Some say: "You learn as long as you live". My way: "You live as long as you learn". This Blog Is Developed To get aware about some viruses, maltreats, spy-wares, Trojans etc among the peoples. And This Blog provide Information related Computer , IT field
Friday, August 26, 2011
Monday, March 21, 2011
What are Public IP & Private Ip Addresses.
What are Public IP Addresses?
A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.
A public IP address can be either static or dynamic. A static public IP address does not change and is used primarily for hosting WebPages or services on the Internet. On the other hand a dynamic public IP address is chosen from a pool of available addresses and changes each time one connects to the Internet. Most Internet users will only have a dynamic IP assigned to their computer which goes off when the computer is disconnected from the Internet. Thus when it is re-connected it gets a new IP.
You can check your public IP address by visiting www.whatismyip.com
What are Private IP Addresses?
An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN). The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks (local networks):
10.0.0.0 – 10.255.255.255 (Total Addresses: 16,777,216)
172.16.0.0 – 172.31.255.255 (Total Addresses: 1,048,576)
192.168.0.0 – 192.168.255.255 (Total Addresses: 65,536)
Private IP addresses are used for numbering the computers in a private network including home, school and business LANs in airports and hotels which makes it possible for the computers in the network to communicate with each other. Say for example, if a network X consists of 10 computers each of them can be given an IP starting from 192.168.1.1 to 192.168.1.10. Unlike the public IP, the administrator of the private network is free to assign an IP address of his own choice (provided the IP number falls in the private IP address range as mentioned above).
Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers outside the local network cannot connect directly to a device with a private IP. It is possible to interconnect two private networks with the help of a router or a similar device that supports Network Address Translation.
If the private network is connected to the Internet (through an Internet connection via ISP) then each computer will have a private IP as well as a public IP. Private IP is used for communication within the network where as the public IP is used for communication over the Internet. Most Internet users with a DSL/ADSL connection will have both a private as well as a public IP.
You can know your private IP by typing ipconfig command in the command prompt. The number that you see against “IPV4 Address:” is your private IP which in most cases will be 192.168.1.1 or 192.168.1.2. Unlike the public IP, private IP addresses are always static in nature.
Unlike what most people assume, a private IP is neither the one which is impossible to trace (just like the private telephone number) nor the one reserved for stealth Internet usage. In reality there is no public IP address that is impossible to trace since the protocol itself is designed for transperancy.
Enable Disable USB Ports
How to disable or enable USB port or device
USB Devices are portable enough to carry the data from one computer to another , It is always risky to enable USB ports of computers in large organizations , data center and cyber cafes since it can be the gateway for virus and malwares. You can disable or enable USB port or device in three waysEnable / Disable USB port and device in BIOS
It can be enabled or disabled in BIOS where the peripheral device setting is configured. While booting the system you will be getting an option to configure BIOS settings. But only problem is you will not be able to use those USB ports for any purpose like connecting USB keyboards or mouse or any devices.
Enable / Disable USB port and device using registry hack in windows
Another effective way to enable or disable USB port or device is to hack registry entry in windows , it will allow you to use your USB port for other functions like connecting keyboard or mouse but you can restrict the data storage through USB port
A. Click on Start –> Run –> regedit [enter]
B. Search for the key “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor”
C. Select the key UsbStor, double clicks on Start value.
D. In “Value data” enter 4 to disable USB storage, or enter 3 to enable USB storage on windows system
Freeware to enable or disable USB port or device in Windows 7 and XP
There is a nice tool to enable or disable USB PORT in registry. It exactly does the above mentioned steps. If you are not an experienced users then I would prefer you to use below mentioned software for this task. Please remember that it is always risky to edit windows registry.
LinuX Bash Commands: A 2 Z
An A-Z Index of the Bash command line for Linux.
