Sunday, October 31, 2010

How-to Install Google Chrome in Ubuntu Linux

Hi All,
To install Google chrome in Ubuntu Linux , first download it here (32-bit version) or here (64-bit version).
Install sudo dpkg -i google-chrome-beta_current_*.deb and run.

Install Google Chrome in Ubuntu Linux
When Google Chrome was launched at first, I was offered to import Mozilla Firefox settings (Don't run firefox while importing). Click Agree and the run.
Install Google Chrome in Ubuntu Linux
that's it .thank u .....

Friday, October 29, 2010

China makes fastest supercomputer

Hi All,
A research lab in China has made the fastest supercomputer in the world. With this, it has been able to replace US in having the hold on this segment of technology.

But as China is trying to realize its dream of becoming the best in hi-tech, US has asked it to control its demand in rare earth elements. These elements are used in many a high-technology applications and have been in great demand by China.
It's 1.4 times more faster than present Us supercomputer........

RENAME RECYCLE BIN

Hi All,

Is any one tried to rename recycle bin ?

Now rename the recycle bin try it ? Not getting ........ok .

Now i am going to show u how to change it in simple tweak .......

steps:

1. Start-----> Run and type 'Regedit'.

2. Now Press 'Ctrl'+'F' to open find box and type 'Recycle Bin' to search.

3. Change any value data with 'Recycle Bin' to whatever name you want to give it like 'Trash Can' or 'Dump' etc.

4. Press F3 to continue searching for 'Recycle Bin' and change wherever you come across 'Recycle Bin' to new its new name.

5. Repeat step 4 until you have finished with searching and changed all values to its new name.

6. Close regedit and hit F5 on desktop to see the new name on screen.

Warning : Always backup your registry before changing anything although changing 'Recycle Bin' name is a simple tweak and doesn't affect anything else.

Enjoy.......

thank u........

Wednesday, October 27, 2010

How To Convert File System,FAT32 to NTFS

Hi All,

file system may all you hear about this .so having some conversion here .
If your drive is FAT16/32 now using command prompt youcan change it to NTFS files system.
Let's go for steps
go to run and type cmd
open a dos prompt and give the command

convert (drive letter )d: /fs:ntfs
(warning :which drive you want to convert the drive data take backup before you gone for this)

this command would convert your d: drive to ntfs.

if the system cannot lock the drive, you will be prompted to convert it during next reboot.

Normally you should select yes.

Conversion from fat/fat32 to ntfs is non-destructive, your data on the drive will NOT be lost.

Be aware that converting to ntfs will make that partition of your
drive unreadable under dos unless you have ntfs utilites to do so.

thank u ..............

Monday, October 25, 2010

KEYBOARD FUN

Hi All,

HACK your friend's keyboard and make him type "You are a FOOL" simultaneously:
First open a note pad and copy the code given below
CODE :

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop


Save it as "Anything.VBS" and send it.
when it opens ........................

SOLUTION: just restart your pc.

INTERVIEW Q&A

11. What kind of salary do you need?

A loaded question. A nasty little game that you will probably lose if you answer first. So, do not answer it. Instead, say something like, That’s a tough question. Can you tell me the range for this position? In most cases, the interviewer, taken off guard, will tell you. If not, say that it can depend on the details of the job. Then give a wide range.

12. Are you a team player?

You are, of course, a team player. Be sure to have examples ready. Specifics that show you often perform for the good of the team rather than for yourself are good evidence of your team attitude. Do not brag, just say it in a matter-of-fact tone. This is a key point.

13. How long would you expect to work for us if hired?

Specifics here are not good. Something like this should work: I’d like it to be a long time. Or As long as we both feel I’m doing a good job.

14. Have you ever had to fire anyone? How did you feel about that?

This is serious. Do not make light of it or in any way seem like you like to fire people. At the same time, you will do it when it is the
right thing to do. When it comes to the organization versus the individual who has created a harmful situation, you will protect the organization. Remember firing is not the same as layoff or reduction in force.

15. What is your philosophy towards work?

The interviewer is not looking for a long or flowery dissertation here. Do you have strong feelings that the job gets done? Yes. That’s the type of answer that works best here. Short and positive, showing a benefit to the organization.

16. If you had enough money to retire right now, would you?

Answer yes if you would. But since you need to work, this is the type of work you prefer. Do not say yes if you do not mean it.

17. Have you ever been asked to leave a position?

If you have not, say no. If you have, be honest, brief and avoid saying negative things about the people or organization involved.

18. Explain how you would be an asset to this organization

You should be anxious for this question. It gives you a chance to highlight your best points as they relate to the position being discussed. Give a little advance thought to this relationship.

19. Why should we hire you?

Point out how your assets meet what the organization needs. Do not mention any other candidates to make a comparison.

20. Tell me about a suggestion you have made

Have a good one ready. Be sure and use a suggestion that was accepted and was then considered successful. One related to the type of work applied for is a real plus.

