Gold Coin and Gold Bullion Acquisition at GoldCoinsGain.com

Posted at Wednesday, April 22, 2009

Are you looking for safe haven investment? Visit GoldCoinsGain.com, here you will find many option to investing with gold. GoldCoinsGain.com offers gold in various forms including gold bullion, gold coins and other precious metals. You can buy gold bullion as the best investment because wherever and whenever you want to sell, the value will be the same. Of all the precious metals, gold is the most popular as an investment. Investors generally buy gold as a hedge or safe haven against any economic, political, social, or currency-based crises. These crises include investment market declines, inflation, war, and social unrest. Investors also buy gold during times of a bull market to gain financially.

If you are looking for resource gold coin and gold bullion acquisition then GoldCoinsGain.com is the answer. With GoldCoinsGain.com you can enjoy your experience from buy gold coins to gold bullion, to gold liquidation, spot price of gold, grading of gold, gold’s history, and gold coin performance. For U.S. customers, recently introduced an IRA facility specifically so they can now hold gold & silver in their Individual Retirement Account. An IRA is a long term investment. This makes it ideal for an investment as stable as gold. It seems evident therefore, that a gold IRA is likely to ensure that there is a safe and secure comfortable future down the track provided one invests in gold.

GoldCoinsGain.com offers a number of coins that complement any investment portfolio. At GoldCoinsGain.com site they provide Certified Gold Coins in many choices such $20 Saint Gaudens Double Eagle and $2.5 Liberty Quarter Eagle. Then there are Gold Bullion Coins with choices Gold American Eagle, Gold Canadian Maple Leaf, Gold South African Kruggerrand, Australian Gold Nugget, Austrian Gold Philharmonic, and Chinese Gold Panda. There are also Other Precious Metals including American Platinum Eagle, Canadian Platinum Maple Leaf, American Silver Eagle, Canadian Silver Maple Leaf, and Silver Rounds. You can making purchase online at GoldCoinsGain.com and get benefits from gold investment here.

DIRECTV, Satellite TV at The Lowest Price

Posted at Wednesday, April 22, 2009

DIRECTV, sometimes spelled as one of the DIRECT TV or DIRECTTV, Satellite TV services have been assessed more than Comcast, Time Warner Cable, Adelphia, Cox, Charter and other cable company's customer service. Direct TV allows you to surf easily with a number of channels as DIRECTV remote control that designed for maximum power to change the channel! Through the guide on the screen, a list of favorite channels can be set up which will facilitate easier surfing through the many channels available to DIRECTV customers.

DIRECTV, is the leader in HD satellite television. With DIRECTV, you do not need to pay the full monthly subscription cost for each additional recipient. You can choose to receive DIRECTV programming for each television in your home. As a leader in providing HD to the television channel, DIRECTV now has a full line of HD receivers. This ranges from standard to HD DIRECTV Plus HD DVR receivers. Direct T V high definition receivers are available and you will simply need to contact them to get yours. Once it is delivered, you will want to connect your new receiver to your television using component video cables. These will give you the most lossless transfer of video from the DIRECTV high definition receiver to the TV.

Your DIRECTV Receiver – Right at home, you can use your DIRECTV receiver to scan through the programming options that are available to you. Use your system ‘guide' to search for programming by name, date, or theme. You will have little problem finding out which packages you can subscribe to and even activate your subscriptions right from your receiver. Why waste time calling many Satellite TV providers when all you have to do is click for package details to get the lowest price on DirectTV! DIRECTV has been chosen as the best Satellite TV provider by experts many times over. You owe it to yourself to get the Highest Value in Satellite TV home entertainment at the lowest price!

How to Recover a Windows XP / Vista Password

Posted at Sunday, April 12, 2009

How to Recover a Windows XP / Vista Password

It truly is possible to forget your Windows XP or Vista password, especially after you have just entered a new one. When that happens, you need to recover your password fast! Here’s how.

There is a class of utility known as the password recovery tool. Many are fairly expensive, but others are completely free. If you changed your password late last night before you went to bed, and now you can’t remember it, these utilities could be your salvation. We will just detail what seems to be the most effective utility.

The best-known free password recovery utility is named Ophcrack. One of the beauties of this utility is that you don’t need access to your specific Windows system in order to use it. But you will need to prepare for the lost password eventuality in advance, and save the media containing the solution, or have access to another computer, even if it is not yours, after the problem has occurred.

Ophcrack is an open source (GPL licensed) program that cracks Windows passwords by using LM hashes through rainbow tables. You don’t have to know what all that means to use the utility. The program includes the ability to import the hashes from a variety of formats, including dumping directly from the SAM files of Windows. These tables can crack 99.9% of alphanumeric passwords of up to 14 characters in usually a few seconds, and at most a few minutes.

Ophcrack does not require any direct access to the Windows OS on the machine from which you are recovering the password(s). All you need is the ability to boot from your CD drive, available on almost all modern systems. Ophcrack will handle the recovery from there. It will recover the passwords for all of the accounts on the system, including that of the administrator.