An A-Z Index of the Bash command line for Linux.adduser Add a user to the system
addgroup Add a group to the system
alias Create an alias •
apropos Search Help manual pages (man -k)
apt-get Search for and install software packages (Debian/Ubuntu)
aptitude Search for and install software packages (Debian/Ubuntu)
aspell Spell Checker
awk Find and Replace text, database sort/validate/index
b
basename Strip directory and suffix from filenames
bash GNU Bourne-Again SHell
bc Arbitrary precision calculator language
bg Send to background
break Exit from a loop •
builtin Run a shell builtin
bzip2 Compress or decompress named file(s)
c
cal Display a calendar
case Conditionally perform a command
cat Display the contents of a file
cd Change Directory
cfdisk Partition table manipulator for Linux
chgrp Change group ownership
chmod Change access permissions
chown Change file owner and group
chroot Run a command with a different root directory
chkconfig System services (runlevel)
cksum Print CRC checksum and byte counts
clear Clear terminal screen
cmp Compare two files
comm Compare two sorted files line by line
command Run a command – ignoring shell functions •
continue Resume the next iteration of a loop •
cp Copy one or more files to another location
cron Daemon to execute scheduled commands
crontab Schedule a command to run at a later time
csplit Split a file into context-determined pieces
cut Divide a file into several parts
d
date Display or change the date & time
dc Desk Calculator
dd Convert and copy a file, write disk headers, boot records
ddrescue Data recovery tool
declare Declare variables and give them attributes •
df Display free disk space
diff Display the differences between two files
diff3 Show differences among three files
dig DNS lookup
dir Briefly list directory contents
dircolors Colour setup for `ls’
dirname Convert a full pathname to just a path
dirs Display list of remembered directories
dmesg Print kernel & driver messages
du Estimate file space usage
e
echo Display message on screen •
egrep Search file(s) for lines that match an extended expression
eject Eject removable media
enable Enable and disable builtin shell commands •
env Environment variables
ethtool Ethernet card settings
eval Evaluate several commands/arguments
exec Execute a command
exit Exit the shell
expect Automate arbitrary applications accessed over a terminal
expand Convert tabs to spaces
export Set an environment variable
expr Evaluate expressions
f
false Do nothing, unsuccessfully
fdformat Low-level format a floppy disk
fdisk Partition table manipulator for Linux
fg Send job to foreground
fgrep Search file(s) for lines that match a fixed string
file Determine file type
find Search for files that meet a desired criteria
fmt Reformat paragraph text
fold Wrap text to fit a specified width.
for Expand words, and execute commands
format Format disks or tapes
free Display memory usage
fsck File system consistency check and repair
ftp File Transfer Protocol
function Define Function Macros
fuser Identify/kill the process that is accessing a file
g
gawk Find and Replace text within file(s)
getopts Parse positional parameters
grep Search file(s) for lines that match a given pattern
groups Print group names a user is in
gzip Compress or decompress named file(s)
h
hash Remember the full pathname of a name argument
head Output the first part of file(s)
help Display help for a built-in command •
history Command History
hostname Print or set system name
i
id Print user and group id’s
if Conditionally perform a command
ifconfig Configure a network interface
ifdown Stop a network interface
ifup Start a network interface up
import Capture an X server screen and save the image to file
install Copy files and set attributes
j
jobs List active jobs •
join Join lines on a common field
k
kill Stop a process from running
killall Kill processes by name
l
less Display output one screen at a time
let Perform arithmetic on shell variables •
ln Make links between files
local Create variables •
locate Find files
logname Print current login name
logout Exit a login shell •
look Display lines beginning with a given string
lpc Line printer control program
lpr Off line print
lprint Print a file
lprintd Abort a print job
lprintq List the print queue
lprm Remove jobs from the print queue
ls List information about file(s)
lsof List open files
m
make Recompile a group of programs
man Help manual
mkdir Create new folder(s)
mkfifo Make FIFOs (named pipes)
mkisofs Create an hybrid ISO9660/JOLIET/HFS filesystem
mknod Make block or character special files
more Display output one screen at a time
mount Mount a file system
mtools Manipulate MS-DOS files
mtr Network diagnostics (traceroute/ping)
mv Move or rename files or directories
mmv Mass Move and rename (files)
n
netstat Networking information
nice Set the priority of a command or job
nl Number lines and write files
nohup Run a command immune to hangups
Notify-send Send desktop notifications
nslookup Query Internet name servers interactively
o
open Open a file in its default application
op Operator access
p
passwd Modify a user password
paste Merge lines of files
pathchk Check file name portability
ping Test a network connection
pkill Stop processes from running
popd Restore the previous value of the current directory
pr Prepare files for printing
printcap Printer capability database
printenv Print environment variables
printf Format and print data •
ps Process status
pushd Save and then change the current directory
pwd Print Working Directory
q
quota Display disk usage and limits
quotacheck Scan a file system for disk usage
quotactl Set disk quotas
r
ram ram disk device
rcp Copy files between two machines
read Read a line from standard input •
readarray Read from stdin into an array variable •
readonly Mark variables/functions as readonly
reboot Reboot the system
rename Rename files
renice Alter priority of running processes
remsync Synchronize remote files via email
return Exit a shell function
rev Reverse lines of a file
rm Remove files
rmdir Remove folder(s)
rsync Remote file copy (Synchronize file trees)
s
screen Multiplex terminal, run remote shells via ssh
scp Secure copy (remote file copy)
sdiff Merge two files interactively
sed Stream Editor
select Accept keyboard input
seq Print numeric sequences
set Manipulate shell variables and functions
sftp Secure File Transfer Program
shift Shift positional parameters
shopt Shell Options
shutdown Shutdown or restart linux
sleep Delay for a specified time
slocate Find files
sort Sort text files
source Run commands from a file `.’
