Thursday 30 April 2015

Mystery Case Files: Huntsville

Mystery Case Files: Huntsville (Video Game) Download

Minimum System Requirements

    • OS: Windows XP/Vista/7/8
    • CPU: Pentium 2 @ 600 MHz Processor
    • RAM: 128 MB
    • Hard Drive: 40 MB Free
    • Video Memory: 16 MB
    • Sound Card: DirectX Compatible
    • DirectX: 6.0
    • Keyboard and Mouse

      Screenshots

      How to Install?

      1. Extract the file using Winrar. (Download Winrar)
      2. Open "Mystery Case Files - Huntsville" folder, double click on "Setup" and install it.
      3. After installation complete, go to the folder where you install the game.
      4. Open folder, double click on "Huntsville" icon to play the game. Done!

      How to Download?

      If your don't know how to Download this game, just Click Here!

      Mystery Case Files: Huntsville Free Download

      Click Here to Download This Game
      Game Size: 29 MB
      Password: www.apunkagames.net
      Read more...

      World Mosaics 3: Fairy Tales

      World Mosaics 3 - Fairy Tales (Video Game) Download

      Minimum System Requirements

        • OS: Windows XP/Vista/7/8
        • CPU: Pentium 4 @ 1.0 GHz Processor
        • RAM: 1 GB
        • Hard Drive: 110 MB Free
        • Video Memory: 32 MB
        • Sound Card: DirectX Compatible
        • DirectX: 9.0
        • Keyboard and Mouse

          Screenshots

          How to Install?

          1. Extract the file using Winrar. (Download Winrar)
          2. Open "World Mosaics 3 - Fairy Tales" folder, double click on "Setup" and install it.
          3. After installation complete, go to the folder where you install the game.
          4. Open folder, double click on "WorldMosaics3" icon to play the game. Done!

          How to Download?

          If your don't know how to Download this game, just Click Here!

          World Mosaics 3: Fairy Tales Free Download

          Click Here to Download This Game
          Game Size: 91 MB
          Password: www.apunkagames.net
          Read more...

          Construction Simulator 2015

          Also Known as: Construction Simulator 2015 (Video Game), PC Highly Compressed, RIP

          Minimum System Requirements

            • OS: Windows XP/Vista/7
            • CPU: Dual-Core with 2.4 GHz Processor
            • RAM: 4 GB
            • Hard Drive: 3 GB Free
            • Video Memory: 1 GB VRAM (Geforce 400 Series or better | ATI Radeon HD 57xx or better)
            • Sound Card: DirectX Compatible
            • DirectX: 9.0c
            • Keyboard and Mouse

              Screenshots

              How to Install?

              1. Extract the file using Winrar. (Download Winrar)
              2. Open "Construction Simulator 2015" >> "Game" folder, double click on "Setup" and install it.
              3. After installation complete, go to the folder where you extract the game.
              4. Open "Crack" folder, copy all files and paste it where you install the game.
              5. Then double click on "ConSim2015" icon to play the game. Done!

              How to Download?

              If your don't know how to Download this game, just Click Here!

              Construction Simulator 2015 Free Download

              Click Here to Download This Game
              Game Size: 653 MB
              Password: www.apunkagames.net
              Read more...

              Hacking WordPress Website with Just a Single Comment !

              Most of the time, we have reported about WordPress vulnerabilities involving vulnerable plugins, but this time a Finnish security researcher has discovered a critical zero-day vulnerability in the core engine of the WordPress content management system.



              The vulnerability, found by Jouko Pynn�nen of Finland-based security firm Klikki Oy, is a Cross-Site Scripting (XSS) flaw buried deep into the WordPress� comments system.

              The vulnerability affects the WordPress versions 3.9.3, 4.1.1, 4.1.2, and the latest WordPress version 4.2.
              Pynn�nen disclosed the details of the zero-day flaw, along with a video and a proof-of-concept code for an exploit of the bug, on his blog post on Sunday before the WordPress team could manage to release a patch.

              Why the researcher made the 0-Day Public?

              A similar cross-site-scripting (XSS) vulnerability was patched this week by WordPress developers, which was nearly 14 months after the bug was reported to the team.