IMPRESS ALL USING NOTEPAD TRICKS

Hi All,

THIS IS A VERY COOL TRICK .YOU CAN ACTUALLY CREATE A SYSTEM MESSAGE BOX WHICH POPS UP NOW AND THEN IN YOUR PC INFORMING YOU ABOUT AN ERROR :
WELL USING THIS TRICK YOU CAN ACTUALLY MAKE SUCH SYSYTEM MESSAGE BOX AND DISPLAY MESSAGE OF YOUR CHOICE.
HERE'S AN EXAMPLE:------

t=Msgbox("friendship  detected !!!!",    ,"virus database")
x=Msgbox("feelings  detected !!!!",    ,"virus database")
z=Msgbox(" love detected !!!!",    ,"virus database")
k=Msgbox("hatred  detected !!!!",    ,"virus database")
s=Msgbox("the end to friendship  !!!!",    ,"virus database")


COPY THE ABOVE CODE AND PASTE IT ON NOTEPAD AND SAVE THE NOTEPAD AS (NAME.VBS)THE EXTENSION IS MUST BE ".VBS" .SAVE THE FILE .
NOW AFTER YOU HAVE SAVED THE FILE WHEN U OPEN HAVING SOME FUN ......



NOTE : SOLUTION TO STOP SCRIPT JUST RESTART.

Sunday, October 24, 2010

FACEBOOK THIIRDPARTY APPLICATIONS LEAKING PERSONAL DATA

Hi All,

Facebook now a days compitation in social networking field for google. For security the Facebook takes many new rules(OTP) but the third party applications we are using in Facebook are leaking our personal data to the others .For example Games most of the social networking people plays the games in the net with friends before adding any application please check the privacy notice and remains .After verifing only add applications to your account.Now a days main source for hackers is games .Beware of it !

Desktop Wallpaper Changer

Hi All,
Now come to desktop wallpaper .think if the desktop wallpaper is automatically changing with your selected images that's good na .so why r u waiting download this software set wallpapers automatically to cahnge certain timing.


Download: Walyk Wallpaper Changer 1.5

Saturday, October 23, 2010

Secure Sockets Layer (SSL) ?

Hi All,

Now a days You might have heard some times that not to give your password or credit card information or any other sensitive information on public computers or on Msn, yahoo etc chats.The reason why you might have heard that the Hackers have some ways to you would have probably heard that hackers have a way to steal your your credit card numbers , passwords etc.

A hacker can use different types of attacks such as Packet sniffing or ARP Poisoning to steal your sensitive information
 Secure Sockets Layer (SSL) is the most widely used technology for creating a secure communication between the web client and the web server. You must be familiar with http:// protocol and https:// protocol, You might be wondering what they mean. HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a secure communication.Now a days banks and for online money transactions etc are using .


Cryptography

If two users want to have a secure communication they can also use cryptography to accomplish it.


For example:

TFDVSF=Encrypted Text

SECURE= Decrypted Text

You might be wondering how i Decrypted it, Here i have used Algorithm=+ for the communication and the key is "1", What comes after S is T so as you can see that S is converted into T, What comes After E is F to letter E from the word secure if converted into F and so on, To help you understand this more better I am adding a Video

So If the hacker starts sniffing from between he will get Encrypted text and as the Hacker does not know the keys so he cant decrypt it, but if the attacker or hacker is sniffing from the starting point so he will get the key and can easily Decrypt the data

Standard Communication VS Secure communication
Suppose there exists two communication parties A (client) and B (server)

Standard communication(HTTP)


When A will send information to B it will be in unencrypted manner, this is acceptable if A is not sharing Confidential information, but if A is sending sensitive information say "Password" it will also be in unencrypted form, If a hacker starts sniffing the communication so he will get the password.This scenario is illustrated using the following figure


Secure communication(HTTPS)




In a secure communication i.e. HTTPS the conversation between A and B happens to be in a safe tunnel, The information which a user A sends to B will be in encrypted form so even if a hacker gets unauthorized access to the conversion he will receive the encrypted password (“xz54p6kd“) and not the original password.This scenario is illustrated using the following figure




How is HTTPS implemented?

A HTTPS protocol can be implemented by using Secure Sockets Layer (SSL), A website can implement HTTPS by purchasing SSL certificate.

How to identify a Secure Connection?

In your browser, you will see a lock icon Picture of the Lock icon in the Security Status bar.  You can click the lock to view the identity of the website.

If you are making an online transaction through Credit card or any other means you should check if https:// secured communication is enabled.

SET ICONS TO YOUR PEN DRIVES AND OTHER STORAGE DEVICES

Hi All,
   NOW I AM GOING TO SHOW U HOW SET ANY JPEG FILE AS A ICON FOR YOUR STORAGE DEVICES.


STEPS :

1) CHOOSE ANY COOL ICON FIRST .YOU CAN DOWNLOAD SOME COOL ICONS FROM
     THE SITE BELOW .
                                             http://www.icomania.com
           OR YOU CAN CREATE YOUR OWN ICON.
   ALL YOU NEED TO DO IS SELECT ANY PICTURE YOU LIKE FOR YOUR ICON THEN IF IT
   IS IN (.JPG) FORMAT CHANGE IT TO (.PNG).

2) IT'S VERY SIMPLE OPEN THAT PICTURE IN MS-PAINT IN YOUR COMPUTER AND THEN
    SAVE THAT PICTURE IN (.PNG) FORMAT SIMPLE.

3) NOW YOU NEED TO UPLOAD THAT PICTURE CONVERTED TO (.PNG) FORMAT IN THE
    WEBSITE BELOW TO CONVERT IT INTO AN ICON ie(.ICO) FORMAT.
                                            http://html-kit.com/favicon/

4) AFTER YOU HAVE UPLOADED THE PICTURE YOU CAN DOWNLOAD YOUR ICON
      PICTURE.
     ITS VERY SIMPLE .

