MERRY CHRISTMAS FOLKS!

-UNTAMED

Anouncement

Dear all,
For a while I had my exams.From today I will be posting new papers on hacks and on gizmos!
Regards
untamed.
 PS:Downloads tab will also be included (or) improved..

Commment!!!!!!!!!!!

Fig:Just for sake of posting a pic..Never mind! :P

Hmmmmmmmmmmm...........................

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
Haha This is me....What!!!!!!! yeah I stopped posting hacking shit for few days wait months...All I just did is copying some crap and posting it on my blog yea I got 16600 page views and no comments WTF? so just comment whatever you feel.....
regards,
untamed.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

How to hack PS3

How to hack PS3 and play pirated games (100% Tested)

Learn how to hack PS3.This is intended for all those who have problems with installing ps3 costum firmware. You do not need to own jailbrake stick, everything u need is usb with an least 256 mb (fat32). I’ve tried several combinations and finally found the right one and I will share with you. Hope that you’ll have no problems with installation.
TESTED 100% WORKING

First step

First of all make sure you’re PS3 has 3.55 official firmware or older version. If is not, please downgrade to 3.55 first. Google it for how to install.
Thanks to Zamp suggestion, as i forgot : You have to use signed pkg made for 3.55 or you will get error occurred during the install operation (80029567)
Download link : kmeaw CFW 3.55 Patched PUP
Create on the root of a USB (formatted FAT 32) the following folders: \PS3\UPDATE\

Secound step

Access to the Playstation recovery menu:
Turn off Plastation 3
Hold The power button down; The system will turn on and turn off once again.
Once the System has been shutdown, re-press you finger until you hear 2 consecutive beeps
You will be promted to plug in your controller via usb and then hit the PS button
The Recovery menu will pop up.
Go to System update > Update via Storage Media and instal kmeaw CFW 3.55
After reboot you should see the install package file and the app_home/PS3_GAME/ inside the Game Folder

Last step

Download lvl2 patcher (lvl2-v9.pkg) and multiman (1.16+)
Make sure to save the files on usb root directory
Navigate to install package file and install them (XMB)
And remember before run multiman make sure to run lvl2 patcher first
Load game from external or internal and enjoy! Easy done PS3 hacking!

If u want to play ps3 games via portable usb hard drive

-Make sure that is FAT32 and if is not you can convert from NTFS to FAT32 with Paragon Hard Disk Manager eazy and fast (http://www.paragon-software.com/home/hdm-personal/)
-Then download the game u want and add it to the following folder \GAMEZ
-Game folder you downloaded must contain (BLES, BLUS) number. (ex. \GAMEZ\BLUS-30490)
list with numbers (http://sonyindex.com/)
-Start the game from backup manager (eg. Multiman, Rogero) and enjoy.

If u want to transfer games from PC to PS3 via FTP

-First download filezila (http://filezilla-project.org/) and install to you’re Pc.
-Then download PS3 FTP Server (http://www.ps3-hacks.com/2010/09/07/ps3-ftp-server-released/) and install to you’re PS3
-Open FileZilla and press the ‘Site Manager’ button (Under ‘File’ in the top left hand corner) then press ‘New Site’ ant set up host: (view from ps3 FTP server) port: 21 server type: FTP Logon Type : Normal User: FTPD12345 pass: (leave blank)
-You will see a tab that says ‘Transfer Settings’. You want to limit the connections to 2 (One for browsing the PS3 and one for transferring.. If you set this to 1 you will only be able to browse the PS3 if you’re not transferring anything).
-hit Connect!
-Browse to folder (BLUSXXXX) on your PC and transfer the entire folder to /dev_hdd0/game/(BUM DISC ID)/GAMEZ on your PS3
Start the game from backup manager (eg. Multiman, Rogero) and enjoy.

How To hack psp

This is a guide on how to alter a PSP by downgrading its software. This only works on P.S.P.S. software versions 2.0 and earlier. However Above firmwares can use Pandora's battery to un-brick, downgrade and install custom firmware.