split Split a file into fixed-size pieces
ssh Secure Shell client (remote login program)
strace Trace system calls and signals
su Substitute user identity
sudo Execute a command as another user
sum Print a checksum for a file
suspend Suspend execution of this shell •
symlink Make a new name for a file
sync Synchronize data on disk with memory
t
tail Output the last part of files
tar Tape ARchiver
tee Redirect output to multiple files
test Evaluate a conditional expression
time Measure Program running time
times User and system times
touch Change file timestamps
top List processes running on the system
traceroute Trace Route to Host
trap Run a command when a signal is set(bourne)
tr Translate, squeeze, and/or delete characters
true Do nothing, successfully
tsort Topological sort
tty Print filename of terminal on stdin
type Describe a command •
u
ulimit Limit user resources •
umask Users file creation mask
umount Unmount a device
unalias Remove an alias •
uname Print system information
unexpand Convert spaces to tabs
uniq Uniquify files
units Convert units from one scale to another
unset Remove variable or function names
unshar Unpack shell archive scripts
until Execute commands (until error)
useradd Create new user account
usermod Modify user account
users List users currently logged in
uuencode Encode a binary file
uudecode Decode a file created by uuencode
v
v Verbosely list directory contents (`ls -l -b’)
vdir Verbosely list directory contents (`ls -l -b’)
vi Text Editor
vmstat Report virtual memory statistics
w
watch Execute/display a program periodically
wc Print byte, word, and line counts
whereis Search the user’s $path, man pages and source files for a program
which Search the user’s $path for a program file
while Execute commands
who Print all usernames currently logged in
whoami Print the current user id and name (`id -un’)
Wget Retrieve web pages or files via HTTP, HTTPS or FTP
write Send a message to another user
x
xargs Execute utility, passing constructed argument list(s)
xdg-open Open a file or URL in the user’s preferred application.
yes Print a string until interrupted
. Run a command script in the current shell
Leet Language for h4x0rs....
“h4x0r 1n m3″ – Speaking Leet : Language of Hackers
Leet, the language of the Geeks and Hackers.To speak leet, you more or less need to un-learn proper english. The history of leet goes back to the early days of online message boards, or forums, where users can post messages to carry on a threaded conversation. In an attempt to “Clean-Up” the language that users would sometimes post, admins added a filtering system to the message board which would replace restricted words with some type of alternative.
For example, the word “crap” might become “crud.” It didn’t take people long to figure out that you could get around this filter simply by altering the original word somehow, like changing “crap” to “c-r-a-p” or “krap” or “crrrap.” it was soon obvious that these filtering systems could never possibly cover every variation because people would just keep inventing new ones, and so leet was born.
In the most generic explanation, leet is merely replacing certain letters of the alphabet with numbers that bear a slight resemblance. l becomes 1, e becomes 3, t becomes 7, and so on… leet becomes 1337.
In a not so generic explanation, leet is also a play on words. The word leet itself is actually a shorter, easier way of saying the word “elite” which the dictionary defines as: the best or most skilled members of a group.