5)NOW THE MAIN PART  :
OPEN NOTEPAD AND WRITE:

[AUTORUN]
ICON=ICON NAME.ICO


NOW SAVE THE NOTEPAD AS AUTORUN.INF

NOW PASTE YOUR ICON PICTURE AND THIS AUTORUN.INF IN YOUR PENDRIVE YOUR ANY OF YOU STORAGE DEVICE.

NEXT TIME WHEN YOU INSERT YOUR PENDRIVE IN YOUR PC YOU WILL SEE THAT ICON FOR YOUR PENDRIVE INSTEAD OF THE DEFAULT ICON.

THANK U ........

Friday, October 22, 2010

BROWSE WEB WITH MS CALCULATOR AS A BROWSER

Hi All,

Now access internet via your standard Microsoft Calculator

Steps:


1. Open your MS Calculator. This is normally found in Start---->All Programs -----> Accessories        ----->Calculator.


2. Open the help-window by pressing the F1 key.








3. Click the top-left corner icon of the help window once (Standard is a Document with a Questionmark).


4. Select 'Jump to URL'.


5.Type any url  eg:  ( http://friendsnetworkcarrer.blogspot.com/)


6.and you must have your net connectivity on.


7.thats all u will be directed to that website.

Assigning IPV6 in different OS

Hi All,

Now a days the internet user's are growing and the ip addresses are decreasing .so ipv4 is a limited ip addresses to assign .In ipv6 there is no limit to assign ip add and here mac add of the user are included .the header of the IPV6 we can observe in the below figure.


Windows 

Check
First check to see if IPv6 is installed.
  • Execute ipv6 if from a DOS windows.
  • If it returns the message below, then IPv6 is not installed. If it returns a large amount of interface configuration information, IPv6 is installed and you can proceed to the Configure section.
Could not access IPv6 protocol stack-the stack is not installed.
 
 
Install
To install IPv6 on Windows XP SP2, execute the following commands as a administrator from the command line (DOS window):
  • ipv6 install
  • The output from this command is likely to be 1 of 2 possibilities:’
  1. The command returns OK. IPv6 has installed correctly, proceed to the Configure section.
  2. The command returns
Installing...
Failed to complete the action.
Error 0x800704b8
This problem relates to a windows internal security database that needs to be integrity checked and possibly repaired. ** If you’re using a corporate machine that is built as part of a Windows Domain, then please check with your IS people before following these procedures, as they may alter or erase Group Policy settings that have been pushed to your machine via a Domain Controller.**
  • If you issue esentutl /g c:\windows\security\Database\secedit.sdb, this will check the security database for errors.
Check the output of that command, if it declares…
Checking database integrity.
The database is not up-to-date. This operation may find that this database 
is corruptbecause data from the log files has yet to be placed in the database.
  • …then the database has errors which need to be corrected before IPv6 can be installed. The following command will rebuild the Local Security database on the machine.
** THIS IS POTENTIALLY DAMAGING TO YOUR DOMAIN SETTINGS **
  • Execute “esentutl /p c:\windows\security\Database\secedit.sdb” as an Administrator user.
  • You will likely get a warning box pop up which states…
You should only run Repair on damaged or corrupted databases
  • …Hit “OK”
  • Once the command has run-trough, re-execute esentutl /g c:\windows\security\Database\secedit.sdb which should result in the following output
Integrity check successful.
Operation completed successfully in some seconds.
  • Now, you should be able to execute the ipv6 install command successfully.
  • Run ipv6 if to confirm (see above).
Configure
Once IPv6 is Installed and running, it’s time to assign IPv6 Addresses, gateways and routes.
To configure an IPv6 address, determine which of the Interfaces shown by the command ipv6 if matches the name of your main network connection under “START–Control Panel–Network Connection”, it should be called something like “Local Area Connection X” where X is a number.
  • As an example, ipv6 if on my machine shows
Interface 5: Ethernet: Local Area Connection
 Guid {3E4601A7-041B-4D5A-ACD3-B6D840BBEF39}
zones: link 5 site 2
uses Neighbor Discovery
uses Router Discovery
link-layer address: 00-16-cb-97-4a-4e
  preferred global 2404:138:4000:1::203, life infinite (manual)
  preferred link-local fe80::216:cbff:fe97:4a4e, life infinite
  multicast interface-local ff01::1, 1 refs, not reportable
  multicast link-local ff02::1, 1 refs, not reportable
  multicast link-local ff02::1:ff97:4a4e, 1 refs, last reporter
  multicast link-local ff02::1:ff00:203, 1 refs, last reporter
link MTU 1500 (true link MTU 1500)
current hop limit 128
reachable time 20000ms (base 30000ms)
retransmission interval 1000ms
DAD transmits 1
default site prefix length 48
  • To assign 2404:138:4000:1::203 to Local Area Connection 5, execute ipv6 adu 5/2404:138:4000:1::203
  • To define the default gateway for that interface, execute ipv6 rtu ::/0 5/2404:138:4000:1::2. This defines the default route (::/0) on interface 5 as being 2404:138:4000:1::2.
  • To check IPv6 routes execute netsh, then interface ipv6 and then show route.
It should show something like
Publish  Type     Met  Prefix                  Idx  Gateway/Interface Name
-------  -------- ----  ---------------------  ---  ---------------------
no       Manual     0     ::/0                   5  2404:138:4000:1::2
  • To get out of netsh, type bye
Finalise
Once you have configured IPv6 Gateway and routes, test you can ping:
  1. Your local loopback. Try ping6 ::1. This should return replies that look similar to a normal IPv4 ping response
  2. Your v6 Gateway. Try ping6 <IPv6 gateway address>. Again, we’re looking for a normal ping response.
If you are having problems pinging gateways, then it may be with the Teredo Tunneling adapter that XP & Vista installs by default. This can be disabled using the netsh command
  • At a DOS prompt, execute netsh
  • Execute interface and then execute ipv6
  • Execute set teredo disable
  • Execute bye to exit from netsh
  • Finally, ensure you have a DNS server configured that can return Ipv6 or AAAA (Quad A) records.