  1. Unzip the files MPHDowngrader.zip and EBOOT_1.50.zip. Use a program such as WinRAR, or WinZip. These files are the ones that shall be instrumental in both be moved into your root directory. Once this is done, open up the PSP folder and then enter into the Photo folder. Here, you will copy overflow.tif over, also removed from the MPH Downgrader folder, keeping it in the Photo directory and not in a sub directory.
  2. 2
    Backtrack to the PSP directory and then this time enter into the Game directory. If there is not alreadconnection and then go to the Photo icon on your PSP and scroll through the pictures to get to the overflow.tif file. Two strings of letters/numbers will appear as if something has gone wrong but this is and start it up. Go to prompts. WhenPANIC. Once again press the power switch up until it fully turns off. Now, turn the PSP back on. You will get another error. Just press the "O" button and it will restart after rebuilding the system data.
  3. 3
    Figure out what to add with your brand new open-ended BIOS. If you search the web you will find a plethora of different options

    • NesterJ (NES Emulator) v1.11 - Ruka's Nintendo Entertainment System (NES) emulator for the PSP.
    • Monkey64 v1.0 - The first N64 emulator for the Sony PSP. Written by PSmonkey.
    • Homer's RIN v3.2 - Gameboy/Gameboy Color Emulator for the PSP.
    • NeoCD PSP v0.9.1 - NeoGeo CD Emulator for your PSP. Released by ZeLurker, camiyu1, and Radius. Based on the emulator written/ported by YoyoFR
    • SNES9X TYL v0.2c - An improved version of the SNES9x emulator by yoyofr
    • DGEN SEGA Genesis / Mega Drive v0.70 - A new SEGA Genesis (Mega Drive) emulator for your PSP.
    • PSPUAE - Amiga computer system emulator for various amiga verions (games, etc.)
    • HANDY 0.95.1 - LYNX emulator
    • Atari800 2.0.3.27
    • NP2 0.33 - PC98 emulator
    • RACE - NEO-GEO Pocket emulator
    • PSPKVM 0.5.2 - Java web applet player (100's of free games!)
    • Daedalus X64 Beta 2 - another N64 emulator (plays only some games)
    • PJAG - emulator
    • ScummVM-PSP - emulator
    • WTH - Wagic: the Gathering, like Magic: the Gathering
    • Book Reader 8.1 - Ebook reader for a couple of formats
    • PSPHUGO 1.2.0 - PC Engine/Turbografx emulator
    • PSP7800 1.2.0 - Atari 7800 emulator
    • ColEm PSP 2.5.1 - ColecoVision emulator
    • Picodrive - Genesis & Sega CD emulator
    • fMSX PSP 3.5.35 - MSX computer system emulator (games, etc.)
    • PSP-PDA 1.3.2 - Adds PDA-like functionality to your PSP (includes IR keyboard functionality for PSP 1000 series just like a real PDA)
    • Caprice32 PSP 4.2.02 - emulator
    • MAME4All PSP 4.9r2 - Multiple Arcade Machine Emulator
    • CaSTaway - Atari ST emulator
    • MVSPSP 2.3.1 - NEO-GEO emulator
    • CPS2PSP 2.3.1 - NEO-GEO emulator
    • NCDZPSP 2.3.1 - NEO-GEO CD
    • Red Dragon 0.38 - Virtual Boy emulator (may not work; still in alpha phase)
    • MasterBoy 2.02 - Game Boy, Game Boy Color, Sega Master System, Sega Game Gear emulator
    • pSpectrum 1.04 - Spectrum computer system emulator (games, etc)
    • Lua Player 0.20 - Plays "Lua" files: special applications of which there are dozens.
    • Apple II Portable 0.1 Build 0173 - Apple II emulator
    • pSwan 0.07 - emulator
    • Stella 0.2 - Atari emulator
    • Pikey (Pi Key) 0.5 - Adds keyboard functionality for IR keyboards for PSP model 1000 series. (Currently the Targus model works perfectly)

GUIDE TO (mostly) HARMLESS HACKING


______________________________________________________

GUIDE TO (mostly) HARMLESS HACKING


Hacking tip of this column: how to finger a user via telnet.
_______________________________________________________

Hacking. The word conjures up evil computer geniuses plotting the downfall
of civilization while squirreling away billions in electronically stolen
funds in an Antigua bank.

