. Replace rapidshare with any other upload site.


There are many other techniques for searching for warez using Google. Several sites has streamlined the process and provided their own search engine. Briefli searches Google for audio, video, torrent and office. It even provides a manual edit.

Meanwhile G2P uses Google to search for songs, albums, software, e-books, ringtones and proxies.


To search FTP directories, proceed to FileWatcher or MetaFTP. Searching for files in FTP is much harder and usually a waste of time.

Hope you enjoy this little tutorial. Of course more warez can be found in forums but that's all for now. And be sure to practice safe warez-ing.

Thursday, July 5, 2007

Free HIPS: Prevx 2.0

Prevx 2.0 is a highly regarded Intrusion Detection Software (IDS). It is shareware and can detect and block malware for free but you must buy the product for malware removal.

However, now you can get a free 1 year license for Prevx 2.0 (minus free technical support & free upgrades). Download and install within the next 24 hours from this site.

Tests conducted by Tech Support Alert placed Prevx 2.0 as the top two IDS. It provides fairly good registry, trojan, keylogger, rootkit and blended threat protection. Spyware and virus detection are a bit spotty. The program itself is very resistant to termination.

Be warned however that Prevx uses quite a lot of memory and is very noisy (to the point of hysteria). If you can live with the amount of warnings then this is a great product. If you want an IDS that is as effective but more quite then tryout the shareware CyberHawk (recently acquired by Spyware Doctor).

Wednesday, May 23, 2007

Free Acronis True Image 10

Leading hard disk manufacturer Seagate has been so kind as to license the technology behind Acronis True Image and provide it to its customers free of charge.

Acronis True Image is the leading disc imaging software for creating backups of your hard disk. The software is provided free to users of Seagate (DiscWizard) and Maxtor (MaxBlast) hard disks. The download links are provided below:

  1. Seagate
  2. Maxtor

A User Guide is provided here and here for Seagate and Maxtor respectively. Note that the programs will only work if you have at least one Seagate or Maxtor hard disk.

Buy Aconis True Image 10

Technorati tags: , , , , ,

Wednesday, May 16, 2007

Sapphire Online Contest

Sapphire has announced an online contest opened to anyone from around the world. The prize is a tricked out PC equipped with an AMD Athlon X2 5000+, ATI Radeon HD2900XT, Zerotherm BTF90 Copper Cooler and others. The prize also includes a free copy of Windows Vista Ultimate!

All you have to do is go to this page and enter in your personal details and answer a simple questionnaire. Submit and wait next week for the winner to be announced. For more details on the contest visit here.

Good luck!

Technorati tags: , , ,

Monday, May 14, 2007

Securing Windows XP with DEP

Data Execution Prevention (DEP) is a set of hardware and software technologies designed to prevent malicious code from running in memory. The majority of malware exploits buffer overruns in Windows or other software to run malicious code in memory. DEP prevents code in protected memory spaces from running.

There are 2 types of DEP - hardware and software. Most modern CPUs (2005 and later) from AMD and Intel have hardware DEP support. Software DEP is provided by Windows XP SP2 and Windows Vista.

Hardware DEP

To determine if your CPU has hardware DEP support, download Securable from Gibson Research Corporation. Run the program, it will inspect your processor's maximum bit length supported, hardware DEP and hardware virtualization support.

You can also determine if hardware DEP is available in Windows by using the Wmic command-line tool. Type in the following command into the command-line:

  1. wmic OS Get DataExecutionPrevention_Available

If the value returned is TRUE, hardware-enforced DEP is available. To determine if hardware DEP is running enter the following command:

  1. wmic OS Get DataExecutionPrevention_Drivers

If the value returned is TRUE, hardware DEP is running in Windows.

Software DEP

Right-click My Computer and select Properties. Click on the Advance tab and under Performance click Settings.

In the Performance Options windows click on the tab Data Execution Prevention. Here you can turn on DEP for Windows system processes or for all processes. By default it is set to Turn On DEP for essential Windows programs and services only.

Turning on DEP for all processes is a good idea to secure your system. However, some programs will crash with DEP turned on due to insecure programming practices.

To work around this problem, install Process Explorer from Sysinternals. Run the program and select View -> Select Columns, and check DEP Status. This will display whether DEP is enabled for each running program.

Now turn on DEP for all processes. For each process that Process Explorer shows with DEP disabled copy them down. Exclude all those programs from DEP. Then slowly select one or two programs at a time to allow DEP. Test it for a few hours or days. If everything runs fine, move on to the next set of programs. If any program with DEP enabled crashes, then disable DEP for the program permanently.

The steps outlined here are for Windows XP. Windows Vista also has DEP and the steps involved are nearly identical as that shown here.

Sources: Microsoft KB 875352, Microsoft KB 912923 and Windows Secret Newsletter.

Technorati tags: , , , , ,

Sunday, May 13, 2007

Novell Security Penetration

by Net Battle Bot

This is an old guide we found lying around the hard disk. It may be old (circa 2004) but many of the principles underlined in the guide remains relevant. Have fun hacking Novell but beware the wrath of the network admin!

Technorati tags: , , ,

Knoppix Persistent Disk Image in VMWare

Knoppix is one of the finest Linux Live CD distros. Virtualizing it using VMware Workstation provides you with an instant Linux OS. This guide will teach you how to set up a persistent disk image for Knoppix (specifically while under VMware).

  1. 1. Select Knoppix -> Set Password for Root, and set the password twice (you can set it as blank).
  2. 2. Under the K-Menu select System -> GParted. A popup screen will appear asking you to enter the root password.
  3. 3. At the top right corner of GParted, select /dev/sda.
  4. 4. Select Partition -> New, set the size (1-2 GB or more if you have the space) and filesystem to ext3.
  5. 5. Select the remaining unpartitoned space and Partiton -> New, set the size (256 MB or more) and filesystem to linux-swap.
  6. 6. Right-click the first partiton (from step 4) and set the flag to boot.
  7. 7. Apply the changes.
  8. 8. From the K-Menu, run Knoppix -> Configure -> Persistent Disk Image. Follow the instructions.
  9. 9. Reboot the VM.
  10. 10. Before it finishes booting, enter the BIOS and set the CD-ROM as the highest boot-order. Enjoy!

The hardest part is the formatting of the partiton. It should look like this after Step 7:






Technorati tags: , , ,