Mac OS X

Configuring a static (manual) IPv6 address under Mac OS X (version 10.5.3 ) should be an easy case of bringing up the Network Preferences window, choosing your preferred interface, clicking on ‘Advanced’ and then choosing the TCIP/IP pane. From this pane, there is an ability to have IPv6 off, automatically configure or manually configure.

We haven’t tried automatic configuration yet [June 2008] as we don’t have an IPv6 DHCP server setup at the office. However, we do support IPv6 – as does KAREN of course – and have an allocation of IPv6 addresses.
Unfortunately, we discovered what appears to be a bug in using the GUI to manually set a static IPv6 address configuration in OS X. Whilst you can fill out the fields in the GUI pan and they are remembered, the underlying network configuration does not appear to change.
A manual workaround has been successful.


  • Ignore the GUI – at least for setting a static address
  • From the terminal, setup your IPv6 details:
    • sudo ifconfig en0 inet6 2404:138:4000:x::xx/64
    • sudo route add -inet6 -prefixlen 0 default 2404:138:4000:x::x
    • (replace en0 with the relevant network interface you want to IPv6 enable and xx with the relevant address numbering for your machine and the default gateway)
  • From the terminal, check the details have been applied
    • ifconfig en0 | grep inet6
inet6 fe80::21f:5bff:fe84:5a2f%en0 prefixlen 64 scopeid 0x4
inet6 2404:138:4000:x::xx prefixlen 64
(note the fe80: address is the internal IPv6 address assigned by the OS. It is similar to a 10.x or 192.168.x address under IPv4)
    • netstat -r -f inet6
Internet6:
Destination        Gateway            Flags      Netif Expire
::                 2404:138:4000:x::x UGSc        en0
default            2404:138:4000:x::x UGSc        en0
Note: As this method does not use the GUI, you may find that as you switch back to other networks using the same interface you will have to reset or manually remove your default gateway.

Linux/Unix

The following instructions were developed using Ubuntu Server 7.10, and is very simple. You need to edit /etc/network/interfaces with an appropriate editor such as vi. The catch is that the following lines need to be added before the IPv4 configuration.
iface eth(n) inet6 static
    address 2404:138:xxxx:xxxx::xxxx (static address of your host)
    netmask 64
    gateway 2404:138:xxxx:xxxx::xxxx (static address of the default router)
Once this has been saved restart the interface and use ping6 <address> to test connectivity to a remote subnet.

Automatic IPv6 address configuration – DHCP v6


Unfortunately, neither Mac OS X, Windows XP, nor most default linux installs come with a DHCPv6 client ). This means that any DNS, default routes and search paths have to be set manually.
This reflects the non-finalised protocols / standards around DHCPv6.


The Internet2 gurus says that one of the challenges is support for IPv6 ‘helpers’ (for example http://www.blackviper.com/WinXP/Services/IPv6_Helper_Service.htm).
Some community DHCP IPv6 links follow:
  • Dibbler – Dibbler is a portable DHCPv6 implementation. It supports stateful ( IPv6 address granting) as well as stateless (option granting) autoconfiguration for IPv6. Supports IPv6 and WinXP.
  • dhcpv6 project – DHCPv6 is a stateful address autoconfiguration protocol for IPv6, a counterpart to IPv6 stateless address autoconfiguration protocol.
  • ISC DHCP suite – version 4 onwards supports DHCPv6
 

Thursday, October 21, 2010

Assign IPv6 addresses in Linux

Hi All,

Now the IPV6 came.But  in linux how to assign the static IPV6 ? It is inevitable that IPv6 addresses are going to eventually take over. When that happens you will need to know just how to assign an IPv6 address in your Linux operating system. Of course this will only be necessary on a system that uses a static IP address, but when you’re using Linux that can happen fairly often. Having this knowledge on hand will make this transition easy.
 you will have to have a kernel that is compiled with IPv6 support. Most modern Linux distributions already have this built in. You also have to have your IPv6 addresses handy.  simple web-based IPv6 calculator. With that tool select the IPv4 to IPv6 conversion and you should be good to go. So with everything in hand, you are ready to configure.
 go to  ipv4 to ipv6 converter tool click here