An odd thing about the internet is that when certain trends catch on, they seem to spread on a massive scale. Leet is one of those trends that just wouldn’t die; instead it grew and is still growing to this very day. Another popular trend to spread was aybabtu (all your base are belong to us) which is just one horribly translated line out of many from the video game “Zero Wing.” Then there was “Star Wars Kid” where a home video of some kid swinging a pole around was uploaded to the internet and altered to make it look like he was swinging a light saber. Nobody knows why these things spread like plagues but they each share a unique taste in humor. Anyway, back on topic, Every True Hacker Knows Leet.
Given below is a simple translation table to cover some common transitions and words. Please bear in mind that the syntax may vary:
| A = @ B = |3 C = ( D = |) E = 3 F = |= G = 6 H = |-| I = | J = _| K = |( L = |_ M = /\/\ N = /\/ O = 0 P = |* Q = 0, R = |2 S = $ T = 7 U = |_| V = \/ W = \/\/ X = )( Y = ‘/ Z = 2 | a = 4 b = 8 c = © d = |> e = 3 f = # g = 9 h = h i = | j = j k = |< l = 1 m = m n = n p = |* q = 0. r = ® s = 5 t = + u = 00 v = \/ w = \/\/ x = >< y = j z = 2 | at = @ ck = x0r the = teh you = j00 or u own = pwn ck = x0r programs = progz god = r00t fool = f00 heart/love = <3 what’s up = sup that = dat look at = peep kill = frag sweet = schweet sleep = reboot greater than = > newbie = n00b no = noes woo hoo = w00t why = y be = b are = r dude = d00d fear = ph34r and = & super = uber | blah/me = meh yo = j0 rock = r0xx0r hacker = h4x0r cool = k3wl software = warez computer = pu73r chick = chix0r good = teh win bad = teh lose loser = l4m3r aol = uh, 14m3r money = monies bye = bai kick = punt porn = pr0n skill = m4d 5killz hello = ping robot = b0t naked = n3k3d what = wut whatever = wutev cool = c00 to/two = 2 with = wit sex = cyb3r |
Typos are encouraged; in fact, an urban legend floating around the internet states that it deosn’t mttaer waht oredr the lteters in a wrod are, so lnog as teh frist and lsat ltteer are at teh crroect pclae. teh rset can be a taotl mses and yuo can uslauly siltl raed it wothuit any porbelm. of course, if you experiment with that you’ll soon find that it isn’t always true, but still interesting.
Note: Typing in various caps and multicolored text is not 1337.
Just because you know how to speak leet is no excuse to speak it all of the damn time. It is funny when used appropriately, but otherwise completely annoying. Leet should only be used when you’re feeling powerful and/or energetic. There are also many different flavors of leet: it can be used lightly (a few leet characters), or heavily (practically all leet characters).
Let’s practice a few leet sentences:
English: i didn’t really care for that movie.
Leet: dat dot mov wuz teh lose!
English: wow, i won.
Leet: omgz (oh my godz) lolz!! i pwned j00r @$$!
English: i am learning how to become an elite hacker.
Leet: i 4/\/\ 134|2/\/i/\/9 |-|0\/\/ 2 83c0m3 4 1337 h4x0r, roffle-mayo.
English: sigh, what in the world is that supposed to be?
Leet: *sighs* wtf (what the f—) b dat f00?
English: i’m tired.
Leet: i’m 80u7 2 m4k3 1ik3 ie (internet explorer) & cr45h. /m3h y4wn5
Hopefully you’ve got a pretty good idea by now of how leet is used; it’s not an entirely complex language. As with any language, the more you’re subjected to it the more it will sink in.
Sunday, March 20, 2011
Google Search Tricks:
Well let me tell You what actually google tricks mean. Google tricks/google tips, does not mean hacking google, Using the below Google operators, we can get the desired google result very quickly. Well we can name this as hidden google secrets or Advanced google searching. .
Google Trick -1 :- GOOGLE OPERATOR
Type the following highlited words in google search box.