To get started, visit the Ophcrack site. There, you will find two different Ophcrack LiveCD downloads available, one for Windows XP and another for Windows Vista. Download the file that matches the system that you want to crack. What you are getting is an ISO file, which contains all of the data you will need to make the CD that will allow you to recover your passwords. It is a big file and may take a while to download.

Next, you will need to turn that ISO file into a CD, which is a bit different than burning a music or data CD. If you have never done this, you probably don’t have a tool that will do it. Worry not! All you need to do is download another utility: Free Easy CD DVD Burner. It is also a completely free utility. Follow the instructions in Free Easy CD DVD Burner for the burning of a CD from an ISO file, using the file that you downloaded from the Ophcrack site.

Take the Ophcrack CD to the computer from which you need to recover passwords. Insert it into the target computer’s CD drive and turn on the computer. It should boot from the CD, which contains a miniature operating system that contains everything needed to get your passwords back for you. It will look like your computer is starting normally at first, but it will not. If your computer boot’s into Windows, or does not boot at all, you will probably need to change the boot order in your Bios so that it can boot from the CD. If the CD was properly made, and your computer is set to it will boot from the CD as an option, your system should boot into the Ophcrack opening screen.

This opening screen will ask you to select a program mode. The one that is highlighted (Ophcrack Graphic mode) is the right one. You can either press enter at this point or wait a few seconds and the program will continue automatically. When the program continues, you will see a text window (like that used by DOS) and a number of lines will scroll by, showing the progress of the Linux operating system boot and the preparation to run the password recovery task. These may include a quickly flashed message saying that a hard disk partition with hash tables has been found, which is good since that’s where the passwords are.

Finally, the Ophcrack program itself will run and the recovery of passwords will begin. The program runs completely automatically.

The important results will be shown in the first column (User) and the last column (NT Pwd). The former is the name of the user account and the latter is the password for that account. There are some important things to remember about this information. If the password column says “empty” it means that the password for that account is blank. You can log on using that account without entering a password; just enter the account name, leave the password blank, and press enter.

If the account that you are looking for is not there, it means that Ophcrack did not find that password on the target computer. It may have been deleted inadvertently, which is another reason that you would not have been able able to log on in the first place. If the “NT Pwd” column is blank, Ophcrack has not yet found the password for that account.

When the program has competed, write down the user names and passwords that you were trying to recover. Then remove the CD from the drive and re-boot the system as usual. Use the desired name and password to log into the computer as you always do, and your problem is solved. If Ophcrack does not find a password, which is rare, you may have to move on to another solution. In this case, perhaps a program called Offline NT Password & Registry Editor, which erases the Admin password so that you can log in and make any other required changes, would be your best bet, though it requires a bit more admin work.

Tool Physically Hacks Windows

Posted at Sunday, April 12, 2009

Tool Physically Hacks Windows

Lets an attacker use Firewire to take over a 'locked' Windows machine

No screwdriver required: A researcher has released a plug-and-go physical hacking tool that uses a Firewire cable to “own” a Windows machine within seconds.

Winlockpwn, originally built two years ago, bypasses Windows’s authentication system and lets an attacker take over a “locked” Windows machine without even stealing its password. Adam Boileau, a researcher with Immunity Inc., says he decided it was finally time to make his tool publicly available.

Similar Firewire hacks have been demonstrated on Linux and OS X as well.

With Winlockpwn, the attacker connects a Linux machine to the Firewire port on the victim’s machine. The attacker then gets full read-and-write memory access and the tool deactivates Windows’s password protection that resides in local memory. Then he or she has carte blanche to steal passwords or drop rootkits and keyloggers onto the machine.

“This is just a party-trick demo script thats been lying around my homedir for two years gathering dust,” Boileau blogged this week. “I'm not releasing this because Microsoft didn't respond (they did; it’s not a bug, it's a feature, we all know this). It just seemed topical, with the RAM-freezing thing, and it's a pity to write code and have no one use it.”

Firewire’s abuse should come as no surprise, security experts say. The peripheral bus connection technology lets you read and write to memory, so the weakness is not a true vulnerability, but a feature of the technology.

“That Firewire port is, as designed, literally there to let you plug things into your laptop memory banks,” says Thomas Ptacek, principal with Matasano Security. “When you think of Firewire, you really should just think of a cable coming directly out of your system's DRAM banks. That's basically all Firewire is.”

Ptacek says this tool raises the bar in physical hacking. “People think about physical hacking as something you have to do with a screwdriver and 20 minutes, under cover of darkness. Attacks like Adam's can be done in the time it takes you to pick up a sheet of paper off the office printer,” he says.

Not all machines have Firewire ports, of course, but other researchers have already found ways to get around that, using a PCMCIA Firewire card. And Vista is not immune to such an attack, either: Austrian research firm SEC Consult had previously written a proof of concept for Windows Vista that disables password authentication in the default login routine, so the attacker can log in with an arbitrary password, according to the researchers.