IPv6 support
First make sure your kernel supports IPv6. To do this you can first run the command:
sudo lsmod|less
and search the listing to see if ipv6 is there. If not try loading it with the command:
sudo /sbin/modprobe ipv6
Now issue the lsmod command to see if it is there. It should be.
Configuration
The file you want to configure will be the standard network interface configuration. Remember you are going to configure for static IP addresses. The file in question is /etc/network/interfaces. We are also going to add something to this file that will ensure IPv6 is loaded properly and that your networking us making use of the new address scheme.
The details of our configuration:
IPv4 address: 192.168.1.10
IPv6 Address: 2002:c0a8:10a::
IPv4 gateway: 192.168.1.1
IPv6 gateway: 2002:c0a8:0101::
Now let’s add this to the /etc/network/interfaces file. The new file will look like this:
#IPV6 static configuration
iface eth0 inet6 static
pre-up modprobe ipv6
address 2002:c0a8:10a::

netmask 64
gateway 2002:c0a8:0101::


Notice the “pre-up” command. That is where we ensure that IPv6 is added to the kernel, otherwise you run the risk of attempting to use an IPv6 address in a system that is looking for an IPv4 address.
Now you will want to restart networking with the command:
/etc/init.d/networking restart
You should now have an IPv6 address enabled.
Testing
Before you assume everything is working, let’s make sure first. You can check your IP routing with the command:
ip -6 route show
The above command should return something like:
2002:c0a8:0100/64 dev eth0 proto kernel  scope  link src 2002:c0a8:10a
You can also check by pinging with the ping6 tool. A good IPv6 address to try is the Google address. Issue this command:
ping6 ipv6.google.com
If IPv6 isn’t working you will get error:
Network is unreachable
If IPv6 is working you will see the standard ping results in your terminal window.

Another Method :

Using "ip"

Usage:
# /sbin/ip -6 addr add <ipv6address>/<prefixlength> dev <interface> 
Example:
# /sbin/ip -6 addr add 2001:0db8:0:f101::1/64 dev eth0 

Using "ifconfig"

Usage:
# /sbin/ifconfig <interface> inet6 add <ipv6address>/<prefixlength>
Example:
# /sbin/ifconfig eth0 inet6 add 2001:0db8:0:f101::1/64 

BackTrack 4 Hacking LiveCD For Download

Hi All,

 Most of the hackers are using this tool  for finding vulnerablities in the network.Mostly the penetrating tester are using this tool.BackTrack is a top rated linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes.

 you can watch the preview of the backtrack tool  
Run Backtrack 4 Beta in Windows with VmWare Workstation 


Tools
  This release we have some special features such as spoonwep, fastrack and other cool additions.
Availability
For the first time we distribute three different version of Backtrack 4:
  • CD version
  • USB version
  • VMWare version
 Download:

BackTrack 4 R1 Release ISO click here

BackTrack 4 R1 Release VMware Image clickhere

Wednesday, October 20, 2010

Security/Hacking Tools

Hi All,

Now i am going to show some important tools for hacking/security.those are
1. Nmap
                Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services means application name and version. those hosts are offering, what operating systems using with versions showing. they are running, what type of packet filters/firewalls are in use and other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.

Download: click here

2. Nessus
                   Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.Recently went closed source.

Download: click here


3. John the Ripper
            John the Ripper is a fast password cracker, currently available for many flavors of Unix, DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

Download: click here

4. SuperScan
           Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.

Download: click here

5. Wireshark 
          Wireshark is  network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows .

Download: click here

6. PuTTY
       PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4x0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.

Download: click here

7. Cain and Abel
        My  favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

Download: click here

NSDECODER ( Website Malware Detection Tool)

Hi All,

NSDECODER is a automated website malware detection tool. It can be used to decode and analyze an URL to see if it host to malware. Also, NSDECODER will analyze which vulnerability has been exploited and the original source address of malware.
Functions
  • Automated analysis and detection of website malware.
  • Detection for plenty of vulnerabilities.
  • Log export supports HTML and TXT format.
  • Ability to deeply analyze JavaScript.
download :click here

warriors of the internet ip

Hi All,
watch this have a fun with knowledge.enjoy........

Tuesday, October 19, 2010

google Docs Adds Drag-and-Drop Image Insertion

Hi All,

Google  added drag-and-drop image uploads and insertion between your desktop and Google Docs for anyone using the latest versions of Firefox, Chrome, or Safari.
Browsing through your upload dialog to upload something to the web when you're already staring at the file on your desktop is always a painful process. Some people hesitate to ditch desktop apps like Microsoft Office for Google Docs because of that sort of lack of desktop integration.. Now inserting an image from your computer into a document is as easy as drag-and-drop.
You'll need to have enabled the new version of Google Docs if you haven't already, but it's easy to do: Just navigate to Google Docs settings, click Editing, tick the checkbox next to New version of Google documents, and then click Save.
It's a relatively small upgrade in the grand scheme of things, but it's really handy if you're a regular Docs user.
source : google

common interviewquestions & answers

 Hi All,

Here i am providing some common interview Question & Answers.

1. Tell me about yourself:

The most often asked question in interviews. You need to have a short statement prepared in your mind. Be careful that it does not sound rehearsed. Limit it to work-related items unless instructed otherwise. Talk about things you have done and jobs you have held that relate to the position you are interviewing for. Start with the item farthest back and work up to the present.

2. Why did you leave your last job?

Stay positive regardless of the circumstances. Never refer to a major problem with management and never speak ill of supervisors, co-workers or the organization. If you do, you will be the one looking bad. Keep smiling and talk about leaving for a positive reason such as an opportunity, a chance to do something special or other forward-looking reasons.

