Receive Daily Updates

Enter your email address:

Wednesday, October 28, 2009

Tekken 6 – An honest review

Tekken has maintained its popularity since its advent without the need to reinvent itself.Tekken 6 ? An honest reviewIts a game that speaks for itself.Well..The wait is over..Tekken 6 was released yesterday with all pomp and show and soon all the gaming press will flock on to review it.In the mean time I got my hands on a PS3 import and I decided to get my hands dirty and write an honest review about it...

Graphics - 8/10
If Tekken has one thing,its style which gives the game a distinct look and feel that forces the series to move to its roots without the need of reinventing itself.The game efficiently makes us gawk at the motion comic recaps in the story mode and  impressively rendered CGI sequences in the opening and ending movies..Tekken sports next-gen graphics engine under its hood and the game ran smoothly with no frame drops at all.

The CGI are excellent

The visuals are amazing and aesthetic,however I felt cheated when I felt that the character animations are recycled a bit which nevertheless are animated very well..The scenario campaign mode looks dated and I felt if I was duking out Godhand with a bit of updated graphics. Also some background sported stupid background scrolling which made me think if the stage was really moving..Overall its a huge upgrade of Tekken 5 on graphics front but there are some things which need to be reconsidered.Perhaps an expansion might sort it out.

Sound – 9/10

The music in Tekken 6 sets the overall mood for the fighting.The middle eastern,western,jazz and electronic;all are mingled very well to produce an awesome aural experience. the opening track and the CGI music is very well done.There is a certain series staple ‘thump’ sound associated with the hits which gives hitting someone in face an experience worthwhile.The tunes are catchy and I was forced to stop the match and to listen to the background music at times.Over all its well done.

Design - 8.5/10

Tekken 6 sets fan expectations quite high with the long development time and all the hype its associated with.The sequel boasts 40 characters to choose from and the ability to play online,the series has done its bit to remain competitive.In the standard offline mode,the game offers staple Practice Mode,the Story Mode in which you will battle and overtly powerful final boss Azazel,the ghost mashups that lets you battle AI opponents which simulate real world characters quite well and provide you a decent competition,the Time Attack and the Survival which will test your efficiency and record your personal best.With a second human player on side (as it happened with me) you can get into some serious vs battles.

Tekken 6 Character select

The Online play at the time of launch was quite poor with serious lag affecting the gameplay,as the strict timing needed for competitive gameplay is severely compromised and in some cases lag makes the game completely unplayable.The online mode also lets you download ghost data for your personal use and for your ranked and unranked matches.

Tekken 6

The game includes a scenario campaign mode that's an entirely a different game altogether,like the Tekken Force mode in the original Tekken 3 but the incompetent camera and the bad implementation of moveset in the campaign can make your experience sour.

Gameplay – 9/10

Tekken embraces both the newcomers and the series veterans with open arms and you will have plenty of fun all together as long as you will be matching up against opponents of your level.The 4 button fighting scheme may seem deceptively intuitive to the players,but it needs skill and the right timing to keep the attacks flowing and be in the groove.Mixing up the throws,the high and low attacks,sidestepping all gives you a tactical advantage against the opponent,but simply mashing up buttons and hoping for the best is fun too. The game heavily emphasizes combos for massive damage and puts emphasis on bounding moves,which means to slam opponents on the ground and then attack using appropriate moves at specific time to keep the low juggle going on.

Tekken 6 juggle

The matches move on too quickly and the game features a rage system which means the game gives player a last boost of attack power when his health is low to change the face of match.The game has a 3d fighting experience of its own and overall its just another Tekken at heart.

 

Last word

Like MGS4,Tekken 6 is a love it or hate it type of game.When you will fire it up,you will probably already know how it

Tekken 6

will strike you and the series has already maintained a good following for good reasons.In the end,even if the extras provided are not worth in gold,they still add a good value to the overall package.Tekken 6 is just Tekken 6 nothing more,nothing less.

Final Score – 34.5/40

 

 

POSTED BY XERO . ALL RIGHTS RESERVED.

read more "Tekken 6 – An honest review"

Tuesday, October 27, 2009

Someone tried to hackin into my Facebook..!!

Dear Readers, Today morning I have received an email from Face book on my official mail ID. The attachment was looking like a zip file but the extension of the attachment was .exe....waahoooooo It was the trap to catch me. Koool ! ! ! ! what an IDEA sir G..!!

Yesterday I posted that how I retrieved my Yahoo & Facebook accounts, which got compromised. To know more click here

Below is the mail which I have received on my official mail ID. I am posting this only for awareness.

Subject: Facebook Password Reset Confirmation.
From: "The Facebook Team"
Date: Tue, October 27, 2009 9:24 am
To: amar***@******.com
Priority: Normal
Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Options: View Full Header | View Printable Version | Download this as a file | Spam | Not Spam

Hey amarjits ,  Because of the measures taken to provide 
safety to our clients, your password has been changed. 