But I define hacking as taking a playful, adventurous approach to computers.
Hackers don't go by the book. We fool around and try odd things, and when we
stumble across something entertaining we tell our friends about it. Some of
us may be crooks, but more often we are good guys, or at least harmless.

Furthermore, hacking is surprisingly easy. I'll give you a chance to prove
it to yourself, today!

But regardless of why you want to be a hacker, it is definitely a way to
have fun, impress your buddies, and get dates. If you are a female hacker
you become totally irresistible to all men. Take my word for it!;^D

This column can become your gateway into this world. In fact, after reading
just this first Guide to (mostly) Harmless Hacking, you will be able to pull
off a stunt that will impress the average guy or gal unlucky^H^H^H^H^H^H^H
fortunate enough to get collared by you at a party.

So what do you need to become a hacker? Before I tell you, however, I am
going to subject you to a rant.

Have you ever posted a message to a news group or email list devoted to
hacking? You said something like "What do I need to become a hacker?" right?
Betcha you won't try *that* again!

It gives you an education in what "flame" means, right?

Yes, some of these 3l1te types like to flame the newbies. They act like they
were born clutching a Unix manual in one hand and a TCP/IP specification
document in the other and anyone who knows less is scum.

*********************
Newbie note: 3l1t3, 31337, etc. all mean "elite." The idea is to take either
the word "elite" or "eleet" and substitute numbers for some or all the
letters. We also like zs. Hacker d00dz do this sor7 of th1ng l0tz.
********************

Now maybe you were making a sincere call for help. But there is a reason
many hackers are quick to flame strangers who ask for help.

What we worry about is the kind of guy who says, "I want to become a hacker.
But I *don't* want to learn programming and operating systems. Gimme some
passwords, d00dz! Yeah, and credit card numbers!!!"

Honest, I have seen this sort of post in hacker groups. Post something like
this and you are likely to wake up the next morning to discover your email
box filled with 3,000 messages from email discussion groups on agricultural
irrigation, proctology, collectors of Franklin Mint doo-dads, etc. Etc.,
etc., etc....arrrgghhhh!

The reason we worry about wannabe hackers is that it is possible to break
into other people's computers and do serious damage even if you are almost
totally ignorant.

How can a clueless newbie trash other people's computers? Easy. There are
public FTP and Web sites on the Internet that offer canned hacking programs.

Thanks to these canned tools, many of the "hackers" you read about getting
busted are in fact clueless newbies.

This column will teach you how to do real, yet legal and harmless hacking,
without resorting to these hacking tools. But I won't teach you how to harm
other people's computers. Or even how to break in where you don't belong.

******************************
You can go to jail tip: Even if you do no harm, if you break into a portion
of a computer that is not open to the public, you have committed a crime. If
you telnet across a state line to break in, you have committed a federal felony.
*************************************

I will focus on hacking the Internet. The reason is that each computer on
the Internet has some sort of public connections with the rest of the Net.
What this means is that if you use the right commands, you can *legally*
access these computers.

That, of course, is what you already do when you visit a Web site. But I
will show you how to access and use Internet host computers in ways that
most people didn't know were possible. Furthermore, these are *fun* hacks.

In fact, soon you will be learning hacks that shed light on how other people
(Not you, right? Promise?) may crack into the non-public parts of hosts. And
-- these are hacks that anyone can do.

But, there is one thing you really need to get. It will make hacking
infinitely easier:

A SHELL ACCOUNT!!!!

A "shell account" is an Internet account in which your computer becomes a
terminal of  one of your ISP's host computers. Once you are in the "shell"
you can give commands to the Unix operating system just like you were
sitting there in front of one of your ISP's hosts.

Warning: the tech support person at your ISP may tell you that you have a
"shell account" when you really don't. Many ISPs don't really like shell
accounts, either. Guess why? If you don't have a shell account, you can't hack!

But you can easily tell if it is a real shell account. First, you should use
a "terminal emulation program" to log on. You will need a program that
allows you to imitate a VT 100 terminal. If you have Windows 3.1 or Windows
95, a VT 100 terminal program is included as one of your accessory program.

Any good ISP will allow you to try it out for a few days with a guest
account. Get one and then try out a few Unix commands to make sure it is
really a shell account.