3. What experience do you have in this field?

Speak about specifics that relate to the position you are applying for. If you do not have specific experience, get as close as you can.

4. Do you consider yourself successful?

You should always answer yes and briefly explain why. A good explanation is that you have set goals, and you have met some and are on track to achieve the others.

5. What do co-workers say about you?

Be prepared with a quote or two from co-workers. Either a specific statement or a paraphrase will work. Jill Clark, a co-worker at Smith Company, always said I was the hardest workers she had ever known. It is as powerful as Jill having said it at the interview herself.

6. What do you know about this organization?

This question is one reason to do some research on the organization before the interview. Find out where they have been and where they are going. What are the current issues and who are the major players?

7. What have you done to improve your knowledge in the last year?

Try to include improvement activities that relate to the job. A wide variety of activities can be mentioned as positive self-improvement. Have some good ones handy to mention.

8. Are you applying for other jobs?

Be honest but do not spend a lot of time in this area. Keep the focus on this job and what you can do for this organization. Anything else is a distraction.

9. Why do you want to work for this organization?

This may take some thought and certainly, should be based on the research you have done on the organization. Sincerity is extremely important here and will easily be sensed. Relate it to your long-term
career goals.

10. Do you know anyone who works for us?

Be aware of the policy on relatives working for the organization. This can affect your answer even though they asked about friends not relatives. Be careful to mention a friend only if they are well thought of.

Usb flash drive virus to block entering in to pc

Hi All,

Now a days many people are using flash disks for easy of data transmission. the drive when you connect to pc it autoplays .the virus makers are using this draw back they made lot of virus to damage the pc.for example autorun.inf ,recyller etc .so what to do?

Don't worry there is a solution .using some softwares you can avoid this and when you are going to open the drive instead of double click use explrer.Some softwares are here
Download: 1. usbdisksecurity from zbshareware
                   2. USBVaccineSetup from panda

This year (2010) Internet users 2 Billion


Hi All,

The Internet will exceed 2 billion users before the end of 2010, according to a report by the International Telecommunication Union (ITU). Based on current estimates, the around 6.9 billion on earth, meaning that by year’s end, nearly 30% of the people are using the internet .

Monday, October 18, 2010

Bootable Antivirus Rescue CD

Hi All,

Now i am going to show you when u facing serious problem with virus how to clean it from boot sector.using some antivirus rescue disk you can do this. some antivirus softwares are providing this service.Now i am going to show u here.Bootable antivirus Rescue CD method consider as the most effective way to remove the virus, trojan and malware because it track down some viruses, trojans and other malware are embedded so tightly into your operating system that when you boot Windows the normal way. Mostly virus is also loaded and cannot be detected or removed by antivirus software running in that system. In such a case, booting antivirus rescue CD under clean environment can increase chances to track down virus easily which there no interfere from any windows OS services.so we are using this method.here i am providing some rescue disks.

kaspersky Rescue Disk as Bootable DOS Antivirus :

1. Download Kaspersky Rescue Disk ISO file
2. Burn the Kaspersky Rescue Disk ISO image to a CD  using magic iso software.
3. Once finish burn Kaspersky Rescue Disk into bootable CD , insert Bootable kaspersky Rescue Disk CD into CD ROM and boot the computer by loading CD ROM media first.
4. Then a DOS screen will be loading below. Hit Enter to start booting the DOS Kaspersky AntiVirus using Linux. Kaspersky Rescue Disk startup
5. Finally a Kaspersky AntiVirus 2009 GUI  will be appear. Just check the hard drives that you want to scan virus or other malicious thread. Kaspersky AntiVirus 2009 GUI


Some other rescue cd providers are:
1.BitDefender Rescue CD.
2.F-Secure Rescue CD.
3. Avira Antivir Rescue Disk.
4. Trinity Rescue Kit CD.
5. AVG Rescue CD – Bootable AVG Antivirus CD / USB.
6. Shardana Antivirus Rescue Disc Utility.
7.Dr Web Live Bootable Antivirus CD.

and clean the virus and enjoy...........
source:www.techmixer.com

How to Reduce Spam

Hi all ,
Now a days when u login to your account u can see lot of spam in your account but most of the people are don't know how the spam is coming to our mail id's.the spamers using various methods to get the mail id's.now we are going for how to avoid like this spam using some simple steps .......

1.Using corporate email for personal use.
2.Avoid Posting email address on web pages.
3.Sending email to several external recipients
4. Mailing lists.
5.Do not automatically download images unless you trust the sender. 
6. Turn off read and delivery receipts and automatic processing of meeting requests .
7. Be careful where you post your e-mail address.
8.Never reply to spam.
9. Never forward chain e-mail messages. 
10.Use antivirus software which is included antispammer feature. 

Sunday, October 17, 2010

CHANGE THE WINDOWS TUNE

Hi All,
Today I gonna tell you how to change the welcome and shut down tune at the time of LogOn/logoff to any beautiful song you like

All the sounds in Windows  are in WAV format. So if you want to change any of the system sound(windows sounds) you should replace it by a sound of .wav format.So first all you need to do is convert the song you want to play as your welcome tune from .mp3 to .wav format .Using total video converter soft you can make all these conversions.