You can find your new password in attached document.  

Thanks, The Facebook Team


--------------------------------------------------------------------------------------------

Below is the mail headers of that mail. You any easily track anyone using these mail headers. You can easily find the origin of the email.

----------------------------------------------------------------------------------------------

Return-Path: <[email protected]>
Delivered-To: amar***@******.com
Received: (qmail 32583 invoked by uid 500); 27 Oct 2009 03:56:24 -0000
Received: from 203.xxx.16.102 by mx1.xxx.com (envelope-from <[email protected]>, uid 1001) with qmail-scanner-2.01
(clamdscan: 0.88.7/2631. spamassassin: 3.0.1.
Clear:RC:0(203.xxx.16.102):SA:0(?/?):.
Processed in 138.365253 secs); 27 Oct 2009 03:56:24 -0000
X-Spam-Status: No, score=? required=?
X-Spam-Level:
Received: from unknown (HELO inter.xxxxxxxxxx.com) ([203.xxx.16.102])
(envelope-sender <
[email protected]>)
by mx1.xxxxxx.com (qmail-ldap-1.03) with SMTP
for <
amar***@******.com>; 27 Oct 2009 03:54:05 -0000
Received: (qmail 2029 invoked by uid 490); 27 Oct 2009 03:54:01 -0000
Received: from 203.xxx.53.237 by inter.xxxxxxxxx.com (envelope-from <[email protected]>, uid 496) with qmail-scanner-2.01
(spamassassin: 3.1.7.
Clear:RC:0(203.xxx.53.237):SA:0(2.9/4.0):.
Processed in 35.955232 secs); 27 Oct 2009 03:54:01 -0000
X-Qmail-Scanner-MOVED-X-Spam-Status: No, score=2.9 required=4.0
X-Qmail-Scanner-MOVED-X-Spam-Level: ++
Received: from unknown (HELO KQNWSTGYEV) (203.xxx.53.237)
by inter.xxxxxxxxxx.com with SMTP; 27 Oct 2009 03:53:22 -0000
Received: from 203.118.53.237 by dev.null; Tue, 27 Oct 2009 11:54:08 +0800
From: "The Facebook Team" <[email protected]>
To: <amar***@******.com>
Subject: Facebook Password Reset Confirmation.
Date: Tue, 27 Oct 2009 11:54:08 +0800
Message-ID: <000d01ca56b9$227ebc30$6400a8c0@counterrevolutionaryne49>
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="----=_NextPart_000_000E_01CA56B9.227EBC30"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1437
Importance: Normal

-------------------------------------------------------------------------------------------

Well friends, this attempt has been done by some Script kiddie. These are the guys who use scripts or programs developed by others to attack computer systems and networks. Such guys have lack the ability to write sophisticated hacking programs or exploits on their own, and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.

---Regards,
Amarjit Singh
read more "Someone tried to hackin into my Facebook..!!"

Sunday, October 25, 2009

Someone has Hacked my Facebook & Yahoo accounts...!!!

Hi Readers...surprise..guess guess what.................ummmmmm leeme tell you. I am posting a lot of posts regarding hacking & cracking. But who can believes on this.........that my yahoo mail account & facebook account got hacked yesterday night in between 12:00 to 12:30 am, 25th Oct. That gentleman has hacked my yahoo account first and after that did the same with facebook account.

Today is sunday and I came to my office for some official work. In the free time around 02:00 PM, I tried to open my Yahoo and Facebook account, but but but... it was shokkkkkkk for me. Passwords were not working for any of my accounts. After 45 minutes of efforts, I retrieved both of my passwords successfully.

Regarding this incident, I have logged a report to New Delhi cyber cell and they confidently promised me that they will catch that innocent gentleman with in a weeks time. Well, I am not interested in him. It was my moral duty to report such incident, and you all can also do the same if face similar issue in the coming future.

Here I am sharing few links with you, which might be useful for you:

Why you should report cyber crime? - CLICK HERE TO KNOW MORE

How to report a Cyber Crime - CLICK HERE TO KNOW MORE

What to do in case of a Cyber Crime - Visit the below link for cyber cell located across India.



If you guys wanna to know more bout my incident, Go thro the below screen shoots.

YAHOO ACCOUNT GOT HACKED


YAHOO ACCOUNT SECRET QUESTION GOT CHANGED


FACEBOOK ACCOUNT GOT HACKED


I RETRIEVED BACK BOTH THE ACCOUNTS



---Regards,
Amarjit Singh
read more "Someone has Hacked my Facebook & Yahoo accounts...!!!"