              Due to fear of delay in fixing this hole, Pynn�nen went public with the details of critical zero-day vulnerability in WordPress 4.2 and below, so that the users of the popular content management system could be warned beforehand.

              Moreover, Pynnonen reported the vulnerability to the WordPress team but they "refused all communication attempts" he made since November 2014.

              The exploitation of the 0-Day vulnerability:

              The vulnerability allows a hacker to inject malicious JavaScript code into the comments section that appears at the bottom of Millions of WordPress blogs or article posts worldwide. However, this action should be blocked under ordinary circumstances.

              This could allow hackers to change passwords, add new administrators, or take other actions that could only be performed by the legitimate administrator of the website. This is what we call a cross-site scripting attack.
              Pynnonen described the 0-day flaw as below:
              "If triggered by a logged-in administrator, under default settings the attacker can leverage the vulnerability to execute arbitrary code on the server via the plugin and theme editors,"Pynn�nen wrote in a blog post published Sunday evening.
              "Alternatively the attacker could change the administrator's password, create new administrator accounts, or do whatever else the currently logged-in administrator can do on the target system."
              How the 0-Day exploit works?

              The zero-day exploit provided by the researcher works by posting a simple JavaScript code as a comment and then adding as long as 66,000 characters or over 64 KB in size.

              When the comment is processed by someone with WordPress admin rights to the website, the malicious code will be executed without giving any indication to the admin.

              By default, WordPress does not automatically publish a user's comment to a post until and unless the user has been approved by the administrator of the site.

              Hackers can bypass this limitation by fooling the administrator with their benign first comment, which once approved would enable any further malicious comments from that person to be automatically approved and published to the same post.

              WordPress patches the 0-Day flaw:

              In order to fix the security hole, administrators should upgrade their CMS to Wordpress 4.2.1, which was released few hours ago.

              "This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately," the WordPress team said of the latest version.

              WordPress version 4.2.1 reportedly fixes the zero-day vulnerability reported by Pynnonen. So if you own a WordPress website, make sure that you run an updated version of the CMS with all the plugins up-to-date.

              Stay connected!!
              Read more...

              Wednesday 29 April 2015

              Destiny of a Wizard

              Destiny of a Wizard (Video Game) Download

              Minimum System Requirements

                • OS: Windows XP/Vista/7
                • CPU: Pentium 4 @ 1.8 GHz Processor
                • RAM: 1 GB
                • Hard Drive: 300 MB Free
                • Video Memory: 64 MB
                • Sound Card: DirectX Compatible
                • DirectX: 9.0c
                • Keyboard and Mouse

                  Screenshots

                  How to Install?

                  1. Extract the file using Winrar. (Download Winrar)
                  2. Open "Destiny of a Wizard" >> "Game" folder.
                  3. Then double click on "Game" icon to play the game. Done!

                  How to Download?

                  If your don't know how to Download this game, just Click Here!

                  Destiny of a Wizard Free Download

                  Click Here to Download This Game
                  Game Size: 300 MB
                  Password: www.apunkagames.net
                  Read more...

                  Heroes of Hellas 2: Olympia

                  Heroes of Hellas 2: Olympia (Video Game) Download

                  Minimum System Requirements

                    • OS: Windows XP/Vista/78
                    • CPU: Pentium 2 @ 600 MHz Processor
                    • RAM: 256 MB
                    • Hard Drive: 100 MB Free
                    • Video Memory: 32 MB
                    • Sound Card: DirectX Compatible
                    • DirectX: 8.0
                    • Keyboard and Mouse

                      Screenshots


                      How to Install?

                      1. Extract the file using Winrar. (Download Winrar)
                      2. Open "Heroes of Hellas 2" folder, double click on "Setup" and install it.
                      3. After installation complete, go to the folder where you install the game.
                      4. Open folder, double click on "hoh2" icon to play the game. Done!

                      How to Download?

                      If your don't know how to Download this game, just Click Here!

                      Heroes of Hellas 2: Olympia Free Download

                      Click Here to Download This Game
                      Game Size: 89 MB
                      Password: www.apunkagames.net
                      Read more...