You don't know Unix? If you are serious about understanding hacking, you'll
need some good reference books. No, I don't mean the kind with breathless
titles like "Secrets of  Super hacker." I've bought too many of that kind of
book. They are full of hot air and thin on how-to. Serious hackers study
books on:
    a) Unix. I like "The Unix Companion" by Harley Hahn.
    b) Shells. I like "Learning the Bash Shell" by Cameron Newham and Bill
Rosenblatt. A "shell" is the command interface between you and the Unix
operating system.
    c) TCP/IP, which is the set of protocols that make the Internet work. I
like "TCP/IP for Dummies" by Marshall Wilensky and Candace Leiden.

OK, rant is over. Time to hack!

How would you like to start your hacking career with one of the simplest,
yet potentially hairy, hacks of the Internet? Here it comes: telnet to a
finger port.

Have you ever used the finger command before? Finger will sometimes tell you
a bunch of stuff about other people on the Internet. Normally you would just
enter the command:

    finger Joe_Schmoe@Fubar.com

But instead of Joe Schmoe, you put in the email address of someone you would
like to check out. For example, my email address is cmeinel@techbroker.com.
So to finger me, give the command:

    finger cmeinel@techbroker.com

Now this command may tell you something, or it may fail with a message such
as "access denied."

But there is a more elite way to finger people. You can give the command:

    telnet llama.swcp.com 79

What this command has just done is let you get on a computer with an
Internet address of llama.swcp.com through its port 79 -- without giving it
a password.

But the program that llama and many other Internet hosts are running will
usually allow you to give only ONE command before automatically closing the
connection. Make that command:

    cmeinel

This will tell you a hacker secret about why port 79 and its finger programs
are way more significant than you might think. Or, heck, maybe something
else if the friendly neighborhood hacker is still planting insulting
messages in my files.



GUIDE TO (mostly) HARMLESS HACKING



Hacking tip of this column: how to finger a user via telnet.
_______________________________________________________

Hacking. The word conjures up evil computer geniuses plotting the downfall
of civilization while squirreling away billions in electronically stolen
funds in an Antigua bank.

But I define hacking as taking a playful, adventurous approach to computers.
Hackers don't go by the book. We fool around and try odd things, and when we
stumble across something entertaining we tell our friends about it. Some of
us may be crooks, but more often we are good guys, or at least harmless.

Furthermore, hacking is surprisingly easy. I'll give you a chance to prove
it to yourself, today!

But regardless of why you want to be a hacker, it is definitely a way to
have fun, impress your buddies, and get dates. If you are a female hacker
you become totally irresistible to all men. Take my word for it!;^D

This column can become your gateway into this world. In fact, after reading
just this first Guide to (mostly) Harmless Hacking, you will be able to pull
off a stunt that will impress the average guy or gal unlucky^H^H^H^H^H^H^H
fortunate enough to get collared by you at a party.

So what do you need to become a hacker? Before I tell you, however, I am
going to subject you to a rant.

Have you ever posted a message to a news group or email list devoted to
hacking? You said something like "What do I need to become a hacker?" right?
Betcha you won't try *that* again!

It gives you an education in what "flame" means, right?

Yes, some of these 3l1te types like to flame the newbies. They act like they
were born clutching a Unix manual in one hand and a TCP/IP specification
document in the other and anyone who knows less is scum.

*********************
Newbie note: 3l1t3, 31337, etc. all mean "elite." The idea is to take either
the word "elite" or "eleet" and substitute numbers for some or all the
letters. We also like zs. Hacker d00dz do this sor7 of th1ng l0tz.
********************

Now maybe you were making a sincere call for help. But there is a reason
many hackers are quick to flame strangers who ask for help.

What we worry about is the kind of guy who says, "I want to become a hacker.
But I *don't* want to learn programming and operating systems. Gimme some
passwords, d00dz! Yeah, and credit card numbers!!!"

Honest, I have seen this sort of post in hacker groups. Post something like
this and you are likely to wake up the next morning to discover your email
box filled with 3,000 messages from email discussion groups on agricultural
irrigation, proctology, collectors of Franklin Mint doo-dads, etc. Etc.,
etc., etc....arrrgghhhh!