Google has several google operators that can help you find specific information, specific websites or inquire about the indexing of your own site, below you will find the most important ones:
Click on the example google trick, and You will be redirected to google.
define: – This google operator will find definitions for a certain term or word over the Internet. Very useful when you come across a strange word when writing a post. I use this as a google dictionary. example : (define computer)
info: – The google info operator will list the sets of information that Google has from a specific website (i.e. info:http://hack2007.50webs.com)
site: – This google operator can be used to see the number of indexed pages on your site (i.e.site:www.hack2007.50webs.com). Alternative it can also be used to search for information inside a specific site or class of sites.
link: – This google link operator allows you to find backlinks pointing to your site. Unfortunately the count is not updated frequently and not all backlinks are shown
allinurl: – Using this Google operator will limit the search to results that contain the desired keywords on the URL structure. (i.e. allinurl:dailyblogtips)
fileformat: – Useful Google operator for finding specific file formats. Sometimes you know that the information you are looking for is likely to be contained in a PDF document or on a PowerPoint presentation, for instance. (i.e. “fileformat:.pdf market research” will search for PDF documents that contain the terms “market” and “research”)
Google trick -2 Top 10 Cool Google Search Tricks
well as we have gained enough knowledge regarding google operators, lets have a look at the following 10 cool google search tricks. Click on the example google trick, and You will be redirected to google.
1. Google trick to search different file formats (keyword filetype:doc)
2. Google trick to search educational resources (keyword site:.edu) example (computer site:.edu)
3. Finding the time of any location (time romania)
4. Finding the weather of any location (boston weather)
5. Tracking commentary of live events (Olympic games Beijing 2008)
6. Using Google as a calculator (9 * 10)(143+234)(119-8)
7. Converting currencies (1 USD in INR)(10 US Dollars in Indian Rupee)
8. Find how many teaspoons are in a quarter cup (quarter cup in teaspoons)
9. how many seconds there are in a year (seconds in a year)
10. Tracking stocks (stocks:MSFT)
11. Finding faces (add imgtype=face to the URL)
google trick -3 Top Essential Google Search shortcuts
#1: Get Local Weather
Type: “weather [city name or zip/postal code]” Example: “weather 500054″ or “weather boston”
#2: Check Flight Status
Google automagically pulls flight data from FlightStats.com. All you have to do is enter the flight number. Type: [flight name and/or number] Example: “bc254″ or “newyork21″
#3: Convert Distances
Type: “[value] [first distance unit] to [second distance unit]” Example: “100 kilometers to miles”
#4: Find a Phone Number
Find a Person:
Type: “[person’s name], [city or zip/postal code]” Example: “john smith, london”
Find a Business/store:
Type: “[business name or type], [city or zip/postal code]” Example: “book store, boston”
Google trick -4 :Google search trick for Rapidshare files search:
#1 site:rapidshare.com inurl:users “*”
#2 site:rapidshare.de inurl:users “*”
#3 site:rapidshare.com inurl:files “*”
#4 site:rapidshare.de inurl:files “*”
#5 site:rapidshare.com inurl:users (pass|password)
#6 site:rapidshare.de inurl:users (pass|password)
Suppose u need some info on ebooks. Then u can try following keyword to see all rapidshare folders having any hacking related thing in it
site:rapidshare.com inurl:users “ebooks”
Well let me tell You what actually google tricks mean. Google tricks/google tips, does not mean hacking google, Using the below Google operators, we can get the desired google result very quickly. Well we can name this as hidden google secrets or Advanced google searching. .
Google Trick -1 :- GOOGLE OPERATOR
Type the following highlited words in google search box.
Google has several google operators that can help you find specific information, specific websites or inquire about the indexing of your own site, below you will find the most important ones:
Click on the example google trick, and You will be redirected to google.
define: – This google operator will find definitions for a certain term or word over the Internet. Very useful when you come across a strange word when writing a post. I use this as a google dictionary. example : (define computer)
info: – The google info operator will list the sets of information that Google has from a specific website (i.e. info:http://hack2007.50webs.com)
site: – This google operator can be used to see the number of indexed pages on your site (i.e.site:www.hack2007.50webs.com). Alternative it can also be used to search for information inside a specific site or class of sites.
link: – This google link operator allows you to find backlinks pointing to your site. Unfortunately the count is not updated frequently and not all backlinks are shown
allinurl: – Using this Google operator will limit the search to results that contain the desired keywords on the URL structure. (i.e. allinurl:dailyblogtips)
fileformat: – Useful Google operator for finding specific file formats. Sometimes you know that the information you are looking for is likely to be contained in a PDF document or on a PowerPoint presentation, for instance. (i.e. “fileformat:.pdf market research” will search for PDF documents that contain the terms “market” and “research”)
Google trick -2 Top 10 Cool Google Search Tricks
well as we have gained enough knowledge regarding google operators, lets have a look at the following 10 cool google search tricks. Click on the example google trick, and You will be redirected to google.