                      Heroes of Hellas 3: Athens

                      Heroes of Hellas 3: Athens (Video Game) Download

                      Minimum System Requirements

                        • OS: Windows XP/Vista/7/8
                        • CPU: Pentium 4 @ 1.0 GHz Processor
                        • RAM: 1 GB
                        • Hard Drive: 261 MB Free
                        • Video Memory: 32 MB
                        • Sound Card: DirectX Compatible
                        • DirectX: 9.0
                        • Keyboard and Mouse

                          Screenshots

                          How to Install?

                          1. Extract the file using Winrar. (Download Winrar)
                          2. Open "Heroes of Hellas 3" folder, double click on "Setup" and install it.
                          3. After installation complete, go to the folder where you install the game.
                          4. Open folder, double click on "hoh3" icon to play the game. Done!

                          How to Download?

                          If your don't know how to Download this game, just Click Here!

                          Heroes of Hellas 3: Athens Free Download

                          Click Here to Download This Game
                          Game Size: 157 MB
                          Password: www.apunkagames.net
                          Read more...

                          Tuesday 28 April 2015

                          Crazy!!! Hacker Implants NFC Chip In His Hand To Hack Android Phones News

                          There is a very sleek line between hacking and security. The security used to protect the public could be misused by hackers against the public itself, and one shouldn�t forget that with the advance in technology, the techniques used by cyber criminals also improves.


                          Today, What hackers need to conduct a successful cyber attack?

                          Maybe just a computing device injected under the skin of their bodies, who can bear the pain, would be enough to help complete a successful cyber attack � also known as Biohacking.

                          This was exactly what presented by the former U.S. Navy petty officer and now engineer at APA Wireless Seth Wahle.


                          With no malicious intention, Wahle implanted a small NFC chip in his left hand right between his thumb and his pointer finger in order to display the risks of Biohacking.

                          Hacking Android devices using NFC implants:

                          For those unaware, NFC (Near Field Communications) chips embedded in our smartphone devices are used for transferring files and in various mobile payment applications.

                          Wahle's chip has an NFC antenna that is capable to hack Android devices and bypass almost all security measures. The chip can ping a nearby Android smartphone, prompting its user to open a link.

                          Once the user of the smartphone agrees to open that link, the link installs a malicious piece of software on the phone that allows the phone to connect to a remote computer controlled by the hacker.

                          The hacker would now be able to carry out further exploits on the victim's device, potentially putting all the important information and sensitive data of victim at risk.

                          How is NFC implant done?

                          In order to implant the NFC device, Wahle bought a chip designed to be injected into cattle and implanted the chip by an "unlicensed amateur" for $40 by using a needle which was larger than he had initially expected, Wahle told Forbes during a Skype call.

                          The worst part about NFC implant:

                          The chip implant into Wahle hand was almost invisible after few days. The major thing to worry about this technique is that the NFC chip goes completely undetected in almost all kinds of security measures, including the security checkpoints in airports and other high-security locations.

                          Wahle said that with the chip implanted in himself, he went through daily scans prior to leaving the military and the chip was never detected. But, he also notes that the X-rays would be able to detect the chip.

                          However, these Implantable NFC chips potentially open up a smart way for hackers to hack Android devices and networks and gain access to victims' sensitive information.
                          "This implanted chip can bypass pretty much any security measures that are in place at this point and we will show proof of that," said Rod Soto, the event�s secretary of the board and security consultant.
                          Limitations of the attacks:

                          There are some limitations to methods like this, as Wahle says that the remote connection made by a hacker to the server can only be kept if the affected Android device is not locked or rebooted.

                          However, these limitations could be overcome by various means. Like if, say, the affected phone is rebooted, a software run as a background service that starts on boot would fix the problem.

                          Wahle will be presenting his finding at the Hack Miami conference taking place this May, with Rod Soto. Both of them intended to alert about these latest strategies that can be used by hackers to hack terminals and networks.

                          They also admitted that this NFC implant-based attack could provide hackers and cyber criminals with a particularly useful "tool in their social engineering toolset."