Then convert our song into .wav format.After you have converted to .wav format.
follow the steps below:
 
1)copy  and paste the .wavformat of your selected song to this location :-  C:\Windows\Media

2)then goto the : "Control panel"(clik)
----->"Sound ,speech and audio devices"(clik)
------>"Sound and audio devices"(clik)
---------->Sound tab(clik)
------------>underprogam events scrol down and find "Start Windows" (clik) and "shutdown".
---------->now goto  the" browse "option and select our .wav format of your song and then clik apply and ok. done 

3)next time when you LogOn/logoff instead of that boring windows welcome tune your song will be playing.

 

Saturday, October 16, 2010

Blue Screen error

Hi All,
If you are using Windows, chances are you've experienced the lovely shade of blue associated with the famous Windows Stop Error or 'Blue Screen of Death.' This frequent, although less so in newer operating systems, error occurs whenever Windows senses a software, hardware or driver error which will not allow it to continue operating properly. In other words, it happens all the time, for all sorts of reasons.
sometimes, if you're lucky, the problem will resolve itself with a simple reboot and you may never have to worry about it again.but some times it's going to irritate you

What is a Blue Screen of Death?
The Blue Screen of Death, or more properly the 'Windows stop message' occurs when Windows detects a problem or error from which it cannot recover. The operating system halts and diagnostic information is displayed on a blue screen. In newer versions of the operating system, the contents of the PC's memory are dumped to a file for later analysis.
All Windows XP stop errors are numbered according to the circumstances that caused the error, which assists enormously in troubleshooting them. Let's take a moment to look at a BSOD in its natural environment, careful now, we don't want to startle it... Note the eye catching shade of blue intended to warn us of trouble, the detailed list of hexadecimal numbers, and relatively unhelpful 'tip.' This is the BSOD in all its glory, so be very afraid if you ever come face to face with this hideous creature!
The error contains  four parts those are
1.The bugcheck information shows the number of the stop error , information on why the system has stopped and the friendly (text-based) name for the stop error, in this case "DRIVER_IRQI_NOT_LESS_OR_EQUAL."
 
2. 'recommended user action,' is pretty generic and contains advice for the user on possible troubleshooting steps.
3.
'driver information,' may contain vital info. If an actual driver file is associated with the blue screen, it will be listed here. This can give you something to work on in the case of a reoccurring error. 
 4. 'debug port and status information"
  solution go to :http://support.microsoft.com/kb/958233

reshack tool

Hi All,
Here some interesting one for boring with windows default startbutton and control panel etc now you can change it to what ever you want with logos .
Let me expalin make some bit map files make it as your start button logo like that .before your going for this be carefull .
follow these steps before you gone for this
warning : go to c:/windows and copy the explorer.exe file in to another location .
Now you can make any experiment on this.when u feel not good replce the explorer file in to same location .
for all these we are using Reshack .it's look like this

why waiting start doing ..............
download :click here

Careful with this...........? ctr+c and ctr+v

Hi All,
Be Very Careful with this..! ctr+c and ctr+v
We all copy various data by using ctrl+c/Copy for pasting elsewhere.
This copied data is stored on clipboard and is accessible over the net by a combination of javascripts and ASP.

Just try this:
1) Copy any text by ctrl+c
2) Click the Link: http://www.friendlycanadian.com/applications/clipboard.htm
3) You will see the text you copied on the Screen which was accessed by this web page.
Do not keep sensitive data (like passwords, creditcard numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information. If sufficient data is stored by mistake it would give away confidential and important information without you knowing about it.

To Avoid This
follow these steps:

1. Go to internet options->security

2. Press custom level

3. In the security settings, select disable under Allow paste operations via script.

Now the contents of your clipboard are safe.

Be secure while surfing the internet .

Intel launches "Free Press" an online news magazine

for this go to (http://freepress.intel.com).

3G Services on Tata Docomo

Hi All,

Tata Docomo informed us that they are going to launch 3G services in India which is scheduled on this Diwali. After MTNL and BSNL , tata docomo will be the first private organization to launch commercial 3G in India.Tata Teleservices Limited  is planning plunge 3G services in 9 areas which has been recently acquired for 3G spectrum by them. The 9 circles are as follows:

1. Maharashtra & Goa,

2. Punjab

3. Haryana

4. Uttar Pradesh (West)

5. Rajasthan

6. Gujarat

7. Karnataka

8. Kerala

9. Madhya Pradesh-Chattisgarh

SQL Injection

Email Threats

Hi All,
Here’s a look at the top three email threats . These are spam campaigns that delivered malware through attachments claiming to be documents or photos.
  1. Resume – The messages pumped out by this spam. look like they are from someone the recipient sent a resume to and tells them an edited and cleaned up version is attached. If that attached zip file is opened, a hidden .exe will quietly contact a remote server and download malware. This exploit is clearly designed to take advantage of the unemployment problem in the U.S. and is often sent to addresses harvested from job search sites like Monster and CareerBuilder. These messages are particularly sneaky because they are well written with no grammar or spelling errors, which is unusual for most spam.
  2. Docs – This campaign pumps out malicious spam that looks like it came from a legit company. The attachment claims to be important corporate documents but is actually malware. These messages even include a real company’s name, fax, and phone number.
  3. Air France – This is a more traditional spam . that uses the tried and true trick of exploiting a recently headline or pop culture phenomenon. In this case it claims to be providing exclusive photos of the Air France plane crash. Unlike the previous two threats, this one has the usual hallmarks of spam including broken English and is easy to spot.
  4. images: by sending some images are look like very cute .and putting some hidden tool in image whan u save or double click on image that will be activated. and trying to contact to hackers server.