1. Google trick to search different file formats (keyword filetype:doc)
2. Google trick to search educational resources (keyword site:.edu) example (computer site:.edu)
3. Finding the time of any location (time romania)
4. Finding the weather of any location (boston weather)
5. Tracking commentary of live events (Olympic games Beijing 2008)
6. Using Google as a calculator (9 * 10)(143+234)(119-8)
7. Converting currencies (1 USD in INR)(10 US Dollars in Indian Rupee)
8. Find how many teaspoons are in a quarter cup (quarter cup in teaspoons)
9. how many seconds there are in a year (seconds in a year)
10. Tracking stocks (stocks:MSFT)
11. Finding faces (add imgtype=face to the URL)
google trick -3 Top Essential Google Search shortcuts
#1: Get Local Weather
Type: “weather [city name or zip/postal code]” Example: “weather 500054″ or “weather boston”
#2: Check Flight Status
Google automagically pulls flight data from FlightStats.com. All you have to do is enter the flight number. Type: [flight name and/or number] Example: “bc254″ or “newyork21″
#3: Convert Distances
Type: “[value] [first distance unit] to [second distance unit]” Example: “100 kilometers to miles”
#4: Find a Phone Number
Find a Person:
Type: “[person’s name], [city or zip/postal code]” Example: “john smith, london”
Find a Business/store:
Type: “[business name or type], [city or zip/postal code]” Example: “book store, boston”
Google trick -4 :Google search trick for Rapidshare files search:
#1 site:rapidshare.com inurl:users “*”
#2 site:rapidshare.de inurl:users “*”
#3 site:rapidshare.com inurl:files “*”
#4 site:rapidshare.de inurl:files “*”
#5 site:rapidshare.com inurl:users (pass|password)
#6 site:rapidshare.de inurl:users (pass|password)
Suppose u need some info on ebooks. Then u can try following keyword to see all rapidshare folders having any hacking related thing in it
site:rapidshare.com inurl:users “ebooks”
Wednesday, March 16, 2011
password hacking Techiques
Different ways of password cracking .
Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.Most passwords can be cracked by using following techniques :
1) Hashing :-
Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even ‘well-chosen’ passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.
Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.
2) Guessing :-
Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user’s personal information.
Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:
* blank (none)
* the word “password”, “passcode”, “admin” and their derivatives
* the user’s name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet’s name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard — qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on….
In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.
Check Your Password Strength
3) Default Passwords :-
A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications’ (both online and offline) default username-password pairs.
4) Brute Force :-
If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.
5) Phishing :-
This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on “enter” or “login” login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.
It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.
Thanks
by:
Yogesh Kumar Soni
Wednesday, February 16, 2011
IP ADDRESS
Have You Ever Tought with an IP address. You can Do Many of great things.
The IP address is stands for internet Protocol every computer which is connected to internet have its own ip address.
Which an IP address we Can track the location. of the user i.e. from where He Is calling from or the location of the user
Some Facts About IP Address:
Windows users can use it into command promt
and Unix users can use it in Terminal
any quires just ask here
The IP address is stands for internet Protocol every computer which is connected to internet have its own ip address.
Which an IP address we Can track the location. of the user i.e. from where He Is calling from or the location of the user
Some Facts About IP Address:
- Every Device Connected to Network that may be Printer, Scanner , or any server computer or Client computer all uses its own ip address.
- We can assume IP address as its Mobile Number by which we can call or manage that device
- IP addresses are, but they are usually stored in text files and displayed in human-readable notations, such as 172.16.254.1 (for IPv4), and 2001:db8:0:1234:0:567:8:1 (for IPv6).
- There are Two Versions of IP address IPV4 and IPv6.
- The IPV4 address is of 32 bits.
- The IPV6 address is of 32 to 128 bits. long
Assigning IP address:
- There are 2 ways by which IP address can be assigned
- Static and Dynamic way
- Static IP addresses are manually assigned to a computer by an administrator.
- Dynamic IP addresses are most frequently assigned on LANs and broadband networks by Dynamic Host Configuration Protocol (DHCP) servers.