                          For More Updated News Stay Connected 
                          LIKE US ON FACEBOOK
                          Read more...

                          Heroes of Hellas

                          Heroes of Hellas 1 (Video Game) Download

                          Minimum System Requirements

                            • OS: Window XP/Vista/7/8
                            • CPU: Pentium 2 @ 600 MHz Processor
                            • RAM: 128 MB
                            • Hard Drive: 50 MB Free
                            • Video Memory: 32 MB
                            • Sound Card: DirectX Compatible
                            • DirectX: 8.0
                            • Keyboard and Mouse

                              Screenshots

                              How to Install?

                              1. Extract the file using Winrar. (Download Winrar)
                              2. Open "Heroes of Hellas 1" folder, double click on "Setup" and install it.
                              3. After installation complete, go to the folder where you install the game.
                              4. Open folder, double click on "game" icon to play the game. Done!

                              How to Download?

                              If your don't know how to Download this game, just Click Here!

                              Heroes of Hellas Free Download

                              Click Here to Download This Game
                              Game Size: 19 MB
                              Password: www.apunkagames.net
                              Read more...

                              Dark Tales: Edgar Allan Poe's The Mystery of Marie Roget

                              Dark Tales: Edgar Allan Poe's The Mystery of Marie Roget (Video Game) Download

                              Minimum System Requirements

                                • OS: Windows XP/Vista/7/8
                                • CPU: Pentium 4 @ 1.4 GHz Processor
                                • RAM: 1 GB
                                • Hard Drive: 660 MB Free
                                • Video Memory: 32 MB
                                • Sound Card: DirectX Compatible
                                • DirectX: 9.0
                                • Keyboard and Mouse

                                  Screenshots

                                  How to Install?

                                  1. Extract the file using Winrar. (Download Winrar)
                                  2. Open "Dark Tales - Edgar Allan Poe's The Mystery of Marie Roget" >> "Game" folder.
                                  3. Then double click on "DarkTales7" icon to play the game. Done!

                                  How to Download?

                                  If your don't know how to Download this game, just Click Here!

                                  Dark Tales: Edgar Allan Poe's The Mystery of Marie Roget Free Download

                                  Click Here to Download This Game
                                  Game Size: 13 MB
                                  Password: www.apunkagames.net
                                  Read more...

                                  Elegy for a Dead World

                                  Also Known as: Elegy for a Dead World (Video Game), PC Highly Compressed, RIP

                                  Minimum System Requirements

                                    • OS: Windows XP/Vista/7
                                    • CPU: Dual Core
                                    • RAM: 1 GB
                                    • Hard Drive: 2 GB Free
                                    • Video Memory: 3D card with 512 MB
                                    • Sound Card: DirectX Compatible
                                    • DirectX: 9.0c
                                    • Keyboard and Mouse

                                      Screenshots

                                      How to Install?

                                      1. Extract the file using Winrar. (Download Winrar)
                                      2. Open "Elegy for a Dead World" folder, double click on "Setup" and install it.
                                      3. After installation complete, go to the folder where you extract the game.
                                      4. Open "CRACK" folder, copy all files and paste it where you install the game.
                                      5. THEN double click on "Elegy" icon to play the game. Done!

                                      How to Download?

                                      If your don't know how to Download this game, just Click Here!

                                      Elegy for a Dead World Free Download

                                      Click Here to Download This Game
                                      Game Size: 272 MB
                                      Password: www.apunkagames.net
                                      Read more...

                                      Monday 27 April 2015

                                      15-Year-Old Admits Hacking NASA Computers

                                      A 15-year-old computer hacker caused a 21-day shutdown of NASA computers that support the international space station, and invaded a Pentagon weapons computer system to intercept 3,300 e-mails, steal passwords and cruise around like an employee.