Google Spanner – A better Google

A recent presentation confirmed the existence of the proprietary distributed technology that will automatically move untitledand replicate the load between Google’s mega data centers when traffic and hardware issues arise. Perhaps this was  done to counter the issues of lagtime when Gmail was down..who knows? The platform is known as Spanner.

Google fellow Jeff Dean hinted about Spanner in the classic Google manner during a conference this summer and has now confirmed its existence in a presentation (PDF) delivered at a symposium earlier this month. .Dean’s presentation calls it a “storage and computation system that spans all our data centers [and that] automatically moves and adds replicas of data and computation based on constraints and usage patterns.” This includes issues and constraints related to bandwidth, packet loss, power, resources, and “failure modes”.

Google Spanner

Google is intent on scaling Spanner to between one million and 10 million servers, encompassing 10 trillion (1013) directories and a quintillion (1018) bytes of storage. And all this would be spread across “100s to 1000s” of locations around the world.

Thats a hell lot of data and power granted to a single corporation which will be housing an exabyte of the world's data across thousands of custom-built data centers.

Lets see how this unfolds..

 

POSTED BY XERO. ALL RIGHTS RESERVED.Source

read more "Google Spanner – A better Google"

Tuesday, October 13, 2009

Russia Blamed with Cyberattack on Poland

Leaked details by the Polish newspaper Rzeczpospolita indicate a large but unsuccessful attack on Polish Government systems which originated in Russia last month.The details indicate that the attack coincided with the 70th anniversaryCyber Crime news of the outbreak of World War Two and was coordinated at the same time when Russian President Vladimir Putin visited Poland.

The attack might have been referenced to the anniversary of infamous invasion of Poland by Nazi Germany and the Soviet Union on September 1939 under the secret terms of the Molotov–Ribbentrop non-aggression pact,however its still unclear as actual reason have not surfaced..yet.

Russia has been in news as the disputes between Russia and its neighbors have made their way over the Internet in recent years. and For example, Russian Hackers have been quite nefarious over cyberattacks at Georgia last year and security researchers subsequently blamed the attacks on civilians and Russian cyber-crime gangs.

The Internet infrastructure of Estonia was ripped apart in April 2007, following a dispute over the relocation of Soviet-era war memorials and graves.

 

Via The Registrar

 

POSTED BY XERO . ALL RIGHTS RESERVED.

 

read more "Russia Blamed with Cyberattack on Poland"

Thursday, October 1, 2009

7 Must Have Tools For Every Hacker

Its been a while since I have posted about some hacking tools and with increasing number of emails asking me to do an  7 Must Have Tools For Every Hackerarticle on it,I finally decided to cover it up.Hacking tools are developed by some really good coders out there to ease out many complex tasks which have to be done manually and took painstakingly great deal of time and effort.All these tools provided here are free of cost,are tried hands on and are being actively developed by community,and if not,their alternatives are provided.To summarize it up,these are the 7 must have tools for every hacker out there.
1. Nmap
I think everyone has heard of this one, it recently had a version 5 release.
Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to Nmap rapidly scan large networks, although it works fine against single hosts.Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use,and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a "map" of the network.Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.Can be used by beginners (-sT) or by pros alike (packet_trace). A very versatile tool, once you fully understand the results.
Download Nmap
Also,You can learn how to perform a simple Nmap scan by reading this article.
2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.Nessus is the worlds  Nessus Remote Security Scanner most popular vulnerability scanner used in over 75,000organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
Download Nessus
3. Wireshark
If you have been reading my site,you might have read about it in a couple of articles.Wireshark is a GTK+-based  Wiresharknetwork protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! .
Download Wireshark
4. Cain and Abel
The swiss knife of hacking tools..Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.
Download Cain and Abel
5. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with  Kismetany wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. A good wireless tool as long as your card supports rfmon
Download Kismet
6. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a NetStumbler nice interface, good for the basics of war-driving. NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
  1. Verify that your network is set up the way you intended.
  2. Find locations with poor coverage in your WLAN.
  3. Detect other networks that may be causing interference on your network.
  4. Detect unauthorized rogue access points in your workplace.
  5. Help aim directional antennas for long-haul WLAN links.
  6. Use it recreationally for WarDriving.
Download NetStumbler
7. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.
Download Superscan
Alternatively,you can try Angry IP Scanner which is a pretty good replacement for it.

You might also want to read about -
5 hacking sites for budding Hackers
Top 10 Must read articles at Prohack
Top 10 linux Speed hacks
5 Myths about Safe Surfing


Stay Gold and keep learning.

PS : Like this article ? You can always support me by buying me a coffee or You can always try some of the cool merchandize from PROHACK.


POSTED BY XERO . ALL RIGHTS RESERVED.

read more "7 Must Have Tools For Every Hacker"