- The UNIX Type OS are Best for managing IP address
- Some Commands for IP Address are:
- ipconfig ( for knowing ip address)
- ipconfig /all ( for knowing all ports devices ip address)
- netsh
- netstat ( for knowing from where to where data is transmitting)
- route
- lanstat
- ifstat
- iproute2
Windows users can use it into command promt
and Unix users can use it in Terminal
any quires just ask here
Tuesday, February 15, 2011
Make Free Calls From Pc to Mobile and Mobile To PC and Mobile to Mobile
Hello Friends,
In This Post I will Show you The tutorial and trick by which you can make free calls to pc to mobile and mobile to pc. and mobile to mobile devices
its very easy
you just need:
Requirements:
i will show you step by step procedure to make free calls:
If you Have Any Problem Please Post Here
In This Post I will Show you The tutorial and trick by which you can make free calls to pc to mobile and mobile to pc. and mobile to mobile devices
its very easy
you just need:
Requirements:
- A symbain mobile Phone .
- A working internet connection in mobile
- A working internet connection in pc
i will show you step by step procedure to make free calls:
- first just make a Gmail id
- download GTALK.
- Login in Gtalk and be online
- in mobile install fring application from Download link
- make sure your mobile is s60 or above series.
- Now Install Fring Application to your phone.
- Login There
- Become online
- Now All IS done Here You Can make Call From There To your PC and Vice Versa
- Its 100% free and working properly
- I have Personally tested.
If you Have Any Problem Please Post Here
Monday, February 14, 2011
Transfer Files Over Wi-fi
Hello Friends,
IF u Like To Transfer The files such as Presentations, documents even moives.
and suppose you have not available not any cross cable


IF u Don't have don't Worry Just Click on the above cable and see the description about this cable.
But Now Suppose You Are Visiting To your Friends House With Your Smart Laptop
and You have to Transfer The data Between to Your notebook (laptop) and your friends pc.
Than U can Simply do this with the Help of wi-fi. ,
which is already Present on Your Laptop.
Don't worry Every Laptop Have Build in on board wifi card is present.
But The Problem Is That you must need another wi-fi card in Your Friend's pc.
Don't worry if he don't have build-in wifi pc. you can purchage

This Type OF any Wifi USB Adepter from market .
and Now All Major Requriments is completed ,
Now You have to just make a ad-hoc network i.e. very easy..
and Ready to make Transfer Files Between Your Friend's pc to Your Laptop Easily.
and WIRELESS communication.
Now if You are Thinking about data transferring speed .
Don't worry about that . the normal wifi router can provide upto 54 mbps .data transfer speed wirelessly.
and if you are using 802.11 BGN
usb adepter like this than the transfer rate will be upto 300 mbps
That is Much Faster than cross over cable or other methods.
Enjoy ..
Any Questions. just ask me.
IF u Like To Transfer The files such as Presentations, documents even moives.
and suppose you have not available not any cross cable
IF u Don't have don't Worry Just Click on the above cable and see the description about this cable.
But Now Suppose You Are Visiting To your Friends House With Your Smart Laptop
and You have to Transfer The data Between to Your notebook (laptop) and your friends pc.
Than U can Simply do this with the Help of wi-fi. ,
which is already Present on Your Laptop.
Don't worry Every Laptop Have Build in on board wifi card is present.
But The Problem Is That you must need another wi-fi card in Your Friend's pc.
Don't worry if he don't have build-in wifi pc. you can purchage
This Type OF any Wifi USB Adepter from market .
and Now All Major Requriments is completed ,
Now You have to just make a ad-hoc network i.e. very easy..
and Ready to make Transfer Files Between Your Friend's pc to Your Laptop Easily.
and WIRELESS communication.
Now if You are Thinking about data transferring speed .
Don't worry about that . the normal wifi router can provide upto 54 mbps .data transfer speed wirelessly.
and if you are using 802.11 BGN
That is Much Faster than cross over cable or other methods.
Enjoy ..
Any Questions. just ask me.
Hello Friends : Any Questions Just ask Here
Hello Friends,
This Post IS About Your Questions,,
I Will Be Very Happy To Answer Your Questions. IF You have Any OF New Ideas, about To disgusting. Just Ask Here in The Bottom Post Comments Section .
