Click hereChildren:, Grades ,
Espionage,
Juvenile ,literature,
Children's 9-12 - Crafts , Hobbies,
Juvenile ,Nonfiction,
Crafts & Hobbies ,- General,
Juvenile Nonfiction, / Crafts & Hobbies,
Animals,
Hobbies, quizzes & games ,(Children's/YA),
Interactive & activity books & packs,
People & places, (Children's/YA),
Animals - General,
Novelty & Activity Books,

dance ,class,ambala,anilkumar,webs,searchstops,www,2011,2012,best dance site 2011,best dancesite2012,bestdancesite2013,danceing,bboying,bgirling,kendriya,vidyalaya,ghandhi,ji,kutta,kamina,salaindian,languages,sirf tum,sirf mai,amitabh,bacchan,Anil Kumar bturkiya,2011 fashion,2010 fashion,accesories,Accessibility,accessories,Adidas AG,Al,alex perry,Alexander McQueen,Alford,American European Latin Americandesigners,AnnaSui,apparel,architecture,
Area,Planning,andRenewal,Art,attitudes,Auctions,Australia,autumn,Awards,Babies,backstage,bad,Badinter,banarsi,BarcelonaFaWeek,Bardot,Bardotfashion,BarneysNewYork,BathingSuits,Beauty,beautyadvice,beautydirectory,beautyexpert,beautymagazine,beautytips,bench,benchflash,bestdenim,bestfashionmagazine,Bestjeansaround,bikini,Bill,blackdress,blank,Blog,blogging,BlogsandBlogging(Internet),blouse,body,boutique,bowie,Brazil,bridal,BruceCameron,Bundchen,CalvinKlein,Canadianfashionmagazine,candycouture,CareersandProfessions,casual,catwalk,catwalkrunway,CelebFashions,CelebGossip,Celebrities,Celebrity,Celebrity Fashion,Celebrity Fashions,Celebrity Gossip,Celebrity Hairstyles,Celebrity Photos,celebrity profiiles,
celebritytrends,CHANEL,channel,Charles,chic,ChildrenandYouth,childrens,China,Chloe,Chow,Christian,Christian Dior,Cindy CrawfordClark,clothes.,clothing,cnet,collections,collette dinnigan,combats,competitions,Coney Island (NYC),confessions,contact topman,cosmetics,Cosmetics and Toiletries,Council of Fashion Designers of America,couture,crafted,creative,creativecommunity,creativenetwork,creativeprofessional,creative professionals,Credits,crops,Cunningham,Customs,Cutrone,dance,david,Deaths (Obituaries),Decorations and HonorsDella Femina,denim,design,designer,designer accessories,designer bags,designer clothes,designer clothing,designer collections,designer fashion,designer handbags,designer profiles,designer shoes,designers,designers collections,Diana,diesel,Dior,dirty smart,discount mens clothes,Divorce,
DKNY,Dolce &Gabbana,DonnaKaran,DoutzenKroes,dress,Dresses,drunknmunky,DVDs,edgy,eh,electronics,Elisabeth,Elle,Entertainment News,Etiquette and Manners,express post delivery,fabric,fabulous,facial,fall,Families and Family Life,fashion,Fashion Accessories,Fashion and Apparel,Fashion articles,fashion beauty catwalk photography,Fashion Blog,Fashion Blogger,Fashion Central,fashion clothes,fashion design,fashion designer,fashion designers,Fashion information,fashion magazine,fashion merchandising,fashion mode beauty,fashion models,fashion news,Fashion Pakistan,fashion photo galleries,fashion pictures,fashionreview,fashion shows,fashion television,
fashion television, the channel,fashion tips,fashion trends,fashion trends 2008,fashion tv,fashion tv france,fashion tv hot,fashion tv online,fashion tv satellite,fashion videos,Fashion Week,fashionweeks,fashionistas,fashionmagazine.com,fashions,fashiontelevision,fashiontv,fashionz,Fenchurch,Fendi,Ferguson,Fine Jewelry.,firetrap,footwear,Fragrance,free stuff,FT,FT online,ftv,ftvfashion,furnitureg-star,g-starraw,gadgetblog,gadgetnews,Gaga,gallery,Gap,garments,Gaultier,Gerald,Giles,Giorgio Armani,girls clothes,Gisele,Givenchy,Gore,
Gossip,Gowanus Canal (NYC),Greenfield,Grief (Emotions),Gucci,Guess,H&M,hair,
hairstyle,Hamburg (Germany),Hats and Caps,haute couture,health,Helena Christensen,Helmut Lang,henleys,Henry,high fashion,high street,high street clothing,highstreet,hip,Hollywood Fashion,Hollywood gossip,Hollywood Rumors,Hollywood Stars,home,hoodies,horoscopes,Hot,hot stuff,HQ,Iman,Imber,indian,industry,iphone,
Issey,jackets,Japan,Jean Paul,Jean Paul Gaultier,jeans,Jeff,Jerry,Jil,Jil Sander,Joanna,John Galliano,Jovovich,jumpers,just,kameez,Karl Lagerfeld,kate moss,kate moss collection,Kaus,Kawakubo,Kelly,kidsclothes,knits,knitwear,Kramer,kurta,L'Oreal,LA,labels,Lacroix,ladies fashion,ladies fashion clothes,ladies fashions,Lady,latest catwalk pictures,latest fashion,latest mens clothing,lbd,Life and style,lifestyle,Lincoln Center for the Performing Arts,lingerie,little black dress,Live Streaming,London,London (England),look,
Lott,Louis Vuitton,Love (Emotion),Luca Luca,luxury,MAC,
Madrid Fashion Week,magazine,magazines,make-up,makeover,makeup,
makeupartists,makeuptips,MalSirrah,Manhattan(NYC),Marilyn,Marriages,MartinMargiela,Men and Boys,men women's fashion,Men's Clothing,Men's Shoes,Menkes,mens,mens clothes,mens clothing,mens denim,mens fashion,mens fashion gifts,mens gift ideas,mensjackets,mens jeans,mens shoes,mens shorts,mens socks,mens suits,mens underwear,menswear,Merchandising,Message Boards,Michael,Mickey,Milan,Minter,
miso,miss sixty,Miyake,Mobile Content,moda,mode,modeling,Models,Models (Professional),
monster,movies,nails,net-a-porter,net-a-porter.com,netaporter,new fashion trends,New York,
New York Fashion,new zealand fashion,news,Next,Next Directory,Next Electrics,Next Flowers,next.co.uk,NikasNikeInc,numberonefashionmagazine,nz,oasis,oasisstores,oasis-stores,oasis.co.uk,oasis.com,oasis.net,ofofficial,Oliver,onlie fashion,online shopping,online store,Oprah,Pakistan,Pakistan Fashion,Pakistan Fashion shows,Pakistan shows,Pakistani,Pakistani Designers,Pakistani Fashion,Pakistani FashionDesigners,Pakistani Models,Paparazzi,Paris,party,partydress,partydresses,PhotoGalleries,photographers,photography,Photos,picture,pictures,Pixie,Pixie dress,Pixie Lott,podcast,Prada,pret-a-porter,Prince of Wales,Princess of Wales,Pucci,Race,ready towear,ready-to-wear,Rei,Republic,republic shop,Reviews,romance,Rosa Cha,rtw,Runway,runway shows,Saint Laurent,
salon,Sander,Sao Paolo,Sarah,sari,sass & bide,savvy,Scandal,Separations andAnnulments,
sex,
sexy,
shalwar,
shirts,
shoes,
Shop,
Shop online,
shopaholic,
Shopping,
Shopping and Retail,
short,
shorts,
shows,
Showtimes,
Simone,
size 10,
size 12,
size 14,
size 6,
size 8,
Skin,
skincare,
skirt,
skirts,
sleek,
Sneakers,
Soccer,
social network,
Sotheby''s,
soul cal,
soul cal deluxe,
soundtrack,
Spanish Latino fashion,
speechless,
sping,
sportswear,
spring,
spring 2010 fashion,
spring collection,
spring fashion,
spring summer collection,
spring summer fashion,
ss10 fashion,
star styles,
stores,
street fashion,
street style,
style,
stylemail,
subscription,
summer,
Suntan,
super model,
Superfund,
supermodels,
Suzy,
sweats,
swimwear,
Synopsis,
t-shirts,
Tank Tops,
tech blog,
technews,technology,teenclothes,teenfashion,teenstyle,teenvoguetelegraphfashiontextiles,threads,Tipper,Tokyo,TomFord,top,topmanaccount,topmancard,topmandelivery,topmangiftcard,topmanhelp,topmannews,topmanpressoffice,topmanrecruitment,topmanreturns,topmansale,topmanstores,topmanstudent,discount,topmantermsandconditions,tops,topshop,topshop.com,TorontoTrailers,trend,Trends,trendy,trousers,uk,undergarments,United States Politics and Government,Upper East Side (NYC),User Ratings,Victoria's Secret,Video,Viktor Rolf,vila,Vogue,Warehouse,Warehouse Clothes,Warehouse fashion,Waste Materials and Disposal,watch fashion tv,watch fashion tv online,Watches,Winfrey,winter,woman fashion,woman's fashion,Women and Girls,women fashion,women´s clothes,women´s clothing,women´s fashion,Women's Clothing,
women's fashion,Women's Handbags,Women's Shoes,womens,womens accessories,womens clothes,womens clothing,womens fashion,womens fashion clothing,womenswear,


women’s fashion magazine,World Cup (Soccer),www.oasis-stores.com,Yves,Yves Saint Laurent,prom clothing,going out clothes,clothes shopping,buy clothes,buy dress,Irish Fashion Ireland,beauty news,Indian Ethnic fashion,Indian Fashion,India Fashion,Fashion India,Ethnic fashion,Indian Garments,Indian Clothings,Indian Wedding garments,Wedding collections,Ethnic garment designs,Indian models,Indian actresses,Indian Actors,Bollywood actresses,Bollywood stars,Bollywood Gossip,Online garment store,b2C garment portalLove and Romance,Romantic lifestyles,Honeymoon resources,honeymoon planner,marriage, andhoneymoon,pregnancy,parenting and kids,bollywood,wedding,wedding dresses,
sexual,problems,indian,women,modellin,gagencies,Salwarkameez,GaghraCholi,Lachhas,sharara,Garment,Mumbai,Bombay,India,Model,Actress,Love,Parenting,Astrology,Asian,Designers.,toronto, fashion,canadian ,fashion ,designers,toronto ,designers,canada, fashion,,toronto ,fashion ,week,toronto,vintage,Definition,Synonyms,craze,fad ,Yantra: Dharmic Traditions, Sanskrit, Chakra, Vritti, Shatkona, Star of David, Hindu Symbols: Lingam, Aum, Kamandalu, Hindu Iconography, Yantra, Nandi, Tilaka, Kalasha, Trishula, Padma, Sri Yantra, Om ParvatSwastika, Shri Yantra, Karma,Hindu Symbols: Lingam, Aum, Kamandalu, Hindu Iconography, Yantra, Nandi, Tilaka, Kalasha, Trishula, Padma, Sri Yantra, Om Parvat ,Symbol (Hinduismus): Om, Swastika, Linga, Mandala, Mudra, Bindi, Yantra, Tilaka, Abhayamudra, (German Edition),Monument Indien: Taj Mahal, Yantra Mandir, Rock Garden, Porte de L'inde, Mausolée D'itimâd-Ud-Daulâ, Bibi Ka Maqbara, Sanskar Kendra, Raj Ghat (French Edition),Rajasthan: Désert Du Thar, Ârâvalli, Shekhawati, Bishnoï, Musique Rajasthanie, Yantra Mandir, Attentats de Jaipur, Rajput (French Edition) ,Matrix success. Yantra, Mandala, psychogram, mentogrammy in

Friday, January 28, 2011

Sunday, January 23, 2011

Friday, January 21, 2011

Thursday, January 13, 2011

Remedies How To protect Yourself ?




Web spoofing is a dangerous and nearly undetectable security attack that can be carried out on today’s Internet. Fortunately there are some protective measures you can take.

Short-term Solution

In the short run, the best defense is to follow a three-part strategy:

disable JavaScript in your browser so the attacker will be unable to hide the evidence of the attack;

make sure your browser’s location line is always visible;

pay attention to the URLs displayed on your browser’s location line, making sure they always point to the server you think you’re connected to.

This strategy will significantly lower the risk of attack, though you could still be victimized if you are not conscientious about watching the location line.

At present, JavaScript, ActiveX, and Java all tend to facilitate spoofing and other security attacks, so we recommend that you disable them. Doing so will cause you to lose some useful functionality, but you can recoup much of this loss by selectively turning on these features when you visit a trusted site that requires them.

Long-term Solution

We do not know of a fully satisfactory long-term solution to this problem.

Changing browsers so they always display the location line would help, although users would still have to be vigilant and know how to recognize rewritten URLs. This is an example of a “trusted path” technique, in the sense that the browser is able to display information for the user without possible interference by untrusted parties.

For pages that are not fetched via a secure connection, there is not much more that can be done.

For pages fetched via a secure connection, an improved secure-connection indicator could help. Rather than simply indicating a secure connection, browsers should clearly say who is at the other end of the connection. This information should be displayed in plain language, in a manner intelligible to novice users; it should say something like “Microsoft Inc.” rather than “www.microsoft.com.”

Every approach to this problem seems to rely on the vigilance of Web users. Whether we can realistically expect everyone to be vigilant all of the time is debatable.

Related Work

We did not invent the URL rewriting technique. Previously, URL rewriting has been used as a technique for providing useful services to people who have asked for them.

Existing services that use URL rewriting include The Anonymizer, written by Justin Boyan at Carnegie Mellon University, is a service that allows users to surf the Web without revealing their identities to the sites they visit. The Zippy filter, written by Henry Minsky, presents an amusing vision of the Web with Zippy-the-Pinhead sayings inserted at random.

Fred Cohen first described the use of URL rewriting as an attack technique. Though we did not invent URL rewriting, we believe we are the first to realize its full potential as one component of a security attack that includes the hiding of other clues about the origin of documents.

Acknowledgments

The URL-rewriting part of our demonstration program is based on Henry Minsky’s code for the Zippy filter. We are grateful to David Hopwood for useful discussions about spoofing attacks, and to Gary McGraw and Laura Felten for comments on drafts of this paper. Gary McGraw designed the figure.

For More Information

More information is available   turkiya786@gmail.com  or +919896382592 or +919728917585.






Jai Shree Raam

Completing the Illusion





The attack as described thus far is fairly effective, but it is not perfect. There is still some remaining context that can give the victim clues that the attack is going on. However, it is possible for the attacker to eliminate virtually all of the remaining clues of the attack’s existence.


Such evidence is not too hard to eliminate because browsers are very customizable. The ability of a Web page to control browser behavior is often desirable, but when the page is hostile it can be dangerous.

The Status Line

The status line is a single line of text at the bottom of the browser window that displays various messages, typically about the status of pending Web transfers.

The attack as described so far leaves two kinds of evidence on the status line. First, when the mouse is held over a Web link, the status line displays the URL the link points to. Thus, the victim might notice that a URL has been rewritten. Second, when a page is being fetched, the status line briefly displays the name of the server being contacted. Thus, the victim might notice that www.attacker.org is displayed when some other name was expected.

The attacker can cover up both of these cues by adding a JavaScript program to every rewritten page. Since JavaScript programs can write to the status line, and since it is possible to bind JavaScript actions to the relevant events, the attacker can arrange things so that the status line participates in the con game, always showing the victim what would have been on the status line in the real Web. This makes the spoofed context even more convincing.

The Location Line

The browser’s location line displays the URL of the page currently being shown. The victim can also type a URL into the location line, sending the browser to that URL. The attack as described so far causes a rewritten URL to appear in the location line, giving the victim a possible indication that an attack is in progress.

This clue can be hidden using JavaScript. A JavaScript program can hide the real location line and replace it by a fake location line that looks right and is in the expected place. The fake location line can show the URL the victim expects to see. The fake location line can also accept keyboard input, allowing the victim to type in URLs normally. The JavaScript program can rewrite typed-in URLs before they are accessed.

Viewing the Document Source

Popular browsers offer a menu item that allows the user to examine the HTML source for the currently displayed page. A user could possibly look for rewritten URLs in the HTML source, and could therefore spot the attack.

The attack can prevent this by using JavaScript to hide the browser’s menu bar, replacing it with a menu bar that looks just like the original. If the user chose “view document source” from the spoofed menu bar, the attacker would open a new window to display the original (non-rewritten) HTML source.

Viewing Document Information

A related clue is available if the victim chooses the browser’s “view document information” menu item. This will display information including the document’s URL. As above, this clue can be spoofed by replacing the browser’s menu bar. This leaves no remaining visible clues to give away the attack.

Tracing the Attacker

Some people have suggested that finding and punishing the attacker can deter this attack. It is true that the attacker’s server must reveal its location in order to carry out the attack, and that evidence of that location will almost certainly be available after an attack is detected.

Unfortunately, this will not help much in practice because attackers will break into the machine of some innocent person and launch the attack there. Stolen machines will be used in these attacks for the same reason most bank robbers make their getaways in stolen cars.

Demonstration

As a demonstration, we have implemented a working version of this attack, including all the tricks described above. The demonstration shows that the Web Spoofing attack would work in practice. Although we have showed the demonstration to many people, we have not made it available on the Web, since that would make it too easy for others to capture our demonstration and modify it to carry out real Web Spoofing attacks.





Jai Shree Raam

How the Attack Works Spoofing the Whole Web

Fig _1.1


You may think it is difficult for the attacker to spoof the entire World Wide Web, but it is not. The attacker need not store the entire contents of the Web. The whole Web is available on-line; the attacker’s server can just fetch a page from the real Web when it needs to provide a copy of the page on the false Web.




The key to this attack is for the attacker’s Web server to sit between the victim and the rest of the Web. This kind of arrangement is called a “man in the middle attack” in the security literature.


URL Rewriting

The attacker’s first trick is to rewrite all of the URLs on some Web page so that they point to the attacker’s server rather than to some real server. Assuming the attacker’s server is on the machine www.attacker.org, the attacker rewrites a URL by adding http://www.attacker.org to the front of the URL. For example, http://home.netscape.com becomes http://www.attacker.org/http://home.netscape.com. (The URL rewriting technique has been used for other reasons by several other Web sites, including the Anonymizer and the Zippy filter. See page 9 for details.)

Figure 1 shows what happens when the victim requests a page through one of the rewritten URLs. The victim’s browser requests the page from www.attacker.org, since the URL starts with http://www.attacker.org. The remainder of the URL tells the attacker’s server where on the Web to go to get the real document.


Figure 1: An example Web transaction during a Web spoofing attack. The victim requests a Web page. The following steps occur: (1) the victim’s browser requests the page from the attacker’s server; (2) the attacker’s server requests the page from the real server; (3) the real server provides the page to the attacker’s server; (4) the attacker’s server rewrites the page; (5) the attacker’s server provides the rewritten version to the victim.


Once the attacker’s server has fetched the real document needed to satisfy the request, the attacker rewrites all of the URLs in the document into the same special form by splicing http://www.attacker.org/ onto the front. Then the attacker’s server provides the rewritten page to the victim’s browser.

Since all of the URLs in the rewritten page now point to www.attacker.org, if the victim follows a link on the new page, the page will again be fetched through the attacker’s server. The victim remains trapped in the attacker’s false Web, and can follow links forever without leaving it.





Jai Shree Raam

Consequences





Since the attacker can observe or modify any data going from the victim to Web servers, as well as controlling all return traffic from Web servers to the victim, the attacker has many possibilities. These include surveillance and tampering.


Surveillance The attacker can passively watch the traffic, recording which pages the victim visits and the contents of those pages. When the victim fills out a form, the entered data is transmitted to a Web server, so the attacker can record that too, along with the response sent back by the server. Since most on-line commerce is done via forms, this means the attacker can observe any account numbers or passwords the victim enters.

As we will see below, the attacker can carry out surveillance even if the victim has a “secure” connection (usually via Secure Sockets Layer) to the server, that is, even if the victim’s browser shows the secure-connection icon (usually an image of a lock or a key).

Tampering The attacker is also free to modify any of the data traveling in either direction between the victim and the Web. The attacker can modify form data submitted by the victim. For example, if the victim is ordering a product on-line, the attacker can change the product number, the quantity, or the ship-to address.

The attacker can also modify the data returned by a Web server, for example by inserting misleading or offensive material in order to trick the victim or to cause antagonism between the victim and the server.











Jai Shree Raam

TCP and DNS Spoofing

Another class of spoofing attack, which we will not discuss here, tricks the user’s software into an inappropriate action by presenting misleading information to that software. Examples of such attacks include TCP spoofing, in which Internet packets are sent with forged return addresses, and DNS spoofing, in which the attacker forges information about which machine names correspond to which network addresses. These other spoofing attacks are well known, so we will not discuss them further.






Jai Shree Raam

Security-relevant Decisions






By “security-relevant decision,” we mean any decision a person makes that might lead to undesirable results such as a breach of privacy or unauthorized tampering with data. Deciding to divulge sensitive information, for example by typing in a password or account number, is one example of a security-relevant decision. Choosing to accept a downloaded document is a security-relevant decision, since in many cases a downloaded document is capable of containing malicious elements that harm the person receiving the document.

Even the decision to accept the accuracy of information displayed by your computer can be security-relevant. For example, if you decide to buy a stock based on information you get from an online stock ticker, you are trusting that the information provided by the ticker is correct. If somebody could present you with incorrect stock prices, they might cause you to engage in a transaction that you would not have otherwise made, and this could cost you money.

Context

A browser presents many types of context that users might rely on to make decisions. The text and pictures on a Web page might give some impression about where the page came from; for example, the presence of a corporate logo implies that the page originated at a certain corporation.

The appearance of an object might convey a certain impression; for example, neon green text on a purple background probably came from Wired magazine. You might think you’re dealing with a popup window when what you are seeing is really just a rectangle with a border and a color different from the surrounding parts of the screen. Particular graphical items like file-open dialog boxes are immediately recognized as having a certain purpose. Experienced Web users react to such cues in the same way that experienced drivers react to stop signs without reading them.

The names of objects can convey context. People often deduce what is in a file by its name. Is manual.doc the text of a user manual? (It might be another kind of document, or it might not be a document at all.) URLs are another example. Is MICR0S0FT.COM the address of a large software company? (For a while that address pointed to someone else entirely. By the way, the round symbols in MICR0S0FT here are the number zero, not the letter O.) Was dole96.org Bob Dole’s 1996 presidential campaign? (It was not; it pointed to a parody site.)

People often get context from the timing of events. If two things happen at the same time, you naturally think they are related. If you click over to your bank’s page and a username/password dialog box appears, you naturally assume that you should type the name and password that you use for the bank. If you click on a link and a document immediately starts downloading, you assume that the document came from the site whose link you clicked on. Either assumption could be wrong.

If you only see one browser window when an event occurs, you might not realize that the event was caused by another window hiding behind the visible one.

Modern user-interface designers spend their time trying to devise contextual cues that will guide people to behave appropriately, even if they do not explicitly notice the cues. While this is usually beneficial, it can become dangerous when people are accustomed to relying on context that is not always correct.



Jai Shree Raam

Spoofing Attacks








In a spoofing attack, the attacker creates misleading context in order to trick the victim into making an inappropriate security-relevant decision. A spoofing attack is like a con game: the attacker sets up a false but convincing world around the victim. The victim does something that would be appropriate if the false world were real. Unfortunately, activities that seem reasonable in the false world may have disastrous effects in the real world.


Spoofing attacks are possible in the physical world as well as the electronic one. For example, there have been several incidents in which criminals set up bogus automated-teller machines, typically in the public areas of shopping malls. The machines would accept ATM cards and ask the person to enter their PIN code. Once the machine had the victim’s PIN, it could either eat the card or “malfunction” and return the card. In either case, the criminals had enough information to copy the victim’s card and use the duplicate. In these attacks, people were fooled by the context they saw: the location of the machines, their size and weight, the way they were decorated, and the appearance of their electronic displays.

People using computer systems often make security-relevant decisions based on contextual cues they see. For example, you might decide to type in your bank account number because you believe you are visiting your bank’s Web page. This belief might arise because the page has a familiar look, because the bank’s URL appears in the browser’s location line, or for some other reason.

To appreciate the range and severity of possible spoofing attacks, we must look more deeply into two parts of the definition of spoofing: security-relevant decisions and context.










Jai Shree Raam

What Is Spoofing?? Have A Glimpse.....




Introduction


This Post describes an Internet security attack that could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today’s systems, endangering users of the most common Web browsers, including Netscape Navigator and Microsoft Internet Explorer.

Web spoofing allows an attacker to create a “shadow copy” of the entire World Wide Web. Accesses to the shadow Web are funneled through the attacker’s machine, allowing the attacker to monitor all of the victim’s activities including any passwords or account numbers the victim enters. The attacker can also cause false or misleading data to be sent to Web servers in the victim’s name, or to the victim in the name of any Web server. In short, the attacker observes and controls everything the victim does on the Web.

We have implemented a demonstration version of this attack.











Jai Shree Raam

When Hacking A server Importan things to remember....




First of all Thanks To All My Readers...........

Now whenever you hack a server make sure you can play the game of hide and seek with your IP

Remove all Your identification such as ......


1.mac
2.your ip
3.pc serial key platform serial
4.Dont use ow pc for this
5.And read my blogg daily more i will tell u later





Jai Shree Raam

Saturday, January 8, 2011

How To Trace Any Site Password And Username ??







/**
* This file has the following configurations: MySQL settings, Table Prefix,

* Secret Keys,  Language, and ABSPATH. You can find more information

* by visiting {@link http://f48c1be3.linkbucks.com/ /Editing_wp-config.php Editing

* wp-config.php} Codex page. You can get the MySQL settings from your web host.

*

* This file is used by the wp-config.php creation script during the

* installation. You don't have to use the web site, you can just copy this file

* to "wp-config.php" and fill in the values.

*

* @package WordPress

*/



// ** MySQL settings - You can get this info from your web host ** //

/** The name of the database for WordPress */

define('DB_NAME', 'database_name_here');



/** MySQL database username */

define('DB_USER', 'username_here');



/** MySQL database password */

define('DB_PASSWORD', 'password_here');



/** MySQL hostname */

define('DB_HOST', 'localhost');



/** Database Charset to use in creating database tables. */

define('DB_CHARSET', 'utf8');



/** The Database Collate type. Don't change this if in doubt. */

define('DB_COLLATE', '');



/**#@+

* Authentication Unique Keys and Salts.

*

* Change these to different unique phrases!

* You can generate these using the {@link https://api.wordpress.org/secret-key/1.1/salt/ WordPress.org secret-key service}

* You can change these at any point in time to invalidate all existing cookies. This will force all users to have to log in again.

*

* @since 2.6.0

*/

define('AUTH_KEY', 'put your unique phrase here');

define('SECURE_AUTH_KEY', 'put your unique phrase here');

define('LOGGED_IN_KEY', 'put your unique phrase here');

define('NONCE_KEY', 'put your unique phrase here');

define('AUTH_SALT', 'put your unique phrase here');

define('SECURE_AUTH_SALT', 'put your unique phrase here');

define('LOGGED_IN_SALT', 'put your unique phrase here');

define('NONCE_SALT', 'put your unique phrase here');



/**#@-*/



/**

* WordPress Database Table prefix.

*

* You can have multiple installations in one database if you give each a unique

* prefix. Only numbers, letters, and underscores please!

*/

$table_prefix = 'wp_';



/**

* WordPress Localized Language, defaults to English.

*

* Change this to localize WordPress. A corresponding MO file for the chosen

* language must be installed to wp-content/languages. For example, install

* de.mo to wp-content/languages and set WPLANG to 'de' to enable German

* language support.

*/

define ('WPLANG', '');



/**

* For developers: WordPress debugging mode.

*

* Change this to true to enable the display of notices during development.

* It is strongly recommended that plugin and theme developers use WP_DEBUG

* in their development environments.

*/

define('WP_DEBUG', false);



/* That's all, stop editing! Happy blogging. */



/** Absolute path to the WordPress directory. */

if ( !defined('ABSPATH') )

define('ABSPATH', dirname(__FILE__) . '/');



/** Sets up WordPress vars and included files. */

require_once(ABSPATH . 'wp-settings.php');









Jai Shree Raam

Friday, January 7, 2011

Become Next Model For Whole World Great Chance Just For You...



Click On the Image To Know More.........




Jai Shree Raam

Hide a file in Picture.





Copy any Image and file that you want to hide.


Now add original file into Rar format.

Open DOS and go to dir where you have placed your files.

Now Type this command

Copy /b image name. jpg + Orignal file .rar 2Nd image.jpg

Now exit and to open file use Winrar.






Jai Shree Raam

Thursday, January 6, 2011

Create a folder which u want to make invisible




First create a new folder somewhere on your hard drive


when you name it hold down "Alt" and press "0160" this will create an invisible space so it will appear as if it has no name.Then right click and select "Properties". Select the tab "customize" and select "change icon". Scroll along and you should see a few blank spaces. Click on any one and click ok.

choose the folder you want to protect. [Ex: c:myFolder]

2. Copy the following text

{645FF040-5081-101B-9F08-00AA002F954E} (copy with brackets)

3. Right click on your folder [Ex: c:myFolder] and then rename it as :

myFolder.{645FF040-5081-101B-9F08-00AA002F954E}

And when you double click on it nothing will be present in it and looks like a recycle bin and also u cannot view it,and for viewing it again do the reverse process below,



Reverse process :



1.Start->Run-> CMD



and press ENTER. after when you are in DOS Shell appeared type this :



c:>ren myFold~1.{64 myFolder

Open the Registry Editor.

2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop. Select WaitToKillAppTimeout and set the value to 1000.

3. Select the HungAppTimeout value and set it to 1000 as well.

4. Navigate to HKEY_USERS\.DEFAULT\Control Panel\Desktop. Set the WaitToKillAppTimeout and set the value to 1000. Select the HungAppTimeout \newline value and set it to 1000 as well.

5. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Contro l. Select the WaitToKillServiceTimeout value and set it to 1000.

6. Close the Registry Editor.

Automatically Killing Tasks on Shutdown

You know the drill. You start to shut down the computer, you wait a few moments, and then you see a dialog box asking if you want to kill an application or service that is running. Instead of prompting you, you can make Windows XP take care of the kill task automatically. Here's how:

1. Open the Registry Editor.

2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop.

3. Highlight the value AutoEndTasks and change the value to 1.

4. Close the Registry Editor.

Well thats about it... when you done all the steps you machine most run faster...without ANY errors!








Jai Shree Raam

Making an invisible folder





1. create a folder which u want to make invisible.




2. now type in cmd prompt-> "attrib +h +s "

(e.g-> "c:\>attrib +h +s c:\abc\xyz")



3. if u want to make it visible type in cmd prompt "attrib -h -s "

(e.g-> "c:\>attrib -h -s c:\abc\xyz")

If you want to hide a file that no one can see the file except you, here is the process.:-



1. Open a notepad and write down

@echo off

cls

attrib +r +h +s drive:\WRITE THE LOCATION OF FILE.file extension

exit

2. save it as bat file(e.g. hide.bat)

3.Run it



To show the hidden files:-



1.Open a notepad and write down

@echo off

cls

attrib -r -s -h drive:\WRITE THE LOCATION OF FILE.file extension

exit

2.Save it as bat file(e.g. show.bat)

3.Run it









Jai Shree Raam

Disabling the Boot Logo For Slow Connections



You can remove the boot logo that appears when you start Windows XP. This little tweak probably shaves only a few seconds off your boot time but seconds count if you are serious about trying to get Windows XP up and running as quickly as possible. The only negative is that if you remove the boot logo, you will also not see any boot messages, such as check disk. (But if you are not having problems with your computer, this isn't such a big deal.)


To remove the boot logo, follow these steps:

1. Select Start/Run, type msconfig, and click OK.

2. In the System Configuration Utility, click the BOOT.INI tab.

3. On the BOOT.INI tab, click the NOGUIBOOT check box option. Click OK.

Disabling Recent Documents History



Windows XP includes a feature that keeps track of all recent documents you have opened or used. The idea is that you can select Start/Recent Documents History and quickly reopen any document you have recently used. I use many documents each day and never use the feature myself. In my opinion, I can keep up with what I want to use without Windows XP doing it for me.

The bad thing about Recent Documents History is that Windows XP has to calculate what should be put there each time you boot Windows, which can slow things down. So, if you never use the Recent Documents History, it's a good idea to disable it. Here's how:

1. Open the Registry Editor (select Start/Run, type regedit, and click OK).

2. Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\ CurrentVersion\Policies\Explorer.

3. Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it once it is created.

4. Set the Data Value to 1 to enable the restriction.

5. Click OK and close the Registry Editor. You'll need to restart the computer for the change to take effect.







Jai Shree Raam

YOU TUBE TIPS AND TRICKS DOWNLOAD FREE VIDEO WITHOUT ANY SOFTWARE

Hello,




I’m gonna share something related to the tricks which allow you to get video without using any kind of application and website for you to download it.

What you have to do is to do some tricks and file search for you to get what you want.



Okay let start!

This about files cache in mozzila firefox, which automatically saves the files in a website when you are surfing.

What we are going to do is to find the particular folder which contain the Internet Temporary files of Mozilla.

So first you must enable the settings for you to view the hidden files.

go to the top of the folder then select tools, folder options, view then select show hidden files.

Okay so how can you get a video on youtube?

First clear your history in Mozilla which contains cache, cookies, site preferences and etc.

After that go to youtube then search a video then watch it.. then if you liked it and you want to download the video the next thing your going to do is open a new tab then type about:cache

Then go to Disk cache device then select List Cache Entries.

Then press ctrl f [find] then type “get” for example it must be like this Http://www.youtube.com/results?search_query=getvideo+cache&aq=f

Then click it!

It will result like this!





Then copy the file on disk.

C:\Documents and Settings\User1\Local Settings\Application Data\Mozilla\Firefox\Profiles\75p9ko1a.default\Cache\8938A85Cd01 [this is the name of the video]

Then paste it into the address bar of a folder but don’t include red highlight text. Like this!



C:\Documents and Settings\User1\Local Settings\Application Data\Mozilla\Firefox\Profiles\75p9ko1a.default\Cache\

Then make sure that you have copy the file name of the video [8938A85Cd01]

Then press ctrl f then paste the name of the video.











Then copy it then paste it into a folder then rename it

It must be like this “test.flv”



Then watch it.. you can also convert it.









Jai Shree Raam

Use tinyurl to open blocked orkut







USE URL REDIRECTION TECHNIQUES To open a blocked website




Use redirection services like TinyURL which give a unique link to any site. Just make blocked sites like orkut.com be pointed by such a unique URL like that aof tinyurl.This works b’coz such redirection sites make the adress bar blank while loading.

For orkut.com i’ve  made a tiny url link

http://tinyurl.com/27mdb

by clicking which you’ll land in orkut you can make any and many for any site you like by visiting Tinyurl.Com homepage.

How do you log on now that you are a hidden user?

If you are running windows XP Professional you simply need to press CTRL-ALT-DEL twice, and the standard logon screen will be displayed. This has one pitfall - it will fail to work if a user is still currently logged in. If you are having trouble getting it to show, then reboot and press it twice before any users have logged in. (I have not tested this in Windows XP Home…Some people say that the standard logon screen won’t come up (maybe they didn’t get all of the windows updates?), if that happens boot into safe mode and edit the registry back to normal)









Jai Shree Raam

Hide your taskbar in an instant



Such a great application!. I was searching for such an application. When somebody comes in to poke into your affairs while you are on a PC, this is the right reply for them.


Freeware application Magic Boss Key hides your open windows (and desktop icons and taskbar, if you want) with a deft stroke of your keyboard or mouse. Magic Boss Key is sort of like the Windows-D/M keyboard shortcut except that it doesn’t just minimize the windows—it hides them entirely so that they don’t even show up in the taskbar. Hit the shortcut a second time and every window is restored to its previous state.

Download is free.

Download:Magic Boss Key










Jai Shree Raam

Vista Defragmentation-the fastest way.






The never-ending two-step defragmenting process of Vista can soon become a thing of the past. With certain tools, we were able to cut defragmentation time of 25 GBs of files with Vista Ultimate from 82 minutes to 6 minutes!!! That is defragmenting 10X faster than the built-in Vista defragmenter! The tutorial also works with Windows 2000 and XP.

This is absolutely Free

Tools required:  contig.exe and PowerDefragmenter.

Tutorial:

Click here to download Power Defragmenter and Contig. They are both bundled together here.



What you need to know about contig is that it is a bit different than the other defragment programs out there - it is a single-file defragmenter. It’s strong point is optimizing files that continuously become fragmented. If contig determines that the file can be optimized, it is then moved into the free spaces of the disk.

No installation is required. The next step is to run Power Defragmenter. Click next, and you will arrive at the screen below:

You may then select from the following options:

Defragment File(s): Allows you to defragment up to 4 files

Defragment Folder(s): Allows you to defragment up to 4 folders

Defragment Disk: Allows you to defragment a disk

PowerMode(TM) Disk Defragmentation: Defragments at a power equivalent to two consecutive defragmentations. Time does not necessarily double.

After you click next, just choose the desired drive, and you’re good to go.

When you are finished, the command prompt window will read “Windows Disk Defragmenter…”

This is pretty much the fastest defragment you can ever get with great effectiveness. If you’re looking for something that is similar to what Windows Defragment does but at a faster speed, I would suggest Auslogics Disk Defragmenter.



Update: This is the only down-side to contig. It does not really tell you how well the fragmentation process went but as you could see from the visuals above, it is quite effective. If you wait 3-5 minutes before closing the window after the process is finished, the following statistics will be displayed:

- Hard Drive Space

- Free Space

- Largest free space extent

- Percent File Fragmentation

Refer the original content here:  Vistawired










Jai Shree Raam

Wednesday, January 5, 2011

What is Antivirus System Pro ?

Antivirus System Pro is a fake security software developed by online scammers to deceive consumers by displaying bogus security alerts on their computer. Once this software gets its way on your computer, It will show you false exaggerated security alerts and make your worried about your computer’s security. These security alters are fake and in reality, those infections doesn’t exist on your computer.




This is a trick to get you extremely worried and hence coerce you into purchase the software for a license fee. Even If you pay these scammers, you are not going to get any protection and the money you paid will get wasted. This software looks like a genuine antivirus software but its just a replication of legitimate antivirus software and doesn’t have any capabilities to detect or remove this virus. This scam is very sophisticated and you would better pay money to a legitimate security company to get rid of this threat and prevent your computer from any future infections. Here is a screenshot of the software showing fake security alerts :











How Antivirus System Pro Harms Your Computer?

This software can cause enormous damage to your computer and turn your computer into a junk box if you don’t remove it from your computer. In most instances, you will not be able to find out how your computer got infected with this threat in the first place. However, you can be sure that you’ve visited a website which is distributing this malware and you don’t have the right protection on your computer. It is also very likely, that you’ve visited a malicious website trying to download something for ‘free’ and hence became of victim of this threat. Please don’t visit such sites If you want to prevent your computer from hackers and criminals.




Once this software is on your computer, your computer will crawl instead of running. This software will cause a big dent in running speed of your computer and show your lots of pop-ups every now and then. It is also very possible that It won’t let you run any software on your computer and block all the applications automatically. The bad guys who created this software want you to purchase this fake software and hence they will block other genuine security software on your system and won’t let your do anything.



This software will start scanning your computer without asking to do that. It will snow you numerous fake infections and tell you to purchase the full version of the software If you want to remove the infections. Please don’t buy this software as all the alerts this software shows are fake. You may even not be able to visit security related websites and search for a solution. Last, but not least, Antivirus System Pro will install a browser helper object which will redirect you to malicious websites automatically. So instead of visiting the page you want, you will visit a malicious page full of ads, pop-ups and viruses.




Jai Shree Raam

Download a Webpage Without Visiting It









Have you ever faced an error saying ‘Access Denied - The file may be in use’ or something like that, and the file which you are trying to delete is not deleted. It may be a Spyware, Malware, Ad-ware or any Trojan, that you want to delete but it can not be deleted. The usual reason for this is that a Software or Windows itself may be using i.e. running the file. If you want to delete the file, without using the complicated softwares, which you buy just to delete one file, then you are at the right place. In this article, you would be guided to delete such an ‘Undeletable’ file manually, or by using some Freeware softwares. There are several ways told in this article to remove these pesky undeletable files.


[edit]

Steps

Windows 95/98/ME

Make a note of the location of the file including the entire path to it. Follow the steps below to find the location of the files.

Click on Start, Find, Files and Folders

Type the name of the undeletable file in the Named or Search For box

Make sure the Look In box shows the correct drive letter

Click on Find Now or Search Now and let the computer find the file

Once the file is located, right-click on it and choose properties, make a note of the file location. Usually this is something similar to ‘C:\Windows\System32\undeletablefilesname.exe’

Close the search box

Locate a boot disk for your version of Windows. If you do not know how to create it, read the article regarding it first from the ‘Related wikiHows’.

Shut down and restart your computer with the boot disk in your floppy drive. The computer will boot to a DOS prompt that will look similar to ‘C:\’

Type the following command and press Enter to delete the file, substituting the phrase with the actual path and file name you discovered before.

Type del , leaving the brackets.

Remove the boot disk in the floppy drive and restart your computer. The file should now be deleted.

Windows XP

If you already know the path to the file, skip to the seventh step.

Click on Start, Search, All Files and Folders

Type the name of the undeletable file in the box shown

Make sure the Look In box shows the correct drive letter

Click Search and let the computer find the file

Once the file is located, right-click on it and choose properties, make a note of the file location. Usually this is something similar to ‘C:\Windows\System32\undeletablefilesname.exe’

Close the search box

Click on Start, Run, and type CMD and Press Enter to open a Command Prompt window

Leave the Command Prompt window open, but proceed to close all other open programs

Click on Start, Run and type TASKMGR.EXE and press Enter to start Task Manager

Click on the Processes tab, click on the process named Explorer.exe and click on End Process.

Minimize Task Manager but leave it open

Go back to the Command Prompt window and change to the directory where the file is located. To do this, use the CD command. You can follow the example.

Example: to change to the Windows\System32 directory you would enter this command and Press Enter, ‘cd \windows\system32′.

Use the DEL command to delete the offending file. Type DEL where is the file you wish to delete. Example: del undeletable.exe

Use ALT-TAB to go back to Task Manager

In Task Manager, click File, New Task and enter EXPLORER.EXE to restart the Windows shell.

Close Task Manager

Tips

If you want to delete the files automatically in Windows XP, download the software from the links in External Links.

If you are not aware of what you are doing, then ask a Computer Expert or a Professional to do it for you

Warnings

Do whatever is stated in this article, doing something else may cause your Operating System to crash, or corrupt. If worse, it may damage your whole computer.

Do not end up deleting Operating System files, which may cause your computer to crash or corrupt.

Things You’ll Need

A Microsoft Windows Operating System.

A Bootable CD (Compact Disk) or Floppy, to restart your computer in DOS (Disk Operating System), in Windows 95/98/ME.

An Internet connection to download the utilities, used in deleting the files.











Jai Shree Raam

Trust-no-exe -Lock down your computer









Want to prevent your own friends from accessing your files….try trust-no-exe




Windows only: Lock down your PC and prevent unauthorized executable files from running with freeware application Trust-No-Exe. As the computer’s administrator, you can set up a whitelist of clean executable files that you will allow to run and selectively block others. Once installed, Trust-No-Exe adds an entry to your Control Panel, from which you can tweak your whitelist and blacklist.  It’s not foolproof, but it could be a worthwhile deterrent. Trust-No-Exe is freeware, Windows only.










Jai Shree Raam

Check email using telnet





Its A very Simple Method For you and me dear Just Have a look........


1. Select Start in the bottom left corner of the screen, then select Run.


2. Once the Run window starts, type in cmd.


3. At the command prompt, type in telnet emailprovider.com 110 (where “emailprovider” is the name of the service you use for email).


4. Type USER yourusername (you may see what you type or not, and “yourusername” should be changed to whatever comes before the @ in your email address).


5. Then type in PASS yourpassword (if you can see what you type, you will see your password).



6. Type list.

7. You will see a list of items with labels like “1 607″ and “2 1323403.”



8. If you want to look at the message labeled 2 1323403, type retr 2. You can replace the 2 with any other number to view other messages.


9. If you want to delete message 1 607, type dele 1.


10. When you are done checking your email, type quit.






Learning new tricks can be a wonderful experience








Jai Shree Raam

Lock windows folders-without software










It is an awesome trick.Actually we are not locking the folder but just redirecting the folder to control panel when a user clicks on

the Icon.

Vaibhav Pandey,software engineer has deviced this method.

We are assuming that the name of the folder to be renamed is HideMePlease and it is located in D Drive, thereby making the path to the folder as Disc D:\

Step I

The trick is pretty simple, If you rename the folder ( in our case HideMePlease) to HideMePlease.{21EC2020-3AEA-1069-A2DD-08002B30309D}

When this renaming of the folder is done, windows by default makes it point to the control panel. Upon clicking on the folder after renaming, Control Panel is displayed.

To get your folder back to the original one, rename it back to HideMePlease.

In order to make the entire process simple and clean, i would suggest that you make two batch files (files ending with .bat extension). One file for hiding/locking the folder; the other for getting it back/unlocking it.

Step II

1.) The batch file for hiding the folder can be named as:

Hide.bat

2.) Open notepad/your favorite text editor and type in this

//THIS FILE SHOULD BE PLACED IN d:\

REN HideMePlease HideMePlease.{21EC2020-3AEA-1069-A2DD-08002B30309D}

Step III

1.) The batch file for unlocking the folder can be named as

Recover.bat

2.) Open notepad/your favorite text editor and type in this

//THIS FILE SHOULD BE PLACED IN D:\

REN HideMePlease.{21EC2020-3AEA-1069-A2DD-08002B30309D} HideMePlease

IT IS A VERY GOOD TRICK AND WOULD COME HANDY WHEN YOU HAVE TO HIDE YOUR PERSONAL INFO FROM OTHERS!








Jai Shree Raam

Monday, January 3, 2011

Hack private computer accounts






Download an ip-scanner that also checks for open ports, i recommend this one as the tutorial goes into most depth about it   http://34c740a9.ultrafiles.net/

1. Click start then run

2. Type “cmd” in the box that appears without the “”

3. A black screen should open

4. When this does type “ipconfig” without the “”

5. Depending on how many connections you have you should look for a section marked IP ADDRESS……..XXX.XXX.XXX.XXX although the X’s will be replaced with numbers

6. Keep this window open, and open Angry IP Scanner 2.21 a small box should open on the second line there is a section marked IP range, and next to them should be two boxes that have a [ 0 . 0 . 0 . 0 ] to [ 0 . 0 . 0 . 0 ].

7. in the first box place your IP ADRESS from the black CMD screen where you typed “ipconfig”, this is to make sure you get a fast connection by connecting to closer adresses.

8. in the next box take your IP ADDRESS, e.g 123.786.076.098 and add about 200 to it, which means if you have the example IP ADDRESS then in the second box you type 123.786.076.298.

9. then hit ctrl+O to open your options

10. in the top right corner is a box labeled display, inside the box click on the o next to “only open ports”, then click [0k & Save]

11. below the boxes where you typed your ip address is a section marked “Hostname” fill this box with whatever you like

12. below that is a scan ports box that should be checked, if it isn’t then check it

13. next to it is a button that looks like this […]1-100, click on this box the ports box should be highlighted, if not then highlight it and erase the 1-100

14. in place of the 1-100 cut and past “21,80″ without the “”

15. then click the start button, it has a red circle next to it

16. a range of blue circles will appear in the box, then they should turn green.

17. then see weather it is port 80 or 21, or both

18. if it is 80, click on it and hit ctrl+1

19. if it is 21, click on it and hit ctrl+2

20. they should open in your default browser or just explorer,

21. if any error messages appear then the computer is blocked by a firewall, just move on to the next address as it is next to impossible to crack these passwords.

Warnings


· What You Have Just Read Is HIGHLY ILLEGAL! if used improperly it may result in legal action being taken against you. I will not be held responsible for anything you may do whilst following this tutorial.


· To ensure that you do not perform anything illegal, these techniques should be used on a network that you OWN or have SIGNED PERMISSION to infiltrate in this manner.







Jai Shree Raam

Add a Website Link to the Start Menu






Adding items to the Start menu in Windows is very convenient when it comes to starting applications. The below steps will show you how to add URL links to the Start menu so you can quickly access Web sites without needing to open a browser first.


1. Right click on the Start button and select Explore

2. After Windows Explorer opens, in the right window pane, right click and select New / Shortcut

3. In the “Type the location of the item” enter the Web Site URL you want to create. An example would be (without quotes) “http://www.turkiya.blog.com“

4. Click Next

5. In the “Type a name for this shortcut:” enter a name for the link that you want to display in the Start menu.

6. Click Finish

7. Now click on the Start menu and you will see the new link you just created. Click on it and it will open up to the website.

Tip

· If you want all users on the Computer to have the link displayed in the Start menu, select “Explore All Users” in the first step after right clicking on the Start menu.








Jai Shree Raam

Log off Your Classmate’s Computer


Please Dont Use This Trick To Harm Someone !



1. Make sure you’re in a lab with numbered computer names. To check, go to your start menu, right click My Computer, and select properties.


2. Check the computer name. If it is something like school22, then check the computer next to you. If it says something like school21 or school23 then you are on the right track.

3. If the guy you want to attack is on computer number 17 then write down your computer name and instead of the number on your computer replace it with 17.

4. Go to Start, Accessories, Communications, Remote Desktop Connection

5. Then in the RDC (Remote Desktop Connection) Type in the computer name with the selected number in this case 17, so it should be school17.

6. Click Connect.

7. Type in your school username and password (if you have one). If you don’t want to get in trouble, type in the public school username.

8. It should say something like “The user is on the selected computer, connecting should log them off.” Click OK.

9. They should be logged off, but be careful. The computer logged off should say “this computer is locked by ” so unless it’s your friend who wouldn’t say anything, you should use the public username.

10. Now do what you want to the computer. Shut it down or just stay on it and piss them off.

TIPS

· Make sure your computer is using Windows XP or 2000.

· This will be easier if the computers have numbers on them, like 21 or 23 so then if you find the computer name just remove the number and add the number of the computer you wish to attack.

· Some computers may not have the desired computer name.

· Your school computers may not be networked together, which means they cannot be accessed through RDC. However, you will probably have networked computers, so don’t worry.

· If you stay on the computer, they can’t log on unless you get off.

· This will not work if your school does not permit remote desktop.










Jai Shree Raam

Get disposable logins-use bugmenot








You’re browsing the web and you click a link to an article on a site (let’s say nytimes.com) but instead of getting the article you get a screen asking you to login or register.


Go to bugmenot.com and get your problem solved…

Instructions

STEP 1: Make a note of the website address your are trying to access. For example:

http://www.nytimes.com/cnet/CNET_2100-1024_3-5567274.html

Or even just:

www.nytimes.com

STEP 2: Visit http://bugmenot.com

STEP 3: Enter the address from step 1 into the box and press the “Get Logins” button

STEP 4: You should now be presented with at least one username and password. Make a note of them.

STEP 5: Go back to the site you were originally trying to access in step 1 and proceed to login with the username and password you noted in the previous step.

With any luck you should be able to access your article now!

You can also get disposable email ID’s which can be thrown away after use….These email ID’s will expire automatically after 24 hours…This is an excellent way to combat spam(If the website is as sinciere as it appears to be!)










Jai Shree Raam

Turn your smartphone into a webcam




How is the idea. If don’t own a webcam,try using your phone as a webcam.It is  easy to setup with no extra cost…Take the webcam whereever you go plugin to your friends computer and show him the magic


Free, open source application Smart Cam turns your Symbian Series 60 smartphone into a wireless Bluetooth webcam. Just install the program in Windows (works in XP and Vista) and install the client to your smartphone (be sure to follow the readme in the \win\installer directory). When it’s all set up, your SmartCam works with Skype and most other video chat services, meaning that if your computer doesn’t have a webcam but you’ve got Bluetooth and a Symbian smartphone, you’re in luck. SmartCam is a free download, Windows only.

Try now: Smart webcam






Jai Shree Raam

10 Ways to Find a Lost Word .doc






Accidentally delete your work? Or save it somewhere and you can’t find it? Or the power went out? Before you start frantically emailing your professor, follow these steps:


1. Send out a search party.

In Windows, click Start, Search, All files and folders.

Type what you remember of the name or simply *.doc to get all your Word documents.

Select My Computer under Look in, and then under More advanced options, make sure Search hidden files and folders is checked.

Then hit Search.

2. Still no luck? Check your Recycle Bin.

Open it up and look through whatever files you’ve got. Did you find it? If so, right-click and choose Restore. Then if you’re not sure where it actually restored to, perform a search for it.

3. Or you can pray for AutoRecover.

Sometimes if Word crashes or closes unexpectedly, it’ll still save what you had. Re-open Word. If a Document Recovery task pane comes up, double-click your document to open it and immediately Save As.

4. Search for AutoRecover files, yourself.

In Word, go to Tools, then Options.

Under the File Locations tab, double-click AutoRecover files and make a note of that path location.

Click Cancel and Close.

Open up that folder in My Computer or Windows Explorer and search for any .asd files. (Or another way to do this would be to run a search similar to step one but with *.asd instead of *.doc)

5. If you have Word set to automatically back-up your documents, there’s still a chance here. Check the original folder for any .wbk file.

In Word, click File, then Open.

Navigate to the folder you think the file used to be located in and make sure All Files *.* is selected.

Is there any .wbk file there? Select it and see if it’s what you’re looking for.

6. Still no dice? Send out a *.wbk search party.

This step is the same as the first search party step, but now search for *.wbk files. You might find a few. Open them up, one by one.

7. Or search your temporary files.

Again, this is like step one. But search for *.TMP files this time. You’ll come up with a lot, so change the When was it modified? to the last week or so.

8. Or search even more of your temporary files.

Some temporary files like to be unique. Search for those with ~*.* this time.

9. Open up C:\Documents and Settings\*USERNAME*\Local Settings\Temp

This is a hidden folder, so you’ll probably have to use Windows Explorer. Hit Start, then All Programs.

Go to Accessories, then Windows Explorer. Navigate to that folder, where *USERNAME* is whatever your computer calls you. Do you see your document in that folder?

If none of those steps work, there are also programs that will help you recover deleted files. So this is the 10th and final option.

What’s important to understand here is that if you delete something, it doesn’t actually get deleted. Rather, it sits in a pile waiting to be overwritten. So the best way to recover a deleted file would be to try to find it right away –before it’s overwritten.

If you’d like to use a program, I’d recommend: Restoration, Undelete +, or Recuva. All are free.

I hope this helps. And remember: Jesus saves, but Buddha does incremental back-ups.

So, to turn on the automatic back-up feature in Word, check out Tools, Options, and the Save tab.











Jai Shree Raam

How You Can Recover lost word document








How will you deal with such a situation- Losing your 50 page word document, just through an accidental click of your mouse!


Don’t despair there are several ways out of this situation. Even though I could discover some of my lost word files by trial and error methods, nothing would match this list of ideas presented in the Web log Hack College website.

Some ideas order a mention in this post too:

· In Word, go to Tools, then Options. Under the File Locations tab, double-click Auto Recover files and make a note of that path location. Click Cancel and Close. Open up that folder in My Computer or Windows Explorer and search for any .ASD files.

· While a full-on backup system is your best bet for avoiding this situation in the future, you can also set Word to automatically back up your files (and if you already do, search for *.WBK files on your desktop for possible recovery, too.) If not, turn it on in the Tools menu’s Options dialog’s Save tab









Jai Shree Raam

Hacking a Computer





Crackers transform computers into zombies by using small programs that exploit weaknesses in a computer's operating system (OS). You might think that these crackers are cutting-edge Internet criminal masterminds, but in truth, many have little to no programming experience or knowledge. (Sometimes people call these crackers "script kiddies" because they are young and show no proficiency in writing script or code.) Investigators who monitor botnets say that the programs these crackers use are primitive and poorly programmed. Despite the ham-handed approach, these programs do what the crackers intended them to do -- convert computers into zombies.



In order to infect a computer, the cracker must first get the installation program to the victim. Crackers can do this through e-mail, peer-to-peer networks or even on a regular Web site. Most of the time, crackers disguise the malicious program with a name and file extension so that the victim thinks he's getting something entirely different. As users become savvier about Internet attacks, crackers find new ways to deliver their programs. Have you ever seen a pop-up ad that included a "No Thanks" button? Hopefully you didn't click on it -- those buttons are often just decoys. Instead of dismissing the annoying pop-up ad, they activate a download of malicious software.


Once the victim receives the program, he has to activate it. In most cases, the user thinks the program is something else. It might appear to be a picture file, an MPEG or some other recognizable file format. When the user chooses to run the program, nothing seems to happen. For some people, this raises alarm bells and they immediately follow up with a flurry of virus and spyware scanner activity. Unfortunately, some users simply think they received a bad file and leave it at that.






Meanwhile, the activated program attaches itself to an element of the user's operating system so that every time the user turns on his computer, the program becomes active. Crackers don't always use the same segment of an operating system's initializing sequence, which makes detection tricky for the average user.
 
 
 
The program either contains specific instructions to carry out a task at a particular time, or it allows the cracker to directly control the user's Internet activity. Many of these programs work over an Internet Relay Chat (IRC), and in fact there are botnet communities on IRC networks where fellow crackers can help one another out -- or attempt to steal another cracker's botnet.






Once a user's computer is compromised, the cracker pretty much has free reign to do whatever he likes. Most crackers try to stay below the radar of users' awareness. If a cracker alerts a user to his presence, the cracker risks losing a bot. For some crackers, this isn't much of a problem since some networks number in the hundreds of thousands of zombies.





In the next section, we'll look at the relationship between zombie computers and spam
 
 
 
 
 
 
 
 
Malware


Programs designed to harm or compromise a computer are called malware (as in malicious software). Malware includes a wide array of nasty batches of code that can wreak havoc to your computer, your network and even the Internet itself. Some common forms of malware that might turn your computer into a zombie include:



Computer viruses - programs that disable the victim's computer, either by corrupting necessary files or hogging the computer's resources

Worms - programs that spread from one machine to another, rapidly infecting hundreds of computers in a short time

Trojan horse - a program that claims to do one thing, but actually either damages the computer or opens a back door to your system

Rootkits - a collection of programs that permits administrator-level control of a computer; not necessarily malware on its own, crackers use rootkits to control computers and evade detection

Backdoors - methods of circumventing the normal operating-system procedures, allowing a cracker to access information on another computer

Key loggers - programs that record keystrokes made by a user, allowing crackers to discover passwords and login codes





Zombie computer code usually is part of a virus, worm or Trojan horse. Zombie computers often incorporate other kinds of malware as part of its processes.






Jai Shree Raam

Sunday, January 2, 2011

Spying




Click On The Image to Know More........





Jai Shree Raam

How to restrict user's to access shutdown button?




Solution: This tip is very interesting for home and some small office users, who wants to restrict user's ability to shutdown their computer. You can hide the Shutdown button from the Start menu using registry editor and also restrict access to shutdown, if a user clicks on Ctrl+Alt+Del.


Follow the given steps to hide system shutdown button from start menu:

· To use this feature, you will need to be logged into your computer with

        administrative rights.

· Click Start button and type regedit in Run option then press Enter for next.

· Here locate the location to:

· HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer

· Here in right side panel, right click to create a new DWORD value with name NoClose.

· Now assign number 1 to its value data box.

· Now close the registry editor and restart your computer after any changes to go into effect.

· But next time, if you want to unhide the shutdown button then simply change the value data box to 0 or delete this DWORD item.

· Again close the registry editor and restart your computer after any changes to go into effect.











Jai Shree Raam

How to add new destinations to "Send To" menu in windows XP?





Solution: In windows environment, the Send To command is used to transfer files from one location to different locations. By using this command, a user can quickly send his file between default destinations (default lists in Send To menu, for example Desktop, CD/DVD Drive, My Documents, Mail Recipient and Floppy Drive). These are the default Send To menu lists in windows XP. To increase the data transfer speed between different locations, you can add more new destination in Send To lists.










Follow the given steps to add new destinations to Send To lists:

First click on Start button and type sendto in Run option then press Ok button.



A window will appear with default Send To lists (Compressed (zipped) Folder, Desktop (create shortcut), Mail Recipient, My Documents).



Now using drag-and-drop technique (or using copy and paste method), you can move any program, folders and drives shortcuts to this folder.



Now you can verify, your new shortcut is created in Send To menu.



But next times, if you want to delete any destination, then open the Sent To folder and remove the destination shortcut.










Jai Shree Raam

How to start windows programs quickly with Run Command







The run option of Start menu is used to run a program or to open a document directly. If you do not know the exact location of the program or document then click on Start button to open Run and type the programs shortcut name to open it directly.


Run Commands

· appwiz.cpl -- Used to run Add/Remove wizard

· Calc --Calculator

· Cfgwiz32 --ISDN Configuration Wizard

· Charmap --Character Map

· Chkdisk --Repair damaged files

· Cleanmgr --Cleans up hard drives

· Clipbrd --Windows Clipboard viewer

· Control --Displays Control Panel

· Cmd --Opens a new Command Window

· Control mouse --Used to control mouse properties

· Dcomcnfg --DCOM user security

· Debug --Assembly language programming tool

· Defrag --Defragmentation tool

· Drwatson --Records programs crash & snapshots

· Dxdiag --DirectX Diagnostic Utility

· Explorer --Windows Explorer

· Fontview --Graphical font viewer

· Fsmgmt.msc -- Used to open shared folders

· Firewall.cpl  -- Used to configure windows firewall

· Ftp -ftp.exe program

· Hostname --Returns Computer's name

· Hdwwiz.cpl -- Used to run Add Hardware wizard

· Ipconfig --Displays IP configuration for all network adapters

· Logoff -- Used to logoff the computer

· MMC --Microsoft Management Console

· Msconfig --Configuration to edit startup files

· Mstsc -- Used to access remote desktop

· Mrc -- Malicious Software Removal Tool

· Msinfo32 --Microsoft System Information Utility

· Nbtstat --Displays stats and current connections using NetBIOS over TCP/IP

· Netstat --Displays all active network connections

· Nslookup--Returns your local DNS server

· Osk ---Used to access on screen keyboard

· Perfmon.msc -- Used to configure the performance of Monitor.

· Ping --Sends data to a specified host/IP

· Powercfg.cpl -- Used to configure power option

· Regedit --Registry Editor

· Regwiz -- Registration wizard

· Sfc /scannow -- System File Checker

· Sndrec32 --Sound Recorder

· Shutdown -- Used to shutdown the windows

· Spider -- Used to open spider solitaire card game

· Sfc / scannow -- Used to run system file checker utility.

· Sndvol32 --Volume control for soundcard

· Sysedit -- Edit system startup files

· Taskmgr --Task manager

· Telephon.cpl -- Used to configure modem options.

· Telnet --Telnet program

· Tracert --Traces and displays all paths required to reach an internet host

· Winchat -- Used to chat with Microsoft

· Wmplayer -- Used to run Windows Media player



                   †



· Wab -- Used to open Windows address Book.

· WinWord -- Used to open Microsoft word

· Winipcfg --Displays IP configuration

· Winver -- Used to check Windows Version

· Wupdmgr --Takes you to Microsoft Windows Update

· Write -- Used to open WordPad


















Jai Shree Raam

.......

Related Posts Plugin for WordPress, Blogger...