                                      The boy, known on the Internet as �c0mrade,� pleaded guilty today to juvenile delinquency in a sealed federal case.
                                      Six Months in Jail
                                      He became the first young hacker to be incarcerated for computer crimes, the Justice Department in Washington said in a summary.
                                      He will serve six months in a state detention facility.
                                      �Breaking into someone else�s property, whether it�s a robbery or a computer intrusion, is a serious crime,� said Attorney General Janet Reno. The prosecution �shows that we take computer intrusion seriously and are working with our law enforcement agencies to aggressively fight this problem.�
                                      Chris Rouland, who monitors computer attacks for Internet Security Systems Inc. in Atlanta, said the unusual part of the case was that the boy was caught, not that he got where he did.
                                      The boy�s identity was withheld because he�s a juvenile.
                                      Stole Software, E-Mails
                                      Now 16, he admitted accessing 13 computers at the Marshall Space Flight Center in Huntsville, Ala., for two days in June 1999 and downloading $1.7 million worth of NASA proprietary software that supports the space station�s environment, including temperature and humidity.
                                      NASA responded by shutting down the computers for 21 days to determine the extent of the attack at a cost of $41,000 in contractor labor and replaced equipment.
                                      In August and October 1999, c0mrade entered the computer network run by the Defense Threat Reduction Agency, whose mission is to reduce the threat from nuclear, biological, chemical, conventional and special weapons to the United States.
                                      By entering through a router in Dulles, Va., and installing a back door for access, he intercepted DTRA e-mail, 19 user names and passwords of employees, including 10 on military computers.
                                      The criminal case and plea bargain have been in the works for about six months, said a source familiar with the case.
                                      If prosecuted as an adult, he would have been charged with wiretapping and computer abuse violations.
                                      As part of his sentence, the boy must write letters of apology to the secretary of defense and the NASA administrator.
                                      �The charges do not necessarily denote the actual threat to national security,� said Russ Cooper of ICSA.net, a Reston, Va.-based network security provider. He believes the NASA computer shutdown was time spent determining whether the intruder left anything behind that could harm the system.
                                      Gov�t Computer Scares Common?
                                      But Cooper also believes that kind of shutdown is more common than federal agencies acknowledge.
                                      �I would suspect that that type of delay is occurring very, very regularly,� he said. �It�s quite likely that companies and government agencies, et cetera are scared into thinking that they might have been compromised.�
                                      The case reflects growing technical sophistication among hackers, who found 10 new ways to break into computers in 1996 but now invade at the rate of 100 a month, Rouland said. He rates government security at a D in terms of school grades.
                                      �This is a great bellwether as to the state of security where juveniles can traipse across computer systems with little or no fear� of being caught, he said.

                                      COmment below If u like the posts-

                                      Read more...

                                      How to Spy on WhatsApp Messages

                                      This article will uncover some of the possible ways through which you can spy on WhatsApp messages of your children or suspected partner. The possible ways are as described below:


                                      1. Spy Software: The Easiest Way

                                      Using a spy software program is the easiest way to spy on WhatsApp messages. Although there are a handful of companies marketing substandard WhatsApp spy programs on the market today, there exists a few genuine products as well that are worth considering. One of my favorite software to spy on WhatsApp is mSpy which is known for its quality and top notch features.
                                      mSpy Features:
                                      • Spy on call logs and SMS and Contacts
                                      • Secretly record emails, web history and bookmarks.
                                      • Spy on Internet activity including social media like FacebookWhatsAppTwitter and Gmail.
                                      • Track GPS locations in real-time.
                                      • View Device and SIM card information.
                                      • Record keystrokes, photos and videos.
                                      • Operates in a complete stealth mode and remains undetected!.
                                      If you are a parent, mSpy can offer you an additional help as it supports a handful of control features as well:
                                      • Block access to unwanted apps and calls.
                                      • Get instant alerts when profane language is typed or viewed.
                                      • Remotely lock the phone or restrict its usage.
                                      • Remotely delete unwanted contacts, call logs, SMS and photos if desired.

                                      How it Works?

                                      You will have to download and install the mSpy app onto the target phone on which you need to monitor WhatsApp messages. Installation and configuration takes only a few minutes. However, for this you should have the target phone in your hand at least for a few minutes.
                                      Once the installation is complete, the monitoring process of all the above mentioned activities (WhatsApp messages, calls, SMS, Internet, GPS, camera etc.) will begin and the recorded logs are silently uploaded to your mSpy account. You can login to your online account at any time to view the logs containing WhatsApp messages and other activity details. You can download mSpy from the link below:
                                      Compatible Phones: Android, BlackBerry, Apple iPhone, Windows Mobile, iPod and Tablets.