The reason we worry about wannabe hackers is that it is possible to break
into other people's computers and do serious damage even if you are almost
totally ignorant.

How can a clueless newbie trash other people's computers? Easy. There are
public FTP and Web sites on the Internet that offer canned hacking programs.

Thanks to these canned tools, many of the "hackers" you read about getting
busted are in fact clueless newbies.

This column will teach you how to do real, yet legal and harmless hacking,
without resorting to these hacking tools. But I won't teach you how to harm
other people's computers. Or even how to break in where you don't belong.

******************************
You can go to jail tip: Even if you do no harm, if you break into a portion
of a computer that is not open to the public, you have committed a crime. If
you telnet across a state line to break in, you have committed a federal felony.
*************************************

I will focus on hacking the Internet. The reason is that each computer on
the Internet has some sort of public connections with the rest of the Net.
What this means is that if you use the right commands, you can *legally*
access these computers.

That, of course, is what you already do when you visit a Web site. But I
will show you how to access and use Internet host computers in ways that
most people didn't know were possible. Furthermore, these are *fun* hacks.

In fact, soon you will be learning hacks that shed light on how other people
(Not you, right? Promise?) may crack into the non-public parts of hosts. And
-- these are hacks that anyone can do.

But, there is one thing you really need to get. It will make hacking
infinitely easier:

A SHELL ACCOUNT!!!!

A "shell account" is an Internet account in which your computer becomes a
terminal of  one of your ISP's host computers. Once you are in the "shell"
you can give commands to the Unix operating system just like you were
sitting there in front of one of your ISP's hosts.

Warning: the tech support person at your ISP may tell you that you have a
"shell account" when you really don't. Many ISPs don't really like shell
accounts, either. Guess why? If you don't have a shell account, you can't hack!

But you can easily tell if it is a real shell account. First, you should use
a "terminal emulation program" to log on. You will need a program that
allows you to imitate a VT 100 terminal. If you have Windows 3.1 or Windows
95, a VT 100 terminal program is included as one of your accessory program.

Any good ISP will allow you to try it out for a few days with a guest
account. Get one and then try out a few Unix commands to make sure it is
really a shell account.

You don't know Unix? If you are serious about understanding hacking, you'll
need some good reference books. No, I don't mean the kind with breathless
titles like "Secrets of  Super hacker." I've bought too many of that kind of
book. They are full of hot air and thin on how-to. Serious hackers study
books on:
a) Unix. I like "The Unix Companion" by Harley Hahn.
b) Shells. I like "Learning the Bash Shell" by Cameron Newham and Bill
Rosenblatt. A "shell" is the command interface between you and the Unix
operating system.
c) TCP/IP, which is the set of protocols that make the Internet work. I
like "TCP/IP for Dummies" by Marshall Wilensky and Candace Leiden.

OK, rant is over. Time to hack!

How would you like to start your hacking career with one of the simplest,
yet potentially hairy, hacks of the Internet? Here it comes: telnet to a
finger port.

Have you ever used the finger command before? Finger will sometimes tell you
a bunch of stuff about other people on the Internet. Normally you would just
enter the command:

finger Joe_Schmoe@Fubar.com

But instead of Joe Schmoe, you put in the email address of someone you would
like to check out. For example, my email address is cmeinel@techbroker.com.
So to finger me, give the command:

finger cmeinel@techbroker.com

Now this command may tell you something, or it may fail with a message such
as "access denied."

But there is a more elite way to finger people. You can give the command:

telnet llama.swcp.com 79

What this command has just done is let you get on a computer with an
Internet address of llama.swcp.com through its port 79 -- without giving it
a password.

But the program that llama and many other Internet hosts are running will
usually allow you to give only ONE command before automatically closing the
connection. Make that command:

cmeinel

This will tell you a hacker secret about why port 79 and its finger programs
are way more significant than you might think. Or, heck, maybe something
else if the friendly neighborhood hacker is still planting insulting
messages in my files.

Now, for an extra hacking bonus, try telnetting to some other ports. For
example:

telnet kitsune.swcp.com 13

That will give you the time and date here in New Mexico, and:

telnet slug.swcp.com 19

Will show you a good time!