You Can Ask Any Type Of Your Technical Queries. About Any Programming language Problem.
Or Any Some Creating Thing Which IS running IN Your Mind .
Just Ask Here. And Make A Grateful Discuss Point . Here
..
Begin Now...


This Post IS About Your Questions,,
I Will Be Very Happy To Answer Your Questions. IF You have Any OF New Ideas, about To disgusting. Just Ask Here in The Bottom Post Comments Section .
You Can Ask Any Type Of Your Technical Queries. About Any Programming language Problem.
Or Any Some Creating Thing Which IS running IN Your Mind .
Just Ask Here. And Make A Grateful Discuss Point . Here
..
Begin Now...
Thursday, February 3, 2011
About Android
Now Days A Term Comes In the Market Named "ANDROID"
Android Is Just A Operating System Specially Developed For Mobile Devices. Initially it is Developed by Android Inc.,
after the Creation of android operating system the Google has brought it in 2005.
Now We Discuss Some Key Terms About this:
ANDROID LOGO:
ABOUT ANDROID 2.3:
For More Details Just Visit the android official Website: Visit ANDROID Webiste
_____________________________________________________________________
Android Is Just A Operating System Specially Developed For Mobile Devices. Initially it is Developed by Android Inc.,
after the Creation of android operating system the Google has brought it in 2005.
Now We Discuss Some Key Terms About this:
- android is just simillier to Linux or Unix Systems.
- It is Just Developed by modifying the linux karnal.
- It is Open Source Project That is It comes Under GNU Open System Project
- We Can Compare This Operating System With Nokia Symbain Operating System
- But This Operating System Has No Limitations.
- any Application Can Use Any OF the Mobile Hardware
- The Graphics, Multimedia And the GUI i.e. Graphical User Interface In This Operating System Is Provided Very Much Quite Good.
- This O.S. Supports GPS , WIFI , EDGE ,3G , similar various Types Of Fuctions
- We Can Check Mails , More Easily.
- Android has a large community of developers writing application programs ("apps") that extend the functionality of the devices.
- It Supports Java Files and the Codes Are Based On Linux
ANDROID LOGO:
ABOUT ANDROID 2.3:
For More Details Just Visit the android official Website: Visit ANDROID Webiste
_____________________________________________________________________
Monday, January 24, 2011
Keyloggers
Keylogges are as the spy ..
first we see the definition of keylogger
we can assume a keyloggers as a program which is run in background of computer System. and Record all the Keyboard Activities of Our System,
ac
Some Hackers Use keyloggers to get password of other users , and for monitoring vicitim's activities.
So We can Say Keylogger Is a Program Which Is Used by Hackers as a Torjan
Actully the hackers Install remotely or by doing some social engineering to installing the keyloggers .into vicitm's system
It is A very Important u Can Download It from
http://www.keyogger.in
or u Can use any browsers like google to find More Info About Keyloggers.
first we see the definition of keylogger
we can assume a keyloggers as a program which is run in background of computer System. and Record all the Keyboard Activities of Our System,
ac
Some Hackers Use keyloggers to get password of other users , and for monitoring vicitim's activities.
So We can Say Keylogger Is a Program Which Is Used by Hackers as a Torjan
Actully the hackers Install remotely or by doing some social engineering to installing the keyloggers .into vicitm's system
It is A very Important u Can Download It from
http://www.keyogger.in
or u Can use any browsers like google to find More Info About Keyloggers.
Introduction Wireless Networks, and wifi Routers
Hello Friends ,
This Is About Wireless Neworks . Wireless Networks Are Known As Wifi. In Market Various Types Of Wifi Routers are available.
The Major Catagroies OF wifi Routes is
wifi B/G/N
I.E. 802.11 b ,g, n
the 802.11 n is the latest routers which data transfer speed is upto 300 mbps.
this can be used for data transfers as well as modem use for netwoks.
This Is About Wireless Neworks . Wireless Networks Are Known As Wifi. In Market Various Types Of Wifi Routers are available.
The Major Catagroies OF wifi Routes is
wifi B/G/N
I.E. 802.11 b ,g, n
the 802.11 n is the latest routers which data transfer speed is upto 300 mbps.
this can be used for data transfers as well as modem use for netwoks.
Subscribe to:
Comments (Atom)