                                       

                                      2. Spoofing the MAC Address: The Difficult Way

                                      The other way to spy on someone�s WhatsApp messages is to spoof the MAC address of the target phone from your phone. This method is somewhat considered difficult and require a moderate amount of technical skills to perform. Let me explain.
                                      WhatsApp has a small vulnerability which allows you to run the same WhatsApp account on two phones provided they both have the same MAC address. For this, you will have to gain access to the target phone to record its MAC address and spoof the same on your device. This is how you can find the MAC address of the target phone:
                                      For Android � Head over to settings �> About phone �> Statu s�> Wi-Fi MAC address
                                      For iPhone � Head over to Setting s�> General �> About �> Wi-Fi address
                                      For Windows Phone � Head over to Settings �> About �> More info �> MAC address
                                      For BlackBerry � Head over to options �> Device �> Device and Status info �> WLAN MAC
                                      Once you have recorded the target phone�s MAC address, you will have to spoof the MAC address on your android phone. After this is done, install WhatsApp on your phone, configure it using the target person�s phone number and verify the WhatsApp account using the verification code received on the target phone.

                                      .DOWNLOAD - mspy 

                                      DISCLAIMER: YOU IMPLEMENT ALL THE INFORMATION PROVIDED IN THIS ARTICLE AT YOUR OWN RISK. USAGE OF SPYWARE WITHOUT PRIOR USER CONSENT MAY BE AGAINST YOUR LOCAL LAWS AND YOU DO IT AT YOUR OWN RISK!
                                      Read more...

                                      How To Create A WiFi Hotspot In Windows 8.1/8/7 Using CMD

                                      You can easily create WiFi hotspot in Windows by using command prompt if you have wired or wireless WiFi connection.


                                      Step 1:

                                      Open Command Prompt (Admin) as an administrator and enter below command.
                                      netsh wlan set hostednetwork mode=allow
                                      ssid=EthicalHacking key=Wiknix1122




                                      ssid = Your Wi-Fi Name
                                      Key = Your Password

                                      Step 2:

                                      Now create virtual adapter by the use below command.
                                      netsh wlan start hostednetwork



                                      Now type exit and enter.

                                      Step 3:

                                      Right click on Network icon and click Open Network and Sharing Center.
                                      Open network and sharing center

                                      Step 4:

                                      Click Change adapter settings.
                                      change adapter settings

                                      Now right click on your Internet Connection and click Properties. I�m using mobile broadband, if you using ethernet then right click on ethernet.
                                      properties

                                      Step 5:

                                      Now click Sharing Tab and check �Allow other network users to connect through this computer�s Internet connection� and select Local Area Connection 12. Now click OK, that�s it.
                                      select network connection

                                      If This Post Helpful for You, Then Follow Me: Mukesh Bhardwaj



                                      Read more...

                                      4 Elements II: Collector's Edition

                                      4 Elements 2 - CE (Video Game) Download

                                      Minimum System Requirements

                                        • OS: Windows XP/Vista/7/8
                                        • CPU: Pentium 4 @ 1.5 GHz Processor
                                        • RAM: 1 GB
                                        • Hard Drive: 150 MB Free
                                        • Video Memory: 32 MB
                                        • Sound Card: DirectX Compatible
                                        • DirectX: 8.0
                                        • Keyboard and Mouse

                                          Screenshots

                                          How to Install?

                                          1. Extract the file using Winrar. (Download Winrar)
                                          2. Open "4 Elements II Collector's Edition" folder, double click on "Setup" and install it.
                                          3. After installation complete, go to the folder where you install the game.
                                          4. Open folder, double click on "4-Elements" icon to play the game. Done!

                                          How to Download?

                                          If your don't know how to Download this game, just Click Here!

                                          4 Elements II Collector's Edition Free Download

                                          Click Here to Download This Game
                                          Game Size: 118 MB
                                          Password: www.apunkagames.net
                                          Read more...