Ptacek says the best defense is to disable Firewire. “I think that enterprises who care about security should make sure they don't issue laptops with enabled Firewire ports,” he says.

Top 6 Facebook Scams, and How to Protect Yourself

Posted at Sunday, April 12, 2009

Top 6 Facebook Scams, and How to Protect Yourself

Scams are a large and growing problem on Facebook and other social networking sites. Here are 6 scams you could encounter on Facebook and how to protect yourself against them.

Online communities, like brick and mortar communities, offer a wealth of situations in which people can get separated from their personal information or their money (or both) by fraudsters and confidence artists. You have a better chance to defend yourself against scams and schemes if you are aware of them. Below is a list of six common type of scams that you could run into on Facebook and how to avoid falling into a trap.

Rogue Widgets

The Con: Widgets are all the rage on Facebook. They look innocent enough. Send your friends a virtual gift of some sort, perhaps, or play some sort of game with them. The problem is, some of them are not what they seem. The Secret Crush widget installed spyware onto your computer, then encouraged you to have your friends install it. Another called Error Check System was stealing personal information from user’s computers. Widgets can be as dangerous as they are attractive.

The Safeguard: Use a great deal of caution when installing third-party applications. When you click the button to accept the installation of a widget, you are telling that widget, and its author, that your personal information is available to them. You need to know what the widget author is going to do with that information before you allow it onto your page.

Phishing Schemes

The Con: All phishing schemes are born equal. They use official-looking graphics to convince you that you are dealing with official sources, then try to scam you out of private information. In the case of Facebook, they make the information request look like it is from the official site, and they will probably try to get you to enter your username and password.

The Safeguard: There is only one time when you should be asked to log in to Facebook, and that is when you navigate directly to the site, i.e. your page, the main site, or a friends page, directly via the URL. If you are ever presented with a request for Facebook login information at any other time, don’t enter it. Instead, go back to your normal Facebook login page.

The Nigerian Scam

The Con: This is one of the oldest scams in the book, predating the Internet by centuries. The Nigerian scam, also known by many other names (419 fraud, Nigerian scam, Nigerian bank scam, or Nigerian money offer) is a confidence trick in which the target is persuaded to advance sums of money in the hope of realizing a significantly larger gain. These are most likely in Facebook if a friend’s account has been hijacked, perhaps by phishing, as above. You will be contacted by the friend and asked for money for one reason or another. But, of course, it will be con men and not your friend on the other end.

The Safeguard: Don’t send a “friend” money until you verify that it is indeed the friend on the other end. If possible, talk to the friend in person, and be suspicious if that is said not to be possible. At the very least, ask an extremely personal question that you know the answer to but a hacker could not. There are a million of those types of question based on your intimate knowledge of a real friend.

Marketing “communities”

The Con: We know that part of the reason you come to Facebook is for community. But be very careful. Some Facebook user groups are nothing more than cleverly disguised vehicles for marketing. The instant you click the opt-in button, you could be opening yourself up for whatever sales tactics the community organizer has in mind, such as email, mailings, or telephone calls.

The Safeguard: Don’t just join every group that asks you to. If you are not absolutely sure who runs the requesting community, or don’t know whether or not it is officially linked to the organization that it claims to be, simply reject the request. Your personal privacy is worth much more than one more community membership.

The Koobface Virus

The Con: The Koobface virus, and others like it, can infect your Facebook page if you click a direct link and then agree to download something, usually a software update or a video codec that are said to be required to watch a video, or something similar. Instead, the virus infects your page and your computer, where it can wreak havoc. Worse, viruses like these spread themselves by sending email or writing on the walls of your friends to visit the same page that infected you, thereby spreading itself.

The Safeguard: Don’t click on links from people or places that you don’t know. More importantly, never click on links on such pages that are asking you for permission to download something. If they say you need something, like a Flash update, go instead to the vendors site and see if they want you to perform that update. Then, and only then, download and install the update.

Sexual Scams

The Con: Finally, beware that everyone is not who they seem to be on Facebook. Virtually anyone can set up a Facebook profile claiming to be whoever they wish to be. So that sexy girl you just met, or that really hot guy on Facebook may be a 50-year-old bald guy from Cleveland or someone you may even know posing as someone they are not. Members have been conned out of things like nude photos by such impostors, and then been blackmailed into performing sexual favors, as an example, to avoid having those photos published on the Web.

The Safeguard: Use some common sense. Understand that someone you just met on line may not be who they claim to be. Don’t send material of any kind that you would be ashamed see on line, or in your school paper, but especially not something like nude photos. Always proceed with caution with people that you don’t know in person.

These are probably just a few of the ways that you can get conned on Facebook. There as as many more as the nefarious mind of cyberspace can invent, or bring in from the non-virtual world. Two simple rules will help keep you out of trouble. Never give personal or incriminating information to people you don’t know; it may be wise to never do this at all. And be aware that if it seems too good to be true, it probably is.