Internet is Filtered - TCP/IP Header Filtering

Hi All,
 An IP packet consists of two distinct parts - the header and the data carried by the packet. IP is actually an a connectionless protocol which means that it does not contain any information on the state of a connection. Each datagram is independent and as such must contain all the information in the header for it to be delivered independently. the header in each individual IP segment contains the source and destination IP addresses required for the packet to be delivered. The devices which most rely on this header are the routers and switches which relay information across the internet and internal networks. A router will inspect each header for every packet that passes through it in order to send it onwards to its destination.These packets contain you web requests and surfing data and so can be used to control your access to the internet.  So a very simple method of internet filtering, is to merely instruct gateway routers to drop all packets destined for a specific IP address. So for instance if your only concern was to block access to Facebook, then all you would have had to do is find out all the IP addresses of Facebook servers and add these to a blacklist on the router.This actually works very well, but it can also cause problems in some cases as all services will be blocked on that IP address. For instance if you want to send an email which was directed to that server it would also be blocked. In fact in these days of distributed computing you'll find that services and web sites will be spread across multiple IP addresses and servers. So if you try and block an IP address related to YouTube for instance, you'll also end up breaking other Google applications such as analytics, webmaster tools which was exactly happened earlier this year in Turkey The other major problem is that IP addresses change, they are not always going to stay associated with the same web sites. One minute you can be blocking one web site, but a week later you might find you're blocking something completely different on that IP address .


So how can you bypass this particular mode of internet filtering?

  The key is that the destination IP address is the only thing that is being checked so if you change this then the packet will be allowed through. This is one of the only circumstances where you can use a standard proxy to beat internet filtering, because if you connect to a proxy server that will be the destination in the TCP/IP header. So unless the proxy server IP address is in the blocked list on the router it will acually be allowed through.  So if you find a free web proxy online and just surf through that then your web surfing should be unfiltered.
There is one other thing to remember when using this method and why you'll probably be restricted to surfing using a web proxy in a  window.   Most companies and education networks will add another setting  to further reject all traffic on port 80 unless it is directed through the approved proxy server.  This adds another layer of defence to stop people just routinely using an alternative proxy server and ensuring they can also filter URLs on their own proxies.  This will be configured on a gateway router or the firewall protecting the internal network from the internet.   To bypass this you either have to surf out through another port or tunnel through  the approved proxy as Identity Cloaker is able to do.
If you're setting up your own external proxy or VPN then consider using Port 443 which will rarely be blocked completely as it is needed for HTTPS sessions. 

Thursday, October 14, 2010

Facebook Introduces OTP (One-time Password) Functionality

Hi all now users can login with a one-time password that, upon request, Facebook zaps to their mobile phones. The temporary access code is good for 20 minutes only. The new feature is designed to prevent account compromises that result when credentials are entered into machines that have been compromised by keyloggers and similar types of malware.
“We’re launching one-time passwords to make it safer to use public computers in places like hotels, cafes or airports,”  “If you have any concerns about security of the computer you’re using while accessing Facebook, we can text you a one-time password to use instead of your regular password.”Jake Brill, a Facebook product manager.

Wednesday, October 13, 2010

Human error gave spammers keys to Microsoft systems


Microsoft blamed human error after two computers on its network were hacked and then misused by spammers to promote questionable online pharmaceutical websites.
Microsoft launched an investigation, after the problem was first reported in the Register. "We have completed our investigation and found that two misconfigured network hardware devices in a testing lab were compromised due to human error," Microsoft said  in a statement. "Those devices have been removed." After they were compromised, the two servers were to handle the DNS of more than 1,000 fraudulent pharmaceutical websites,  discovered the hacked Microsoft systems late lastweek while researching pharmaceutical spam. "This same group has hijacked quite a lot of machines all over the world," Guilmette said in an interview.


The devices that got hacked were "network devices that run a Linux kernel," Microsoft said.n addition to spam, at least one of the Microsoft computers was also used to launch a denial of service attack against a website belonging to Brian Krebs, Krebs believes that Russian-based pharmaceutical spammers were behind the attack on his site.


No customer data or production systems were affected by the attack, Microsoft said.
Microsoft has taken steps to improve its security in recent years, and has taken a hard-line stance against spam, so it's embarrassing to have company systems misused in this way.
"We are taking steps to better ensure that testing lab hardware devices that are Internet accessible are configured with proper security controls," Microsoft said.

Phishing Site of ICICI Bank

Hi friends,
A phish email created for ICICI Bank Users.
Sharing the screen-shots for fun. Have reported the fake site to antiphishing.org
The 'Phish' email:
 Phishing Site Link: http://adamthompson.org/infinity.update/BANKAWAY.sessionid/update;RetUser/Y&AppSignOn.icicibank.co.in/index.html

Concept iWatch

iWatch is a cool concept where you can have the same features like latest iPod Nano. It will defiantly change the way we check time.

Enjoy the concept video.

Facebook and Microsoft partner on new social-search features

Microsoft and Bing are partnering to “make Bing search more social.” In Web 2.0 speak, the idea is search graph + web graph = better answers.

Popular Posts

Followers

Disclaimer

All Data and Information Provided on This BLOG is only for Education purposes only.If you done any thing else these in real time the blog is not Responsible.Try all those on your own risk.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.