Subscribe For Free Updates!

We'll not spam mate! We promise.

Aug 25, 2007

Hacks let the iPhone roam

George Hotz, a 17-year-old resident of Glen Rock, NJ, announced on his blog on Thursday that he had found a way -- with the judicious use of a soldering iron and tools to erase and rewrite the firmware -- to unlock the iPhone. Hotz outlined the steps on his blog and is selling the phone on eBay.

"I'm sorry about how hard they are to follow, but someone will get them to work, and simplify them, and simplify them more," he said of the ten steps his method requires to unlock the phone. "Hopefully a software unlock will be found in the near future."

Unknown to Hotz, that's exactly what has happened. A group calling itself IPhoneSimFree has claimed to have unlocked the iPhone just via software -- a claim that has been verified by mobile-device news site Engadget. By unlocking the phone, the group claims that any provider can be used in any country.

Video - Strom Site

F-secure was make nice video about Strom Site.

The Zhelatin/Storm Gang has been very busy lately. Their spamming tactics have changed from sending an attachment to sending a link that directs recipients to an IP Address. The HTML used by their sites is variable, and also differs depending on the browser.

Storm Site

The video is available via F-secure YouTube Channel.

Aug 10, 2007

Microsoft Windows Vista Performance Update 1.0

Publisher's Description:

Microsoft Windows Vista Performance Update will improve the performance of Windows Vista in certain scenarios. Additional information about this update can be found in KB Article 938979.

Latest Changes:
* You experience a long delay when you try to exit the Photos screen saver
* A memory leak occurs when you use the Windows Energy screen saver
* If User Account Control is disabled on the computer, you cannot install a network printer successfully. This problem occurs if the network printer is hosted by a Windows XP-based or a Windows Server 2003-based computer
* When you write data to an AVI file by using the AVIStreamWrite function, the file header of the AVI file is corrupted
* When you copy or move a large file, the "estimated time remaining" takes a long time to be calculated and displayed
* After you resume the computer from hibernation, it takes a long time to display the logon screen
* When you synchronize an offline file to a server, the offline file is corrupted
* If you edit an image file that uses the RAW image format, data loss occurs in the image file. This problem occurs if the RAW image is from any of the following digital SLR camera models: Canon EOS 1D & Canon EOS 1DS
* After you resume the computer from hibernation, the computer loses its default gateway address
* Poor memory management performance occurs

Download Update Vista 32 Bit | Download Update Vista 64 Bit

Aug 7, 2007

Tips to Unlock iPhone

Sassha (senior member at Hackintosh forums from Croatia) claims have successfully managed to "unlock" the iPhone by using a variety of detailed steps to trick the iPhone into using a non-AT&T SIM card.

You will need :

1. iPhone
2. SIM Reader/Writer
3. SilverCard
4. V1 SIM card
5. Download -
6. Download -
Warning! Proceed at your own risk! Your provider can block your subscription!

For detail tips you can read here

Aug 4, 2007

Apple says iTunes sales top 3 billion songs !

Apple company, which makes the market-leading iPod digital media player, said iTunes has sold more than 3 billion songs since its launching four years ago, media reported Wednesday.

The milestone came just six months after iTunes, Apple Inc.'s online music download service, surpassed the 2 billion tracks-sold mark. The service was launched in April 2003 and, until February 2006, sold its first 1 billion songs.

ITunes has surpassed Inc. and Target Corp. to become the third-largest music retailer in the United States, according to media reports.

The iTunes catalog contains over 5 million songs, 550 television shows and 500 movies.

Apple's line of iPod portable music players has been key to iTunes' popularity.

In April, Apple company said it had sold more than 100 million iPods. It reached that milestone in the five and a half years since the first iPod was sold.

Perhaps most importantly, Apple offered not just the downloading service but also the hardware for managing music collections.

"They've made it brain-dead simple to buy, download and move content around onto iPods, computers and now iPhones," said Gartner analyst Mike McGuire.

Analysts refers to this as the digital music "ecosystem," which comprises the hardware, software and downloading service. Each plays a role in giving Apple a leading share of the digital music world.


Aug 3, 2007

Microsoft Windows URI Handling Command Execution Vulnerability

A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to an input validation error within the handling of system default URIs with registered URI handlers (e.g. "mailto", "news", "nntp", "snews", "telnet"). This can be exploited to execute arbitrary commands when a user e.g. using Firefox visits a malicious website with a specially crafted "mailto" URI containing a "%" character and ends in a certain extension (e.g. ".bat", ".cmd")

nntp:../../../../../Windows/system32/telnet.exe" " 80%.bat
Successful exploitation requires that Internet Explorer 7 is installed on the system.

The vulnerability is confirmed on a fully patched Windows XP SP2 and Windows Server 2003 SP2 system using Firefox version and Netscape Navigator version 9.0b2. Other versions and browsers may also be affected.

Do not browse untrusted websites or follow untrusted links.

Read more here

BETA test the new Secunia Personal Software Inspector!

The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors.

Highlights of The Secunia PSI:

* The Secunia PSI will be available free of charge
* Calculates your unique Secunia System Score
* Automatically scans your computer
* Enables you to update Insecure/End-of-Life software
* Provides Direct Download Links to security updates & patches
* Detects and advises on more than 4,200 applications
* Direct correlation between thousands of Secunia Advisories and your specific system and software
* Secure SSL encrypted connection to Secunia

How does the Secunia PSI work

The Secunia PSI works by examining files on your computer (primarily .exe, .dll, and .ocx files). These files contain non-specific meta information provided by the software vendor only. This data is the same for all users, and originates from the installed programs on your computer - never from their configuration. Please read the privacy statement available at the bottom of this page and through the Secunia PSI application for more details about how information from your computer is used by Secunia.

After examining all the files on your local hard drive(s), the collected data is sent to Secunia's servers, which match the data against the Secunia File Signatures engine ( to determine the exact applications installed on your system.

This information can then be used to provide you with a detailed report of the missing security related updates for your system.

System Requirements:

The current list of requirements that must be met for the Secunia PSI to function correctly are the following:

Supported Operating Systems:
* Microsoft Windows XP - Service Pack 2
* Microsoft Windows 2003
* Microsoft Windows 2000 - Service Pack 4
* US and European languages only
* Learn more
Download the free PSI BETA from the Secunia website: