Mysterious Text !

0 comments

Mysterious Text !


You need: Microsoft Wor


Do the following :


1. Word, select Tools, Auto Correct. In the dialog box that appears, is the Replace text as you type box checked? If it isn't, check that box. Now you're ready to go.

2. Open a new document and type =rand().

3. Press Enter.

4. Watch the sequence of sentences appear, feel a chuckle coming on, and try to make sense of the repetitive text.

5. Experiment and change the amount of text by adding different digits, say, =rand(15,22) or =rand(50,50).

6.Watch the mysterious text appear again and feel more chuckles coming on.
Continue reading →

TRACE WEBSITES

0 comments
My Exclusive... another contribution to Computer Tricks !
Surfing Internet...
Type in the url and Hit Enter, that's it ?
But...
Have you ever thought what happens after that ?

Lets Trace n see what happens !
Do the following :
# Start >> Run
# Type cmd
# This will open the Command Prompt
# Type cd\
# Type tracert www.google.com
---------------------- Note ---------------------------
You can replace www.google.com with any website url.
Continue reading →

TEST YOUR INTERNET SPEED

0 comments
Well..
All of us have Internet Connections at our places... and pay for costly Hi-Speed Broadband Plans...
But never thought of checking the speed that you actually get?
Well I made an application to serve the purpose.....
About Application :
> Application Size = 208 KB
> It checks the Internet Speed from a Calcutta Server
> Downloads a 128 KB of Sample Data
> It calculates your inernet Speed for you
What you need to have :
> Windows 2000, NT, Xp, Vista or higher
> For Windows Xp, NT, 2000 .Net Framework 2.0 or higher (Vista has it preloaded)
> Internet Explorer Installed
Usage :
** Just Double Click to test the speed of your connection.
Enjoy...
Continue reading →

EARN MONEY BY CLICKING

0 comments
Continue reading →

NOKIA N SERIES GAMES PACK

0 comments

Nokia N-Series 80-1

80 applications, games and themes. Download them all! Turn your nokia n93 into n93 edition, download tomtom for your phone, a better web browser if you want…choose as you like.

CLICK HERE TO DOWNLOAD

Continue reading →

RAPIDSHARE DOWNLOAD TRICK

0 comments


Many peoples have lots of problem in downloading from Rapidshare.
this post is specially for my broadband user friends.

1. Click Start
2. Click run
3. In the run box type "cmd" (without quotes)and click OK
4. When the command prompt opens type the following and hit enter after every new line.

ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit

Explanation : As all Broadband users has dynamic ip they can simply change their ip address. by the commands mentioned above.


If you are bore of typing this much Command then simply make a batch file.
Creating a Batch file.
Open a notepad. type following in it.

@echo off
ipconfig /flushdns
ipconfig /release
ipconfig /renew
@echo on

Save this file with name you like and the extension as bat.
now simply execute this file.
Enjoy the Download.
Continue reading →

COOL COMPUTER TRICKS

0 comments
Continue reading →

DISABLED REMOTE REGISTRY

0 comments

The "Remote Registry" service enables remote users to alter registry setting on your computer. By default, the "Startup type" setting for the "Remote Registry" service may be set to "Automatic” or "Manual" which is a security risk for a single user (or) laptop computer user.
So, to make sure that only users on your computer can alter the process registry disable this "Remote Registry" service.

Here is how it can be completed:

1. Click Start and pick Control Panel from the Start Menu items

.Control Panel @ Star Menu items

Note:
If you find difficulty in accessing the Control Panel in your computer,


2. If your Control Panel is showing items in Classic View, find the icon named Administrative Tools and double click on it.

Alternatively if you are under Category View, click Performance and Maintenance and then Click Administrative Tools

3. Now double-click on Services applet which is used to start, stop and configure windows services on your computer. This open the service window listing all the windows services

Administrative Tools Services


4. From the right pane of the Services Window, find the service named Remote Registry
5. Double-click the "Remote Registry" service which shows the Remote Registry Properties for your Local computer.

Now, press the Stop button first to stop the started service and then pick Disabled from the drop down menu under 'Startup Type' and click Apply->OK.

6.Close the "Services" window and restart your computer for the changes to take effect.

That's it!! you have disabled the "Remote Registry" service on your computer to prevent unauthorized changes to the process registry.

Continue reading →

WINDOW 7 TRICKS AND SHORTCUTS

0 comments

Window Management

  • Win+Left Arrow and Win+Right Arrow: Dock a window to the left or right half of the screen.
  • Win+Shift+Left Arrow and Win+Shift+Right Arrow: Move a window from one monitor to another, keeping them in the same relative location to the monitor’s top-left origin.
  • Win+Up Arrow and Win+Down Arrow: Maximizes and restores/minimizes a window.
  • Win+Shift+Up Arrow and Win+Shift+Down Arrow: Maximizes and restores the vertical size of a window.
  • Win+Home: Minimize all the non-active background windows, keeping the window you’re using in its current position. (Press Win+Home again to restore the windows to their original locations.)
  • Win+(plus key) and Win+(minus key): Zoom in or out using Windows Magnifer.
  • Win+E: Opens Windows Explorer.
  • Win+U: Opens the Ease of Access Center.
  • Win+D: Show/hide the desktop.
  • Win+F: Opens the Search Results window.
  • Win+L: Locks the computer.
  • Win+B: Sets focus to the “Show hidden icons” button on the task bar.
  • Win+M: Minimizes all windows.
  • Win+Ctrl+F: Opens the Active Directory Find Computers dialog.

Taskbar

  • Win+Space: Use “Aero Peek” to see any gadgets or icons you’ve got on your desktop.
  • Win+R: Opens the Run dialog.
  • Win+T: Move the focus to the first taskbar. (Pressing again will cycle through them.)
  • Win+Shift+T: Move the focus to the last taskbar. (Pressing again will cycle through them.)
  • Ctrl+(mouse click on a single application icon in the task bar): Toggle through each of the open windows in order. The best example of this is Internet Explorer. If you have five tabs open in a single IE instance, holding the Ctrl key while repeatedly clicking on the single IE icon in the task bar will toggle through each of the five tabs in order.
  • Ctrl+Shift+(mouse click on an application icon in the task bar): Launch that application with full administrative rights. You can also use Ctrl+Shift+Enter for commands from the search bar for the same action.
  • Shift+(mouse click on an application icon in the task bar): Launch a new instance of the application rather than switching to the existing application. (You can also middle-click with the third mouse button or scroll wheel.)
  • Win+1 .. Win+5: Launch a new instance of the any of the first five icons on the task bar. (By the way, the icons can be reordered to suit your needs by simply dragging them around and can be pinned shortcuts or running applications.)
  • Shift+(right mouse click on an application icon in the task bar): Show the Window menu. (You get different menus depending on whether the application is running or has multiple instances open.

Windows Explorer

  • Ctrl+(mouse scroll wheel): Change the view/zoom in Windows Explorer. (This is the same as clicking the Views button or selecting one of the view options from the button’s dropdown list.)
  • Shift+(right mouse click on any folder or file): Displays an expanded context menu:
    image
    (The additional Open options only appear for folders but the “Copy as path” option appears for both folders and files.)
  • Alt+P: Show/hide the preview pane.

Miscellaneous

  • Win+P: Display the project options, which you can then use the arrow keys (or keep hitting Win+P) to switch to the different options.
    image
  • Win+X: Open the Windows Mobility Center.
  • Win+G: Bring gadgets to the top of the Z-order. (Sets the focus to a gadget.)
Continue reading →

window movie maker

0 comments
Windows Movie Maker. Windows 7 doesn’t include a movie editing tool – it’s been moved to the Windows Live Essentials package, along with Photo Gallery, Mail and Messenger. Unfortunately, Windows Live Movie Maker is currently still in an early beta that is missing most of the old feature set (we’re reworking the application), and so you might be feeling a little bereft of options. It goes without saying that we intend to have a better solution by the time we ship Windows 7, but in the meantime the best solution for us early adopters is to use Windows Movie Maker 2.6 (which is essentially the same as the most recent update to the Windows XP version). It’s missing the full set of effects and transitions from the Windows Vista version, and doesn’t support HD editing, but it’s pretty functional for the typical usage scenario of home movie editing.
Windows Movie Maker 2.6 is compatible with Windows 7.
Download Windows Movie Maker 2.6 from here:
http://microsoft.com/downloads/details.aspx?FamilyID=d6ba5972-328e-4df7-8f9d-068fc0f80cfc
Continue reading →

Windows 7 Secrets

0 comments

Windows 7 Secrets

The Channel 9 guy loves Windows 7!It’s great to see Windows 7 Beta finally released to the world! We're very proud of what has been accomplished over the last months; in many ways, it sets a new quality bar for a beta operating system release. Building on top of the Windows Vista foundation, Windows 7 adds a great deal of polish and refinement to both the user interface and the underlying architecture, while at the same time introducing many new features and improvements that support new hardware, give power users and casual users alike better tools to manage their digital lives, and enable new classes of application experience.

Over future blog entries, I’ll spend time drilling into some of those areas in more detail; of course, there are plenty of articles already out there that dissect Windows 7 in some depth, with the Windows SuperSite and Ars Technica providing notably comprehensive entries. I’d also like to draw particular attention to the series of Windows 7 interviews that Yochay Kiriaty has been posting on Channel 9, which give the inside scoop on the development of many of the most significant new features.

For now, though, I want to focus in on some of “secrets” of Windows 7: the many little tweaks and enhancements that we’ve made in this release that I’ve discovered and collated over the last few months of using Windows 7 across my home and work machines. These are the things that are too small to appear in any marketing document as “features”, but that you quickly miss when you switch to an older version of Windows. There are some who think that we’re arbitrarily hiding functionality to make Windows easy for casual users, but I’d argue that a great deal of effort has been put into this release to satisfy power users. In homage to those of us who enjoy discovering the nooks and crannies of a new operating system list, I’ve put together the longest blog post that I’ve ever written. If you’ve downloaded and installed Windows 7 Beta recently, I think you’ll enjoy this list of my thirty favorite secrets. Have fun!

  1. Windows Management. By now, you’ve probably seen that Windows 7 does a lot to make window management easier: you can “dock” a window to the left or right half of the screen by simply dragging it to the edge; similarly, you can drag the window to the top of the screen to maximize it, and double-click the window top / bottom border to maximize it vertically with the same horizontal width. What you might not know is that all these actions are also available with keyboard shortcuts:
    • Win+Left Arrow and Win+Right Arrow dock;
    • Win+Up Arrow and Win+Down Arrow maximizes and restores / minimizes;
    • Win+Shift+Up Arrow and Win+Shift+Down Arrow maximizes and restores the vertical size.

    This side-by-side docking feature is particularly invaluable on widescreen monitors – it makes the old Windows way of shift-clicking on two items in the taskbar and then using the context menu to arrange them feel really painful.

  2. Display Projection. Had enough of messing around with weird and wonderful OEM display driver utilities to get your notebook display onto an external projector? In that case, you’ll be pleased to know that projection is really quick and simple with Windows 7. Just hit Win+P, and you’ll be rewarded by the following pop-up window:
    The Win+P Projector Settings window allows you to quickly switch display settings.
    Use the arrow keys (or keep hitting Win+P) to switch to “clone”, “extend” or “external only” display settings. You can also access the application as displayswitch.exe.

    If you want broader control over presentation settings, you can also press Win+X to open the Windows Mobility Center, which allows you to turn on a presentation “mode” that switches IM clients to do not disturb, disables screensavers, sets a neutral wallpaper etc. (Note that this feature is also available in Windows Vista.)
  3. Cut Out The Clutter. Working on a document in a window and want to get rid of all the extraneous background noise? Simply hit Win+Home to minimize all the non-active background windows, keeping the window you’re using in its current position. When you’re ready, simply press Win+Home again to restore the background windows to their original locations.
  4. Multi-Monitor Windows Management. The earlier tip on window management showed how you can dock windows within a monitor. One refinement of those shortcuts is that you can use Win+Shift+Left Arrow and Win+Shift+Right Arrow to move windows from one monitor to another – keeping them in the same relative location to the monitor’s top-left origin.
  5. Command Junkies Only. One of the most popular power toys in Windows XP was “Open Command Prompt Here”, which enabled you to use the graphical shell to browse around the file system and then use the context menu to open a command prompt at the current working directory. In Windows 7 (and in Windows Vista, incidentally – although not many folk knew about it), you can simply hold the Shift key down while selecting the context menu to get exactly the same effect. If the current working directory is a network location, it will automatically map a drive letter for you.
  6. It’s a Global Village. If you’ve tried to change your desktop wallpaper, you’ve probably noticed that there’s a set of wallpapers there that match the locale you selected when you installed Windows. (If you picked US, you’ll see beautiful views of Crater Lake in Oregon, the Arches National Park, a beach in Hawai’i, etc.) In fact, there are several sets of themed wallpapers installed based on the language you choose, but the others are in a hidden directory. If you’re feeling in an international mood, simply browse to C:\Windows\Globalization\MCT and you’ll see a series of pictures under the Wallpaper directory for each country. Just double-click on the theme file in the Theme directory to display a rotation through all the pictures for that country. (Note that some countries contain a generic set of placeholder art for now.)
  7. The Black Box Recorder. Every developer wishes there was a way that an end-users could quickly and simply record a repro for the problem that they’re running into that is unique to their machine. Windows 7 comes to the rescue! Part of the in-built diagnostic tools that we use internally to send feedback on the product, the Problem Steps Recorder provides a simple screen capture tool that enables you to record a series of actions. Once you hit “record”, it tracks your mouse and keyboard and captures screenshots with any comments you choose to associate alongside them. Once you stop recording, it saves the whole thing to a ZIP file, containing an HTML-based “slide show” of the steps. It’s a really neat little tool and I can’t wait for it to become ubiquitous on every desktop! The program is called psr.exe; you can also search for it from Control Panel under “Record steps to reproduce a problem”.
    The Problem Steps Recorder provides an easy way for users to record a problem repro for later diagnosis.
Continue reading →

GSM CRACKING CRYPTOGRAPHY

0 comments

If you are using a GSM phone (AT&T or T-Mobile in the U.S.), you likely have a few more months before it will be easy for practically anyone to spy on your communications.
Security researcher Karsten Nohl is launching an open-source, distributed computing project designed to crack the encryption used on GSM phones and compile it in to a code book that can be used to decode conversations and any data that gets sent to and from the phone.


Karsten Nohl talks about his distributed computing, open-source AE/1 cracking project at the Hacking at Random conference.
(Credit: Hacking at Random)
he hopes that by doing this it will spur cellular providers in to improving the security of their services and fix a weakness that has been around for 15 years and affects about 3 billion mobile users.
"We're not generating a vulnerability but publicizing a flaw that's already being exploited very widely," he said in a phone interview Monday.
"Clearly we are making the attack more practical and much cheaper, and of course there's a moral query of whether we should do that," he said. "But more importantly, we are informing (people) about a longstanding vulnerability and hopefully preventing more systems from adopting this."
This weakness in the encryption used on the phones, A5/1, has been known about for years. there's at least one commercial tools that permit for decrypting GSM communications that range in price from $100,000 to $250,000 depending on how fast you want the program to work, said Nohl, who previously has publicized weaknesses with wireless clever card chips used in transit systems.
It will take 80 high-performance computers about one months to do a brute force attack on A5/1 and generate a large look-up table that will serve as the code book, said Nohl, who announced the project at the Hacking at Random conference in the Netherlands 10 days ago.
Using the code book, anyone could get the encryption key for any GSM call, SMS message, or other communication encrypted with A5/1 and listen to the call or read the data in the clear. If 160 people donate their computing resources to the project, it should only take one and a half months to complete, he said.
Participants download the program and one months later we share the files created with others, by BitTorrent, for instance, Nohl said. "We have no connection to them," he added.
Once the look-up table is created it would be available for anyone to use.
Distributed computing, which has long been used for research and academic purposes, like SETI@home, and which companies have built businesses around, not only solves the technical hurdle to cracking the A5/1 code, but it could solve the legal ones .
A few years ago a similar GSM cracking project was embarked on but was halted before it was completed after researchers were intimidated, possibly by a cellular provider, Nohl said. By distributing the effort among participants and not having it centralized, the new effort will be less vulnerable to outside interference, he said.
Nohl wasn't certain of the legal ramifications of the project but said it's likely that using such a look-up table is illegal but possession is legal because of the companies that openly advertise their tables for sale.
A T-Mobile spokeswoman said the company had no comment on the matter.
AT&T spokesman Mark Siegel said, "We take strange care to protect the privacy of our customers and use a variety of tools, lots of technical and some human approaches. I can't go in to the details for security reasons." he declined to elaborate or comment further.
Taking precautions
Carriers should upgrade the encryption or move voice services to 3G, which has much stronger encryption, Nohl said.
In the meantime, people can use separate encryption products on the phone, like Cellcrypt, or handsets with their own encryption, Nohl said. Amnesty International and Greenpeace are using phones with stronger encryption, for example, but it only works if both parties to a conversation are using the same technology, he said.
For data encryption there is good Privacy (PGP) for e-mail and virtual private network (VPN) program for connecting to a corporate network, he said.
The encryption problem is serious for people doing online banking, where banks are using text messages as authentication tokens. Banks should instead offer RSA SecurID tokens or send one-time pass phrases through regular mail, Nohl said.
"I reckon, potentially, this could have as much impact as the breaking of WEP (Wired Equivalent Privacy) had a few years ago," said Stan Schatt, security practice director at ABI Research. "That shook up the industry a bit."
As a result of breaking that encryption, enterprises were reluctant to rely on wireless LANs so the Wi-Fi Alliance pushed through an interim standard that strengthened the encryption method, he said.
"Vendors will jump in with interim solutions, like Cellcrypt," Schatt said. "Mobile operators themselves will have to jump in and offer additional levels of encryption as part of a managed service offering for people who want a higher level of encryption."
However, consumers aren't likely to want to pay extra for the boosted encryption strength, he said.
To snoop on someone's phone, a would-be spy would want to be within eyesight of the target, Schatt said. Or, spies could point a recording device in the direction of a building and grab whatever conversations were nearby, he said.
"If you stand outside a building of a competitor you could get conversations between product managers and about sensitive corporation information, like acquisitions," he said. "Corporations put even more sensitive information over their phones, in general, than we do over their e-mail."
The project web page is here and the the talk with slides is here.
source:cnet.com
Continue reading →

CHANGE MY COMPUTER PROPERTIES

0 comments
here the full trick

DISPLAY PENTIUM 5 OR EVEN MORE IN XP
NOW U CAN ABLE TO SHOW PENTIUM 5 AND EVEN MORE

TYPE "REGEDIT" IN RUN BOX {START->RUN->TYPE REGEDIT}
NOW CLICK IN
H-KEY-LOCAL-MACHIN . THEN ON HARDWARE. THEN ON DISCRIPTION.THEN ON SYSTEM,THEN ON
CentralProcessor.THEN ON 0
{H-KEY-LOCAL-MACHIN/HARDWARE/DISCRIPTION
/SYSTEM/CentralProcessor/0}
NOW U GET IN RIGHT PANE THE VALUE THAT IS
"ProcessorNameString"
DOUBLE CLICK ON THIS VALUE
VALUE NAME AND VALUE DATA IS NOW IN FROUNT OF U NOW IN DATA COLOM U CAN EDIT IT RANDOMLY WHAT U WANT IN PLACE OF THAT
VALUE
AND THEN PRESS OK
Continue reading →

HACK PC WHILE CHATTING

0 comments


this is for educational purpose only ...

Hack PC while chatting

I am not sure that this will work 100 %.
But yes will work almost 70 percent of the times.
But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u having a problem post here.

Following are the features : -

1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server
Or it has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So lets analyse
1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.

So why to wait lets exploit those 50 % chances .
I'll explain only for files here which lies same for Video or audio

1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->

2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established
HMMMM then the first attacker first phase is over
This is the output in your netstat.The 5101 number port is where the Attacker is connected.
Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED


3) so what next???
Hmmm........ Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14

Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1e> GROUP Registered

MAC Address = 00-C0-W0-D5-EF-9A

What to do next??
It is now ur job to tell me what u have done next...


So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
Continue reading →

cool tricks and hacks

0 comments



THIS WEBSITE UPDATES DAILY SO KEEP VISITING......
http://www.micorazone.com/



CLICK ON THE LINK
MAKE ANY SOFTWARE FULL VERSION
FREE SOFTWARE COLLECTION
FREE GREAT EBOOKS
Continue reading →

BASICS OF CRYPTOGRAPHY

0 comments
The Basics of Cryptography

This guide is for educational purposes only I do not take any responsibility about anything

happen after reading the guide. I'm only telling you how to do this not to do it. It's your decision.

If you want to put this text on your Site/FTP/Newsgroup or anything else you can do it but don't

change anything without the permission of the author.

<--=--=--=--=--=--=--=--=>

A word from the author:


I hope you like my texts and find them useful.

If you have any problem or some suggestion feel free to e-mail me but please don't send mails like

"I want to hack the US government please help me" or "Tell me how to bind a trojan into a .jpg"

Be sure if I can help you with something I will do it.

<--=--=--=--=--=--=--=--=>



Table of Contents



1.What is this text about?

2.About Encryption and how it works

3.About the Cryptography and PGP

4.Ways of breaking the encryption

-Bad pass phrases

-Not deleted files

-Viruses and trojans

-Fake Version of PGP

=--=--=--=--=--=--=--=--=





1.What is this text about?

-=-=-=-=-=-=-=-=-=-=-=-=-=

In this text I'll explain you everything about encryption,what is it,PGP,

ways that someone can read your encrypted files etc.Every hacker or

paranoid should use encryption and keep the other from reading their

files.The encryption is very important thing and I'll explain you how can

someone break and decrypt your files.



2.About Encryption and how it works

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

The Encryption is very old.Even Julius Caesar used it when he was

sending messages because he didn't trust to his messengers.You see

encryption is everywhere,when you watch some spy film you see

there's always a computer with encrypted files or some film about hackers

when the feds busted the hacker and they see all of the hacker's files are

encrypted.



When you have simple .txt file that you can read this is called "plain text".

But when you use encryption and encrypt the file it will become unreadable

by the time you don't enter the password.This text is called cipher text.

The process of converting a cipher text into plain text is called decryption.



Here's a little example:



Plain text ==>Encryption==>Ciphertext==>Descryption==>Plaintext



This example shows you the way when you encrypt and decrypt a file.



3.About the Cryptography and PGP

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Cryptography is science that use the mathematics to encrypt and decrypt data.This science

let you keep your files and documents safe even on insecure networks like the Internet.

The cryptography can be weak and strong.The best is of course the strong one.Even when you

use all the computers in the world and they're doing billion operations in second you'll just need

BILLIONS of years to decrypt strong encryption.



PGP (Pretty Good Privacy) is maybe the best encryption program to encrypt your files and documents.

It work in this way:



When you encrypt one file with PGP,PGP first compress the file.This saves you disk space and modem

transmition.Then it creates a session key.This session key works with a very secure and fast

confidential encryption algorithm to encrypt the file.Then the session key is encrypted with the

recipient's public key.

PGP ask you for pass phrase not for password.This is more secure against the dictionary attacks

when someone tries to use all the words in a dictionary to get your password.When you use

pass phrase you can enter a whole phrase with upper and lowercase letters with numeric and

punctuation characters.





4.Ways of breaking the encryption

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

PGP has been written for people that want their files encrypted for people that want privacy.

When you send an e-mail it can be read from other people if you use PGP only the person for who

is the message will be able to read it.





Now you know many things about PGP and the encryption but you may like to know can someone

break it and read your private texts and files.In fact if you use all the computers in the world to

decrypt a simple PGP message they'll need 12 million times the age of the universe to break it.

You see this is the BEST the encryption is so strong noone can break it.

The people that program it has done their work now everything depends on you.



-Bad pass phrases

*****************



The algorithm is unbreakable but they're other ways to decrypt the text and read it.

One of the biggest mistakes when someone writes his/her pass phrase is that the pass phrase is

something like : "John" "I love you" and such lame phrases.Other one are the name of some friend

or something like that.This is not good because this is pass phrase not password make it longer

put numbers and other characters in it.The longer your pass phrase is the harder it will be guessed

but put whole sentences even one that doesn't make sense just think in this way:

Someone is brute-forcing thousands of pass phrases from a dictionary therefore my pass phrase

should be someone that is not there in the dictionary something very stupid like:



hEllowOrld33IjustwanTtoteLLtoev3ryon3thatI'maLamErandI'mahacKer666



This is easy to remember because it's funny and there are only a few numbers but you may not use

upper and lowercase characters.I hope you know will put some very good pass phrase and be sure

noone will know it.

Another mistake is that you may write the pass phase on a paper and if someone find it you'll loose

it and he/she will be able to read your encrypted files.

-Not deleted files

******************

Another big security problem is how most of the operating systems delete files.So when you encrypt

the file you delete the plain text and of course leave the encrypted one.

But the system doesn't actually delete the file.It just mark those blocks of the disk deleted and free.

Someone may run a disk recovery program and still see all the files but in plaintext.Even when you're

writing your text file with a word editor it can create some temporary copies of it.When you close it

these files are deleted but as I told you they're still somewhere on your computer.

PGP has tool called PGP Secure Wipe that complete removes all deleted files from your computer

by overwriting them.In this way you'll only have the encrypted files on your computer.

-Viruses and Trojans

********************
Another dangerous security problem are the viruses and the trojans.So when you infect with a

trojan the attacker may run a key logger on your system.



*Note

A key logger is a program that captures all keystrokes pressed by you then saves them on your

hard drive or send them to the attacker

***************************************

So after the attacker run it he/she will be able to see everything you have written on your computer

and of course with your PGP pass phrase.

There are also a viruses designed to do this.Simpy record your pass phrase and send it back to the

attacker.



-Fake Version of PGP

********************
Another security problem is the PGP source that is

available so someone can make a fake copy of it that is recording your pass phase and

sending it back to the attacker.The program will look real and it will work but it may also have

functions you even don't know about.

A way of defending of these security problems is to use a trojan and a virus scanner.You should

also be sure your computer is clean from viruses and trojans when you install PGP and also be sure

you get PGP from Network Associates Inc. not from some other pages.

So now I hope you understand that PGP can't be braked but if you use it wisely and be sure

your pass phrase is good one,you're not infected with viruses or trojans and you're using the

real version of PGP you'll be secure.
Continue reading →

send emails with telnet

0 comments
Sending Mail with Telnet – send anonymous mail

1) Open up MS-DOS/Command Prompt, by going to Run and typing cmd.

2) You should see a black window box. type in “nslookup”.

3) At the very end of the message, there will be a “>”. Type in “set type=mx”

4) Now another “>” will come up. Type in the name of the mail domain
of your victim. (hotmail.com, gmail.com, yahoo.com, etc.)

5) you should come up with a list of nameservers, MX servers, and
internet addresses. What we are interested in are the MX preferences.
Take note of the one with the highest MX preference. Now, type “exit”.

6)Once you quit, type in this format: telnet [mail server] 25, where
telnet is the command, the mail server is the one with the highest MX
preference, and 25 is the port number.

Ex) telnet gsmtp183.google.com 25, where gsmtp183.google.com is a mail server for gmail.com.

7) If all is well, you should get a 220, meaning a greeting on a
connection. To make sure you are connected, type in “ehlo” or “helo”.
If you get a 250 on either one, you’re set.

8) now, type in “mail from:” and the email you will send “from”.

Ex) mail from:

9) You should get a 250. Type in rcpt to: and the victim’s email.

Ex) rcpt to:

10) Once you get a 250, you should now start the data. Type in data, and press enter. You should get a 354

11) First off, you have to start with the headers. Type “To: [Victim's
email nickname] [victims email]“, without quotes. Press enter. Type
“From: [your fake name] [your spoofed email address]“, without the
quotes. Press enter. Type in “Reply- To: [your spoofed email address]“
without quotes. This is the most basic type.

12) To start writing your message, press enter twice to skip a line.
Type whatever message you want, and BECAREFUL NOT TO SCREW UP. Your
message will screw up if you backspace.

13) To show that your message has ended, press enter, type “.” (without
quotes) and press enter again. You should get a 250. Close your
connection by typing “quit” without quotes, and pressing enter.
Continue reading →

HOW TO HACK PUBLIC CAMERA CCTV

0 comments
the other google search links which makes web cameras publicly viewable are:

inurl:/view.shtml
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / - AXIS”
intitle:”Live View / - AXIS 206M”
intitle:”Live View / - AXIS 206W”
intitle:”Live View / - AXIS 210?
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1? intext:”Open Menu”
intext:”MOBOTIX M10? intext:”Open Menu”
intext:”MOBOTIX D10? intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1?
intitle:”sony network camera snc-m1?
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console - Web Monitor”
Continue reading →
Recommend on Google
 
Copyright 2012 | Design by: Nishant Srivastava
About | Contact | Write For Us | Archive